Tag Archives: hackers

Wifi Vulnerability Can Put You In Danger | CoolBusinessIdeas.com

Computer scientists at the University of California, Riverside, have discovered a security flaw that affects all Wi-Fi routers. Hackers could exploit the weakness in the transmission control protocol (TCP) and perform a web cache poisoning attack to steal passwords, login information, and other private data. Unfortunately, a fix isn’t possible, as the vulnerability stems from a 20-year-old design based on TCP and Wi-Fi. To prevent hackers from using the exploit, researchers recommend that manufacturers build routers that operate on different frequencies for transmitting and receiving data.

Fortunately, this attack technique won’t work with encrypted sites that use HTTPS and HSTS. Users on Ethernet connections are similarly not affected. Given that the attack won’t work on encrypted sites, most users who browse the internet on a modern browser shouldn’t be affected. Many browsers, including Google’s Chrome, already warn users if they visit an unencrypted site.

Read More

Hackers are hiding malware in subtitle files | TechCrunch

An impressive new exploit gives hackers the ability to control your desktop through malware spread by fake movie subtitles. The exploit, which essentially dumps the malware onto your desktop and then notifies the attacker, affects users of video players like Popcorn Time and VLC.

Checkpoint found that malformed subtitle files can give hackers the ability to embed code into subtitle files popular with pirated movies and TV. Because these subtitles are usually trusted by video players and users alike they were an oft-overlooked vector for hack attacks.

Read More

I was Trying to Spy and Hackers Stopped Me | CNN Money

151205180346-national-security-thumbnail-780x439Chris Inglis has worked in intelligence most of his adult life. He’s tall, imposing and speaks with precision.

Debates about encryption technology — like the ones that cropped up after last month’s terror attacks in Paris — are nothing new to him. Reports that ISIS is using apps with encryption tech to hide their conversations don’t surprise him. He was the deputy director of the NSA and saw dozens of times when encryption was an obstacle in pursuing a target.

He couldn’t get into specifics but explained broadly: The agency might identify an adversary through financial transactions, or by following the chain of possession for weapons. But if the target was using some form of encrypted messaging, the NSA would lose the last piece of the puzzle.

“The worst case scenario is that we fail to see a plot that essentially is on the fly … and that we only see it when it’s in execution,” Inglis said. “At that moment in time, you’re reacting to a disaster in the making as opposed to staving one off. That’s the threat, that’s the challenge.”

Read More

Hackers Remotely Kill a Jeep on the Highway—With Me in It | WIRED

At that point, the interstate began to slope upward, so the Jeep lost more momentum and barely crept forward. Cars lined up behind my bumper before passing me, honking. I could see an 18-wheeler approaching in my rearview mirror. I hoped its driver saw me, too, and could tell I was paralyzed on the highway.

“You’re doomed!” Valasek shouted, but I couldn’t make out his heckling over the blast of the radio, now pumping Kanye West. The semi loomed in the mirror, bearing down on my immobilized Jeep.

Read More.

A Google Site Meant to Protect You Is Helping Hackers Attack You | WIRED

GoogleBefore companies like Microsoft and Apple release new software, the code is reviewed and tested to ensure it works as planned and to find any bugs.

Hackers and cybercrooks do the same. The last thing you want if you’re a cyberthug is for your banking Trojan to crash a victim’s system and be exposed. More importantly, you don’t want your victim’s antivirus engine to detect the malicious tool.

So how do you maintain your stealth? You submit your code to Google’s VirusTotal site and let it do the testing for you.

It’s long been suspected that hackers and nation-state spies are using Google’s antivirus site to test their tools before unleashing them on victims. Now Brandon Dixon, an independent security researcher, has caught them in the act, tracking several high-profile hacking groups—including, surprisingly, two well-known nation-state teams—as they used VirusTotal to hone their code and develop their tradecraft.

Read More.

AT&T’s Hackathons Help Foster Digital Innovation | Adweek

The word hacker may have a negative connotation, but AT&T wants to show the world how it can lead to positive innovation.

“That’s the old connotation,” said Carlton Hill, VP of device operations and developer services for AT&T. “To hack on something doesn’t mean that. It’s to break it open, its to play with it and get a ton out of it.”

For the last three years, the telecommunications company has calling on developers, marketers, designers and innovators to work together to create tech solutions for common problems. The participants usually have 24 hours to come up with an idea and prototype for each project, and a winner is awarded at each event. Most of the stops are themed around an issue, including the upcoming Houston, Texas event on Friday which will focus on apps to help the disabled

Read More.

‘Anonymous’ Allegedly Demands Resignation Of Fed Chair Bernanke

In the video, uploaded on Saturday, the anonymous group, self-described as loosely connected and Internet based, allegedly claims that the Federal Reserve is guilty of “crimes against humanity” and calls for the resignation of Ben Bernanke. In addition, the group would seem to demand the break up of the Federal Reserve and other major banking institutions

Read Article.

Bitcoin miners busted? Police confuse bitcoin power usage for pot farm – Computerworld Blogs

Bitcoin, one of the world’s newest currencies, is an open source, peer-to-peer currency that does not exist in physical form. It’s owned and traded by means of an anonymous P2P network, without any third-party intermediary like a payment processor, without any government issuing or tracking the virtual currency. While there is a limit of only 21 million bitcoins to be generated by the year 2140, bitcoin is “free” to generate and is created by “bitcoin miners.”

The implication is that a completely untraceable underground economy will emerge using bitcoin.

Read Article and This Article.

Hackers siphon $644,000 from EoD | usfst.com

…hackers managed to embezzle well over half a million dollars from the New York Department of Education bank account…

Read Article.

The State of the Internet | Fast Company

For example, there are about 740 million Internet users in Asia alone; Facebook serves 6 million page views per minute, requiring 30,000 servers; and there are 148,000 new zombie computers created each day by hackers using botnets:

Read Article.