recentpopularlog in

asterisk2a : phishing   42

Six grand and a Rolex: lure of riches sucked me into online fraud | Technology | The Guardian
The scale of cybercrime has ballooned in recent years. The latest data from UK Finance, the voice of the banking industry, put the amount stolen by criminals in the first six months of last year at £616m. Of this, £207.5m went in scams where people were duped into authorising a payment to an account controlled by a criminal.

Officially known as authorised push payment (APP) fraud, it includes cases where criminals hack email accounts and convince consumers to send large sums to criminal accounts. It is these recipient accounts that have originated through people like Carlos – the money mules.
cybercrime  fraud  scam  phishing  social  engineering  cyber  security  crime  organised 
29 days ago by asterisk2a
(8) Why biometric security fails at being secure - YouTube
Why biometric security fails at being secure. can't change your finger
on a long enough timescale - your fingerprint of face will be re-created
high resolution photo can replicate fingerprint. can't change fingerprint nor face
don't need to photograph. just steal them. all of them. in an attack.
this will happen eventually.

& The New Attack Surface is Your Life - https://www.youtube.com/watch?v=AQP0On85ZdQ
- hackers spend millions, you spend 0, = hackers win. if they target you.

& Phone numbers can not be highjacked as well
These 7 Digits May Be More Important Than Your Social Security Number
https://www.youtube.com/watch?v=5yPyOhIplzA
running your life through one device - you are vulnerable
- have burner phone number for contacts

https://www.theguardian.com/money/2020/feb/23/scams-fraud-banking-co-operative-reforms-victims-refund
biometric  fingerprint  security  cyber  IT  identity  theft  2FA  phone  number  sim  jacking  swapping  ransomware  phishing  impersonation  social  engineering 
5 weeks ago by asterisk2a
(1) UNINSTALL This Windows 10 Update RIGHT NOW - YouTube
quiet the amount of energy put in into Bitcoin Scam/Pyramid Schemes - send out to word. Hijack youtube channels through elaborate phishing.
send email impersonating cusomer support or being sponsor.
ask to download an app - eg games streamers asked to download an app to test. for sponsor ship. app then download the youtubers/twitch session cockies. which are then used to high jack the account.
one prominent POE YouTuber, GhazzyTV got his YT account highjacked.
Bitcoin  scam  phishing  cookies  sessions  cyber  IT  security  2FA 
5 weeks ago by asterisk2a
Couple scammed out of £57,000 fear being homeless at Christmas | Money | The Guardian
doesn't even need social engineering. just very targeted, knowing their business, hacking attack (eg phishing through password change see podesta) and remain undetected for a long time just listening in on the email inbox. and jumping in when the situation comes. // in the end encryption didn't help. would help if there were a 2-auth process for those transactions (business ops, business it security) if you cant be 100% sure that your employees fall for phishing, impersonation, or social engineering (there have been reports of secretaries and assistants falling for social engineering to transfer large amounts for bogus but believable business transactions)
phishing  fraud  scam  cyber  IT  security  private  end  user  social  engineering  crime  impersonation  identity 
november 2017 by asterisk2a
From a Culture of Connectivity to a Platform Society
transform, change public life and social life. [...] participatory culture (reality is sometimes less than 1% create of the 100% that consume. [,,,] give away your user data, get service for free. it became a economic transaction. user data is currency. [...] harmful for people, but no discussion about harms to society and public life (self-censorship) & rise in vanity, Selbstdarstellung! Also filter bubble. Revenge Porn. Stalking. Cyber bullying and cyber mobbing. Phishing for your data, enabling cyber crime. [...] hidden norms and values [...] not a level playing field [pay to play] [...]
