|
|
|
|
Hacked Water Heaters Could Trigger Mass Blackouts Someday
At the Usenix Security conference this week, a group of Princeton University security researchers will present a study that considers a little-examined question in power grid cybersecurity: What if hackers attacked not the supply side of the power grid, but the demand side? From a report: In a series of simulations, the researchers imagined what might happen if hackers controlled a botnet composed of thousands of silently hacked consumer internet of things devices, particularly power-hungry ones like air conditioners, water heaters, and space heaters. Then they ran a series of software simulations to see how many of those devices an attacker would need to simultaneously hijack to disrupt the stability of the power grid. Their answers point to a disturbing, if not quite yet practical scenario: In a power network large enough to serve an area of 38 million people -- a population roughly equal to Canada or California -- the researchers estimate that just a one percent bump in demand might be enough to take down the majority of the grid. That demand increase could be created by a botnet as small as a few tens of thousands of hacked electric water heaters or a couple hundred thousand air conditioners. "Power grids are stable as long as supply is equal to demand," says Saleh Soltan, a researcher in Princeton's Department of Electrical Engineering, who led the study. "If you have a very large botnet of IoT devices, you can really manipulate the demand, changing it abruptly, any time you want." |
|
|
|
There are no conversations. |
|
|
|
|
Fredrik Bajer |
The interparliamentary conference should, in my opinion, direct its particular attention to the preparation of the next Hague Conference, the diplomatic conference, the conference of governments. |
Michelle Obama |
My experiences at Princeton have made me far more aware of my 'blackness' than ever before. I have found that at Princeton, no matter how liberal and open-minded some of my white professors and classmates try to be toward me, I sometimes feel like a visitor on campus; as if I really don't belong. |
Michelle Gagnon |
I was really fascinated by some of the things happening with Anonymous, the hackers group. I don't necessarily agree with everything they've done, but I thought it was a really interesting use of technology and the fact that there's a whole group of people who can take over systems and fight things from behind the scenes. |
Swami Sivananda |
A mountain is composed of tiny grains of earth. The ocean is made up of tiny drops of water. Even so, life is but an endless series of little details, actions, speeches, and thoughts. And the consequences whether good or bad of even the least of them are far-reaching. |
James Fallows |
For the record, I am sticking with my claim that the simultaneous degradation of air quality, water quality, water supply, food safety, soil quality, and other environment-related variables is the main challenge to China's continued development. |
Eric Bana |
I've always been attracted to cars, and driving is a completely measurable experience: if you qualify last on the grid, you're the slowest, and if you qualify first on the grid, you're the fastest. So no one can say you're slow if you're fast and no one can say you're fast if you're slow. |
Spencer Abraham |
Well, the responsibility for maintaining a reliable transmission grid is one that's shared by an awful lot of players who have a role in the grid: Companies that either generate and transmit energy or just play the role of being the transmission systems or monitoring them. |
John Calvin |
A dog barks when his master is attacked. I would be a coward if I saw that God's truth is attacked and yet would remain silent. |
Orison Swett Marden |
Your expectations opens or closes the doors of your supply, If you expect grand things, and work honestly for them, they will come to you, your supply will correspond with your expectation. |
Gerald Edelman |
The computer is not, in our opinion, a good model of the mind, but it is as the trumpet is to the orchestra - you really need it. And so, we have very massive simulations in computers because the problem is, of course, very complex. |
|
|
The CCleaner Malware Fiasco Targeted at Least 20 Specific Tech Firms
Hundreds of thousands of computers getting penetrated by a corrupted version of an ultra-common piece of security software was never going to end well. But now it's becoming clear exactly how bad the results of the recent CCleaner malware outbreak may be. Researchers now believe that the hackers behind it were bent not only on mass infections, but on targeted espionage that tried to gain access to the networks of at least 20 tech firms. Earlier this week, security firms Morphisec and Cisco revealed that CCleaner, a piece of security software distributed by Czech company Avast, had been hijacked by hackers and loaded with a backdoor that evaded the company's security checks. It wound up installed on more than 700,000 co...
|
|
|
|
How Hackers Can Use Pop Songs To 'Watch' You
Forget your classic listening device: Researchers at the University of Washington have demonstrated that phones, smart TVs, Amazon Echo-like assistants, and other devices equipped with speakers and microphones could be used by hackers as clandestine sonar "bugs" capable of tracking your location in a room. Their system, called CovertBand, emits high-pitched sonar signals hidden within popular songs -- their examples include songs by Michael Jackson and Justin Timberlake -- then records them with the machine's microphone to detect people's activities. Jumping, walking, and "supine pelvic tilts" all produce distinguishable patterns, they say in a paper. (Of course, someone who hacked the microphone on a smart TV or computer could likely listen ...
