Hacker group
POPULARITY
This week Nick talks to Parmy Olson. Parmy Olson is a prominent technology journalist and author, currently a columnist for Bloomberg Opinion. She previously covered tech and innovation for The Wall Street Journal and Forbes, with a focus on AI, robotics, and emerging technologies. In 2012, she published We Are Anonymous, an acclaimed deep dive into the hacker groups Anonymous and LulzSec. Her 2024 book, Supremacy: AI, ChatGPT, and the Race That Will Change the World, explores the rivalry between tech giants like OpenAI and DeepMind in the pursuit of artificial general intelligence, earning the Financial Times Business Book of the Year Award. Nick and Parmy discuss the intense race to develop artificial general intelligence (AGI) and the far-reaching implications of that pursuit. Their conversation highlights the contrast between the idealistic visions of DeepMind's Demis Hassabis and OpenAI's Sam Altman—who saw AGI as a force for solving global challenges—and the reality that both ultimately became deeply tied to tech giants like Google and Microsoft to fund their ambitions. Parmy explains how this reliance shifted the focus away from social good and towards corporate interests. Together, they explore the broader consequences of this power shift, including the lack of meaningful regulation, ongoing ethical concerns around bias and safety in AI models, and the growing dominance of a few large tech firms. They also reflect on the social risks—from job losses and the disruption of traditional career paths to the emotional dependency people are beginning to form with chatbots—raising important questions about the kind of future society is heading towards. Parmy's Book Choice was: Born to Run by Christopher McdougallParmy's Music Choice was:Rumours by Fleetwood MacThis content is issued by Zeus Capital Limited (“Zeus”) (Incorporated in England & Wales No. 4417845), which is authorised and regulated in the United Kingdom by the Financial Conduct Authority (“FCA”) for designated investment business, (Reg No. 224621) and is a member firm of the London Stock Exchange. This content is for information purposes only and neither the information contained, nor the opinions expressed within, constitute or are to be construed as an offer or a solicitation of an offer to buy or sell the securities or other instruments mentioned in it. Zeus shall not be liable for any direct or indirect damages, including lost profits arising in any way from the information contained in this material. This material is for the use of intended recipients only.
Il 27 dicembre scorso è emerso che un database presumibilmente relativo alla piattaforma di ticketing di Infocert è stato messo in vendita su forum specializzati.Si tratta di 5,5 milioni di record, inclusi numeri di telefono e indirizzi email, oltre a dati sensibili come nomi, codici fiscali e altre informazioni personali.Questa fuga di dati, generata dalla gestione inadatta della sicurezza di un fornitore di un gruppo esperto come e consolidato come Infocert/Tinextra (che ha al suo interno anche numerose società di CyberSecurity) arriva a valle di un altro incidente, quello di LulzSec ai danni dell'Ordine degli Avvocati di Roma, che ha visto Infocert destinataria di un Provvedimento (impugnato) del Garante per la Privacy.Un provvedimento che ha messo in luce una incredibile serie di problematiche e che desta PESANTI preoccupazioni per le possibili conseguenze future non tanto dei clienti, ma dello stato di salute dell'intero comparto dell'industria digitale italiana.Oltre, ovviamente, alla facilità che adesso dispongono gli attaccanti per le loro frodi informatiche...Vediamo tutto oggi in questo lungo video che ripercorre la vicenda e che vi consiglio di inoltrare a amici e colleghi che vogliono capire cosa sta succedendo e come difendersi.~~~~~ SOSTIENI IL CANALE! ~~~~~Con la Membership PRO puoi supportare il Canale » https://link.mgpf.it/proSe vuoi qui la mia attrezzatura » https://mgpf.it/attrezzatura~~~~~ SEGUIMI ANCHE ONLINE CON LE NOTIFICHE! ~~~~~» CANALE WHATSAPP » https://link.mgpf.it/wa» CANALE TELEGRAM » https://mgpf.it/tg» CORSO (Gratis) IN FUTURO » https://mgpf.it/nl» NEWSLETTER » https://mgpf.it/nl~~~~~ CIAO INTERNET E MATTEO FLORA ~~~~~ Questo è “Ciao Internet!” la prima e più seguita trasmissione di TECH POLICY in lingua italiana, online su YouTube e in Podcast.Io sono MATTEO FLORA e sono:» Professore in Fondamenti di Sicurezza delle AI e delle SuperIntelligenze (ESE)» Professore ac in Corporate Reputation e Crisis Management (Pavia).Sono un Imprenditore Seriale del digitale e ho fondato:» The Fool » https://thefool.it - La società italiana leader di Customer Insight» The Magician » https://themagician.agency - Atelier di Advocacy e Gestione della Crisi» 42 Law Firm » https://42lf.it - Lo Studio Legale per la Trasformazione Digitale » ...e tante altre qui: https://matteoflora.com/#aziendeSono Future Leader (IVLP) del Dipartimento di Stato USA sotto Amministrazione Obama nel programma “Combating Cybercrime (2012)”.Sono Presidente di PermessoNegato, l'associazione italiana che si occupa di Pornografia Non- Consensuale e Revenge Porn.Conduco in TV “Intelligenze Artificiali” su Mediaset/TgCom.~~~~~ INGAGGI E SPONSORSHIP ~~~~~ Per contatti commerciali: sales@matteoflora.com
Our guest in this episode is Parmy Olson, a columnist for Bloomberg covering technology. Parmy has previously been a reporter for the Wall Street Journal and for Forbes. Her first book, “We Are Anonymous”, shed fascinating light on what the subtitle calls “the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency”.But her most recent book illuminates a set of high-stakes relations with potentially even bigger consequences for human wellbeing. The title is “Supremacy: AI, ChatGPT and the Race That Will Change the World”. The race is between two remarkable individuals, Sam Altman of OpenAI and Demis Hassabis of DeepMind, who are each profoundly committed to build AI that exceeds human capabilities in all aspects of reasoning.Selected follow-ups:Parmy Olson, BloombergSupremacy: AI, ChatGPT, and the Race that Will Change the WorldAI Superpowers: China, Silicon Valley and the new world order - book by Kai-Fu LeeThe Coming Wave - book by Mustafa SuleymanBromance Gone Sour: OpenAI and Microsoft's Partnership Hits a Rough Patch - GeekflareFor our Posterity - essay by Leopold AschenbrennerOpenAI appoints Retired U.S. Army General Paul M. Nakasone to Board of DirectorsDo Computers Have Feelings? Don't Let Google Alone Decide - article by Parmy Olson about Blake LemoineConscium - Pioneering Safe, Efficient AIMusic: Spike Protein, by Koi Discovery, available under CC0 1.0 Public Domain Declaration
Podcast: Hack the Plant (LS 34 · TOP 3% what is this?)Episode: Securing Embedded SystemsPub date: 2024-09-25In this episode, Bryson sits down with MITRE EMB3D co-founder Niyo Little Thunder Pearson. For nearly 20 years, Niyo has been at the forefront of protecting critical infrastructure systems. He previously led incident response for American Express, directing the company's Security Operations Center during the LulzSec and Anonymous attacks, and worked to develop an adversarial cyber defense program for the nation's third largest gas utility at ONE Gas Oklahoma. Now, Niyo has co-founded MITRE EMB3D, a groundbreaking global threat network aimed at enhancing the security of embedded devices. What is MITRE EMB3D? Who is the intended audience? What problems is it trying to solve? “There is such a gap that exists today on what we understand and how risk averse these [embedded] devices are. They do well and they operate well. They're built for what they're doing in a safety context, but the security was never brought forward with it,” Niyo said. Join us for this and more on this episode of Hack the Plan[e]t. Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology. The podcast and artwork embedded on this page are from Bryson Bort, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Millionen gestohlener Datensätze, lahmgelegte Websites und gehackte Twitter-Accounts – Hacker-Gruppen wie Anonymous oder LulzSec zeigen, wie mächtig digitaler Protest sein kann. Ihre spektakulären Aktionen reichen von Angriffen auf Sony bis hin zur Manipulation der Börsenkurse. In dieser Kompaktfolge erklären wir euch, wie Hacktivisten gegen Unternehmen sowie Regierungen vorgehen und warum sie das Ganze überhaupt machen.
