tech and geek stuff
Criminals could use CIA and NSA hacking toolkits for further cyberattacks, experts warn
In March, Wikileaks released 8,761 documents and files outlining the Central Intelligence Agency's (CIA) hacking toolkit, that was aimed at exploiting flaws in Apple, Samsung and Microsoft. The continued...
NCA: Hacking ensnaring teenagers into crime
It aims to understand how teenagers become hackers and is based on interviews with eight young people cautioned or sentenced for hacking offences.The average age of cybercrime suspects was 17 years old...
Symantec Attributes 40 Cyber Attacks to CIA-linked Hacking Tools
Past cyber attacks on scores of organizations around the world were conducted with top-secret hacking tools that were exposed recently by the Web publisher Wikileaks, the security researcher Symantec Corp...
To fight Tor hack prosecutions, activist groups offer up legal help
EnlargeThe Washington Post / Getty Images News reader comments 9 Share this story Further ReadingAfter FBI briefly ran Tor-hidden child-porn site, investigations went globalThree legal advocacy organizations...
WikiLeaks: CIA Can Infect 'Factory Fresh' iPhones
The U.S. Central Intelligence Agency has technology capable of infecting “factory fresh” iPhones and has been bugging the devices since at least 2008, WikiLeaks claimed Thursday. In a statement released...
Yahoo trial would shine light on Russian hacking
US intelligence agencies lined up to accuse Russians of hacking into the Democratic National Committee, but withheld detailed evidence.Fair enough, given it could give away intelligence techniques and...
‘Beware of all things smart,’ privacy guru warns in wake of Wikleaks disclosure
Powerful surveillance tools once held deep inside the CIA are designed to turn any connected device — smart TVs, phones, routers, and — increasingly — cars, into tools to spy on their owners, Wikileaks...
WikiLeaks CIA hacking claims: Here’s what you need to know
NEW YORK — So, you use messaging apps like WhatsApp or Signal or have smart TVs and PCs. Should you worry that the CIA is listening to your conversations? The short answer is no. The long answer...
Wikileaks publishes docs from what it says is trove of CIA hacking tools
Enlarge / The old headquarters building of the CIA in McLean, Virginia. A cache of files from CIA's Langley, Virginia, cyber-intelligence center has apparently been obtained by Wikileaks. reader comments...
Hackers get burned in deal with Russian spy agency
MOSCOW — For several years a group of hackers have been posting letters and documents stolen from senior Russian officials with impunity. And then the nation’s spy agency tracked them down and offered...
Former NSA contractor may have stolen 75% of TAO’s elite hacking tools
reader comments 13 Share this story On Monday, The Washington Post reported one of the most stunning breaches of security ever. A former NSA contractor, the paper said, stole more than 50 terabytes of...
Donald Trump blames Democrats for allowing hacking to happen
Donald Trump is blaming the victim of reported Russian cyberattacks – the Democratic National Committee – for allowing hackers into its computer systems.The president-elect is back on Twitter late Friday...
US is the world's 'cyber punching bag,' GOP Sen. Dan Sullivan says
The U.S. needs to stop hacking not only by Russia, but also by China and others, Sen. Dan Sullivan said Thursday ahead of the Senate Armed Services Committee hearing on cyberthreats. In an interview on...
U.S. set to announce response to Russian election hacking: sources
WASHINGTON (Reuters) - The Obama administration plans to announce on Thursday a series of retaliatory measures against Russia for hacking into U.S. political institutions and individuals and leaking information...
The Mr Robot of video games
It's almost time to help Marcus Holloway return power to the people. Watch Dogs 2 explores hacking and technology. IMAGINE you had access to every mobile phone, computer, CCTV camera, internet-enabled...
Lauri Love faces hacking trial in US after UK signs extradition order
EnlargeJustin Tallis/AFP/Getty Images reader comments 13 Share this story The UK's home secretary, Amber Rudd, has signed an extradition order agreeing that hacking suspect Lauri Love should face trial...
