Hackers

9 Results / Page 1 of 1

Background

todayMarch 20, 2020

  • 1
close

Hackers + Reflare News Analysis Editor

Hard to Verify Claims of Hacking Go Both Ways

This week, the Chinese government made an official demand for an explanation to the US government regarding a number of alleged hacks against Chinese public and private targets, including research institutions, government branches, ISPs, and energy providers among others. In this briefing, we will take a look at what happened ...

todayFebruary 12, 2020

close

News + Hackers Editor

The Changing Meaning of “A Hack”

What’s the point? Language is how we convey information. And by defining words to mean specific things, the narrative of stories can be controlled. In all human stories, “good” should win over “evil”. And the only differences between the stories are the definition of those words and their many proxies. ...

todayFebruary 12, 2020

close

Cyber security + Cybercrime + Global news + News + Security + Hackers Editor

YouTube Moves to Prohibit Hacking Videos

Alphabet Inc. owned video streaming platform YouTube updated its content policy to explicitly prohibit the sharing of instructional hacking and phishing videos. In this briefing we will take a look at these changes, the initial impact, and the expected long term implications from such actions. What happened? YouTube made an ...

todayFebruary 12, 2020

  • 1
close

Cybercrime + Global news + Data Breach + Hackers Editor

NASA Breach Follow Up

Last year’s breach of NASA’s Jet Propulsion Laboratory (JPL) networks led to a thorough audit. The final report of the audit was released to the public this week. While it contains many important details on network separation, incident response and other areas of unpreparedness, in this briefing we will focus ...

todayFebruary 12, 2020

  • 3
close

Cyber security + Cybercrime + Global news + Hackers Editor

When Utilities Become Cyber Attack Casualties

Cyber attacks against individuals, governments, industrial targets and regular companies each come with their own set of risks, challenges and impacts. However one particular type of cyber attack target can cause widespread damage while usually being relatively weakly secured: Utility providers. In this briefing, we will discuss why utilities are ...