hacking   63938

« earlier    

Becerra Wont Discuss Breach of His Server | The Daily Caller
Xavier Becerra, the chairman of the House Democratic Caucus, barely reacted when he learned the caucus server had been infiltrated in 2016, although he loudly decried the hack of the Democratic National Committee that happened around that same time. No one has faced punishment for the caucus server infiltration.
DNC  hacking 
19 hours ago by Jswindle
German intelligence unmasks alleged covert Chinese social media profiles • Reuters
Thomas Escritt:
<p>Germany’s intelligence service has published the details of social network profiles which it says are fronts faked by Chinese intelligence to gather personal information about German officials and politicians.

The BfV domestic intelligence service took the unusual step of naming individual profiles it says are fake and fake organizations to warn public officials about the risk of leaking valuable personal information via social media.

“Chinese intelligence services are active on networks like LinkedIn and have been trying for a while to extract information and find intelligence sources in this way,” including seeking data on users’ habits, hobbies and political interests, they said.

Nine months of research had found that more than 10,000 German citizens had been contacted on the LinkedIn professional networking site by fake profiles disguised as headhunters, consultants, think-tankers or scholars, the BfV said.</p>
linkedin  china  hacking  spying 
yesterday by charlesarthur
Europol-Chef Rob Wainwright über Firmen-Hacks und Onlinekriminalität - SPIEGEL ONLINE
Der Chef von Europol, Rob Wainwright, über die Bedeutung der Kryptowährung Bitcoin für die Onlinekriminalität - und warum die Zahl der gemeldeten Hackerangriffe auf Unternehmen demnächst dramatisch steigen wird.
interview  hacking  security  surveillance 
yesterday by SimonHurtz
CTFtime.org / All about CTF (Capture The Flag)
The UCSB International Capture The Flag (also known as the iCTF) is a distributed, wide-area security exercise, whose goal is to test the security skills of the participants.... Binjitsu by ddtek (... — 2012)Legitimate Business Syndicate (2013 — ...)
Archive  ctf  hacking  important  learning  pdf  pocket 
2 days ago by raj77_in
DNA Tattoos Are the Final Frontier of Love
It is about as biologically intimate as one can get. Everence is a powdery substance synthesized from a sample of DNA, something as simple as a few thousand cells from a swab of a person’s inner cheek, or from cremated ashes. A small vial of Everence can be brought to a tattoo artist and added to any type of inks. The result: A tattoo imbued with the DNA of another human being — or, if you prefer, a dog, cat or other furry friend.
body  hacking  socialmemory  life  preservation  ++++- 
2 days ago by jonippolito

« earlier    

related tags

&  ++++-  (cambridge...  2016  341webmgmt  adb  address  ai  amazfit-pace  amazon  and  app  apple  archive  arducky  arduino  articles  arvinsingla  assistant  attack  audit  automation  awesome  aws  badass  bestpractices  bitcoin  blog  blogs  blueteam  bluetooth  body  books  branding  breach  burger  c++  c  capital  certificate  cheat  cheatsheet  china  cia  civics  code  codeforamerica  coding  collection  communication  computernetworks  computerscience  computing  course  cryptocurrency  ctf  customer  cyber_security  cybersecurity  cyberwar  data  debunkery  defense  design  digital  directory  diy  dj  dnc  dns  does  dynamic  echo  edition  edition:  education  electronics  email  embedded  emulation  endpoint  engineering  experience  exploit  exploitation  exposed  face_id  facebook  fakenews  fintech  fitness  foieg  food  freelance  fun  funny  growth  guide  hack  hacker  hackerbox  hacks  hardware  hash  home  homekit  ifttt  important  information  information_operations  infosec  infrared  infrastructure  inject  injection  interesting  internet  interview  investigate  iot  jm  kaspersky  keyboard  king  language  ld_preload  leak  leakage  learning  legal  libraries  life  linkedin  linker  linking  linux  log  mailsploit  malware  map  marketing  metasploit  meterpreter  microcontroller  mimikatz  mitre  monitoring  mta  multirelay  music  netneutrality  networking  nsa  ntlm  openaccess  opendata  opensource  operatingsystem  os  p  password  pdf  pentest  pentesting  people  peteryeung  phishing  pocket  politics  powershell  preload  preservation  privacy  producthunt  productivity  programming  programminglanguage  protocol  pwn  pwned  pwning  python  qt  radio  raspberry-pi  raspberrypi  rating  recon  redteam  reference  relay  research  responder  restaurant  reverse  reverseengineering  reviews  rfc-1342  rfc  rfc1342  rfid  robots  root  rootkits:  russia  s3  saas  sales  scripts  se  second  secrets  security  sender  smb  smb2  socialengineering  socialmemory  software  softwaretesting  solutions  spoof  spoofing  spying  startups  stats  surveillance  tech  testing  times  toolkit  tools  toread  towatch  training  transparency  travel  tripadvisor  trucos  tunnel  tutorial  type  type:collection  type:website  user  utilities  value  vault7  venture  video  videogames  wearables  web  weird  what  wifi  wikileaks  wireless  wordpress  wtf  xiaomi  xss       

Copy this bookmark: