Last week, Yahoo! announced that it was hacked pretty massively in 2014. Over half a billion usernames and passwords were affected, making this the largest data breach of all time. Yahoo! claimed it was a government that did it: A recent investigation by Yahoo! Inc. has confirmed that a copy of certain user account information … Read More “The Hacking of Yahoo” »
Category: hacking
Auto Added by WPeMatico
It took 24 hours. Slashdot thread. Powered by WPeMatico
Impressive remote hack of the Tesla Model S. Details. Video. The vulnerability has been fixed. Remember, a modern car isn’t an automobile with a computer in it. It’s a computer with four wheels and an engine. Actually, it’s a distributed 20-400-computer system with four wheels and an engine. Powered by WPeMatico
Interesting: Roughly three weeks later, there is a operation program available to crack ACBL hand records. Given three consecutive boards, all the remaining boards for that session can be determined. The program can be easily parallelized. This analysis can be finished while sessions are still running this would permit the following type of attack: A … Read More “Hacking Bridge-Hand Generation Software” »
In the past few years, the devastating effects of hackers breaking into an organization’s network, stealing confidential data, and publishing everything have been made clear. It happened to the Democratic National Committee, to Sony, to the National Security Agency, to the cyber-arms weapons manufacturer Hacking Team, to the online adultery site Ashley Madison, and to … Read More “Organizational Doxing and Disinformation” »
Brian Krebs reports that the Israeli DDOS service vDOS has earned $600K in the past two years. The information was obtained from a hack and data dump of the company’s information. Powered by WPeMatico
Andrew Appel has a good two–part essay on securing elections. And three organizations — Verified Voting, EPIC, and Common Cause — have published a report on the risks of Internet voting. The report is primarily concerned with privacy, and the threats to a secret ballot. Powered by WPeMatico
The NSA was badly hacked in 2013, and we’re just now learning about it. A group of hackers called “The Shadow Brokers” claim to have hacked the NSA, and are posting data to prove it. The data is source code from “The Equation Group,” which is a sophisticated piece of malware exposed last year and … Read More “Major NSA/Equation Group Leak” »
Some minimal information about the NSA’s abilities to hack networks via submarine. Powered by WPeMatico
Nice attack against electronic safes: Plore used side-channel attacks to pull it off. These are ways of exploiting physical indicators from a cryptographic system to get around its protections. Here, all Plore had to do was monitor power consumption in the case of one safe, and the amount of time operations took in other, and … Read More “Hacking Electronic Safes” »