Russia hacked the US election. Now it’s coming for western democracy | Robby Mook | Opinion | The Guardian

We have to take action now to root out Russian and other foreign influences before they become too deeply enmeshed in our political ecosystem. First and foremost, leaders in the US and Europe must stop any attempt by the Trump administration to ease sanctions on Russia. It must be abundantly clear that attacking our elections through cyberspace will prompt a tough and proportional response.

Fuente: Russia hacked the US election. Now it’s coming for western democracy | Robby Mook | Opinion | The Guardian


Russian cybersecurity experts suspected of treason linked to CIA | World news | The Guardian

Two of Moscow’s top cybersecurity officials are facing treason charges for cooperating with the CIA, according to a Russian news report.The accusations add further intrigue to a mysterious scandal that has had the Moscow rumour mill working in overdrive for the past week, and comes not long after US intelligence accused Russia of interfering in the US election and hacking the Democratic party’s servers.

Fuente: Russian cybersecurity experts suspected of treason linked to CIA | World news | The Guardian


Young Russian denies she aided election hackers: ‘I never work with douchebags’ | World news | The Guardian

Alisa Shevchenko is a talented young Russian hacker, known for working with companies to find vulnerabilities in their systems. She is also, the White House claims, guilty of helping Vladimir Putin interfere in the US election.

Fuente: Young Russian denies she aided election hackers: ‘I never work with douchebags’ | World news | The Guardian


Adult Friend Finder and Penthouse hacked in largest personal data breach on record

Over 412m accounts from pornography sites and sex hookup service reportedly leaked as Friend Finder Networks suffers second hack in just over a year

Fuente: Adult Friend Finder and Penthouse hacked in largest personal data breach on record


DDoS attack that disrupted internet was largest of its kind in history, experts say | Technology | The Guardian

The cyber-attack that brought down much of America’s internet last week was caused by a new weapon called the Mirai botnet and was likely the largest of its kind in history, experts said.

Fuente: DDoS attack that disrupted internet was largest of its kind in history, experts say | Technology | The Guardian


Spies for Hire

While cybersecurity companies traditionally aim to ensure that the code in software and hardware is free of flaws — mistakes that malicious hackers can take advantage of — DarkMatter, according to sources familiar with the company’s activities, was trying to find and exploit these flaws in order to install malware. DarkMatter could take over a nearby surveillance camera or cellphone and basically do whatever it wanted with it — conduct surveillance, interfere with or change any electronic messages it emitted, or block the signals entirely.

Fuente: Spies for Hire


¿Dónde y al alcance de quién está toda la información sobre ti? (y por qué debe importarte) – El Mostrador

Más de la mitad de la capacidad de almacenamiento de la nube que se puede rentar está controlada por cuatro corporaciones

Fuente: ¿Dónde y al alcance de quién está toda la información sobre ti? (y por qué debe importarte) – El Mostrador


All Bitfinex clients to share 36% loss of assets following exchange hack | Technology | The Guardian

Bitfinex, the cryptocurrency exchange that lost $72m (£55m) to hackers last week, has told customers they will lose just over 36% of the assets they had on the platform but will be compensated for these losses with tokens of credit.

Fuente: All Bitfinex clients to share 36% loss of assets following exchange hack | Technology | The Guardian


Hackean las cuentas de Twitter, Linkedin y Pinterest de Mark Zuckerberg – El Mostrador

El grupo de piratas informáticos OurMine Team aseguró este fin de semana que había accedido a las cuentas de Zuckerberg en Twitter, Linkedin, Pinterest e Intagram.

Fuente: Hackean las cuentas de Twitter, Linkedin y Pinterest de Mark Zuckerberg – El Mostrador


The Vigilante Who Hacked Hacking Team Explains How He Did It | Motherboard

Back in July of last year, the controversial government spying and hacking tool seller Hacking Team was hacked itself by an outside attacker. The breach made headlines worldwide, but no one knew much about the perpetrator or how he did it.That mystery has finally been revealed.

Fuente: The Vigilante Who Hacked Hacking Team Explains How He Did It | Motherboard


Hacking Team Is Back In Business, But Struggling To Survive | Motherboard

Earlier this year, a representative for the notorious surveillance vendor Hacking Team traveled to South America to pitch the company’s marquee spyware product to a potential new customer.The representative gave a presentation at the office of a government agency, showed off the spyware control center, and handed out some marketing materials.It was an unremarkable sales pitch—affirmed by the fact that the potential client decided not to buy, according to a source who attended the meeting—except for the timing, which was almost six months after what some consider Hacking Team’s near-death experience.

