Articles about Hacking

Hackers love Microsoft's PowerShell

powershell

PowerShell, a scripting language inherent to Microsoft operating systems, is largely used to launch cyber-attacks, a new report suggests.

The Unified Threat Research report, released by next-generation endpoint security (NGES) firm Carbon Black, says that 38 percent of incidents reported by Carbon Black partners used PowerShell.

Continue reading

Immigration officials allowed to hack phones of refugees and asylum seekers

refugee_camp

The British government secretly rolled out powers that permitted the immigration officials to hack the mobile phones of asylum seekers and refugees, the Observer reveals. The Home Office has confirmed the hacking powers which have sparked outrage from privacy and human rights groups.

Since 2013, immigration officials have not only been permitted to hack into migrants' phones and computers, but also to install surveillance equipment in homes and detention centers. With concern about governmental plans for the snooper's charter and the privacy invasion this entails, claims that the powers are needed to "deal effectively with all immigration crime" are likely to fall on deaf ears.

Continue reading

For $500 you could look through your competitor's email

Facebook teams up with Yahoo to create new, safe email standard

So you want to snoop through your competition’s email? Yeah, we can make that happen, but it’ll cost ya! How much? You’d be surprised. Secure Works’ researchers have dug deep into a popular cyber-crime forum to find out how much it costs to hire a hacker to do your dirty work, and the results, somewhat surprising, have been published in the Secure Works report.

Apparently, the luxury of reading your competitor’s email will cost you $500 (£353). To make things even better, the hacker will not change the email’s password or anything, so it will be pretty darn hard for the victim to realize they're being spied upon.

Continue reading

FBI briefs senator about how it cracked San Bernardino iPhone, but keeps Apple in the dark

iPhone Passcode

It turned the case of the century in to the case that didn’t really happen. The battle between Apple and the FBI came to a sudden end last month when the US Justice Department said it didn’t need the iPhone manufacturer's help, and then successfully hacked its way into the iPhone in question.

With the San Bernardino shooter's iPhone seemingly successfully cracked, the FBI last night revealed to Senator Dianne Feinstein just how it managed it. There are no current plans to share this information with Apple, but FBI Director James Comey revealed that the tool that was brought in only works on the iPhone 5c.

Continue reading

Chinese censors spring into action to erase mentions of Panama Papers from the web

chinese_keyboard_panama

The Panama Papers that leaked following the Mossack Fonseca hack turned the spotlight on the rich and famous seemingly involved in money laundering and tax evasion schemes. High profile names from the world of politics appear in the papers -- including close friends of Russian President Putin and the father of UK Prime Minister David Cameron.

The leaked 11.5 million files, spanning 2.6 TB of data, include references to the relatives of at least eight current or former Chinese officials, says the International Consortium of Investigative Journalists. Chinese censors have now gone into overdrive, working overtime to eliminate all mentions of this from Chinese websites.

Continue reading

Mossack Fonseca hack exposes shady financial practices of world's rich and famous

cyber criminal

One of the largest data breaches in history has resulted in the leak of eleven million confidential documents -- around 2.6TB of data -- from financial firm Mossack Fonseca, one of the most secretive companies in the world.

According to the BBC, the leaked documents reveal how "Mossack Fonseca has helped clients launder money, dodge sanctions and evade tax". The client list features some of the world’s richest and most influential people -- including 12 current or former heads of state -- and their irrepressible greed has now been laid out for all to see. The data shows how thousands of off-shore shell companies have been created in order to hide money from the tax man and also reveals "a suspected billion-dollar money laundering ring involving close associates of Russian President Vladimir Putin".

Continue reading

Many Brits now do not trust online banking

Banking login Internet Online

Almost half of people living in the UK (48 percent) fear either their identities, or their banking data will be stolen. Those are the results of a new survey from financial technology company Intelligent Environments. According to the report, the fear is well founded, with 20 percent of Britons being victims to some type of cyber-crime, either identity theft or bank details theft.

The report reveals a cybersecurity map of Britain. In it, it says that Birmingham is most concerned with cybersecurity, with 57 percent fearing banking information theft, and 59 percent identity theft. Birmingham is followed by Newcastle and Cardiff.

