May 2015

31 May, 2015

Users of free VPN Hola vulnerable to hacking, researchers warn – Network World


Network World
Users of free VPN Hola vulnerable to hacking, researchers warn
Network World
Free P2P VPN Hola sold users' bandwidth which was then used for botnets; researchers say to uninstall Hola now as it makes users vulnerable to hacking. Network World | May 31, 2015 10:15 AM PT. RELATED TOPICS. Microsoft Subnet · Security. The Hola …

and more »

Source: hacking – Google News

Filed under Blog by

Sudanese newspaper to sue security service over alleged hacking – Radio Tamazuj

Sudanese newspaper to sue security service over alleged hacking
Radio Tamazuj
The management of the Sudanese Communist Party newspaper al-Maidan said they intend to file a lawsuit against a hostile body that hacked its email and printed old print-runs before distributing them without permission from the newspaper's management.

Source: hacking – Google News

Filed under Blog by

Proposal To Massively Expand FBI’s Legal Hacking Abilities Moves Forward – Gizmodo Australia


Gizmodo Australia
Proposal To Massively Expand FBI's Legal Hacking Abilities Moves Forward
Gizmodo Australia
A US Department of Justice-proposed rule change that would make it way easier for FBI agents to obtain warrants to hack a computer from basically anywhere was just approved by a US Court committee. Which is to say, we're one step closer to having our …
​FBI gets closer to expanded hacking powersRT

all 5 news articles »

Source: hacking – Google News

Filed under Blog by

​FBI gets closer to expanded hacking powers – RT


RT
​FBI gets closer to expanded hacking powers
RT
The Department of Justice has confirmed that a US court committee approved proposed rules that would allow judges to grant warrants to search computers “remotely” in multiple jurisdictions, even when investigators do not know exactly where a device is.
Proposal to Massively Expand FBI's Legal Hacking Abilities Moves ForwardGizmodo

all 4 news articles »

Source: hacking – Google News

Filed under Blog by

30 May, 2015

IKEA Plans to Start Hacking Its Own Furniture – House Beautiful (blog)

IKEA Plans to Start Hacking Its Own Furniture
House Beautiful (blog)
The hacking started as a fringe trend that eventually worked its way up be to Pinterest-famous, but recently the concept reached a whole new level of mainstream: IKEA is planning to introduce official kits that encourage you to turn their furniture

Source: hacking – Google News

Filed under Blog by

Proposal to Massively Expand FBI’s Legal Hacking Abilities Moves Forward – Gizmodo


Gizmodo
Proposal to Massively Expand FBI's Legal Hacking Abilities Moves Forward
Gizmodo
Oh, good. A Department of Justice-proposed rule change that would make it way easier for FBI agents to obtain warrants to hack a computer from basically anywhere was just approved by a US Court committee. Which is to say, we're one step closer to

and more »

Source: hacking – Google News

Filed under Blog by

Hacking The Nervous System – Huffington Post


Huffington Post
Hacking The Nervous System
Huffington Post
One nerve connects your vital organs, sensing and shaping your health. If we learn to control it, the future of medicine will be electric. When Maria Vrind, a former gymnast from Volendam in the Netherlands, found that the only way she could put her

Source: hacking – Google News

Filed under Blog by

29 May, 2015

Proposed rule change to expand feds’ legal hacking powers moves forward – Ars Technica (blog)


Ars Technica (blog)
Proposed rule change to expand feds' legal hacking powers moves forward
Ars Technica (blog)
A controversial proposed judicial rule change allowing judges to issue warrants to conduct “remote access” against a target computer regardless of its location has been approved by a United States Courts committee, according to the Department of Justice.

