Michael Kan

Author Archives: Michael Kan

UK approves extradition of British hacker to the US

A U.K. official has ordered the extradition of a British man to the U.S. on charges of hacking government computers belonging to NASA and the Department of Defense. Lauri Love, a 31-year-old hacktivist, has been fighting his extradition, but on Monday, U.K. Home Secretary Amber Rudd signed the order. "Mr. Love has been charged with various computer hacking offences which included targeting U.S. military and federal government agencies," the U.K. Home Office said in a statement. The U.S. originally charged Love in 2013 for allegedly stealing confidential data from thousands of government employees, including Social Security numbers and credit card details. U.S. investigators accuse Love and his accomplices of causing millions of dollars in damages.To read this article in full or to leave a comment, please click here

UK approves extradition of British hacker to the US

A U.K. official has ordered the extradition of a British man to the U.S. on charges of hacking government computers belonging to NASA and the Department of Defense. Lauri Love, a 31-year-old hacktivist, has been fighting his extradition, but on Monday, U.K. Home Secretary Amber Rudd signed the order. "Mr. Love has been charged with various computer hacking offences which included targeting U.S. military and federal government agencies," the U.K. Home Office said in a statement. The U.S. originally charged Love in 2013 for allegedly stealing confidential data from thousands of government employees, including Social Security numbers and credit card details. U.S. investigators accuse Love and his accomplices of causing millions of dollars in damages.To read this article in full or to leave a comment, please click here

Suspected Russian hackers target US think tanks after election

Hours after Donald Trump won the presidential election, a suspected Russian cyberespionage team was blamed for targeting several U.S. think tanks with phishing emails designed to fool victims into installing malware.On Wednesday, the phishing emails landed in the inboxes of dozens of targets associated with U.S. think tanks and non-governmental organizations, said security firm Volexity.A hacking group called APT 29 or Cozy Bear was behind the attack, according to Veloxity. This is one of the same groups that security experts say was also responsible for hacking the Democratic National Committee and is allegedly tied to the Russian government.To read this article in full or to leave a comment, please click here

Suspected Russian hackers target US think tanks after election

Hours after Donald Trump won the presidential election, a suspected Russian cyberespionage team was blamed for targeting several U.S. think tanks with phishing emails designed to fool victims into installing malware.On Wednesday, the phishing emails landed in the inboxes of dozens of targets associated with U.S. think tanks and non-governmental organizations, said security firm Volexity.A hacking group called APT 29 or Cozy Bear was behind the attack, according to Veloxity. This is one of the same groups that security experts say was also responsible for hacking the Democratic National Committee and is allegedly tied to the Russian government.To read this article in full or to leave a comment, please click here

Worries and uncertainty cloud outlook for digital privacy under President Trump

When President-elect Donald Trump officially takes office, he’ll inherit a powerful U.S. surveillance apparatus, including the National Security Agency, that’s already been accused of trampling over privacy rights.This has some legal experts worried, but like almost every other aspect of a Trump presidency, there are more questions than clarity over what exactly he plans to do.Over the course of his presidential campaign, Trump has only offered snapshots on his views about various U.S. privacy matters, but they suggest a pro-government surveillance stance.For instance, Trump showed support for the NSA’s bulk telephone data collection, which ended last year. “I err on the side of security,” he said at the time. And on Apple's refusal to provide the FBI access to an iPhone used by the San Bernardino shooter: the public should boycott the company until it complies, he said.To read this article in full or to leave a comment, please click here

Worries and uncertainty cloud outlook for digital privacy under President Trump

When President-elect Donald Trump officially takes office, he’ll inherit a powerful U.S. surveillance apparatus, including the National Security Agency, that’s already been accused of trampling over privacy rights. This has some legal experts worried, but like almost every other aspect of a Trump presidency, there are more questions than clarity over what exactly he plans to do. Over the course of his presidential campaign, Trump has only offered snapshots on his views about various U.S. privacy matters, but they suggest a pro-government surveillance stance. For instance, Trump showed support for the NSA’s bulk telephone data collection, which ended last year. “I err on the side of security,” he said at the time. And on Apple's refusal to provide the FBI access to an iPhone used by the San Bernardino shooter: the public should boycott the company until it complies, he said.To read this article in full or to leave a comment, please click here

