Write Your Own Story

Cybersecurity Headlines

The media is filled with stories of what's taking place with cyberscecurity and computer networking.  Check out these articles from around the world:

Adulterers victimized thrice.  A website with the tagline, “Life is Short. Have an Affair” gets hacked exposing the private data of those seeking affairs.  It gets worse.  Opportunistic criminals attempt to blackmail those whose data was exposed.  Worse yet, analysis of the hacked data, reveals allegedly that the company falsified data on the website to make it look like there were actually a large number of women on the site looking for affairs. 


The Ashley Madison Data Dump, Explained, The New York Times, August 19, 2015
http://www.nytimes.com/2015/08/20/technology/the-ashley-madison-data-dum...

 

Nation state carries out attacks against a U.S. Company. North Korea regarded a Sony Pictures film called “The Interview” as highly insulting to its leader.  The film is released in spite of anonymous, dire warnings.  Next, Sony Pictures is hacked, the co-chairperson is fired, massive amounts of intellectual property are stolen and made public, and the company’s computers are wiped out.

The Attack on Sony, 60 Minutes, April 12, 2015
http://www.cbsnews.com/news/north-korean-cyberattack-on-sony-60-minutes/

 

Nation states are waging a quiet war.  It’s not a war with killing but nation states are attacking their enemies by penetrating key infrastructure and facilities and stealing intellectual property.  Nations states are also spying on their friends.

Virtual war a real threat, Los Angeles Times, March 28, 2011
http://articles.latimes.com/2011/mar/28/nation/la-na-cyber-war-20110328

Electricity Grid in U.S. Penetrated By Spies, Wall Street Journal, April 8, 2009
http://www.wsj.com/articles/SB123914805204099085

Obama Order Sped Up Wave of Cyberattacks Against Iran, The New York Times, June 1, 2012
http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of...

Chinese Army Unit Is Seen As Tied To Hacking Against U.S., The New York Times, February 18, 2013
http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied...

5 in China Army Face U.S. Charges of Cyberattacks, The New York Times, May 19, 2014
http://www.nytimes.com/2014/05/20/us/us-to-charge-chinese-workers-with-c...

N.S.A. Breached North Korean Networks Before Sony Attack, The New York Times, January 19, 2014
http://www.nytimes.com/2015/01/19/world/asia/nsa-tapped-into-north-korea...

N.S.A. Spied on Allies, Aid Groups and Businesses, The New York Times, December. 20, 2013
http://www.nytimes.com/2013/12/21/world/nsa-dragnet-included-allies-aid-...

 

Cybercrime has a huge impact on national defense. Experts believe that the plans for the Pentagon's $300 billion Joint Strike Fighter have been stolen by China.

Computer Spies Breach Fighter-Jet Project, Wall Street Journal,  April 21, 2009
http://www.wsj.com/articles/SB124027491029837401

Future Crimes -- A Guide To Tech Threats From Hackers, China, Google And Facebook, Forbes, 3/20/2015 
http://www.forbes.com/sites/tomgroenfeldt/2015/03/20/future-crimes-a-gui...

 

The impact of Cybercrime on consumers has been vast. In 2013, over half a billion people had their identities stolen.  Over half of Americans, including President Obama, had to have their credit cards replaced at least once because of a breach.

Hacked vs. Hackers: Game On, The New York Times, December 2, 2014
http://bits.blogs.nytimes.com/2014/12/02/hacked-vs-hackers-game-on/

 

Think that your car is safe from hacking?  Think again. Computer security experts hack into a car remotely and take over steering, braking, and other functions.

Researchers Show How a Car’s Electronics Can Be Taken over Remotely, The New York Times, March 9, 2011
http://www.nytimes.com/2011/03/10/business/10hack.html

After Jeep Hack, Chrysler Recalls 1.4M Vehicles for Bug Fix, Wired, July 24, 2015
http://www.wired.com/2015/07/jeep-hack-chrysler-recalls-1-4m-vehicles-bu...

 

Basic knowledge of computer security is priceless.  Knowing a little bit about technology, like how your iPhone synchronizes data, is a darn good idea.  

Apple: Some Nude Shots Taken From Stars' Accounts, The New York Times, September. 2, 2014
http://www.nytimes.com/2014/09/03/technology/trove-of-nude-photos-sparks...

Celeb Hacking Scandal Shows Digital Vulnerability, Associated Press,  September. 3, 2014
http://www.netnewscheck.com/article/35746/celeb-hacking-scandal-shows-di...

