Tag Archive for: digital

Charities hit by major hack, internet security a bad joke as usual – Digital Journal


Network cables plugged into a server. — © Michael Bocchieri/AFP/Getty Images

Those fun folks on the dark web are making themselves useful again with a serious hack of Australian charities. This is the usual story of getting information for fake IDs, phishing, etc. The information includes names and addresses.

One of the problems was that the hacked company, an intermediary called Pareto Phone, had a lot of old information dating back 9 years. In Australia, records are required to be kept for the statutory limit of 6 years. The charities seem to have been completely unaware that the information was still held by the company.

A few obvious technical matters also arise – Older storage systems would naturally be more vulnerable to hacking. The data was also apparently still accessible to hackers online. It’s a bit of a 101 for data archiving, but it’s pretty common.

Less impressive is the allegation that the data was stored in contravention of Australian Privacy Principles, These are basic rules which govern the management of personal data by third parties. Pareto Phone is now working with investigators to analyze the issues.

This is a standard hack, perpetrated by the usual suspects with the usual outcomes so far. The distinguishing feature is the targeting of charitable donors.  Maybe the little dears had nothing else to do that day.

This hack is representative of the hideously dysfunctional state of internet security. If you’ve ever been hacked or had your money laundered it’s nice to know so little is being done to shut it down.

I’ve had both of those experiences, years ago, and I can’t pretend to be impressed. Hacking of everything, including AI, simply isn’t getting proper attention and oversight. Hacking AI could well be catastrophic given the mindless acceptance of it in the corporate world. Hacking human neural links could be fatal.

…Or maybe the incredibly lax state of global internet security is the problem? This has been going on for decades. It’s made money laundering a breeze. There’s not that much chance of getting caught.

In the Age of Deregulation, which has been a daily lottery win for every criminal on the planet, it’s to be expected….

Source…

Cyber Security Essentials: Safeguarding Your Digital Life In An Increasingly Connected World


Welcome to the digital age, where everything from our personal lives to global commerce relies on technology. As we revel in the convenience and endless possibilities it offers, we must also face a sobering reality – the ever-growing threat of cybercrime. With each passing day, hackers are becoming savvier and more relentless, posing serious risks to our digital lives. In this blog post, we will delve into cyber security essentials – an indispensable guide to fortify your online defenses in an increasingly connected world. Whether you’re a tech enthusiast or just starting out on your digital journey, join us as we navigate through the complexities of safeguarding your valuable data and ensuring peace of mind in this rapidly evolving cyber landscape.

What is Cyber Security?

Cybersecurity is the practice of protecting information systems from cyberattacks. Cyberattacks can take many forms, including:

-Spyware and malware: Private data such as e-mails, bank account numbers, and passwords can be stolen by spyware or malware. Spyware and malware can also monitor user activity and gather sensitive information.

-Data breaches: In a data breach, hackers access personal data belonging to either individuals or organizations. This can include name, address, e-mail addresses, and Social Security numbers. Data breaches can also result in the release of confidential information.

-Criminals exploiting online security vulnerabilities: Criminals could exploit online security vulnerabilities to gain unauthorized access to a system or to steal confidential information.

What are the threats to your digital life?

In an increasingly interconnected and digital world, cyber security is more important than ever. Here are five of the most common threats to digital life and how to safeguard yourself against them:

1. Hackers: Hackers can steal your personal information, passwords, and other confidential information. To protect yourself from hackers, make sure you keep…

Source…

The Role of Global Digital Identity Management in Telecommunications and Internet Security


Building Trust in the Digital Age: The Role of Global Digital Identity Management in Telecommunications and Internet Security

In the digital age, trust has become a paramount concern for individuals and businesses alike. As we increasingly rely on digital platforms for communication, commerce, and entertainment, the need for robust security measures has never been more critical. One of the key components in this digital security landscape is the concept of global digital identity management, particularly in the realms of telecommunications and internet security.

Global digital identity management refers to the process of creating, managing, and securing digital identities. A digital identity is essentially a collection of data attributes that uniquely identify an individual, device, or entity in the digital world. This can include everything from usernames and passwords to biometric data and behavioral patterns. In the context of telecommunications and internet security, digital identity management plays a crucial role in verifying the identities of users, ensuring the integrity of communications, and protecting against fraud and cyber threats.

The importance of digital identity management in telecommunications cannot be overstated. With the advent of 5G technology and the Internet of Things (IoT), the number of connected devices is set to explode, each requiring a unique digital identity. Managing these identities securely is crucial to prevent unauthorized access and ensure the privacy and integrity of communications. Moreover, as telecommunications companies move towards more personalized services, the ability to accurately identify and authenticate users becomes even more critical.

In the realm of internet security, digital identity management is equally vital. As we spend more of our lives online, our digital identities become targets for cybercriminals. Identity theft, phishing attacks, and data breaches are just some of the threats that individuals and businesses face. By implementing robust digital identity management systems, we can better protect ourselves against these threats. These systems can help verify the identities of users, authenticate transactions,…

Source…

Argentinian Hacker Returns USD 200 Million in Largest Heist in History to a Digital Bank  


At just 19 years old, Federico Jaime infiltrated a complex computer security system and in just 18 minutes obtained a record amount. Days later, Jaime returned the money and left an unexpected message.

A couple of weeks ago, news circulated on some international portals about a 19-year-old Argentine hacker who had stolen 200 million dollars from an English bank, and who contrary to what usually happens in the vast majority of these cases, had returned the total amount of money. Even one saver received much more than they had lost due to the touching words they shared.

To put the situation into perspective, this was the largest hack in history carried out by a single person, and the “attack” lasted just 18 minutes, followed by a series of communications between the parties. The total amount obtained was returned 23 days later, leaving as a golden touch to the maneuver a message revealing his identity and encouraging the practice of “Ethical Hacking”, that is, the one carried out with the aim of revealing the flaws of a computer security system.

After learning some details of this story, I began trying to contact Federico by all means. After a couple of weeks of persistence, I managed to get a response from him and we started talking through a channel he considered safe, finally agreeing after a few days to answer some questions, but in exchange for not revealing my identity, the medium by which we communicate, and the place in the world where he currently is. He explains that he should not need to behave this way but due to some malicious and false rumors, he prefers to be cautious at least during the first few months.

I must confess that if I didn’t know his age and wasn’t looking at the face of someone who recently stopped being a child, I would bet I was talking to a seasoned academic, when in fact it is a self-taught person, who does not yet have any university degree.

Here are some excerpts from what I’ve been able to learn about Federico Jaime, the Argentine hacker who left much of the world speechless.

  • Would you like to tell us a little about your story and how you gained the knowledge that makes you considered a hacker today?

I wouldn’t say I’m a…

Source…