La comisión de control pide a los medios no informar de documentos de Macron – El Mostrador

La Comisión Nacional de Control de la Campaña Presidencial (CNCCEP) en Francia pidió hoy a los medios de comunicación no informar sobre los documentos internos difundidos en redes sociales tras el “pirateo masivo” contra el equipo del candidato socioliberal Emmanuel Macron.

Fuente: La comisión de control pide a los medios no informar de documentos de Macron – El Mostrador


Leaked NSA Malware Threatens Windows Users Around the World

“This is as big as it gets,” Hickey said. “Nation-state attack tools are now in the hands of anyone who cares to download them…it’s literally a cyberweapon for hacking into computers…people will be using these attacks for years to come.”

Fuente: Leaked NSA Malware Threatens Windows Users Around the World


Yahoo faces questions over delay in data breach revelation – FT.com

ft.com > Companies >TechnologySubscribe Sign in Home World Companies Energy Financials Health Industrials Luxury 360 Media Retail & Consumer Tech Telecoms Transport By Region Tools Markets Global Economy Lex Comment Work & Careers Life & Arts Try the new FT.comLast updated: September 23, 2016 11:59 pmYahoo faces questions over delay in data breach revelationNic Fildes and Madhumita Murgia in London, Tim Bradshaw in San Francisco Share Print Clip Commentsepa05552696 The Yahoo logo is pictured on a computer monitor in Taipei, Taiwan, 23 September 2016. According to news reports on 23 September, around 500 million Yahoo account users information had been stolen or hacked on its network in 2014. EPA/RITCHIE B. TONGO©EPAYahoo chief executive Marissa Mayer and her board are facing serious questions over the handling of the largest-ever cyber attack recorded, as customers, regulators and even its new owners search for answers on why a two-year-old data breach has only just come to light.

Fuente: Yahoo faces questions over delay in data breach revelation – FT.com


[Updated] Wikileaks Leak Of Turkish Emails Reveals Private Details; Raises Ethical Questions; Or Not… | Techdirt

Important Update: Michael Best has now come out and said that it was actually he who uploaded the files in question, which he got from the somewhat infamous (i.e., hacked the Hacking Team) hacker Phineas Fisher. Through a somewhat convoluted set of circumstances, it appeared the files were associated with the Wikileaks leak when they were not — and then basically everyone just started calling each other names:

Fuente: [Updated] Wikileaks Leak Of Turkish Emails Reveals Private Details; Raises Ethical Questions; Or Not… | Techdirt


¿Cuáles son las responsabilidades que conlleva una filtración? | Derechos Digitales

Cada cierto tiempo surgen nuevas noticias que dan cuenta de cómo hackers y whistleblowers develan información de interés público, usualmente política. Incluso en algunos países latinoamericanos se han creado plataformas que permiten hacer denuncias anónimas, siguiendo la misma tendencia. Esta actividad ha venido a suplir la falta de canales formales de acceso a la información pública, pero pueden presentar algunos problemas.

Fuente: ¿Cuáles son las responsabilidades que conlleva una filtración? | Derechos Digitales


Se cumple el aniversario de la filtración masiva de datos del Hacking Team | R3D: Red en Defensa de los Derechos Digitales

Hace un año, más de mil 500 correos electrónicos y 400 GB de información de la empresa italiana Hacking Team, dedicada a la venta de software para vigilancia, fueron hechos públicos.

Fuente: Se cumple el aniversario de la filtración masiva de datos del Hacking Team | R3D: Red en Defensa de los Derechos Digitales


Hacked Emails Reveal NATO General Plotting Against Obama on Russia Policy

Retired U.S. Air Force Gen. Philip Breedlove, until recently the supreme commander of NATO forces in Europe, plotted in private to overcome President Barack Obama’s reluctance to escalate military tensions with Russia over the war in Ukraine in 2014, according to apparently hacked emails from Breedlove’s Gmail account that were posted on a new website called DC Leaks.

Fuente: Hacked Emails Reveal NATO General Plotting Against Obama on Russia Policy


Russian government hackers steal DNC files on Donald Trump | Technology | The Guardian

Some of the hackers had been lurking in the systems since at least last summer, well before Trump sealed the Republican nomination, but only recently exfiltrated the Democratic party’s cache of files on Trump’s business dealings and past political statements, investigators said.

