Arctic Plastic Pollution, a Hacker Joke Gone Awry, and More News.Microplastics are reaching every corner of the earth, a hacker's joke cost him over $12,000, and WIRED takes a look at the science of dick pics.
Microsoft today warned Windows users of seven new vulnerabilities in Windows that, like BlueKeep, can be exploited via RDP, a tool that lets administrators connect to other computers in a network.
At the Defcon hacker conference today, independent security researcher Pedro Cabrera showed off in a series of hacking proofs-of-concept attacks how modern TVs—and particularly Smart TVs that use the internet-connected HbbTV standard implemented in his native Spain, across Europe, and much of the rest of the world—remain vulnerable to hackers.
Based on a scan of MyCar's exposed database—and Jmaxxz says he was careful not to access anyone else's private data—he estimates that there were roughly 60,000 cars left open to theft by those security bugs, with enough exposed data for a hacker to even choose the make and model of the car they wanted to steal.
In Follett's software, Demirkapi says he found bugs that would have given a hacker access to student data like grade point average, special education status, number of suspensions, and passwords.
But you never stop to believe there's an adversary outside the window interfering with the beam between the remote and TV," says Ryan, who left the NSA two years ago to start work on Trinity before recruiting Bossert six months ago.
A $700 Million Amazon Pledge, Credit Card Hackers, and More News. Amazon makes an expensive pledge to its workers, a hacker group hits 17,000 domains, and butt plugs are being used for scientific research. A card-skimming hacker group hit 17,000 domains and counting.
Credential dumping is so crucial to modern hacking operations, Serper says, that he finds in analyses of victim networks that it often precedes even the other basic moves hackers make after gaining access to a single computer, such as installing persistent malware that will survive if the user reboots the machine.
Motherboard reports week that in the golden age of Myspace, employees had access too and abused an administrative tool called Overlord.
It appears that hackers were able to compromise several high net worth accounts, whose bitcoin was kept in Binance’s so-called hot wallet—which unlike cold wallets are connected to the internet—and filch those funds in a single transaction.
Most notably, Symantec says the Chinese group's hacking had planted an NSA backdoor on the network of its victims using a zero-day vulnerability in Microsoft's Server Message Block or SMB software, also seemingly learned by studying the NSA's hacking tools.
Hacker Says He Can Remotely Kill Car Engines Via Compromised GPS Apps. According to security journalist Brian Krebs, the iLnkP2P software made by Shenzhen Yunni Technology is inside millions of different IoT devices, like doorbells, cameras, and baby monitors.
Shulmin says Kaspersky hasn't yet been able to connect TajMahal, named for a file the spyware uses to move stolen data off a victim's machine, to any known hacker groups with the usual methods of code-matching, shared infrastructure, or familiar techniques.
Facebook Exposed Data Again, but This Viral Cat Can Save Lives. Tech news you can use, in two minutes or less: Facebook exposed your personal data ... Researchers discovered that data from hundreds of millions of Facebook users was left unprotected once again, this time on Amazon's servers.
"Average consumers are at the risk of exposing their privacy to malicious third parties who sell location data and other private information." With the exception of the Piercer flaws, the vulnerabilities the researchers discovered would need to be fixed above the individual carrier level by the industry group GSMA, which oversees development of mobile data standards including 4G and 5G.
Analyzing more than 30,000 attempted breaches in 2018 the company says it detected across its customer base, Crowdstrike measured the time from hackers' initial moment of intrusion to when they began to expand their access, jumping to other machines or escalating their privileges within a victim network to gain more visibility and control.
Now, it seems, someone has cobbled together those breached databases and many more into a gargantuan, unprecedented collection of 2.2 billion unique usernames and associated passwords, and is freely distributing them on hacker forums and torrents, throwing out the private data of a significant fraction of humanity like last year's phone book.
Then they heard a hacker's voice on their Nest cameras saying, "I’m going to kidnap your baby, I’m in your baby’s room." For years, Internet of Things security woes have been epitomized by hackers accessing live feeds from video baby monitors.
There was one hacker, however, who lucked into a mother lode of 360 dev kits and whose eagerness to profit off his good fortune would help Pokora ascend to the top of the Xbox scene.Meet the cast of characters behind the Xbox Underground.Gifted Canadian hacker and the brains of the Xbox Underground.Programmer who made millions by tricking FIFA Soccer into minting virtual coins.Australian teenage hacker who turned reckless as the FBI closed in.Pokora's friend in Delaware, arrested in 2010 for trying to steal a game's source code.Abruptly vanished from the Xbox hacking scene, causing widespread paranoia.Owner of a hacked modem that he used to help the Xbox Underground steal software.III.
A self-described “huge” PewDiePie fan and university student says they exploited tens of thousands of internet-connected printers earlier this week to spit out a message telling people, in part, “PewDiePie is in trouble and he needs your help to defeat T-Series!” The incident was first reported by The Verge.
And while it highlights Sony, WannaCry, and the Bangladesh bank theft, it makes clear that the hacker’s activity extended far beyond those blockbuster incidents—and that it continues today.“The scope and damage of the computer intrusions perpetrated and caused by the subjects of this investigation, including Park, is virtually unparalleled,” reads the complaint.While the complaint singles out Park, prosecutors were also very clear that he did not act alone–an unsurprising fact given the magnitude of the operations.