Mustafa Al-Bassam was a teenage hacktivist who outsmarted a US government contractor, shamed the Westboro Baptist Church, hacked Sony a record number of times, and eventually got arrested—though his 80 transgressions got halved for a funny reason. At the Modular Summit in Brussels, Laura had a fireside chat with Mustafa to discuss how he went from his teenage years as the head of LulzSec and member of Anonymous to founding Celestia, a project aiming to solve key issues in blockchain scalability by going with a modular approach. He also discussed data availability sampling, why he believes Celestia has achieved significant product-market fit since its launch, and the three key components of Celestia's road map. Show highlights: 00:00 Intro 01:47 Mustafa's origin story and how he became a developer who ended up hacking FBI affiliates and Fox News 05:32 How he hacked a military contractor to the US Department of Defense and Sony 09:16 Why Mustafa was arrested at the age of 16 11:14 What about Bitcoin attracted his attention and got him interested in the industry 15:22 Why he founded Celestia, after doing a PhD in scaling blockchains and understanding the problems of sharding 21:16 What data availability sampling is and why it is important 23:52 Why Mustafa believes that Celestia has had “extreme product market fit” since the launch 26:16 What's next for Celestia and why Mustafa is so excited about the possibilities that increased block size can enable 29:36 How Celestia is working with zero knowledge accounts for defragmenting liquidity in rollups and access liquidity even within the Cosmos ecosystem 30:57 What the endgame for Celestia and the overall industry looks like, according to Mustafa 37:36 Q&A with the audience 44:44 Crypto News Recap Visit our website for breaking news, analysis, op-eds, articles to learn about crypto, and much more: unchainedcrypto.com Thank you to our sponsors! iTrustCapital Polkadot PlayFi Labs Guest Mustafa Al-Bassam, co-founder of Celestia Labs. Previous appearance on Unchained: Why the Celestia Team Sees a Future With 10,000 Roll-Ups Links Previous coverage of Unchained on modular blockchains: Three Crypto Pioneers on Crypto's Monolithic vs. Modular Debate What Are Modular Blockchains? A Beginner's Guide Learn more about your ad choices. Visit megaphone.fm/adchoices
Mustafa Al-Bassam was a teenage hacktivist who outsmarted a US government contractor, shamed the Westboro Baptist Church, hacked Sony a record number of times, and eventually got arrested—though his 80 transgressions got halved for a funny reason. At the Modular Summit in Brussels, Laura had a fireside chat with Mustafa to discuss how he went from his teenage years as the head of LulzSec and member of Anonymous to founding Celestia, a project aiming to solve key issues in blockchain scalability by going with a modular approach. He also discussed data availability sampling, why he believes Celestia has achieved significant product-market fit since its launch, and the three key components of Celestia's road map.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Mustafa Al-Bassam was a teenage hacktivist who outsmarted a US government contractor, shamed the Westboro Baptist Church, hacked Sony a record number of times, and eventually got arrested—though his 80 transgressions got halved for a funny reason. At the Modular Summit in Brussels, Laura had a fireside chat with Mustafa to discuss how he went from his teenage years as the head of LulzSec and member of Anonymous to founding Celestia, a project aiming to solve key issues in blockchain scalability by going with a modular approach. He also discussed data availability sampling, why he believes Celestia has achieved significant product-market fit since its launch, and the three key components of Celestia's road map. Show highlights: 00:00 Intro 01:47 Mustafa's origin story and how he became a developer who ended up hacking FBI affiliates and Fox News 05:32 How he hacked a military contractor to the US Department of Defense and Sony 09:16 Why Mustafa was arrested at the age of 16 11:14 What about Bitcoin attracted his attention and got him interested in the industry 15:22 Why he founded Celestia, after doing a PhD in scaling blockchains and understanding the problems of sharding 21:16 What data availability sampling is and why it is important 23:52 Why Mustafa believes that Celestia has had “extreme product market fit” since the launch 26:16 What's next for Celestia and why Mustafa is so excited about the possibilities that increased block size can enable 29:36 How Celestia is working with zero knowledge accounts for defragmenting liquidity in rollups and access liquidity even within the Cosmos ecosystem 30:57 What the endgame for Celestia and the overall industry looks like, according to Mustafa 37:36 Q&A with the audience 44:44 Crypto News Recap Visit our website for breaking news, analysis, op-eds, articles to learn about crypto, and much more: unchainedcrypto.com Thank you to our sponsors! iTrustCapital Polkadot PlayFi Labs Guest Mustafa Al-Bassam, co-founder of Celestia Labs. Previous appearance on Unchained: Why the Celestia Team Sees a Future With 10,000 Roll-Ups Links Previous coverage of Unchained on modular blockchains: Three Crypto Pioneers on Crypto's Monolithic vs. Modular Debate What Are Modular Blockchains? A Beginner's Guide Learn more about your ad choices. Visit megaphone.fm/adchoices
We delve into the story of Hector Monsegur, also known as 'Sabu', a central figure in the hacktivist group Lulzsec. Explore his rise to infamy in the cyber world, his pivotal role in high-profile cyber attacks, and the dramatic turn of events that led him to collaborate with law enforcement. Join us for a gripping narrative on the complexities of cyber ethics, activism, and the thin line between right and wrong. Created, Produced & Hosted by Keith Korneluk Written & Researched by Ed Leer Edited, Mixed & Mastered by Greg Bernhard Theme Song "You Are Digital" by Computerbandit
Today, Marc is joined by Hector Monsegur, the infamous hacker formerly known as Sabu. In this episode, Hector takes us on a journey through his past, from his early inspirations drawn from hacker films to his pivotal role in the LulzSec hacking collective. With raw honesty, he delves into the motivations and mindsets that fueled his involvement in hacktivism, shedding light on the complexities and ethical dilemmas surrounding digital activism. Hector's story is a testament to the transformative power of embracing one's passion, and his insights offer a rare glimpse into the psyche of a cyber outlaw-turned-cybersecurity professional.
I spoke to Mustafa Al-Bassam, co-founder and CEO of Celestia, a modular blockchain network that makes for others to securely launch their own blockchain. Mustafa was also a member of the black hat hacking group LulzSec under the name T-Flow known for hacking the CIA website, newspapaers owned by Rupert Murdoch, and other corporate and state organizations in 2011.During the discussion we spoke about his experience of being in the hacker group, his transition to interest in blockchains, and Celestia. If you want to learn more about the history of hacktivism, Anonymous, and LulzSec, then I can recommend the book Hacker, Hoaxer, Whistleblower, Spy by Gabriella Coleman. If you liked the podcast be sure to give it a review on your preferred podcast platform. If you find content like this important consider donating to my Patreon starting at just $3 per month. It takes quite a lot of my time and resources so any amount helps. Follow me on Twitter (@TBSocialist) or Mastodon (@theblockchainsocialist@social.coop) and join the r/CryptoLeftists subreddit and Discord to join the discussion.Support the showICYMI I've written a book about, no surprise, blockchains through a left political framework! The title is Blockchain Radicals: How Capitalism Ruined Crypto and How to Fix It and is being published through Repeater Books, the publishing house started by Mark Fisher who's work influenced me a lot in my thinking. The book is officially published and you use this linktree to find where you can purchase the book based on your region / country.
Dans cet épisode, 4 actualités sont décodées. La première concerne la CAF, au moins 4 comptes de bénéficiaires ont été touchés, le groupe de hacker LulzSec revendique l'attaque de 600 000 comptes. La deuxième actualité porte sur une proposition de loi en France, pour instaurer un malus sur les vêtements de fast fashion tels que ceux de Shein. Sans oublier : Flipboard se lance dans le Fediverse, et l'Inde craint de perdre la course aux smartphones face à la Chine et le Vietnam.Les épisodes de Signaux faibles sont disponibles sur Siècle Digital et les plateformes de streaming. Hébergé par Acast. Visitez acast.com/privacy pour plus d'informations.
