Top related persons:
Top related locs:
Top related orgs:

Search resuls for: "Hacking"


25 mentions found


Anti-Putin hackers say they accessed a Russian prison network and stole data, CNN reported. The hackers told the outlet they sought information that could help them find out what happened to Navalny. download the app Email address Sign up By clicking “Sign Up”, you accept our Terms of Service and Privacy Policy . Navalny, Putin's only serious political rival, was serving a 19-year sentence at an Arctic penal colony when he died in harsh conditions at the prison on February 16. Hackers have been active on both sides of Putin's war with Ukraine, including multiple attacks by Russian hackers.
Persons: Alexey Navalny, , Putin, Vladimir Putin's, Navalny, Joe Biden, Yulia Navalnaya Organizations: Putin, CNN, Service, Business Locations: Russia, Russian, Ukraine, Kyiv, Ukrainian
CNN —Within hours of opposition leader Alexey Navalny’s death in February in a Russian prison, a group of anti-Kremlin hackers went looking for revenge. This screenshot, provided to CNN by hackers claiming responsibility, shows a hacked website tied to the Russian prison system display messages of support for late Russian opposition leader Alexey Navalny. Obtained by CNNIt took several hours for the administrator of the online prison shop to notice that Russians were buying food for pennies, according to the hacker involved. CNN was able to match multiple prisoner names in screenshots shared by the hackers with people that, according to public records, are currently in Russian prison. The online prison shop that the hackers appear to have breached is owned by the Russian state and officially known as JSC Kaluzhskoe, according to Russian business records reviewed by CNN.
Persons: Alexey Navalny’s, “ Long, Alexey Navalny, Yulia, Navalny, ” Tom Hegel, ” Hegel, Vladimir Putin, Joe Biden, Alexander Zemlianichenko, , Putin, Ukraine “, Hegel, “ Hacktivism, Organizations: CNN, Kremlin, JSC Kaluzhskoe, Russia’s Federal Penitentiary Service, JSC, US, Russian Federal Penitentiary Service Locations: Russian, Russia, Russia’s, US, Yamalo, Moscow, Ukraine, Ukrainian
AT&T has also begun notifying customers whose personal information was compromised. Photos You Should See View All 60 ImagesFull names, email addresses, mailing address, phone numbers, dates of birth and AT&T account numbers may have also been compromised. HAS AT&T SEEN DATA BREACHES LIKE THIS BEFORE? AT&T has seen several data breaches that range in size and impact over the years. Avoiding data breaches entirely can be tricky in our ever-digitized world, but consumers can take some steps to help protect themselves going forward.
Persons: , Troy Hunt, we’ve, , Hunt, You'll, Matt O'Brien Organizations: Associated Press, AP, Federal Trade Commission Locations: Dallas, Australia, Providence , Rhode Island
Adam Craig built up his real-estate portfolio over the last decade-plus using the famous BRRRR strategy — an acronym for buy, rehab, rent, refinance, and repeat. But he has stopped using the strategy for residential properties and said it isn't something he'd recommend for new investors. ATTOMAnother risk to using the BRRRR strategy is that home prices are not rising as fast as they were over the last few years. 3 approaches to use insteadInstead of the BRRRR, Craig recommended that new investors start off with one of a few easier options. This way, risk is reduced in terms of the time it will take and money it will cost.
Persons: Adam Craig, Craig, Craig doesn't, that's, doesn't, Louis Fed Organizations: Business Locations: St
Dr. Mikhail Varshavski is known as Dr. Mike on social media. “Zoom out of just thinking about, ‘What I can take or what I can eat?’ and understand that there’s a lot of other things that impact your weight,” Dr. Mike said. “(Make) sure that you get help when it comes to mental health issues and concerns,” Dr. Mike said. For example, Dr. Mike said he recently had a guest on his podcast who tried to equate a chocolate kiss to a grape. While you may compare them based on their sugar content, that’s one way to categorize them,” Dr. Mike said.
Persons: Sanjay Gupta, what’s, Mikhail Varshavski, Mike, , Ponce de León, we’re, ” Dr, Dr, , ” “, edu ”, , That’s, “ It’s, You’re, Skip, you’re, Jennifer Lai Organizations: CNN, Facebook, YouTube, TED, Inc, US Centers for Disease Control, Harvard Medical Locations: Chatham , New Jersey, Ponce, “ .
