CypherGhost

Home > Other > CypherGhost > Page 26
CypherGhost Page 26

by D S Kane


  http://www.zdnet.com/pictures/free-ways-to-learn-about-it-security-and-hacking-online/

  July 30, 2016 – Basic hacking 101

  https://breakdev.org/defeating-antivirus-real-time-protection-from-the-inside/

  July 30, 2016 – Russian Computer Networks Attacked After DNC Hacks

  http://www.newsweek.com/russian-computer-networks-attacked-dnc-hacks-485671

  July 30, 2016 – The EMV chip credit card transition in the US has been a disaster —Quartz

  http://qz.com/717876/the-chip-card-transition-in-the-us-has-been-a-disaster/

  July 30, 2016 – The Hacker Who Turns Office Equipment into Bugging Devices | Motherboard

  https://motherboard.vice.com/read/the-hacker-who-turns-office-equipment-into-bugging-devices

  July 29, 2016 – Edward Snowden & WikiLeaks clash on Twitter over how to better leak data —RT News

  https://www.rt.com/news/353948-snowden-wikileaks-twitter-clash/

  July 29, 2016 – Hacker Mass-Scans Dark Web Sites for Vulnerabilities, Dumps Results | Motherboard

  http://motherboard.vice.com/read/hacker-mass-scans-dark-web-sites-for-vulnerabilities-dumps-results

  July 29, 2016 – A Famed Hacker Is Grading Thousands of Programs —and May Revolutionize Software in the Process

  https://theintercept.com/2016/07/29/a-famed-hacker-is-grading-thousands-of-programs-and-may-revolutionize-software-in-the-process/

  July 29, 2016 – Cybersecurity expert tips for attending the DEF CON hacker convention – Business Insider

  http://www.businessinsider.com/def-con-hacker-convention-2016-7

  July 27, 2016 – The Motherboard e-Glossary of Cyber Terms and Hacking Lingo | Motherboard

  http://motherboard.vice.com/read/hacking-glossary

  July 25, 2016 – ‘No More Ransom’ helps you fight ransomware without paying

  https://www.engadget.com/2016/07/25/no-more-ransom-helps-you-fight-ransomware-without-paying/

  July 25, 2016 – Hackers published replicas and blueprints to TSA master luggage keys | VICE News

  https://news.vice.com/article/hackers-published-replicas-and-blueprints-to-tsa-master-luggage-keys

  July 25, 2016 – Bank hacks raise fears for financial sector

  http://phys.org/news/2016-07-bank-hacks-financial-sector.html

  July 24, 2016 – Snowden Developing Hardware to Stop iPhone Snooping

  http://www.newsweek.com/snowden-developing-hardware-stop-iphone-snooping-483343

  July 23, 2016 – These Are The Programs ISIS Uses To Remain Anonymous Online

  http://gizmodo.com/new-report-highlights-the-kinds-of-programs-isis-uses-t-1784161000

  July 21, 2016 – The GOP platform seems to endorse ‘hacking back’ – Business Insider

  http://www.businessinsider.com/gop-platform-hacking-back-2016-7

  July 20, 2016 – Don’t Panic, But Our Technology Now Defies Human Understanding | Co.Exist | ideas + impact

  http://www.fastcoexist.com/3061952/dont-panic-but-our-technology-now-defies-human-understanding

  July 17, 2016 – Michael Bazzell’s Newsletter – June 2016

  http://tinyletter.com/IntelTechniques/letters/michael-bazzell-s-newsletter-june-2016

  July 15, 2016 – Hacking Lessons From geohot – CYBERWAR – VICELAND

  https://www.viceland.com/en_us/video/demo-hack-with-geohot-scene/5784f841c72473542b76eb70

  July 15, 2016 – Geohot: How to hack a computer with an exploit – Business Insider

  http://www.businessinsider.com/geohot-how-to-hack-a-computer-exploit-2016-7

  July 14, 2016 – US sentences Chinese hacker for stealing military information

  http://www.bbc.co.uk/news/world-us-canada-36791114

  July 14, 2016 – The Mr. Robot Hack Report: Ransomware and owning the Smart Home

  http://www.theverge.com/2016/7/13/12178410/mr-robot-season-2-episode-1-unmask-recap-hack-smart-home-ransomware