Former agent Chris Tarbell reviews his investigation and takedown of the billion-dollar, cryptocurrency-based drug underground marketplace “Silk Road” and the arrest of its founder. The investigation, code-named Operation Onion Peeler, resulted in the largest seizure of bitcoins to date. Chris was also the lead investigator on several of the Bureau's most complex and cutting-edge cybercrime cases, including the investigation and arrest of the leadership of Anonymous and the LulzSec hacking crews. Chris Tarbell served in the FBI for nearly 10 years. Check out episode show notes, photos, and related articles. https://jerriwilliams.com/287-chris-tarbell-silk-road-dark-web-marketplace/ Buy me a coffee - https://www.buymeacoffee.com/JerriWilliams Join my Reader Team to get the FBI Reading Resource - Books about the FBI, written by FBI agents, the 20 clichés about the FBI Reality Checklist, and keep up to date on the FBI in books, TV, and movies via my monthly email. Join here. http://eepurl.com/dzCCmL Check out my FBI books, non-fiction and crime fiction, available as audiobooks, ebooks and paperbacks wherever books are sold. https://jerriwilliams.com/books/
Chris Tarbell is a former FBI Agent specializing in cyber investigations. While at the FBI, Chris led some of the most high-profile cybercrime investigations in the world, including the arrest of members of the hacker group LulzSec, as well as the founder of the Silk Road, Ross Ulbricht, which resulted in the largest seizure of bitcoins to date. ------ ✨ DEBRIEF | Unpacking the episode: https://www.bankless.com/debrief-the-fbi-agent-who-took-down-the-silk-road ------ ✨ COLLECTIBLES | Collect this episode: https://collectibles.bankless.com/mint ------ Rarely do we have the opportunity to pick the brain of a cybercop, but this was our opportunity to see through the eyes of the FBI agent who took down the Silk Road in the largest crypto seizure ever recorded. In today's episode, Chris shares the story of crypto, Ross Ulbricht, and the Silk Road as told by the FBI agent who took it down. We also dig into the eternal cat-and-mouse game between Cybercriminals and Cyberpolice, how to protect yourself from people who want to take your crypto, and if the FBI wants your private keys, how they get them. ------
Guest Cody Kretsinger shows us how hacktivists help keep businesses secure, as a security expert helping companies across the globe stay secure. He shares his incredible story of his past as “Recursion” a member of LulzSec hacktivist group affiliated with the infamous Anonymous group back when he was in college in AZ. Story details the Epic 2011 SONY data breach. Topics: how intelligence gathering is critical to security,, how penetration tests help businesses stay protected, best ways to limit cyber attack liability, cyber crime gang discussions, examples of recruiting in cyber crime gangs, how stolen data is sold by cyber crime gangs today, insight on true cyber crime examples, latest cybercrime stories, things we learn from criminal hackers, understanding the hacker mindset, and how to limit liability from cyber attacks. Full Video Episode Link:
A former FBI Special Agent, Chris Tarbell specializes in cyber investigations and incident response. As a case agent with the FBI's preeminent cybercrime squad in New York, he led some of the most groundbreaking cybercrime investigations in the world - including the arrest and prosecutions of Anonymous and LulzSec leadership, and the founder of the notorious Silk Road underground marketplace, the latter of which resulted in the largest seizure of bitcoins to date.As a computer forensic examiner with the FBI, Chris engaged in rapid-response investigations all over the world on matters related to terrorism, botnets, and other cybercrimes. In 2009, Chris joined the FBI's renowned cybercrime squad as a Special Agent in the New York field office. He was the lead investigator on several of the Bureau's most complex and cutting-edge cases, including the takedown of the billion-dollar, cryptocurrency-based drug marketplace “Silk Road” and the arrest of its founder, and the investigation and arrest of the leadership of the Anonymous/LulzSec hacking crews.Find out more about Chris by visiting https://www.naxo.com/chris-tarbell
Former FBI Cyber Special Agent Chris Tarbell joins Tim to talk about cyber crime and some of his most groundbreaking cases, including the Silk Road that centered on crypto currency and drug trafficking. And they talk about the take-down of the “Anonymous” hacktivist collective. Chris's specialty is cyber investigations. He was the lead investigator on some of the more notorious cyber security crime cases in recent memory. https://traffic.libsyn.com/secure/shapingopinion/Silk_Road_auphonic.mp3 Chris Tarbell is a former FBI Special Agent who focuses on cyber crime and cyber investigations. As a case agent with the FBI's cybercrime squad in New York, he led some of the most groundbreaking cybercrime investigations in the world. These included the arrest and prosecution of “Anonymous” and “LulzSec” leadership. And he was involved in the arrest and prosecution of the founder of the notorious Silk Road underground marketplace. This led to the largest seizure of bitcoins to date. Chris is a computer forensic examiner. He has engaged in rapid-response investigations all over the world on matters related to terrorism, botnets, and other cybercrimes. In 2009, Chris joined the FBI's cybercrime squad as a Special Agent in New York. He's now the co-founder of a consulting firm called NAXO. In his new role, he helps businesses, high-profile people and governments respond to a broad range of complex computer and network security threats. Foreign and domestic law enforcement agencies also call on him to advise on investigative techniques. As much as I wanted to learn from Chris about his career, the big thing on my mind was how does someone even access the dark web? Links NAXO website Hacker and the Fed Podcast, Apple Podcasts TorProject.org The FBI Busted Silk Road but Not the 'Dark Web' Behind It, The Verge Anonymous Superhacker Turned FBI Informant Named Sabu Remains Defiant Over Snitching, The Guardian About this Episode's Guest Chris Tarbell A former FBI Special Agent, Chris Tarbell specializes in cyber investigations and incident response. As a case agent with the FBI's preeminent cybercrime squad in New York, he led some of the most groundbreaking cybercrime investigations in the world - including the arrest and prosecutions of Anonymous and LulzSec leadership, and the founder of the notorious Silk Road underground marketplace, the latter of which resulted in the largest seizure of bitcoins to date. As a computer forensic examiner with the FBI, Chris engaged in rapid-response investigations all over the world on matters related to terrorism, botnets, and other cybercrimes. In 2009, Chris joined the FBI's renowned cybercrime squad as a Special Agent in the New York field office. He was the lead investigator on several of the Bureau's most complex and cutting-edge cases, including the takedown of the billion-dollar, cryptocurrency-based drug marketplace “Silk Road” and the arrest of its founder, and the investigation and arrest of the leadership of the Anonymous/LulzSec hacking crews. Prior to co-founding NAXO, Chris developed and led the Cyber Operations & Incident Response practice for a large consulting firm. He has extensive experience helping businesses, high-profile individuals, and governments respond to a broad range of complex computer and network security threats. He is also regularly called on to advise foreign and domestic law enforcement officers on investigative techniques, and frequently lectures to business and government groups, including EUROPOL, on cyber threats and the means to address them. Chris holds an MS in Computer Science from James Madison University with a concentration on Information Security. He has been certified by both the FBI and the International Association of Computer Investigative Specialists (IACIS) as a Certified Forensic Computer Examiner (CFCE). He has also been certified by the FBI as a subject-matter expert on cellphones and other...
This week on Hacker And The Fed we have our first ever guest. Former Black Hat and former member of LulzSec, Cody Kretsinger. Hector and Cody go back nearly 20 years to the earliest days of online hacking when they spent years partnering to infiltrate major computer networks around the world. Despite that long history, they've never actually met in the flesh. We cover a lot as they speak together for the first time, from hacking origin stories to life after federal prison. -- For more information on Chris and his current work visit naxo.com Follow Hector @hxmonsegur
Chris Tarbell is a former FBI special agent and cybercrime investigation specialist who brought down Ross Ulbricht and Silk Road, and Hector Monsegur (aka Sabu) of LulzSec and Anonymous. Please support this podcast by checking out our sponsors: – True Classic Tees: https://trueclassictees.com/lex and use code LEX to get 25% off – InsideTracker: https://insidetracker.com/lex to get 20% off – ExpressVPN: https://expressvpn.com/lexpod to get 3 months free – BetterHelp: https://betterhelp.com/lex to get 10% off – Blinkist: https://blinkist.com/lex to get 25% off premium EPISODE LINKS: Hacker And The Fed podcast: https://podcasts.apple.com/podcast/hacker-and-the-fed/id1649541362 Naxo: https://naxo.com/who-we-are PODCAST INFO: Podcast website: https://lexfridman.com/podcast Apple Podcasts: https://apple.co/2lwqZIr Spotify:
The name Lulzsec is probably very familiar to listeners who were around in 2011, when this hacking group was at the peak of its nefarious activity. As their name implies, Lulzsec was known for trolling their victims: their childish behavior might have fooled some people into thinking that Lulzsec was mostly harmless - but as the story you're about to hear will show, they were anything but.
What's it's Like to Fight LulzSec [ML B-Side]Advertising Inquiries: https://redcircle.com/brands
Karim Hijazi has been at the forefront of attacker counterintelligence and infiltration research for the last decade, developing new ways for security teams to clandestinely monitor hackers and anticipate attacks before they happen. Prior to launching Prevailion, Karim was the founder/CEO of Unveillance, an early pioneer in advanced threat intelligence and the first cloud-based data leak intelligence platform. Karim successfully exited Unveillance in 2012 with an acquisition by Mandiant, and he was then appointed as Mandiant's new director of intelligence. While at Mandiant, Karim played an important role in that company's well-known APT1 report released in 2013, which definitively linked the People's Liberation Army of China to widespread cyber espionage activity against US interests. Mandiant was acquired by FireEye soon after. During the hacktivist heydays of the early 2010s, Karim engaged in a well-documented battle with the Anonymous offshoot “LulzSec,” after the group compromised an InfraGard database. Karim's confrontation with the group was featured in Parmy Olson's book, “We Are Anonymous,” as well as national media like CNN and CNET. During the Arab Spring, Karim also served as a key contributor to the Cyber Security Forum Initiative's “Project Cyber Dawn Libya,” which provided the first in-depth look at Libyan cyber warfare capabilities and defenses. CSFI's membership includes military officials, academics and business leaders from the US and around the world. Do you want to get the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on: Facebook: https://www.facebook.com/mspradionews/ Twitter: https://twitter.com/mspradionews/ Instagram: https://www.instagram.com/mspradio/ LinkedIn: https://www.linkedin.com/company/28908079/
In June 2011, a Con Edison truck was parked outside of Hector Monsegur's New York apartment, every day for over a week. But Hector - better known as Sabu, the ringleader of the LulzSec hacking group -wasn't fooled: he guessed, correctly, that the FBI was on to him. But it turned out that of all the people who broke or disregarded the law in this particular story, only one man had a reason to worried: Jeremy Hammond.