Platfom  Silo  Open  Platform  EULA  TOS  Social  Media  Facebook  Twitter  Instagram  winner  take  all  Strava  Google  News  Google  Inc.  Uber  Silicon  Valley  mobile  homescreen  Brand  Gesellschaft  society  WhatsApp  Public  Life  AirBnB  book  Web  2.0  Tinder  user  data  Privacy  Internet  Privacy  sharing  economy  Gig  YouTube  self-censorship  Big  advertisement  re-targeting  advertisement  targeting  Selbstdarstellung  Selfie  filter  bubble  Newsfeed  revenge  porn  stalking  cyber  mobbing  cyber  bullying  phishing  cyber  crime  self-regulation  NextDoor  Amazon  4chan  Reddit 
april 2016 by asterisk2a
Hacked! - Tech Weekly podcast by Guardian Tech Weekly
book - @War: The Rise of the Military-Internet Complex3 Nov 2015 by Shane Harris // Doomsday Scenarios: breaking the internet, bringing down electricity grid, transportation/infrastructure, nuclear plant, manipulating digital money vault/value exchanges, << low probability - high impact >> distrust/lost trust.
cyber  war  industrial  espionage  scam  phishing  scam  corporate  espionage  cyber  espionage  USA  UK  Cina  Russia  Israel  Five  Eyes  NSA  GCHQ  Surveillance-Industrial  Complex  surveillance  state  military–industrial  foreign  affairs  Hegemony  foreign  policy  Intelligence  foreign  relations  book  Smart  Grid  encryption  Cryptopocalypse  cryptography  cyber  security  IT  password  security  energy  security 
october 2015 by asterisk2a
TalkTalk cyber attack: Company admits it could have done more to protect customers' information | Crime | News | The Independent
The attack exposed the latest security failure for the company, which was forced to admit it had not encrypted some personal details of customers. The hackers appeared to have stolen details that amount to a full toolkit for fraud including names, addresses and bank account information.
cyber  attack  encryption  phishing  scam  phishing  cyber  crime  cyber  security  cyber  war 
october 2015 by asterisk2a
Cyber attack warning after millions stolen from UK bank accounts | Technology | The Guardian
The NCA added: “Computers become infected with Dridex malware when users receive and open documents in seemingly legitimate emails. The NCA assesses there could be thousands of infected computers in the UK, the majority being Windows users.”
phishing  phishing  scam  cyber  attack  cyber  security  IT 
october 2015 by asterisk2a
Tech Firm Ubiquiti Suffers $46M Cyberheist — Krebs on Security
via bit.ly/1J55suT // Networking firm Ubiquiti Networks Inc. disclosed this week that cyber thieves recently stole $46.7 million using an increasingly common scam in which crooks spoof communications from executives at the victim firm in a bid to initiate unauthorized international wire transfers. [...] Known variously as “CEO fraud,” and the “business email compromise,” the swindle that hit Ubiquiti is a sophisticated and increasingly common one targeting businesses working with foreign suppliers and/or businesses that regularly perform wire transfer payments. In January 2015, the FBI warned that cyber thieves stole nearly $215 million from businesses in the previous 14 months through such scams, which start when crooks spoof or hijack the email accounts of business executives or employees.
phishing  phishing  scam  spoofing  cyber  security  IT  internet  security  online  security 
august 2015 by asterisk2a
Android-Smartphones: 950 Millionen Geräte durch Sicherheitslücke bedroht - SPIEGEL ONLINE
bit.ly/1S80wJW "Built on tens of gigabytes of source code from the Android Open Source Project (AOSP), the leading smartphone operating system carries a scary code in its heart. Named Stagefright, it is a media library that processes several popular media formats. Since media processing is often time-sensitive, the library is implemented in native code (C++) that is more prone to memory corruption than memory-safe languages like Java. [...] Unlike spear-phishing, where the victim needs to open a PDF file or a link sent by the attacker, this vulnerability can be triggered while you sleep. Before you wake up, the attacker will remove any signs of the device being compromised and you will continue your day as usual – with a trojaned phone. // Opportunism, publishing exploit/vulnerability to public without giving Google & Co enough time to fix it. Just to make money ... "[we can protect protect] enterprise customers from Stagefright vulnerability."
