The Hacker News – Cyber Security, Hacking, Technology News

$397.1 million) as of July from 105,000 individuals, according to Chinese news agency Xinhua.

“The growth of a few growing China based blockchain projects, i.e., NEO, will be slowing down after this announcement. This is similar to an event back in two thousand thirteen when China banned exchanges from permitting people to buy into Bitcoin using yuan. Bitcoin bounced back stronger after few years. It’s only a matter of time before the same happens with NEO.” the founder of Its Blockchain, Hitesh Malviya collective his comment on the announcement. “Furthermore, the proposal to banning ICO is yet to be activated, and we can hope for the officials to rethink over time, whatever could be the future of ICO in China.” “Disruptive technology always finds a way around limitary regulations, so it would be wise on the Chinese government’s part to think of mitigating these fears while having some regulatory measures over ICOs. Until that time, we can only speculate.” In the United States, the Securities and Exchange Commission (SEC) has also issued an official warning about the risks of ICOs but has not made a rigid budge yet.

Taringa: Over twenty eight Million Users’ Data Exposed in Massive Data Breach

“It is likely that the attackers have made the database containing nicks, email addresses and encrypted passwords. No phone numbers and access credentials from other social networks have been compromised as well as addresses of bitcoin wallets from the Taringa program! Creators.” the post (translated) says. “At the moment there is no concrete evidence that the attackers proceed to have access to the Taringa code! and our team proceeds to monitor unusual movements in our infrastructure.” To protect its users, Taringa is presently sending a password reset link via an email to its users as soon as they access their account with an old password.

“We’ve made a massive password reset strategy and also enlargened the encryption of the passwords from MD5 to SHA256. We’ve also been in contact with our community via our customer support team,” a Taringa spokesperson told The Hacker News.

Leaked Database Analysis

Here below we have a brief analysis of the leaked database, which suggests that even after innumerable warnings, most people are continuously using deadly-simple passwords to safeguard their most sensitive data.

Here below we have the list of most popular/common passwords chosen by Taringa users that also includes top worst passwords such as 123456789, 123456, 1234567890, 000000, 12345, and 12345678.

Besides the cracked passwords, LeakBase also take a look at the email addresses contained in the leaked data dump, and the most common email domains are as goes after:

But, are Taringa users entirely responsible for choosing powerless passwords?

How to Help Protect Yourself from Data Breaches

Of course, if you are one of those potentially affected users, you are strongly recommended to switch your passwords instantly.

(Fresh) Become A Professional Hacker – nine Online Training Courses

Instagram Hacker Puts six Million Celebrities Private Data Up For Sale On DoxaGram

FDA Recalls Almost Half a Million Pacemakers Over Hacking Fears

“Many medical devices–including St. Jude Medical’s implantable cardiac pacemakers–contain configurable embedded computer systems that can be vulnerable to cybersecurity intrusions and exploits,” the FDA said in a security advisory. “As medical devices become increasingly interconnected via the Internet, hospital networks, other medical devices, and smartphones, there is an enhanced risk of exploitation of cybersecurity vulnerabilities, some of which could affect how a medical device operates.” To protect against these critical vulnerabilities, the pacemakers must be given a firmware update. The good news is that those affected by the recall do not require to have their pacemakers liquidated and substituted.

AngelFire: CIA Malware Infects System Boot Sector to Hack Windows PCs

Previous Vault seven CIA Leaks

Last week, WikiLeaks published another CIA project, dubbed ExpressLane, which detailed about the spying software that the CIA agents used to spy on their intelligence fucking partners around the world, including FBI, DHS and the NSA.

  • CouchPotato – A CIA project that exposed its capability to spy on movie rivulets remotely in real-time.
  • Dumbo – A CIA project that disclosed its capability to hijack and manipulate webcams and microphones to corrupt or delete recordings.
  • Imperial – A CIA project that exposed details of three CIA-developed hacking instruments and implants designed to target computers running Apple Mac OS X and different flavours of Linux OS.
  • UCL/Raytheon – An alleged CIA contractor that analysed in-the-wild advanced malware and submitted at least five reports to the agency for help it develops its malware.
  • Highrise – An alleged CIA project that permitted the US agency to stealthy collect and forward stolen data from compromised smartphones to its server via SMS messages.
  • BothanSpy and Gyrfalcon – Two alleged CIA implants that permitted the spy agency to intercept and exfiltrate SSH credentials from targeted Windows and Linux computers using different attack vectors.
  • OutlawCountry – An alleged CIA project that permitted the agency to hack and remotely spy on computers running Linux operating systems.
  • ELSA – Alleged CIA malware that tracks geo-location of targeted laptops and computers running the Microsoft Windows OS.
  • Brutal Kangaroo – A instrument suite for Microsoft Windows OS used by the CIA agents to target closed networks or air-gap computers within an organisation or enterprise without requiring any direct access.
  • Cherry Blossom – A framework employed by the agency to monitor the Internet activity of the targeted systems by exploiting flaws in Wi-Fi devices.
  • Pandemic – A CIA’s project that permitted the spying agency to turn Windows file servers into covert attack machines that can silently infect other PCs of interest inwards the same network.
  • Athena – A spyware framework that the agency designed to take utter control over the infected Windows systems remotely and works against every version of Windows OS-from Windows XP to Windows Ten.
  • AfterMidnight and Assassin – two alleged CIA malware frameworks for the Microsoft Windows platform that’s meant to monitor and report back deeds on the infected remote host PC and execute malicious deeds.
  • Archimedes – Man-in-the-middle (MitM) attack contraption allegedly developed by the agency to target computers inwards a Local Area Network (LAN).
  • Scribbles – Software allegedly designed to embed ‘web beacons’ into confidential documents, permitting the CIA agents to track insiders and whistleblowers.
  • Grasshopper – A framework which permitted the spying agency to lightly create custom-made malware for violating into Microsoft’s Windows OS and bypassing antivirus protection.
  • Marble – Source code of a secret anti-forensic framework used by the agency to hide the actual source of its malware.
  • Dark Matter – Hacking exploits the spying agency designed to target iPhones and Macs.
  • Weeping Angel – Spying instrument used by the CIA agents to infiltrate brainy TV’s, converting them into covert microphones.
  • Year Zero – CIA hacking exploits for popular hardware and software.

Related movie:

No comments

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>