Offline
Article on programs that have not been cracked. TrueCrypt is on the list, but the article is a few years old.
Offline
Austin Thompson has pleaded guilty to attacking several well known gaming servers back in 2013-2014. The attacks caused at least $95000 in damages. Thompson used his Twitter account to brag about his attack by providing screenshots of servers being unavailable after his DDoS attack.
Offline
Rosa Perez
White hat hackers competition held Nov 13-14 in Tokyo found that Iphone X with IOS 12.1, Samsung Galaxy 9, Xiaomi Mi6 running the latest version of software from popular smartphone manufacturers can be hacked. A team of two researchers, Richard Zhu and Amat Cama, who named themselves Fluoroacetate, discovered and managed to exploit a pair of vulnerabilities in a fully patched Apple Iphone X over WiFi. For their target they chose to retrieve a photo that had recently been deleted from the Iphone. They also hacked in the Samsung Galaxy S9 by exploiting a memory heap overflow vulnerability in the phone's baseband component and obtaining code execution. Xiaomi Mi6 handset via NFC(near-field communications) which is using the touch-to-connect feature, they forced the phone to open the web browser and navigate to their specially crafted webpage. With the highest of 45 points and a total of $215,000 prize money, Fluoroacetate researchers Cama and Zhu earned the title "Master of Pwn, logging five out of six successful demonstrations of exploits against Iphone X, Galaxy S9, & Xiaomi Mi6. The vulnerabilities will be available in 90 days and they will remain open until the affected vendors issue security patches to address them.
Offline
Due to what was "almost certainly an error", BGP mishap routes google's traffic through Chinese and Russian networks, brings down google temporarily.
What happened:
A small ISP in Nigeria, MainOne Cable Company improperly updated tables in the internet's global routing system advertising one of it's routes as the correct route to reach IP addresses owned by Google
A Chinese carrier, China Telecom, improperly accepted the route that was advertised by MainOne and advertised it world wide
This caused a major Russian carrier, Transtelecom, as well as other ISPs to begin using this route.
This redirected some of google's most sensitive traffic through networks they were not intended for. The event lasted 74 minutes.
While it has been claimed by all parties to be an accident, this event is being heavily scrutinized.
-Skyler
Offline
[url]
,news-28531.html[/url] The article explains how easy it is to hack into a ATM machine using various methods. they where able to hack into 22 out of 24 ATMs machines with relative ease.Offline
Let the trade war commence! Servers deployed by major companies in the United States have been bugged with micro spy chips from China. China is most likely trying to gather data from U.S companies to see how buisnesses here operate, so they can learn and gain an edge. China's already on track to surpass the United States GDP (Gross Domestic Product) in the next few years. These micro spy chips could help China get there even faster.
Last edited by BlaineP16 (11/18/2018 8:18 pm)
Offline
NYU researchers have been using machine learning methods to create fake fingerprints to fool fingerprint sensors used by smartphones. Since most sensors on a smartphone use only a portion of a fingerprint the researchers made fake Master prints from similarities from multiple fingerprints. The idea is that someone could use a a collection of these master prints sort of like a password dictionary attack. They only used the prints they made in simulated computer programs not on actual sensors yet. The article also said that by using this information manufacturers could make the sensors more sensitive to help secure the devices
Offline
Researchers at the New York University have used machine learning to create synthetic "Masterprints" that have the ability to easily trick mobile finger prints scanners to even more secure fingerprints scanning systems like VeriFinger used by government entities. These synthetic prints combine use common finger print traits and capitalize on the fact the most sensors only use a snippet of the actual finger print. The NYU researchers are very keen to clarify that they did not make print out or other replicas of these master prints, but to raise awareness in the biometrics industry to the importance of defending against sythentic readings.
James Ramsey
Offline
Make a wish foundation website had been intruded. Hackers added a JavaScript-based code to the website, that took advantage of users' computers in order to mine cryptocurrency.
~Seth Sampson
Offline
Japan's Cyber Security minister admits that he has never personally used a computer, calling into question his ability to protect their national cyber infrastructure.
Bonus article:
Posted by Phil Bentz
Last edited by HawkLegion (11/19/2018 11:23 am)