Continue reading

FBI cracks San Bernardino iPhone without help from Apple

iPhone Passcode

The US justice department has announced that it has successfully cracked the iPhone belonging to the San Bernardino shooter, Syed Farook. The FBI was able to unlock the phone without help from Apple, ending the lawsuit that had pitted the FBI against Apple.

In a statement, the Justice Department said: "The government has now successfully accessed the data stored on Farook's iPhone and therefore no longer requires the assistance from Apple." It has been thought that Israeli security firm Cellebrite was helping the FBI, but the question now has to be asked about the security of other iPhones and whether law enforcement agencies will use the same technique to access data in the future.

Continue reading

China praises hacker who tried to steal US military secrets

us_vs_china

Tensions could be set to mount between the US and China after the Communist government's Global Times newspaper praised Su Bin, the Chinese "government soldier" who pled guilty to trying to steal military secrets from US defense contractors.

Despite the Chinese government having previously said that it does not support cybercrime or online espionage, the state newspaper used an editorial to say "Su Bin deserves respect whether guilty or innocent". The hack was designed to gather data about, amongst other things, the F-22 and F-35 fighter jets and C-17 military transport aircraft.

Continue reading

90 percent of US federal agencies are vulnerable to data threats

unknown threat

According to new research 90 percent of IT security leaders in US federal agencies say they feel vulnerable to data threats.

In addition 61 percent have experienced a past data breach, with nearly one in five indicating a breach in the last year. This is among the findings of the US Federal Government Edition of the 2016 Vormetric Data Threat Report from enterprise data protection company Vormetric and 451 Research.

Continue reading

Security is a major concern for Internet of Things users

Internet of things

A survey by mobile and Internet security firm BullGuard of over 6,000 UK residents has illustrated just how widespread the Internet of Things (IoT) has already become, while also highlighting serious security concerns among consumers.

IoT is growing and will become more pervasive in the near future as consumers, whether knowingly or not connect more smart devices to the internet. Many consumer household items are now smart or internet enabled by default. Additionally over a quarter of consumers in the survey are planning to buy IoT devices in the next 12 months alone.

Continue reading

Just Google it: Anyone could have 'hacked' and doxxed Trump like Anonymous

anonymous_mask_keyboard

Shortly after hacking into Donald Trump's voicemails and leaking messages, Anonymous declared all-out war on the presidential candidate. Earlier this week, the hacktivist group launched #OpWhiteRose and doxxed the republican candidate.

Personal information about Trump -- his cell phone number, social security number and other details -- were released last week, with the group saying they were provided on the understanding that "you alone are responsible for your actions, as always". But rather than being the fruit of an elaborate hacking operation, anyone with the nous to use Google and Wikipedia could have gathered exactly the same information for themselves.

Continue reading

More than a third of UK universities are under attack every hour

Cyber attack

VMware today announced research revealing that over a third (36 percent) of UK universities are under attack by a cyber attack, on not just on a daily basis, but each hour. Furthermore, the attacks are so frequent and widespread that 83 percent of universities believe that cyber attacks are increasing in frequency and sophistication.

VMware’s research shows that a high percentage of University campuses are being singled out and attacked due to their open architecture.

Continue reading

Cooperating with the good guys: Is NSA snooping really that bad?

Spying

Ever since Edward Snowden, a former US National Security Agency (NSA) contractor, leaked information about the internet spying activities conducted by the NSA, there has been an unrest among Americans. The main concern for most people is that their privacy has been intruded without their permission.

Many Americans are also worried about the things that the NSA and the US administration could do with access to such "private" data. And the revelation about several tech giants, including Yahoo and Google, being involved has probably made people even more circumspect about using online services based in the US.

Continue reading

Anonymous serious about stopping Donald Trump's 'Fourth Reich', shares his cellphone number and more

donald_trump

Anonymous recently declared total war on Donald Trump (again), and is encouraging people to join in the fight against the Republican front-runner it compares to Hitler.

#OpWhiteRose is a new operation named after the White Rose Society. This non-violent group was originally set up in Nazi Germany to actively oppose Adolf Hitler, but has now been resurrected to combat the "menace" of Trump and his "new era of Brownshirt terrorists".

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.