Android  IT  Security  Google  exploit  memory  corruption  phishing  ethical  machine  Mozilla  Mozilla  Foundation 
july 2015 by asterisk2a
Spam might not clog your inbox any longer. But what about your life? | Oliver Burkeman | Comment is free | The Guardian
But this raises a question. If spamming is about abusing the resource of other people’s attention, the ethos of spam is everywhere: in clickbait headlines that promise far more than they deliver; in tweets that exploit the “curiosity gap” by tantalizingly omitting key information; in the daily email I now receive – it isn’t spam, technically, because I agreed to it – from a clothing store where I once bought one shirt. Scroll to the fetid lower reaches of many a reputable site and you’ll find links (provided, most often, by Outbrain or Taboola) to the products of content farms, or, as Brunton describes them: “vast algal blooms of linked content with catchy titles, top-10 lists about trending topics, wild claims and needlessly contrarian stances.” None of these were written because a journalist thought the topic mattered; they’re created in response to what’s trending, to exploit the attention already gathered. // Your attention/focus is a limited resource. see book Information Diet
Spam  attention  span  Linkbait  linkbaiting  Clickbait  click  bait  copywriting  phishing  book  Listicle  BuzzFeed  productivity  user  behaviour  finite  resources  life  hacker  life  lesson  focus  e-mail 
july 2015 by asterisk2a
Banks not liable in most vishing fraud, says Ombudsman - BBC News
In nearly two-thirds of cases the Financial Ombudsman Service (FOS) found that banks were not responsible for victims' losses. It looked at 200 examples of the telephone fraud, in which account holders lost up to £100,000 each. But it ruled that the bank was liable for those losses in only 37% of cases. In 63% of them, consumers were left without compensation, having, in effect, given their own money away.
phishing  phishing  scam 
july 2015 by asterisk2a
US targets 'insider trading' hackers - BBC News
He said that the SEC had asked for information on the tactics of the hackers - who often target employees with phishing emails that take them to fake websites that steal passwords and other information. The SEC has not confirmed who is involved in its investigation.
phishing  phishing  scam  cyber  war  cyber  espionage  corporate  espionage  industrial  espionage  SEC  IT  Security 
june 2015 by asterisk2a
BND-Chef Schindler verteidigt Kooperation mit NSA - SPIEGEL ONLINE
BND-Präsident Schindler hat vor dem Untersuchungsausschuss des Bundestags ein flammendes Plädoyer für die Zusammenarbeit mit der NSA gehalten. Eindringlich warnte er, dass die Spionageaffäre die Zukunft des BND infrage stelle. // Die BND-Affäre weitet sich aus: Der deutsche Geheimdienst hat in den vergangenen Wochen nach Informationen des SPIEGEL mehr als 400.000 weitere NSA-Selektoren entdeckt. Darunter befanden sich erneut europäische Ziele. - http://www.spiegel.de/politik/deutschland/bnd-affaere-weitere-listen-mit-brisanten-suchbegriffen-a-1035018.html &! &! Cyberangriff auf Parlament: IT-Spezialisten können Bundestagstrojaner nicht stoppen - http://www.spiegel.de/netzwelt/netzpolitik/bundestag-experten-koennen-trojaner-nicht-stoppen-a-1035006.html - Targeted Trojan = targeted specific phishing (DAU, user exploit) = gov funded/led bc resource intensive & needs knowledge of infrastructure "Bundestagssoftware/Parlakom" & people within Bundestag using it for what ever purpose.
BND  NSA  Five  Eyes  Foreign  Intelligence  corporate  espionage  industrial  espionage  cyber  espionage  cyber  war  cyber  crime  cyber  attack  USA  UK  GCHQ  presidency  barackobama  Europe  Trojan  phishing  NSA-Affäre  Edward  Snowden  cablegate  Wikileaks  Whistleblower  Career  Politicians  GroKo  Angela  Merkel  China  Israel  Russia 
may 2015 by asterisk2a
Cyberangriff auf Bundestag: Offenbar auch Rechner von Regierungsmitgliedern betroffen - SPIEGEL ONLINE
[ if they were able to install a trojan/malware/bot - it is most likely to be the case of highly customized targeted phishing attack on peoples email address. could be gov backed. most likely (Israel, China, USA, UK, Russia, ...) New/customized, not recognizable by existing signatures known - thus antivirus useless, only recognizable by looking at logs and co. ] Fachleute halten es sogar für möglich, dass weite Teile der Bundestags-IT komplett neu konfiguriert werden müssen. [...] Sicherheitshalber wurden Ende vergangener Woche Teile des Bundestags-Systems zeitweise heruntergefahren. Darunter fielen offenbar auch Laufwerke des Parlamentarischen Untersuchungsausschusses zur Aufklärung der BND/NSA-Spionageaffäre. <<< [ Frage fuer die BPK wie kompetent sind Bundestagsabgeordnete? Sicherheitstraining? ] // 1 Tag spaeter bit.ly/1IPJmK7 Ermittler vermuten Geheimdienst hinter Cyberangriff &! bit.ly/1LcaCBI Die Bundesregierung zerstört aktiv [...] vertrauen. &! tcrn.ch/1R4xrLu bit.ly/1LpTngO
cyber  war  corporate  espionage  industrial  espionage  cyber  espionage  cyber  crime  cyber  security  cyber  attack  Germany  DAU  phishing  IT  password  security  GroKo  Career  Politicians  Angela  Merkel  trust  confidence  No  Representation  Vorratsdatenspeicherung  surveillance  state  Orwellian  BND  Internet  Privacy  Privacy  corruption  abuse  of  power  apathy  Protest  Kultur  short-term  thinking  short-term  view 
may 2015 by asterisk2a
Cyber-attacks hit British Airways, GitHub and Slack - BBC News
[the weakest link] A spokesman for BA said that it believed only "a small number" of its frequent flyers were affected. "This appears to have been the result of a third party using information obtained elsewhere on the internet, via an automated process, to try to gain access to some accounts," he said.
cyber  attack  phishing  cyber  security  cyber  crime  IT 
march 2015 by asterisk2a
Start Ups Should Prioritize Security, Even at the Earliest Stages - YouTube
>> weakest link is human being in the middle - thus need advisory/consulting/one person hire whose sole focus is it to make the org and tech secure and the people savvy. &! &! Five Easy Steps to Secure Your Startup - https://www.youtube.com/watch?v=SBWHWCFm9xQ - 1. get rid of MS Office - use Google Docs or other secure online secure office docs replacement / 2. Use ONE dedicated machine for online banking/finance (netbook) / 3. two-factor authentication - especially email / 4. do background checks / 5. plus teach savvyness in password choice and tools, general awareness and general security issues ie targeted phishing etc etc - on regular (updated) basis ... "most if not all attacks start with phishing"
IT  Security  Start-Up  lesson  Start-Up  advice  cyber  war  cyber  attack  DDoS  encryption  cryptography  Cryptopocalypse  cyber  cyber  crime  internet  online  password  phishing  phishing  scam  two-factor  authentication 
february 2015 by asterisk2a
I challenged hackers to investigate me and what they found out is chilling | PandoDaily
see Planning section; all the vectors of attack // and the weakest component is almost always the human being in some sort of way.
corporate  espionage  cyber  espionage  industrial  espionage  espionage  Foreign  Intelligence  NSA  CIA  surveillance  state  Orwellian  IT  Security  cyber  internet  online  password  cyber  war  cyber  attack  cyber  crime  FISA  Court  Warrant  wiretapping  FISAAA  black  hat  hacker  white  hat  hacker  phishing  phishing  scam 
february 2015 by asterisk2a
The phishers have arrived, look to profit from Anthem’s data breach | PandoDaily
The attack is thought to have come from a state-sponsored hacking group from China, which has stolen data from foreign companies and the United States military in the past. Anthem would be a particularly valuable target for state-sponsored hackers because it has information about much of the military — and none of it was encrypted prior to this breach.
phishing  phishing  scam  complexity  opportunist  cyber  war 
february 2015 by asterisk2a
Men Blaming Jennifer Lawrence & Kate Upon for Nude Pics Leak, Hate NSA Spying - YouTube
http://techcrunch.com/video/samsung-gear-icloud-hacks-and-sarah-goes-to-burning-man/518402327/ - "Samsung Gear, iCloud Hacks And Sarah Goes To Burning Man - September 5, 2014" +++ !!! >>> http://betabeat.com/2014/09/spare-us-the-sanctimony-the-gross-hypocrisy-of-online-media-in-the-nude-photo-leak/ >> via http://www.reddit.com/r/TrueReddit/comments/2ffxoj/spare_us_the_sanctimony_the_gross_hypocrisy_of/ "No one complained about the release of Pam Anderson's wedding sex tape. No one complained about the relase of Scarlett Johansson's pics. People mocked Anthony Weiner, people mocked Hulk Hogan. I mean honestly, mocking? You are not offended for them? You are not hurt, you are really honestly mocking them? But if it suddenly happens to some one you happen to like then its awful and horrible and no good." +++ WORLD NEEDS MORE FEMALE HACKERS - youtu.be/UrsJHB8C36Q +++ wrd.cm/1q8LJiP +++ bit.ly/1wcMZSB +++ !!! bit.ly/1xqBDPb !!!
