Someone just attempted to hack the DNC’s voter database

TwitterFacebook

An attempt has just been made, once again, to hack the Democratic National Committee. This time, the target: the Democratic Party’s voter database.

CNN is reporting that on Tuesday, the DNC reached out to the FBI to inform them of the attempted hack after a cybersecurity firm discovered a website that faked the look of VoteBuilder, the party’s voter database login page.

The cybersecurity firm that first found the fake page, Lookout, does not work for the DNC, but itimmediately reached out to the party upon discovering the hacking attempt.  Read more…

More about Hacking, Fbi, Phishing, Dnc, and Tech

View More Someone just attempted to hack the DNC’s voter database

Russian hackers target Republican think tanks critical of Moscow, Microsoft says

TwitterFacebook

Russia’s intelligence agency is ramping up its hacking attempts on U.S. political targets as the Midterm elections get nearer. The hackers’ latest target: conservative think tanks which have broken from President Donald Trump and are seeking continued sanctions against Moscow.

In a report posted on Microsoft’s website by company president Brad Smith, Microsoft announced they had taken control of 6 domains via court order that were being set up by Russian hackers to deploy in a spearphishing attack. The company pointed out that it “currently [has] no evidence these domains were used in any successful attacks.” Read more…

More about Microsoft, Russia, Hacking, Republican, and Conservative

View More Russian hackers target Republican think tanks critical of Moscow, Microsoft says

Hacking the websites responsible for election information is so easy an 11 year-old did it

It’s time to talk about election security. Over the weekend at Def Con, the annual hacker convention in Las Vegas to discuss some of the latest and greatest (or scariest) trends in the wild world of hacking, a pair of election security hacking demonstrations set up for adults and kids alike offered up some frightening […]

View More Hacking the websites responsible for election information is so easy an 11 year-old did it

Strike fear into the hearts of hackers with this online class

TwitterFacebook

To beat a hacker, you must become a hacker.

That’s what ethical hacking is all about: you learn the tricks and tools that cyber-criminals use to infiltrate the networks of major institutions, use that knowledge to set up secure safeguards, and get paid handsome sums by those companies. Plus, you’ll be protecting the public from financial breaches and identity theft. 

Become the digital dark knight that the internet deserves by enrolling in this online course: The Complete Ethical Hacking Masterclass. It’s available for just $15 while this deal lasts.

This bundle offers 65 lectures and 11.5 hours of immersive content that will prep you for a new career in the high-paying field of ethical hacking. With each course, you’ll explore cutting-edge concepts and master new tools to round out your skill set — including setting up virtual penetration testing environments, networking fundamentals, advanced client-side and server-side exploitation, and how to attack wired and wireless networks. You’ll even learn the art of performing network sniffing with Wireshark.  Read more…

More about Cybersecurity, Hacking, Online Learning, Mashable Shopping, and Mashable Stackcommerce

View More Strike fear into the hearts of hackers with this online class

Reddit hack exposes old private messages

TwitterFacebook

The internet is forever, and, yes, that apparently includes your old Reddit private messages.  

The so-called front page of the internet today announced that it suffered a hack in June, and, as a result, Reddit private messages from 2005 to 2007 are now in the hands of the as-of-yet unknown culprits. 

That’s right, your finely aged secret memes are on the loose. Oh, and also your email addresses and account credentials. 

“A complete copy of an old database backup containing very early Reddit user data — from the site’s launch in 2005 through May 2007 [was accessed],” explains a statement from the company. “In Reddit’s first years it had many fewer features, so the most significant data contained in this backup are account credentials (username + salted hashed passwords), email addresses, and all content (mostly public, but also private messages) from way back then.” Read more…

More about Reddit, Hacking, Tech, and Cybersecurity

View More Reddit hack exposes old private messages

Inmates hacked tablets to transfer over $200,000 into accounts

TwitterFacebook

Over 300 inmates in Idaho successfully hacked tablets in an effort to transfer thousands of dollars of credit into their accounts. 