But Xi is also trying to dent US global power on several fronts. AdvertisementChina's President Xi Jinping presented an uncharacteristically affable image Wednesday, smiling broadly for US business leaders at a meeting in Beijing. The Chinese leader sought to assure investors including Cristiano Amon of Qualcomm and Stephen Schwarzman of the Blackstone Group that the downturn in China's economy, its biggest contraction in 15 years, would be over soon. AdvertisementOn the one hand, Xi is seeking to implement China's long-term strategy of displacing the US as the world's pre-eminent power. China's economy, after decades of growth, is experiencing its most serious problems in decades.
Persons: Xi Jinping, He's, Xi, , Cristiano Amon, Stephen Schwarzman, Jonathan Ward, Ali Wyne, Joe Biden, Robert Daly, Wilson Organizations: Service, Qualcomm, Blackstone Group, United, Communist Party, US Navy, Taiwan, Wilson Center, CBS, International Crisis Group, Institute, NPR, US Locations: Beijing, China, Xinhua, United States, Ukraine, Russia, Taiwan, Iran, North Korea
On Tuesday, lawyers for Ms. Lake indicated she would not dispute the facts of a defamation lawsuit that Stephen Richer, the Maricopa County recorder, had filed against her. But they seem to be more durable and pervasive in Maricopa County, home to Phoenix, riling up residents long after campaigns have closed up shop. Credit... Rebecca Noble for The New York TimesThe numbers back up Arizona’s outsize role in election fraud claims. At a news conference on Monday, Gary M. Restaino, the U.S. attorney for Arizona, said seven of the nation’s roughly 18 federal cases regarding election threats involved people targeting Arizona election officials, though the suspects are not Arizonans. Image Bill Gates, a Maricopa County supervisor, during Arizona’s primary presidential election in Phoenix earlier in March.
Persons: Joseph R, Biden, Donald J, Kari Lake, Trump, baselessly, hasn’t, Lake, Stephen Richer, Richer, , , Joshua Garland, Rebecca Noble, Gary M, , Mr, Restaino, Lake’s, ” Mr, they’re, Katie Hobbs, Bill Gates, Gates, Lake —, , ’ ‘, ’ ”, “ It’s Organizations: Republican, Arizona State University, , The New York Times, Arizona, U.S, Supreme, Lake’s Democratic, Mr, Republicans Locations: Arizona, Maricopa, Maricopa County, Phoenix, Georgia, U.S, . Credit, Gitmo
Hong Kong CNN —New Zealand has joined the United States and the United Kingdom in accusing China of launching “malicious” cyberattacks through state-backed hackers, as Beijing comes under growing scrutiny in a big election year for democracies around the world. The Chinese embassy in London dismissed the claims as “completely unfounded” and “malicious slander,” calling the sanctions “outright political manipulation.”“China is a major victim of cyberattacks. We have firmly fought and stopped all kinds of malicious cyber activities in accordance with the law, and have never encouraged, supported or condoned cyberattacks,” the embassy said, reiterating Beijing’s long-held stance on the matter. Australia and the European Union has also expressed solidarity with the UK and voiced concerns over China’s alleged malicious cyber activities. Without naming China, the EU said it would continue to monitor and address malicious cyber activities and stand ready to take further action when necessary.
Persons: Judith Collins, , Zealand’s, ” Collins, Wang Xiaolong, Winston Peters, ” Peters, Penny Wong, Clare O’Neil Organizations: Hong Kong CNN —, United, New, UK, Parliamentary, Office, Parliamentary Service, New Zealand, Wellington, European Union, Australia’s Foreign, Home Affairs, Inter, Parliamentary Alliance Locations: Hong Kong, Zealand, United States, United Kingdom, China, Beijing, New Zealand, London, PRC, Australia, EU, Canada
The United States and Britain imposed sanctions on China’s elite hacking units on Monday, accusing Beijing’s top spy agency of a yearslong effort to place malware in America’s electrical grids, defense systems and other critical infrastructure, and of stealing the voting rolls for 40 million British citizens. Taken together, the actions on both sides of the Atlantic underscored the escalation of cyberconflict between the Western allies and Beijing, in vastly different spheres. American intelligence agencies have warned that the malware found in U.S. infrastructure appeared to be intended for use if the United States were coming to the aid of Taiwan. The theory is that Americans would be too tied up worrying about their own supplies of electricity, food and water to help a distant island that Beijing claims as its own. Separately, the Justice Department indicted individual Chinese hackers for what Attorney General Merrick B. Garland called a 14-year effort “to target and intimidate” Beijing’s critics around the world.