Source: hacking – Google News

Filed under Blog by

Spreading the word about cybersecurity – Sophos featured on NBC’s “The … – Naked Security (blog)

Spreading the word about cybersecurity – Sophos featured on NBC's “The
Naked Security (blog)
james-lyne-today-show-150 In case you missed it, NBC aired a series called “The Hacking of America” that highlights some of the big cybersecurity risks we encounter every day – credit card fraud, unsecured Wi-Fi, and the growing threat of malicious …

Source: hacking – Google News

Filed under Blog by

Google Is Hacking Our Clothes to Work Like Touchscreens – Wired


Wired
Google Is Hacking Our Clothes to Work Like Touchscreens
Wired
If you want to understand a key piece of Google's vision for the future of the fashion, furniture, and automotive industries, look no further than Lady Gaga. Specifically, at a dress she wore to a 2013 iTunes Festival in London. Her ensemble, made by
Google's Project Vault secures your devices with a microSD cardEngadget
Google Project Vault bakes super-security into microSDSlashGear

all 64 news articles »

Source: hacking – Google News

Filed under Blog by

Ancient DNS Vulnerability Leaves Thousands Of Educational Institutes Ripe For … – iDigitalTimes.com


iDigitalTimes.com
Ancient DNS Vulnerability Leaves Thousands Of Educational Institutes Ripe For
iDigitalTimes.com
An ancient vulnerability in DNS servers leaves thousands of educational institutions vulnerable to hacking, say security researchers. In a briefing at HITB Haxpo in Amsterdam Wednesday, researchers Paul Mason, Kyle Fleming and Andy Gill, Penetration …

Source: hacking – Google News

Filed under Blog by

New Documents Show Canada Fired Back Diplomatically at China Over Hacking – VICE News


VICE News
New Documents Show Canada Fired Back Diplomatically at China Over Hacking
VICE News
New documents obtained by VICE News under the Access to Information Act show Canada took a harsh diplomatic stance against brazen state-sponsored Chinese hackers stealing valuable intel from the country's top scientific research body. Last summer …

Source: hacking – Google News

Filed under Blog by

Eddie Van Halen Relives His Early Adventures in Guitar Hacking – Ultimate Classic Rock


Ultimate Classic Rock
Eddie Van Halen Relives His Early Adventures in Guitar Hacking
Ultimate Classic Rock
As Eddie Van Halen told listeners during his Smithsonian Institution talk earlier this year, he started experimenting on his guitars as a kid because he couldn't afford expensive gear. In a new interview with Popular Mechanics, he offers a more in

Source: hacking – Google News

Filed under Blog by

Hacking for a Healthier California – Huffington Post


Huffington Post
Hacking for a Healthier California
Huffington Post
This is why we are so excited that Saturday, June 6 is the National Day of Civic Hacking (#NDoCH). Technologists, government officials, developers, designers, community organizers and thousands of other passionate citizens all across the country will

and more »

Source: hacking – Google News

Filed under Blog by

Car-hacking threats get Congressional scrutiny – Autoblog (blog)


Autoblog (blog)
Car-hacking threats get Congressional scrutiny
Autoblog (blog)
Car-hacking threats get Congressional scrutiny. NHTSA And OEMs Have Two Weeks To Provide Answers. Pete Bigelow. Congress wants to know more about how federal regulators and major car manufacturers plan to protect drivers from automotive cyber …

and more »

Source: hacking – Google News

Filed under Blog by

Email hacking: another home-seller robbed of £270000 – Telegraph.co.uk


Telegraph.co.uk
Email hacking: another home-seller robbed of £270000
Telegraph.co.uk
Home buyers and sellers are at risk of losing hundreds of thousands of pounds because fraudsters are aggressively targeting those involved in housing transactions. Sophisticated criminals are intercepting emails between buyers, sellers and their

Source: hacking – Google News

Filed under Blog by

IRS Indifferent to Hacking Incident – FrontPage Magazine


FrontPage Magazine
IRS Indifferent to Hacking Incident
FrontPage Magazine
John_Koskinen Apparently the arrogance of IRS Commissioner John Koskinen knows no bounds. Facing questions about the ease by which hackers accessed the tax returns of more than 100,000 Americans from February to mid-May, he remained …
Nets Notice IRS Hacking; Punt on Holding Obama Admin. AccountableNewsBusters (blog)
Senate To Hold Hearing On IRS Hacking Affecting 200000Daily Caller
IRS believes massive data theft originated in RussiaCNN

all 140 news articles »