Fuente: Russian government hackers steal DNC files on Donald Trump | Technology | The Guardian


Hacking Team Is Back In Business, But Struggling To Survive | Motherboard

Earlier this year, a representative for the notorious surveillance vendor Hacking Team traveled to South America to pitch the company’s marquee spyware product to a potential new customer.The representative gave a presentation at the office of a government agency, showed off the spyware control center, and handed out some marketing materials.It was an unremarkable sales pitch—affirmed by the fact that the potential client decided not to buy, according to a source who attended the meeting—except for the timing, which was almost six months after what some consider Hacking Team’s near-death experience.

Fuente: Hacking Team Is Back In Business, But Struggling To Survive | Motherboard


Panamá Papers: las formas en las que los ricos y poderosos esconden riquezas y evaden impuestos – El Mostrador

Millones de documentos filtrados de la compañía panameña Mossack Fonseca muestran cómo la firma ayudó a clientes a lavar esconcer dinero y evadir impuestos.

Fuente: Panamá Papers: las formas en las que los ricos y poderosos esconden riquezas y evaden impuestos – El Mostrador


Paris climate summit: hackers leak login details of more than 1,000 officials | Environment | The Guardian

Private data including emails, usernames and phone numbers of 1,415 delegates posted online by Anonymous in protest against arrests of activists

Fuente: Paris climate summit: hackers leak login details of more than 1,000 officials | Environment | The Guardian


Sony Hack: Clooney Says Movie is about Snowden, Not Journalism – The Intercept

Sony Hack: Clooney Says Movie is about Snowden, Not Journalism – The Intercept.

BY NATASHA VARGAS-COOPER 

Featured photo - Sony Hack: Clooney Says Movie is about Snowden, Not Journalism

As curious journalists, tabloid writers, and Hollywood watchers pore over the massive trove of hacked Sony data, the public is being given a rare glimpse into the complicated world of Hollywood and politics. Tucked between bitchy emails about Angelina Jolie and snarky comments on Will Smith’s family are details of a chummy relationship between Sony executives and the CIA, as well as rare insight into how Hollywood views potential movies about NSA whistleblower Edward Snowden.

Sony’s plan to make a Snowden movie got rolling in January 2014, when Elizabeth Cantillon, then an executive producer at Sony, sentcompany Co-Chairman Amy Pascal an email saying she had successfully closed on the rights to the book, “No Place to Hide,” by The Intercept‘s founding editor, Glenn Greenwald.  “[Y]ou will be my Oscar date,” Cantillon promised Pascal.

In March of 2014, Sony officially optioned the rights to Greenwald’s book, which chronicles how he broke the Snowden story, and moved forward with plans for a movie.


Empresa busca ‘hácker’ | Tecnología | EL PAÍS

Empresa busca ‘hácker’ | Tecnología | EL PAÍS.


Algunas compañías se sirven de ‘piratas’ para que examinen sus debilidades

Jóvenes especialistas españoles hacen carrera en Estados Unidos

Asistentes a una feria informática en Londres. / C. R. (BLOOMBERG)

Enviar a LinkedIn37
Enviar a TuentiEnviar a Eskup

EnviarImprimirGuardar

“Puedes acompañarnos ahora o, si quieres, esperamos abajo hasta que vayas a comprar el pan”, le dijeron. Al salir del portal le pusieron las esposas y fue a comisaría. A. G. I. se lo olía. Era noviembre de 2012. Desde agosto, este experto en pirateo informático de 26 años que prefiere no dar su nombre, sabía que tarde o temprano recibiría esa visita.

La policía española se lo llevaba al calabozo durante algo menos de un día a comienzos de noviembre. La culpa, asegura, la tuvo su curiosidad. Vio una máquina expendedora de billetes en Atocha estropeada, se puso a investigar y descubrió que todos los archivos donde se guardaban las tarjetas de crédito de los clientes estaban accesibles en Internet, sin cifrar.

Cumple todos los requisitos para cubrir un puesto que no se publica en los listados de Linkedin, sino que se demuestra poniendo a prueba contraseñas, sistemas de seguridad, vigilancia y control. Sus formas rozan la frontera de la ley. Según Glassdoor, una web de comparación de perfiles y salarios, el salario de este tipo de háckers oscila entre 180.000 y el millón de dólares. Los expertos consultados prefieren no dar su suelto exacto, pero asegura que no se corresponde con la realidad.

“Mandé un correo a Renfe, pero nadie dijo nada”, se excusa con cara de no haber roto un plato. Profundizó en su conocimiento hasta alcanzar la hazaña que todo hácker sueña, presentar el caso en la DEFCON, la conferencia anual en Las Vegas. “Normalmente lleva más tiempo, introducirse en un sistema es sencillo de contar, pero tiene mucha reflexión y estrategia detrás”, aclara.