Persons: Beijing’s, Merrick B, Garland, Organizations: Justice Department Locations: States, Britain, Beijing, U.S, United States, Taiwan
BeeBright | Getty ImagesLONDON — The U.S. and U.K. on Monday accused hackers linked to the Chinese state of being behind "malicious" cyber campaigns targeting political figures, in moves expected to stoke tensions with Beijing. The British government also alleged that China-affiliated hackers were behind an attack that saw the data of millions of voters accessed. "I can confirm today that Chinese state-affiliated actors were responsible for two malicious cyber campaigns targeting our democratic institutions and parliamentarians," British Deputy Prime Minister Oliver Dowden said in a speech to Parliament on Monday. "We want now to be as open as possible with the House and the British public," Dowden said. U.S. hits out at ChinaSeparately, the U.S. Justice Department unsealed an indictment Monday accusing Chinese state-linked hackers of being behind cyber campaigns targeting U.S. businesses, government officials and politicians.
Persons: Oliver Dowden, Dowden, Ni Gaobin, Weng Ming, Cheng Feng, Peng Yaowen, Xiong Wang, Zhao Guangzong, Merrick B, Garland Organizations: Getty, stoke, Electoral, Electoral Commission, Embassy, Google, APT31, U.S . Justice Department, DOJ Locations: U.S, Beijing, China, Britain, APT31 ., United States
The Biden administration is preparing to publicly accuse several Chinese hackers of conducting sweeping hacks against US companies on behalf of China’s civilian intelligence service, three people familiar with the matter told CNN. An announcement identifying the hackers with names and photos is expected as soon as Monday, the sources said. The hackers have been using a Chinese technology company as a front to cover their hacking activity, one of the sources said. The British government is also preparing to accuse the hacking group of targeting UK organizations, the sources said. The cybersecurity industry knows the hacking group as APT31 or Judgement Panda, and researchers have found the hackers targeting everything from US law firms to European industrial organizations to international apparel companies.
Persons: Biden, Christopher Wray, Xi Jinping, Joe Biden, Wray Organizations: CNN, of State Security, Embassy, The, Microsoft Locations: Washington ,, China, Beijing, Wuhan, Tibet, Hong Kong
Opinion | Will the Rotters Keep Hounding Kate?
  + stars: | 2024-03-22 | by ( Maureen Dowd | ) www.nytimes.com   time to read: +1 min
With her mop of red Renaissance curls and steely ambition, Brooks became the favorite lieutenant of Rupert Murdoch. But the moral is about amorality; the story underscores the viciousness and lack of decency of the British tabloids in the hacking scandal. I thought of that when I watched the video of Princess Kate sitting on a bench amid daffodils, telling her heartbreaking story of a cancer diagnosis and chemotherapy. Cancer is a very personal thing, and how you tell your children is the most personal of all. Princess Diana’s sons blame that ravenous behemoth for hounding their mother.
Persons: J.T, Rogers, Bartlett Sher, Rebekah Brooks, Brooks, Rupert Murdoch, Murdoch, Don Van Natta Jr, Jo Becker, Graham Bowley, Saffron Burrows, Princess Kate, Princess Diana’s, Harry Organizations: Lincoln Center, British, New York Times, Cancer, Mirror Group Newspapers Locations: Britain, British
A year ago, the Biden administration put the tally of US government personnel either suspected of or confirmed to have been targeted by spyware at 50. The market for commercial spyware has exploded over the last decade as companies from Israel to North Macedonia have hawked their services and many governments have been willing buyers. Poland’s prime minister has claimed the previous government used spyware on a long list of victims. The Biden administration’s review “did not identify widespread use” in the federal government of commercial spyware, the official said in a rare interview on the subject. Spyware companies often hide behind opaque corporate structures and companies to stay in business, according to US officials and researchers who track those companies.
