hacking   65691

« earlier    

Amazon admits it exposed customer email addresses, but refuses to give details • Techcrunch
Zack Whittaker and
Josh Constine:
<p>Users don’t know which of Amazon’s sites was impacted, who their email address could have been exposed to, or any ballpark figure of the number of victims. It’s also unclear whether it has or plans to contact any government regulatory bodies.

“We’re contacting you to let you know that our website inadvertently disclosed your email address due to a technical error,” said Amazon in the email with the subject line: “Important Information about your Amazon.com Account.” The only details Amazon provided were that: “The issue has been fixed. This is not a result of anything you have done, and there is no need for you to change your password or take any other action.”

The security lapse comes days ahead of one of the busiest retail days of the year, the post-Thanksgiving holiday sales day, Black Friday. The issue could scare users away from Amazon, which could be problematic for revenue if the issue impacted a wide number of users just before the heavy shopping day.

Amazon’s vague and non-specific email also sparked criticism from users — including security experts — who accused the company of withholding information. Some said that the correspondence looked like a phishing email, used to trick customers into turning over account information.

Customers in the US, the UK and Europe have reported receiving an email from Amazon.</p>

Wait long enough, and everyone gets hacked. I think at this point only Apple and Google haven't had a serious breach of their systems. (Users of both have been phished many, many times but the core systems haven't.)
Amazon  hacking 
14 minutes ago by charlesarthur
FreePizza.io
I upvoted FreePizza.io on Product Hunt: Free pizza for usergroups, meetups, hackathons & techtalks! https://ift.tt/2qZowVP at November 21, 2018 at 10:55AM
Product  Hunt  Hiring  and  Recruiting  Marketing  Growth  Hacking  Advertising  Tech 
55 minutes ago by iamthefury
br101/horst: “horst” - lightweight IEEE802.11 wireless LAN analyzer with a text interface
“horst” - lightweight IEEE802.11 wireless LAN analyzer with a text interface - br101/horst
linux  openwrt  wifi  lan  networking  analyzer  software  radio  scanning  hacking  packets  aggregator  textui  tool  mesh  wlan 
5 hours ago by orlin
4964(S) Special groups have been assigned to a new logon. (Windows 10) | Microsoft Docs
Throwing important AD users into a special security audit group will raise security events in the event log to allow easier tracking. Useful for exploring an environment where people have hard coded certain accounts or registered a task/service with an inappropriate account
windows  AD  active  directory  special  user  login  audit  security  group  event  log  hacking  pentesting  defense  WEFFLES 
12 hours ago by asteroza
Men behind TalkTalk data breach jailed • Out-law
<p>Matthew Hanley, 23, and Conner Allsopp, 21, both of Tamworth in England, received their sentences at the Old Bailey in London on Monday. Hanley was sentenced to 12 months' imprisonment and Allsopp to eight months.

The sentences were issued after both men had previously pled guilty to offences under the UK's Computer Misuse Act.

Hanley was responsible for "hacking the TalkTalk database, obtaining files to enable the hack of websites and supplying these files to others". He also supplied a spreadsheet of TalkTalk customer details for use in fraud, the Metropolitan Police Service said in a statement.

Allsopp was responsible for supplying an article for use in fraud and supplying a computer file to enable hacking intended for the commission of an offence under the Computer Misuse Act, the Met said.</p>


