30 Jul 2015

Self-aiming weapons open new attacks for hackers

“Self-aiming rifles, powered by an array of sensors and computer technology, can greatly improve accuracy — but that advance comes with a security cost. Runa Sandvik and Michael Auger have spent a year develop techniques to hack the TrackingPoint self-aiming rifles, gaining entry via the weapon’s Wi-Fi connection and then

Read More
30 Jul 2015

Chechen Girls Troll ISIS With Fake Bride Scam

“These three young women from the Caucasus pulled a fast one on jihadis fishing for mail-order brides. ISIS bride, meet Russian mail-order bride, meet classic Internet scam. A group of young Chechen women crafted a brilliant online money-making scheme, all in the name of ripping off ISIS recruiters—whom they essentially

Read More
29 Jul 2015

Pentagon takes computer system offline

“The unclassified email network used by Gen. Martin Dempsey, chairman of the Joint Chiefs of Staff, and hundreds of military and civilian personnel was taken offline over the weekend after suspicious activity was detected, the Pentagon confirmed to CNN on Tuesday.” Source: Pentagon takes computer system offline – CNNPolitics.com

Read More
27 Jul 2015

Anonymous Exposes Internal Census Data to Protest Controversial Trade Deals

“The Census Bureau, part of the Commerce Department, recently bore the brunt of grievances about the proposed Trans-Pacific Partnership and Transatlantic Trade and Investment Partnership. The hacktivist group Anonymous claims to have leaked sensitive data found inside the U.S. population-tracking bureau’s systems, according to an International Business Times report. Census

Read More
25 Jul 2015

Fiat Chrysler recalls 1.4 million cars after Jeep hack

“Fiat Chrysler has issued a safety recall affecting 1.4m vehicles in the US, after security researchers showed that one of its cars could be hacked. On Tuesday, tech magazine Wired reported that hackers had taken control of a Jeep Cherokee via its internet-connected entertainment system. Chrysler said it was issuing

Read More
24 Jul 2015

U.S. Treasury’s intelligence network vulnerable to hack – audit

“Lax security left the U.S. Treasury’s computer system for tracking overseas threats to America’s financial system vulnerable to hackers, according to a government audit prepared in late 2014 and obtained by Reuters. The Treasury Foreign Intelligence Network is used by U.S. spy agencies to share top-secret information and to keep

Read More
24 Jul 2015

3 Estonian Men Get Prison Sentences in Massive Cyber Scam Case

“Three Estonian men were sentenced to over three years in prison Thursday for their roles in an Internet scheme that infected more than 4 million computers in over 100 countries. U.S. District Judge Lewis A. Kaplan imposed the sentences in Manhattan federal court, bemoaning the steady influx of computer crime

Read More
24 Jul 2015

Nigerian scammers buy exploit kits to defraud Asian businesses

“A small group of Nigerian scammers is using more sophisticated methods to defraud mostly Asian businesses, including buying exploit kits and malware from experienced coders, according to a new report from FireEye.” Source: Nigerian scammers buy exploit kits to defraud Asian businesses | CSO Online

Read More
24 Jul 2015

US Census Bureau IT systems hacked, data leaked by Anonymous

“Anonymous hackers have swiped databases from servers used by the US Census Bureau, and dumped their contents online. The bureau, as you might imagine, collects information on the American population every 10 years – although the leaked data does not include citizens’ census records.” Source: US Census Bureau IT systems

Read More
24 Jul 2015

Here’s What Your Stolen Identity Goes for on the Internet’s Black Market

“The going rate for a stolen identity is about twenty bucks. Tens of millions of people have lost their private information in data breaches over the past few years. But what happens after that—how the data are leveraged for financial gain—remains murky. Many of those stolen records end up for

Read More