The media is delving into the digital life of the teenage shooter who opened fire at McDonald’s in Munich Germany’s Olympia Mall. Nine people were killed and 27 others were injured in the tragic rampage. In the end, he killed himself. So far, it’s been reported that he hacked Facebook to lure victims, bought a gun on the ‘dark net’ and played the ‘violent’ video game Counter-Strike.Shooter hacked a girl’s Facebook account to target and social engineer victims18-year-old mass shooting gunman Ali David Sonboly purportedly used Facebook to social engineer, aka “lure,” victims to McDonald’s. The Telegraph reported that the shooter, who had dual German-Iranian citizenship, had hacked into a “pretty teenage” girl’s Facebook account.To read this article in full or to leave a comment, please click here
Have you opted for lower car insurance premiums via installing an insurance-supplied dongle? If so, then did you realize that dongle could narc you out when brake pedal usage is used a biometric identifier? Kiki der Gecko
If you are thinking surely not, then think again as researchers had nearly a 90% accuracy in identifying drivers via brake pedal sensor data after only 15 minutes of driving.To read this article in full or to leave a comment, please click here
Have you opted for lower car insurance premiums via installing an insurance-supplied dongle? If so, then did you realize that dongle could narc you out when brake pedal usage is used a biometric identifier? Kiki der Gecko
If you are thinking surely not, then think again as researchers had nearly a 90% accuracy in identifying drivers via brake pedal sensor data after only 15 minutes of driving.To read this article in full or to leave a comment, please click here
Democratic National Committee hacker Guccifer 2.0 gave The Hill another batch of pilfered DNC documents; these are different than those files which included information on 11,000 donors given to The Hill last week. At that time, Guccifer had claimed that the press had been forgetting about him, that WikiLeaks was “playing for time” and he still had documents to dump.To read this article in full or to leave a comment, please click here
Democratic National Committee hacker Guccifer 2.0 gave The Hill another batch of pilfered DNC documents; these are different than those files which included information on 11,000 donors given to The Hill last week. At that time, Guccifer had claimed that the press had been forgetting about him, that WikiLeaks was “playing for time” and he still had documents to dump.To read this article in full or to leave a comment, please click here
Technology is not a bad thing; it’s not inherently scary. Sometimes new technology gets misused or tainted with mission creep. Most of the time, tech actually makes our lives easier and better. Here are two tales about “new” tech that could potentially predict the future. One seems scarier than the other.Algorithm to predict at birth if a person will be a criminalAlgorithms control aspects of your life whether you are aware of it or not. They are used to come up with risk scores and even predict the future. But how would you feel about an algorithm that seems to be ripped straight from Minority Report? It would identify criminals far before they could commit a crime since it would “predict at the time of someone’s birth how likely she is to commit a crime by the time she turns 18.”To read this article in full or to leave a comment, please click here
Technology is not a bad thing; it’s not inherently scary. Sometimes new technology gets misused or tainted with mission creep. Most of the time, tech actually makes our lives easier and better. Here are two tales about “new” tech that could potentially predict the future. One seems scarier than the other.Algorithm to predict at birth if a person will be a criminal
Algorithms control aspects of your life whether you are aware of it or not. They are used to come up with risk scores and even predict the future. But how would you feel about an algorithm that seems to be ripped straight from Minority Report? It would identify criminals far before they could commit a crime, since it would “predict at the time of someone’s birth how likely she is to commit a crime by the time she turns 18.”To read this article in full or to leave a comment, please click here
Shortly after Pokemon Go launched in 26 new countries, the servers crashed; while sluggish and/or unresponsive servers shouldn’t surprise anyone, given the app’s popularity even before the added audience from countries across the globe, a hacking collective took credit for the attack.A group of hackers going by “PoodleCorp,” a collective which took credit for hacking popular YouTube channels last month, took to Twitter to claim responsibility for DDoSing the Pokemon Go servers.To read this article in full or to leave a comment, please click here
Shortly after Pokemon Go launched in 26 new countries, the servers crashed; while sluggish and/or unresponsive servers shouldn’t surprise anyone, given the app’s popularity even before the added audience from countries across the globe, a hacking collective took credit for the attack.A group of hackers going by “PoodleCorp,” a collective which took credit for hacking popular YouTube channels last month, took to Twitter to claim responsibility for DDoSing the Pokemon Go servers.To read this article in full or to leave a comment, please click here
Shortly after Pokémon launched in 26 new countries, the servers crashed. While sluggish and/or unresponsive servers shouldn’t surprise anyone, given the app’s popularity even before the added audience from countries across the globe, a hacking collective took credit for the attack.A group of hackers going by “PoodleCorp,” a collective that took credit for hacking popular YouTube channels last month, took to Twitter to claim responsibility for DDoS-ing the Pokémon Go servers.To read this article in full or to leave a comment, please click here
Shortly after Pokémon launched in 26 new countries, the servers crashed. While sluggish and/or unresponsive servers shouldn’t surprise anyone, given the app’s popularity even before the added audience from countries across the globe, a hacking collective took credit for the attack.
