hacker

Latest

  • Celeb hacker who stole nude images gets six months in prison

    by 
    Mariella Moon
    Mariella Moon
    07.22.2016

    Andrew Helton from Oregon pleaded guilty to hacking celebs' emails and stealing explicit images earlier this year. Now, District Judge John A. Kronstadt has sentenced him to six months in prison and two years of supervised release. According to Assistant United States Attorney Stephanie S. Christensen, the defendant "targeted, baited and hooked" not just celebrities, but also acquaintances with phishing emails for over two years. He also kept the nude and intimate photos he stole in his own computer. Helton's celebrity victims remain unnamed, because the source for that massive nude photo leak dubbed as "The Fappening" was another hacker altogether.

  • ICYMI: A RoboGlove to boost your strength

    by 
    Kerry Davis
    Kerry Davis
    07.07.2016

    try{document.getElementById("aol-cms-player-1").style.display="none";}catch(e){}Today on In Case You Missed It: General Motors is building a RoboGlove (with help from tech company BioServo), to be used in auto manufacturing plants, which is modeled on a version NASA used aboard the International Space Station. The Spector is a gadget to sample fonts and colors and use them within design software, immediately, though right now it's only a prototype. We are really into this Japanese instrument called the Otamatone. You can read about the wine gadget that can ferment grape juice faster than anything else that exists, here. As always, please share any interesting tech or science videos you find by using the #ICYMI hashtag on Twitter for @mskerryd.

  • Reuters

    DNC accuses Russian hackers of stealing opposition research

    by 
    Andrew Tarantola
    Andrew Tarantola
    06.14.2016

    The Democratic National Committee reports that its entire database of opposition research into Donald Trump was compromised and accessed by Russian hackers. That includes all email and chat logs as well, according to security experts who responded to the data breach. Officials first noticed "unusual network activity" in late April and believe that the hackers may have gained entry through a targeted spearphishing campaign. What's more, this appears to be just one of a number of recent incursions by the Russians who, in recent months, have reportedly hacked Hillary Clinton and Donald Trump's campaigns as well as a few GOP superPACS.

  • 20th Century Fox

    Hackers hijack radio stations to air a furry podcast

    by 
    Richard Lawler
    Richard Lawler
    04.07.2016

    In the kind of story we should probably get used to hearing, Ars Technica digs into an incident Tuesday morning where someone redirected multiple radio stations including KIFT and KXAX to broadcast an archived episode of a NSFW podcast for the furry community. It's not clear who was responsible, but it appears to be linked to a coordinated effort to compromise Barix boxes many radio stations use to stream content for broadcasts. As we've seen with security cameras, baby monitors, cars and other connected devices, if something is left exposed to the wider internet with a default or weak password, hackers can and probably will access it.

  • Illustration by D. Thomas Magee

    Advertising's hottest surveillance software is surprisingly legal

    by 
    Violet Blue
    Violet Blue
    03.25.2016

    You may have heard that the FTC this week sent out a dozen strongly worded letters to apps using the SilverPush framework. The FTC politely told 12 app developers that they needed to let users know that SilverPush was collecting data and selling it to third parties. SilverPush responded two days ago by issuing a statement claiming it no longer uses the "Unique Audio Beacons" (UAB), and has "no active partnership with any US-based developers." Well, if this is true, then perhaps SilverPush should remove UAB as a core product from its website -- and from the heart of its business model, as well.

  • MyLoupe/Universal Images Group via Getty Images

    Chinese man pleads guilty to stealing US aerospace secrets

    by 
    Timothy J. Seppala
    Timothy J. Seppala
    03.23.2016

    Some two years after the United States charged Chinese national Su Bin as part of a conspiracy to steal aerospace info, he's pleaded guilty to the crime. For that he'll face a maximum sentence of five years behind bars and a $250,000 fine "or twice the gross gain or gross loss resulting from the offense;" whichever is a higher amount, according to the Department of Justice. Part of his deal entailed admitting that the data pilfered (including info from the U.S. Munitions list) was done so expressly for monetary gain.

  • AP Photo/Marcio Jose Sanchez

    RSA security conference: 25 years of discontent and pranks

    by 
    Violet Blue
    Violet Blue
    03.09.2016

    The first time I went anywhere near the RSA information security conference in San Francisco, it was by way of a prank. Two things I love to cover are computer crime and and enterprise security, so when I met friends for drinks at a downtown hotel bar during the conference one year they were genuinely surprised I'd never attended RSA. One of my drinking pals that night was Twitter's head of security, and he jokingly asked if I wanted to go to RSA -- right now.

  • PYMCA via Getty Images

    Anonymous-linked hacker rescued at sea and then arrested

    by 
    Timothy J. Seppala
    Timothy J. Seppala
    02.17.2016

    A purported member of online activist group Anonymous was arrested by the FBI in Miami after a Disney cruise ship rescued him and his wife from a sailboat near Cuba. As NBC reports, the FBI had been investigating Martin Gottesfeld since October 2014 for his possible involvement with Anonymous' cyberattacks against a Boston hospital.