Persons: CNN —, Biden, Organizations: CNN, US National Security Council, NSC, US Treasury Department, Summit for Democracy, State Department, NSO Group, FBI, Pegasus, White Locations: Israel, North Macedonia, Poland, Ireland, Finland, Germany, Japan, South Korea, Seoul, , Africa,
Russia is ratcheting up its internet censorship ahead of elections this weekend that are all but assured to give President Vladimir V. Putin another six years in power, further shrinking one of the last remaining spaces for political activism, independent information and free speech. The Russian authorities have intensified a crackdown against digital tools used to get around internet blocks, throttled access to WhatsApp and other communications apps in specific areas during protests, and expanded a program to cut off websites and online services, according to civil society groups, researchers and companies that have been affected. Russia, they said, is turning to techniques that go beyond its established practices of hacking and digital surveillance, taking a more systemic approach to change the way its domestic internet functions. In doing so, the country is using methods pioneered by China and Iran, forming an authoritarian model for regulating the internet that contrasts with the more open approach of the United States. Russia “has reached a new level of blocking in the last six months,” said Mikhail Klimarev, a Russian telecommunications expert and executive director of the Internet Protection Society, a civil society group.
Persons: Vladimir V, Putin, Russia “, , Mikhail Klimarev Organizations: Internet Protection Society Locations: Russia, China, Iran, United States, Russian
FCC cracks down on cable TV ‘junk fees’
  + stars: | 2024-03-14 | by ( Brian Fung | ) edition.cnn.com   time to read: +9 min
The new junk fees rule requires cable and satellite TV companies to list “all-in” prices to consumers in their billing and marketing materials — including any miscellaneous fees, such as those related to sports programming or local broadcast channels. Between 24% and 33% of the typical consumer’s bill can be attributed to fees, consumer advocates told the FCC. In a separate move last year, the FCC proposed banning certain cable fees altogether, including early termination fees that the agency says hinder competition and prevent customers from easily switching providers. Mending the digital divideIn addition to cable, the FCC also addressed internet availability during its Thursday meeting. Defining high-speed internetThe report also reflects newly adopted revisions in how the country defines high-speed internet, which the FCC voted to approve on Thursday.
Persons: , , Jessica Rosenworcel, ’ ”, NCTA, Dave Wallace, Amira Karaoud, Biden, Rosenworcel, you’re, Anne Neuberger, Neuberger Organizations: Washington CNN, Federal Communications Commission, FCC, Energy Star, National Institute for Standards, Technology, Logitech, LG, Samsung, Consumer, European Union Locations: Kentucky, Louisville , Kentucky, U.S, greenlight, Las Vegas, America
Read previewThe BRRRR method — that's buy, rehab, rent, refinance, and repeat — has been Adam Craig's bread-and-butter strategy for real-estate investing over the last decade. From $42,500 to $148,000In 2020, Craig purchased a property on the outskirts of Cleveland, Ohio for $42,500, according to a settlement statement. By this point in his investing journey, Craig had excess cash flow coming in from many other properties, which could cover his costs. This also puts first-time investors more at risk, given that they may run into unforeseen repair costs, Craig told Business Insider. "In general, if you're getting a property that's way below market that's a BRRRR property, the risks should be less because you have a lot more wiggle room," he said.
Persons: , Adam Craig's, He's, Craig, we've, that's, it's, doesn't Organizations: Service, Business Locations: Cleveland , Ohio
There was no breach of government networks or data stolen in the cyberattack, according to the office of Republican Gov. “We’ve seen waves of attacks against numerous targets, including the State of Alabama,” Richard Hummel, senior threat intelligence manager at cybersecurity firm Netscout, told CNN. The attacks against Alabama government websites typically lasted five to 10 minutes, Hummel said. More than 2,200 US hospitals, schools and governments were “directly impacted” by ransomware last year, according to a tally from cybersecurity firm Emsisoft. DDoS attacks can also cause disruptions to the local communities that rely on school, hospital and election websites for information, Hummel said.
Persons: , Jeremy Ward, Kay Ivey, Sergeant LaQuitta Wade, Gerald Auger, ” Auger, “ You’re, , ” Richard Hummel, Netscout, Hummel, ransomware Organizations: Washington, Atlanta CNN, Alabama’s, Information Technology, CNN, Republican Gov, Public, Birmingham Police Department, Public Information, Coastal Information Security, Agency, State of, Alabama Locations: Atlanta, Birmingham, City, Alabama, Sudan, , State of Alabama
But the Biden administration, lawmakers and ports management continue to differ in their views of the true nature of the threat. Kurt Fredrickson, a Coast Guard spokesman, told CNBC via email that even if the software is not Chinese, all software has vulnerabilities, regardless of origin. "Software is everywhere," Gene Seroka, executive director of the LA port, told CNBC in a recent interview at the TPM conference. They warn the crane software concerns are part of a much larger societal risk. He added that regardless of the origin of the crane software and the origin of a crane's manufacturing, there are ways to mitigate cyber risk.
Persons: Biden, Jay Vann, Robert Murray, it's, Kurt Fredrickson, Murray, Carlos Gimenez, Melanie Stambaugh, Greg Ehrie, Doug Vogt, Vogt, Mario Cordero, Noel Hacegaba, Cordero, Gene Seroka, Lucian Niemeyer, Trump, Niemeyer Organizations: CNBC, ABB, Germany's Siemens, Counterterrorism, Law, Intelligence, Homeland Security, U.S . Coast Guard Cyber Command, Biden Administration, People's, Capitol, National Association of Waterfront Employers, Coast Guard, Transportation, Maritime Security, of South Carolina, Northwest Seaport Alliance, USCG, American Association of Port Authorities, New Jersey Port Authority, Siemens, New, Port, Biden, North Carolina Ports, ZPMC, NC, United States Coast Guard, Samsung, U.S . Department of Homeland Security, DHS, U.S . Coast Guard, Security, Defense for Energy, National Security, Management, Maritime Transportation, Joint Force, MTS, Readiness Locations: China, Swiss, People's Republic of China, U.S, of South, China . Port of Long Beach, Tacoma, Seattle, York, New Jersey, New York, Port of New Orleans, of Long Beach, Port of Long, Port of Los Angeles, Port, Oakland, Georgia, Finland, Japan, Taiwan, Europe, Shanghai
Many argue it's harder today for young adults to make it on their own. In addition to soaring food and housing costs, millennials and Generation Z face other financial challenges their parents did not at that age. More from Personal Finance:3 ways Gen Zers can build creditWhy can't today's young adults leave the nest? Gen Z, millennials are 'house hacking' to become homeownersBy other measures, young adults are doing well. And yet, 61% of adult children still living at home don't contribute to household expenses at all, Savings.com found.
Persons: Gen Zers, Savings.com Organizations: Savings.com, Finance
CNN —For more than two weeks, a cyberattack has disrupted business at health care providers across the United States, forcing small clinics to scramble to stay in business and exposing the fragility of the billing system that underpins American health care. It prevented some insurance payments on prescription drugs from processing, leaving many care providers effectively footing the bill without reimbursement. Health care groups have pleaded with the Department of Health and Human Services (HHS) to offer medical practices a financial lifeline. A week ago, Change Healthcare announced plans for a temporary loan program to get money flowing to health care providers affected by the outage. Tyler Mason, a spokesperson for Change Healthcare, declined to comment when asked if the company had paid off the hackers.
