Security News

Deadbeat dad faked his own death by hacking government databases
2024-08-21 07:35

A US man has been sentenced to 81 months in jail for faking his own death by hacking government systems and officially marking himself as deceased. In January 2023 Kipf used the credentials of a physician to access Hawaii's Death Registry System and create a "Case" that recorded his own death.

Hacking Wireless Bicycle Shifters
2024-08-20 11:08

This is yet another insecure Internet-of-things story, this one about wireless gear shifters for bicycles. These gear shifters are used in big-money professional bicycle races like the Tour de...

Toyota confirms breach after stolen data leaks on hacking forum
2024-08-19 20:51

Toyota confirmed that its network was breached after a threat actor leaked an archive of 240GB of data stolen from the company's systems on a hacking forum. [...]

Chinese hacking groups target Russian government, IT firms
2024-08-11 16:16

A series of targeted cyberattacks that started at the end of July 2024, targeting dozens of systems used in Russian government organizations and IT companies, are linked to Chinese hackers of the...

ADT confirms data breach after customer info leaked on hacking forum
2024-08-08 13:41

ADT Inc. disclosed via a Form 8-K filing at the U.S. Securities and Exchange Commission (SEC) that hackers have gained access to its systems, which hold customer order details. [...]

BreachForums v1 hacking forum data leak exposes members’ info
2024-07-23 19:24

The private member information of the BreachForums v1 hacking forum from 2022 has been leaked online, allowing threat actors and researchers to gain insight into its users. [...]

Email addresses of 15 million Trello users leaked on hacking forum
2024-07-16 17:57

A threat actor has released over 15 million email addresses associated with Trello accounts that were collected using an unsecured API in January. Emo created a list of 500 million email addresses and fed it into the API to determine if they were linked to a Trello account.

Hacking Scientific Citations
2024-07-15 17:13

Citations of scientific work abide by a standardized referencing system: Each reference explicitly mentions at least the title, authors' names, publication year, journal or conference name, and page numbers of the cited publication. References in a scientific publication allow authors to justify methodological choices or present the results of past studies, highlighting the iterative and collaborative nature of science.

How to Study Ethical Hacking as a Beginner
2024-06-21 09:30

The 2024 Ethical Hacking & Cybersecurity for Beginners Bundle is on sale for only $29.99. What kind of ethical hacking courses are included in this bundle?

The Hacking of Culture and the Creation of Socio-Technical Debt
2024-06-19 11:09

4 If culture is like an operating system, then to hack it is to exploit the design of that system to gain unauthorized control and manipulate it towards a specific end. Sociologist James Davison Hunter, who popularized the phrase "Culture war," stresses that culture is used to justify violence to defend these identities.