Home Tags Hacking

Tag: Hacking

In computer security, a hacker is someone who focuses on security mechanisms of computer and network systems. While including those who endeavor to strengthen such mechanisms, it is more often used by the mass media and popular culture to refer to those who seek access despite these security measures. That is, the media portrays the ‘hacker’ as a villain. Nevertheless, parts of the subculture see their aim in correcting security problems and use the word in a positive sense. White hat is the name given to ethical computer hackers, who utilize hacking in a helpful way. White hats are becoming a necessary part of the information security field. They operate under a code, which acknowledges that breaking into other people’s computers is bad, but that discovering and exploiting security mechanisms and breaking into computers is still an interesting activity that can be done ethically and legally. Accordingly, the term bears strong connotations that are favorable or pejorative, depending on the context.

Cyber espionage group APT15 is back, this time stealing sensitive data from a UK government contractor.
Judge Koh trims class-action complaint, but suit will proceed The remains of Yahoo! will be forced to defend the class action complaint filed by customers whose data was exposed in the 2014 megahack.…
"I work hard, and Irsquo;m smart, but I do have an uphill battle going forward."
And rising car thefts suggest the criminals are taking advantage Cars are getting smarter every year but their increasing computational power isn’t being backed up by good IT security practices – hacking them is child’s play.…
Advanced router code has been in circulation for six years If you’re trying to hack an organization then pwning the sysadmin's machine gives you the keys to the kingdom, and an advanced malware writer has found a clever way to do just that.…
Advanced hacking group appears to be native English speakers targeting Africa, Middle East.
Phil Bredesen's campaign for US senate sees a hacker's hand in email messages

Masha and these Bears

Sofacy, also known as APT28, Fancy Bear, and Tsar Team, is a prolific, well resourced, and persistent adversary.

They are sometimes portrayed as wild and reckless, but as seen under our visibility, the group can be pragmatic, measured, and agile.
Kaspersky Lab researchers uncover evidence of how the attackers who targeted the Winter Olympic Games impersonated an infamous North Korea hacking team.
A couple of days after the opening ceremony of the Winter Olympics in Pyeongchang, South Korea, we received information from several partners, on the condition of non-disclosure (TLP:Red), about a devastating malware attack on the Olympic infrastructure.
FlawedAmmyy campaign is thought to be the work of a prolific hacking group that has been distributing the malware via phishing emails.
Far from helping organizations defend themselves, hacking back will escalate an already chaotic situation.