A group of hackers going by “PoodleCorp,” a collective that took credit for hacking popular YouTube channels last month, took to Twitter to claim responsibility for DDoS-ing the Pokémon Go servers.To read this article in full or to leave a comment, please click here
Personally, I’m just watching the Pokemon Go craze unfold; if I had considered checking it out by playing, then seeing the unbelievably long list of access permissions the app required put a stop to it immediately before installing.Although you may or may not agree that Pokemon Go is a “government surveillance psyop conspiracy” which has a “direct(-ish)” connection to the CIA, if you play the game then you better grab the latest update. Niantic claimed it pushed out “emergency fixes” since a “coding error” allowed the app to get full access to your Google account.To read this article in full or to leave a comment, please click here
Personally, I’m just watching the Pokemon Go craze unfold. If I had considered checking it out by playing, seeing the unbelievably long list of access permissions the app required would have put a stop to it immediately before installing.Although you may or may not agree that Pokemon Go is a “government surveillance psyop conspiracy” that has a “direct(-ish)” connection to the CIA, if you play the game then you better grab the latest update. Niantic claimed it pushed out “emergency fixes” since a “coding error” allowed the app to get full access to your Google account.To read this article in full or to leave a comment, please click here
For July, Microsoft released 11 security bulletins, six of which were rated critical due to remote code execution (RCE) vulnerabilities.CriticalMS16-084 is the cumulative patch for Internet Explorer, fixing a plethora of RCE problems that an attacker could exploit if a victim viewed a maliciously crafted webpage using IE. The security update also addresses spoofing vulnerabilities, security feature bypass and information disclosure flaws.MS16-085 is the monthly cumulative security update for Microsoft’s Edge browser. The most severe vulnerabilities could allow RCE. The patch also resolves security feature bypass issues, information disclosure problems and many memory corruption flaws.To read this article in full or to leave a comment, please click here
For July, Microsoft released 11 security bulletins, six of which were rated critical due to remote code execution (RCE) vulnerabilities.CriticalMS16-084 is the cumulative patch for Internet Explorer, fixing a plethora of RCE problems that an attacker could exploit if a victim viewed a maliciously crafted webpage using IE. The security update also addresses spoofing vulnerabilities, security feature bypass and information disclosure flaws.MS16-085 is the monthly cumulative security update for Microsoft’s Edge browser. The most severe vulnerabilities could allow RCE. The patch also resolves security feature bypass issues, information disclosure problems and many memory corruption flaws.To read this article in full or to leave a comment, please click here
It’s not only cyber thugs interested in the Pokemon Go app, but crooks in real life as well. Armed robbers were reportedly using the app’s geolocation feature to lure victims to secluded locations.The “robbery part made sense” to the cops, but not the augmented reality game in which players walk around in the real world searching for Pokemon. Players can drop a Lure model in a real world location which last for 30 minutes to attract players to that location. O’Fallon Missouri Police Sgt. Phil Hardin told the St. Louis Post-Dispatch “that ‘younger, geeky officers’ had to fill in their colleagues about some of what the victim was describing.”To read this article in full or to leave a comment, please click here
It’s not only cyber thugs interested in the Pokemon Go app, but crooks in real life as well. Armed robbers were reportedly using the app’s geolocation feature to lure victims to secluded locations.The “robbery part made sense” to the cops, but not the augmented reality game in which players walk around in the real world searching for Pokemon. Players can drop a Lure model in a real world location which last for 30 minutes to attract players to that location. O’Fallon Missouri Police Sgt. Phil Hardin told the St. Louis Post-Dispatch “that ‘younger, geeky officers’ had to fill in their colleagues about some of what the victim was describing.”To read this article in full or to leave a comment, please click here
After a person claiming to be a security researcher “declared war on the Baton Rouge police” and took credit for the data breach after the shooting death of Alton Sterling, he took aim at Amazon. 0x2Taylor
In a Twitter direct message, hacker @0x2Taylor told Mic the he and a buddy “’breached a server’ owned by Amazon that contained database files with more than 80,000 Kindle users’ information.”To read this article in full or to leave a comment, please click here
After a person claiming to be a security researcher “declared war on the Baton Rouge police” and took credit for the data breach after the shooting death of Alton Sterling, he took aim at Amazon. 0x2Taylor
In a Twitter direct message, hacker @0x2Taylor told Mic the he and a buddy “’breached a server’ owned by Amazon that contained database files with more than 80,000 Kindle users’ information.”To read this article in full or to leave a comment, please click here
Thieves armed with laptops are hacking into electronic ignitions of late-model cars to steal the vehicles. Police and insurers sounded the warning to raise awareness about the latest car-theft trend.The Houston Police Department pointed at surveillance footage that shows two suspects, one of whom used a laptop, before stealing a 2010 Jeep Wrangler Unlimited. The first suspect opened the Jeep’s hood to reportedly cut the alarm. The footage below took place about 10 minutes later when a second suspect jimmied the door open, climbed inside and then did something with a laptop before stealing the Jeep.
“If you are going to hot-wire a car, you don’t bring along a laptop,” Houston Police Department Officer James Woods told the Wall Street Journal. “We don’t know what he is exactly doing with the laptop, but my guess is he is tapping into the car’s computer and marrying it with a key he may already have with him so he can start the car.”To read this article in full or to leave a comment, please click here