Ourselves As Others See Us Through The Lens Of Traditional Media

When I presented myself at the SHACamp 2017 info desk bright and early on the first full day of the camp, I was surprised to find that I was to be assigned a volunteer along with my press badge. Because of the way our community is sometimes covered by the traditional media, it was necessary that any journalists touring the site have a helping hand to ensure that they respect the privacy of the attendees, gain permission from people likely to be in any photographs, and generally not be idiots about the whole Hacker thing. I pointed out that I …read more

Continue reading Ourselves As Others See Us Through The Lens Of Traditional Media

Diablo6 Ransomware Virus on the Loose

A ransomware virus is on the loose again! It has been a long time, but it seems that the notorious Locky virus is back with a new alteration. Its latest variant goes under the name .Diablo6 Virus Ransomware; it changes the extension of the files it encrypts to .Diablo6. It has just been freshly unleashed […]… Read More

The post Diablo6 Ransomware Virus on the Loose appeared first on The State of Security.

Continue reading Diablo6 Ransomware Virus on the Loose

Threat Hunting: Do Hackers Know Where You Are?

The internet is full of personal and business-sensitive information if you know where to look. In a previous post, we detailed our method of collecting Open Source Intelligence (OSINT) by “scraping” the content posted to public websites where stolen information is regularly released by hackers. That post focused on email and password combinations (over 1.5 […]… Read More

The post Threat Hunting: Do Hackers Know Where You Are? appeared first on The State of Security.

Continue reading Threat Hunting: Do Hackers Know Where You Are?

What If Your IoT-Enabled Camera (DSLR) Had Security Protocols?

Have you ever thought about the possibility that your IoT-enabled camera could be controlled by a hacker if you’re not careful? Sounds a bit too much, doesn’t it? No one could even think of such a thing happening a few years ago. Unfortunately, as more and more IoT-enabled features and offerings have been introduced, the […]… Read More

The post What If Your IoT-Enabled Camera (DSLR) Had Security Protocols? appeared first on The State of Security.

Continue reading What If Your IoT-Enabled Camera (DSLR) Had Security Protocols?

400K UniCredit Customers Affected by Two Data Breaches

Hackers potentially gained unauthorized access to the personal loan accounts belonging to 400,000 customers of UniCredit. On 26 July, the Italian global banking and financial services company sent out an email statement to affected customers. It says the two data breaches occurred in September and October 2016 and June and July 2017. The notice also […]… Read More

The post 400K UniCredit Customers Affected by Two Data Breaches appeared first on The State of Security.

Continue reading 400K UniCredit Customers Affected by Two Data Breaches

Hackers Stole and Then Dumped $8.4M Worth of Veritaseum Tokens

Hackers stole $8.4 million worth of Veritaseum tokens before dumping all of them just a few hours later. On 24 July, Veritaseum (VERI) founder and American entrepreneur Reggie Middleton confirmed the security incident in a post submitted to Bitcoin Forum: “We were hacked, possibly by a group. The hack seemed to be very sophisticated, but […]… Read More

The post Hackers Stole and Then Dumped $8.4M Worth of Veritaseum Tokens appeared first on The State of Security.

Continue reading Hackers Stole and Then Dumped $8.4M Worth of Veritaseum Tokens

Are Bug Bounties a True Safe Harbor?

Security vulnerabilities are becoming the new oil, and the bug bounty economy is booming. As news of cyberattacks and data breaches continue to consume the press, never before has the market for vulnerabilities been so dynamic. “Bug bounty programs”, frameworks where security researchers legally trade previously undiscovered vulnerabilities for monetary and reputational rewards by ethically […]… Read More

The post Are Bug Bounties a True Safe Harbor? appeared first on The State of Security.

Continue reading Are Bug Bounties a True Safe Harbor?

Hidden Mac malware designed to spy on ‘everyday people’

A unique Mac malware family that allows for a hacker to remotely spy on a targeted computer and install additional malicious software has been infecting U.S.-based machines for more than five years, according to Patrick Wardle, director of research with vulnerability testing firm Synack. The actor responsible for the malware, dubbed FruitFly, is believed to be an individual hacker who has over the years continuously updated and improved a distinctive suite of hacking tools tailored for breaking into Apple computers. Based on a forensic analysis of the malware, it’s likely that the hacker is not financially motivated or connected to a foreign intelligence service, said Wardle, a former NSA staffer. “This looks like a single attacker. And based on the malware’s capabilities, it seems like they did some pretty pervasive and intrusive stuff,” Wardle said. “The way the malware works it’s just not very scalable, this isn’t how an APT […]

The post Hidden Mac malware designed to spy on ‘everyday people’ appeared first on Cyberscoop.

Continue reading Hidden Mac malware designed to spy on ‘everyday people’

Hacker Took Over Dark Web Hosting Provider by Exploiting “Major Security Vulnerability”

A hacker took over a dark web hosting provider by exploiting a “major security vulnerability” and thereby accessing a server. On 8 July, an attacker calling themselves “Dhostpwned” set up a shared hosting account on the service offered by Deep Hosting. They used that account to upload two shells on their servers. One was written […]… Read More

The post Hacker Took Over Dark Web Hosting Provider by Exploiting “Major Security Vulnerability” appeared first on The State of Security.

Continue reading Hacker Took Over Dark Web Hosting Provider by Exploiting “Major Security Vulnerability”