n00d  Celeb  Trading  Ring  Celebgate  AnonIB  4chan  Reddit  Apple  user  experience  imgur  Celebrity  of  You  culture  gossip  culture  gossip  status  anxiety  status  symbol  social  status  The  Fappening  TheFappening  Sexual  objectification  objectification  darknet  iCloud  rippers  Misogynie  misogyny  feminism  feminist  revenge  porn  society  consent  Privacy  Internet  Privacy  DAU  victim  blame  blamegame  cyber  crime  cyber  attack  cyber  security  cyber  mobbing  cyber  bullying  cyber  espionage  security  online  security  password  security  two  factor  authentication  two  factor  verification  engineering  phishing  brute  force  attack  slut  shaming  everyday  sexism  sexism  sexismus  sexualität  Intimate  relationship  hypocrisy  Daily  Mail  News  Corp.  Gawker  Tabloid 
september 2014 by asterisk2a
After celebrity nude leaks, Apple is finally taking security a little more seriously | PandoDaily
Now it seems that Apple is at least attempting to make its efforts to fix obvious security problems with its service a little easier to understand. I’m sure that has more to do with the allegations that it was responsible for the reprehensible leak of stolen nude photographs than with a new sense of responsibility to consumers, but we’ll have to take what we can get. Maybe the lesson will stick and the company will decide to be a little more forthcoming in the future. There is no reasonable expectation of perfect security in modern society, but we can at least strive for transparency from companies like Apple when our privacy is threatened. Better to know that something can’t be kept secure than to think it’s safe and remain ignorant of any threats.
n00d  Celeb  Trading  Ring  Celebgate  AnonIB  4chan  Reddit  Apple  user  experience  imgur  The  Fappening  TheFappening  iCloud  rippers  Privacy  Internet  Privacy  DAU  cyber  crime  cyber  attack  cyber  security  cyber  mobbing  cyber  bullying  cyber  espionage  security  online  security  password  security  two  factor  authentication  two  factor  verification  Social  engineering  phishing  brute  force  attack  communication  PR  public  relations  language 
september 2014 by asterisk2a
Fappening: Lawrence, Dunst, Upton - Nacktbilder von Promis - SPIEGEL ONLINE
Schon wieder sind die Frauen schuld. Dabei erklärt sich die Tatsache, dass weniger Männer-Nacktbilder durch das Netz geistern, vermutlich nicht allein dadurch, dass die Herren der Sicherheit von Apple weniger vertraut haben und bessere Schutzsysteme hatten. Sondern durch die Tatsache, dass die nackten Männer kaum jemanden interessieren. Ein nackter Mann ist ein nackter Mann. Ein Bild von einer nackten Frau, das sie angreifbar macht, ist für viele ein Grund, sich daran aufzugeilen und einen Kommentar abzugeben. Und dann ist da noch die große Frage, die über der ganzen Debatte schwebt: Warum nehmen sich Menschen überhaupt nackt auf? Für viele eine klare Sache: Eitelkeit. Entsprechende Kommentare sind von Häme durchdrungen. Sie missachten, dass Frauen nicht zwangsläufig Nacktbilder aufnehmen, um einem Mann einen Gefallen zu tun. Für viele sind sie Ausdruck, dass ihr Körper, ihre Sexualität, ihnen gehört. Sie machen Aufnahmen von sich und für sich.
