Gentlemachines
Follow
Find tag "hacking"
2.7K views | +4 today
Gentlemachines
What's new at the crossroads of culture, technology and science
Curated by Artur Alves
Your new post is loading...
Your new post is loading...
Scooped by Artur Alves
Scoop.it!

Despite Wave of Data Breaches, Official Says Patient Privacy Isn’t Dead

Despite Wave of Data Breaches, Official Says Patient Privacy Isn’t Dead | Gentlemachines | Scoop.it
Yet another health insurer reported a massive data breach this week, affecting the financial and medical information of 11 million people. We asked the head of the federal agency tasked with investigating these issues whether the notion of patient privacy was outmoded.
more...
No comment yet.
Scooped by Artur Alves
Scoop.it!

New Targets for Hackers: Your Car and Your House

New Targets for Hackers: Your Car and Your House | Gentlemachines | Scoop.it
Hackers and security researchers are exploring vulnerabilities to break through the high-tech security of homes or cause car accidents.
more...
No comment yet.
Scooped by Artur Alves
Scoop.it!

South Korea on alert for cyber-attacks after major network goes down

South Korea on alert for cyber-attacks after major network goes down | Gentlemachines | Scoop.it
Computer systems of banks and broadcasters are interrupted, with fingers immediately pointed at North Korea
Artur Alves's insight:

"The computer networks of three broadcasters - KBS, MBC and YTN - and two banks, Shinhan and Nonghyup, froze at around 2pm local time. Shinhan said its ATMs, payment terminals and mobile banking in the South were affected. TV broadcasts were not affected."

more...
No comment yet.
Scooped by Artur Alves
Scoop.it!

Federal Reserve hacked

Federal Reserve hacked | Gentlemachines | Scoop.it
US central bank confirms intrusion after hacktivist group Anonymous was claimed to have stolen 4,000 bankers' details
more...
No comment yet.
Scooped by Artur Alves
Scoop.it!

Hackers launch assault on Israeli government websites

Hackers launch assault on Israeli government websites | Gentlemachines | Scoop.it

"Israeli officials count 44 million attacks on government sites since bombardment of Gaza began – but only one succeeds...

Cyber-attacks launched following the start of the Israeli offensive knocked some sites offline for a short period of time at the end of last week and resulted in others being defaced with pro-Palestinian messages.

Anonymous said on Saturday that it had taken down or erased the databases of nearly 700 Israeli private and public websites, including that of the Bank of Jerusalem finance house."

more...
No comment yet.
Scooped by Artur Alves
Scoop.it!

US National Security Agency boss asks hackers to make internet more secure

US National Security Agency boss asks hackers to make internet more secure | Gentlemachines | Scoop.it
General Keith Alexander stresses common ground between US officials and hackers at Def Con gathering in Las Vegas...
more...
No comment yet.
Scooped by Artur Alves
Scoop.it!

Q&A: Hacker Historian George Dyson Sits Down With Wired’s Kevin Kelly

Q&A: Hacker Historian George Dyson Sits Down With Wired’s Kevin Kelly | Gentlemachines | Scoop.it
The two most powerful technologies of the 20th century—the nuclear bomb and the computer—were invented at the same time and by the same group of young people. But while the history of the Manhattan Project has been well told, the origin of the computer is relatively unknown. In his new book, Turing’s Cathedral, historian George Dyson, who grew up among these proto- hackers in Princeton, New Jersey, tells the story of how Alan Turing, John von Neumann, and a small band of other geniuses not only built the computer but foresaw the world it would create. Dyson talked to wired about the big bang of the digital universe.
more...
No comment yet.
Scooped by Artur Alves
Scoop.it!

Hackers Lurking in Vents and Soda Machines

Hackers Lurking in Vents and Soda Machines | Gentlemachines | Scoop.it
Companies are finding that their greatest cybersecurity threats can hide in third-party systems, like networked air-conditioning equipment.
Artur Alves's insight:

"Companies have always needed to be diligent in keeping ahead of hackers — email and leaky employee devices are an old problem — but the situation has grown increasingly complex and urgent as countless third parties are granted remote access to corporate systems. This access comes through software controlling all kinds of services a company needs: heating, ventilation and air-conditioning; billing, expense and human-resources management systems; graphics and data analytics functions; health insurance providers; and even vending machines."

more...
No comment yet.
Scooped by Artur Alves
Scoop.it!

