14.6 C
London
Tuesday, September 26, 2017
Home Tags Celeb

Tag: celeb

While trying to hammer a medical blogger, Goop nails the best ways to sell BS.
F@#!ING IN-LAWS Gordon Ramsay's father-in-law has admitted conspiring to hack into the computer systems of businesses run by the celebrity chef.…
Plans start with a YouTube-based news channel, and extend to new broadcast options.
Illinois resident Edward Majerczyk illegally accessed around 30 celeb accounts and compromised photos and videos.
Czech police have detained a man wanted in connection with criminal cyber attacks on US targets. Czech police have arrested a 30-year-old Russian man, Yevgeniy N., wanted in connection with criminal cyber attacks on US targets, including LinkedIn. "This arrest, pursuant to an INTERPOL Red Notice, highlights the collaboration that exists between US law enforcement and our international partners," the FBI said in a statement. "Due to the ongoing investigation, no additional details can be provided at this time." A court must now decide whether to extradite the suspect to the US—a move Russia is prepared to fight. "We insist that the detainee is handed over to Russia," a spokesman for the country's embassy in Prague told local news agency TASS. Four years ago, hackers gained access to more than 6 million of the enterprise social network's 161 million users.
It made headlines again this year, however, when passwords stolen in that breach appeared online in May.

Celeb social media accounts were subsequently hacked, as were those belonging to Mark Zuckerberg. The hacker claiming responsibility (who goes by the name "Peace") told Motherboard earlier this year that there are 167 million-plus accounts in the database—about 117 million of which include emails and encrypted passwords. Peace was reportedly selling the stolen account data on the dark Web for five bitcoin (about $3,143). "Following the 2012 breach of LinkedIn member information, we have remained actively involved with the FBI's case to pursue those responsible," a LinkedIn spokeswoman said today. "We are thankful for the hard work and dedication of the FBI in its efforts to locate and capture the parties believed to be responsible for this criminal activity." Yevgeniy N. does not appear to be linked to recent political hacks in the US, according to Reuters.
Let's call the whole thing off Something for the Weekend, Sir? Here's a photo of what I had for lunch! Amazing!!! No it isn't amazing.
It's your lunch. You gotta see the new 4k TV I bought today! Thanks for giving me a fascinating, if cursive, inventory of your consumer durables. Took Jonesy out for his walk and he chased a rabbit. Nice to have your pet's name.

Could be useful. 28 today!!! Your date of birth is gratefully received too. May I also have your mother's maiden name? Hey john im setting off CUL8R Thanks. Now I know you're out with John, I can break into your flat and nick that TV. OMG just got back from the proctologist Well, that really puts the finger on the problem: nothing is secret any more.

As Bette Midler notoriously quipped, the only way we're going to see parts of Kim Kardashian that she hasn't already laid bare to the world is if she were to "swallow the camera." Various surveys and reports over the summer have highlighted the rise in identity theft and put the blame squarely on the idiot public's misuse of social media. With everyone sharing their most intimate details to all and sundry, no wonder computer systems are so hackable, we're told. Well, perhaps. On the other hand, this is a bit like a drugged-up speed racer mowing down a little old lady who steps into the road, and then blaming her for not using a pedestrian crossing. Youtube Video Or to put it in recognisably politically correct terms, it’s like telling a woman she deserved what she got, going out "dressed like that." Most IT security currently revolves around the sharing of little secrets. Unfortunately, rather like the secret life of Walter Mitty and James Bond's agent code number, these tend to be the worst-kept secrets you can possibly imagine. Let's have a look at these secrets, shall we? The date on which I was born. The place in which I was born. My mother's maiden name. My pet's name. My favourite food. My bank account details. My phone number. The total on my last bill. Gosh, those are going to present a devilish challenge to a hacker, I must say.

Even the slightly more esoteric secrets shouldn't be too hard to guess with a little social media trawling: The last film I cried at. My favourite holiday destination. My favourite subject / teacher / brand of cigarettes while at school. Basically, what IT security chiefs are saying is that if a hacker breaks into my account, it's probably because I told someone my date of birth. Much though I'd like to keep such things a total secret, it does make inviting friends to your birthday party very challenging.

