• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Jobs
  • Career
    • Cyber Security Training
    • Work from Home
    • Cyber Security Analyst
    • Remote Work – Six Ways to Keep Your Data Safe When Working Remotely
  • Field Guide
  • Newsletter Signup
  • Deals
  • News
AskCyberSecurity.com

AskCyberSecurity.com

Cyber Security News & Information

  • Home
  • Data Privacy
    • Gamers
    • Government Cyber Security
      • Legislation
      • Standards
        • What are the risks of computer security?
        • Medical Cyber Security
    • Social Media
  • Security
    • Data Breaches
    • Scams
      • Identity theft
    • Malware
      • Ransomware
  • Software
    • Apps
    • Web Browsers
  • Glossary
    • Cyber Security Acronyms
  • About Ask Cyber Security
    • Authors
    • Contact Us
  • VPN
    • How Do I Know If My VPN is Working?
    • Best Free VPN iPhone
    • Why Use a VPN?
    • NordVPN vs IPVanish
    • Private Internet Access Download
    • Best VPN for Streaming
      • TikTok VPN
    • VPN Porn
    • Computer Security Software – What You Really Need
  • Tutorials
AskCyber Home » News » News » Cyber Security News Update 1/4/2019

Cyber Security News Update 1/4/2019

2019-01-04 by Max

Welcome to the first News Update of 2019, and Happy New Year! With the pleasantries out of the way, let’s move on to the first cases of cyber-misfortune happening.

Prominent hacktivist TheHackerGiraffe (THG) has removed himself from the public eye by deleting his social media accounts, portfolio, and even a server used in his hacks. THG is known for exposing security flaws in Internet of Things (IoT) devices such as printers and Google Chromecasts, where he used the hacked devices to advertise for a favorite YouTuber of his: PewDiePie. In a recording from Periscope, THG has stated that his repeated vandalism of people’s personal devices has drawn their ire, threats of physical violence or death, and potentially an investigation by the FBI. It seems that the consequences of THG’s actions finally hit home and he’s decided it’s time to withdraw for now. It’s important to remember that this sort of hacking may be considered illegal under US law, even if no vulnerable data has been taken or altered. Apparently, the stress has been so bad that THG has stated that he may never touch a computer again. Let this be a lesson then, be prepared for the consequences of your actions.
Source: Fearing backlash, IoT hacker ‘TheHackerGiraffe’ no longer sticking neck out for PewDiePie

A massive German data breach springing from an advent calendar has now involved prominent politicians and celebrities. While the specific scope of the breach remain unknown, the broad strokes of it have been revealed: every single political party in Germany, except for the far-right Alternative for Germany (AfD) party have had their financial data, private chats, and contact lists revealed. While the vector is currently unknown, it is believed that a phishing or spearphishing attack may have been used to gain access to passwords that were reused on other platforms such as social media accounts. An exploit of weakened email security protocols may have also lead to the breach, with the same result of passwords being used in multiple places. There is no confirmation on the attacker, though there is a significant amount of speculation, and the two top suspects are Russian groups such as Fancy Bear or an internal far-right group. Leaving the AfD untouched may be an attempt to draw attention to them, as they may fit the profile of an attacker. In 2015 Russia was accused of hacking servers used by the German Parliment, and in late 2018 the United States warned Germany that China was in the process of a wave of “cloud hopper” attacks. This attack has damaged the public’s confidence in data security, which may have been the goal all in of itself, as last year the German BSI had to report that APT28 (Fancy Bear) had managed to make their way into a highly secure data storage network. Cyber warfare has increasingly come to the front of every political conflict as it remains a way for state actors to strike without directly implicating their country. Intelligent cyber tactics allow countries to wage war without a physical shot being fired, and level the playing field for smaller or less militarized nations to strike.
Source: German politicians and other high profile citizens targeted in massive data breach

Filed Under: News

About Max

Max is a Data Privacy Coordinator at a major global law firm and a science fiction author residing in the Philadelphia area. He has been writing for https://www.askcybersecurity.com since early 2017.


LinkedInTwitterFacebook

Primary Sidebar

Subscribe to Our Free Newsletter

We Don't Share or Sell Your Info

Web Browsers

Where Are My Saved Passwords in Chrome?

Google Removes 70 Malicious Browser Add-ons from Chrome Web Store

Firefox 75 Reports Your Browser Settings to Mozilla

511 Tactical

WHAT TO SHOP NOW

Shop

Safeguard Your Money with a VPN

Beat the Stock Market! - Get Rule Breakers!

Malwarebytes Anti-Virus is On Sale!

Shop Kaspersky Anti-Virus

Cyber Security Field Guide

Computer Security While TravelingGet Our Cyber Security Field Guide - Available on Amazon!

Recent Posts

Adult Video Streaming Site Data Breach Exposes 2M Customers

Fake eBay Notification Scam Steals Big Money

Principal Security Consultant – AWS

NJCCIC Announces Alice in Cyberspace 2021

Email Service Cuts Off Gun Rights Nonprofit

Categories

Cyber Security News

Fake eBay Notification Scam Steals Big Money

… [Read More...] about Fake eBay Notification Scam Steals Big Money

NJCCIC Announces Alice in Cyberspace 2021

… [Read More...] about NJCCIC Announces Alice in Cyberspace 2021

PayPal Phishing Scam Steals Accounts

… [Read More...] about PayPal Phishing Scam Steals Accounts

Gun Forum Booted by Domain Registrar

… [Read More...] about Gun Forum Booted by Domain Registrar

More Cyber Security News

Tags

amazon Android Apple bitcoin Career China chrome CISA credit card Cyber Attack Cyber security Data Breach data privacy DHS Equifax Facebook FBI Firefox FTC games GDPR Google Government hack hacker identity theft iPhone Iran IRS malware Microsoft North Korea PayPal phishing phishing email ransomware Russia scam smartphone TikTok tutorial VPN web browser WhatsApp WiFi

Government

FTC Releases Cyber Threat Video Playlist

Malware Found on US Government Funded Phones

UK NCA Reaches Out to Youth to Deter Cybercrimes

Texas DOT Hit by Ransomware Attack

More Posts from this Category

Footer

Menu

  • Home
  • About
  • Authors
  • News
  • Newsletter Signup
  • PRIVACY POLICY

Search

Why Use a VPN?

NordVPN vs IPVanish VPN Review

NAVIGATION

  • Data Breaches
  • Data Privacy
  • Gamers
  • Scams
  • Malware

MEMBER NJCCIC

New Jersey Cybersecurity & Communications Integration Cell

STAY CONNECTED

  • Facebook
  • Instagram
  • Pinterest
  • YouTube
  • Twitter
  • RSS

Copyright © 2021 · AskCyberSecurity.com · METRONY, LLC

Go to mobile version