El salario de este tipo dehácker profesional oscila en EE UU entre 180.000 y un millón de dólares

Tras la charla comenzó su persecución, cuando su travesura comenzó a cobrar rango de hazaña. Por suerte, un acuerdo verbal y el compromiso de ayudar a solventar el fallo fueron suficiente para recobrar la libertad.

Entre el público se encontraba otro joven español, A. P., mánager senior de una empresa estadounidense, que también prefiere reservar su identidad. Allí mismo, se fijó en su compatriota. “Este tipo es peligroso, pero creo que lo podemos convertir”, pensó. Entonces habló con su jefe y su paisano entró a trabajar como penetration hacker (experto en colarse). En agosto hizo un año que comenzó la relación laboral y en octubre cumplirá el primero en San Francisco.

Esta modalidad va más allá de pantallas y teclados. Si hace falta físicamente, o con un disfraz, por todos los medios posibles en las empresas hasta conseguir una base de datos concreta, la clave del garaje o el sistema de turnos. “Me lo tomo como un reto y me pagan, muy bien, por romper cosas”, confiesa en el argot, para referirse a reventar la seguridad.

La pizza es su mejor aliada. “A todo el mundo le gustan, así que haces de repartidor y tienes el acceso casi asegurado a muchísimos lugares”, dice con expresión pícara. Nunca se ha lucrado por los ataques, es lo que se llama “sombrero blanco”, búsqueda de errores para alertar de los mismos, documentarlo y que se corrijan. Solo ataca a su compañía y a empresas integradas en esta. Una decena en los últimos dos años y varios edificios por toda la Bahía. El trabajo no termina nunca. Las comprobaciones son constantes. Cuando termina, comienza la ronda de nuevo para buscar nuevas filtraciones.

Quizá no sea el chico más popular de su empresa: “Pisas demasiados callos como para caer bien. A nadie le gusta que le digan que lo ha hecho mal, pero reflexionan y se dan cuenta de que es bueno ponerse a prueba”. A. P. dice que le parece natural que haya fallos: “La proporción es indicativa. Por cada 12 o 15 que crean algo, hay uno para ponerlo a prueba. Los humanos cometemos errores, por supuesto”. Él busca los que haya en el software. A. G. I. usa la ingeniería social, algo así como el conocimiento de los mecanismo humanos para caer en trampas. “El hombre es el eslabón más débil de la cadena. Donde hay un persona, puede haber una vulnerabilidad”, apunta.


Gang of hackers behind nude celebrity photo leak routinely attacked iCloud | Technology | The Guardian

Gang of hackers behind nude celebrity photo leak routinely attacked iCloud | Technology | The Guardian.

‘Months of hard work’ behind publication of more than 100 stars’ private photos as hackers ask for bitcoin and go underground
Jennifer Lawrence

Hackers claimed to have obtained nude pictures of Jennifer Lawrence at the end of August. Photograph: Frederic J. Brown/AFP/Getty Images

A gang of hackers who collected and traded nude pictures of female celebrities by routinely breaking into Apple‘s iCloud system were the source of private photographs leaked online, new evidence shows.

Private photos and videos of more than 100 mostly female American and British stars were released on the internet on Monday from the 4chan website, sparking condemnation from the Oscar-winner Jennifer Lawrence and other actors including Kirsten Dunst, Kate Upton and Briton Jessica Brown Findlay.

Chatroom transcripts show that “OriginalGuy”, a member of the gang who has now gone on the run, boasted that the hacking of accounts belonging to Lawrence and others “is the result of several months of long and hard work” and that “several people were in on it”.

Other chatroom transcripts show that the gang had offered nude pictures of female celebrities and athletes for sale, and others offered to “rip” the iCloud backup accounts containing photos for anyone once they were given their user name and password. The iCloud backups come from the stars’ iPhones, which automatically store photos online for up to 30 days or until they are downloaded.

The revelation comes as the FBI and Apple started investigating the security breach, the most serious ever to affect the iPhone maker and a serious blow to its efforts to push new devices expected to incorporate mobile payment functions next week.

There are more than 800 million iCloud accounts globally – but the chatroom transcripts suggest there is now a growing semi-professional trade in “ripping” iCloud accounts, posing a serious problem for Apple’s security profile.


