How hackers made life hell for a CIA boss and other top US officials

Enlarge (credit: Flickr user Erica Zabowski ) A North Carolina man has pleaded guilty to a conspiracy that illegally accessed the e-mail and social media accounts of Central Intelligence Director John Brennan and other senior government officials and then used that access to leak sensitive information and make personal threats. Justin Gray Liverman, 24, of Morehead City, North Carolina, pleaded guilty to conspiracy to violate the Computer Fraud and Abuse Act, commit identity theft, and make harassing, anonymous phone calls, federal prosecutors said Friday . Among the 10 people targeted in the conspiracy were Brennan; then-Deputy FBI Director Mark Giuliano; National Intelligence Director James R. Clapper; Greg Mecher, the husband of White House Communication Director Jen Psaki; and other government officials. The group called itself Crackas with Attitude, and it was led by a co-conspirator going by the name of Cracka. “She talks mad shit abt snowden,” Liverman said on December 10, 2015 in an online chat with Cracka, referring to a target who is believed to be Psaki, according to a statement of facts signed by Liverman and filed in US District Court for the Eastern District of Virginia. (The document refers to Mecher and Psaki as Victim 3 and the spouse of Victim 3 respectively.) “If you come across anything related to [Victim 3’s spouse] let me know. If you find her cell or home number omg gimme.” Liverman went on to say he wanted to “phonebomb the shitt [sic] outta” Psaki. Read 7 remaining paragraphs | Comments

Visit link:
How hackers made life hell for a CIA boss and other top US officials

Verizon technician sold calling, location data for thousands of dollars

Enlarge (credit: Bloomberg via Getty Images) An Alabama man who worked as a Verizon Wireless technician has agreed to plead guilty to a federal hacking charge in connection to his illegal use of the company’s computers to acquire customer calling and location data. The man, Daniel Eugene Traeger, faces a maximum five years in prison next month. He admitted Thursday that he sold customer data—from 2009 to 2014—to a private investigator whom the authorities have not named. According to the man’s signed plea deal  (PDF): At some point in 2009, the Defendant met a private investigator (“the PI”) who wanted to buy Verizon customer information from the Defendant. The Defendant accepted the PI’s offer. The defendant used Verizon computer systems and facilities to access customer call records and customer location data that he knew he was not authorized to access, and provided that information to the PI even though the Defendant knew that he was not authorized to provide it to a third party. The Defendant accessed customer call records by logging into Verizon’s MARS system. The Defendant then compiled the data in spreadsheets, which the Defendant provided to the PI, including by e-mail. The Defendant accessed customer location data using a Verizon system called Real Time Tool. Using RTT, the Defendant “pinged” cellular telephones on Verizon’s network and provided location data for those telephones to the PI. The plea agreement said that Traeger began making $50 monthly in 2009, when he sold two records a month. By mid-2013, he was earning $750 each month by selling 10 to 15 records. In all, the plea deal says he made more than $10,000 over a five-year period. Read 2 remaining paragraphs | Comments

View the original here:
Verizon technician sold calling, location data for thousands of dollars

Five Airports Are Set to Get Automated TSA Security Screening Lanes

After anticipating extra long airport security lines this year , the Transportation Security Administration has taken steps to fix the problem. Their latest solution involves adding new screening technology to Chicago (O’Hare), Dallas/Fort Worth, Los Angeles, and Miami. They’ll also include a pilot program in Phoenix. Read more…

Read the original:
Five Airports Are Set to Get Automated TSA Security Screening Lanes

Microsoft will warn users targeted by government hackers (update)

