See? This is what happens when you don’t teach students how to hack. They have to hire someone. Lisa Vaas reports: A 17-year-old high school boy may face state and federal charges for allegedly having paid a third party to launch a distributed denial of service (DDoS) attack that crippled the West Ada school district…
Month: May 2015
U.S. House panel issues subpoena to Fed over 2012 information leak
Michael Flaherty and Emily Stephenson of Reuters report: The chairman of a U.S. congressional committee on Thursday subpoenaed Federal Reserve documents and communications related to a 2012 leak of monetary policy information, ramping up his attack of the central bank’s handling of the case. Jeb Hensarling, a Republican of Texas who chairs the U.S. House…
Research group says UC Browser, owned by Alibaba, found to leak data
John Ruwitch reports: A popular mobile web browser from a company that Alibaba Group Holding Ltd paid more than $1 billion for last year leaks sensitive user data and is a privacy risk, a Canadian technology research group said on Thursday. Citizen Lab said Chinese and English-language versions of UC Browser, developed by UCWeb Inc.,…
Vietnam’s Ministry of Justice attacked by hackers, ‘important’ data stolen
Thai Son reports: The Ministry of Justice has become the latest victim of ransomware attacks in Vietnam. Several computers connected to the ministry’s network have been infected with the malware, having many “important” data encrypted by hackers who would destroy all the documents, unless they got paid, the department of information technology under the ministry…
Another day, another laptop stolen from a car?
The University of Pittsburgh Medical Center (UPMC) was recently mentioned on this site as one of the clients of a medical billing firm that had to notify clients that patient information had been stolen by a rogue employee. Less than one week later, UPMC had another situation to deal with, but it’s not one that made…
Hundreds of people who want to hire hackers just got outed
Kashmir Hill reports: In February, an Alabama woman named Terri went on a hacker-for-hire website called Hacker’s List, and posted a job she needed done. “I need to get information off an iPhone6, mainly texts (current and deleted if possible and the call log),” she wrote. “Or get into their email account … Thanks so…