Russian Hackers Go From Foothold to Full-On Breach in 19 Minutes

Credit to Author: Andy Greenberg| Date: Tue, 19 Feb 2019 10:00:00 +0000
A new ranking of nation-state hacker speed puts Russia on top by a span of hours.
Read MoreRSS Reader for Computer Security Articles

Credit to Author: Andy Greenberg| Date: Tue, 19 Feb 2019 10:00:00 +0000
A new ranking of nation-state hacker speed puts Russia on top by a span of hours.
Read MoreCredit to Author: Sharky| Date: Tue, 19 Feb 2019 03:00:00 -0800
Fish is being onboarded as a software engineer and has to download the code repository and start building it. But in checking the setup guide, he can’t find any instructions on what user credentials to use to log in. This seems like something he should be able to figure out, so he trolls through multiple document systems (internal websites, Google documents and wikis) until he finds an old document that says to use his username as both username and password for version control access. That’s easy enough — but it doesn’t work. Fish gets a message saying his account wasn’t found or the password didn’t match.
Time to submit a help desk ticket. And the explanation is simple. IT had neglected to run the script that created an account for fish in the version control system. Ten minutes after submitting the ticket, fish is in at last.

Credit to Author: Issie Lapowsky| Date: Mon, 18 Feb 2019 12:00:00 +0000
With $60 and a few fake Facebook accounts, researchers were able to identify service members in a military exercise, track their movement, and even persuade them to disobey orders.
Read More
Credit to Author: Zeynep Tufekci| Date: Mon, 18 Feb 2019 11:00:00 +0000
It used to make sense to believe something until it was debunked; now, it makes sense to assume certain claims are fake—unless they are verified.
Read More
Credit to Author: Lily Hay Newman| Date: Sun, 17 Feb 2019 12:00:00 +0000
What happens to all those emails and passwords that get leaked? They’re frequently used to try to break into users’ other accounts across the internet.
Read More
Credit to Author: Emily Dreyfuss| Date: Sat, 16 Feb 2019 14:00:00 +0000
3-D printed rifles, Iran missile hacking, and more of the week’s top security news.
Read More
Credit to Author: Lily Hay Newman| Date: Fri, 15 Feb 2019 21:44:57 +0000
Trouble at OKCupid, Coffee Meets Bagel, and Jack’d have made February a bad stretch for romantics online.
Read More
Credit to Author: Issie Lapowsky| Date: Fri, 15 Feb 2019 21:12:19 +0000
As he declared a national emergency Friday, President Trump repeatedly dismissed statistics and reports produced by his own government.
Read More