asterisk2a + hat   13

Apple iOS Hardware Assisted Screenlock Bruteforce | Hacker News
So it cuts power before the iPhone can store that a failed attempt occurred. It's such a simple, stupid, wonderful idea. I love it. Kudos to whoever came up with it.
Hacking  white  hat  hacker  black  hat  hacker  security  NSA  GCHQ  Five  Eyes  cyber  security  Privacy  Internet  Privacy  online  security  IT  Apple  password  security 
march 2015 by asterisk2a
President Obama Is Waging a War on Hackers | WIRED
war on whistleblower and investigative journalism. // "In next week’s State of the Union address, President Obama will propose new laws against hacking that could make either retweeting or clicking on the above (fictional) link illegal. The new laws make it a felony to intentionally access unauthorized information even if it’s been posted to a public website. The new laws make it a felony to traffic in information like passwords, where “trafficking” includes posting a link. [...] But they are blunt political solutions which reflect no technical understanding of the problem." // &! &! &! "Both steps would not only be ineffective at improving cybersecurity in any practical sense but also further empower the government to go after activists and journalists such as Barrett Brown,
Anti-Hacking  Legislation  presidency  barackobama  cyber  war  Whistleblower  investigative  journalism  journalism  journalismus  Barrett  Brown  Aaron  Swartz  STEM  Career  Politicians  policy  error  policy  folly  NSA  CIA  surveillance  state  Orwellian  free  speech  freedom  of  press  Information  wants  to  be  free  Pressefreiheit  Meinungsfreiheit  white  hat  hacker  free  press  Checks  and  Balances  Separation  of  powers  democracy  accountability  Political  Governance  corporate  oversight  abuse  of  power  Foreign  Intelligence  Five  Eyes  GCHQ 
february 2015 by asterisk2a
I challenged hackers to investigate me and what they found out is chilling | PandoDaily
see Planning section; all the vectors of attack // and the weakest component is almost always the human being in some sort of way.
corporate  espionage  cyber  espionage  industrial  espionage  espionage  Foreign  Intelligence  NSA  CIA  surveillance  state  Orwellian  IT  Security  cyber  internet  online  password  cyber  war  cyber  attack  cyber  crime  FISA  Court  Warrant  wiretapping  FISAAA  black  hat  hacker  white  hat  hacker  phishing  phishing  scam 
february 2015 by asterisk2a
Employee Data Breach The Worst Part Of Sony Hack | TechCrunch
Hackers found a file with Sony usernames and passwords called “Usernames&Passwords.” Sony Director of Information Security Jason Spaltro even gave an interview in 2007 whose whole point was to revel in Sony’s security loopholes: “it’s a valid business decision to accept the risk” of a security breach. “I will not invest $10 million to avoid a possible $1 million loss,” he said at the time. This hack is estimated to cost Sony $100 million after all is said and done. The last one cost the company a cool $171 million. &! &!
Sony  hack  black  hat  hacker  leak  Big  Data  Privacy  Internet  Privacy  cyber  security  security  online  security  password  security  Hacking 
january 2015 by asterisk2a
Report: Cybercrime costs US $12.7M a year | Ars Technica
Cybercrime caused US co's $12.7M in damages over 1 yr, mostly info loss & business disruption, acc to @PonemonPrivacy's latest Cost of Cybercrime report; the avg co took 170 days to detect an attack & 31 days to resolve it; co's w/ specialized intrusion detection lower costs by $2.6M/yr
cyber  crime  cyber  war  cyber  attack  cyber  security  G  Zero  Israel  China  Iran  Russia  USA  black  hat  hacker 
october 2014 by asterisk2a
BBC News - Only 100 cybercrime brains worldwide says Europol boss
"One bad apple can taint an orchard. Yet, that does not justify burning down the orchard just to find that one apple." via @grady_booch & "Encryption and anonymity protect you from identity theft. But @TroelsOerting complains that citizens use these tools!" via @je5perl & "you have right to privacy but that doesn't mean that you have the right to anonymity," Europol boss" via @fborgesius & "Interview with the head of Europol's “Cybercrime Centre”. I’d claim to be amazed at the ignorance, but I’d be lying." via @stilkov
cyber  crime  black  hat  hacker  organised  crime  cyber  war  cyber  attack  cyber  espionage  corporate  espionage  encryption  Internet  Privacy  cyber  security  online  security  security  anonymity 
october 2014 by asterisk2a
America Must End Its Paranoid War on Hackers | WIRED
"Our privileged attorney-client communications were routinely and illegally opened by the prison; when weev was interrogated by the FBI (while being denied an attorney) about one of his communications to me and complained about his privileged attorney-client mail being opened, one of the FBI agents told him that they “didn’t give a fuck about the attorney client privilege.” Unfortunately, this attitude is typical of many FBI agents; generally they believe they are above the law they are entrusted to enforce. [...] I’ve heard similar tales of nasty, brutish, and petty treatment when dealing with the U.S. penal system from other hackers I know who were thrown in jail for non-violent offenses. [...] Hackers are the new communists for the DOJ.
cyber  crime  cyber  attack  white  hat  hacker  black  hat  hacker  USA  NSA  GCHQ  domestic  affairs  foreign  affairs  diplomacy  surveillance  state  Orwellian  Career  Politicians  policestate  Police  Brutality  prison–industrial  complex  military–industrial  complex  FBI  CIA  presidency  barackobama  human  rights  Justice  System  Law  &  Justice  DOJ  LulzSec  Anonymous 
october 2014 by asterisk2a
Secret Update Removes Photo Library Access As It Faces Renewed Claims It Isn’t So Anonymous | TechCrunch "Secret CEO: Well...You're Not ALWAYS Completely Anonymous Or Untraceable On Our App" [...] In fact, since Secret started offering a bounty for hackers that alerted the company about bugs in the app in February, it has learned about and fixed 42 different security holes. The numbers are a clear warning: Secret isn't perfectly secure and the term "anonymous" should be taken with a grain of salt. || - Problem saying you are anonymous when in reality you are building off a phone number and address/contacts book >> " the startup founder revealed this was not the first time he’d dealt with a potential threat to uncovering the names behind Secret confessions. [...] While Secret can continue patching in an arms race against hackers, hackers will almost certainly look for ways around the fixes." || || ||
Secret  anonym  anonymity  anonymous  Platform  corporate  values  personal  values  corporate  culture  spoofing  white  hat  hacker  hacker  Hacking  internet  security  app  security  cyber  security  online  security  cyber  bullying  cyber  mobbing  ethical  machine  ethics  morals  moral  beliefs  Troll  Trolls  Haters  Hater  corporate  governance  CSR  corporate  social  responsibility  Venture  Capital 
august 2014 by asterisk2a
Taken in phishing attack, Microsoft’s unmentionables aired by hacktivists | Ars Technica
The group has proven itself to be extremely effective in waging highly targeted phishing attacks that extract login credentials. For an idea how intricate some SEA attacks can be, see this detailed post-mortem of a recent ransacking of Forbes. [...] Taken together, the breaches are a sad commentary on the current state of security. If employees of two of the most visible technology companies in the world can't steer clear of social engineering attacks, what hope is there for less experienced Internet users?
phishing  Social  engineering  internet  security  cybersecurity  online  security  cyberattack  cyberespionage  cyberwar  encryption  Hacktivism  hacker  white  hat  hacker 
march 2014 by asterisk2a
Carna-Botnet: Internet-Zensus mit Hacker-Methoden - SPIEGEL ONLINE
"Wie der Datensatz zeigt, findet man ungesicherte Geräte praktisch überall im Internet", schreibt Herr Carna nüchtern. Weit über eine Million Rechner mit weit geöffneten Eingangstüren fand er weltweit. Die überwiegende Mehrheit waren "Endkunden-Router oder Set-Top-Boxen". Es seien aber auch andere Gerätetypen dabeigewesen, darunter "industrielle Steueranlagen, physische Türsicherungssysteme". Die Sicherheitsrisiken, die das mit sich bringt, erscheinen schwindelerregend.
white  hat  hacker  passwords  password  cybersecurity 
march 2013 by asterisk2a