|
|
|
|
Hackers Broke Into An SEC Database and Made Millions From Inside Information, Says DOJ
Federal prosecutors unveiled charges in an international stock-trading scheme that involved hacking into the Securities and Exchange Commission's EDGAR corporate filing system. "The scheme allegedly netted $4.1 million for fraudsters from the U.S., Russia and Ukraine," reports CNBC. "Using 157 corporate earnings announcements, the group was able to execute trades on material nonpublic information. Most of those filings were 'test filings,' which corporations upload to the SEC's website." From the report: The scheme involves seven individuals and operated from May to at least October 2016. Prosecutors sa...
|
|
|
|
Company Gets 45,000 Bad Facebook Reviews After Teenaged Hacker's Unjust Arrest
Over 45,000 users have left one-star reviews on a company's Facebook page after the business reported a security researcher to police and had him arrested in the middle of the night instead of fixing a reported bug. The arrest took place this week in Hungary after an 18-year-old found a flaw in the online ticket-selling system of Budapesti Közlekedési Központ, Budapest's public transportation authority. The young man discovered that he could access BKK's website, press F12 to enter the browser's developer tools mode, and modify the page's source code to alter a ticket's price. Because there was no client or server-side validation put in place, the BKK system accepted the operation and issued a ticket at a smal...
|
|
|
|
The Mere Presence of Your Smartphone Reduces Brain Power, Study Shows (utexas.edu)
An anonymous reader shares a study: Your cognitive capacity is significantly reduced when your smartphone is within reach -- even if it's off. That's the takeaway finding from a new study from the McCombs School of Business at The University of Texas at Austin. McCombs Assistant Professor Adrian Ward and co-authors conducted experiments with nearly 800 smartphone users in an attempt to measure, for the first time, how well people can complete tasks when they have their smartphones nearby even when they're not using them. In one experiment, the researchers asked study participants to sit at a computer and tak...
|
|
|
|
Once a cyber-attack has been initiated, there are certain targets that need to be attacked to cripple the opponent. Certain infrastructures as targets have been highlighted as critical infrastructures in time of conflict that can severely cripple a nation. Control systems, energy resources, finance, telecommunications, transportation, and water facilities are seen as critical infrastructure targets during conflict. A new report on the industrial cybersecurity problems, produced by the British Columbia Institute of Technology, and the PA Consulting Group, using data from as far back as 1981, reportedly[weasel words] has found a 10-fold increase in the number of successful cyber-attacks on infrastructure Supervisory Control and Data Acquisition (SCADA) systems since 2000.[3] Control systems ...
|
|
|
|
Taylor Swift Used Facial Recognition Tech At Concerts To Spy On Stalkers
Taylor Swift used facial recognition technology at her live performances so that technicians running the system could then check those face scans against a private database of her stalkers. There is now big demand for serious security at live events the size of a Taylor Swift concert. There have been so many bombings and mass shootings at music concerts over the past year to even remember without Googling. Fear of being killed at a music concert is something people factor in to the decision to buy tickets and go to live events. The demand for security is real.
|
|
|
|
Malicious Chrome Extensions Infect Over 100,000 Users Again
https://arstechnica.com/information-technology/2018/05/malicious-chrome-extensions-infect-more-than-100000-users-again/
Criminals infected more than 100,000 computers with browser extensions that stole login credentials, surreptitiously mined cryptocurrencies, and engaged in click fraud. The malicious extensions were hosted in Google's official Chrome Web Store. The scam was active since at least March with seven malicious extensions known so far, researchers with security firm Radware reported Thursday. Google's security team remo...
|
|
|
|
Once Hailed As Unhackable, Blockchains Are Now Getting Hacked
Early last month, the security team at Coinbase noticed something strange going on in Ethereum Classic, one of the cryptocurrencies people can buy and sell using Coinbase's popular exchange platform. Its blockchain, the history of all its transactions, was under attack. An attacker had somehow gained control of more than half of the network's computing power and was using it to rewrite the transaction history. That made it possible to spend the same cryptocurrency more than once -- known as "double spends." The attacker was spotted pulling this off to the tune of $1.1 million. Coinbase claims that no currency was actually stol...
|
|
|
|
How an International Hacker Network Turned Stolen Press Releases Into $100 million
At a Kiev nightclub in the spring of 2012, 24-year-old Ivan Turchynov made a fateful drunken boast to some fellow hackers. For years, Turchynov said, he'd been hacking unpublished press releases from business newswires and selling them, via Moscow-based middlemen, to stock traders for a cut of the sizable profits. Oleksandr Ieremenko, one of the hackers at the club that night, had worked with Turchynov before and decided he wanted in on the scam. With his friend Vadym Iermolovych, he hacked Business Wire, stole Turchynov's inside access to the site, and pushed the main Moscovite ringleader, known by the screen name eggPLC, to bring them in on the scheme. The hostile takeover meant Turchynov was forced to ...
|
|