"A Hacker Got All My Texts For $16"
An anonymous reader quotes a report from Motherboard, written by Joseph Cox: I didn't expect it to be that quick. While I was on a Google Hangouts call with a colleague, the hacker sent me screenshots of my Bumble and Postmates accounts, which he had.....»»
Crypto hacker offered reward after $600m heist
The anonymous hacker has returned almost all the money, but claims not to be interested in reward......»»
An anonymous hacker stole $600 million in cryptocurrency, then gave it back
An anonymous hacker who stole more than $600 million from the decentralized finance platform Poly Network this week has returned virtually all of the money — and apparently turned down a half-million-dollar reward offered by the company for exposin.....»»
Hacker is returning $600M in crypto, claiming theft was just “for fun”
Hacker was holding onto the stolen funds to "keep it safe." Enlarge (credit: Yuriko Nakao | Getty Images) The hacker who breached the Poly Network crypto platform says the theft was just "for fun :)” and that the hacker is now returning the.....»»
Hacker who stole $611M in crypto assets has started to return it
PolyNetwork is a cross-chain protocol resulting from a partnership between Neo, Ontology, and Switcheo, where users can swap crypto tokens across numerous blockchains, including Bitcoin, Ethereum, and Ontology. While useful, it also makes it a big ta.....»»
Cryptocurrency heist hacker returns $260m in funds
The hacker behind the $600m Poly Network cryptocurrency heist has posted a Q&A on the blockchain......»»
Cross-Chain DeFi Site Poly Network Hacked; Hundreds of Millions Potentially Lost
Cross-chain decentralized finance (DeFi) platform Poly Network was attacked on Tuesday, with the alleged hacker draining roughly $600 million in crypto. From a report: Poly Network, a protocol launched by the founder of Chinese blockchain project Neo.....»»
Disgruntled Member of "Conti" Ransomware Gang Leaks Files
"Someone claiming to work with one of the most notorious ransomware gangs says they're fed up with how extortion money is divvied up and has leaked a host of the gang's files on a hacker forum," reports NBC News: The files, posted to a forum frequen.....»»
How Ward van Gasteren thinks about growth hacking today
Ward van Gasteren embraces the “growth hacker” term, despite the fact that some in the profession prefer the term “growth marketing” or simply “growth.” What’s the difference to him? The hacking part should be a distinct effort on top o.....»»
Which person should you hire: A growth hacker or a digital marketer?
"Growth hacking is great to kickstart growth, test new opportunities and see what tactics work. Marketeers should be there to continue where the growth hackers left off." Ward van Gasteren embraces the “growth hacker” term, despite the.....»»
Hackers Shut Down System For Booking COVID-19 Shots in Italy"s Lazio Region
Hackers have attacked and shut down the IT systems of the company that manages COVID-19 vaccination appointments for the Lazio region surrounding Rome, the regional government said on Sunday. From a report: "A powerful hacker attack on the region's C.....»»
New Android Malware Uses VNC To Spy and Steal Passwords From Victims
A previously undocumented Android-based remote access trojan (RAT) has been found to use screen recording features to steal sensitive information on the device, including banking credentials, and open the door for on-device fraud. The Hacker News rep.....»»
Estonia Says a Hacker Downloaded 286,000 ID Photos From Government Database
Estonian officials said they arrested last week a local suspect who used a vulnerability to gain access to a government database and downloaded government ID photos for 286,438 Estonians. From a report: The attack took place earlier this month, and t.....»»
Biden Administration says China is the culprit behind Microsoft Exchange cyberattacks
In early March, Microsoft Exchange vulnerabilities had given unwanted access to over 30,000 government and commercial organizations in the US. These vulnerabilities were exploited by "at least 10 hacker groups," allowing them to control servers remot.....»»
India’s plan to end spam texts was a colossal failure. But it’s worth revisiting
Early this year, India rolled out a groundbreaking new plan to fight spam calls and texts. Unfortunately, it failed miserably -- but it still has potential......»»
The FBI’s honeypot Pixel 4a gets detailed in new report
FBI honeypot phones are now public—and showing up on the secondary market. The Anom login screen, which was hidden in the calculator app. Note the cool "hacker"-style logo......»»
DOJ files 7 new charges against alleged Capital One hacker
The U.S. Department of Justice (DOJ) has filed seven new charges against Paige Thompson, the former Amazon Web Services (AWS) engineer accused of hacking Capital One and stealing the personal data of more than 100 million Americans. The new charges,.....»»
New Charges Filed Against Capital One Hacker, Trial Postponed To 2022
The US government has filed a superseding indictment against Paige A. Thompson, a former Amazon engineer accused of hacking Capital One and stealing the personal data of more than 100 million Americans. From a report: According to court documents fil.....»»
Alleged Capital One hacker faces 20 years in prison for stealing 100 million customers" data
The US Justice Department has filed additional charges against the hacker accused of illegally accessing more than 100 million Capital One customers' accounts and credit card applications in 2019......»»
SolarWinds hackers breach new victims, including a Microsoft support agent
Discovery came as Microsoft was investigating new breaches by the same hacker group. Enlarge (credit: Getty Images) The nation-state hackers who orchestrated the SolarWinds supply chain attack compromised a Microsoft worker’s computer and us.....»»
Report: Hackers Breached More US Water Treatment Plants
"On January 15, a hacker tried to poison a water treatment plant that served parts of the San Francisco Bay Area," reports NBC News: It didn't seem hard. The hacker had the username and password for a former employee's TeamViewer account, a popular.....»»