  • People tweeted their phone number and got spammed with cat facts

    by 
    Billy Steele
    Billy Steele
    11.19.2015

    There are people who share their real phone numbers via a tweet. Yes, really. One programmer decided to teach those folks a lesson by spamming them with cat facts. Using phone numbers that were beamed out in public tweets, the joke included sending text messages about cats until the person tweeted at Edward Snowden "Meow, I <3 catfacts." Although Snowden isn't in on the gag, he is a bit of a feline fanatic. He was also quite forthcoming about his own Twitter faux pas. In this case, automated script pulls data from the Twitter API before blasting out the messages full of meow-based facts with an anonymous texting app. The programmer says the goal of the stunt is to teach users who are so loose with their personal details a lesson on how a more ruthless hacker might attack their mobile devices. Pretty solid way to do so, if you ask us. [Image credit: AFP/Getty Images]

  • Amazon gets hacker drama 'Mr. Robot' as a UK Prime exclusive

    by 
    Nick Summers
    Nick Summers
    09.25.2015

    Netflix has a large roster of exclusive TV shows and documentaries to attract new subscribers, so to compete, Amazon has started doing the same for Prime Video. The latest show to join its UK library is Mr. Robot, a 10-episode thriller about a cybersecurity engineer turned vigilante hacker. Think Batman, if he decided to do all of his crimefighting with code instead of fisticuffs and gadgets. The show isn't technically an original -- it aired earlier this year on the USA Network in North America. It's never been shown (legally) in the UK before though, so it could be an important exclusive for Amazon come October 16th. The company has had limited success with its originals -- Transparent is the only show to achieve true breakout success -- so picking up proven series in this manner could be smart. The deal with NBCUniversal means Mr. Robot will also be a streaming exclusive for Amazon in the US, Germany, Austria and Japan. It's an uphill battle, but with a Top Gear successor on the horizon Amazon is slowly accruing the firepower needed to launch a legitimate offence.

  • Darkode hacker pleads guilty to spreading Facebook malware

    by 
    Mariella Moon
    Mariella Moon
    08.17.2015

    One of the 12 people charged when the Darkode cybercrime forum was seized has pled guilty and will be sentenced on November 23rd. According to Reuters, Eric Crocker aka Phastman from Binghamton, New York, has admitted that he and other hackers from the forum broke into at least 77,000 computers. They apparently used a tool called "Facebook Spreader" to infect machines. Reuters didn't explain how it works in detail, but in this one example posted on Reddit, the malware spreads because infected people's accounts are programmed to send all their friends a file to download. That file runs as soon as you click it.

  • 'Mr. Robot' creator on the evils of Facebook and hackers in Hollywood

    by 
    Devindra Hardawar
    Devindra Hardawar
    07.30.2015

    You'd be forgiven for being skeptical about Mr. Robot, USA's new hacker thriller starring Rami Malek and Christian Slater. In general, movies and TV shows haven't done a great job of portraying hackers, and really, technology of any sort. Even the king of cinematic cool, director Michael Mann, couldn't make cybersecurity exciting with the film Blackhat. But that's what makes Mr. Robot so special: It's a show about hackers that actually features live computer screens with working code and viable cyberattack vectors. It centers on a disaffected cybersecurity expert named Elliot (Malek), who stumbles on a clandestine group of hackers dedicated to disrupting the global economy. We sat down with the show's creator, Sam Esmail, for a long conversation about how it came to be.

  • Standalone scanner keeps your prints out of hackers hands

    by 
    Andrew Tarantola
    Andrew Tarantola
    07.09.2015

    The ease with which hackers seem able to access password secured computer systems including airlines, major corporations -- even the White House -- it's little wonder that the security community is scrambling for alternatives. But even biometric locks that scan our irises, faces, and fingerprints can be broken if they're connected to a compromised computer. That's why Synaptics has developed a fully self-contained fingerprint scanner.

  • Engadget giveaway: win a Raspberry Pi 2 and DIY kit courtesy of Element14!

    by 
    Jon Turi
    Jon Turi
    06.02.2015

    Where to begin? Would you like to make your own PiRate radio station or Pi Microwave? Does a techno upgrade to your Fisher Price Chatter Telephone sound like fun? You can do all this and more with a credit-card-sized Raspberry Pi 2 Model B at the heart of your project. Element14 has been supporting the professional and hobbyist electronics community for years by hosting online groups and supplying some of the requisite gear. It's shipped a few million of the Raspberry Pi since its 2012 release and to celebrate the second iteration, the company gave us a hefty starter kit -- Ben Heck can't have all the fun. This time around, the Pi is six times faster, has double the memory capacity and if you've already been hacking away with an earlier version, don't fret, its backwards compatible, too. There's a host of partner products from sensors to NFC to WiFi modules available from Element14 and this week's giveaway includes 15 of those alongside the new Raspberry Pi 2 Model B for one lucky Engadget reader. You know the drill, just head down to the Rafflecopter widget for up to three chances at winning. Winner: congratulations to Scot S. of Fuquay Varina, NC.