related tags

&  Aaron  abuse  accountability  affairs  Amazon  and  anonym  anonymity  anonymous  Anti-Hacking  app  Apple  attack  Balances  barackobama  Barrett  be  beliefs  Big  black  Brown  Brutality  bullying  Capital  Career  Checks  China  CIA  complex  corporate  Court  crime  CSR  culture  cyber  cyberattack  cyberespionage  cybersecurity  cyberwar  Data  democracy  diplomacy  DOJ  domestic  Edward  encryption  engineering  error  espionage  ethical  ethics  Eyes  Facebook  FBI  FISA  FISAAA  Five  folly  foreign  free  freedom  G  GCHQ  Google  governance  hack  hacker  Hacking  Hacktivism  hat  Hater  Haters  human  industrial  Information  Intelligence  internet  investigative  Iran  Israel  IT  journalism  journalismus  Justice  Law  leak  Legislation  LulzSec  machine  Meinungsfreiheit  Microsoft  military–industrial  mobbing  moral  morals  NSA  of  on  online  organised  Orwellian  oversight  password  passwords  personal  phishing  Platform  Police  policestate  policy  Political  Politicians  power  powers  presidency  press  Pressefreiheit  prison–industrial  privacy  responsibility  rights  Russia  scam  Secret  security  Separation  Snapchat  Snowden  social  Sony  speech  spoofing  state  STEM  surveillance  Swartz  System  Terror  to  Troll  Trolls  Twitter  USA  values  Venture  wants  war  Warrant  Whistleblower  white  wiretapping  Zero 

Copy this bookmark: