Cyber Attack

cyber attack The latest articles about cyber attack from Mashable, the media and tech company

  • A sonic cyberattack could hijack a device’s speakers
    by Rachel Kraus on August 11, 2019 at 8:37 pm

    Weapons that injure crowds of people by emitting dangerous sounds may seem like the stuff of science fiction. Unfortunately, malicious hackers might be able to do just that — but with Bluetooth- or WiFi-capable smartphones, headphones, speakers, or laptops. Researcher Matt Wixey is unveiling research at the Def Con hacking conference that shows the potential for devices with speakers to be hacked and turned into sonic weapons, as reported by the BBC.  Wixey found that by creating a virus and exploiting “known weaknesses,” many devices have little protection to ensure the integrity of their speakers. Once hacked, devices could be made to play “dangerous” sounds, such as sounds at high or low frequencies that could deafen, disorient, or injure. Read more…More about Def Con, Cyber Attack, Tech, and Cybersecurity

  • Here’s 5 tips for Spring cleaning your digital footprint
    by Tara Flanigan on March 13, 2018 at 3:51 pm

    Keeping track of multiple devices and digital accounts can be exhausting. Every piece of information shared online contributes to a user’s growing digital footprint which isn’t easily erased and can increase vulnerability to cyber attacks.  Here are 5 simple steps for smart sharing and enhancing cybersecurity, so that your digital footprint is much more organized and difficult to track. Dennis Bonilla, Executive Dean at the College of Information Systems and Technology for University of Phoenix, helped contribute to this story. Read more…More about Technology, Privacy, Security, Smartphone, and Tablets

  • Meet the 20-somethings who halted a worldwide cyberattack
    by Maria Gallucci on May 14, 2017 at 1:28 pm

    Two 20-something cyber experts helped bring down the widespread ransomware attack that infiltrated networks at hospitals, banks, and government agencies in multiple countries. A 22-year-old British researcher unintentionally found the so-called “kill switch” that authors of the malicious software left in the code. Later, he teamed up with a 28-year-old engineer in western Michigan to ultimately halt the infections, the Associated Press reported. SEE ALSO: NSA tools at center of ransomware attacks hitting UK hospitals The unprecedented outbreak, which began last Friday, locked up computers and extorted users for large Bitcoin payments in nations as diverse as the U.S., Russia, Ukraine, Brazil, Spain, and India. It also hit the U.K.’s National Health Service, affecting computers in hospitals and doctors’ offices.  Read more…More about Nsa, Cybersecurity, Hackers, Windows, and Malware

  • How computer hacking is becoming Russia’s weapon of choice
    by The Conversation on February 8, 2017 at 7:35 pm

    In his 2007 address to the Annual Security Conference in Munich, Vladimir Putin threw down a gauntlet to the West. Attacking what he called “illegal” unilateral military action by the US, he hinted that Russia would build its capability in information warfare to counter American and NATO expansion. In the same year, a Russian policy doctrine noted that as the world became more digitally connected, the well-being of nation states would become dependent on data and and its rapid movement. Back then, information warfare was just a sideshow, and Putin’s emphasis was on more traditional weapon systems. But things have changed. In the decade since, Russia has rapidly developed its information warfare capability and deployed it in conflicts in Estonia, Georgia, and Ukraine. Read more…More about Cyber Attack, Technology, Russian Hack, Russian Hacker, and Hacking

  • The National Lottery hack is why you shouldn’t reuse your password
    by Gianluca Mezzofiore on November 30, 2016 at 11:38 am

    About 26,500 National Lottery accounts have been accessed by hackers, according to its operator Camelot.  SEE ALSO: U.S. government prepares for Election Day cyber attacks The company says they’ve recorded “suspicious activity” on a small proportion of the 9.5 million players registered online, indicating that people’s login details, such as email and passwords, may have been stolen from other websites.  Camelot says hackers were not able to access “core National Lottery systems.”  “We do not hold full debit card or bank account details in National Lottery players’ online accounts and no money has been taken or deposited,” Camelot said. “However, we do believe that this attack may have resulted in some of the personal information, that the affected players hold in their online account, being accessed.” Read more…More about Hacking, Cyber Attack, National Lottery, and World

  • U.S. government prepares for Election Day cyber attacks
    by Colin Daileda on November 4, 2016 at 4:35 pm

    The United States government is readying itself for a range of possible cyber attacks it fears could come on Election Day.  The White House is working alongside the NSA, the CIA, the Department of Defense, and the Department of Homeland Security to guard against disinformation campaigns, internet slow-downs and other types of digital assault, according to NBC.  SEE ALSO: How an attack on a company you’ve never heard of crushed the internet A disinformation campaign is the most likely possibility. In a campaign season that’s been marked by hackers and leaked documents, news of another round of such documents wouldn’t be surprising to voters. But government officials told NBC they’re concerned internet sleuths could use a fake document dump as a last-minute attempt to sway voters in one direction or another.  Read more…More about Nsa, Government, White House, Hack, and Leaks

  • This map of U.S. Internet cables is available to the public for first time
    by MIT Technology Review on September 15, 2015 at 3:45 pm

    It may not look like much at first glance, but a map created by University of Wisconsin computer science professor Paul Barford and about a dozen colleagues took around four years to produce. He believes it could make the Internet more resilient to accidents, disasters, or intentional attacks. The map shows the paths taken by the long-distance fiber-optic cables that carry Internet data across the continental U.S. The exact routes of those cables, which belong to major telecommunications companies such as AT&T and Level 3, have not been previously publicly viewable, despite the fact that they are effectively critical public infrastructure, says Barford. Read more…More about Internet, Internet Security, U.S., Cyber Attack, and Tech

  • Ello, the Anti-Facebook, Weathers First Major Outage
    by Rex Santus on September 29, 2014 at 5:21 pm

    The invite-only social network Ello, which has seemingly become an overnight sensation, has also drawn enough attention to become the victim of an attack that briefly disrupted its service. But it survived its first major outage on Sunday. Ello, which has apparently benefited from Facebook’s crackdown on users who don’t use their real names, was down for about 35 minutes on Sunday, starting at 4:15 p.m. ET, according to the website’s status page. See also: Ello Cofounder Doesn’t Think Facebook Is a Social Network The site blamed the outage on a denial of service attack — an attack method characterized by a malicious intent to deny access to users. Ello resolved the attack by blocking the responsible IP address from its servers. Read more…More about Social Networking, Social Media, Cyber Attack, Facebook, and Ello

  • More Than 1,000 Businesses Hit by Same Cyber Attack as Target
    by Alex Magdaleno on August 23, 2014 at 12:15 am

    Target wasn’t the only business that experienced a cyber attack that compromised tens of millions of its customers’ credit cards, according to the Secret Service. More than 1,000 American businesses were hit by the same cyber attack that affected in-store cash registers at Target last year, The New York Times reported Friday. According to a Department of Homeland Security advisory obtained by the New York Times, the attacks were “much more pervasive” than initially reported as hackers received access to millions of payment card data being sold on the black market. Homeland Security officials encouraged all businesses, “regardless of size,” to check for “Point of Sale malware infections,” according to the report. Read more…More about Target, Malware, Secret Service, Data Breach, and Cyber Attack

  • The Israeli Hacktivists’ Cyber War in Gaza
    by Uri Blau on July 18, 2014 at 7:04 pm

    Late Thursday night, as Israeli tanks advanced into the Gaza strip, civilian Israelis gathered to fight alongside them. The frontline, however, was virtual, the battlefield digital Soon after Israeli soldiers crossed into Gaza, the hacktivism group the Israeli Elite Force (IEF) recruited an army of volunteers. The Hashtag for the operation was #OpIsraelRetaliate and the chosen targets were official Palestinian websites See also: Israelis and Hamas Talk — on Twitter The plan was “not to break through the main sites and change its appearance” but to breach them and get “databases, usernames, passwords, remote control etc,” according to the IEF, which stated that the objective was to “jeopardize sensitive information of internet users in the Arab world” and not, as one might expect, to harm Hamas Read more…More about Israel, Gaza, Cyber War, Cyber Attack, and Us World

  • Hackers Take Down World Cup-Affiliated Sites, Tease ‘More Still to Come’
    by Samantha Murphy Kelly on June 12, 2014 at 5:32 pm

    Hackers have reportedly attacked a series of World Cup-related websites, including government sites and official partners of the upcoming games in Brazil, kicking them offline. According to a Reuters report, a hacker affiliated with hacktivist group Anonymous says it’s responsible for the cyberattacks. Among those kicked offline earlier this week include World Cup sponsor Hyundai and government state Mato Grosso (where Chile will play Australia on Friday), but Hyundai has yet to confirm it was hit by hackers. See also: The Heartbleed Hit List: The Passwords You Need to Change Right Now The hackers used DDoS (Distributed Denial of Service) attacks, which sends large volumes of traffic to sites, causing them to crash. Read more…More about Hacking, Anonymous, World Cup, Cyber Attack, and Cyberattack

  • EBay Users Still at Risk After Cyberattack, Even If They Change Passwords
    by Christina Warren on May 22, 2014 at 8:39 pm

    When eBay admitted Wednesday that it had been the victim of a cyberattack, the company asked all of its 145 million active users to change their passwords. But the intruders had access to a customer database that also included other personal information, including names, mailing addresses and dates of birth — data that can’t so easily be changed. The good news is that eBay says that no financial or credit card information was compromised. Financial data was stored on separate systems, and eBay says there’s no evidence that any PayPal data was compromised. The bad news is that the data that was compromised was still important. Read more…More about Ebay, Security, Cyber Attack, and Tech

  • Could Russia Use Cyberwarfare to Further Destabilize Ukraine?
    by Colin Daileda on April 14, 2014 at 11:28 am

    Eastern Ukraine is full of rioters ready to separate from their nation’s government in Kiev — at least, that’s the message the Russian government may want to project to the world. And analysts believe the Kremlin could use cyberattacks to create more chaos and support its objectives. Protesters in eastern Ukraine have clashed with police and stormed government buildings. A group of separatists who took over a building in Donetsk declared a “People’s Republic of Donetsk” and demanded a referendum for independence on May 11. In Luhansk, rebels raided an armory and took 56 hostages. But U.S. Secretary of State John Kerry has accused Russian “special agents” of inciting the ruckus. Others claim there’s a Russian hand at play behind the curtain of what seems like a looming crisis, manufactured either as pretext for a Russian invasion or as a means to distract from the Kremlin’s annexation of Crimea. Read more…More about Russia, Cyber Attack, Us World, Cyber Warfare, and Ukraine

  • Obama May Have Ordered a Cyberattack Last Year
    by Colin Daileda on March 13, 2014 at 10:43 pm

    President Barack Obama asked the Department of Defense last June to perform a cyberattack, according to the nonprofit organization Federation of American Scientists (FAS). The U.S. Air Force declassified a 15-page policy directive (PDF) last week, containing a single sentence that the FAS believes is enough to prove Obama ordered the military to carry out an aggressive operation in cyberspace, though further details are still classified. See also: Military Google Glass Will Help Soldiers See Over Mountains Below is the relevant quote from the document, released by the Air Force on March 5: “Classified processes governing [command and control] of [Air Force] offensive and defensive cyberspace operations conducted by [Air Force] Cyber Mission Forces are addressed in a classified [Chairman, Joint Chiefs of Staff] Execute Order (title classified) issued on 21 Jun 13.” Read more…More about Military, Obama, Cyber Attack, Us World, and Politics

  • Israel to Create Cyber Attack Emergency-Response Team
    by Bloomberg on January 29, 2014 at 3:30 pm

    As part of Israel’s program to deal with rising cyber threats, the government is putting together a task force to help citizens and businesses cope. The country’s National Cyber Bureau plans to establish cyber-emergency response teams this year that will specialize in handling different kinds of hacks, said Rami Efrati, the head of the bureau’s civilian division. Israelis will be able to report attacks to the national center, and local companies could tap experts familiar with specialized cyber-attacks affecting their industries, such as finance or energy, Efrati said in an interview yesterday at the Cybertech conference in Tel Aviv. The program, which also helps facilitate the sharing of cyber-threat information, will have elements based on the Multi-State Information Sharing and Analysis Center in the U.S., which the Department of Homeland Security designates as a resource for state and local governments. Read more…More about Israel, Cyber Crime, Cybersecurity, Cyber Attack, and Apps Software

  • Michaels May Be Latest U.S. Retailer to Suffer Security Breach
    by Colin Daileda on January 26, 2014 at 7:03 pm

    Michaels, a U.S. arts and crafts chain, is investigating fraudulent activity on some customers’ credit cards, which the company says may be the result of a data breach. “Michaels Stores, Inc. recently learned of possible fraudulent activity on some U.S. payment cards that had been used at Michaels, suggesting that the company may have experienced a data security attack,” Michael Fox, a Michaels spokesperson, said in a statement to Mashable. “The company is working closely with federal law enforcement and is conducting an investigation with the help of third-party data security experts to establish the facts.” Read more…More about Credit Cards, Data, Retailer, Cyber Attack, and Business

  • Man Who Joined Anonymous Attack for ‘1 Minute’ Fined $183,000
    by The Daily Dot on December 10, 2013 at 3:28 am

    A 38-year-old man was sentenced to two years probation and a hefty fine for participating in a distributed denial-of-service attack organized by hacker collective Anonymous against the webpage of Koch Industries in 2011. The surprising part? He only joined the attack for one minute. Eric J. Rosol, a Wisconsin resident, was charged with being part of Anonymous’ attack on the Kansas-based company, Kochind.com, on Feb. 28, 2011, using a popular DDoS tool, which was found on his computer Rosol, however, says he was part of the attack for one minute. He pleaded guilty to one misdemeanor count of accessing a protected computer, and was sentenced to two years of federal probation and ordered to pay $183,000, the Department of Justice said in a statement acquired by IT World. The monetary amount is equal to what Koch paid for a consulting group to come in post-attack and fix their website. The attack itself only took Koch’s website down for about 15 minutes. Read more…More about Hacking, Anonymous, Crime, Hacker, and Cyber Attack

