Archive
Ghost Squad Hackers, an offshoot of the hacktivist group Anonymous, claim to have taken down two websites belonging to Donald Trump, according to Hackagon. In a video posted on YouTube, the collective claims it flooded two Trump sites – Trump.com
Leading New York Law Firms Hacked
Federal authorities are investigating data breaches at the New York law firms Cravath Swaine & Moore LLP and Weil Gotshal & Manges LLP, Threatpost reports. “Last summer, the firm identified a limited breach of its IT systems,” Cravath Swaine &
CREATIVE ACCOUNTANTS are in shock and on the phone this week after a collection of hacked documents called the Panama Papers exposed millions of pounds’ worth of backdoor banking and elaborate tax evasion to the press. The Panama Papers are
The feds warned that “a group of malicious cyber actors,” whom security experts believe to be the government-sponsored hacking group known as APT6, “have compromised and stolen sensitive information from various government and commercial networks” since at least 2011, according
The Department of Defense launched a new program last week, “Hack the Pentagon,” to reward hackers for pointing out security flaws in some of its public-facing websites. It’s a bug bounty, the same kind of program that most big tech
Hackers Divulge Information on Millions of Turks
Hackers have posted a database online that appears to contain the personal information of nearly 50 million Turkish citizens in what is one of the largest public leaks of its kind. The Associated Press on Monday was able to partially
GOP presidential candidate and sentient sac of millions of spiders Donald Trump—literally more spiders than you’ve ever seen—does not have a coherent stance on cybersecurity. In his business ventures, though, his cybersecurity record sucks. Trump has failed to encourage policies
TU Braunschweig, Institute for Operating Systems and Computer Networks, ProfessorsDominik Schürmann and Lars Wolf are warning about a “Surreptitious Sharing” vulnerability which is present in many Android communication apps. Their pre-published research paper, Surreptitious Sharing on Android (pdf), is to
A German researcher reportedly netted $500 from PayPal’s bug bounty program for a vulnerability that could have allowed an attacker to carry out phishing and other attacks. Vulnerability Laboratory researcher Benjamin Kunz Mejri discovered what he described as a “Filter
Another vulnerability has been found in iOS, Apple’s mobile operating system. The mobile device management (MDM) interface for iOS, according to security researchers, can be exploited to gain complete access to the device. Apple insists that it’s not a vulnerability,
When Chris Roberts took the controversial action of accessing sensitive flight systems aboard a live United Airlines flight in May of 2015, he claimed that it was after years of inaction from the airline. Roberts reported that he had been
Key evidence that helped convict two British men last week for terrorist offences was reportedly obtained from a locked phone using a simple but highly effective ruse. According to CNN, which cited a source close to the investigation, undercover police
On Tuesday, the Times reporter Rukmini Callimachi published the latest in a series of blockbuster stories about the inner workings of the Islamic State. The piece focussed on the logistics of the group’s deployment of terrorists in Europe, but also included
The FBI has told local law enforcement agencies that it will provide technical assistance to unlock iPhones in criminal cases around the US when permitted by law. In the letter to local law enforcement, the FBI said that it understood
Google is developing real-time facial-recognition tech that uses a phone’s front camera to continuously authenticate users when they’re logged into a bank or email account. Continuous authentication is viewed as a promising way of improving on today’s approach of only
SAN FRANCISCO—This past week hundreds of lawyers, technologists, journalists, activists, and others from around the globe descended upon a university conference center to try to figure out the state of digital rights in 2016. The conference, appropriately dubbed “RightsCon,” featured