Fuente: Hacking Team Is Back In Business, But Struggling To Survive | Motherboard


Court rulings threaten to upset defences against data breach claims – FT.com

In February, a Los Angeles hospital paid a bitcoin ransom equivalent to about $17,000 to retrieve its medical records after hackers attacked its network.While the records were soon restored, the attack raises the spectre of cyber criminals causing harm to consumers if a healthcare provider is, for example, unable to find out about a patient’s drug allergies in an emergency.

Fuente: Court rulings threaten to upset defences against data breach claims – FT.com


Regulators are failing to block fraudulent adverts – FT.com

You might have thought that an industry in which a tenth of transactions are fraudulent, which leaks billions of dollars a year, and in which many turn a blind eye to criminality would be raided by the police. So far, there is no sign of it. The

Fuente: Regulators are failing to block fraudulent adverts – FT.com


FireEye bulks up for ‘cyber arms race’ – FT.com

FireEye, a cyber security company, has bought threat intelligence start-up iSight Partners, as it seeks to compliment its machine learning with data gathered by humans who watch hackers in the darkest corners of the internet. With the acquisition,

Fuente: FireEye bulks up for ‘cyber arms race’ – FT.com


Website hosting company Easily hit by cyber attack – FT.com

Easily.co.uk, one of the UK’s largest website hosting companies, has become the latest group to suffer a serious cyber attack. The company, which hosts 100,000 websites, 65,000 of them in the UK, confirmed on Thursday that it had been hacked. “A

Fuente: Website hosting company Easily hit by cyber attack – FT.com


Intel Security’s Chris Young tells cyber sector to go on offensive – FT.com

Intel Security’s Chris Young tells cyber sector to go on offensive – FT.com.

 

Hacker; Cyber Security

The president of Intel Security has admonished the cyber security industry for being “too reactive” and focusing on the symptoms of attacks rather than the underlying causes.

Chris Young said that the sector had become “bogged down” in data while cyber attackers get better funded, more innovative and improve their skills.

“In security we’re chasing the symptoms like malware and vulnerabilities when we’d be smarter if we knew the context of attacks, who the attackers are and why do I care about them.”“We are swimming in symptoms but we don’t really understand the problem in many cases. To use a human analogy, I’m sneezing, I can’t breathe easily, I have a runny nose: do I have a cold, flu or allergies?” he said.

Mr Young told the Financial Times at the RSA cyber security conference that President Barack Obama’s new information sharing proposals, announced in the State of the Union speech, risk creating a flood of new data on attacks that few companies are skilled at processing. The US House of Representatives could vote on the bill this week.

 


How you could become a victim of cybercrime in 2015 | Technology | The Guardian

How you could become a victim of cybercrime in 2015 | Technology | The Guardian.

Cybersecurity experts’ predictions for the year ahead: from ransomware and healthcare hacks to social media scams and state-sponsored cyberwar

Will 2015 be a happy new year for cybercriminals?
 Will 2015 be a happy new year for cybercriminals? Photograph: Alamy

Will 2015 be a happy new year for internet users? Not if cybercriminals have their way.

Online security companies have been making their predictions for 2015, from the malware that will be trying to weasel its way onto our computers and smartphones to the prospect of cyberwar involving state-sponsored hackers.

Here’s a summary of what you should be watching out for online in 2015, based on the predictions of companies including BitDefender, KPMGAdaptiveMobile,Trend MicroBAE SystemsWebSenseInfoSec InstituteSymantecKaspersky,Proofpoint and Sophos. The links lead to their full predictions.


Third-party Snapchat site claims pics were hacked from server | Technology | theguardian.com

Third-party Snapchat site claims pics were hacked from server | Technology | theguardian.com.

Developers behind Snapsaved.com, which stores Snapchat pictures, claim user photos were stolen – while another claim the site’s administrator gave access to hackers

The Snapchat logo: third-party sites have been hacked to reveal images that were meant to self-destruct.
The Snapchat logo: third-party sites have been hacked to reveal images that were meant to self-destruct. Photograph: Peter Byrne/PA

The owners of the Snapsaved site, from which a number of photos sent over the Snapchat service were leaked at the weekend, say that they were hacked to reveal the pictures.