  • Hacking game 'TouchTone' turned me into an NSA spy, and I liked it

    by 
    Timothy J. Seppala
    Timothy J. Seppala
    04.03.2015

    I didn't think I'd make for a good NSA agent until I played TouchTone. The iOS puzzle game had me looking for enemies of the state by scouring text messages and emails, and it didn't faze me one bit. It's absolutely unlike how I am in real life. I'm not a voyeur in any sense of the word, nor am I nosy. To this day, if my dad asks me to grab his debit card, I just bring him his wallet because I'd rather not snoop through people's stuff. The allure of invading someone's privacy isn't my bag whatsoever. And frankly, how quickly that all fell away once I started TouchTone shocked me.

  • Anthem health insurance hack exposes data of over 80 million

    by 
    Mat Smith
    Mat Smith
    02.05.2015

    Hackers have accessed millions of customer and employee details from US-based health insurance firm Anthem, including name addresses and social security numbers. The database that was accessed included details for roughly 80 million people, but Anthem, the second biggest insurer in the country, believes that the hack likely affected a fraction in the "tens of millions". Its Chief Information Officer said that they didn't yet know how hackers were able to pull off the attack. In a statement on Anthem's site, CEO Joseph Swedish said that the company was the target of "a very sophisticated external cyberattack" -- although medical and financial details were apparently not breached.

  • H1Z1 is going 'nuclear' on hackers

    by 
    Justin Olivetti
    Justin Olivetti
    01.19.2015

    From the sound of it, the H1Z1 crew put in some serious overtime during this past weekend. SOE President John Smedley has been posting updates across Reddit, especially in reference to hackers and important patch fixes. Smedley said that the team is "extremely on top of" any hacking going on in the game and will only get better as time goes by. "What we have is extremely robust in terms of detection and prevention," he posted. "Now that we started with detection, you'll be seeing the prevention go nuclear." Patches that are coming soon to the game will cover many vital issues, according to Smedley. These fixes include more loot, frame rate fixes, the infamous G29 problem, the floating arrow bug, and a slower drain rate for hunger and thirst.

  • Lizard Squad hacker arrested for cyber-fraud

    by 
    Justin Olivetti
    Justin Olivetti
    01.05.2015

    A form of justice may have come to bear on one of the members of Lizard Squad. Today, police in Britain have arrested 22-year-old Vinnie Omari, who has connections to the hacker group, for alleged cyber-fraud. The arrest is unrelated to some of the recent activities of Lizard Squad, which includes shutting down the PlayStation Network and Xbox Live over Christmas, DDoS attacks on Destiny this past September, and a bomb threat made on a plane carrying SOE President John Smedley last August. Omari was sought in connection to PayPal thefts from 2013 to 2014.

  • Russian hackers used Windows flaw to steal NATO data

    by 
    Edgar Alvarez
    Edgar Alvarez
    10.14.2014

    According to security firm iSight Partners, hackers from Russia recently gained access to sensitive NATO documents using a major flaw in Windows. The attack, which targeted data from a NATO summit last month, was reportedly part of an espionage campaign against members of the organization (such as the US, UK, France and Germany) to learn more about how it planned to react to Russia's "military intervention" in Ukraine. Furthermore, the same zero-day flaw is believed to be affecting "tens of millions of computers" that are running Microsoft's operating system -- a definite cause for concern. The great news, however, is that the Redmond-based technology titan is now aware of this security flaw and will be patching it today, the company told Bloomberg in a statement.

  • Trion explains why ArcheAge uses Hackshield

    by 
    Bree Royce
    Bree Royce
    10.07.2014

    Ever since ArcheAge's launch, Massively has been deluged with queries about Trion's use of Hackshield, an anti-cheating toolkit created by Korean company AhnLab, Inc. Western gamers aren't traditionally fond of such security programs; as of the time of this writing, even Hackshield's meager entry under AhnLab's English Wikipedia entry has been vandalized, presumably by disgruntled internet denizens. ArcheAge's Hackshield implementation recently provoked one Redditor to issue an open letter essentially accusing Trion of illegally and secretively installing a third-party rootkit on every computer that runs Glyph. We spoke to Trion about the legalities and efficacies of the program. Specifically, we asked about five topics: Whether the program is being installed without permission, Whether it is legal to install it in in this way around the globe, Whether it is causing technical problems for users as claimed, Whether it is fully uninstalling when ArcheAge/Glyph are uninstalled, And whether it actually works, given weekend reports about exploits.