Connect with us
Hackers stole data from the Pentagons defense contractor Hackers stole data from the Pentagons defense contractor

Security

Hackers stole data from the Pentagon’s defense contractor

Published

on

Hacking could potentially lead to the compromise of classified military data.

American Defense Enterprise Electronic Warfare Associates (EWA) reported about hacking your mail system and leaking files containing personal information.

The attacker seized control of one of the company’s email accounts on August 2, 2021, according to a statement filed by EWA with the Montana Attorney General’s Office. The hack was discovered when a hacker tried to implement a fraudulent scheme (according to the company, it was fraud that was his main goal).

“We have no reason to believe that the purpose of the hack was to obtain personal information. However, as a result of the attacker’s actions, some files with certain personal information were actually leaked,” the EWA said in a statement.

As shown by the investigation of the incident, the names and surnames, social security numbers and driver’s license data were compromised. The persons affected by the leak were notified accordingly. In addition, they are offered a free two-year subscription to Equifax’s identity theft protection service.

It is possible that the fraudulent attempt was only a distraction – a highly likely development of events for highly professional hackers attacking sensitive enterprises like EWA.

It is not known whether only the personal information of the employees was compromised, or the incident also affected the technical documentation.

EWA specializes in the production of high-tech defense hardware and software for communications, access control, simulation, exercise, control, testing and detection (radar) systems.

The users of these products include the US Department of Defense (Office of the Secretary of Defense, Army, Navy, Air Force, and DARPA), the Department of Justice and the Department of Homeland Security.

Hacking EWA e-mail could potentially lead to the compromise of classified military data, in particular about technologies being developed.

Click to comment

Leave a Reply

Your email address will not be published.

Security

Nvidia lost. LHR mining protection is also hacked under Linux. This was done by NBMiner developers

Published

on

Nvidia lost LHR mining protection is also hacked under

Two days have passed since the NiceHash developers cracked the Nvidia LHR protection, as the NBMiner team also pleased their users with the same news. Only this time we are talking about software for Linux.

Nvidia lost.  LHR mining protection is also hacked under Linux.  This was done by NBMiner developers

Thus, Nvidia’s protection completely fell for both Windows and Linux. Unfortunately, both programs are closed source, so it’s not clear what mechanisms the developers used to hack.

Whether the loss of Nvidia will affect the availability and prices of video cards is still difficult to say. At the moment, the cryptocurrency market continues to fall, but sooner or later it will turn around, and gamers may again face shortages and overpriced graphics cards.

Continue Reading

Security

Xiaomi has released a profitable set of security camera and smart door locksmart door lock

Published

on

Xiaomi has released a profitable set of security camera and

Xiaomi has introduced a new kit with an outdoor video surveillance camera and a smart door lock, which includes Mi Outdoor camera and Mi Smart Door Lock 1S.

The bundle is priced at around $237, which is a great deal as these devices cost $20 more individually.

Mi Smart Door Lock 1S supports 7 unlocking methods, including fingerprint, password, temporary password, Bluetooth, HomeKit, NFC or regular key unlock. Compared to the first generation, the new lock supports both the Mijia app and Apple HomeKit.

Xiaomi has released a profitable set of security camera and

As for the rechargeable version of Xiaomi Outdoor Camera, this is Xiaomi’s first outdoor wireless camera. It has an independent design and can be installed without connecting the mains cable or power cable. It has a wide viewing angle of 130°, 1080p resolution and supports WDR technology.

In addition, the battery version of the Xiaomi Outdoor Camera offers night vision up to 7 meters and people detection function. It is IP65 rated and has a long battery life of up to 90 days.

Continue Reading

Security

“These are machines for sucking out personal data.” Prayer and mental health apps have poor security

Published

on

These are machines for sucking out personal data Prayer and

Mental health apps have worse privacy protection than most other types of apps, according to a new analysis by Mozilla. We are talking about the entire category as a whole. In addition, things are also bad for prayer applications.

“These are machines for sucking out personal data.”  Prayer and mental health apps have poor security

The vast majority of mental health and prayer apps are exceptionally creepy. They track a variety of data, share and capitalize on users’ most intimate personal thoughts and feelings, such as mood, mental state, and biometric data.

The team analyzed 32 mental health and prayer apps. Of these apps, 29 received a Privacy not included warning, indicating that the team is concerned about how the app manages user data.

These applications collect large amounts of personal data in accordance with vague privacy policies. Most applications have also been found to have poor security practices that allow users to create accounts with weak passwords. Considering how much personal information such programs can contain, this is a bad feature.

The list of the worst programs according to the specified criteria included Better Help, Youper, Woebot, Better Stop Suicide, Pray.com and Talkspace. In particular, the Woebot chatbot claims to collect information about users and shares this data for advertising purposes, and Talkspace collects transcripts of user chats.

They work like data-sucking machines with the look and feel of a mental health app. In other words: wolves in sheep’s clothing

Continue Reading

Most Popular