The statement follows a claim by an unknown person who says that the photos which leaked out on Sunday were provided by the site’s administrator.

They also say that the distribution of the photos would be potentially harmful both to those pictured and to the wider internet because of its effects on personal privacy.

On Sunday, thousands of photos and videos from the Snapchat service were put online, apparently taken from sites including Snapsaved.com, which had allowed people to log in using their Snapchat username and password to offer desktop-based rather than handset-based access to the site – and also the chance to store photos, which are meant to be deleted within seconds of being viewed.

Snapchat blamed third-party apps, without naming Snapsaved, for the breach.

In a Facebook posting, an unnamed spokesman for the Snapsaved site says that “I would like to inform the public that snapsaved.com was hacked” due to a mistake in the setup of its web server. “As soon as we discovered the breach in our systems, we immediately deleted the entire website and the database associated with it,” the unsigned statement continues. “As far as we can tell, the breach has effected [sic] 500MB of images, and 0 personal information from the database.”

The rebuttal comes after another anonymous claim, made via a posting on the Pastebin site – commonly used by hackers to post claims and conquests – that the administrator of Snapsaved had provided one or more hackers with a way to browse the content on the site.

“The content released from this site was provided to us by the administrator of the site,” the writer claimed. “Users could freely browse all media on this website, and view as per user account.


EU’s new digital commissioner calls celebrities in nude picture leak ‘stupid’ | World news | The Guardian

EU’s new digital commissioner calls celebrities in nude picture leak ‘stupid’ | World news | The Guardian.

Germany’s Günther Oettinger says stars who put naked photos of themselves online could not count on his protection

 

 

Günther Oettinger during his hearing at the European parliament
Günther Oettinger said celebrities ‘stupid enough’ to put nude photos online did not deserve protection. Photograph: /Zuma/Rex

 

Former EU energy commissioner Günther Oettinger, 61, is used to accusations that he is more digitally naïve than digitally native by now. But at a hearing in front of the European parliament, the EU’s next commissioner designate for digital economy and society raised some serious questions about his suitability.

 

During a three-hour grilling by MEPs in Brussels, Oettinger said it would not be his job to protect stars “stupid enough to take a nude photo of themselves and put it online” – seemingly unaware that the recent leak of celebrities’ nude photographs had come about as a result of a targeted hacking attack.

 

Oettinger said: “We can mitigate or even eliminate some risks. But like with any technology, you can’t exclude all risks.

 

If someone is stupid enough as a celebrity to take a nude photo of themselves and put it online, they surely can’t expect us to protect them. Stupidity is something you can only partly save people from.”

 

Oettinger seemed to refer to the recent leak of nude photographs showing celebrities including actress Jennifer Lawrence and singer Rihanna, which took place after hackers targeted their victims’ iClouds. Most modern smartphones automatically store backups of photographs online, often without their users’ knowledge.

 

Oettinger’s comments sparked criticism from a number of MEPs and the German press. “He revealed that he still hasn’t understood the real problem behind these leaked pictures,” Green MEP Jan Philipp Albrecht told the Guardian. “Serious questions need to be asked about the security of cloud systems currently in use, and asking those questions is very much part of the job remit of the next EU commissioner for digital society.”


Filtración de fotos íntimas de famosas cuestiona la seguridad en la nube – El Mostrador

Filtración de fotos íntimas de famosas cuestiona la seguridad en la nube – El Mostrador.

Los expertos en seguridad barajan varios escenarios posibles para que los piratas informáticos tuvieran acceso libre a sus cuentas en la nube, para horror de las actrices y temor de los usuarios comunes, que en ocasiones no son conscientes de que sus datos están siendo almacenados.

nube

La filtración de decenas de fotografías de famosos en internet puso en tela de juicio la seguridad de los servicios de almacenamiento de datos en la nube, una cuestión que muchos consumidores siempre han visto con recelo.

Las imágenes de actrices como Jeniffer Lawrence posando para la cámara desnuda en fotos privadas que no estaban pensadas para que vieran la luz corrieron como la pólvora en las redes sociales para indignación de la actriz, que ha amenazado con demandar a cualquier medio que publique sus “fotografías robadas”.

