hacking

KPMG is in the middle of an unbelievably dirty cheating scandal that keeps on getting uglier

KPMG is one of the "Big Four" accounting firms: that means that whenever a plan for a business or a public project has a box that says, "Make sure no one is cheating," it means that you hire KPMG or one of its rivals to come in and check the books and make sure that everything is on the level. If you can't trust the accounting firm, the whole thing falls apart. Read the rest

Artist paints playful shadow art on sidewalks

Artist Damon Belanger's "Shadow Art" installations are making the rounds on the internet and for good reason, they're terrific! Using grey paint designed for concrete patios, he first created these street art pieces on commission back in 2016. They're a permanent installation, so you can still find all 22 of the fantastical shadows, ranging from anthropomorphic flowers to critters to abstract designs, on the downtown sidewalks of Redwood City, California.

View this post on Instagram

In use... #redwoodcity #visitredwoodcity #shadowart

A post shared by Damon Belanger (@dmn.belanger) on May 29, 2016 at 9:32pm PDT

View this post on Instagram

#redwoodcity #cityofredwoodcity #publicart #streetart #visitredwoodcity #rwcparks #redwoodcityshadowart #shadowart

A post shared by Damon Belanger (@dmn.belanger) on Jun 8, 2016 at 7:46pm PDT

View this post on Instagram

Dog the Cat. One of about twenty shadow art pieces I painted in downtown #redwoodcity. #rwcparks #visitrwc #redwoodcityshadowart #publicart #shadowart

A post shared by Damon Belanger (@dmn.belanger) on May 21, 2016 at 11:23pm PDT

View this post on Instagram

Robo Band. One of about twenty shadow art pieces I painted in downtown #redwoodcity. #rwcparks #visitrwc #redwoodcityshadowart #publicart #shadowart

A post shared by Damon Belanger (@dmn.belanger) on May 21, 2016 at 11:28pm PDT

View this post on Instagram

Hydrant @ El Camino. One of about twenty shadow art pieces I painted in downtown #redwoodcity. #rwcparks #visitrwc #redwoodcityshadowart #publicart #shadowart

A post shared by Damon Belanger (@dmn.belanger) on May 21, 2016 at 11:33pm PDT

View this post on Instagram

Parking Monkey. One of about twenty shadow art pieces I painted in downtown #redwoodcity.

Read the rest

Become a travel expert with this jetsetter's crash course

Heading abroad? Even if it's just a short trip, there's a lot to prepare for. Travel can be incredibly rewarding, but it can tricky to navigate different cultures and lodging arrangements - and even trickier to do it cheaply.

Before you go shopping for suitcases, here's our pick for a good first investment: The Ultimate Travel Hacker Bundle 2019.

This package of nine online courses covers the essential aspects of travel and can be useful even for those who've been around the globe a time or two. There are crash courses on Spanish and Chinese, plus lessons on how to navigate Airbnb and maximize your airline rewards. Best of all, the entire thing is up for grabs on a "pay what you want" basis. Make an offer, and any amount gets you part of the bundle. Beat the average price, and you take home the whole thing.

Here's a breakdown of what's included:

Become a Digital Nomad - Tips for keeping all your info safe and accessible anywhere you roam. Travel Hacking Mastery: Fly Around the World for Cheap - Find out how you can save on airline tickets by signing up for the right credit cards, all while keeping your score intact and skirting fees. The Abroaders Guide to Points & Miles - Booking the right flights to boost your rewards and reduce ticket prices by up to 90%. Chinese Made Easy: Understand 65% of Chinese In 10 Hours - A language boot camp that lets you speak conversational Mandarin in less than a day. Read the rest

Guard against cyber threats with this ethical hacking course

Cyber threats get more advanced every year, and "white hat" hackers are in demand. Online security experts are required to keep up on systems and strategies that are constantly updating, and it can be hard for employers to reliably know who is capable.

Enter the Complete Ethical Hacking Certification Course, a comprehensive online master class in cyber-defense.

All 21 hours of this boot camp are taught by Mohamed Atef, an ITC consultant with more than 20 years of experience. His course takes you through the makeup and vulnerabilities of 18 popular security domains and teaches how to counter 270 different attack strategies that malicious hackers can use to penetrate them. Along the way, you'll learn preventative measures like penetration testing and understand the various scanning and enumeration countermeasures that are part of any defense expert's toolbox. From Trojans to viruses to malware, you'll have the tools and know-how to deal with them all - and the certification to prove it.

The Complete Ethical Hacking Certification Course is on sale now for $12.99, a full 93% off the original cost. Read the rest

U.S. will examine 2016 North Carolina poll books for election hacking

Finally. It's been almost 3 years.

Germany demands an end to working cryptography

Germany's Interior Minister Horst Seehofer -- a hardliner who has called for cameras at every "hot spot" in Germany -- has announced that he will seek a ban on working cryptography in Germany; he will insist that companies only supply insecure tools that have a backdoor that will allow the German state to decrypt messages and chats on demand. Read the rest

U.S. charges Julian Assange under Espionage Act

The U.S. Department of Justice today indicted Wikileaks' Julian Assange under the Espionage Act, the first time a publisher has been charged for revealing classified information.

