When top German officials had their emails and social media hacked and dumped, people wondered whether the attack was some kind of well-financed act of political extremism, given that the targets were so high-profile (even Chancellor Angela Merkel wasn't spared) and that politicians from the neofascist Alternative for Germany were passed over by the hacker.
Now, a politically unaffiliated, unemployed, 20-year-old male German citizen who lives with his parents in the state of Hesse has confessed. He may be tried as a minor, as Germany's youth court hears cases until the accused reach the age of 21.
Reportedly, the hacker exploited normal failings in security: weak passwords, no two-factor authentication, vulnerability to phishing attacks. Apparently, he did not use any sophisticated techniques.
Celebrities are just like us, so it’s likely that some of the people targeted used less-than-complicated passwords on their accounts and didn’t use two-factor authorization, which makes it more difficult for someone to break into online accounts. And once a hacker is in one email account or social network, it opens up a world of possibilities: He can use it to reset other accounts’ passwords or scrape contact lists. If the target reuses the same password across all their accounts, even better. Child’s play, really.
The idea that the federal police should hire the hacker, a proposition raised during the press conference, is laughable. By that measure, every jerk who doxxes someone on Reddit should be swimming in job offers.
20-year-old German hacker confesses in doxxing case [Grace Dobush/Handelsblatt]
Kanye West announced this weekend that he’s running for president, winning the immediate endorsement of billionaire socialite Elon Musk. It turns out, however, that West has filed none of the paperwork required to do so. So as of now, it’s just a dream—or a stunt. it’s unclear whether West is really running. He does not […]
Twitter, JPMorgan, and other organizations have announced they will stop using racially-charged coding and hardware terms like master, slave, blacklist, whitelist, and others as part of a thorough review of best practices around value-neutral terminology in programming and technology.
“Pence was scheduled to go to Phoenix on Tuesday but went on Wednesday instead so that healthy agents could be deployed for his visit.”
Nearly 30 years after it started its run as the most dominant productivity software ever created, the Microsoft Office suite of programs are now virtually synonymous with personal computing. From its days bundled with Windows to its current life as Office 365 cloud-based apps, there’s no reason to think perennial hits like Word, Excel and […]
Photography isn’t just about lighting and composition anymore, especially when you’re shooting with your smartphone. While a wealth of expertise can absolutely help you grab better images, sometimes it’s just about having a great light or an amazing smoothing gimbal to instantly elevate your Instagram pics and other social videos from meh to standout. To […]
As the summer surges forward, grilling and evenings in the backyard may be the only serious outdoor excursions many of us take this season. Yet even with all of our current problems, there’s one group who doesn’t care a bit about COVID-19 and will still look to make any trip you make outside into an […]