Competing hackers dampen the power of Mirai botnets

The malware behind last month's massive distributed denial-of-service attack in the U.S. appears to be losing its potency. Ironically, hackers are to blame for diluting its power.  The malware known as Mirai -- which is now available on the internet -- has become a bit too popular in the hacking community, according to security firm Flashpoint.Competing hackers have all been trying to take advantage of Mirai to launch new DDoS attacks. To do so, that means infecting the poorly secured internet-connected devices, such as surveillance cameras, baby monitors, and DVRs, that the malware was designed to exploit.To read this article in full or to leave a comment, please click here

Competing hackers dampen the power of Mirai botnets

The malware behind last month's massive distributed denial-of-service attack in the U.S. appears to be losing its potency. Ironically, hackers are to blame for diluting its power.  The malware known as Mirai -- which is now available on the internet -- has become a bit too popular in the hacking community, according to security firm Flashpoint.Competing hackers have all been trying to take advantage of Mirai to launch new DDoS attacks. To do so, that means infecting the poorly secured internet-connected devices, such as surveillance cameras, baby monitors, and DVRs, that the malware was designed to exploit.To read this article in full or to leave a comment, please click here

China’s vague cybersecurity law has foreign businesses guessing

The most disturbing thing for foreign businesses facing China's new cybersecurity law may just be how vague and broad it is. Under the new law, adopted on Monday and taking effect next June, it's possible that any major company working in the country might be subject to "security reviews" from the Chinese government. Any company involved in telecommunications, information services, finance or any sector "where the loss of data can harm the country's security" is subject to a possible review. But what these security reviews actually entail isn't clear in the law.To read this article in full or to leave a comment, please click here

China’s vague cybersecurity law has foreign businesses guessing

The most disturbing thing for foreign businesses facing China's new cybersecurity law may just be how vague and broad it is. Under the new law, adopted on Monday and taking effect next June, it's possible that any major company working in the country might be subject to "security reviews" from the Chinese government. Any company involved in telecommunications, information services, finance or any sector "where the loss of data can harm the country's security" is subject to a possible review. But what these security reviews actually entail isn't clear in the law.To read this article in full or to leave a comment, please click here

US election day faces specter of cyberattacks

Don't be surprised if hackers make their presence felt on U.S. Election Day. Distributed denial-of-service attacks and high-profile leaks are among the tactics they might use if they try to influence Tuesday's vote. Cybersecurity experts stress it would be incredibly difficult to hack the U.S. election. The system itself is distributed across the country over thousands of voting jurisdictions, making it hard to tamper with on a wide scale.     But hackers could still attempt to sow chaos on Election Day in other ways. The tools and infrastructure to do so are already in place.To read this article in full or to leave a comment, please click here

US election day faces specter of cyberattacks

Don't be surprised if hackers make their presence felt on U.S. Election Day. Distributed denial-of-service attacks and high-profile leaks are among the tactics they might use if they try to influence Tuesday's vote. Cybersecurity experts stress it would be incredibly difficult to hack the U.S. election. The system itself is distributed across the country over thousands of voting jurisdictions, making it hard to tamper with on a wide scale.     But hackers could still attempt to sow chaos on Election Day in other ways. The tools and infrastructure to do so are already in place.To read this article in full or to leave a comment, please click here

DNC hacker calls on brethren to monitor US election

The hacker who claims to have breached the Democratic National Committee isn't done trying to influence this year's election. On Friday, Guccifer 2.0 warned that Democrats might try to rig the vote next Tuesday.Guccifer 2.0 wrote the statement in a new blog post as U.S. federal agencies are reportedly bracing for cyber attacks on election day.The U.S. has already blamed Russia for allegedly meddling with the upcoming election by hacking into political targets, including the DNC, and then leaking the sensitive documents to the public.To read this article in full or to leave a comment, please click here

DNC hacker calls on brethren to monitor US election

The hacker who claims to have breached the Democratic National Committee isn't done trying to influence this year's election. On Friday, Guccifer 2.0 warned that Democrats might try to rig the vote next Tuesday.Guccifer 2.0 wrote the statement in a new blog post as U.S. federal agencies are reportedly bracing for cyber attacks on election day.The U.S. has already blamed Russia for allegedly meddling with the upcoming election by hacking into political targets, including the DNC, and then leaking the sensitive documents to the public.To read this article in full or to leave a comment, please click here