Source: hacking – Google News

Filed under Blog by

Rent-a-hacker site leaks Australian buyers’ names and addresses – The Age


The Age
Rent-a-hacker site leaks Australian buyers' names and addresses
The Age
If you've used the hacker-for-hire site Hacker's List to contract out a hack job then your name, address and the reasons why you sought a hacker are now available on the web, potentially exposing you to legal action. Hacker's List launched last
Hacker's List Founder Charles Tendell Talks Importance Of Hacking & Diversity Madame Noire

all 3 news articles »

Source: hacking – Google News

Filed under Blog by

Is There Finally a Growth Hacking Tool for Photographers? – Fstoppers


Fstoppers
Is There Finally a Growth Hacking Tool for Photographers?
Fstoppers
Last month, the creators of MotoCMS, an award winning DIY website building program, ran a Kickstarter campaign for Defrozo, a free display and marketing melding of Smugmug, ShootQ and Zenfolio. What could be more fun than putting up some photos and …

Source: hacking – Google News

Filed under Blog by

28 May, 2015

North Korean hackers ‘could kill’ – BBC News


BBC News
North Korean hackers 'could kill'
BBC News
North Korean hackers are capable of attacks that could destroy critical infrastructure and even kill people, a high-profile defector has warned. Speaking exclusively to BBC Click, Prof Kim Heung-Kwang said the country had around 6,000 trained military …
North Korean hackers 'could destroy cities'Wired.co.uk
North Korea could kill thousands and WIPE OUT CITIES with devastating cyber Daily Star
North Korean Hackers 'Could Kill,' Former North Korean Professor Calls For Headlines & Global News
International Business Times -IT PRO
all 237 news articles »

Source: hacking – Google News

Filed under Blog by

Ctrip.com (CTRP) Closes Lower On Hacking Reports – TheStreet.com


TheStreet.com
Ctrip.com (CTRP) Closes Lower On Hacking Reports
TheStreet.com
Ctrip.com said that the hacking by "unidentified sources" occurred shortly after 11 a.m. local time, causing disruptions to its website and mobile app services. China's government has to deal with hacking on a frequent basis, and its citizens are among

Source: hacking – Google News

Filed under Blog by

Nets Notice IRS Hacking; Punt on Holding Obama Admin. Accountable – NewsBusters (blog)


NewsBusters (blog)
Nets Notice IRS Hacking; Punt on Holding Obama Admin. Accountable
NewsBusters (blog)
The Big Three's morning newscasts on Wednesday and Thursday all covered the breach of an online IRS system by hackers that compromised the personal information of 100,000 taxpayers. However, none of the programs mentioned President Obama by …

Source: hacking – Google News

Filed under Blog by

Here’s what everyone needs to do after the IRS hacking case – cleveland.com


cleveland.com
Here's what everyone needs to do after the IRS hacking case
cleveland.com
Now that thieves have managed to get information about our taxes, income, employers and families from the Internal Revenue Service, it's time to ratchet up our personal vigilance yet again. The IRS this week said hackers managed this spring to access

and more »

Source: hacking – Google News

Filed under Blog by

Hacking With Pictures; New Stegosploit Tool Hides Malware Inside Internet … – iDigitalTimes.com


iDigitalTimes.com
Hacking With Pictures; New Stegosploit Tool Hides Malware Inside Internet
iDigitalTimes.com
In a presentation at Hack In The Box in Amsterdam, Net Square security researcher Saumil Shah demonstrated an updated method of his digital steganography project, Stegosploit, which involves embedding executable JavaScript code within an image to …

Source: hacking – Google News

Filed under Blog by

Like routers, most USB modems also vulnerable to drive-by hacking – Computerworld


Computerworld
Like routers, most USB modems also vulnerable to drive-by hacking
Computerworld
The goal of the attack was to change the primary DNS servers used by the routers, allowing hackers to spoof legitimate websites or intercept traffic. Since USB modems act in a way that's similar to routers, providing an Internet gateway for computers

and more »

Source: hacking – Google News

Filed under Blog by