recentpopularlog in

ahasteve : hacking   12

Email 'phishing' attacks by hackers growing in number, intensity -
Fake emails get harder to distinguish from real ones as hackers use 'phishing' attacks to access company and government data.
trends  phishing  2013  July  Summer  hackers  Hacking 
august 2013 by ahasteve
A costly lesson that your email — and money — aren't safe -
Williams has served as producer, executive producer or associate producer on more than two dozen movies, including "Ragtime," "Daredevil," "Star Trek: Generations" and a little something called "A Clockwork Orange." Maybe it's fair to say that if Alex and his droogs were around today, they'd be hackers. Williams told me he received a call from his accountant earlier this month with some questions about a wire transfer to a Texas bank that Williams had instructed him by email to make. "I said I never asked for a wire transfer," he recalled. "My accountant said that I had asked for the transfer and even confirmed it in a separate email." Turned out that not only had someone gained access to Williams' Gmail account, the hacker also had perused enough of Williams' correspondence to figure out who his accountant was and how to tailor an email that would seem as if Williams had written it, including references to past conversations. The hacker apparently kept such a close enough watch o
Winter  2012  USWest  California  LakeArrowhead  security  privacy  Texas  bank  hackers  gmail  notes  Hacking 
december 2012 by ahasteve
Kill the Password: Why a String of Characters Can't Protect Us Anymore | Gadget Lab |
The age of the password has come to an end; we just haven’t realized it yet. And no one has figured out what will take its place. What we can say for sure is this: Access to our data can no longer hinge on secrets—a string of characters, 10 strings of characters, the answers to 50 questions—that only we’re supposed to know.
The only way forward is real identity verification: to allow our movements and metrics to be tracked in all sorts of ways and to have those movements and metrics tied to our actual identity.
Fall  2012  November  Google  Apple  Amazon  identity  security  password  hacker  hacking  privacy  notes 
december 2012 by ahasteve
How I Got My Digital Life Back Again After An Epic Hacking | Gadget Lab |
I’m a heavy 1Password user. I use it for everything. That means most of my passwords are long, alphanumeric strings of gibberish with random symbols. It’s on my iPhone, iPad and Macbook. It syncs up across all those devices because I store the keychain in the cloud on Dropbox. Update a password on my phone, and the file is saved on Dropbox, where my computer will pull it down later, and vice versa. But I didn’t have it on any of our other systems. So now I couldn’t get to my keychain. And so I was stuck in a catch-22. My Dropbox password was itself a 1password-generated litany of nonsense. Without access to Dropbox, I couldn’t get my keychain. Without my keychain, I couldn’t get into Dropbox. And then I remembered that I had also used Dropbox previously on my wife’s machine. Had I stored the password there? Five hours after the hack started, still locked out of everything, I flipped open the lid of her computer, and nervously powered it up. And there it was: my Dropbox. And in it, m
Summer  2012  August  trends  privacy  hacking  Gmail  Amazon  CloudComputing  Dropbox  MacBook  iPad  iPhone  1Password  AppleID  notes  security  iCloud 
august 2012 by ahasteve
How Apple and Amazon Security Flaws Led to My Epic Hacking | Gadget Lab |
In the space of one hour, my entire digital life was destroyed. First my Google account was taken over, then deleted. Next my Twitter account was compromised, and used as a platform to broadcast racist and homophobic messages. And worst of all, my AppleID account was broken into, and my hackers used it to remotely erase all of the data on my iPhone, iPad, and MacBook. In many ways, this was all my fault. My accounts were daisy-chained together. Getting into Amazon let my hackers get into my Apple ID account, which helped them get into Gmail, which gave them access to Twitter. Had I used two-factor authentication for my Google account, it’s possible that none of this would have happened, because their ultimate goal was always to take over my Twitter account and wreak havoc. Lulz. Had I been regularly backing up the data on my MacBook, I wouldn’t have had to worry about losing more than a year’s worth of photos, covering the entire lifespan of my daughter, or documents and e-mails that
Summer  2012  August  trends  privacy  hacking  Gmail  Amazon  MacBook  iPad  iPhone  Twitter  Google  AppleID  notes  security  iCloud 
august 2012 by ahasteve

Copy this bookmark:

to read