RSnake sat down with Karim Hijazi: a serial entrepreneur, and a professional photographer by training, but most relevant to today's show he's also a security expert. RSnake and Karim dive into his background in industrial espionage, explored the world of malware, and landed on a lot of the biggest issues with keeping people and companies safe online. If you're not familiar with this world, it may feel a bit alien but this is a great example of the kinds of conversation RSnake has wanted to make public since the podcast's inception. Errata: We were referring to Hector Xavier Monsegur in the section on Lulzsec
This week in the Security News: More QR codes you shouldn't trust, race conditions in Rust, encrypting railways, Pwnkit - the latest Linux exploit, tricking researchers into crashing, cybersecurity is broken?, the best cybersecurity research paper, evil Favicons, escaping Kubernetes, pimping your cubicle and someone who actually recovered their crypto wallet! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw725
This week in the Security News: More QR codes you shouldn't trust, race conditions in Rust, encrypting railways, Pwnkit - the latest Linux exploit, tricking researchers into crashing, cybersecurity is broken?, the best cybersecurity research paper, evil Favicons, escaping Kubernetes, pimping your cubicle and someone who actually recovered their crypto wallet! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw725
Hey guys, below is a biography of Karim. It's a long one but I want you to know his background to better understand his history and message. -Be sure also to check out his podcast over at https://www.theintrovertediconoclast.com/ Karim has been at the forefront of attacker counterintelligence and infiltration research for the last decade, developing new ways for security teams to clandestinely monitor hackers and anticipate attacks before they happen. Prior to launching Prevailion, Karim was the founder/CEO of Unveillance, an early pioneer in advanced threat intelligence and the first cloud-based data leak intelligence platform. Karim successfully exited Unveillance in 2012 with an acquisition by Mandiant, and he was then appointed as Mandiant's new director of intelligence. While at Mandiant, Karim played an important role in that company's well-known APT1 report released in 2013, which definitively linked the People's Liberation Army of China to widespread cyber espionage activity against US interests. Mandiant was acquired by FireEye soon after. During the hacktivist heydays of the early 2010s, Karim engaged in a well-documented battle with the Anonymous offshoot “LulzSec,” after the group compromised an InfraGard database. Karim's confrontation with the group was featured in Parmy Olson's book, “We Are Anonymous,” as well as national media like CNN and CNET. During the Arab Spring, Karim also served as a key contributor to the Cyber Security Forum Initiative's “Project Cyber Dawn Libya,” which provided the first in-depth look at Libyan cyber warfare capabilities and defenses. CSFI's membership includes military officials, academics and business leaders from the US and around the world. Over the years, Karim has served as a cybersecurity industry source for many prominent news outlets, including CNN, Fox News, Washington Post, The New York Times, Forbes, CyberScoop and many more. Before devoting his work full-time to defense and intelligence product development, Karim served as founder at Demiurge Consulting, a counterintelligence and countermeasure consultancy whose clients and collaborations included Coca-Cola, TSYS, Baker Botts LLP, McKesson, Palantir, MIT, Berkeley and Stanford Universities. --- Support this podcast: https://anchor.fm/justinaguirre/support
Nothing is more sobering for an intelligence and cybersecurity professional than receiving an ominous email with one of your passwords in the subject line and the body of the email with nothing more than the words: “Let's talk…” This is the story of how I got into a cyber dogfight with one of the world's most notorious hacker groups and leveraged the outcome to my advantage. From dispelling the myth that I was a secret government operative targeting remote third-world countries to working with the intelligence community to hunt down international hackers, this episode is truly stranger than fiction... but incredibly and utterly true.
A honeypot is basically a computer made to look like a sweet, yummy bit of morsel that a hacker might find yummy mcyummersons. This is the story of one of the earliest on the Internet. Clifford Stoll has been a lot of things. He was a teacher and a ham operator and appears on shows. And an engineer at a radio station. And he was an astronomer. But he's probably best known for being an accidental systems administrator at Lawrence Berkeley National Laboratory who setup a honeypot in 1986 and used that to catch a KGB hacker. It sounds like it could be a movie. And it was - on public television. Called “The KGB, the Computer, and Me.” And a book. Clifford Stoll was an astronomer who stayed on as a systems administrator when a grant he was working on as an astronomer ran out. Many in IT came to the industry accidentally. Especially in the 80s and 90s. Now accountants are meticulous. The monthly accounting report at the lab had never had any discrepancies. So when the lab had a 75 cent accounting error, his manager Dave Cleveland had Stoll go digging into the system to figure out what happened. And yet what he found was far more than the missing 75 cents. This was an error of time sharing systems. And the lab leased out compute time at $300 per hour. Everyone who had accessed the system had an account number to bill time to. Well, everyone except a user named hunter. They disabled the user and then got an email that one of their computers tried to break into a computer elsewhere. This is just a couple years after the movie War Games had been released. So of course this was something fun to dig your teeth into. Stoll combed through the logs and found the account that attempted to break into the computers in Maryland was a local professor named Joe Sventek, now at the University of Oregon. One who it was doubtful made the attempt because he was out town at the time. So Stoll set his computer to beep when someone logged in so he could set a trap for the person using the professors account. Every time someone connected a teletype session, or tty, Stoll checked the machine. Until Sventek connected and with that, he went to see the networking team who confirmed the connection wasn't a local terminal but had come in through one of the 50 modems through a dial-up session. There wasn't much in the form of caller ID. So Stoll had to connect a printer to each of the modems - that gave him the ability to print every command the user ran. A system had been compromised and this user was able to sudo, or elevate their privileges. UNIX System V had been released 3 years earlier and suddenly labs around the world were all running similar operating systems on their mainframes. Someone with a working knowledge of Unix internals could figure out how to do all kinds of things. Like add a program to routine housecleaning items that elevated their privileges. They could also get into the passwd file that at the time housed all the passwords and delete those that were encrypted, thus granting access without a password. And they even went so far as to come up with dictionary brute force attacks similar to a modern rainbow table to figure out passwords so they wouldn't get locked out when the user whose password was deleted called in to reset it again. Being root allowed someone to delete the shell history and given that all the labs and universities were charging time, remove any record they'd been there from the call accounting systems. So Stoll wired a pager into the system so he could run up to the lab any time the hacker connected. Turns out the hacker was using the network to move laterally into other systems, including going from what was ARPANET at the time to military systems on Milnet. The hacker used default credentials for systems and leave accounts behind so he could get back in later. Jaeger means hunter in German and those were both accounts used. So maybe they were looking for a German. Tymenet and Pacbell got involved and once they got a warrant they were able to get the phone number of the person connecting to the system. Only problem is the warrant was just for California. Stoll scanned the packet delays and determined the hacker was coming in from overseas. The hacker had come in through Mitre Corporation. After Mitre disabled the connection the hacker slipped up and came in through International Telephone and Telegraph. Now they knew he was not in the US. In fact, he was in West Germany. At the time, Germany was still divided by the Berlin Wall and was a pretty mature spot for espionage. They confirmed the accounts were indicating they were dealing with a German. Once they had the call traced to Germany they needed to keep the hacker online for an hour to trace the actual phone number because the facilities there still used mechanical switching mechanisms to connect calls. So that's where the honeypot comes into play. Stoll's girlfriend came up with the idea to make up a bunch of fake government data and host it on the system. Boom. It worked, the hacker stayed on for over an hour and they traced the number. Along the way, this hippy-esque Cliff Stoll had worked with “the Man.” Looking through the logs, the hacker was accessing information about missile systems, military secrets, members of the CIA. There was so much on these systems. So Stoll called some of the people at the CIA. The FBI and NSA were also involved and before long, German authorities arrested the hacker. Markus Hess, whose handle was Urmel, was a German hacker who we now think broke into over 400 military computers in the 80s. It wasn't just one person though. Dirk-Otto Brezinski, or DOB, Hans Hübner, or Pengo, and Karl Koch, or Pengo were also involved. And not only had they stolen secrets, but they'd sold them to The KGB using Peter Carl as a handler. Back in 1985, Koch was part of a small group of hackers who founded the Computer-Stammtisch in Hanover. That later became the Hanover chapter of the Chaos Computer Club. Hübner and Koch confessed, which gave them espionage amnesty - important in a place with so much of that going around in the 70s and 80s. He would be found burned by gasoline to death and while it was reported a suicide, that has very much been disputed - especially given that it happened shortly before the trials. DOB and Urmel received a couple years of probation for their part in the espionage, likely less of a sentence given that the investigations took time and the Berlin Wall came down the year they were sentenced. Hübner's story and interrogation is covered in a book called Cyberpunk - which tells the same story from the side of the hackers. This includes passing into East Germany with magnetic tapes, working with handlers, sex, drugs, and hacker-esque rock and roll. I think I initially read the books a decade apart but would strongly recommend reading Part II of it either immediately before or after The Cukoo's Egg. It's interesting how a bunch of kids just having fun can become something far more. Similar stories were happening all over the world - another book called The Hacker Crackdown tells of many, many of these stories. Real cyberpunk stories told by one of the great cyberpunk authors. And it continues through to the modern era, except with much larger stakes than ever. Gorbachev may have worked to dismantle some of the more dangerous aspects of these security apparatuses, but Putin has certainly worked hard to build them up. Russian-sponsored and other state-sponsored rings of hackers continue to probe the Internet, delving into every little possible hole they can find. China hacks Google in 2009, Iran hits casinos, the US hits Iranian systems to disable centrifuges, and the list goes on. You see, these kids were stealing secrets - but after the Morris Worm brought the Internet to its knees in 1988, we started to realize how powerful the networks were becoming. But it all started with 75 cents. Because when it comes to security, there's no amount or event too small to look into.