Kevin Poulsen and Betsy Woodruff:

The indictment announced Thursday in Washington, D.C. charges Assange with 16 counts of variously receiving or disclosing material leaked by then-Army intelligence analyst Chelsea Manning, which WikiLeaks published as the Iraq and Afghanistan “War Logs” following Manning’s arrest. Assange is also charged with one count of conspiracy to receive the documents, and an 18th count carries over the previous charge against Assange accusing him of conspiring to violate computer hacking laws.

Assange, recently extracted from London's Ecuadorian embassy after his hosts there tired of his presence, is already serving a yearlong sentence in Britain for jumping bail in a sexual assault case. He already faces extradition to the U.S. on computer-crime charges—and possibly to Sweden, where prosecutors revived the assault case after his arrest.

Many U.S. media outlets were first to publish Wikileaks' material, working directly with Assange, and some won Pulitzer prizes for it. As University of Texas law professor Steve Vladeck puts it:

"The issue isn't whether Assange is a "journalist"; this will be a major test case because the text of the _Espionage Act_ doesn't distinguish between what Assange allegedly did and what mainstream outlets sometimes do, even if the underlying facts/motives are radically different."

The actual whistleblower/leaker in the case, Chelsea Manning, served several years in jail for it. She is currently being held again, after rufusing to give further evidence to a grand jury in the Assange case. Read the rest

Notorious forum for account-thieves hacked, login and messages stolen and dumped

OG Users is a forum for people who steal login credentials for online services, mostly to sell desirable login-names for popular services like Instagram; it attained notoriety when Motherboard's Lorenzo Franceschi-Bicchierai linked the forum to an epidemic of SIM-swapping attacks; a few months later, the Reply All podcast devoted an episode to the forum. Read the rest

Florida Governor says the FBI told him how the Russians hacked Florida voting machines, but swore him to secrecy

Florida Governor Ron DeSantis says that after the Mueller Report was published, the FBI came to him to explain its conclusion that at least two Florida county's voting machines were hacked by Russians during the 2016 election, but that they swore him to secrecy so he can't reveal which counties and which machines were hacked. Read the rest

Russian hackers hit 2016 voter databases but election wasn't compromised, says Florida's GOP governor Ron DeSantis

Guy who won the election says nothing wrong with it.

How China grabbed NSA hacking tools and used them to attack U.S. allies

Chinese spies got a hold of NSA hacking tools, and “repurposed them in 2016 to attack American allies and private companies in Europe and Asia,” reports the NYT. How'd they get those cyberweapons? Symantec researchers “believe the Chinese did not steal the code but captured it from an N.S.A. attack on their own computers — like a gunslinger who grabs an enemy’s rifle and starts blasting away.” Read the rest

Securepairs.org will send debullshitifying security researchers to Right to Repair hearings to fight industry FUD

Dozens of Right to Repair bills were introduced across the USA last year, only to be defeated by hardcore lobbying led by Apple and backed by a rogue's gallery of giant manufacturers of every description; one of the most effective anti-repair tactics is to spread FUD about the supposed security risks of independent repairs. Read the rest

Man jailed for 2 years after DDOSing telescope forum that banned him

Banned from the Cloudy Nights telescope forums, IT consultant David Goodyear angrily posted its address on a skeevy hacking site with a request it get nailed. It was down for more than a week thanks to the resulting DDOS. The FBI knocked on his door. They made a show of being friendly and amused by the whole thing, and because middle-aged IT consultants think they're smarter than anyone else, Goodyear admitted everything while giving the officers a tour of his telescope collection. Now he's in jail for two years.

A jury found Goodyear responsible for one count of “intentional damage to a protected computer.” A judge sentenced him to a $2,500 fine, $27,352 in restitution, and 26 months in prison.

[Cloudy Nights' Michael] Bieler had assumed the case was closed until the FBI arrested Goodyear a year later and summoned Bieler to court. He was shocked when he learned about the length of the sentence. He never wanted Goodyear to be imprisoned at all, let alone for two years. “Honestly, I think it’s extreme, what happened,” he says. “We actually asked in our letter [to the court] that he not get prison time. We just wanted him to stop attacking our website.”

The 34-year-old Computer Fraud and Abuse Act (CFAA), which tech policy expert Tim Wu has called “the worst law in technology,” is controversial for many reasons. One of the most common is its harsh sentencing rules.

Read the rest

Wireless vulns in Medtronic's implanted defibrillators allow remote shocks, shutdown, denial-of-service battery attacks and data theft

Medtronic is the most notorious maker of insecure medical implants in America, with a long history of inserting computers into people's bodies with insecure wireless interfaces, toolchains and update paths, and nothing has changed. Read the rest

Two Russia-backed hacker groups target Europe ahead of elections, FireEye reports

Security services firm FireEye says two hacker groups known to be sponsored by the Russian government of Vladimir Putin are waging cyber-attacks currently against European government systems. Read the rest

Uber used spyware to surveil and poach drivers from Australian rival service Gocatch

A senior source at Uber has confirmed to the Australian Broadcasting Corporation's Four Corners programme that Uber Australia illegally deployed an in-house piece of spyware called Surfcam in order to spy on drivers for a rival rideshare company called Gocatch; Uber was able to compile lists of drivers' emails, car registration numbers and other details and it used these to poach Gocatch drivers and turn them into Uber drivers. Read the rest

Beto O'Rourke was in the Cult of the Dead Cow and his t-files are still online

Investigative tech journalist Joseph Menn's (previously) next book is a history of the Cult of the Dead Cow (previously) the legendary hacker/prankster group that is considered to be "America's oldest hacking group." Read the rest

Next page

:)