realhackhistory, to hacking
@realhackhistory@chaos.social avatar

An article by David E. Sanger
via the New York Times News Service which was published in the Pittsburgh Post-Gazette on the 24th of November, 1988.

This reminds me of Russian news headlines about Russian hackers:

"Envious of computer virus
Well-behaved Japanese programmers have not developed the creative of U.S. competitors"

chizeck, to beer
@chizeck@beige.party avatar

I've been waiting to write my first toot on beige.party until I had something important enough to share. I have now found that important information. You're welcome.

https://www.scq.ubc.ca/how-to-brew-beer-in-a-coffee-maker-using-only-materials-commonly-found-on-a-modestly-sized-oceanographic-research-vessel/

gtbarry, to Canada
@gtbarry@mastodon.social avatar

London Drugs pharmacy chain closes stores after cyberattack

Canadian pharmacy chain London Drugs has closed all its retail stores to contain what it described as a "cybersecurity incident."

"London Drugs is closing all stores across Western Canada until further notice"

https://www.bleepingcomputer.com/news/security/london-drugs-pharmacy-chain-closes-stores-after-cyberattack/

sidde, to apple
@sidde@bitbang.social avatar

Another post about G4 12" events from ~20 years ago.

a late November evening of 2005. With a "larger" antenna and standing on a mountain to the north of the city.

I used an antenna made for point to point "broadband" connections.
A bit on the larger size than the popular "pringles cantennas" people used to make.

(Funny to think about that I ended up with a work in Cybersecurity a few years later)

Antenna Connection to the Powerbook 12"
KisMAC output

thejapantimes, to worldnews
@thejapantimes@mastodon.social avatar

Russian programmers are playing a "cat-and-mouse" game with authorities to bypass controls on what citizens can access online. https://www.japantimes.co.jp/news/2024/04/27/world/politics/russia-programmers-outsmart-censors/ #worldnews #politics #russia #russiaukrainewar #internet #hacking #socialmedia

thejapantimes, to Japan
@thejapantimes@mastodon.social avatar

As the U.S. faces security threats across the globe, Japan has committed to stepping up as a trusted defense partner — but Tokyo's cyber and information security vulnerabilities remain a concern. https://www.japantimes.co.jp/news/2024/04/26/japan/politics/japan-security-vulnerabilities/

realhackhistory, to hacking
@realhackhistory@chaos.social avatar

Been reading about the case of Edward Austin Singh in the UK, a #hacker who was caught physically trespassing in a Teesside Polytechnic college computer lab, while connected to various #hacked computers, by UK police in 1988.
#hacking #history

TechDesk, to Cybersecurity
@TechDesk@flipboard.social avatar

With over 50 elections set to take place around the globe in 2024, around two billion people will head to the polls before the year is out. That creates a greater opportunity than ever for hostile nations to trial new and refined cyber-attack techniques, according to cybersecurity firm Mandiant.

As reported by Techradar: “Data theft, distributed-denial-of-service (DDoS) attacks, hack and leak operations, and various information operation (IO) campaigns using social media are all ranked as some of the most likely tactics used to affect election campaigns and voters, with Mandiant assessing that these could be used in layered campaigns that each seek to magnify the effect of each other.”

https://flip.it/Pc5hQs

#Cybersecurity #Elections #Voting #CyberAttack #Hacking

gcluley, to Cybersecurity
@gcluley@mastodon.green avatar

Hacker posts fake story about Ukrainians trying to kill Slovak President.

Read more in my article on the Bitdefender blog: https://www.bitdefender.com/blog/hotforsecurity/hacker-posts-fake-story-about-ukrainians-trying-to-kill-slovak-president/

#cybersecurity #ukraine #czechia #slovak #russia #disinformation #hacking

gtbarry, to security
@gtbarry@mastodon.social avatar

LastPass users targeted in phishing attacks good enough to trick even the savvy

Password-manager LastPass users were recently targeted by a convincing phishing campaign that used a combination of email, SMS, and voice calls to trick targets into divulging their master passwords

https://arstechnica.com/security/2024/04/lastpass-users-targeted-in-phishing-attacks-good-enough-to-trick-even-the-savvy/

realhackhistory, to hacking
@realhackhistory@chaos.social avatar

Can anyone help me find references, videos or news reports relating to this, as seen in The Sydney Morning Herald, 7th November 1988?

It concerns a incident and Belgian Prime Minister Wilfried Martens in, I think, October of 1988.

realhackhistory, to hacking
@realhackhistory@chaos.social avatar

The story of the first person convicted of planting a destructive computer virus, Donald Gene Burleson, from the March 1989 issue of Texas Monthly. This is a great write up of the story behind an incident that had taken place in 1985 and the resulting court case.

https://www.texasmonthly.com/true-crime/search-and-destroy/

realhackhistory, to hacking
@realhackhistory@chaos.social avatar

Still combing through stories in news archives from 1987 & what the hell is this.

As reported in The Albany Herald in April of 1987, this cop had his conviction reversed, he'd managed to cyberstalk women in 1984! Unbelievable this was already a thing back then.

bobby, to hacking
@bobby@mastodon.sexypokemon.xyz avatar

There is a new PHP vulnerability out. It is being tracked as CVE-2024-2961. Here’s a video explaining the vulnerability https://youtu.be/u8jLUjpCWrs?si=Fm1JSBdAW9VBzuhj #cve #vulnerability #hacking #php #linux #news #Security

snoopgod, to ArtificialIntelligence
@snoopgod@mastodon.social avatar
Turgon, to DOOM German
@Turgon@rollenspiel.social avatar

Schon mal #Doom mittels einer Prozessanzeige #htop gespielt? :rm_nerd: :rm_love: :rm_yay: 🤩

https://github.com/0x0mer/doom-htop

#hacking

realhackhistory, to hacking
@realhackhistory@chaos.social avatar

Another #FBI #FOIA release, this time on the 2004 'MyDoom' worm. This is 22 pages that had already been processed, I've asked for further records to be processed for later release.
#hacking #hacker #history
https://archive.org/details/MyDoom-FBI-FOIA

albertcardona, to hacking
@albertcardona@mathstodon.xyz avatar

Of the top 20 "404"s of my personal website, 18 are for WordPress pages. My blog is entirely static, i.e., these failed requests are attempts at hacking. The other two are for ".git" and for ".env".

