Tag: Hacker
-
You’ve been hacked, what now?
You work for a crypto company, project or DAO and someone alerts you that you’ve been hacked. What do you do next? Here’s a quick emergency cheat sheet.
By
·
-
Interview With A Blackhat
Fascinating interview with a (former) blackhat: One ‘blackhat,’ who asked to be called Adam, that I have spoken to a lot has recently says he’s decided to go legit. During this life-changing transition, he offered to give an interview so that the rest of the security community could learn from his point of view. Not…
By
·
-
When spammers go to war: Behind the Spamhaus DDoS
When spammers go to war: Behind the Spamhaus DDoS: Over the last ten days, a series of massive denial-of-service attacks has been aimed at Spamhaus, a not-for-profit organization that describes its purpose as “track[ing] the Internet’s spam operations and sources, to provide dependable realtime anti-spam protection for Internet networks. Background article about the biggest DDoS so far. Two…
By
·
-
Going Bright: Wiretapping without Weakening Communications Infrastructure
Going Bright: Wiretapping without Weakening Communications Infrastructure: Mobile IP-based communications and changes in technologies have been a subject of concern for law enforcement, which seeks to extend current wiretap design requirements for digital voice networks. Such an extension would create considerable security risks as well as seriously harm innovation. Exploitation of naturally occurring bugs in…
By
·
-
Drink hackers take home carbonators to the limit
Drink hackers take home carbonators to the limit: It seems inevitable that if a product specifically advises against certain activities that some people are going to push the limit. Oh those hackers…
By
·
-
The “Red October” Campaign
The “Red October” Campaign – An Advanced Cyber Espionage Network Targeting Diplomatic and Government Agencies During the past five years, a high-level cyber-espionage campaign has successfully infiltrated computer networks at diplomatic, governmental and scientific research organizations, gathering data and intelligence from mobile devices, computer systems and network equipment. Kaspersky Lab’s researchers have spent several months…
By
·
-
Epic Hacking
Why can’t I get rid of the nagging feeling that this guy asked the hacker himself to do it, to get a great story into Wired and everywhere? Staged like this, the story is much better than if he simply reported that it was theoretically possible to remote wipe somebody’s iDevices just by abusing Amazon’s…
By
·