  July 13, 2016 – Pitch Us On the Hacks We Can’t See | Motherboard

  http://motherboard.vice.com/read/pitch-us-on-the-hacks-we-cant-see

  July 11, 2016 – Now it’s easy to see if leaked passwords work on other sites | Ars Technica

  http://arstechnica.com/security/2016/07/password-reuse-tool-makes-it-easy-to-id-vulnerable-accounts-on-other-sites/

  July 11, 2016 – Google notifies users of 4,000 state-sponsored cyber attacks per month: executive | Reuters

  http://www.reuters.com/article/us-google-cyberattack-idUSKCN0ZR2IU

  July 10, 2016 – Anonymous hacking group exposes tech firms hosting ISIS websites | Daily Star

  http://www.dailystar.co.uk/news/latest-news/529065/Anonymous-hacking-group-exposes-US-and-UK-tech-firms-hosting-ISIS-websites

  July 10, 2016 – NSA labels Linux Journal readers and Tor and Tails users as extremists

  http://www.digitaltrends.com/computing/nsa-labels-linux-tails-users-extremists/

  July 9, 2016 – This Israeli company specializes in ‘cyber deception’ – Tech Insider

  http://www.techinsider.io/cymettria-cyber-deception-2016-7

  July 1, 2016 – Spy Agency Happenings! is out! Edition of 01 July 2016

  https://paper.li/e-1449621920?edition_id=067abc80-3fbb-11e6-b7b0-0cc47a0d15fd&utm_campaign= paper_sub&utm_medium=email&utm_source=subscription

  July 1, 2016 – Over 100 Snooping Tor Nodes Have Been Spying on Dark Web Sites | Motherboard

  https://motherboard.vice.com/read/over-100-snooping-tor-nodes-have-been-spying-on-dark-web-sites

  July 1, 2016 – How HackerOne’s famous new CEO is helping teen hackers become agents of good, not evil, by July Bort

  http://www.businessinsider.com/hackerone-marten-mickos-befriends-hackers-2016-6

  June 30, 2016 – Hackers: Ditch the malware, we’re in… Just act like a normal network admin. *Whistles*

  http://www.theregister.co.uk/2016/06/30/hackers_ditch_malware_to_move_around_networks/

  June 28, 2016 – How you’re tracked on a regular basis – Business Insider

  http://www.businessinsider.com/how-youre-tracked-on-a-regular-basis-2016-6

  June 28, 2016 – He Was a Hacker for the NSA and He Was Willing to Talk. I Was Willing to Listen

  https://theintercept.com/2016/06/28/he-was-a-hacker-for-the-nsa-and-he-was-willing-to-talk-i-was-willing-to-listen/

  June 19, 2016 – Here’s How Your Smartphone Can Be Hacked Without You Knowing – NBC News

  http://www.nbcnews.com/tech/security/here-s-how-your-smartphone-can-be-hacked-without-you-n594656

  June 18, 2016 – Hackers find security gaps in Pentagon websites | McClatchy DC

  http://www.mcclatchydc.com/news/politics-government/national-politics/article84462447.html

  June 17, 2016 – Defense Dept. recruits ‘white hat’ teen hacker after he exposes website weaknesses

  http://www.rawstory.com/2016/06/defense-dept-recruits-white-hat-teen-hacker-after-he-exposes-website-weaknesses/

  June 17, 2016 – A $79 million cryptocurrency heist just happened, and it’s threatening the future of blockchains —Quartz

  http://qz.com/710126/a-massive-79-million-heist-just-happened-and-its-threatening-the-future-of-blockchains/

  June 15, 2016 – What the Joint Chiefs’ Email Hack Tells Us About the DNC Breach – Defense One

  http://www.defenseone.com/technology/2016/06/what-joint-chiefs-email-hack-tells-us-about-dnc-breach/129089/?oref=DefenseOneTCO