The Great Naked Celebrity Photo Leak of 2014 is just the beginning | Roxane Gay | Comment is free | theguardian.com

The Great Naked Celebrity Photo Leak of 2014 is just the beginning | Roxane Gay | Comment is free | theguardian.com.

There will always be another leak, because there is always curiosity in the bodies of nude celebrity women. There is always danger in being an Other

 

 

naked jennifer lawrence
BREAKING: beneath their clothes, celebrities are naked – even Jennifer Lawrence Photograph: ADREES LATIF/REUTERS

 

Privacy is a privilege. It is rarely enjoyed by women or transgender men and women, queer people or people of color. When you are an Other, you are always in danger of having your body or some other intimate part of yourself exposed in one way or another. A stranger reaches out and touches a pregnant woman’s belly. A man walking down the street offers an opinion on a woman’s appearance or implores her to smile. A group of teenagers driving by as a person of color walks on a sidewalk shout racial slurs, interrupting their quiet.

 

For most people, privacy is little more than an illusion, one we create so we can feel less vulnerable as we move through the world, so we can believe some parts of ourselves are sacred and free from uninvited scrutiny. The further away you are from living as a white, heterosexual, middle-class man, the less privacy you enjoy – the more likely your illusions of privacy will be shattered when you least expect it.

 

For celebrities, privacy is utterly nonexistent. You are asked intrusive questions about your personal life. You can be photographed at any moment. Your family is investigated, photographed or harassed daily – parents, children, sometimes even siblings also losing any semblance of privacy simply because you share the same blood or name. Celebrity is, in some ways, an infection that is only marginally beneficial.

 

We’re not going to cry for celebrities, of course, not really. When you choose that life, you must sacrifice certain dignities for the privilege of fame, of fortune. For the most part, these intrusions or privacy are all in good fun, fodder for gossip magazines and websites – because … celebrities, they’re just like us! They go to the grocery store! They drink coffee! They wear sweatpants! Celebrities are just like us until they aren’t, until such intrusion involves the celebrity woman’s body, in intimate poses, splayed across the internet for delectation and debauchery and debate.

 

On Sunday, a user on 4chan made good on a promise made several days ago and leaked nude and otherwise revealing photos of Jennifer Lawrence, Lea Michele, Kate Upton, Kirsten Dunst, Hope Solo and other famous young women. This leak is likely only the beginning. Because there will always be another leak, because there is an insatiable curiosity when it comes to the nude celebrity woman’s body. She puts herself in the public eye and, in turn, we are entitled to see as much of her as we so desire, or so I am sure the justification goes.

 

It goes without saying that there aren’t many nude photos of men being released. Men are largely free to bare their bodies as they choose without repercussion, unless, as is the case of Dave Franco with Allison Brie and Justin Verlander with Upton, the man happens to be in a picture with a young woman, collateral damage.

 

It’s not clear what the people who leak these photos hope to achieve beyond financial gain and a moment of notoriety. I suppose such impoverished currency is enough. The why of these questions is hardly relevant. These hackers are not revealing anything the general public does not already know. BREAKING: beneath their clothes, celebrities are naked.


Hackers peruanos vulneran seguridad de la FACH y filtran cientos de correos electrónicos de la institución – El Mostrador

Hackers peruanos vulneran seguridad de la FACH y filtran cientos de correos electrónicos de la institución – El Mostrador.

Los correos son entre febrero y mayo del 2013 y contienen detalles de las negociaciones entre la institución y empresas de Israel y EE.UU., entre otros países. El hecho deja en evidencia una vulnerabilidad en la institución, aunque fuentes cercanas a la FACH sostienen que la información liberada no pone en riesgo la Seguridad Nacional. La acción es una ‘venganza cibernética’ por una acción cometida por hackers chilenos hace cinco años. La Fuerza Aérea designó a un fiscal para investigar los hechos.

Foto Hack Fach

El jueves pasado el grupo de hackers Lulz Security Perú (@LulzSecPeru) anunció a través de su cuenta de Twitter que hackeó a la Fuerza Área de Chile (FACH) y “liberó” cientos de correos electrónicos.

El ataque evidenció una debilidad en el sistema de ciberseguridad de la FACH. La información corresponde a dos cuentas de correos electrónicos. La primera es del Departamento de Pasaportes y Visas y contiene datos privados (Rut, fechas de nacimiento, estado civil, entre otras) de funcionarios de la institución y de sus familiares.

La segunda son los correos del Departamento de Administración de Contratos del Comando de Logística y contienen una serie de negociaciones y contratos de la FACH para la adquisición de misiles, sistemas de radares y aviones, entre otros productos.