This is quite weird: the breach was in October 2015, more than three years ago, and these two were arrested within a year. (The story of what they did is one of the chapters in my book Cyber Wars. Now we'll need another edition..) What on earth has been going on for two years?
talktalk  hacking 
22 hours ago by charlesarthur
LoraCaster/usage_examples/BTC at master · valerio-vaccaro/LoraCaster
A LoraWan TTN compatible firmware for a cheap ESP32/Lora board. - valerio-vaccaro/LoraCaster
lorawan  bitcoin  opensource  hacking 
yesterday by orlin
Security warning: UK critical infrastructure still at risk from devastating cyber attack | ZDNet
Not enough is being done to protect against cyber attacks on energy, water and other vital services.
tech  intelligence  hacking 
yesterday by tonys
Instagram Accidentally Exposed Some Users' Passwords In Plaintext
Instagram has recently patched a security issue in its website that might have accidentally exposed some of its users' passwords in plain text. The company recently started notifying affected users of a security bug that resides in a newly offered feature called "Download Your Data" that allows users to download a copy of their data shared on the social media platform.
cyber  security  facebook  password  hacking  news  how  to  hack  instagram  app 
yesterday by SecurityFeed
Mobile Repair Cultures
“Mobile Repair Cultures” is a research project at the Geneva School of Art and Design (HEAD – Genève) into repair practices, ethnography and product/interaction design. Funded by the Swiss National Research Fund, it investigates informal repair cultures by looking at mobile phones and smartphones repair places, and hypothesise that they play an important, yet unrecognized, role in ecosystems of innovation.

Using an ethnographic approach focused on Swiss unlicensed stores and hackerspaces, we want to (a) understand of the forms of repair and transformation of these technical objects, (b) investigate how these practices are constructed and deployed considering that such technologies are often closed or quite opaque, (c) grasp the role and the innovative character of these practices in the context of product or interaction design.
cell_phones  ethnography  repair  maintenance  makerspaces  hacking 
yesterday by shannon_mattern
A thread written by @TinkerSec
A solid, and simple, anomaly detection method.

Key Take Away's
==============

Blue Team:
- Least Privilege Model
- Least Access Model
- MultiFactor Authentication
- Simple Anomaly Rule Fires
- Defense in Depth

Red Team:
- Keep Trying
- Never Assume
- Bring In Help
- Luck Favors the Prepared
- Adapt and Overcome
security  hacking  story  best  hacker  via:popular 
yesterday by rauschen

« earlier    

related tags

+++++  1.3  10  2018  2fa  4*  access  accountability  active  activism  ad  advertising  aggregator  amazon  analysis  analyzer  and  android  api  apnea  app  archive  arduino  arstechnica  art  artivism  assemblylanguage  attack  auckland  audit  best  beware  bgp  bitcoin  blueteam  board  books  branding  breach  browser  business  bypass  cell_phones  chrome  cia  cjdns  cli  communit  console  cool  cpap  crawler  crime  crypto  cve  cyber  cybersecurity  cypher  data  datensicherheit  decryption  defense  development  digtal  directory  diy  dns  drm  ducky  dump  e2018  e21  edv  electronics  elf  email  encryption  enovember  ethnography  etls  event  exploit  facebook  fail  file  fireeye  for  forensics  gender  godaddy  government  gps  group  growth  hack  hacker  hackers  hardware  health  healthcare  hiring  history  homographs  how  howto-tech  humor  hunt  hunter  ifttt  infosec  insecure  instagram  intelligence  intelligence_community  interception  internet  it  james_clapper  javascript  job  john_brennan  lan  largest  lawenforcement  led  libvirt  linklist  linux  log  login  lorawan  lowcost  maintenance  makerspaces  malware  marketing  medicine  mesh  messaging  microcontroller  middlebox  minimalism  movies  music  networking  news  newswire  nodejs  nsa  nz  opensource  openwrt  oss  packets  passive  password  passwords  paypay  pen_testing  pentest  pentesting  personaldata  personalsecurity  phone  pinboard  pocket  politics  powershell  prison  privacy  product  producthunt  productivity  professionals.  programming  radio  randomness  read  recon  recruiting  redteam  repair  reverseengineering  reversing  router  routing  rubber  safety  sales  sarah  scanner  scanning  scooters  security  server  sharepoint  shodan  simplicity  skandale  sleep  sms  snoring  social-engineering  socialmedia  software  special  spying  story  stream  stringray  surveillance  sysadmin  systemsprogramming  talktalk  tech  telemetry  telephone  telephony  television  textui  the  tls  to  tool  toolkit  tools  tootme  top  torture  tracking  tutorial  tv  twitter  ubuntu  unicode  usb  user  variant  villainy  virus  vm  web  webdev  weffles  whistleblowers  wifi  windows  wlan  woocommerce  wordpress  write  xss 

Copy this bookmark:



description:


tags: