| |
|
|
| |
|
|
Romanian Ransomware Suspect Pleads Guilty To Hacking CCTVs in Washington DC (theregister.co.uk)
The Register reports that "a Romanian woman has admitted running a ransomware operation from infected Washington DC's CCTV systems just days before President Trump was sworn into office in the US capital." The US DOJ stated that "this case was of the highest priority due to its impact on the Secret Service's protective mission and its potential effect on the security plan for the 2017 Presidential Inauguration." She could face a maximum of 25 years if convicted. She and her cohort (who is still jailed in Romania) made the classic hacker mistake of using their personal gmail accounts for the campaign, even accessing them from one of the compromised PCs. |
|
|
|
| |
| There are no conversations. |
| |
|
|
|
| Anthony Fauci |
An AIDS-free generation would mean that virtually no child is born with HIV; that, as those children grow up, their risk of becoming infected is far lower than it is today; and that those who become infected can access treatment to help prevent them from developing AIDS and from passing the virus on to others. |
| Mick Ebeling |
That's what we're focusing on at Not Impossible Labs, looking at problems or needs that can be solved through hacking, modding, programming, whatever, so it helps one person first but has the potential to help many others. |
| Floyd Abrams |
I would say that the Pentagon Papers case of 1971 - in which the government tried to block the The New York Times and The Washington Post that they obtained from a secret study of how we got involved in the war in Vietnam - that is probably the most important case. |
| Mike Farrell |
It is inappropriate for the Bush administration to trump up a case in which we are ballyhooed into war. |
| Jim Garrison |
The head of the CIA, it seems to me, would think long and hard before he admitted that former employees of his had been involved in the murder of the President of the United States-even if they weren't acting on behalf of the Agency when they did it. |
| Herman Cain |
One of the questions that I often get is, 'Why are you running to be President?'. To Be President! What did I miss? I'm not running to go to Disneyland. |
| Eliza Farnham |
The human face is the organic seat of beauty. It is the register of value in development, a record of Experience, whose legitimate office is to perfect the life, a legible language to those who will study it, of the majestic mistress, the soul. |
| Henry A. Kissinger |
High office teaches decision making, not substance. It consumes intellectual capital; it does not create it. Most high officials leave office with the perceptions and insights with which they entered; they learn how to make decisions but not what decisions to make. |
| George W. Bush |
America is a Nation with a mission - and that mission comes from our most basic beliefs. We have no desire to dominate, no ambitions of empire. Our aim is a democratic peace - a peace founded upon the dignity and rights of every man and woman. |
| Cindy Gallop |
Client companies and advertising agencies are old-world-order places. The systems and processes and structures come from a time when you shot the TV commercial, then you did the print ads, then you did everything else - including the website. Everything has changed, but the systems haven't. |
|
|
|
Wana Decryptor Ransomware Using NSA Exploit Leaked By Shadow Brokers To Spread Ransomware Worldwide
A ransomware attack running rampant through Europe today is spreading via an exploit leaked in the most recent Shadow Brokers dump. Researchers said the attackers behind today's outbreak of WannaCry ransomware are using EternalBlue, an exploit made public by the mysterious group in possession of offensive hacking tools allegedly developed by the NSA. Most of the attacks are concentrated in Russia, but machines in 74 countries have been infected; researchers at Kaspersky Lab said they've recorded more than 45,000 infections so far on their sensors, and expect that number to climb. Sixteen National Health Service (NHS) organizations in the U.K., several large telecommunications companies and ...
This post is a comment.
|
| |
|
|
|
US Says North Korea 'Directly Responsible' For WannaCry Ransomware Attack
The White House has publicly blamed North Korea for a ransomware attack in May that locked more than 300,000 computers in 150 countries. From a report: In an opinion piece published in The Wall Street Journal on Monday, Homeland security adviser Tom Bossert writes that after careful investigation, Washington can say that Pyongyang is "directly responsible" for the WannaCry virus. Bossert called the attack in which victims received ransom demands to unlock their computers "cowardly, costly and careless." "The consequences and repercussions of WannaCry were beyond economic," he wrote. "The malicious software hit compu...
|
| |
|
|
|
Ukrainian Banks, Electricity Firm Hit by Fresh Cyber Attack; Reports Claim the Ransomware Is Quickly Spreading Across the World
A massive cyber attack has disrupted businesses and services in Ukraine on Tuesday, bringing down the government's website and sparking officials to warn that airline flights to and from the country's capital city Kiev could face delays. Motherboard reports that the ransomware is quickly spreading across the world. From a report: A number of Ukrainian banks and companies, including the state power distributor, were hit by a cyber attack on Tuesday that disrupted some operations (a non-paywalled source), the Ukrainian central bank said. The latest disruptions follo...
|
| |
|
|
|
Cyber attack spreads across 74 countries; some UK hospitals crippled
Cyber attacks that hit 74 countries across Europe and Asia Friday, impacting the public health system in Britain, apparently involved a leaked hacking tool from the National Security Agency.
The attack used ransomware, which is malware that encrypts data and locks a user from their data until they pay a ransom. The tool, which was leaked by a group known as Shadow Brokers, had been stolen from the N.S.A. as part of a wide swath of tools illegally released in 2016. ...
|
| |
|
|
|
David Kris, assistant attorney general for national security from 2009 to 2011, has responded to the recent accusations made by president Donald Trump. On Saturday, Trump accused former president Obama of orchestrating a "Nixon/Watergate" plot to tap the phones at his Trump Tower headquarters in the run-up to last fall's election. He writes in an opinion piece for The Washington Post: First, the U.S. government needs probable cause, signatures from government officials and advance approval from a federal court before engaging in wiretapping in the United States. There are some narrow exceptions, for things such as short-term emergencies, which are then reviewed by a judge promptly after the fact. This is not something that the president simply orders. Under the law governing foreign intelligence wiretaps, the government has to show probable cause that a "facility" is being used or about...
|
| |
|
|
|
NSA's 'Codebreaker Challenge' Features Exploiting Blockchain To Steal Ethereum (ltsnet.net) 51 Posted by EditorDavid on Saturday September 22, 2018 @05:34PM from the show-me-the-money dept. "The National Security Agency's 2018 Codebreaker Challenge kicked off on Friday, 9/21, and runs through 12/31," writes Slashdot reader eatvegetables. Each year's challenge -- which is open to U.S. students -- comes with its own (fictitious) backstory which the organizers say is "meant for providing realistic context."
This year's story? ...
|
| |
|
|
|
US Voting Server At Heart of Russian Hack Probe Mysteriously Wiped
A computer at the center of a lawsuit digging into Russian interference in the U.S. presidential election has been wiped. "The server in question is based in Georgia -- a state that narrowly backed Donald Trump, giving him 16 electoral votes -- and stored the results of the state's vote-management system," reports The Register. "The deletion of its filesystem data makes analysis of whether the system was compromised impossible to ascertain." From the report: There is good reason to believe that the computer may have been tampered with: it is 15 years old, and could be harboring all sorts of exploitable software and hardwar...
|
| |
|
|
|
PewCrypt Ransomware Locks Users' Files and Won't Offer a Decryption Key Until - and Unless - PewDiePie's YouTube Channel Beats T-Series To Hit 100M Subscribers
The battle between PewDiePie, currently the most subscribed channel on YouTube, and T-Series, an Indian music label, continues to have strange repercussions. In recent months, as T-Series closes in on the gap to beat PewDiePie for the crown of the most subscribers on YouTube, alleged supporters of PewDiePie, in an unusual show of love, have hacked Chromecasts and printers to persuade victims to subscribe to PewDiePie's channel. Now ZDNet reports about a second strain of ransomware that is linked to PewDiePie. From the report: ...
|
| |
|
|
|
Russia's Anti-VPN Law Goes Into Effect
A Russian law that bans the use or provision of virtual private networks (VPNs) will come into effect Wednesday. The legislation will require ISPs to block websites that offer VPNs and similar proxy services that are used by millions of Russians to circumvent state-imposed internet censorship. It was signed by President Vladimir Putin on July 29 and was justified as a necessary measure to prevent the spread of extremism online. Its real impact, however, will be to make it much harder for ordinary Russians to access websites ISPs are instructed to block connections to by Russian regulator Roskomnadzor, aka the Federal Service for Supervision of Communications, Information Technology and Mass Media. The law is just one part of a concerted effort by t...
|
| |
|
|
|
|
Vice President Mike Pence used a personal AOL email account to conduct sensitive state business -- including issues related to homeland security -- as the governor of Indiana, according to a report from The Indianapolis Star. Not only that, but Pence's email account was also compromised last year, the report reveals. Because personal email accounts are not subject to same types of public transparency laws, it's up to the official and his or her transition staff to hand over any sensitive state-related messages for archiving. Emails from a state account are automatically stored on state servers and subject to public records requests. Pence's office claims the contents of his personal AOL account used for state business are in fact in the process of being archived. A larger concern, however, is security. By using a private AOL account to conduct sensitive state matters, Pence could have exposed sensitive state business. In the hacking incident last year, Pence's email account was compro...
|
| |