Hackers take over HBO's social media accounts and publish '4th Wave HBO Leak'


The nightmare continues for HBO. After suffering a hack and then leaks of various shows including Game of Thrones, hackers have now struck at the network's social media accounts. The hacking group OurMine took control of the main HBO Twitter accounts, as well as those for various shows, including Game of Thrones.
OurMine is no newcomer to the scene -- the group has previously hacked Mark Zuckerberg and Netflix's Twitter accounts. Separately to this, what has been dubbed the "4th Wave HBO Leak" has been made available online. This time the data dumps include content relating to Game of Thrones season 7, and Westworld season 2.
Hackers hit Scottish Parliament with 'brute force cyber-attack'


IT systems at the Scottish Parliament have been struck by a "brute force cyber-attack" from an unknown source. Staff have been advised to change passwords as a result of the attack.
Paul Grice, Chief Executive at Holyrood, says that the attack is similar to the one Westminster suffered back in June. The hackers have attempted to crack passwords as well as trying to access parliamentary emails.
Police in India arrest four over Game of Thrones leak


HBO has had something of a rough time of things lately, suffering not only a hack that led to a series of leaks, but also a Game of Thrones leak via a distribution partner. Police in India have now arrested four people in connection with the leak of the episode The Spoils of War.
Shortly after the leak occurred, HBO's distribution partner Star India admitted it was the source of the episode. Now three employees and one former employee of Prime Focus Technology -- a company which processes Game of Thrones ready for streaming on Hotstar -- are being questioned in relation to the leak.
Hackers leak more HBO episodes -- but Game of Thrones is left in the cold this time


HBO continues to feel the fallout from the recent hack it suffered. We have seen leaks of episodes and scripts from Game of Thrones, and the network allegedly tried to offer the hackers a "bug bounty" to stop the leaks.
The offer did not work, and the leaks continue. Episode five of Game of Thrones season seven may have aired last night (meaning today will undoubtedly see a flurry of downloads from torrent sites), but the hit show has been let off the hook in the latest batch. This time, it is episodes of Curb Your Enthusiasm and other shows that have been leaked.
Leaked emails show HBO offered hackers $250,000 to delay Game of Thrones leaks


The hack suffered by HBO has been in the headlines for the last couple of weeks, not least because it led to the leak of episodes and scripts. The anonymous hackers were known to have made a ransom demand, but details of how this was handled were not made public.
Now a leaked email suggests that HBO offered the perpetrators a sum of $250,000 to delay the leaks. But rather than offering up the sum as a ransom payment, HBO refers to the money as a "bug bounty payment."
Manufacturers are cybercriminals' biggest target


Cyber-attacks all over the world are becoming increasingly sophisticated, according to a new report by the NTT Group company. According to the same report, these attacks are also growing in frequency.
The Global Threat Intelligence Center (GTIC) 2017 Q2 Threat Intelligence Report says cyber-attacks were up by 24 percent globally, in the second quarter of 2017.
WikiLeaks: CIA's CouchPotato tool grabs footage from remote video streams


The latest addition to WikiLeaks' Vault 7 cache of CIA documents and tools is a user guide for CouchPotato. This project is designed to capture RTSP/H.264 video streams, typically from networked cameras.
This is rather different to the approach taken with the Dumbo project which required physical access to a computer. The CouchPotato documentation is relatively recent, only dating back to February 14, 2014.
Leaked exploits and hacking tools enable the surge of cyber attacks in 2017


Last year, the interconnectedness of cybercrime was demonstrated by a variety of supply chain hacks and other well-known cybersecurity issues that coalesced to create massive botnets powered by compromised Internet-of-Things (IoT) devices. The events from the first half of 2017 highlight another long-developing issue, which has been made worse by a variety of data dumps from actors such as WikiLeaks, TheShadowBrokers, and others: the leakage of state-sponsored and cybercriminal hacking tools and exploits.
Much like leaked personal data, once those vulnerabilities, exploits, and tools are exposed, they forever remain in the cybercriminal public domain. The May outbreak of WannaCry ransomware and the June outbreak of the data-destroying malware NotPetya both leveraged leaked NSA exploits to disrupt numerous organizations across the globe.
Hackers leak Game of Thrones S07E05 script summary and make ransom demand


The impact of the recent HBO hack continues to be felt. We've already seen scripts and spoilers leak online and now there's a new cache of leaks along with a ransom demand from those responsible.
The data dump includes details of the script for episode five of the current season, and a video directed at HBO CEO Richard Plepler in which the unknown hackers -- who sign off as "Mr. Smith" -- give the company three days to pay up a ransom in Bitcoin.
HBO calls in FBI over Game of Thrones hack as Indian distributor admits it is the source of S07E04 leak


Season seven of Game of Thrones has been something of a disaster for HBO. Not in terms of interest or viewing figures, of course, but in terms of hacking, leaks, spoilers and piracy.
Last night saw the official airing of episode four of season seven but this particular episode, The Spoils of War, leaked some days ago. Distribution partner Star India has admitted the leak came from its website, and HBO has called in the FBI to investigate the hack that lead to a number of episode and script leaks.
WikiLeaks: CIA's Dumbo project can hack webcams and corrupt recordings


WikiLeaks has published the latest installment of its cache of CIA documentation known as Vault 7. This time around we learn about Project Dumbo, a hacking tool which allows for the control of webcams and microphones.
Wired, Bluetooth and wireless devices can all be detected by Dumbo. In addition to this, Dumbo gives the CIA the ability to delete or corrupt recordings that have been made. WikiLeaks has published user guides for three versions of Dumbo, the most recent of which is dated June 2015.
As Game of Thrones spoilers leak online, Panda Security issues a stark warning


This week's hack of HBO led to the release of stolen episodes of Ballers and Room 104, and the threat of Game of Thrones leaks. Now the hackers have made good on their threat and uploaded scripts and episode summaries for yet-to-be-aired episodes, and speculation is rife that it is just a matter of time before episodes hit torrent sites such as The Pirate Bay.
Season seven of the show is just getting underway, and details of episodes three and four have now been published online. Other files have also been leaked following the hack, including log in credentials for HBO staff.
HBO hack leads to Game of Thrones leak


HBO is the latest company to suffer a hack and subsequent leak of shows. Hackers are said to have breached the network's security and gained access to 1.5TB of data including Game of Thrones scripts and unaired episodes of shows.
Episodes of Ballers and Room 104 have been leaked online, but it is the release of what appears to the script to next week's Game of Thrones that's drawing the most attention.
Russia tried to spy on Macron campaign using fake Facebook accounts


This is why you never accept Facebook friend requests from people you don't know, kids.
Reuters has reported that Russian agents created two dozen fake Facebook accounts to try and infiltrate and spy on campaign officials working for Emmanuel Macron during his presidential campaign.
WikiLeaks reveals CIA's Imperial hacking project targeting Mac and Linux


WikiLeaks has published the latest of its Vault 7 CIA leaks, this time looking at a project going by the name Imperial. The project is made up of three tools: Achilles and SeaPea which target OS X, and Aeris which targets various flavors of Linux, including RedHat, Debian and CentOS.
User guides relating to the two Mac tools date from mid-2011 and show they can be used to Trojanize an OS X disk image or install a persistent rootkit. Aeris was designed to provide a backdoor into Linux-based systems.
Recent Headlines
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.