British parliament members urge Obama to halt hacking suspect’s US extradition
EnlargeThe Courage Foundation reader comments 13 Share this story Further ReadingLauri Love to be extradited to the US to face hacking charges, court rulesThis week, culture minister Matt Hancock and more...
U.S. lawmakers raise privacy concerns over new hacking rules
WASHINGTON (Reuters) - A bipartisan group of lawmakers in the U.S. Congress on Thursday asked the Justice Department to clarify how a looming rule change to the government's hacking powers could impact...
Kremlin Expanding Cyber Efforts in ‘Information War’
Russian officials have denied allegations of unprecedented hacking of American political and election organizations and condemned U.S. threats to retaliate. But Russian cybersecurity experts say state-sponsored...
US officially accuses Russia of hacking political sites
WASHINGTON – The U.S. is accusing Russia of hacking political sites, saying it is trying to interfere with the upcoming presidential election.READ MORE: CIA Director John Brennan warns of Russian hackingIntelligence...
Senator Warner seeks SEC probe of Yahoo disclosure on hacking
WASHINGTON (Reuters) - Democratic Senator Mark Warner on Monday asked the U.S. Securities and Exchange Commission to investigate whether Yahoo and its senior executives fulfilled obligations to inform...
Accused UK hacker to be extradited to the US to face charges
BBC reader comments 3 Share this story Briton Lauri Love will be extradited to the US to face charges of hacking, Westminster Magistrates' Court ruled on Friday. Love faces up to 99 years in prison in...
WADA leak shows how hacking is changing
The group says it broke into the World Anti-Doping Agency's database and made off with the records of Olympic athletes including Simone Biles and Serena Williams. The attack itself doesn't look too sophisticated...
Are Lost Devices or Hacking Top Financial Threat?
One look at breaches reported by financial firms finds that lost devices have been the most common reason for a breach, while another finds that hacking has become the leading threat in the past three...
Son of Russian lawmaker convicted of masterminding global online theft ring
SEATTLE -- A federal jury convicted the son of a Russian lawmaker Thursday of hacking into U.S. businesses to steal credit card information and orchestrating an international online theft scheme that netted...
Hacking tool leak came from “omnipotent” NSA-tied group
reader comments 1 Share this story The leak over the weekend of advanced hacking tools contains digital signatures that are almost identical to software used by the state-sponsored Equation Group, according...
Chilling reality of phone hacking
Smartphone hacking demo with Nadav from Check Point Software Technologies If you thought your smartphone was safe from attack, better think again. IMAGINE someone hacking your smartphone and having access...
Extradition ruling in Lauri Love hacking case set for September
BBC reader comments 0 Share this story Briton Lauri Love is expected to learn on September 16 whether a judge will rule in favour of his extradition to the US to face charges of alleged hacking, Westminster...
Expect Mr. Robot’s take on the FBI to be very real thanks to a former employee
Yes, it's an homage to a famous hacker (nice touch). USA Networks / NBC UniversalWarning: This piece contains minor spoilers for this week's episode of Mr. Robot (S2E1) Near the intermission of Mr. Robot's two-part...
Meet the Mr Robot writer who's fixing Hollywood's hacking problem
From computer hackers learning kung-fu in The Matrix to two detectives using a single computer keyboard in NCIS, computer hacking in movies has never exactly been realistic.There are a couple of potential...
Chinese economic cyber-espionage is diminishing, says U.S. official
WASHINGTON (Reuters) - U.S. Assistant Attorney General John Carlin said on Tuesday that Chinese hacking activity appears to have declined since the Chinese government vowed last September to stop supporting...
Senators move to block FBI from expanding hacking powers
Two US senators this week introduced a bipartisan bill meant to protect Americans from government hacking. The Stopping Mass Hacking (SMH) Act from Sens. Ron Wyden (D-Ore.) and Rand Paul (R-Ky.) would...