The tablets — made by company JPay — are intended for accessing music, ebooks, games and emails. But because of a loophole, inmates were able to use them to transfer a collective $225,000 into various accounts.

As reported by the Spokesman-Review, 364 occupants of five different Idaho correctional facilities were able to access funds through a “vulnerability” that officials didn’t discover until early July.   Read more…

More about Hacking, Prison, Prisoners, Culture, and Web Culture

View More Inmates hacked tablets to transfer over $200,000 into accounts

Someone is using a cancelled TV show’s verified Twitter account to promote a cryptocurrency scam

TwitterFacebook

An apparent hacker has been using a discontinued TV show’s verified Twitter account to promote a cryptocurrency scam.

A nefarious Twitter user appears to have gained access to the official @AlmostHumanFOX account, and has been tweeting from the account since the beginning of the month. 

During this time, the account, which is followed by almost 19,000 Twitter users, has been promoting cryptocurrency “giveaways” and impersonating Justin Sun, the influential founder and CEO of Chinese blockchain company TRON.

As TheNextWeb points out, cryptocurrency “giveaway” scams have plagued Twitter in recent months. Even Elon Musk has complained about it. Basically, a scammer attempts to convince Twitter users through faked accounts to send them a small amount of cryptocurrency and in turn, the scammer promises to send them back crypto in tenfold. The scammer then takes the original crypto deposit and runs, never returning any of the currency.  Read more…

More about Twitter, Hacking, Fox, Scam, and Cryptocurrency

View More Someone is using a cancelled TV show’s verified Twitter account to promote a cryptocurrency scam

A hacker tried selling stolen military drone documents for $200

TwitterFacebook

Researchers at the cybersecurity firm Recorded Future recently released a report about one of its more interesting findings. 

While scouring the hacker forums on the dark web, the firm’s analysts discovered someone selling MQ-9 Reaper drone documents — maintenance books, training guides, and a list of airmen assigned to the military drone. The hacker was looking for $150-200 for the documentation. 

That may seem a strangely low asking price, and according to Andrei Barysevich, a Recorded Future analyst, it is. The hacker was advertising the documents as classified information, but while they are only made available to military and its contractors, they aren’t classified. Still, according to Barysevich in a statement to Buzzfeed News, “We felt like he has no true understanding of the value of this information, he had no idea how to sell it, he was just trying to get rid of it.” Read more…

More about Drones, Cybersecurity, Hacking, Military, and Drone

View More A hacker tried selling stolen military drone documents for $200

The iPhone’s USB Restricted Mode is painfully easy to hack

TwitterFacebook

USB Restricted Mode, a new iOS feature that protects unauthorized access of the data on your iOS device, has a glaring omission that would make it quite easy for someone to beat in many scenarios. 

The feature, introduced in iOS 11.4.1 and iOS 12 beta 2, is supposed to make the data on your iPhone safe even if someone can physically access it. One hour after the phone’s last been unlocked, it enters USB Restricted Mode, which disables data access to its Lightning port. 

However, security firm ElcomSoft has discovered a way to disable the timer, and it’s ridiculously easy — you just need to plug an accessory into the iPhone’s Lightning port, and the timer is disabled.  Read more…

More about Apple, Iphone, Hacking, Hack, and Usb Restricted Mode

View More The iPhone’s USB Restricted Mode is painfully easy to hack

Canadian Yahoo hacker gets a five year prison sentence

After pleading guilty in November, the Canadian hacker at least partially to blame for the massive Yahoo hack that exposed up to 3 billion accounts will face five years in prison. According to the Justice Department, the hacker, 23-year-old Karim Baratov, worked under the guidance of two agents from the FSB, Russia’s spy agency, to […]

View More Canadian Yahoo hacker gets a five year prison sentence

Trump’s phones remain vulnerable because he considers security ‘inconvenient,’ report says

President Donald Trump is once again making headlines for the staggering carelessness of his smartphone use, leaving himself vulnerable to any number of hacks and security risks.
This latest update comes from Politico, which details how Trump is usin…

View More Trump’s phones remain vulnerable because he considers security ‘inconvenient,’ report says