Offline
Please post your discussion article as a reply to this topic. Be prepared to discuss your article. Read it, type up a brief summary and post a link to the original article here.
Thank You!
Dave
Offline
Here is an example. Facebook recently was hacked. The biggest hack in its history. 50 million user accounts exposed. The attack also gave the hackers access to other services that people logged into using their Facebook account, such as Tinder, Instagram, Spotify and Airbnb. If a user's account was compromised, they will be logged out of all devices and will have to reset their password.
This attack was apparently done using the site itself. Probably through a browser, just like in the movie. The link below is the original article.
Last edited by Admin (10/02/2018 11:31 am)
Offline
A Google project zero researcher discovered o proof-of-concept exploit in Linux kernel. The vulnerability could allow a attacker to to gain root privileges on the targeted system to corrupt or alter data creating a system crash or gain administrative privileges. The fix was released within two days however Debian and Ubuntu user were left exposed for more than a week after the vulnerability was announced publicly.
Offline
A man in Ohio, Phillip Durachinsky, was found guilty of Installing a malmare (fruitfly) on mac computers. The malware allowed this man to gain access to both the microphone and camera for nefarious purposes. The man was arrested nearly 13 years of committing these crimes.
Offline
The hacker group Hidden Cobra, which is based out of North Korea and is believed to be backed by the North Korean government has been using a hack known as FASTCash. FastCash, targets and tricks the switch application servers, which are the servers that communicate with the core banking system, by submitting fake user bank account information that looks legitimate to cash out ATM machines.
Link to article below.
Offline
Offline
New iPhone passcode bypass hack exposes photos & contacts. An iPhone enthusiast has found a way to bypass the lock code of the latest iphones with the help of Siri. If the attacker has physical access to the device, they can activate voice over and through a series of steps gain access to the phone's contacts, email, and photos.
Last edited by smiles6916 (10/03/2018 3:43 pm)
Offline
A group of North Korean hackers are have been identified as the ones responsible for netting "hundreds of millions' of dollars. The Korean hacking group are using the funds to fund the Pyongyang regime. It is also believed this group is behind hacking in and stealing from bank telling machines.
Offline
Seven Russian hackers working for the Russian military agency GRU have been arrested by US department of justice for a massive intrusion campaign. With many targets including, anti-doping agencies in varies countries, Ukrainian nuclear operations sites, and the Organization for the Prohibition of Chemical Weapons in the Netherlands. What made this case unique was how they went about their attack. when their remote efforts didn't work, they resorted to Parking vehicles outside of target buildings, to infiltrate Wi-Fi networks. They steal victims' credentials and attempt to plant espionage-oriented malware.
Offline