jswindle + hacking   22

The Day That Guccifer 2.0 Quit Hacking The DNC – Disobedient Media
This report will focus on an unreported story: After the fact, the DNC quietly changed an important theme in their Russian hacking narrative. Initially, the DNC passively supported the notion that Guccifer 2.0 stole a copy of a Trump opposition report by penetrating the DNC at the behest of the Russian state. Then over a year later, an un-named ex-DNC official tells us that this document in fact came from Podesta’s emails, not the DNC. This single statement by a DNC official invalidated the circumstantial evidence that had been used to support the DNC’s Russian hacking claims, and represents a groundbreaking contradiction that has gone unobserved by establishment press outlets.
wikiLeaks  DNCemails  hacking 
may 2018 by Jswindle
Becerra Wont Discuss Breach of His Server | The Daily Caller
Xavier Becerra, the chairman of the House Democratic Caucus, barely reacted when he learned the caucus server had been infiltrated in 2016, although he loudly decried the hack of the Democratic National Committee that happened around that same time. No one has faced punishment for the caucus server infiltration.
DNC  hacking 
december 2017 by Jswindle
Security Breach and Spilled Secrets Have Shaken the N.S.A. to Its Core - NYTimes.com
Mr. Williams had written on his company blog about the Shadow Brokers, a mysterious group that had somehow obtained many of the hacking tools the United States used to spy on other countries. Now the group had replied in an angry screed on Twitter. It identified him — correctly — as a former member of the National Security Agency’s hacking group, Tailored Access Operations, or T.A.O., a job he had not publicly disclosed. Then the Shadow Brokers astonished him by dropping technical details that made clear they knew about highly classified hacking operations that he had conducted.
hacking  NSA 
november 2017 by Jswindle
CIA Director Met With NSA Whistleblower Who Disputes Russia's Role In DNC Hack | Zero Hedge
One year ago, we introduced readers to William Binney, a former high-ranking NSA official turned whistleblower with an interesting theory: Binney believes the intelligence community’s assessment that Russia-linked hackers stole emails from the DNC as they pushed to sway the election in Trump’s favor is bullshit.
DNC  email  williamBinney  hacking  russia 
november 2017 by Jswindle
DefCon Hackers Broke Into U.S. Voting Machines in 90 Minutes | Fortune.com
It took computer hackers less than two hours to break into U.S. voting machines at the annual DefCon computer security conference, according to tech news site The Register. DefCon is an annual event that draws hackers from all over the world to Las Vegas to strut their stuff.
voting  hacking  security 
august 2017 by Jswindle
Well, I never thought that I'd have an opportunity to put my 32-bit SPARC port of DIET-PC to actual use, but then this Netgear ReadyNAS Duo hardware fell in my lap! Very popular in its day, but a bit of an underperforming relic nowadays. Let's see if we can put it to slightly better use with more modern software (for the most part, at least - I am limited by the development environments that I use as far as glibc and Xorg baselines are concerned, so in these respects I can at best upgrade the ReadyNAS from a Sarge-like machine (glibc 2.3.2, no udev) to an Etch-like machine (glibc 2.3.6, with udev)). The 2.6.17 kernel is a pretty elderly, but it's good enough for inotify, udev and GPT.
readyNas  hacking 
march 2017 by Jswindle
Hacking The ReadyNAS | Caliban – Opinion and Righteous Anger
The problem is that most forms of back-up that it provides for don’t support the deletion of files that are no longer on the source. For example, if file A and B were backed up last night, but file A was deleted on the source by somebody this morning, tonight’s backup should back up only file B (and even then, only if it has since changed) and delete file A from the back-up destination.
readyNas  backup  install  rsync  ssh  hacking 
march 2017 by Jswindle
Cyber hack got access to over 700,000 IRS accounts
A 2015 cyber hack of the IRS potentially gained access to personal data from more than 700,000 taxpayer accounts, more than double the total previously estimated, the tax agency said Friday.
irs  hacking  privacy 
december 2016 by Jswindle
Anonymous Leaks to the WashPost About the CIA’s Russia Beliefs Are No Substitute for Evidence
Anonymous Leaks to the WashPost About the CIA’s Russia Beliefs Are No Substitute for Evidence
CIA  russia  hacking  election 
december 2016 by Jswindle
Troy Hunt: Introducing paste searches and monitoring for “Have I been pwned?”
I’ve got 174,451,409 breached accounts in Have I been pwned? (HIBP) as of today which probably sounds like a lot, but it’s not. Why is it not a lot? Because whilst that list spans a lot of the big breaches I could get my hands on, as of the middle of this year (now a couple of months ago already), there were over half a billion accounts breached in just six months. That’s just nuts and as that article explains, its set us on a track that will make 2014 the most hacked year to date by a fairly significant margin over last year which was the previous most hacky year.
hacking  pastebin 
august 2016 by Jswindle
What to Do if Your Email Account Gets Hijacked and Sends Out Spam | The Mac Security Blog
It’s an event that we’ve probably all dealt with at one point or another, either on the sender's or the receiver's end: an email that clearly didn’t come from the person who supposedly sent it, hawking weight-loss supplements or “male enhancement” pills or some such nonsense. What causes these, and what can you do about it? The short answer is, it’s one of two things:
email  malware  security  hacking 
july 2016 by Jswindle
How Google’s Web Crawler Bypasses Paywalls | Elaine's Idle Mind
Wall Street Journal fixed their “paste a headline into Google News” paywall trick. However, Google can still index the content.