n00d  Celeb  Trading  Ring  Celebgate  AnonIB  4chan  Reddit  Apple  user  experience  imgur  Celebrity  of  You  culture  gossip  culture  gossip  status  anxiety  status  symbol  social  status  The  Fappening  TheFappening  Sexual  objectification  objectification  darknet  iCloud  rippers  Misogynie  misogyny  feminism  feminist  revenge  porn  society  consent  Privacy  Internet  Privacy  DAU  victim  blame  blamegame  cyber  crime  cyber  attack  cyber  security  cyber  mobbing  cyber  bullying  cyber  espionage  security  online  security  password  security  two  factor  authentication  two  factor  verification  engineering  phishing  brute  force  attack  slut  shaming  everyday  sexism  sexism  sexismus  sexualität  Intimate  relationship 
september 2014 by asterisk2a
A Letter To Jennifer Lawrence | TechCrunch
If I and other industry reporters like Mat Honan don’t know how exactly to absolutely protect ourselves, because the targets and tools are always changing, how will people who don’t have our exposure to tech? The onus is on Apple and other tech platforms like Google, Facebook, Amazon and Microsoft to keep their customers — us — safe. Though stolen photos are being shared that have been extracted from Android and Windows Phone backups, too, I’m singling out Apple here because Apple, beyond any other tech company, prides itself on a seamless consumer experience. It’s done a very good job of hiding the technical aspects of its products for the sake of user friendliness: “It just works.” Well, not in this case. +++ !!! http://www.huffingtonpost.com/2014/09/03/seth-green-huff-post_n_5761508.html + huff.to/WbN24c
n00d  Celeb  Trading  Ring  Celebgate  AnonIB  4chan  Reddit  Apple  user  experience  imgur  Celebrity  of  You  culture  gossip  culture  gossip  status  anxiety  status  symbol  social  status  The  Fappening  TheFappening  Sexual  objectification  objectification  darknet  iCloud  rippers  Misogynie  misogyny  feminism  feminist  revenge  porn  society  consent  Privacy  Internet  Privacy  DAU  victim  blame  blamegame  cyber  crime  cyber  attack  cyber  security  cyber  mobbing  cyber  bullying  cyber  espionage  security  online  security  password  security  two  factor  authentication  two  factor  verification  engineering  phishing  brute  force  attack  slut  shaming  everyday  sexism  sexism  sexismus 
september 2014 by asterisk2a
The Great Naked Celebrity Photo Leak of 2014 is just the beginning | Roxane Gay | Comment is free | theguardian.com
There will always be another leak, because there is always curiosity in the bodies of nude celebrity women. There is always danger in being an Other. [...] It goes without saying that there aren’t many nude photos of men being released. Men are largely free to bare their bodies as they choose without repercussion, unless, as is the case of Dave Franco with Allison Brie and Justin Verlander with Upton, the man happens to be in a picture with a young woman, collateral damage. [...] BREAKING: beneath their clothes, celebrities are naked. What these people are doing is reminding women that, no matter who they are, they are still women. They are forever vulnerable. [revenge porn, rules are different for girls, all happened without consent, it is a crime, like breaking in into someone's home & stealing personal belongings] + bit.ly/1sYcSTO + bbc.in/1qmjnkU "And it's not fair to blame the victims of crime who may have simply been following the instructions websites" + huff.to/Y9V13m
Celebrity  of  You  n00d  Celeb  Trading  Ring  culture  Celebgate  gossip  culture  gossip  status  anxiety  status  symbol  social  status  The  Fappening  TheFappening  Sexual  objectification  objectification  darknet  4chan  AnonIB  iCloud  rippers  Misogynie  misogyny  feminism  feminist  revenge  porn  society  consent  Privacy  Internet  Privacy  DAU  victim  blame  blamegame  cyber  crime  cyber  attack  cyber  security  cyber  mobbing  cyber  bullying  cyber  espionage  security  online  security  password  security  two  factor  authentication  two  factor  verification  engineering  phishing  brute  force  attack  Apple  slut  shaming  everyday  sexism  sexism  sexismus 
september 2014 by asterisk2a
Notes on the Celebrity Data Theft | Hacker News
!!! - https://www.nikcub.com/posts/notes-on-the-celebrity-data-theft/ "In reviewing months worth of forum posts, image board posts, private emails, replies for requests for services, etc. nowhere was the FindMyPhone API brute force technique (revealed publicly and exploited in iBrute) mentioned. This doesn’t mean that it wasn’t used privately by the hackers – but judging by the skill levels involved, the mentions and tutorials around other techniques and some of the bragged about success rates with social engineering, recovery, resets, rats and phishing – it appears that such techniques were not necessary or never discovered. [...] Timestamps, forum posts and other data suggests that the collection was built up over a long period of time. [...] In terms of staying secure the most obvious solutions are to pick a better password, set your security answers to long random strings and enable two-factor authentication. [+] ring-fence your email [private & public & communication]."
phishing  phishing  scam  Social  engineering  Hacking  two  factor  authentication  two  factor  verification  online  security  internet  security  encryption  Privacy  Privacy  gossip  culture  gossip  Celebrity  of  You  culture  cyber  security  cyber  attack  cyber  crime  Apple  Cloudstorage  cloud  iCloud  Dropbox  AWS  S3  leak  passwords  password  password  security  password  integrity  Sexual  objectification  objectification  consent  brute  force  attack  FBI  n00d  Celeb  Trading  Ring  AnonIB  4chan  Reddit  TheFappening  Celebgate  imgur  Twitter  iCloud  rippers  DAU 
september 2014 by asterisk2a
Tone deaf Mt. Gox CEO Mark Karpeles warns the world about the dangers of hackers | PandoDaily
"Recent events show that with appropriate motivation anything can be hacked.Maybe everyone should stop and think about what it means for them" - Karpeles tweet would appear to be a reference to the recent celebrity hacking scandal which has seen nude photos of several female stars published online, with extortion request sent to prevent the release of others. (Ironically, many of these demands were for payment in bitcoin.) Even if it weren’t for Karpeles’ track record with alleged hacking attacks, the tweet would nevertheless have been ill-advised. As many other public figures have learned, any hint at victim-blaming in this instance is sure to draw criticism. Combine this with the fact that Karpeles’ nearly bankrupted thousands of people, and this comment warrants a special kind of outrage.
phishing  phishing  scam  Social  engineering  Hacking  two  factor  authentication  two  factor  verification  online  security  internet  security  encryption  Privacy  Privacy  gossip  culture  gossip  Celebrity  of  You  culture  cyber  security  cyber  attack  cyber  crime  Apple  Cloudstorage  cloud  iCloud  Dropbox  AWS  S3  leak  passwords  password  password  security  password  integrity  Sexual  objectification  objectification  consent  brute  force  attack  FBI  n00d  Celeb  Trading  Ring  AnonIB  4chan  Reddit  TheFappening  Celebgate  imgur  Twitter  iCloud  rippers 
september 2014 by asterisk2a
Apple - Press Info - Re: Celebgate / The Fappening / 4Chan / AnonIB / iCloud rippers / n00d Celeb Trading Ring
bit.ly/1uvDa0P "This statement, which probably had several thousand pairs of lawyer eyeballs on it before it was sent to the press, is slippery. [&] iCloud rippers" || From the Statement: "To protect against this type of attack, we advise all users to always use a strong password and enable two-step verification." + @SwiftOnSecurity "Celebrity photo leak being result of an amalgam of targeted attacks instead of 1 iCloud vulnerability explains inconsistent data and leaks." + @pmarca "Subtext for iCloud hacks: "Security questions" are a bad idea -- too easily guessed, particularly for public figures. Known problem!" + @cdixon "Services that repeatedly ask for passwords on mobile devices encourage weak passwords." + bit.ly/1q86n2z - "I’m talking about the fact that people won’t feel the same way about their phones after this." + anon-ib.com down as of recently + bit.ly/1vKzfks "Apple is now attempting to distance its service from any fault in the hacks." + bit.ly/1rhC9Ky + bit.ly/W7V3H2
phishing  phishing  scam  Social  engineering  Hacking  two  factor  authentication  two  factor  verification  online  security  internet  security  encryption  Privacy  Privacy  gossip  culture  gossip  Celebrity  of  You  culture  cyber  security  cyber  attack  cyber  crime  Apple  Cloudstorage  cloud  iCloud  Dropbox  AWS  S3  leak  passwords  password  password  security  password  integrity  Sexual  objectification  objectification  consent  brute  force  attack  FBI  n00d  Celeb  Trading  Ring  AnonIB  4chan  Reddit  TheFappening  Celebgate  imgur  Twitter  iCloud  rippers 
september 2014 by asterisk2a
BBC News - FBI investigates 'Cloud' celebrity picture leaks
Posting of celebrity nude pictures leads to FBI investigation - bbc.in/1nSuXzy +++ FBI probes celebrity photo leaks - bbc.in/1A1UtIo +++ bit.ly/1w34y7C +++ bit.ly/1sWQKJE +++ on.wsj.com/1A0YJrA >> 'If people were no complete script kiddies/amateurs, there will be no forensic trail and no real clear picture of how those pictures got stolen from peoples iCloud and other Cloud Services.' +++ News Corp.'s BSkyB Sky News - youtu.be/2AuRvgOpoYQ +++ bbc.in/1nw4iJ9 - "getting people to use passwords this long [14 chars] is a challenge. "It would be nice if we could get most of the population at least as far as eight characters," +++ bbc.in/1qXX1m2 "celebrities had weak passwords [+] brute force attack [...] We now need to hear from Apple on whether its engineers think that theory holds water. The other key question that needs answering, says Ferguson, is how the hackers obtained the email addresses they would have needed to gain access to the victims' accounts."