Consultados por el ataque, desde la FACH dicen que “efectivamente entre mayo y junio de 2013 se detectó que dos casillas de correo institucional fueron vulneradas, para lo cual se adoptaron inmediatamente las medidas de seguridad informática pertinentes”. Además, aseguraron que “este hecho puntual, no significó una vulneración a la seguridad nacional, tras lo cual se han mantenido los máximos estándares en materia de seguridad informática”. Finalmente, agregaron que los sistemas de correos funcionan con total normalidad, “bajo estrictos parámetros de fiscalización y los debidos resguardos de los sistemas de protección informática, que permiten alertarnos sobre acciones de esta naturaleza”.


FBI warns that Anonymous has hacked US government sites for a year | Technology | theguardian.com

FBI warns that Anonymous has hacked US government sites for a year | Technology | theguardian.com.

Official memo says that activist collective launched a rash of electronic break-ins beginning last December
Anonymous

Campaigners say the Anonymous attacks were in retaliation for overzealous prosecution of hackers. Photograph: Alex Milan Tracy/Demotix/Corbis

Activist hackers linked to the collective known as Anonymous have secretly accessed US government computers and stolen sensitive information in a campaign that began almost a year ago, the FBI warned this week.

The hackers exploited a flaw in Adobe Systems Inc’s software to launch a rash of electronic break-ins that began last December, the FBI said in a memo seen by Reuters, then left “back doors” to return to many of the machines as recently as last month.

The news comes a day after an Anonymous activist received a 10-year sentence for his role in releasing thousands of emails from the private intelligence firm Stratfor. On Friday Jeremy Hammond told a Manhattan court he had been directed by an FBI informant to break into the official websites of several governments around the world.

Hammond, who called his sentence a”vengeful, spiteful act”, said of his prosecutors: “They have made it clear they are trying to send a message to others who come after me. A lot of it is because they got slapped around, they were embarrassed by Anonymous and they feel that they need to save face.”


Résumé Shows Snowden Honed Hacking Skills

http://www.nytimes.com/2013/07/05/us/resume-shows-snowden-honed-hacking-skills.html?pagewanted=1&_r=0&src=rechp

By and Published: July 4, 2013

In 2010, while working for a National Security Agency contractor, Edward J. Snowden learned to be a hacker.

Tobias Schwarz/Reuters

A rally in support of Edward J. Snowden in Berlin on Thursday. He remained marooned at an airport in Moscow.

He took a course that trains security professionals to think like hackers and understand their techniques, all with the intent of turning out “certified ethical hackers” who can better defend their employers’ networks.

But the certification, listed on a résumé that Mr. Snowden later prepared, would also have given him some of the skills he needed to rummage undetected through N.S.A. computer systems and gather the highly classified surveillance documents that he leaked last month, security experts say.

Mr. Snowden’s résumé, which has not been made public and was described by people who have seen it, provides a new picture of how his skills and responsibilities expanded while he worked as an intelligence contractor. Although federal officials offered only a vague description of him as a “systems administrator,” the résumé suggests that he had transformed himself into the kind of cybersecurity expert the N.S.A. is desperate to recruit, making his decision to release the documents even more embarrassing to the agency.


‘Plan B’: Snowden repartió copias cifradas de los archivos secretos por si le pasa algo

http://actualidad.rt.com/actualidad/view/98414-snowden-copias-cifradas-archivos-secretos

Publicado: 26 jun 2013 | 3:32 GMT Última actualización: 26 jun 2013 | 3:32 GMT

RT

Edward Snowden ha repartido copias codificadas de los archivos secretos que tiene en su poder entre varias personas. Los archivos se desbloquearían en caso de que le llegue a pasar algo al ex empleado de la CIA.

Así lo declaró este martes al portal estadounidense ‘The Daily Beast’ Glenn Greenwald, el periodista del diario británico ‘The Guardian’ que publicó lasfiltraciones de Snowden.

FBI niega que hackers se robaran datos de 12 millones de usuarios de Apple

http://rbb.cl/3i8e

Miércoles 5 septiembre 2012 | 9:54
Publicado por Gabriela Ulloa | La Información es de Agencia AFP · 212 visitas
Imagen:Plastic People (CC)Imagen: Plastic People (CC)

Un grupo de hackers denunció haber obtenido datos personales de 12 millones de usuarios del iPhone y iPad de Apple, al piratear un computador del FBI, lo que aumenta la preocupación sobre los controles gubernamentales en Estados Unidos.