Be careful out there. If you use WordPress at all, the likelihood you've let something open is high; lots of surface of attack. Read the manual.

remixtures, to Cybersecurity Portuguese
@remixtures@tldr.nettime.org avatar

#CyberSecurity #AI #Iot #SmartObjects #Hacking: "For a start, review all the devices in your home that connect to the internet. Try to identify AI-powered features, such as learning user behaviours or processing large datasets. These are common in smart speakers, home security systems and advanced wearable technology.

Secondly, explore the functionality of your devices and disable irrelevant or unnecessary AI features. This simple step could prevent AI from gathering personal information and its possible exposure.

Thirdly, when you purchase a device, examine the manufacturer’s security disclosure, often found on their website under titles like “Privacy”, “Security” or “Product Support”. It can also be found in user manuals and, sometimes, directly on the product packaging.

Make sure you understand what sort of AI technology the device uses and how data is collected, processed, stored and protected. What are the safeguards? Did the manufacturer use industry standards or subscribe to strong security guidelines like the European Union’s data protection regulation, GDPR?" https://theconversation.com/ai-is-making-smart-devices-watches-speakers-doorbells-easier-to-hack-heres-how-to-stay-safe-223738

cdarwin, to hacking
@cdarwin@c.im avatar

FBI chief says Chinese have infiltrated critical US infrastructure

Chinese government-linked hackers have burrowed into US critical infrastructure and are waiting “for just the right moment to deal a devastating blow”, the director of the FBI, Christopher Wray, has warned.

An ongoing Chinese hacking campaign known as has successfully gained access to numerous American companies in telecommunications, energy, water and other critical sectors, with 23 pipeline operators targeted, Wray said.
China is developing the “ability to physically wreak havoc on our at a time of its choosing”, Wray said at the 2024 Vanderbilt summit on modern conflict and emerging threats.

He added: “Its plan is to land low blows against civilian infrastructure to try to induce .”
Wray said it was difficult to determine the intent of this cyber pre-positioning, which was aligned with China’s broader intent to deter the US from defending Taiwan.
China claims democratically governed Taiwan as its own territory and has never renounced the use of force to bring the island under its control. Taiwan strongly objects to China’s sovereignty claims and says only the island’s people can decide their future.
Earlier this week, a Chinese ministry of foreign affairs (MFA) spokesperson said Volt Typhoon was in fact unrelated to China’s government, but was part of a criminal group.

https://www.theguardian.com/world/2024/apr/19/fbi-china-hack-infrastructure?CMP=Share_iOSApp_Other

remixtures, to Cybersecurity Portuguese
@remixtures@tldr.nettime.org avatar

: "A financially motivated criminal hacking group says it has stolen a confidential database containing millions of records that companies use for screening potential customers for links to sanctions and financial crime.

The hackers, which call themselves GhostR, said they stole 5.3 million records from the World-Check screening database in March and are threatening to publish the data online.

World-Check is a screening database used for “know your customer” checks (or KYC), allowing companies to determine if prospective customers are high risk or potential criminals, such as people with links to money laundering or who are under government sanctions. The hackers told TechCrunch that they stole the data from a Singapore-based firm with access to the World-Check database, but did not name the firm.

A portion of the stolen data, which the hackers shared with TechCrunch, includes individuals who were sanctioned as recently as this year." https://techcrunch.com/2024/04/18/world-check-database-leaked-sanctions-financial-crimes-watchlist/

thejapantimes, to worldnews
@thejapantimes@mastodon.social avatar

Chinese government-linked hackers have burrowed into U.S. critical infrastructure and are waiting "for just the right moment to deal a devastating blow," the FBI has said. https://www.japantimes.co.jp/news/2024/04/19/world/fbi-china-hack-prepare/ #worldnews #china #us #hacking #cybersecurity

ai6yr, to Cybersecurity
@ai6yr@m.ai6yr.org avatar
dougiec3, to hacking
@dougiec3@libretooth.gr avatar

Money talks and justice walks.
“My lawyers tell me that that is exactly what would most likely happen here. Rupert Murdoch’s lawyers are very expensive. So even if every allegation is proven in court, I would still be liable for something approaching £10m in costs. I’m afraid I am shying at that fence.”
https://www.theguardian.com/media/2024/apr/17/hugh-grant-settles-high-court-claim-against-sun-publisher

kdriscoll, to retrocomputing
@kdriscoll@aoir.social avatar

Can anyone help @rwg ID Suzy Thunder's modems? Two late 70s acoustic couplers.

Read more: “The Electronic Delinquents,” ABC 20/20, April 22, 1982, https://hackcur.io/trashing-the-phone-company-with-suzy-thunder/

  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • thenastyranch
  • rosin
  • GTA5RPClips
  • osvaldo12
  • love
  • Youngstown
  • slotface
  • khanakhh
  • everett
  • kavyap
  • mdbf
  • DreamBathrooms
  • ngwrru68w68
  • provamag3
  • magazineikmin
  • InstantRegret
  • normalnudes
  • tacticalgear
  • cubers
  • ethstaker
  • modclub
  • cisconetworking
  • Durango
  • anitta
  • Leos
  • tester
  • JUstTest
  • All magazines