DDoS attack from Mirai malware ‘killing business’ in Liberia

The malware behind last month's massive internet disruption in the U.S. is targeting Liberia with financially devastating results.This week, a botnet powered by the Mirai malware has been launching distributed denial-of-service (DDoS) attacks on IP addresses in the African country, according to security researchers.  These attacks are the same kind that briefly disrupted internet access across the U.S. almost two weeks ago. They work by flooding internet connections with too much traffic, effectively forcing the services offline.To read this article in full or to leave a comment, please click here

DDoS attack from Mirai malware ‘killing business’ in Liberia

The malware behind last month's massive internet disruption in the U.S. is targeting Liberia with financially devastating results.This week, a botnet powered by the Mirai malware has been launching distributed denial-of-service (DDoS) attacks on IP addresses in the African country, according to security researchers.  These attacks are the same kind that briefly disrupted internet access across the U.S. almost two weeks ago. They work by flooding internet connections with too much traffic, effectively forcing the services offline.To read this article in full or to leave a comment, please click here

Flaw in Wix website builder risked computer worm

Wix, the provider of a widely used cloud-based web development platform, appears to have had a significant bug on its hands that could have paved the way for a computer worm to do serious damage to websites around world.The problem was related to an XSS (cross-site scripting) vulnerability that was found in websites built with Wix, according to Matt Austin, a researcher with Contrast Security.Though Wix says it has fixed the issue, it illustrates how a few lines of bad code can  potentially do widespread damage.XSS vulnerabilities are common, and result from flaws in websites' coding.  Hackers can take advantage of them to trick users' browsers into running malicious scripts that, for example, could download a computer virus or expose the internet cookies that are on their machines. Austin found the same kind of problem in websites from Wix, which builds websites and has 87 million users in Europe, Latin America, Asia.To read this article in full or to leave a comment, please click here

Flaw in Wix website builder risked computer worm

Wix, the provider of a widely used cloud-based web development platform, appears to have had a significant bug on its hands that could have paved the way for a computer worm to do serious damage to websites around world.The problem was related to an XSS (cross-site scripting) vulnerability that was found in websites built with Wix, according to Matt Austin, a researcher with Contrast Security.Though Wix says it has fixed the issue, it illustrates how a few lines of bad code can  potentially do widespread damage.XSS vulnerabilities are common, and result from flaws in websites' coding.  Hackers can take advantage of them to trick users' browsers into running malicious scripts that, for example, could download a computer virus or expose the internet cookies that are on their machines. Austin found the same kind of problem in websites from Wix, which builds websites and has 87 million users in Europe, Latin America, Asia.To read this article in full or to leave a comment, please click here

Police across the globe crackdown on darknet marketplaces

Law enforcement agencies across the globe staged a crackdown on so-called darknet web sites last week, targeting marchants and thousands of customers who were looking to obtain illegal drugs and goods.From Oct.22 to the 28th, the agencies took action against merchants and customers that used these sites for illicit items, U.S. Immigration and Customs Enforcement said in a statement on Monday.Unlike other websites, these underground marketplaces reside within the darknet -- a sort of parallel internet accessible to visitors via anonymizing software like Tor. While the software has legitimate uses, such as safeguarding communications in authoritarian countries, it has been adopted for more illicit means.To read this article in full or to leave a comment, please click here

Police across the globe crackdown on darknet marketplaces

Law enforcement agencies across the globe staged a crackdown on so-called darknet web sites last week, targeting marchants and thousands of customers who were looking to obtain illegal drugs and goods.From Oct.22 to the 28th, the agencies took action against merchants and customers that used these sites for illicit items, U.S. Immigration and Customs Enforcement said in a statement on Monday.Unlike other websites, these underground marketplaces reside within the darknet -- a sort of parallel internet accessible to visitors via anonymizing software like Tor. While the software has legitimate uses, such as safeguarding communications in authoritarian countries, it has been adopted for more illicit means.To read this article in full or to leave a comment, please click here

1 14 15 16 17 18 37