Persons: , Catherine Reinheimer, Mel Davies, ” Jesse Ehrenfeld, Reinheimer, Richard Pollack, Carter Groome, ” Groome, Tyler Mason, ALPHV, ” Ari Redbord, Joshua Corman, Corman, Organizations: CNN, Change Healthcare, Health, Department of Health, Human Services, Oregon Oncology, Healthcare, American Medical Association, US, Medical Group Management Association, Community Oncology Alliance, American Hospital Association, Justice Department, ALPHV, Labs Locations: United States, Philadelphia, UnitedHealth, Oregon
CNN —Russian state-backed hackers gained access to some of Microsoft’s core software systems in a hack first disclosed in January, the company said Friday, revealing a more extensive and serious intrusion into Microsoft’s systems than previously known. Hackers with access to source code can use it for follow-on attacks on other systems. Microsoft first revealed the breach in January, days before another Big Tech company, Hewlett Packard Enterprise, said the same hackers had breached its cloud-based email systems. The hacking group was behind the infamous breach of several US agency email systems using software made by US contractor SolarWinds, which was revealed in 2020. US officials have attributed the hacking group to Russia’s foreign intelligence service.
Organizations: CNN, Microsoft, US Securities and Exchange Commission, Big Tech, Hewlett Packard Enterprise, Kremlin, SolarWinds, Homeland Security, SEC Locations: Russian, Russia
Microsoft on Friday said that Russian group Nobelium, which the company refers to as Midnight Blizzard, has been trying to access its internal systems and source code repositories. "In recent weeks, we have seen evidence that Midnight Blizzard is using information initially exfiltrated from our corporate email systems to gain, or attempt to gain, unauthorized access. This has included access to some of the company's source code repositories and internal systems," Microsoft said in a blogpost. "To date we have found no evidence that Microsoft-hosted customer-facing systems have been compromised." Microsoft said Midnight Blizzard was trying to access secrets, including those shared between Microsoft and its customers, but that it was reaching out and helping affected customers.
Persons: Blizzard Organizations: Microsoft, Midnight
The overhaul rolling out Thursday only in the Europe represents the biggest changes to the iPhone's App Store since Apple introduced the concept in 2008. Among other things, people in Europe can download iPhone apps from stores that aren't operated by Apple and are getting alternative ways to pay for in-app transactions. That came during testimony in a May 2021 trial resulting in a U.S. judge ruling that the App Store isn't a monopoly. In that decision, the judge required Apple to begin allowing links to outside payment options inside iPhone apps in the U.S. Apple still doesn't permit alternative iPhone app stores in the U.S. or more than 100 other countries outside the EU.
Persons: Apple, Tim Sweeney, Steve Jobs, Epic's Sweeney, ” Apple Organizations: Apple, Union, Digital Markets, Spotify, Epic, European Commission, U.S, Regulators, Google, Facebook, Apple Watch, Supreme, EU Locations: Europe, Apple’s, Sweden, U.S, It's
Stores are cutting back on how many varieties of products they opt to offer. Retailers are shifting to offering customers less variety on products with questionable success and doubling down on bestsellers, instead, Axios reported. Some chains like Macy's and Kohl's are slimming down their in-store product options and offering a wider variety of products online, Axios reported. Some retailers reported that customers didn't seem to mind that slashed products never returned to the shelves, The Wall Street Journal reported. Experts believe the slimmed-down choices could also help reduce stress for shoppers, Axios reported.
Persons: , Axios, Coke, Cherry, Neil Saunders Organizations: Service, Daily, Business, Street Journal
CNN —A high-profile lawsuit filed by Elon Musk’s X targeting hate speech researchers appeared to stumble on Thursday as a federal judge sounded a skeptical note on many of the lawsuit’s allegations, suggesting that the company formerly known as Twitter hasn’t done enough to establish its claims. The judge in the case signaled he may toss out X’s claims but appeared undecided on whether to let the company amend and refile the suit. X has also blamed CCDH’s reports, which showcase the prevalence of hate speech on the platform, for amplifying brand safety concerns and driving advertisers away from the site. “You could have brought a defamation case; you didn’t bring a defamation case,” Breyer told X attorney Jonathan Hawk. Elon Musk, owner of X, attends the Viva Technology conference at the Porte de Versailles exhibition centre in Paris, France, June 16, 2023.
Persons: Elon Musk’s, X, CCDH, CCDH’s, Charles Breyer, ” Breyer, Jonathan Hawk, Elon Musk, Porte, Gonzalo Fuentes, Breyer, Hawk, , ” Hawk, I’ve, John Quinn Organizations: CNN, Center, Twitter, Nazi, Viva Technology, Porte de, CCDH Locations: San Francisco federal, Paris, France
Total: 25