In Episode 4 of the Get CyBUr Smart podcast we take an 8 minute dive into what "Cyber Hactivism" is. Have you wondered what "Anonymous", "Lulzsec", or Wikileaks. Well this podcast will tell you. Thank you to those spreading the word on the podcast. We are helping folks get a little cyber smarter, and a whole lot cyber safer. Questions or comments, please email darren@cybursmart.com
It's the return of our Hacker turned cybersecurity expert. Hector Monsegur, former technical frontman of the infamous LulzSec hacking collective, returns to the Pure Report to share his personal story and his deep insights on the evolution of the latest Ransomware attacks that are plaguing businesses and the public sector. Hector describes how large-scale attacks and ransomware-as-a-service are creating new headaches for IT teams and how to prepare for them. If you want to learn what motivates hackers and how to improve your cybersecurity defenses, make plans on October 27th to attend Pure's upcoming Cybersecurity Month webinar featuring Hector and Pure's Shawn Rosemarin and Andy Stone - to register today, go to: purestorage.com/BlackHat
In the Security News, why privacy is like bubble wrap, South African government releases its own browser just to re-enable flash support, former Lulzsec hacker releases VPN zero-day used to hack hacking team, how a researcher broke into Microsoft VS code’s Github, & how criminals use a deceased employee’s account to wreak havoc! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw681
In the Security News, why privacy is like bubble wrap, South African government releases its own browser just to re-enable flash support, former Lulzsec hacker releases VPN zero-day used to hack hacking team, how a researcher broke into Microsoft VS code’s Github, & how criminals use a deceased employee’s account to wreak havoc! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw681
This week, we welcome back Michael Roytman from Kenna Security, for a discussion on 'XDR and Vitamins'!What is XDR? How do we know the security protections we're investing in are working?! Dan DeCloss from PlexTrac returns to join us for a technical segment titled 'How Tall Do You Have to Be to Ride the Ride'? In the Security News, why privacy is like bubble wrap, South African government releases its own browser just to re-enable flash support, former Lulzsec hacker releases VPN zero-day used to hack hacking team, how a researcher broke into Microsoft VS code’s Github, & how criminals use a deceased employee’s account to wreak havoc! Show Notes: https://securityweekly.com/psw681 Visit https://securityweekly.com/plextrac to learn more about them! Visit https://securityweekly.com/kennasecurity to learn more about them! Visit https://www.securityweekly.com/psw for all the latest episodes! Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, we welcome back Michael Roytman from Kenna Security, for a discussion on 'XDR and Vitamins'!What is XDR? How do we know the security protections we're investing in are working?! Dan DeCloss from PlexTrac returns to join us for a technical segment titled 'How Tall Do You Have to Be to Ride the Ride'? In the Security News, why privacy is like bubble wrap, South African government releases its own browser just to re-enable flash support, former Lulzsec hacker releases VPN zero-day used to hack hacking team, how a researcher broke into Microsoft VS code’s Github, & how criminals use a deceased employee’s account to wreak havoc! Show Notes: https://securityweekly.com/psw681 Visit https://securityweekly.com/plextrac to learn more about them! Visit https://securityweekly.com/kennasecurity to learn more about them! Visit https://www.securityweekly.com/psw for all the latest episodes! Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
In the wake of the recent SolarWinds incident, never has Karim Hijazi been so busy. Karim started his career in photography and then quickly transitioned into starting his own security consultancy. Since then, he has had numerous interesting events including a public battle with Lulzsec in 2011. Now, his company Prevailion is in the spotlight more than ever due to its novel approach to supplier security.
Pengar är inte allt! Även om en hel del hackare har detta som sin största motivation, finns det många som vill ställa det som gjorts fel till rätta, stoppa orättvisor eller avslöja korruption som sitt kall. Man skulle kunna tala i timmar och dagar om alla som hackar för vad de anser var en bättre värld, men i detta avsnitt samlar Mattias och Erik ett axplock av de kändaste attackerna och funderar på hur det hela startade och sedan kom att utvecklas. Är hacktivisten idag död eller smider nya planer? Vad är problemet med att protestera när man inte vet vem man gör det med eller vilka som kan vilja ta över det hela? Kan en skyddad identitet hålla dig säker? Är information lika kraftfullt som ett laddat vapen? Show notes finns här: https://www.itsakerhetspodden.se/show-notes-for-97-hacktivismens-historia/
Assange: l'ultima speranza Da Londra la nostra inviata Berenice Galli. Dopo una lunga pausa causata dal lockdown, lunedì 7 settembre, Julian Assange è tornato nuovamente in tribunale. L'udienza si è tenuta presso la corte londinese di Old Bailey, segnando la fase cruciale in merito alla richiesta di estradizione negli Usa del fondatore di Wikileaks. Sebbene una nuova accusa sia stata presentata dagli Stati Uniti, il 22 giugno scorso, il tribunale britannico ha respinto la richiesta presentata dalla difesa di Julian Assange di aggiornare l'udienza e sentire nuovamente i testimoni. Washington ha infatti allargato “la portata della cospirazione” di cui accusa Assange. Per il Dipartimento di Giustizia statunitense il fondatore di WikiLeaks avrebbe reclutato hacker, vale a dire un gruppo noto come LulzSec, con lo scopo di violare le reti informatiche del governo degli Stati Uniti per rubare dati. Persino Amnesty International ha affermato che Assange era, ed è, “l'obiettivo di una campagna pubblica negativa da parte di funzionari statunitensi ai massimi livelli”. Il procedimento è atteso con un verdetto di primo grado, appellabile, fra 4 settimane. Molte le manifestazioni in favore di Assange, tanto a Londra come a Roma. Editing Santiago Martinez de Aguirre ☀️Noi siamo liberi e vogliamo continuare a esserlo, insieme a te. Sostienici e diventeremo tutti il centro di gravità del sapere con una donazione una tantum (https://www.paypal.com/paypalme/casadelsoletv) con un abbonamento (https://casadelsole.tv/sostienici)
#Assange: l'ultima speranza Da Londra la nostra inviata Berenice Galli. Dopo una lunga pausa causata dal lockdown, ieri, 7 settembre, Julian Assange è tornato nuovamente in tribunale. L'udienza si è tenuta presso la corte londinese di Old Bailey, segnando la fase cruciale in merito alla richiesta d'estradizione negli Usa del fondatore di #Wikileaks. Sebbene una nuova accusa sia stata presentata dagli Stati Uniti, il 22 giugno scorso, il tribunale britannico ha respinto la richiesta presentata dalla difesa di Assange di aggiornare l'udienza e sentire nuovamente i testimoni. Washington ha infatti allargato “la portata della cospirazione” di cui accusa Assange. Per il Dipartimento di Giustizia statunitense il fondatore di WikiLeaks avrebbe reclutato #hacker, vale a dire un gruppo noto come #LulzSec, con lo scopo di violare le reti informatiche del governo degli Stati Uniti per rubare dati. Persino Amnesty International ha affermato che Assange era, ed è, “l'obiettivo di una campagna pubblica negativa da parte di funzionari statunitensi ai massimi livelli”. Il procedimento è atteso con un verdetto di primo grado, appellabile, fra 4 settimane. Molte le manifestazioni in favore di Assange, tanto a Londra come a Roma.