phishing  phishing  scam  Social  engineering  Hacking  two  factor  authentication  two  factor  verification  online  security  internet  security  encryption  Privacy  Privacy  gossip  culture  gossip  Celebrity  of  You  culture  cyber  security  cyber  attack  cyber  crime  Apple  Cloudstorage  cloud  iCloud  Dropbox  AWS  S3  leak  passwords  password  password  security  password  integrity  Sexual  objectification  objectification  consent  brute  force  attack  FBI  n00d  Celeb  Trading  Ring  AnonIB  4chan  Reddit  TheFappening  Celebgate  imgur  Twitter 
september 2014 by asterisk2a
Here’s What We Know So Far About The Celebrity Photo Hack | TechCrunch
bit.ly/1CjSrHz ++ bzfd.it/1vBoAsk ++ bzfd.it/1rJ6ALQ ++ bzfd.it/1pyhUsH - "@ThatSusanBurke You know what's better then leaked nudes? Earning the trust & respect of another human to the point that they share their body with you." ++ "leaker screenshots suggests no mastermind who broke iCloud but a dude named Tristian with too much time on his hands" bit.ly/1qwxjaR & "tl;dr is don't take private photos with an iPhone if you have iCloud on" & "Finding out hard way that "iCloud backup" really means what it says, and deleting from device != deleting from cloud" & "[This attack was not just based on iCloud compromise[/weakness/vulnerability]" & 'Some seem to be from Dropbox and S3 too' & bit.ly/1oytbCY ++ bit.ly/1CjSyCY !!!"non-expert user"!!! ++ bit.ly/1tSYuPn ++ #Consent on.fb.me/1w17jGv ++ Pando bit.ly/1lEU25W ++ "n00d Celeb" Trading Ring on AnonIB: ppl trading&helping hack celeb iCloud accounts et al - bit.ly/1uocm2D imgur.com/a/KDAX3 ++ on.recode.net/1A0rNzE - Apple is investigating ++
phishing  phishing  scam  Social  engineering  Hacking  two  factor  authentication  two  factor  verification  online  security  internet  security  encryption  Privacy  Privacy  gossip  culture  gossip  Celebrity  of  You  culture  cyber  security  cyber  attack  cyber  crime  Apple  Cloudstorage  cloud  iCloud  Dropbox  AWS  S3  leak  passwords  password  password  security  password  integrity  Sexual  objectification  objectification  consent  brute  force  attack  n00d  Celeb  Trading  Ring  AnonIB 
september 2014 by asterisk2a
Taken in phishing attack, Microsoft’s unmentionables aired by hacktivists | Ars Technica
The group has proven itself to be extremely effective in waging highly targeted phishing attacks that extract login credentials. For an idea how intricate some SEA attacks can be, see this detailed post-mortem of a recent ransacking of Forbes. [...] Taken together, the breaches are a sad commentary on the current state of security. If employees of two of the most visible technology companies in the world can't steer clear of social engineering attacks, what hope is there for less experienced Internet users?
phishing  Social  engineering  internet  security  cybersecurity  online  security  cyberattack  cyberespionage  cyberwar  encryption  Hacktivism  hacker  white  hat  hacker 
march 2014 by asterisk2a

Copy this bookmark:





to read