Rule 41 would make it easier for the government to carry out hacks
Ivan David Gomez AarceFurther ReadingJudge rules in favor of child porn suspect: Search warrant was improperFBI used a Tor vulnerability to find child porn on suspect's computer.Privacy activists and...
U.S. high court approves rule change to expand FBI hacking power
WASHINGTON (Reuters) - The Supreme Court on Thursday approved a rule change that would let U.S. judges issue search warrants for access to computers located in any jurisdiction despite opposition from...
Journalist Matthew Keys sentenced in L.A. Times hacking
SACRAMENTO, Calif. -- A well-known social media journalist was sentenced to 24 months in prison Wednesday after he was convicted of conspiring with the hacking group Anonymous to break into the Los Angeles...
Iranians charged with cyberattacks on US banks, New York dam
(Image: file photo via Dept. of the Interior)The Justice Dept. has charged seven Iranian nationals with computer hacking offences against US banks and a dam in New York.A grand jury indicted the seven...
Car Computers Are Vehicles for Hacking, Warns FBI
The FBI, the U.S. Department of Transportation and the National Highway Traffic Safety Administration last week issued a warning about the threat of automobile hacking. Computers that control steering,...
Newer vehicles increasingly vulnerable to hacking, warns FBI
Comments By: Reuters | Published:March 18, 2016 4:34 pm The computer screen in an autonomous prototype Continental Chrysler 300C sedan is seen during an event featuring numerous self-driving cars on Capitol...
FBI warns on risks of car hacking
The FBI and the US National Highway Traffic Safety Administration have added their voices to growing concerns about the risk of cars being hacked. In an advisory note it warns the public to be aware of...
Cyberwar, out of the shadows (Q&A) - CNET
A hacking attack on a Las Vegas hotel company. A power grid blackout in the Ukraine. A series of industrial accidents at an Iranian nuclear enrichment lab. What do all these things have in common? They...
Fear and loathing at RSA — Hacking, security and the limits of protection
People are trying to steal your credentials or trick you into giving them important information. They are exploiting unpatched operating systems, locating security holes in applications and hacking...
US to renegotiate arms control rule for hacking tools
WASHINGTON (AP) — A congressman says the Obama administration plans to renegotiate portions of an international arms control arrangement so that it's simpler to export tools related to hacking and surveillance...
UK Teenager Accused Of Hacking CIA Chief
A British teenager arrested for cyber crimes is suspected of hacking into the head of the CIA's personal email account. The unnamed 16-year-old was detained in the East Midlands on Tuesday, said the South...
GCHQ did not break the law when it hacked networks, says tribunal
(Image: file photo) GCHQ is not breaking the law when it carries out computer hacking operations, a tribunal has ruled.Details of the UK intelligence agency's involvement in computer network exploitation...
UK court: GCHQ hacking phones and computers is legal
Computer and smartphone hacking by spying agency GCHQ is legal, the UK's Investigatory Powers Tribunal has said.Senior judges ruled that they are "satisfied" that the agency's ability to force its way...
Global Tensions Over Low Oil Prices Cause Uptick in Cyber-Espionage
CrowdStrike’s annual threat report highlights Chinese cyber-operations and notes a rise in hacking that pits Russia against Middle Eastern governments as oil prices decline. The oil glut has increased...
Train for a Career in White Hat Hacking and Penetration Testing
Job security, a $120,000, and an in-demand title that big companies want on their team. That's what you have to look forward to as a white hat hacker and penetration tester—and our five-course Complete...
After Chinese email spy scandal, Microsoft changes policy on notifying customers
Microsoft Corp. has agreed to change its policies and always tell email customers when it suspects there has been a government hacking attempt after widespread hacking by Chinese authorities was exposed....