Microsoft promises to notify its users if it believes that the government’s targeting their account. In its announcement post , the company says it already notifies subscribers if an unauthorized person’s trying to access their Outlook email and OneDrive. But from now on, it will also specify if it suspects the attacker is sponsored by a government. Microsoft VP Scott Charney writes: We’re taking this additional step of specifically letting you know if we have evidence that the attacker may be “state-sponsored” because it is likely that the attack could be more sophisticated or more sustained than attacks from cybercriminals and others. These notifications do not mean that Microsoft’s own systems have in any way been compromised. According to Reuters , Redmond has changed its policy after the news outlet made a series of inquiries over the past few days regarding a Hotmail attack that was discovered in 2011. Apparently, Microsoft had evidence that Chinese authorities were behind that campaign targeting the emails of China’s Tibetan and Uighur minority leaders, but it never told the victims. (*see update below) In addition to announcing the new policy, the company has also listed steps people can take to prevent their accounts from being accessed by outsiders, state-sponsored or not. These include switching on two-step verification, using strong passwords and keeping their OS and anti-virus program up to date. Microsoft is the latest addition in the growing list of tech corporations that had chosen to tell their customers if they’re being hacked by the government. Google has been doing so since 2012, and Facebook announced its intention to warn people of state-sponsored attacks in October. Update: A Microsoft spokesperson has reached out and told Engadget that it isn’t true that it was able to pinpoint the source of the 2011 Hotmail attacks: Our focus is on helping customers keep personal information secure and private. Our primary concern was ensuring that our customers quickly took practical steps to secure their accounts, including by forcing a password reset. We weighed several factors in responding to this incident, including the fact that neither Microsoft nor the U.S. Government were able to identify the source of the attacks , which did not come from any single country. We also considered the potential impact on any subsequent investigation and ongoing measures we were taking to prevent potential future attacks. [Image credit: AP Photo/Ted S. Warren] Source: Microsoft , Reuters (1) , (2)

Follow this link:
Microsoft will warn users targeted by government hackers (update)

FBI Links a Single Hacker to the Theft of 1.2 Billion Stolen Log-Ins 

The FBI has managed to link the theft of a frankly staggering 1.2 billion log-in credentials to a single hacker, after finding a Russian email address within reams of data obtained by security researchers. Read more…

Read this article:
FBI Links a Single Hacker to the Theft of 1.2 Billion Stolen Log-Ins 

Over 225,000 Apple Accounts Compromised Via iOS Malware

An anonymous reader writes: Researchers from Palo Alto Networks and WeipTech have unearthed a scheme that resulted in the largest known Apple account theft caused by malware. All in all, some 225, 000 valid Apple accounts have been compromised. The theft is executed via variants of the KeyRaider iOS malware, which targets jailbroken iOS devices. Most of the victims are Chinese — the malware is distributed through third-party Cydia repositories in China — but users in other countries have also been affected (European countries, the U.S., Australia, South Korea, and so on). “The malware hooks system processes through MobileSubstrate, and steals Apple account usernames, passwords and device GUID by intercepting iTunes traffic on the device, ” Palo Alto researcher Claud Xiao explained. “KeyRaider steals Apple push notification service certificates and private keys, steals and shares App Store purchasing information, and disables local and remote unlocking functionalities on iPhones and iPads.” Read more of this story at Slashdot.

See more here:
Over 225,000 Apple Accounts Compromised Via iOS Malware

The Foods That Cool Your Mouth After Eating Something Spicy

So you misjudged that curry and now your mouth is on fire—what to do? You probably know that milk will stop the burning, but you have other options too. This infographic makes a handy guide. Read more…

See the article here:
The Foods That Cool Your Mouth After Eating Something Spicy

Downgrade From iOS 8.1.1 to 8.1 If You Want to Jailbreak

iOS 8.1.1 was released earlier this week and includes a few small bug fixes . It also happens to break the current version of the iOS jailbreak . If you updated on accident and want to keep your ability to jailbreak, iDownloadBlog shows you how. Read more…

See original article:
Downgrade From iOS 8.1.1 to 8.1 If You Want to Jailbreak

DOJ Ups the Ante, Says iPhone Encryption Will Kill a Child

Here we go again. Just a few days after a former FBI agent argued that the new iOS 8 encryption would cause somebody to die , a Department of Justice boss upped the ante. At a meeting on October 1, Deputy Attorney General James Cole told a room full off Apple executives that iPhone encryption would cause a child to die. A child! Read more…

Originally posted here:
DOJ Ups the Ante, Says iPhone Encryption Will Kill a Child

PC Cooling Specialist Zalman Goes Bankrupt Due To Fraud

An anonymous reader writes Zalman’s parent company Moneual’s CEO Harold Park, and vice presidents Scott Park and Won Duck-yeok, have apparently spent the last five years producing fraudulent documentation relating to the sales performance of Zalman. These documents inflated sales figures and export data for Zalman’s products. The reason? Bank loans. By increasing sales and exports Park and his associates were able to secure bank loans totaling $2.98 billion. Someone has finally realized what has been going on, though, triggering Zalman’s shares to be suspended on the stock market and the company filing for bankruptcy protection. The questions now turn to how this practice was allowed to continue unnoticed for so long and how the banks will go about getting their near $3 billion back. Read more of this story at Slashdot.

More:
PC Cooling Specialist Zalman Goes Bankrupt Due To Fraud