How Hackers Steal Trade Secrets By Targeting Smaller Companies

How Hackers Steal Trade Secrets By Targeting Smaller Companies | Gentlemachines | Scoop.it
Verizon's annual data breach investigation finds that Chinese hackers are going after small organizations in order to steal the trade secrets of their larger partners.
Artur Alves's insight:

"Discovering data breaches was not easy for most organizations. Verizon found that the time from compromise to discovery took months, and sometimes years.

Verizon worked with 18 organizations worldwide in gathering data for the report. The groups included national computer emergency response teams and law enforcement agencies."

 

Interestingly, some easy steps can drastically improve information security, so it is up to the companies to reinforce info security literacy in order to avoid social engineering and brute force attacks.

 

"No one found any cutting-edge methods used by attackers to break into networks, so organizations can go a long ways toward protecting themselves by focusing on the basics, such as stronger passwords and educating employees about bogus email."

more...
No comment yet.
Scooped by Artur Alves
Scoop.it!

Rebooting Computer Crime Law Part 1: No Prison Time For Violating Terms of Service

Rebooting Computer Crime Law Part 1: No Prison Time For Violating Terms of Service | Gentlemachines | Scoop.it
Artur Alves's insight:

"Here is the CFAA's greatest flaw: the law makes it illegal to access a computer without authorization or in a way that exceeds authorization, but doesn't clearly explain what that means. This murkiness gives the government tons of leeway to be creative in bringing charges. "

more...
No comment yet.
Scooped by Artur Alves
Scoop.it!

What the New York Times hack tells us about the layer cake of hacking

The infiltration of the American newspaper by hackers reckoned to be working for the Chinese government is a demonstration of the layered model of hacking: from noisy to silent, amateur to professional.
Artur Alves's insight:

For months, the Grey Lady was the target of a very sophisticated attack. The hacking underworld is locked in a very serious conflict, not to be confined to Anonymous.

"For the government hackers, anonymity - the real sort, rather than the mask-wearing, visible Anonymous sort - is an essential currency. They have to remain invisible both in their daily life, and their online life."

more...
No comment yet.
Scooped by Artur Alves
Scoop.it!

Cosmo, the Hacker 'God' Who Fell to Earth | Gadget Lab | Wired.com

Cosmo, the Hacker 'God' Who Fell to Earth | Gadget Lab | Wired.com | Gentlemachines | Scoop.it

"With his group, UGNazi (short for “underground nazi” and pronounced “you-gee” not “uhg”), Cosmo took part in some of the most notorious hacks of the year. Throughout the winter and spring, they DDoS’ed all manner of government and financial sites, including NASDAQ, ca.gov, and CIA.gov, which they took down for a matter of hours in April. They bypassed Google two step, hijacked 4chan’s DNS and redirected it to their own Twitter feed, and repeatedly posted Mayor Michael Bloomberg’s address and Social Security number online. After breaking into one billing agency using social-engineering techniques this past May, they proceeded to dump some 500,000 credit card numbers online. Cosmo was the social engineer for the crew, a specialist in talking his way past security barriers. His arsenal of tricks held clever-yet-idiot-proof ways of getting into accounts on Amazon, Apple, AOL, PayPal, Best Buy, Buy.com, Live.com (think: Hotmail, Outlook, Xbox) and more. He can hijack phone numbers from AT&T, Sprint, T-Mobile and your local telco."

more...
No comment yet.
Scooped by Artur Alves
Scoop.it!

George Hotz, Sony, and the Anonymous Hacker Wars

George Hotz, Sony, and the Anonymous Hacker Wars | Gentlemachines | Scoop.it
Martyrs win devotees, and soon Hotz had gained the allegiance of the most notorious hackers: a group called Anonymous...
more...
No comment yet.