Argentina teen ‘superhacker’ has been arrested for stealing $50,000 a month

The teenager used malware to create a network of computers which diverted money illegally from accounts.

Buenos Aires, Argentina police have taken a 19-year-old man into custody on charges of orchestrating a hacker ring that stole $50,000 a month. The teenager, who has been dubbed a “superhacker” by the press and faces up to 10 years in jail if found guilty.

 

 

Continue reading… “Argentina teen ‘superhacker’ has been arrested for stealing $50,000 a month”

Malicious Site Can Figure Out Your Real-Life Identity by Your Social Networking Groups

facebook

Hackers can figure out who you are by what groups you belong to.

People often get categorized by social group–jock, geek, soccer mom. The same is true for our online identities: If you have an account on Facebook or LinkedIn, you might also belong to several groups on each site.

 

Continue reading… “Malicious Site Can Figure Out Your Real-Life Identity by Your Social Networking Groups”

China Mounts Cyber Attacks on Indian Websites

 China Mounts Cyber Attacks on Indian Websites

The China hacker community grows with official sanction

China’s cyber warfare army is marching on, and India is suffering silently. Over the past one and a half years, officials said, China has mounted almost daily attacks on Indian computer networks, both government and private, showing its intent and capability.

The sustained assault almost coincides with the history of the present political disquiet between the two countries.

Continue reading… “China Mounts Cyber Attacks on Indian Websites”

Hacking the Power Grid

 

Hacking the Power Grid

Cracking a power company network and gaining access that could shut down the grid is simple, a security expert says, and he has done so in less than a day.

Ira Winkler, a penetration-testing consultant, says he and a team of other experts took a day to set up attack tools they needed then launched their attack, which paired social engineering with corrupting browsers on a power company’s desktops. By the end of a full day of the attack, they had taken over several machines, giving the team the ability to hack into the control network overseeing power production and distribution.

Continue reading… “Hacking the Power Grid”

Discover the Hidden Patterns of Tomorrow with Futurist Thomas Frey
Unlock Your Potential, Ignite Your Success.

By delving into the futuring techniques of Futurist Thomas Frey, you’ll embark on an enlightening journey.

Learn More about this exciting program.