A site that's been warning the public about data breaches might actually be doing more harm than good.
Enter LeakedSource, a giant repository online that can potentially make hacking easier. Your email address and the associated Internet accounts -- including the passwords -- is probably in it.
The Apple vs. FBI fight over breaking the encryption of the San Bernardino iPhone was one of the most important news topics of the beginning of the year. Ultimately Apple won, as it didn’t have to create a backdoored version of iOS that would let the FBI spy on that iPhone 5c that belonged to one of the San Bernardino shooters. The FBI won too, as it bought an iPhone hack for more than $1.3 million that let it bypass the password that protects the lockscreen of iPhones.
Hackers love exposing Tesla’s electronic weaknesses. Just this August, researchers showed how they could use jamming and spoofed signals to convince the Tesla Model S autopilot that real objects had disappeared or fake obstacles had appeared. A year before, researchers prized open a Tesla’s dash and attached computers to kill the car mid-drive. And today hackers from Tencent’s elite KEEN Team TISI +% hacker crew claimed to have demonstrated the first remote exploit of Elon Musk’s vehicles, making the potential for real-world attacks a little more realistic.
As we move to a world of hybrid data centers that span both private and public clouds, encryption will become increasingly ubiquitous and important. While the physical control of infrastructure becomes less and less relevant, the logical control of encryption becomes the foundation of trust. As such, the integrity of an encryption solution moves more centrally into the spotlight.
On Monday, a report surfaced claiming that a teen hacker using the alias “Fear” managed to gain access to hundreds of FTP servers owned by the U.S. government. The hacker initially gained access to one server, but then discovered that it listed the access credentials to all FTP servers residing on the .us and .gov domains. The .us servers include public data, private data, program source code, and more sensitive data, while the hacker wouldn’t say what’s loaded on the .gov sites.