  June 14, 2016 – FBI has Orlando shooter’s phone; now what?

  http://www.usatoday.com/story/tech/news/2016/06/13/fbi-has-orlando-shooters-phone-now-what/85830072/

  June 13, 2016 – Hackers No Longer Need Your Password | News & Opinion | PCMag.com

  http://www.pcmag.com/news/345207/hackers-no-longer-need-your-password

  June 12, 2016 – 5 Secret Places Censored On Google Maps: “Military Secrets Blacked Out” | Zero Hedge

  http://www.zerohedge.com/news/2016-06-12/5-secret-places-censored-google-maps-military-secrets-blacked-out

/>   June 5, 2016 – Official correspondence reveals lack of scrutiny of MI5’s data collection | UK news | The Guardian

  http://www.theguardian.com/uk-news/2016/jun/06/letters-lack-scrutiny-privacy-mi5-data-collection

  June 4, 2016 – Exclusive: Snowden Tried to Tell NSA About Surveillance Concerns, Documents Reveal | VICE News

  https://news.vice.com/article/edward-snowden-leaks-tried-to-tell-nsa-about-surveillance-concerns-exclusive

  June 1, 2016 – Federal Reserve under attack by hacker spies

  http://money.cnn.com/2016/06/01/technology/federal-reserve-hack/index.html

  June 1, 2016 – Watch hackers hijack WhatsApp and Telegram accounts using known telecom flaw

  http://thenextweb.com/insider/2016/06/01/watch-hackers-hijack-whatsapp-telegram-accounts-using-known-telecom-flaw/

  May 30, 2016 – Why a power grid attack is a nightmare scenario | TheHill

  http://thehill.com/policy/cybersecurity/281494-why-a-power-grid-attack-is-a-nightmare-scenario

  May 30, 2016 – Here’s Edward Snowden Taking Apart an iPhone Like a Surgeon on Vice’s Surveillance Special | Mediaite

  http://www.mediaite.com/online/heres-edward-snowden-taking-apart-an-iphone-like-a-surgeon-on-vices-surveillance-special/

  May 30. 2016 – Funded by Spies: 5 Start-Ups Running on CIA Cash – Slideshow from PCMag.com

  http://www.pcmag.com/slideshow/story/344577/funded-by-spies-5-start-ups-running-on-cia-cash

  May 30, 2016 – Eric Holder now says Edward Snowden performed ‘public service’ – CNNPolitics.com

  http://www.cnn.com/2016/05/30/politics/axe-files-axelrod-eric-holder/index.html

  May 27, 2016 – Study shows detailed, compromising inferences can be readily made with metadata / Boing Boing

  http://boingboing.net/2016/05/27/study-shows-detailed-compromi.html

  May 26, 2016 – Watch Edward Snowden Teach Vice How to Make a Phone ‘Go Black’ | WIRED

  http://www.wired.com/2016/05/snowden-vice-cell-phone-hack/

  May 25, 2016 – A Judge Just Made It Harder for the FBI to Use Hacking | Motherboard

  http://motherboard.vice.com/read/playpen-tor-browser-exploit

  May 25, 2016 – Congrats, FBI, You’ve Now Convinced Silicon Valley To Encrypt And Dump Log Files | Techdirt

  https://www.techdirt.com/articles/20160525/00574034542/congrats-fbi-youve-now-convinced-silicon-valley-to-encrypt-dump-log-files.shtml

  May 24, 2016 – What Silicon Valley can do about cyber threats, by Ted Schlein

  http://techcrunch.com/2016/05/24/what-silicon-valley-can-do-about-cyber-threats/?sr_share=twitter

  May 24, 2016 – Why You Should Never Email a Social Security Number – Fortune

  http://fortune.com/2016/05/23/never-email-social-security-number/

  May 24, 2016 – Best Websites To Find Out If You’ve Been Hacked | Digital Trends

  http://www.digitaltrends.com/computing/the-best-websites-for-finding-out-if-youve-been-hacked/