As for my pet, IT chiefs would rather I give it a name comprised of upper- and lower-case letters, three numbers and at least one special character before I consider shouting it aloud in the park. I plan to sell the dog and replace it with a correct battery horse staple. Frankly, the business of blaming people for allowing their very existence to be public knowledge, essentially turning us all into what the newspapers thrillingly refer to as "a bit of a loner," seems an odd way of tackling security failings in the systems supposedly designed to protect us. Such is the laxity of the IT security that binds the modern world together: we are witnessing a return to the good old days of writing passwords on pieces of paper.

And – my favourite – proving to retailers that I am the entirely legitimate bearer of a contactless debit card by merit of holding it in my hand. Some 17 months ago, I suggested grasping the biometric nettle by issuing "arsewords" to allow access to the company washrooms. While biometrics are just another kind of shared secret, they are rather more difficult to guess at, and DNA chains are impossibly awkward to share by mistake on Twitter. Even so, as tech-in-the-wild grows equally more sophisticated than the security systems invented to fox serious hackers, it is possible, even likely, that we will become even easier to hack in a biometric future. While it takes some hard graft to go hunting round parish records and government registries, let alone filtering out the white noise of social media, all a future hacker needs is a single hair follicle, and they'll own my entire DNA print. Very slowly, the industry is beginning to consider the prospect of providing access permissions in ways that don't involve dull passwords, guessable secrets and physically holding an eminently nickable device such as a debit card or a smartphone. AI systems have been developed to help identify callers in telephone banking, supposedly right down to spotting whether the caller is acting shiftily. Given that "shifty" is my normal mode of behaviour, this could present a problem.

Except, of course, the AI should realise this and only raise warning flags if I begin to act uncharacteristically open and friendly, but only if it knows my usual demeanour – which is something that could be impersonated. I suggest most criminals will find it easier to do a little acting than to do a lot of IT security penetration.

This is just the same as calling up a celebrity's voicemail and pretending to be the dim celeb in question by typing the default 1234 PIN.
It's not really the celeb's fault for being dim so much as the telephone company thinking this amounts to a secure voicemail system. Let's rethink the concept of what counts as access credentials. Passwords and even two-factor authentication just don't seem to do it any more, because the passwords are guessable and the two-factor device (typically a smartphone) is itself easy to hack and even easier to steal. Until then, our back doors are permanently open to rogue hacker proctologists. People have lost the art of keeping a secret. ® Youtube Video Alistair Dabbs is a freelance technology tart, juggling IT journalism, editorial training and digital publishing. When he raised the issue with fintech experts of looming government plans to outlaw end-to-end encryption, they refused to express any opposition to them.
So don't expect much advancement in banking security any time soon. FBI Update: 14kg
Mark Zuckerberg wasn't the only hackers' only target. Mark Zuckerberg made headlines this weekend when hackers broke into the Facebook CEO's other social media accounts.

But the T-shirt-wearing billionaire isn't the only one picking up the pieces of an online assault. A number of other verified celebrity Twitter handles were also compromised, including Keith Richards and Tenacious D, the latter which tweeted Sunday to confirm Jack Black is still alive.

The comedy rock duo of Black and Kyle Gass called the hack a "sick 'prank.'" According to The Verge, other accounts—Katy Perry, Kylie Jenner, the late Ryan Dunn—were also compromised, though any traces of an intrusion have since been deleted from Twitter.
It remains unclear whether any of these hacks are related, but as The Verge pointed out, the high volume and short time frame is "unusual." Celebrities—they're just like you: They don't use strong passwords (or other measures like two-factor authentication and password managers) to thwart would-be attackers. The hack on Zuck's account was carried out by the OurMine Team, which said his password was one of more than 100 million obtained during a 2012 LinkedIn hack.

Though that happened four years ago, an additional set of data from the breach was released last month, prompting more recent hacks. Recent reports suggested the 2012 hacker (who goes by the name "Peace") is selling the stolen account data on the dark Web for five bitcoin (about $2,923). Twitter quickly suspended Zuck's account, and any fake messages posted to Pinterest were scrubbed. Random Access: Fujifilm X70, Mark Zuckerberg hacked, Steam Machines flopping, shake-up at NEST Posted by PCMag on Monday, June 6, 2016