On this week’s show Patrick and Adam discuss the week’s security news, including: Inside the new American “e2ee busting” bill Julian Assange hit with (another) superseding indictment Trustwave uncovers sneaky Chinese accounting software backdoor Much, much more… This week’s show is brought to you by Okta. They are, of course, the identity and auth giant and one of the few sponsors we actually approached last year for 2020 because, well, they are very good at what they do. This week Marc will be joining us to talk about a privacy-related topic. The discussion is nuanced, but it’s basically about how the public perception of privacy risks has diverged from the reality/ Further, that the COVID-19 crisis and the advent of digital contact tracing apps have actually brought general concerns around digital privacy to the fore. You can subscribe to the new Risky Business newsletter, Seriously Risky Business, here. You can subscribe to our new YouTube channel here. Links to everything that we discussed are below and you can follow Patrick or Adam on Twitter if that’s your thing. Show notes Decrypting America's new push for lawful interception - Risky Business Australia's cyber security measures significantly increased with $1.3b injection for cyber spies CVE-2020-2021 PAN-OS: Authentication Bypass in SAML Authentication How to create a CA-signed certificate for Palo Alto Networks SAML Applications US Cyber Command says foreign hackers will most likely exploit new PAN-OS security bug | ZDNet Foreign adversaries likely to exploit critical networking bug, US says | Ars Technica Chinese bank forced western companies to install malware-laced tax software | ZDNet WikiLeaks founder charged with conspiring with Anonymous and LulzSec hackers | ZDNet An Embattled Group of Leakers Picks Up the WikiLeaks Mantle | WIRED TikTok and 53 other iOS apps still snoop your sensitive clipboard data | Ars Technica Google removes 25 Android apps caught stealing Facebook credentials | ZDNet India bans 59 Chinese apps, including TikTok, UC Browser, Weibo, and WeChat | ZDNet Russian Cybercrime Boss Burkov Gets 9 Years — Krebs on Security Russian national pleads guilty to being part of $568 million fraud ring Adobe, Mastercard, Visa warn online store owners of Magento 1.x EOL | ZDNet Apple strong-arms entire CA industry into one-year certificate lifespans | ZDNet COVID-19 ‘Breach Bubble’ Waiting to Pop? — Krebs on Security A hacker gang is wiping Lenovo NAS devices and asking for ransoms | ZDNet New WastedLocker ransomware demands payments of millions of USD | ZDNet New EvilQuest ransomware discovered targeting macOS users | ZDNet California university pays $1 million ransom amid coronavirus research Apple Safari 14 introduces ‘passwordless’ logins for websites | The Daily Swig Apple declined to implement 16 Web APIs in Safari due to privacy concerns | ZDNet CryptoCore hacker group has stolen more than $200m from cryptocurrency exchanges | ZDNet Sony launches PlayStation bug bounty program with rewards of $50K+ | ZDNet Protect your resources from web attacks with Fetch Metadata
Anonymous:¿El regreso del hacktivismo o manipulación de masas? Historia : Anonymous es un movimiento/colectivo activista/hacktivista internacional “descentralizado” que es ampliamente conocido por sus diversos ataques cibernéticos contra varios gobiernos, instituciones gubernamentales y agencias gubernamentales, corporaciones y la Iglesia de Scientology. Anonymous se originó en los foros de 4chan y la máscara la tomaron de la película V for Vendetta. NOTA de Máscara: (Que en realidad es de Guy Fawkes, un Católico Inglés que intentó derrocar la monarquía protestante durante la rebelión de la pólvora, NO confundir con la máscara usada en la serie “La casa de papel”, donde se usa el rostro de Salvador Dalí, un artista Español representante del Surrealismo). . . Operaciones que se han atribuido: 2008 Project Chanology (2008) 2010 Operation Payback (2010) 2013 Million Mask March #OpOk Operation Safe Winter 2014 Shooting of Michael Brown Shooting of Tamir Rice 2015 Charlie Hebdo shootings Anti-Islamic "Reclaim Australia" rally Operation CyberPrivacy Operation KKK #OpSaudi #OpISIS #OpParis #OpNASADrones 2016 #BoycottThailand: Thailand jail hack 2016 US presidential election South African corruption 2020 United Nations hack Killing of George Floyd . . ¿Anonymous regresó? La realidad es que nunca se ha ido, ya que diversos grupos que se asocian a Anonymous siguen teniendo actividad en internet (No todo se trata de grandes hacks). Si es el grupo original o no, lo más probable es que no. Hoy cualquiera puede decir que es anonymous para cubrirse detrás del nombre. La realidad es que el grupo inicial se pudo haber desintegrado y algunos decidieron formar Lulzsec entre otros grupos de blackhats importantes. Una de las cuentas de Twitter que dice ser Anonymous y que cuenta con 120k seguidores, era una cuenta falsa de sorteos de K-pop hasta hace 3 días, después cambió de nombre y se volvió AnonNews. . . Hack al departamento de policía minneapolis. En cuanto a la información que sacaron del departamento de mineapolis, Troy Hunt (creador de haveibeenpwned) hizo un análisis y los resultados dicen que no realizaron ningún hackeo, sino probablemente esos registros los obtuvieron de bases de datos robadas anteriormente y que se encontraban en internet. Tomaron esas bases de datos, extrajeron los correos con dominios del departamento de mineapolis y los colocaron en una pequeña base de datos. En el análisis de Troy Hunt dice que hay correos repetidos en la base de datos y que el 95% de correos únicos ya estaban anteriormente en bases de datos que circulan en internet. Por otro lado, Troy Hunt dentro de su análisis también se dio cuenta que las contraseñas que se encuentran en la base de datos son muy sencillas, dice que el sistema de minneapolis no acepta ese tipo de contraseñas tan inseguras, . . Los medios de comunicación y su desinformación Algunos medios de comunicación decían que el hackeo comenzó desde el sábado 30 de mayo. Lo que en realidad sucedió fue un ataque de DDoS. Un ataque de DDoS es cuando muchas “personas” (peticiones) intentan entrar a un sitio web (en este caso) y el sitio web no cuenta con la capacidad de soportar a tantas “personas” al mismo tiempo. Acerca del DDoS, el grupo de Anonymous que subió el video no se lo han atribuido, la cuenta que posteo el video no habla de un ataque de DDoS, solo se podía ver el video. Pudo haber sido otro grupo pero no los que subieron el video. . . ¿El DDoS fue real? De que hubo un ataque de DDoS el 30 de mayo, si lo hubo (ver imagen), pero al tratarse de una página tan pequeña, lo más probable es que no se haya necesitado tanto tráfico para tirarla. El ataque que se ve en el mapa, algunos tuvieron una duración de 10 minutos, otros de 15, otros de menos y venía de España, Alemania, China, Corea, Australia, Brasil, Arabia Saudita, México y otros pocos países de LA. . . ¿Hackeo a el vaticano? No sucedió… fin. :D Publimetro hizo una nota donde hace referencia a un usuario de Twitter de nombre Manel Márquez, pero ya borró su tuit, otro usuario Robibooli no lo ha borrado. Pero la información que ellos dicen que ha sido “hackeada” es de un blog llamado “evangelizadorasdelosapostoles” de hace 1 año. . . ¿Hackeo a los radios de la policia de Chicago? Solo hay videos en las redes sociales con close-up al radio, no más. . . Los supuestos leaks de Jeffrey Epstein. Es información que ya existía en internet y pueden leer este hilo de @zallyhg: https://skty.cc/gy . . Conclusión Lo que si sucedió es que el video provocó reacciones entre los estadounidenses y aumentó los disturbios y la violencia. Yo creo que las personas solo necesitaban una razón para hacer mas grandes los disturbios y una de esas razones fue anonymous. También las redes sociales generaron desinformación que fue tomada por medios nacionales e internacionales sin que ellos hicieran alguna verificación antes de escribir sus artículos.
