I've been waiting to write my first toot on beige.party until I had something important enough to share. I have now found that important information. You're welcome. #beer#hacking#science#brewing#themoreyouknow
Been reading about the case of Edward Austin Singh in the UK, a #hacker who was caught physically trespassing in a Teesside Polytechnic college computer lab, while connected to various #hacked computers, by UK police in 1988. #hacking#history
With over 50 elections set to take place around the globe in 2024, around two billion people will head to the polls before the year is out. That creates a greater opportunity than ever for hostile nations to trial new and refined cyber-attack techniques, according to cybersecurity firm Mandiant.
As reported by Techradar: “Data theft, distributed-denial-of-service (DDoS) attacks, hack and leak operations, and various information operation (IO) campaigns using social media are all ranked as some of the most likely tactics used to affect election campaigns and voters, with Mandiant assessing that these could be used in layered campaigns that each seek to magnify the effect of each other.”
LastPass users targeted in phishing attacks good enough to trick even the savvy
Password-manager LastPass users were recently targeted by a convincing phishing campaign that used a combination of email, SMS, and voice calls to trick targets into divulging their master passwords
The story of the first person convicted of planting a destructive computer virus, Donald Gene Burleson, from the March 1989 issue of Texas Monthly. This is a great write up of the story behind an incident that had taken place in 1985 and the resulting court case. #hacking#history https://www.texasmonthly.com/true-crime/search-and-destroy/
Still combing through #hacker stories in news archives from 1987 & what the hell is this.
As reported in The Albany Herald in April of 1987, this cop had his #hacking conviction reversed, he'd managed to cyberstalk women in 1984! Unbelievable this was already a thing back then.
Of the top 20 "404"s of my personal website, 18 are for WordPress pages. My blog is entirely static, i.e., these failed requests are attempts at hacking. The other two are for ".git" and for ".env".
Be careful out there. If you use WordPress at all, the likelihood you've let something open is high; lots of surface of attack. Read the manual.
#CyberSecurity#AI#Iot#SmartObjects#Hacking: "For a start, review all the devices in your home that connect to the internet. Try to identify AI-powered features, such as learning user behaviours or processing large datasets. These are common in smart speakers, home security systems and advanced wearable technology.
Secondly, explore the functionality of your devices and disable irrelevant or unnecessary AI features. This simple step could prevent AI from gathering personal information and its possible exposure.
Thirdly, when you purchase a device, examine the manufacturer’s security disclosure, often found on their website under titles like “Privacy”, “Security” or “Product Support”. It can also be found in user manuals and, sometimes, directly on the product packaging.
FBI chief says Chinese have infiltrated critical US infrastructure
Chinese government-linked hackers have burrowed into US critical infrastructure and are waiting “for just the right moment to deal a devastating blow”, the director of the FBI, Christopher Wray, has warned.
An ongoing Chinese hacking campaign known as #Volt#Typhoon has successfully gained access to numerous American companies in telecommunications, energy, water and other critical sectors, with 23 pipeline operators targeted, Wray said.
China is developing the “ability to physically wreak havoc on our #critical#infrastructure at a time of its choosing”, Wray said at the 2024 Vanderbilt summit on modern conflict and emerging threats.
He added: “Its plan is to land low blows against civilian infrastructure to try to induce #panic.”
Wray said it was difficult to determine the intent of this cyber pre-positioning, which was aligned with China’s broader intent to deter the US from defending Taiwan.
China claims democratically governed Taiwan as its own territory and has never renounced the use of force to bring the island under its control. Taiwan strongly objects to China’s sovereignty claims and says only the island’s people can decide their future.
Earlier this week, a Chinese ministry of foreign affairs (MFA) spokesperson said Volt Typhoon was in fact unrelated to China’s government, but was part of a criminal #ransomware group. #VoltTyphoon#hacking
#CyberSecurity#CyberCrime#Hacking: "A financially motivated criminal hacking group says it has stolen a confidential database containing millions of records that companies use for screening potential customers for links to sanctions and financial crime.
The hackers, which call themselves GhostR, said they stole 5.3 million records from the World-Check screening database in March and are threatening to publish the data online.
World-Check is a screening database used for “know your customer” checks (or KYC), allowing companies to determine if prospective customers are high risk or potential criminals, such as people with links to money laundering or who are under government sanctions. The hackers told TechCrunch that they stole the data from a Singapore-based firm with access to the World-Check database, but did not name the firm.