  • Why We Need an Invasive NSA
    by The New Republic on October 10, 2013 at 8:30 pm

    Ever since stories about the National Security Agency’s electronic intelligence-gathering capabilities began tumbling out last June, The New York Times has published more than a dozen editorials excoriating the “national surveillance state.” It wants the NSA to end the “mass warehousing of everyone’s data” and the use of “back doors” to break encrypted communications. A major element of the Times’ critique is that the NSA’s domestic sweeps are not justified by the terrorist threat they aim to prevent. At the end of August, in the midst of the Times’ assault on the NSA, the newspaper suffered what it described as a “malicious external attack” on its domain name registrar at the hands of the Syrian Electronic Army, a group of hackers who support Syrian President Bashar al-Assad. The paper’s website was down for several hours and, for some people, much longer. “In terms of the sophistication of the attack, this is a big deal,” said Marc Frons, the Times’ chief information officer. Ten months earlier, hackers stole the corporate passwords for every employee at the Times, accessed the computers of 53 employees, and breached the email accounts of two reporters who cover China. Read more…More about United States, Cybersecurity, Cyber Attack, Us World, and Us

  • Why You Should Care Cybersecurity Lobbying Doubled
    by The Daily Dot on April 11, 2013 at 4:55 am

    Lest you doubt we are entering the age of a cybersecurity industrial complex—and that such a system doesn’t necessarily have the average Internet user in mind—take look at the numbers. According to a new study by the lobbying group Center for Responsive Politics, lobbying reports that referenced “cybersecurity” more than doubled last year. Mentions jumped from 990 in 2011 to 1,968 in 2012. And where does that money go? In part, at least, to sponsor Internet bills that much of the public doesn’t want A different report by Maplight.org recently revealed that groups that lobby for the controversial Cyber Intelligence Security Protection Act (CISPA) give far more money to members of Congress than those who oppose it. Read more…More about Cybersecurity, Cyber Attack, Us World, Politics, and Us

  • State-Sponsored Cyberattack Targeted More Than 70 Organizations Worldwide
    by Sarah Kessler on August 3, 2011 at 10:47 am

    A series of cyberattacks that targeted more than 70 organizations in 14 countries throughout the past five years was uncovered by Internet security firm McAfee, Vanity Fair reported Tuesday. The attacks, nicknamed “Operation Shady Rat” and discovered by McAfee Vice President of Threat Research Dmitri Alperovitch, are thought to be state-sponsored While the victims varied widely in size and location, Vanity Fair reports that the majority of them (49) were U.S.-based organizations and that defense contractors (13) were the most targeted. The Olympic committee, World Anti-doping Agency, the United Nations and the Association of Southeast Asian Nations are the only victims McAfee publicly named. Read more…More about News, Hacking, Mcafee, Cyber Attack, and Tech

  • Pentagon: Cyber Attacks Can Qualify as Acts of War
    by Lauren Indvik on May 31, 2011 at 10:40 am

    The Pentagon has finished drafting its first official “computer sabotage strategy,” determining that online cyber attacks from another country can constitute an act of war, enabling the U.S. to retaliate with military force. “If you shut down our power grid, maybe we will put a missile down one of your smokestacks,” a military official told The Wall Street Journal by way of example. The formal strategy underlines a rising need to systematically respond to attacks on the computer systems of the U.S. and other countries. In 2009, a strain of the Microsoft Windows computer virus Stuxnex, which some believe originated from Israel with U.S. help, damaged Iran’s nuclear facilities. More recently, Google was the victim of cyber attacks that allegedly originated in China, an affair the the White House became involved in. Read more…More about News, Cyber Attack, Pentagon, and Us And World

  • Was the Cyber Attack on Google an Inside Job?
    by Stan Schroeder on January 18, 2010 at 6:53 am

    A couple of days ago, Google announced a plan to stop censoring the Chinese version of its search engine, threatening to pull out from the Chinese market altogether. One of the main reasons behind this decision was a sophisticated hacker attack on Google that came, Google claims, directly from China The attack, which used a flaw in Microsoft’s Internet Explorer and a trojan named Hydraq, is considered sophisticated not only because of the attackers’ level of technical expertise, but also because the attackers knew exactly who to attack. Now, Reuters’ source claims that the hackers have had help from Google itself Read more…More about Web, Web 2.0, Google, Search, and News

Share This Information.

Leave a Reply

Your email address will not be published. Required fields are marked *