While the document provides a rare window into the NSA’s understanding of the mechanics of Russian hacking, it does not show the underlying “raw” intelligence on which the analysis is based. A U.S. intelligence officer who declined to be identified cautioned against drawing too big a conclusion from the document because a single analysis is not necessarily definitive.
Russian president calls allegations of interference in US presidential election ‘useless and harmful chatter’ at St Petersburg economic forum
Criminal group that broke into servers of Lithuanian clinic demands bitcoin ransom payments from clients after releasing 25,000 pictures
Este joven estadounidense, un prodigio de la informática, se llama a sí mismo “ciberninja” y a través de su propia empresa quiere “educar a la gente, enseñarles cosas nuevas” sobre la seguridad en el mundo cibernético.
Hackers hoped Disney would pay up when they threatened to leak Dead Men Tell No Tales online – but have they scuppered the wrong vessel?
The so-called Shadow Brokers, who claimed responsibility for releasing NSA tools that were used to spread the WannaCry ransomware through the NHS and across the world, said they have a new suite of tools and vulnerabilities in newer software. The possible targets include Microsoft’s Windows 10, which was unaffected by the initial attack and is on at least 500m devices around the world.
The WannaCry ransomware attackers demanded payment in the cryptocurrency. But its use in the ‘clean’ economy is growing, too, and could revolutionise how we use money
Hollywood Reporter says CEO Bob Iger has told employees that film would be released in segments online unless hackers were paid in bitcoin
In mid-April, an arsenal of powerful software tools apparently designed by the NSA to infect and control Windows computers was leaked by an entity known only as the “Shadow Brokers.” Not even a whole month later, the hypothetical threat that criminals would use the tools against the general public has become real, and tens of thousands of computers worldwide are now crippled by an unknown party demanding ransom.
El gigante de la informática criticó el papel de los gobiernos y organizaciones que coleccionan vulnerabilidades informáticas que después pueden ser robadas o vendidas a delincuentes informáticos. La empresa pide que lo sucedido sea una lección para erradicar esta práctica en el mundo.
Expertos en informática advierten que un nuevo ataque global con un brote de ransomware es “inminente” y que incluso podría ser lanzado el lunes. BBC Mundo te cuenta los detalles y cómo protegerte de estos virus.
Un ciberataque “de dimensión nunca antes vista” logró este viernes bloquear el acceso a los sistemas informáticos de instituciones estatales y empresas de varios países.La policía europea, Europol, indicó que el ciberataque era de una escala “sin precedentes” y advirtió que una “compleja investigación internacional” era necesaria para “identificar a los culpables”.
La Comisión Nacional de Control de la Campaña Presidencial (CNCCEP) en Francia pidió hoy a los medios de comunicación no informar sobre los documentos internos difundidos en redes sociales tras el “pirateo masivo” contra el equipo del candidato socioliberal Emmanuel Macron.
Young people attack computer networks to impress friends and challenge political system, crime research shows
It’s difficult to buy a new TV that doesn’t come with a suite of (generally mediocre) “smart” software, giving your home theater some of the functions typically found in phones and tablets. But bringing these extra features into your living room means bringing a microphone, too — a fact the CIA is exploiting, according to a new trove of documents released today by Wikileaks.
Consistió en una suerte de juegos apocalípticos de IA que organizaron a alrededor de 40 científicos, expertos en ciberseguridad y especialistas en políticas en grupos de atacantes (equipo rojo) y defensores (equipo azul) que reprodujeron escenarios catastróficos en IA, desde manipulación del mercado bursátil hasta guerra global.
We have to take action now to root out Russian and other foreign influences before they become too deeply enmeshed in our political ecosystem. First and foremost, leaders in the US and Europe must stop any attempt by the Trump administration to ease sanctions on Russia. It must be abundantly clear that attacking our elections through cyberspace will prompt a tough and proportional response.
Two of Moscow’s top cybersecurity officials are facing treason charges for cooperating with the CIA, according to a Russian news report.The accusations add further intrigue to a mysterious scandal that has had the Moscow rumour mill working in overdrive for the past week, and comes not long after US intelligence accused Russia of interfering in the US election and hacking the Democratic party’s servers.
The intelligence report’s lack of even hints at the kind of evidence collected make it difficult to assess the claims, and its weakness gave Russian officials ample opportunity to poke fun.The foreign ministry spokeswoman, Maria Zakharova, wrote on Facebook on Monday: “If ‘Russian hackers’ managed to hack anything in America, it’s two things: Obama’s brain and, of course, the report itself.”
It’s plausible, and in my opinion likely, that hackers under orders from the Russian government were responsible for the DNC and Podesta hacks in order to influence the U.S. election in favor of Donald Trump. But the Grizzly Steppe report fails to adequately back up this claim. My research, for example, shows that much of the evidence presented is evidence of nothing at all.
The most ironic aspect of all this is that it is mainstream journalists — the very people who have become obsessed with the crusade against Fake News — who play the key role in enabling and fueling this dissemination of false stories. They do so not only by uncritically spreading them, but also by taking little or no steps to notify the public of their falsity.