More Secure Cyber Environment Could Be Coming in 2016
There’s little doubt that 2015 will not be remembered fondly by cybersecurity professionals. With millions of successful hacking attacks, and uncounted documents breached or stolen, it seemed at times...
Oracle settles FTC charges that it left its customers open to hacking
WASHINGTON (Reuters) - Oracle Corp has settled allegations by the Federal Trade Commission that it failed to notify customers about unaddressed hacking dangers when it released security updates for the...
US embassy worker hacked for sex images
A former US official has admitted stalking women and extorting sexually explicit material from them after hacking into their emails. Michael Ford, who worked in the American embassy in London, pleaded...
Former U.S. official pleads guilty to ‘sextortion’ hacking scheme
WASHINGTON (Reuters) - A former U.S. official pleaded guilty Wednesday to charges he orchestrated an international cyber hacking operation to stalk hundreds of young women and threaten them if they did...
U.K. Spy Agency Does Not Require Individual Warrants To Hack
More details about U.K. intelligence agency GCHQ’s use of hacking — aka: ‘computer network interference’ in euphemistic official parlance — and the oversight regime...
GCHQ in court over 'dark precedent' of device hacking
The UK's cyber surveillance agency GCHQ has "taken advantage" of its ability to hack phones and computers and set a "dark precedent" around the world, privacy campaigners have claimed.All and any material...
Cybercrime: Teen Explains The Lure Of Hacking
By Joe Tidy, Sky News Reporter A teenage hacker has told Sky News that hacking company websites for profit is becoming more popular as easy-to-use hacking tools are readily available online. The 17-year-old,...
US advised to consider 'hacking back'
The United States should think about allowing US companies to "hack back" if data is stolen by Chinese hackers. Data lost in such attacks could be recovered or wiped, suggests a new report from the US-China...
U.S. announces criminal charges in massive 2014 JPMorgan hack
(Reuters/Kacper Pempel/Files) U.S. prosecutors on Tuesday announced expanded charges against two men that link them to a 2014 cyberattack against JPMorgan Chase that affected tens of millions of customers, as...
Three indicted in U.S. over big JPMorgan hacking
NEW YORK (Reuters) - U.S. prosecutors on Tuesday unveiled expanded criminal charges against three men in connection with a massive 2014 cyberattack against JPMorgan Chase & Co and the hacking of several...
Apple’s iOS 9.1 Shuts Down The Pangu Hacking Team’s Jailbreak
Well, that was fast! Only days after the first public jailbreak for iOS 9 devices hit the web, it appears that Apple has closed two of the exploits used by the Chinese hacking team Pangu, whose untethered...
Sony to pay up to $8 million in 'Interview' hacking lawsuit
(Reuters) - Sony Pictures Entertainment Inc has agreed to pay up to $8 million to resolve a lawsuit by employees who claimed their personal data was stolen in a 2014 hacking tied to the studio's release...
Nokia 6, Moto E4 and more get big discounts through Amazon Prime
Amazon's in-house smartphones could've been better, but that's not stopping the online retail giant from selling discounted handsets as a way to promote its premium Prime service.Amazon Prime members...
Darden CEO: 'Believe it or not, millennials still want to come to restaurants'
Darden Restaurants isn't afraid of tech giant Amazon. The restaurant company — which owns Olive Garden, LongHorn Steakhouse, among other brands — doesn't think that Amazon's acquisition of Whole Foods...
Amazon's new Echo has a really creepy feature
Amazon's new Echo Show, which begins shipping to customers this week, has a really creepy feature. It's called "drop in" and lets pre-approved users suddenly appear on your Amazon Echo for two-way video...
The best smart home devices for 2017
The best smart home devices are dramatically bringing your dumb household into the future, letting you control everything from the front door lock to the bedroom lights with a phone, tablet or even a...
I regard the brain as a computer which will stop working when its component fail. There is no heaven or afterlife for broken-down computers. That is a fairy story for people afraid of the dark