|
|
|
|
A Mysterious Grey-Hat Is Patching People's Outdated MikroTik Routers
A Russian-speaking grey-hat hacker is breaking into people's MikroTik routers and patching devices so they can't be abused by cryptojackers, botnet herders, or other cyber-criminals, ZDNet has learned. The hacker, who goes by the name of Alexey and says he works as a server administrator, claims to have disinfected over 100,000 MikroTik routers already. "I added firewall rules that blocked access to the router from outside the local network," Alexey said. "In the comments, I wrote information about the vulnerability and left the address of the @router_os Telegram channel, where it was possible for them to ask questions." But despite adjusting firewall settings for over 100,000 users, Alexey says that only 50 users reached out via Telegram. A few said "thanks," but most were outraged. The vigilante server administrator says he's been only fixing routers that have not been patched by their owners against a MikroTik vulnerability that came to light in late April. |
|
|
|
There are no conversations. |
|
|
|
|
Mike Davidson |
Now that digital lifestyle devices, tablets, wireless phones, and other Internet appliances are beginning to come of age, we need to worry about presenting our content to these devices so that it is optimized for their display capabilities. |
Vanilla Ice |
One thing I didn't understand in life was that I had $100,000,000 in the bank and I couldn't buy happiness. I had everything: mansions, yachts, Ferraris, Lamborghinis, but I was depressed. I didn't know where I fitted in. But then I found family and friends and I learned the value of life. |
Petra Haden |
The bass line is the anchor for me. I started with the bass, and either doubled that and then added the harmonies, or sometimes added my own harmonies that I've always wanted to sing on the song. And then it just went on from there - singing violin parts and trumpet parts and just trying to emulate the sounds of the instruments. |
John Irving |
I believe in rules of behavior, and I'm quite interested in stories about the consequences of breaking those rules. |
Chris Abani |
That women are mysterious and unknowable is something every young man grows up believing. Men, on the other hand, never think of themselves as mysterious or confusing, and we are often at a loss as to why women want to figure us out. |
Shawn Fanning |
It was very early, and we were still like beta or alpha stage, and so we started receiving a ton of download. The server became overloaded, and that's when I realized that this had a huge market. |
Joel Edgerton |
Whenever you deal with science fiction you are setting up a world of rules. I think you work hard to establish the rules. And you also have to work even harder to maintain those rules, and within that find excitement and unpredictability and all that stuff. |
Lynn Abbey |
When I have an idea, it goes from vague, cloudy notion to 100,000 words in a heartbeat. |
Ted Danson |
One person goes off and works in Houston the other person goes off to London and you're on the phone to each other and somebody is paying you to kiss somebody else. It's very bizarre being an actor. |
Philip Hammond |
Let me be absolutely clear: I think it is defeatist to sort of say we want to leave the European Union. We're going to try and change the rules and change the way it works and change the objectives that it has in order to make it something that works for Britain. |
|
|
WPA2 Security Flaw Puts Almost Every Wi-Fi Device at Risk of Hijack, Eavesdropping
A security protocol at the heart of most modern Wi-Fi devices, including computers, phones, and routers, has been broken, putting almost every wireless-enabled device at risk of attack. From a report: The bug, known as "KRACK" for Key Reinstallation Attack, exposes a fundamental flaw in WPA2, a common protocol used in securing most modern wireless networks. Mathy Vanhoef, a computer security academic, who found the flaw, said the weakness lies in the protocol's four-way handshake, which securely allows new devices with a pre-shared password to join the network. That weakness can, at its worst, allow an atta...
|
|
|
|
(12:10:49 PM) spartanchat10: i can't get a new IP address (12:10:53 PM) spartanchat10: from at least my research (12:11:14 PM) spartanchat10: I would have to unplug my modem for 8 days, and even then it's not a guarentee (12:11:38 PM) spartanchat10: if the reason I can't use outlook for email is because my IP is blacklisted, then why can I still get email through the web interface? (12:12:49 PM) spartanchat10: Everything worked for 8 years years up until Thursday (12:12:59 PM) spartanchat10: I ...
|
|
|
|
when i worked at the high school i had set up my smart phone to do MITM attacks and would intercept like 500 peoples wifis through my shitty s4 lol. This would eventually stop the internet for everyone cuz my phone is not a router
This post is a comment.
|
|
|
|
Linux.org's DNS Got Hijacked
Linux.org reports: Wednesday afternoon around 5pm EST someone was able to get into the registrar account for our domain and point DNS to another server -- as well as lock us out from changing it. They pointed the domain name to a pretty rude page for most of the evening until Cloudflare stepped in and blocked the domain for us.
After a lot of back and forth with our registrar, we were able to get things back under our control. I'd like to point out that our serve...
|
|
|
|
I wrote a program that will text me random sentences from Wikipedia while I'm sleeping but for some reason it doesn't work with my phone number. I don't know if it is a problem with the carrier or what. It works with other people's phones.
|
|
|
|
Hacker Steals $30 Million Worth of Ethereum From Parity Multi-Sig Wallets
An unknown hacker has used a vulnerability in an Ethereum wallet client to steal over 153,000 Ether, worth over $30 million dollars. The hack was possible due to a flaw in the Parity Ethereum client. The vulnerability allowed the hacker to exfiltrate funds from multi-sig wallets created with Parity clients 1.5 and later. Parity 1.5 was released on January 19, 2017. The attack took place around 19:00-20:00 UTC and was immediately spotted by Parity, a company founded by Gavin Wood, Ethereum's founder. The company issued a security alert on its blog. The Ether stolen from Parity multi-sig accounts was transferred into this Ethereum wallet, currently holding 153,017.021336727 Ether. Because Parity spotted the attack i...
|
|
|
|
Today I want to talk about a large DDOS attack that leveraged thousands of unsuspecting WordPress websites as indirect source amplification vectors.
Any WordPress site with Pingback enabled (which is on by default) can be used in DDOS attacks against other sites. Note that XMLRPC is used for pingbacks, trackbacks, remote access via mobile devices and many other features you?re likely very fond of. But, it can also be heavily misused like what we are seeing.
The story
...
This post is a comment.
|
|
|
|
sorry for filling your website up with hacker shit buddy
This post is a comment.
|
|
|
|
next time a hacker gives me investment info im going to believe him. bitcoin went up since i was told it would. if it goes up $100 more than were all idiots
|
|
|
|
Hacked Water Heaters Could Trigger Mass Blackouts Someday
At the Usenix Security conference this week, a group of Princeton University security researchers will present a study that considers a little-examined question in power grid cybersecurity: What if hackers attacked not the supply side of the power grid, but the demand side? From a report: In a series of simulations, the researchers imagined what might happen if hackers controlled a botnet composed of thousands of silently hacked consumer internet of things devices, particularly power-hungry ones like air conditioners, water heaters, and space heaters. Then they ran a series of software simulations to see how many of those devices a...
|
|