Yet neither Clapper nor Rogers offered new evidence for their October conclusion of Russian interference. Clapper promised to release an unclassified report early next week, prepared by the NSA, CIA and FBI, providing additional information for the intelligence agencies’ conclusion that Russia deliberately hacked the Democratic National Committee in order to aid Trump in the 2016 presidential election.
Those interested in a sober and rational discussion of the Russia hacking issue should read the following:(1) Three posts by cybersecurity expert Jeffrey Carr: first, on the difficulty of proving attribution for any hacks; second, on the irrational claims on which the “Russia hacked the DNC” case is predicated; and third, on the woefully inadequate, evidence-free report issued by the Department of Homeland Security and FBI this week to justify sanctions against Russia.(2) Yesterday’s Rolling Stone article by Matt Taibbi, who lived and worked for more than a decade in Russia, titled: “Something About This Russia Story Stinks.”(3) An Atlantic article by David A. Graham on the politics and strategies of the sanctions imposed this week on Russia by Obama; I disagree with several of his claims, but the article is a rarity: a calm, sober, rational assessment of this debate.
In an executive order accompanied by a series of official statements, US President Barack Obama has sharply escalated the campaign against Russia, based on unsubstantiated claims of Russian government hacking of the Democratic National Committee (DNC) and the Hillary Clinton campaign in the presidential election.
La Casa Blanca aprobó severas medidas para castigar a Moscú por sus supuestos intentos de influir en las elecciones presidenciales de noviembre pasado. Donald Trump dijo que el país debe “ocuparse de cosas más grandes y mejores”, aunque anunció que se reunirá la próxima semana con los jefes de inteligencia para informarse sobre el caso.
Following on from our recent victory against unlawful surveillance by the British intelligence services, Privacy International is taking the British Government to court again. Why? Because it is using ‘general warrants’ to hack the electronic devices (computers, phones, tablets, and the increasing number of things that ‘connect’ to the internet) of sweeping groups of unidentified people at home and abroad. General warrants permit the government to target wide categories of people, places or property (e.g. all mobile phones in London) without any individualised suspicion of wrongdoing.
While cybersecurity companies traditionally aim to ensure that the code in software and hardware is free of flaws — mistakes that malicious hackers can take advantage of — DarkMatter, according to sources familiar with the company’s activities, was trying to find and exploit these flaws in order to install malware. DarkMatter could take over a nearby surveillance camera or cellphone and basically do whatever it wanted with it — conduct surveillance, interfere with or change any electronic messages it emitted, or block the signals entirely.
Fuente: Spies for Hire
The huge attack on global internet access, which blocked some of the world’s most popular websites, is believed to have been unleashed by hackers using common devices like webcams and digital recorders.
ft.com > Companies >TechnologySubscribe Sign in Home World Companies Energy Financials Health Industrials Luxury 360 Media Retail & Consumer Tech Telecoms Transport By Region Tools Markets Global Economy Lex Comment Work & Careers Life & Arts Try the new FT.comLast updated: September 23, 2016 11:59 pmYahoo faces questions over delay in data breach revelationNic Fildes and Madhumita Murgia in London, Tim Bradshaw in San Francisco Share Print Clip Commentsepa05552696 The Yahoo logo is pictured on a computer monitor in Taipei, Taiwan, 23 September 2016. According to news reports on 23 September, around 500 million Yahoo account users information had been stolen or hacked on its network in 2014. EPA/RITCHIE B. TONGO©EPAYahoo chief executive Marissa Mayer and her board are facing serious questions over the handling of the largest-ever cyber attack recorded, as customers, regulators and even its new owners search for answers on why a two-year-old data breach has only just come to light.
Love, 31, who has Asperger syndrome, could face a 99-year prison sentence for hacking into missile defence centres
Un grupo de hackers vinculado a la Agencia de Seguridad Nacional de los Estados Unidos, mejor conocida como la NSA (National Security Agency), ha sido hackeado recientemente y sus herramientas de espionaje, recolección de información, malware y más, han sido puestas en venta por 1 millón de bitcoins (más de 550 millones de dólares al momento de la publicación).
Un grupo de hackers dice haber obtenido información confidencial de Equation Group, un conocido y sofisticado grupo de ciber atacantes ligado a la NSA. Parte de la información publicada permite por primera vez echar un vistazo a las herramientas utilizadas por la agencia de seguridad estadounidense.
Important Update: Michael Best has now come out and said that it was actually he who uploaded the files in question, which he got from the somewhat infamous (i.e., hacked the Hacking Team) hacker Phineas Fisher. Through a somewhat convoluted set of circumstances, it appeared the files were associated with the Wikileaks leak when they were not — and then basically everyone just started calling each other names:
Cada cierto tiempo surgen nuevas noticias que dan cuenta de cómo hackers y whistleblowers develan información de interés público, usualmente política. Incluso en algunos países latinoamericanos se han creado plataformas que permiten hacer denuncias anónimas, siguiendo la misma tendencia. Esta actividad ha venido a suplir la falta de canales formales de acceso a la información pública, pero pueden presentar algunos problemas.