  May 23, 2016 – Snowden calls for whistleblower shield after claims by new Pentagon source, by Edward Snowden

  https://www.theguardian.com/us-news/2016/may/22/snowden-whistleblower-protections-john-crane?CMP=share_btn_link

  May 20, 2016 – Startups to Congress: Strong data security keeps us competitive | TechCrunch

  http://techcrunch.com/2016/05/21/startups-to-congress-strong-data-security-keeps-us-competitive/

  May 20, 2016 – Farewell to Allo? Why Snowden and Others Don’t Trust Google’s New AI-Backed Messaging App

  http://www.newsweek.com/farewell-allo-why-snowden-and-others-dont-trust-googles-new-ai-backed-462193?piano_d=1

  May 20, 2016 – Computing a secret, unbreakable key

  http://phys.org/news/2016-05-secret-unbreakable-key.html

  May 2, 2016 – Hackers can break into just about any office with electronics bought on Amazon, by Paul Szoldra

  http://www.techinsider.io/hackers-rfid-break-in-2016-4

  May 15, 2016 – Hackers showed us how easy it is to secretly clone a security badge, by Chris Snyder

  http://www.techinsider.io/clone-rfid-security-badge-2016-5

  May 15, 2016 – Smartphones to become major hacker target, by Mark White

  http://www.skynews.com.au/tech/technews/2016/05/15/smartphones-to-become-major-hacker-target.html

  May 12, 2016 – The Ukrainian Hacker Who Became the FBI’s Best Weapon—And Worst Nightmare, by Kevin Poulsen

  https://www.wired.com/2016/05/maksym-igor-popov-fbi/

  May 8, 2016 – How hackers used social engineering to get into a power company – Business Insider

  http://www.businessinsider.com/hackers-social-engineering-power-company-2016-4

  May 6, 2016 – One of the biggest hacks happened last year, but nobody noticed, by Zack Whittaker

  http://www.zdnet.com/article/after-mystery-hack-millions-of-logins-for-sale-on-dark-web/?ftag=COS-05-10aaa0b

  May 6, 2016 – Why the NSA’s Incidental Collection under Its Section 702 Upstream Internet Program May Well Be Bulk Collection, Even If The Program Engages In Targeted Surveillance

  https://medium.com/@BHanssen/why-the-nsas-incidental-collection-under-its-section-702-upstream-internet-program-may-well-be-a01817e161c4

  May 6, 2016 – The software that threatens your identity: Column, by John Breyault

  http://www.usatoday.com/story/opinion/2016/05/06/identity-theft-unwanted-software-risks-ftc-column/83974022/

  May 6, 2016 – How To Keep NSA Computers From Turning Your Phone Conversations Into Searchable Text

  https://theintercept.com/2015/05/08/keep-nsa-computers-turning-phone-conversations-searchable-text/

  May 6, 2016 – Venerable hacker zine Phrack publishes its first issue in four years

  https://boingboing.net/2016/05/07/venerable-hacker-zine-phrack-p.html

  May 6, 2016 – One of the biggest hacks happened last year, but nobody noticed, By Zack Whittaker for Zero Day

  http://www.zdnet.com/article/after-mystery-hack-millions-of-logins-for-sale-on-dark-web/?tag=nl.e539&s_cid=e539&ttag=e539&ftag=TRE17cfd61

  May 3, 2016 – So, the NSA Has an Actual Skynet Program | WIRED

  https://www.wired.com/2015/05/nsa-actual-skynet-program/

  May 2, 2016 – “My Political Position on Tech, Truth and the Future” @DSKaneThriller

  https://medium.com/@DSKaneThriller/my-political-position-on-tech-truth-and-the-future-30ba2ed0e728

  May 2, 2016 – Why I have a secret, classified email account —and you should, too – Business Insider

  http://www.businessinsider.com/why-i-have-a-secret-classified-email-account-and-you-should-too-2016-4