Digital publications allow discriminatory access for search engines by inspecting HTTP request headers. The two relevant headers are Referer and User-Agent.
javascript  security  paywall  hacking  web 
july 2016 by Jswindle
A Hacking of More Than $50 Million Dashes Hopes in the World of Virtual Currency - The New York Times
The money that the hacker moved appeared to be frozen on Friday as a result of a safeguard previously built into the code. The thief was caught in what might be thought of as a digital version of the
etherium  blockChain  hacking  bitcoin 
june 2016 by Jswindle
A $79 million cryptocurrency heist just happened, and it’s threatening the future of blockchains — Quartz
The Decentralized Autonomous Organization (DAO) is a radical experiment in crowdsourced investing, and it raised over $150 million in ether, a cryptocurrency that’s starting to rival bitcoin. The
cryptoCurrency  hacking  bitcoin  theft 
june 2016 by Jswindle
How to Hack an Election
Andrés Sepúlveda says he rigged major elections in Latin America. Here's how he did it
hacking  election  corruption 
april 2016 by Jswindle
Hack Your Meter While You Can | Greentech Media
As millions of Americans kiss their old-fashioned electricity meters goodbye, there is a range of reactions. Well, actually, more like two. There is plenty of consumer oblivion about advanced meter infrastructure and a whole lot of confusion and anger from customers who have seen their bills spike after their smart meters have been installed.
electricGrid  smartMeter  hacking 
march 2016 by Jswindle
5 Cool Unix Hacks For Fun and Productivity | I care, I share, I'm Nathan LeClaire.
In my workflow I am always looking for ways to be more productive, and to have more fun while developing. There’s nothing quite like the feeling of flying through a sequence of commands in bash that you know would take your peers twice as long to execute. Have you ever :
unix  ssh  cli  hacking  bash  vim  tips 
march 2016 by Jswindle
How I Automated "Finding Almost Anyone's Email Address" | I care, I share, I'm Nathan LeClaire.
Does It Work?

In the original “How To Find Almost Anyone’s Email Address” article, Rob Ousbey presents a Google Doc spreadsheet that will generate a large number of possible emails for someone based on their name and the domain name of the company they work for. Go ahead, try it out. Many peoples’ emails are something along the lines of [firstname].[lastname]@[company].com, so there’s a high likelihood that their email will be in the list of generated possibilities.
internetFind  hacking  search  automation  email 
march 2016 by Jswindle
Don't Fear the #10k Twitter
Is Twitter abandoning its trademark 140-character limit? Twitter users quickly and understandably freaked out. via Pocket
twitter  innovation  hacking 
january 2016 by Jswindle

Copy this bookmark: