• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Jobs
  • Career
    • Cyber Security Training
    • Work from Home
    • Cyber Security Analyst
    • Remote Work – Six Ways to Keep Your Data Safe When Working Remotely
  • Field Guide
  • Newsletter Signup
  • Deals
  • News
AskCyberSecurity.com

AskCyberSecurity.com

Cyber Security News & Information

  • Home
  • Data Privacy
    • Gamers
    • Government Cyber Security
      • Legislation
      • Standards
        • What are the risks of computer security?
        • Medical Cyber Security
    • Social Media
  • Security
    • Data Breaches
    • Scams
    • Malware
  • Software
    • Apps
    • Web Browsers
  • Glossary
    • Cyber Security Acronyms
  • About Ask Cyber Security
    • Authors
    • Contact Us
  • VPN
    • How Do I Know If My VPN is Working?
    • Best Free VPN iPhone
    • Why Use a VPN?
    • NordVPN vs IPVanish
    • Private Internet Access Download
    • Best VPN for Streaming
      • TikTok VPN
    • VPN Porn
    • Computer Security Software – What You Really Need
  • Tutorials
  • ChatGPT
    • Does ChatGPT Save Data?
AskCyber Home » News » News » Cyber Security News Update 1/4/2019

Cyber Security News Update 1/4/2019

2019-01-04 by Max

Welcome to the first News Update of 2019, and Happy New Year! With the pleasantries out of the way, let’s move on to the first cases of cyber-misfortune happening.

Prominent hacktivist TheHackerGiraffe (THG) has removed himself from the public eye by deleting his social media accounts, portfolio, and even a server used in his hacks. THG is known for exposing security flaws in Internet of Things (IoT) devices such as printers and Google Chromecasts, where he used the hacked devices to advertise for a favorite YouTuber of his: PewDiePie. In a recording from Periscope, THG has stated that his repeated vandalism of people’s personal devices has drawn their ire, threats of physical violence or death, and potentially an investigation by the FBI. It seems that the consequences of THG’s actions finally hit home and he’s decided it’s time to withdraw for now. It’s important to remember that this sort of hacking may be considered illegal under US law, even if no vulnerable data has been taken or altered. Apparently, the stress has been so bad that THG has stated that he may never touch a computer again. Let this be a lesson then, be prepared for the consequences of your actions.
Source: Fearing backlash, IoT hacker ‘TheHackerGiraffe’ no longer sticking neck out for PewDiePie

A massive German data breach springing from an advent calendar has now involved prominent politicians and celebrities. While the specific scope of the breach remain unknown, the broad strokes of it have been revealed: every single political party in Germany, except for the far-right Alternative for Germany (AfD) party have had their financial data, private chats, and contact lists revealed. While the vector is currently unknown, it is believed that a phishing or spearphishing attack may have been used to gain access to passwords that were reused on other platforms such as social media accounts. An exploit of weakened email security protocols may have also lead to the breach, with the same result of passwords being used in multiple places. There is no confirmation on the attacker, though there is a significant amount of speculation, and the two top suspects are Russian groups such as Fancy Bear or an internal far-right group. Leaving the AfD untouched may be an attempt to draw attention to them, as they may fit the profile of an attacker. In 2015 Russia was accused of hacking servers used by the German Parliment, and in late 2018 the United States warned Germany that China was in the process of a wave of “cloud hopper” attacks. This attack has damaged the public’s confidence in data security, which may have been the goal all in of itself, as last year the German BSI had to report that APT28 (Fancy Bear) had managed to make their way into a highly secure data storage network. Cyber warfare has increasingly come to the front of every political conflict as it remains a way for state actors to strike without directly implicating their country. Intelligent cyber tactics allow countries to wage war without a physical shot being fired, and level the playing field for smaller or less militarized nations to strike.
Source: German politicians and other high profile citizens targeted in massive data breach

Filed Under: News

About Max

Max is a Data Privacy Coordinator at a major global law firm and a science fiction author residing in the Philadelphia area. He has been writing for https://www.askcybersecurity.com since early 2017.


LinkedInTwitterFacebook

Primary Sidebar

Subscribe to Our Free Newsletter

We Don't Share or Sell Your Info

Web Browsers

Where Are My Saved Passwords in Chrome?

Google Removes 70 Malicious Browser Add-ons from Chrome Web Store

Firefox 75 Reports Your Browser Settings to Mozilla

Categories

Cyber Security Field Guide

Computer Security While TravelingGet Our Cyber Security Field Guide - Available on Amazon!

Recent Posts

Security Marketing Manager – Remote

Sr. Associate, Cybersecurity Architect – Pfizer

Strategic Customer Success Manager – Cybersecurity – Opportunity for Working Remotely

Top 20 Passwords Leaked on Dark Web

ISU Cybersecurity Leader Job Opening

Cyber Security News

Top 20 Passwords Leaked on Dark Web

… [Read More...] about Top 20 Passwords Leaked on Dark Web

Apple Warns of Actively Exploited Zero-Day Flaw

… [Read More...] about Apple Warns of Actively Exploited Zero-Day Flaw

IRS Stops Facial Recognition System for Online Access

… [Read More...] about IRS Stops Facial Recognition System for Online Access

National Cybersecurity Alliance Announces Data Privacy Week

… [Read More...] about National Cybersecurity Alliance Announces Data Privacy Week

More Cyber Security News

Tags

amazon Android Apple bitcoin China chrome CISA credit card DarkSide DHS DOJ Equifax Europe Facebook facial recognition FBI Firefox FTC games GDPR Google Government hacker identity theft India iPhone Iran IRS LinkedIn Microsoft North Korea PayPal phishing phishing email ransomware REvil Russia smartphone T-Mobile TikTok tutorial VPN WhatsApp WiFi Windows

Government

CBP Looks to Access Airline Passenger Data

FTC Releases Cyber Threat Video Playlist

Malware Found on US Government Funded Phones

UK NCA Reaches Out to Youth to Deter Cybercrimes

More Posts from this Category

Footer

Menu

  • Home
  • About
  • Authors
  • Newsletter Signup
  • PRIVACY POLICY

Search

Why Use a VPN?

NordVPN vs IPVanish VPN Review

NAVIGATION

  • Data Breaches
  • Data Privacy
  • Gamers
  • Scams
  • Malware

MEMBER NJCCIC

New Jersey Cybersecurity & Communications Integration Cell

STAY CONNECTED

  • Facebook
  • Instagram
  • Pinterest
  • YouTube
  • Twitter
  • RSS

Copyright © 2023 · AskCyberSecurity.com · METRONY, LLC

Go to mobile version