  May 1, 2016 – America Has Never Been So Ripe for Tyranny —NYMag

  http://nymag.com/daily/intelligencer/2016/04/america-tyranny-donald-trump.html

  May 1, 2016 – Hacker earns $80,000 as bug bounty hunter – Business Insider

  http://www.businessinsider.com/hacker-earns-80000-as-bug-bounty-hunter-2016-4

  April 30, 2016 – How hackers use USB sticks – Business Insider

  http://www.businessinsider.com/hackers-usb-sticks-2016-4

  April 29, 2016 – These Scammers Used My Face in an Ad, So I Mapped Out Their Network | Motherboard

  https://motherboard.vice.com/read/these-scammers-used-my-face-in-an-ad-so-i-mapped-out-their-network

  April 28, 2016 – The Critical Hole at the Heart of Our Cell Phone Networks | WIRED

  https://www.wired.com/2016/04/the-critical-hole-at-the-heart-of-cell-phone-infrastructure/

  April 27, 2016 – Dormant Malware Found On Nuclear Power Plant Computer | Digital Trends

  http://www.digitaltrends.com/computing/german-nuclear-power-plant-virus/

  April 26, 2016 – Hacking group “PLATINUM” used Windows’ own patching system against it | Ars Technica

  http://arstechnica.com/security/2016/04/hacking-group-platinum-used-windows-own-patching-system-against-it/

  April 26, 2016 – Kaspersky cracks CryptXXX, throws
lifeline to ransomware victims

  http://www.theregister.co.uk/2016/04/27/cryptxxx_cracked/ – April 26, 2016

  April 26, 2016 – CVV shops: How hackers get the three numbers from the back of your credit card

  http://www.brisbanetimes.com.au/technology/consumer-security/cvv-shops-how-hackers-get-the-three-numbers-from-the-back-of-your-credit-card-20160426-gofqch.html

  April 26, 2016 – Why You Should Care About the Coming Email Privacy Law

  http://gizmodo.com/why-you-should-care-about-the-coming-email-privacy-law-1773167538

  April 26, 2016 – RedTeam hackers break into a grid company – Business Insider

  http://www.businessinsider.com/redteam-hackers-power-grid-company-2016-4

  April 25, 2016 – Snowden Leaks Advanced Encryption by 7 Years, Spy Chief Says

  http://time.com/4307395/encryption-snowden-leaks-nsa/

  April 25, 2016 – Dangerous Windows 10 flaw lets hackers secretly run any app on your PC

  http://bgr.com/2016/04/25/windows-10-applocker-security-issue/

  April 24, 2016 – Feinstein-Burr Anti-Encryption Bill Surfaces | Digital Trends

  http://www.digitaltrends.com/mobile/compliance-with-court-orders-act-of-2016-news/

  April 24, 2016 – Here’s Why Anyone Could Hack Your Phone – The Daily Beast

  http://www.thedailybeast.com/articles/2016/04/23/here-s-why-anyone-could-hack-your-phone.html?account=thedailybeast&medium=twitter

  April 23, 2016 – The FBI is working hard to keep you unsafe | TechCrunch

  http://techcrunch.com/2016/04/23/the-fbi-is-working-hard-to-keep-you-unsafe/

  April 23, 2016 – Google Chrome password generator trick – Business Insider

  http://www.businessinsider.com/google-chrome-trick-2016-4

  April 22, 2016 – Hackers steal $81 million from a bank that had no firewall

  http://mashable.com/2016/04/22/bank-hackers-firewall/

  April 21, 2016 – Edward Snowden: The Internet Is Broken | Popular Science

  http://www.popsci.com/edward-snowden-internet-is-broken

  April 20, 2016 – China uses mass surveillance to curb unrest – Business Insider

  http://www.businessinsider.com/china-uses-mass-surveillance-to-curb-unrest-2016-4

  April 20, 2016 – In a First, Judge Throws Out Evidence Obtained from FBI Malware | Motherboard

  https://motherboard.vice.com/read/in-a-first-judge-throws-out-evidence-obtained-from-fbi-malware

 

‹ Prev