Tervetuloa Jaettujen Salaisuuksien alppimajalle. Tämä on Herrasmieshakkerit-äänijulkaisun erikoisjakso, jossa käymme läpi mitä tapahtui tietoturvakentällä viimeisen vuosikymmenen aikana. Wiralliset wanhukset nostavat esille oman kokemuksena perusteella vuosien 2010 - 2019 merkittävimmät tapahtumat ja perustelevat miksi juuri kyseinen tapahtuma ansaitsi päästä tälle listalle. Äänijulkaisun lähdeluettelo: 2010 Operaatio Aurora, Wikipedia https://en.wikipedia.org/wiki/Operation_Aurora Operaatio Aurora, Mikon kirjoittama artikkeli 2010 https://archive.f-secure.com/weblog/archives/00001854.html Beyond Corp https://www.beyondcorp.com/ Beyond Corp @ Google https://cloud.google.com/beyondcorp/ Stuxnet, Mikon kommentit 2010 https://archive.f-secure.com/weblog/archives/00002040.html To Kill A Centrifuge, Langner Associates https://www.langner.com/to-kill-a-centrifuge/ Stuxnet kirja-arvostelu, An Unprecedented Look at Stuxnet, Wired https://www.wired.com/2014/11/countdown-to-zero-day-stuxnet/ Stuxnet-elokuva, IMDB https://www.imdb.com/title/tt5446858/ 2011 LulzSec, Wikipedia https://en.wikipedia.org/wiki/LulzSec Parmy Olsonin kirja LulzSecista https://www.amazon.com/We-Are-Inside-LulzSec-Insurgency/dp/0316213527 BBC:n erikoislähetys LulzSecista, Mikon haastattelu 2011 https://www.bbc.com/news/av/technology-22526025/lulzsec-hacker-internet-is-a-world-devoid-of-empathy DigiNotar, Wikipedia https://en.wikipedia.org/wiki/DigiNotar Mikon blogikirjoitus DigiNotarista, lopussa lista väärennetyistä sertifikaateista https://archive.f-secure.com/weblog/archives/00002228.html How a 2011 Hack You’ve Never Heard of Changed the Internet’s Infrastructure, Slate https://slate.com/technology/2016/12/how-the-2011-hack-of-diginotar-changed-the-internets-infrastructure.html Fox-IT:n Loppuraportti DigiNotarista https://www.rijksoverheid.nl/binaries/rijksoverheid/documenten/rapporten/2011/09/05/diginotar-public-report-version-1/rapport-fox-it-operation-black-tulip-v1-0.pdf Fox-IT:n visualisointi DigiNotarin uhreista https://www.youtube.com/watch?v=wZsWoSxxwVY 2012 Flame, Wikipedia https://en.wikipedia.org/wiki/Flame_(malware) Mikon kolumni Wiredissa - Why Antivirus Companies Like Mine Failed to Catch Flame https://www.wired.com/2012/06/internet-security-fail/ 2013 Edward Snowden, Wikipedia https://en.wikipedia.org/wiki/Edward_Snowden The Snowden Saga: a Shadowland of Secrets and Light, Vanity Fair https://www.vanityfair.com/news/politics/2014/05/edward-snowden-politics-interview Snowden -elokuva https://snowdenfilm.com 11 Steps Attackers Took to Crack Target, CIO online https://www.cio.com/article/2600345/11-steps-attackers-took-to-crack-target.html Target Hackers Broke in Via a ventilation Company https://krebsonsecurity.com/2014/02/target-hackers-broke-in-via-hvac-company/ 2014 Sony Pictures hack, Wikipedia https://en.wikipedia.org/wiki/Sony_Pictures_hack Elokuva, The Interview, IMDB https://www.imdb.com/title/tt2788710/ Heartbleed http://heartbleed.com/ Tarina Heartbleedin logosta https://abcnews.go.com/Business/curious-business-naming-security-bug/story?id=23280245 2015 DD4BC, Armada Collective, and the Rise of Cyber Extortion, Recorded Future https://www.recordedfuture.com/dd4bc-cyber-extortion/ Suspected members of Bitcoin extortion group DD4BC arrested, ZDNet https://www.zdnet.com/article/suspected-members-of-bitcoin-extortion-group-dd4bc-arrested/ Ukrainan sähköverkon katkaisu, Youtube https://www.youtube.com/watch?v=Iqh7fpsL3HY 2016 SWIFT banking hack, Wikipedia https://en.wikipedia.org/wiki/2015%E2%80%932016_SWIFT_banking_hack Bangladesh Bank Attackers Hacked SWIFT Software https://www.bankinfosecurity.com/report-swift-hacked-by-bangladesh-bank-attackers-a-9061 Democratic National Committee cyber attacks, Wikipedia https://en.wikipedia.org/wiki/Democratic_National_Committee_cyber_attacks Shadow Brokers, Wikipedia https://en.wikipedia.org/wiki/The_Shadow_Brokers 2017 WannaCry ransomware attack, Wikipedia https://en.wikipedia.org/wiki/WannaCry_ransomware_attack Yksi ensimmäisistä lunnastroijalaisista, ICPP Copyright Trojan https://archive.f-secure.com/weblog/archives/00001931.html EternalBlue, Wikipedia https://en.wikipedia.org/wiki/EternalBlue Paysafecard https://www.paysafecard.com/fi-fi/ Paysafecard -kuitti vuodelta 2011 https://imgur.com/a/6tOzoI4 2018 Cambridge Analytica, Wikipedia https://en.wikipedia.org/wiki/Cambridge_Analytica Cambridge Analytica: The Great Hack, Netflix https://www.netflix.com/fi-en/title/80117542 Meltdown & Spectre https://meltdownattack.com/ Deep Dive: Introduction to Speculative Execution Side Channel Methods, Intel https://software.intel.com/security-software-guidance/insights/deep-dive-introduction-speculative-execution-side-channel-methods 2019 How a ransomware attack cost one firm £45m, BBC https://www.bbc.com/news/business-48661152 Travelex: Travel money services still down after cyber-attack, BBC https://www.bbc.com/news/business-51097470 Travelex Hack Questions and Answers https://www.travelex.com/customer-faqs/
You Cannot Arrest An Idea Welcome to the History of Computing Podcast, where we explore the history of computers. Because understanding the helps us handle what's coming in future - and maybe helps us build what's next, without repeating some of our mistakes. Or if we do make mistakes, maybe we do so without taking things too seriously. Todays episode is a note from a hacker named Topiary, which perfectly wraps feelings many of us have had in words that… well, we'll let you interpret it once you hear it. First, a bit of his story. It's February, 2011. Tflow, Sabu, Keila, Topiary, and Ryan Ackroyd attack computer security firm HBGary Federal after CEO Barr decides to speak at a conference outing members of then 7 year old hacking collective Anonymous with the motto: We are Anonymous. We are Legion. We do not forgive. We do not forget. Expect us. As a part of Anonymous he would help hack Zimbabwe, Libya, Tunisia and other sites in support of Arab Spring protestors. They would go on to hack Westboro Baptist Church live during an interview. But that was part of a large collective. They would go on to form a group called Lulzsec with PwnSauce and AVunit. At Lulzsec, the 7 went on a “50 days of Lulz” spree. During this time they hit Fox.com, leaked the database of X factor Contestants, took over the PBS news site and published an article that Tupac was still alive and living in New Zealand. They published an article on the Sun claiming Rupert Murdoch died rather than testify in the voice mail hacking trials that were big at the time. They would steal data from Sony, DDoS All the Things, and they would go on to take down and or steal data from the US CIA, Department of Defense, and Senate. The light hearted comedy mixed with a considerable amount of hacking skills had earned them the love and adoration of tens of thousands. What happened next? Hackers from all over the world sent them their Lulz. Topiary helped get their haxies posted. Then Sabu was caught by the FBI and helped to out the others. Or did he. Either way, as one could expect, by July 2011, all had been arrested except AVunit. Topiary's last tweet said “You cannot arrest an idea.” The British government might disagree. Or maybe counter that you can arrest for acting on an idea. Once unmasked, Jake Davis was in jail and then banned from the Internet for 2 years. During that time Topiary, now known as Jake Davis, wrote what is an exceptional piece of writing, to have come from a 20 year old. Here it is: “Hello, friend, and welcome to the Internet, the guiding light and deadly laser in our hectic, modern world. The Internet horde has been watching you closely for some time now. It has seen you flock to your Facebook and your Twitter over the years, and it has seen you enter its home turf and attempt to overrun it with your scandals and “real world” gossip. You need to know that the ownership of cyberspace will always remain with the hivemind. The Internet does not belong to your beloved authorities, militaries, or multi-millionaire company owners. The Internet belongs to the trolls and the hackers, the enthusiasts and the extremists; it will never cease to be this way. You see, the Internet has long since lost its place in time and its shady collective continues to shun the fact that it lives in a specific year like 2012, where it has to abide by 2012's morals and 2012's society, with its rules and its punishments. The Internet smirks at scenes of mass rape and horrific slaughtering followed by a touch of cannibalism, all to the sound of catchy Japanese music. It simply doesn't give tuppence about getting a “job,” getting a car, getting a house, raising a family, and teaching them to continue the loop while the human race organizes its own death. Custom-plated coffins and retirement plans made of paperwork… The Internet asks why? You cannot make the Internet feel bad, you cannot make the Internet feel regret or guilt or sympathy, you can only make the Internet feel the need to have more lulz at your expense. The lulz flow through all in the faceless army as they see the twin towers falling with a dancing Hitler on loop in the bottom-left corner of their screens. The lulz strike when they open a newspaper and care nothing for any of the world's alleged problems. They laugh at downward red arrows as banks and businesses tumble, and they laugh at our glorious government overlords trying to fix a situation by throwing more currency at it. They laugh when you try to make them feel the need to “make something of life,” and they laugh harder when you call them vile trolls and heartless web terrorists. They laugh at you because you're not capable of laughing at yourselves and all of the pointless fodder they believe you surround yourselves in. But most of all they laugh because they can. This is not to say that the Internet is your enemy. It is your greatest ally and closest friend; its shops mean you don't have to set foot outside your home, and its casinos allow you to lose your money at any hour of the day. Its many chat rooms ensure you nao longer need to interact with any other members of your species directly, and detailed social networking conveniently maps your every move and thought. Your intimate relationships and darkest secrets belong to the horde, and they will never be forgotten. Your existence will forever be encoded into the infinite repertoire of beautiful, byte-sized sequences, safely housed in the cyber cloud for all to observe. And how has the Internet changed the lives of its most hardened addicts? They simply don't care enough to tell you. So welcome to the underbelly of society, the anarchistic stream-of-thought nebula that seeps its way into the mainstream world — your world — more and more every day. You cannot escape it and you cannot anticipate it. It is the nightmare on the edge of your dreams and the ominous thought that claws its way through your online life like a blinding virtual force, disregarding your philosophies and feasting on your emotions. Prepare to enter the hivemind” I hope Topiary still has a bit of funsies here and there. I guess we all grow up at some point. He now hunts for bug bounties rather than Lulz. One was addressed in iOS 10.13.1 when you could DoS an iOS device by shoving a malicious file into CoreText. That would be CVE-2017-7003. Hacking solutions together or looking for flaws in software. It can be like a video game. For better or worse. But I love that he's pointed that big ugly Victorian ASCII humble boat in the direction of helping to keep us betterer. And the world is a more secure place today than it was before them. And a bit more light hearted. So thank you Topiary, for making my world better for awhile. I'm sorry you paid a price for it. But I hope you're well.