 

Sextortion.  Now there’s an app for that.  Getting people to perform embarrassing acts on the Internet, and then blackmailing them with recordings of that behavior is an old scam but now there’s an app for that.

Hackers Use an Android App for Sex Extortion, The New York Times, March 24, 2015
http://bits.blogs.nytimes.com/2015/03/24/hackers-use-an-android-app-for-...

 

Robbing a bank in person with a gun and a mask is passé.

Bank Hackers Steal Millions via Malware, The New York Times, February 14, 2015
http://www.nytimes.com/2015/02/15/world/bank-hackers-steal-millions-via-...

 

How hard is it to become a cybercriminal? Tools for cybercrime are for sale.  You can even buy 24-hour helpdesk support.  But if you don’t want to buy a DIY kit there is a public website to hire someone to do it for you.

A beginner’s guide to building botnets—with little assembly required, Ars Technica,  April 11, 2013
http://arstechnica.com/security/2013/04/a-beginners-guide-to-building-bo...

Need Some Espionage Done? Hackers Are for Hire Online, The New York Times, January 15, 2015
http://dealbook.nytimes.com/2015/01/15/need-some-espionage-done-hackers-...

Authorities Shut Down Darkode, a Marketplace for Stolen Personal Data, The New York Times, July 15, 2015
http://www.nytimes.com/2015/07/15/technology/authorities-shut-down-darko...

 

How hard is it to hack into celebrity email accounts? Hackers reportedly logged into Paris Hilton's phone and stole photos of her by correctly guessing the answer to her security question, which was "tinkerbell," the name of her pet Chihuahua.

FBI makes arrest after Johansson, Aguilera e-mails hacked, CNN, October 13, 2011
http://www.cnn.com/2011/10/12/showbiz/hacking-arrest/

Social engineering cracked Palin's e-mail account, CNET, September 18, 2008
http://www.cnet.com/news/social-engineering-cracked-palins-e-mail-account/

 

How hard is it to buy a stolen credit card? You can buy stolen credit cards in large lots from on-line auction websites.  Prices vary based on credit limit, country of origin, and freshness.  Sellers are rated so you can be sure that you are not being ripped off.  Buyers are vetted too; they need to be legitimate criminals who are recommended by established criminals already on the site.

The Amazon.com of Stolen Credit Cards Makes It All So Easy, Bloomberg, Business, Sept 04, 2014
http://www.bloomberg.com/bw/articles/2014-09-04/the-amazon-dot-com-of-st...

Online, a bazaar bursting with stolen credit card information, Fortune, September 21, 2014
http://fortune.com/2014/09/21/home-depot-stolen-card-information-market/

 

Even the technology-savvy gets hacked. Technology firms are being hacked and held ransom.

Tech Start-Ups Are Targets of Ransom Cyberattacks, The New York Times, April 3, 2014
http://bits.blogs.nytimes.com/2014/04/03/tech-start-ups-are-targets-of-r...

Tally of Cyber Extortion Attacks on Tech Companies Grows, The New York Times, June 19, 2014
http://bits.blogs.nytimes.com/2014/06/19/tally-of-cyber-extortion-attack...

How Apple and Amazon Security Flaws Led to My Epic Hacking, Wired, August 6, 2012
http://www.wired.com/2012/08/apple-amazon-mat-honan-hacking/all/

 

Computer security is becoming top of mind to CEO’s and government leaders.  What do Katherine Archuleta, Amy Pascal, Gregg Steinhafel and Noel Biderman have in common? The Director of the OPM, the co-chairperson of Sony Pictures, and the CEOs of Target and Ashley Madison all lost their jobs directly as a result of a security breach.

Ashley Madison Chief Steps Down After Data Breach, The New York Times, August 28, 2015
http://www.nytimes.com/2015/08/29/technology/ashley-madison-ceo-steps-do...

 

It just doesn’t stop. One company after is another is hacked.  Our private healthcare data and financial data are exposed.  Target confirms hackers stole information for 40 million payment cards; 56 million payment cards are stolen from Home Depot; 80 million healthcare records are stolen from Anthem, one of the nation’s largest health insurers…

18 Months of Breaches, Flaws and Revelations, The New York Times, December 2, 2014
http://www.nytimes.com/interactive/2014/12/03/technology/18-months-of-br...

Anthem Hacking Points to Security Vulnerability of Health Care Industry, February. 5, 2015
http://www.nytimes.com/2015/02/06/business/experts-suspect-lax-security-...