¿El culpable? Una posible brecha de seguridad en el sistema de iCloud de Apple, que facilita el almacenaje de datos en el mundo virtual sin ocupar espacio en la memoria real de los aparatos electrónicos. La compañía descartó sin embargo que sus sistemas fueran vulnerados.

Las imágenes fueron difundidas en un mensaje en el foro 4chan por una persona (o grupo) anónima, que aseguraba que fueron obtenidas de las cuentas de iCloud de Lawrence y otras famosas como Kate Upton y Mary Elizabeth Winstead.


How to protect your digital photos from hackers | Technology | theguardian.com

How to protect your digital photos from hackers | Technology | theguardian.com.

After over 100 celebrities had their sensitive photos exposed this week, here are some tips on keeping yours safe from hackers

 

 

Jennifer Lawrence with her best actress Oscar
Jennifer Lawrence with her best actress Oscar Photograph: Mike Blake/Reuters

 

This week, nude photos of over 100 celebrities were posted online by an anonymous source who may have have got them by hacking the Apple iCloud online storage service, or guessing the security questions needed to gain access to each individual account.

 

Either way it has got many people wondering about the safety of their own photos, nude or otherwise, and about whether any snapshot taken on or shared via a digital device can ever be considered secure.

 

So how can you keep your own images away from uninvited viewers? Here are some quick pointers.


La amenaza mundial de las empresas profesionales de hackers – El Mostrador

La amenaza mundial de las empresas profesionales de hackers – El Mostrador.

4 de diciembre de 2013

La amenaza mundial de las empresas profesionales de hackers

Los ataques cibernéticos, con el objetivo de robar información o espiar a cualquiera, son cada vez más espectaculares y numerosos. ¿Cómo funciona está misteriosa y millonaria industria? ¿Quiénes realizan estas actividades?

hack1

“Si no me pagas dos Bitcoin (equivalentes aproximadamente a US$2.000), no podrás recuperar los archivos cifrados por el código maligno (malware) que está en tu computadora”.

Es el mensaje que recibe la persona que ha sido víctima del ataque de un troyano que se descubrió hace pocos meses y que se conoce como CryptoLocker. Este programa malicioso “secuestra” parte de la información que está en la máquina y solicita un “rescate” (dinero) para enviarle al preocupado usuario la clave que le permitiría desbloquear sus archivos.

La persona lo descubre porque se le abre un cuadro de diálogo con una especie de cronómetro que informa cuanto tiempo queda para la realización del pago. Si no se hace en ese lapso, la clave se destruirá.


Hackers roban código fuente y datos de usuarios de Adobe Systems – BioBioChile

Hackers roban código fuente y datos de usuarios de Adobe Systems – BioBioChile.

 

De Contexto | Jakub Krechowicz en Stock.xchngDe Contexto | Jakub Krechowicz en Stock.xchng

Publicado por Iván Oliveros | La Información es de Agencia AFP

El gigante del software Adobe Systems advirtió el jueves que piratas informáticos derribaron sus defensas y robaron un código fuente así como números de tarjetas de crédito y otras informaciones relativas a casi tres millones de clientes.

“Muy recientemente, el equipo de seguridad de Adobe descubrió sofisticados ataques contra su red, involucrando acceso ilegal a información de clientes y a un código fuente para numerosos productos de Adobe”, señaló el director ejecutivo de seguridad de la empresa, Brad Arkin, en un blog.


Fichaje estrella en el valle de los espías

http://internacional.elpais.com/internacional/2013/06/21/actualidad/1371823721_032590.html

La NSA campa a sus anchas por Silicon Valley: invierte de forma secreta en empresas, compra equipos y servicios, capta ‘piratas’

En 2010 reclutó al jefe de seguridad de Facebook

John Negroponte, en la Agencia Nacional de Seguridad, en 2006. / JASON REED

Cuando Max Kelly, el responsable principal de seguridad de Facebook, dejó la empresa de la red social en 2010 no fue a trabajar a Google, Twitter ni otra compañía similar de Silicon Valley. El hombre responsable de proteger la información personal de los más de mil millones de usuarios de Facebook contra ataques externos fue a otra institución gigantesca que procesa y analiza un inmenso volumen de datos: la Agencia Nacional de Seguridad (NSA).