Not even your precious memories are safe from hackers.
That much was made clear at the annual DEF CON hacking conference in Las Vegas, where a security researcher demonstrated just how easy it is to remotely encrypt a digital camera with ransomware. And once that happens, you can say goodbye to all your photos — unless you pay up.
The specific camera in question was a Canon EOS 80D, but, as Eyal Itkin explained to the early Sunday morning crowd of seemingly hungover hackers, it’s likely not the only model vulnerable.
“If you can do something to cameras, you have many potential victims you can affect,” he observed. “Would you pay to get your camera back?”
OVER THE PAST few years, scammers have increasingly siphoned cash off of digital payment networks, stealing hundreds of millions of dollars so far. Not only is the problem hard to contain; new findings show that it’s evolving and maturing, with new types of ATM malware on the rise.
Researchers at the Kaspersky Security Analyst Summit in Singapore are presenting findings on Wednesday about a new wave of payment system scams. Beyond so-called jackpotting attacks, which cause individual ATMs to spit out money, hackers are manipulating ATM networks and the digital authentication checks in the machines to cash out fraudulent transfers they initiate around the globe.
Computer scientists at the University of California, Riverside, have discovered a security flaw that affects all Wi-Fi routers. Hackers could exploit the weakness in the transmission control protocol (TCP) and perform a web cache poisoning attack to steal passwords, login information, and other private data. Unfortunately, a fix isn’t possible, as the vulnerability stems from a 20-year-old design based on TCP and Wi-Fi. To prevent hackers from using the exploit, researchers recommend that manufacturers build routers that operate on different frequencies for transmitting and receiving data.
Fortunately, this attack technique won’t work with encrypted sites that use HTTPS and HSTS. Users on Ethernet connections are similarly not affected. Given that the attack won’t work on encrypted sites, most users who browse the internet on a modern browser shouldn’t be affected. Many browsers, including Google’s Chrome, already warn users if they visit an unencrypted site.
An impressive new exploit gives hackers the ability to control your desktop through malware spread by fake movie subtitles. The exploit, which essentially dumps the malware onto your desktop and then notifies the attacker, affects users of video players like Popcorn Time and VLC.
Checkpoint found that malformed subtitle files can give hackers the ability to embed code into subtitle files popular with pirated movies and TV. Because these subtitles are usually trusted by video players and users alike they were an oft-overlooked vector for hack attacks.
At that point, the interstate began to slope upward, so the Jeep lost more momentum and barely crept forward. Cars lined up behind my bumper before passing me, honking. I could see an 18-wheeler approaching in my rearview mirror. I hoped its driver saw me, too, and could tell I was paralyzed on the highway.
“You’re doomed!” Valasek shouted, but I couldn’t make out his heckling over the blast of the radio, now pumping Kanye West. The semi loomed in the mirror, bearing down on my immobilized Jeep.
Before companies like Microsoft and Apple release new software, the code is reviewed and tested to ensure it works as planned and to find any bugs.
Hackers and cybercrooks do the same. The last thing you want if you’re a cyberthug is for your banking Trojan to crash a victim’s system and be exposed. More importantly, you don’t want your victim’s antivirus engine to detect the malicious tool.
So how do you maintain your stealth? You submit your code to Google’s VirusTotal site and let it do the testing for you.
It’s long been suspected that hackers and nation-state spies are using Google’s antivirus site to test their tools before unleashing them on victims. Now Brandon Dixon, an independent security researcher, has caught them in the act, tracking several high-profile hacking groups—including, surprisingly, two well-known nation-state teams—as they used VirusTotal to hone their code and develop their tradecraft.
The word hacker may have a negative connotation, but AT&T wants to show the world how it can lead to positive innovation.
“That’s the old connotation,” said Carlton Hill, VP of device operations and developer services for AT&T. “To hack on something doesn’t mean that. It’s to break it open, its to play with it and get a ton out of it.”
For the last three years, the telecommunications company has calling on developers, marketers, designers and innovators to work together to create tech solutions for common problems. The participants usually have 24 hours to come up with an idea and prototype for each project, and a winner is awarded at each event. Most of the stops are themed around an issue, including the upcoming Houston, Texas event on Friday which will focus on apps to help the disabled
In the video, uploaded on Saturday, the anonymous group, self-described as loosely connected and Internet based, allegedly claims that the Federal Reserve is guilty of “crimes against humanity” and calls for the resignation of Ben Bernanke. In addition, the group would seem to demand the break up of the Federal Reserve and other major banking institutions
Posted in News and Views
Tagged a new kind of war, annonymous, bailout, banks, business, central banks, credit cards, Depression, economic crisis, economy, ethics, financial crisis, financial institutions, fiscal policy, funding, hackers, meltdown, people hate banks, Recession, technology, The Federal Reserve
Bitcoin, one of the world’s newest currencies, is an open source, peer-to-peer currency that does not exist in physical form. It’s owned and traded by means of an anonymous P2P network, without any third-party intermediary like a payment processor, without any government issuing or tracking the virtual currency. While there is a limit of only 21 million bitcoins to be generated by the year 2140, bitcoin is “free” to generate and is created by “bitcoin miners.”
The implication is that a completely untraceable underground economy will emerge using bitcoin.
Read Article and This Article.
Posted in News and Views
Tagged anonymous, barter, bitcoin, black market, chaos, currency, drug trade, drugs, economy, exchange, financial system, goverments, grey market, hackers, money, new world order, programmers, trade, underground economy