hacking

T-Mobile was also infiltrated by China-linked telecom hackers

T-Mobile was also infiltrated by China-linked telecom hackers

Back in October, the FBI and Cybersecurity and Infrastructure Security Agency (CISA) admitted that they were looking into "the unauthorized access to commercial telecommunications infrastructure by actors affiliated with the People’s Republic of China." These bad actors, collectively called "Salt Typhoon," allegedly targeted US officials and staffers for the recently concluded presidential elections. A few days later, though, The Wall Street Journal reported that the group had access to a lot more people than originally thought. Basically, the hackers could have accessed the data of any American who's a customer of AT&T and Verizon. That list of carriers has grown…
Read More
Bitfinex Hacker Gets 5 Years for $10 Billion Bitcoin Heist

Bitfinex Hacker Gets 5 Years for $10 Billion Bitcoin Heist

In perhaps the most adorable hacker story of the year, a trio of technologists in India found an innovative way to circumvent Apple’s location restrictions on AirPod Pro 2s so they could enable the earbuds’ hearing aid feature for their grandmas. The hack involved a homemade Faraday cage, a microwave, and a lot of trial and error.On the other end of the tech-advancements spectrum, the US military is currently testing an AI-enabled machine gun that is capable of auto-targeting swarms of drones. The Bullfrog, built by Allen Control Systems, is one of several advanced weapons technologies in the works to…
Read More
Turns out Redbox’s derelict kiosks are a big red security risk

Turns out Redbox’s derelict kiosks are a big red security risk

It’s only been three months since the implosion of Redbox, but the company’s familiar red kiosks could become a security nightmare as they’re to the highest bidders. reports at least one owner of a defunct DVD and Blu-ray dispenser found a way to obtain customers’ private information from an encrypted file on the machine, which contained more than just one person’s penchant for the Trolls franchise. The database also contained sensitive data like personal emails and home addresses.On Mastodon, programmer Foone Turing, a self-described collector of weird things, said she cracked the encrypted files from a Redbox machine and matched…
Read More
This Prompt Can Make an AI Chatbot Identify and Extract Personal Details From Your Chats

This Prompt Can Make an AI Chatbot Identify and Extract Personal Details From Your Chats

The researchers say that if the attack were carried out in the real world, people could be socially engineered into believing the unintelligible prompt might do something useful, such as improve their CV. The researchers point to numerous websites that provide people with prompts they can use. They tested the attack by uploading a CV to conversations with chatbots, and it was able to return the personal information contained within the file.Earlence Fernandes, an assistant professor at UCSD who was involved in the work, says the attack approach is fairly complicated as the obfuscated prompt needs to identify personal information,…
Read More
Two Sudanese brothers accused of launching a dangerous series of DDoS attacks

Two Sudanese brothers accused of launching a dangerous series of DDoS attacks

Newly unsealed grand jury documents revealed that two Sudanese nationals allegedly attempted to launch thousands of distributed denial of services (DDoS) attacks on systems across the world. The documents allege that these hacks aimed to cause serious financial and technical harm to government entities and companies and even physical harm in some cases. (DoJ) unsealed charges against Ahmed Salah Yousif Omer and Alaa Salah Yusuuf Omer that resulted in federal grand jury indictments. The two are allegedly connected to more than 35,000 DDoS attacks against hundreds of organizations, websites and networks as part of a “hacktivism” scheme as part of…
Read More
Pig Butchering Scams Are Going High Tech

Pig Butchering Scams Are Going High Tech

As digital scamming explodes in Southeast Asia, including so called “pig butchering” investment scams, the United Nations Office on Drugs and Crime (UNODC) issued a comprehensive report this week with a dire warning about the rapid growth of this criminal ecosystem. Many digital scams have traditionally relied on social engineering, or tricking victims into giving away their money willingly, rather than leaning on malware or other highly technical methods. But researchers have increasingly sounded the alarm that scammers are incorporating generative AI content and deepfakes to expand the scale and effectiveness of their operations. And the UN report offers the…
Read More
Data breach of Fidelity leaks 77,000 customers’ personal data

Data breach of Fidelity leaks 77,000 customers’ personal data

Another breach of a huge financial institution has leaked the personal information of thousands of customers to the public. reported that an unidentified hacker obtained 77,009 customers’ personal data from the asset management firm Fidelity Investments. posted yesterday revealed that the unidentified third party obtained the information in mid-August using two phony customer accounts. It’s not yet known how these accounts were used to access customer data. Fidelity said in a letter to its customers that it discovered the breach on August 19. The letter also said that the unidentified party did not access customers’ Fidelity accounts but after Fidelity…
Read More
Hacking Generative AI for Fun and Profit

Hacking Generative AI for Fun and Profit

You hardly need ChatGPT to generate a list of reasons why generative artificial intelligence is often less than awesome. The way algorithms are fed creative work often without permission, harbor nasty biases, and require huge amounts of energy and water for training are all serious issues.Putting all that aside for a moment, though, it is remarkable how powerful generative AI can be for prototyping potentially useful new tools.I got to witness this firsthand by visiting Sundai Club, a generative AI hackathon that takes place one Sunday each month near the MIT campus. A few months ago, the group kindly agreed…
Read More
Three men charged in connection with the Trump campaign hack

Three men charged in connection with the Trump campaign hack

The US Department of Justice charged three Iranian nationals as part of an effort to hack into the emails and computers used by President Donald Trump’s campaign staff and other political connections.The Washington Post reported that DOJ officials filed charges against Masoud Jalili, Seyyed Ali Aghamiri and Yasar Balaghi in an indictment filed Thursday in the US District Court for the District of Columbia. The indictment alleges the three men “prepared for and engaged in a wide-ranging hacking campaign” against current and former US officials, political campaigns and the media.According to the indictment Jalili, Aghamiri and Balaghi’s "activity is part…
Read More
Amid Air Strikes and Rockets, an SMS From the Enemy

Amid Air Strikes and Rockets, an SMS From the Enemy

At the start of September, Nour was having an ordinary evening at home in Beirut—eating pumpkin seeds and watching Netflix—when the SMS hit her device like the smartphone version of a brick through her window. The sender name appeared as eight question marks, “????? ???”, and in the message preview she could read, in clunky, hard-to-understand Arabic, a threat: “We have enough bullets for everyone who needs them.”To Nour, whose name has been changed to protect her anonymity, it was obvious who had sent this message. “Israel,” she says, “that’s their tone.” The Israeli military did not reply to WIRED’s…
Read More
No widgets found. Go to Widget page and add the widget in Offcanvas Sidebar Widget Area.