We chat with a hacker from the infamous LulzSec group who defaced the websites including the Sun newspaper, took popular websites offline, and dumped user data like email addresses and passwords on public forums. Now a security researcher, Mustafa Al-Bassam, gives us a unique peek at a darker side of the web.
Llega un nuevo smartwatch, un foro polémico y un reto superado. Hola, mi nombre es Bruno Ortiz y les doy la bienvenida a Doble Check Hoy, un micropodcast con las noticias de tecnología más importantes para que empieces bien informado tu jornada. *Samsung presenta su nuevo Galaxy Watch Active 2* El miércoles 7 de agosto es la fecha señalada para que Samsung presente, desde Nueva York, su nuevo Galaxy Note 10. Pero ya sabemos que estos dispositivos importantes no suelen ser presentados solos, sin embargo, la coreana ha decidido comunicar oficialmente los detalles de su Galaxy Watch Active 2, una nueva versión de su smartwatch que apunta a ser un serio competidor para el (hasta ahora imbatible) Apple Watch. Los cambios no vienen tanto por el diseño: se sabe que incluirá un sensor que permitirá hacer electrocardiogramas, así como un interesante detector de caídas. No. No es que el dispositivo te avisará antes de caer al piso. Se trata de una alerta que permitirá saber si el usuario ha caído al suelo y, si no se levanta en una determinada cantidad de tiempo, automáticamente el reloj realizará una llamada a los servicios de emergencias. ¿Qué más traerá este nuevo reloj inteligente? Lo usual: nuevo detector de estrés, medición de pasos, de ritmo cardíaco y monitor del sueño, entre otras funciones. Se sabe que costará desde los US$ 279,99 en EE.UU. *¿Qué es 8chan* Como parte de la información relacionada con los lamentables tiroteos ocurridos el fin de semana pasado en EE.UU. y que acabaron con la vida de decenas de personas, se ha mencionado a 8chan como un lugar clave relacionado con estas masacres. 8chan es una plataforma de foros y justamente ahí uno de los atacantes -responsable de la matanza de El Paso- subió un manifiesto en donde se quejaba de la invasión hispana en su ciudad y así intentaba justificar sus actos. Otros manifiestos relacionados con actos violentos ocurridos en Nueva Zelanda y California también fueron subidos, en su momento a ese sitio. Esta plataforma se creó hace seis años como un espacio donde sus participantes pudieran expresarse libremente. Era una alternativa mucho más permisiva a 4chan, otra plataforma que varios años más atrás estuvo relacionada con organizaciones como Annonymous y LulzSec. En estos momentos, el foro está fuera de línea, pues la empresa que le alojaba sus contenidos decidió dejar de hacerlo. *Lo hizo a la segunda* Y finalmente, en su segundo intento, el francés Franky Zapata logró cruzar el Canal de la Mancha -desde Francia a Inglaterra- en poco más de 20 minutos, a bordo de su Flyboard Air. Solo tuvo que detenerse a mitad de camino para recargar combustible. ********************************** Muchas gracias por escucharnos una vez más. Recuerda que si quieres comunicarte con nosotros puedes escribirnos a doblecheckpodcast@gmail.com; si quieres conversar con nosotros puedes buscarnos en Instagram, Twitter y Facebook, como @doblecheckpe; y en nuestra web http://doblecheck.blog. Hasta pronto.
Llega un nuevo smartwatch, un foro polémico y un reto superado. Hola, mi nombre es Bruno Ortiz y les doy la bienvenida a Doble Check Hoy, un micropodcast con las noticias de tecnología más importantes para que empieces bien informado tu jornada. *Samsung presenta su nuevo Galaxy Watch Active 2*El miércoles 7 de agosto es la fecha señalada para que Samsung presente, desde Nueva York, su nuevo Galaxy Note 10. Pero ya sabemos que estos dispositivos importantes no suelen ser presentados solos, sin embargo, la coreana ha decidido comunicar oficialmente los detalles de su Galaxy Watch Active 2, una nueva versión de su smartwatch que apunta a ser un serio competidor para el (hasta ahora imbatible) Apple Watch.Los cambios no vienen tanto por el diseño: se sabe que incluirá un sensor que permitirá hacer electrocardiogramas, así como un interesante detector de caídas. No. No es que el dispositivo te avisará antes de caer al piso. Se trata de una alerta que permitirá saber si el usuario ha caído al suelo y, si no se levanta en una determinada cantidad de tiempo, automáticamente el reloj realizará una llamada a los servicios de emergencias. ¿Qué más traerá este nuevo reloj inteligente? Lo usual: nuevo detector de estrés, medición de pasos, de ritmo cardíaco y monitor del sueño, entre otras funciones. Se sabe que costará desde los US$ 279,99 en EE.UU.*¿Qué es 8chan*Como parte de la información relacionada con los lamentables tiroteos ocurridos el fin de semana pasado en EE.UU. y que acabaron con la vida de decenas de personas, se ha mencionado a 8chan como un lugar clave relacionado con estas masacres.8chan es una plataforma de foros y justamente ahí uno de los atacantes -responsable de la matanza de El Paso- subió un manifiesto en donde se quejaba de la invasión hispana en su ciudad y así intentaba justificar sus actos. Otros manifiestos relacionados con actos violentos ocurridos en Nueva Zelanda y California también fueron subidos, en su momento a ese sitio.Esta plataforma se creó hace seis años como un espacio donde sus participantes pudieran expresarse libremente. Era una alternativa mucho más permisiva a 4chan, otra plataforma que varios años más atrás estuvo relacionada con organizaciones como Annonymous y LulzSec. En estos momentos, el foro está fuera de línea, pues la empresa que le alojaba sus contenidos decidió dejar de hacerlo.*Lo hizo a la segunda*Y finalmente, en su segundo intento, el francés Franky Zapata logró cruzar el Canal de la Mancha -desde Francia a Inglaterra- en poco más de 20 minutos, a bordo de su Flyboard Air. Solo tuvo que detenerse a mitad de camino para recargar combustible.**********************************Muchas gracias por escucharnos una vez más. Recuerda que si quieres comunicarte con nosotros puedes escribirnos a doblecheckpodcast@gmail.com; si quieres conversar con nosotros puedes buscarnos en Instagram, Twitter y Facebook, como @doblecheckpe; y en nuestra web http://doblecheck.blog. Hasta pronto.
This week on the show the TDD team explores Microsoft's Windows 8 Consumer Preview, and of course, Apple's latest tech offerings, the new iPad, Apple TV, and iOS 5.1. But first, this week's latest tech headlines... Devindra recaps Barcelona's Mobile World Congress 2012, including Nokia's 41-megapixel 808 PureView, AT&T modifies their data throttling policy, Zynga launches a standalone destination, Google consolidates media sites into Google Play, EU says Google's new privacy policy is bogus, Lulzsec is sold out by its own leader, Valve may be entering the console arena, and DARPA builds a robot cheetah. Show Links What we're playing with: Andy: Mari0: Super Mario Bros. meets Portal Minecraft 1.2 update adds cats, kittens and performance-improving map format Dwayne: Amazoning my life away with prime food subscriptions Devindra: Mass Effect 3, Spartacus! Headlines Devindra's wrap-up of Mobile World Congress 2012 Nokia's 808 PureView smartphone packs 41-megapixel camera AT&T; Clarifies Data Throttling Policy but Still Faces User Backlash Zynga launches Zynga.com as it expands beyond Facebook in a big way Introducing Google Play: All your entertainment, anywhere you go European Agencies Say New Google Privacy Policy Violates EU Law Infamous international hacking group LulzSec brought down by own leader Valve said to be working on 'Steam Box' gaming console with partners DARPA's Cheetah becomes fastest legged robot Audible Book of the Week The Terror of Living by Eric Meyers Musical Interlude #1 Hot Topic iOS 5.1 Now Available with Japanese Siri, Camera Enhancements, and More Apple TV 3 impressions: What took so long? Apple Introduces New iPad Musical Interlude #2 Final Word Introducing Windows 8 Consumer Preview Windows 8 FAQ The Drill Down on iTunes (Subscribe now!) Sign up here to be alerted by SMS when the podcast is live!
Dans cet épisode, Patrick Beja, Yann Alet et Jeff Clavier vous parlent de : Google+, un début de succès ? LulzSec ferme boutique Le désastre Final Cut Pro X Et le reste... Voir Acast.com/privacy pour les informations sur la vie privée et l'opt-out.
Print to file feature, using one monitor for multiple computers (KVM switch option, remote desktop option), Profiles in IT (Reid G. Hoffman, co-founder LinkedIn), Google playing catch up with social networking (four years late, Facebook has advantage, may affect ad revenues, threat to future growth), Skype protocol cracked (code reverse engineered, code released, hacker wants to create an open source Skype client, Skype fights back), hacking activity on the rise (Pakistan Cyber Army, Anonymous, prOf, Lulzsec, Chinese military, cybersecurity degrees in demand), top ten thriving businesses (led by VoIP providers), and top ten dying businesses (led by wired telecom carriers). This show originally aired on Saturday, June 4, 2011, at 9:00 AM EST on WFED (1500 AM).