One of the two main hackers of the infamous Syrian Electronic Army , only known as "Th3 Pr0," was browsing Twitter on Thursday night, when he saw something he didn't like. It was a CNN story on a recent report that alleged Bashar al-Assad's regime is guilty of "systematic torture and killing" of thousands of detainees. After reading the article, Th3 Pr0 sent a chat message to another prominent member of the Syrian Electronic Army at 10:26 p.m. Syria time (3:26 p.m. ET) See also: Syrian Electronic Army: If U.S. Attacks 'We Will Target All of It' "Let's hack the CNN and spread some truth," Th3 Pr0 said he told fellow hacker "The Shadow." That's when the Syrian Electronic Army's operation to hack CNN began. A little bit more than three hours later at 1:48 a.m. Syria time, the two hackers sent their first fake tweet from CNN's official Twitter account, which boasts more than 11.5 million followers. That was soon followed by more fake tweets, some published from other … [Read more...] about Inside the Syrian Electronic Army Hack on CNN
How do you change your email password
How the Syrian Electronic Army Hacked ‘The Onion’
We all thought it was a joke, but it wasn't. The Onion really got hacked on Monday , and it was indeed victim of the Syrian Electronic Army (SAE), the pro-Assad group of "hacktivists" who have been hacking media companies left and right . In an unusually serious blog post , the satirical website's tech team recounts step by step how it got hacked. Everything began in much the same way the vast majority of these hacks start: with a phishing email, an attempt to get an employee to click on a malicious link. In this case, the link appeared to lead to a Washington Post story, but it actually redirected to another web address, which directed to yet another fake site that asked for Google Apps credentials. Even though "these emails were sent from strange, outside addresses, and they were sent to few enough employees to appear as just random noise rather than a targeted attack," reads the post, "At least one Onion employee fell for this phase of the phishing attack." … [Read more...] about How the Syrian Electronic Army Hacked ‘The Onion’
Syrian Electronic Army Finds Third-Party Doorway to NYT, Twitter in Phishing Attack
The Syrian Electronic Army , a mysterious pro-Assad hacker group, struck again Tuesday afternoon, taking control of The New York Times and Twitter Internet domains, among others. The Syrian hackers compromised these high-profile websites by targeting the domain name registrar Melbourne IT, an Australian company that sells website addresses such as Mashable.com. The hackers didn't use sophisticated hacking techniques or malware to carry out their attack, all they needed was their usual weapon of choice: a phishing attack. See also: What Is the Syrian Electronic Army? "A targeted phishing attack was used to gain access to the credentials of users of a Melbourne IT reseller account," wrote Bruce Tonkin, Melbourne IT's Chief Technology officer, in an email to Mashable . "We have obtained a copy of the phishing email and have notified the recipients of the phishing email to update their passwords. We have also temporarily suspended access to affected user accounts until … [Read more...] about Syrian Electronic Army Finds Third-Party Doorway to NYT, Twitter in Phishing Attack
Dispelling the myths around passwordless authentication
When it comes to password managers , the humble combination of a username and password has secured our access to information since the start of IT. Although this model is still largely the norm, a paradigm shift is on the horizon as new passwordless solutions and technologies gain in popularity, such as biometrics, laying the foundation for a more secure standard for accessing information in the digital world. About the author Philip Black is Commercial Director at Nomidio . Yet, while a combination of passwordless authentication and biometrics could transform digital authentication and security , misconceptions about privacy breaches, accuracy levels and security risks may hinder widespread adoption. This article will debunk some of the most common myths associated with passwordless authentication and biometrics, as well as the improvements that need to be made to the current passwordless model. Myth: “Going passwordless is less secure” Reality : There is … [Read more...] about Dispelling the myths around passwordless authentication