hacking   65647

« earlier    

How the US Halted China’s Cybertheft—Using a Chinese Spy | WIRED
For years, China has systematically looted American trade secrets. Here's the messy inside story of how DC got Beijing to clean up its act for a while.
Hacking  hackers  Chinese  America  American  companies  Wired  Boeing  Obama  Trump  Xi 
yesterday by TonkyC
resource hacker
accessing executable resources
windows  hacking  wikipedia 
2 days ago by w17t
Netherlands in a ‘cyberwar’ with Russia, says defence minister — World — The Guardian Nigeria Newspaper – Nigeria and World News
The Netherlands is in a ‘cyberwar’ with Russia, Defence Minister Ank Bijleveld told Dutch television Sunday, speaking in the wake of an alleged hacking attempt by four Russians in The Hague. “What happened is really dangerous,” Bijleveld told Dutch broadcaster NPO, referring to the incident, which happened in April outside the headquarters of the Organisation […]
cyberwar  espionage  deception  hacking  politics  russia 
3 days ago by basemaly
Thieves and Geeks: Russian and Chinese Hacking Communities
Russian groups: following the money, strict rules against attacking CIS, lots of cards and cryptoc to launder.
Chinese: more communal, hard to access outside China without language, more like traditional warez and porn groups
reference  report  2018  hacking  crime  community  culture 
3 days ago by mechazoidal
Hackers access 50 million Facebook profiles | Revue
"The attack relied on a confluence of three separate bugs. Lorenzo Franceschi-Bicchierai and Jason Koebler at Motherboard have a good, succinct explanation of how the attack worked..."
facebook  security  hacking  dopost 
3 days ago by niksilver

« earlier    

related tags

2018  2ds  2fa  3d  3ds  a:josh-lospinoso  account  active  adafruit  advice  affairs  amazon  america  american  analytics  and  apple  archive  arduino  art  assembly  asterisk  attack  automation  automobile  automotive  aws  bash  bellingcat  best_practice  bloomberg  bluebox  boeing  breaking  browser  browsers  bureaucracy  business  c-lang  c  cable  capitalism  certificate  china  chinese  code  community  companies  computers  computing  cpu  crime  critcode  ct  culture  cybersecurity  cyberwar  d:2018.07.12  data  dataviz  dc  deception  different  diy  dns  domain  dopost  dot  downloads  driectory  drones  electronics  empire  emulator  esp8266  espionage  exploit  eyes  facebook  fail  fbi  five  folklore  for  formats  forums  foxnews  funny  fuzzer  game  gaming  go  google  growth  hack  hackers  hardware  hekanje  history  homebrew  homekit  hunt  important  inband  infosec  intelligence  interactive  interception  internet  investigation  iot  javascript  jbifrost rat  kernel  kindle  language  learning  lgp-30  linux  log  mac  machine  macos  manuals  marketing  meetup-dokumenta-documentaries-short-1hr  memory  message  mfa  microprocessor  microsoft  military  mimikatz  monitoring  movies-to-watch-documentaries  name  networking  news  nintendo  obama  online-tools  online  opensource  osint  p25  p:war-on-the-rocks  paganini  passwords  pc  pcb  pdf  pentagon  pentesting  people-kevin-mitnick  phreaking  pierluigi  pocket  politics  powershell  practical  prison  privacy  product  programming  pstn  public-safety  purposes  raspberrypi  računalništvo  re  recon  reddit  reference  reliability  report  reset  retro  reverse_engineering  reverseengineering  root  russia  russian  safari  screentime  scripting  security  seo  serve  server  shell  shopping  signaling  socialmedia  software  spectrum  sql-injection  ssl  subdomain  supermicro  surveillance  sysadmin  tech  technology  telephony  the_donald  thebighhack  tips  tools  toread  torrent  transparency  trump  tutorial  uas  uav  us  utm  vdiranje  vending  video  vidoes  vim  w:3500  weapons  web  webkit  weekly  wifi  wikipedia  windows  wired  work  xbox  xi 

Copy this bookmark: