the future: the latest about the next few months.
Avoid Online Shopping Scams and Fake Deals Black Friday (ZeroFOX) While this Black Friday may look different this year, some things never change: an increase in online shopping and online shopping scams.
Cyber Risk & Record Web Traffic May Disrupt 2020 Holiday Shopping (Company) Imperva® report details the array of complex cyber attacks targeting online retailers
The State of Security within e-Commerce (Resource Library) 2020 is a year unlike any other. Among the many effects of the global pandemic is the significant increase in online retail business. Throughout the year, Imper
()
Cyber Attacks, Threats, and Vulnerabilities
WordPress Malware Setting Up SEO Shops (Akamai) While recently looking over my honeypots, I discovered an infection where a malicious actor added a storefront on top of my existing WordPress installation. For background, this particular honeypot is a full instance of WordPress running on a Docker image....
Egregor ransomware attack hijacks printers to spit out ransom notes (The State of Security) Cencosud was infected by an Egregor ransomware attack that stole sensitive files and encrypted data, locking workers out.
Chinese Hackers Target Japanese Organizations in Large-Scale Campaign (SecurityWeek) China-linked threat actor APT10 was observed launching a large-scale campaign against Japanese organizations and their subsidiaries.
Chinese APT10 hackers use Zerologon exploits against Japanese orgs (BleepingComputer) A Chinese state-sponsored hacking group has been observed while attempting to exploit the Windows Zerologon vulnerability in attacks against Japanese companies and subsidiaries from multiple industry sectors in 17 regions around the globe.
Hacking group exploits ZeroLogon in automotive, industrial attack wave (ZDNet) A massive campaign is underway around the globe, with automotive, pharmaceutical and engineering entities top targets.
Chinese Hackers Exploit Zerologon Flaw for Cyberespionage (BankInfo Security) The Chinese hacking group "Cicada" is exploiting the critical Zerologon vulnerability in Windows Server as part of a cyberespionage campaign that’s
Japan-Linked Organizations Targeted in Long-Running and Sophisticated Attack Campaign (Symantec) Evidence that advanced persistent threat group Cicada is behind attack campaign targeting companies in 17 regions and multiple sectors.
()
GO SMS Pro Vulnerable to Media File Theft (Trustwave) The GO SMS Pro application is a popular messenger app with over 100 million downloads and was discovered to publicly expose media transferred between users of the app. This exposure includes private voice messages, video messages, and photos. This means any sensitive media shared between users of this messenger app is at risk of being compromised by an unauthenticated attacker or curious user.
Election misinformation often evaded YouTube’s efforts to stop it. (New York Times) A research project that has been studying misinformation on the site said 34 percent of videos it studied spread false election claims.
The Issue & Impact of Malspam in the U.S. Elections (Radware Blog) Malspam campaigns and their related botnets were a potential major threat for the election process in the United States this year.
Report: Popular Christian Faith App Exposes Millions of People to Fraud and Online Attack (vpnMentor) Led by Noam Rotem and Ran Locar, vpnMentor’s research team discovered a data breach originating from the Christian faith app Pray.com.
Robot Vacuums Suck Up Sensitive Audio in ‘LidarPhone’ Hack (Threatpost) Researchers have unveiled an attack that allows attackers to eavesdrop on homeowners inside their homes, through the LiDAR sensors on their robot vacuums.
Spying with Your Robot Vacuum Cleaner: Eavesdropping via Lidar Sensors (University of Maryland) Eavesdropping on private conversations is one of the most common yet detrimental threats to privacy
Mitsubishi Electric MELSEC iQ-R Series (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 7.5
ATTENTION: Exploitable remotely/low skill to exploit
Vendor: Mitsubishi Electric
Equipment: MELSEC iQ-R series
Vulnerability: Uncontrolled Resource Consumption
2. RISK EVALUATION
Successful exploitation of this vulnerability could cause a denial-of-service condition for the affected product.
Luxottica Data Leaked by Hackers After Ransomware Attack, Breach (HealthITSecurity) Nefilim ransomware hackers posted data allegedly stolen from Luxottica, which recently revealed a patient data breach affected 829,454 patients. The notice didn't disclose an earlier ransomware attack
Fredericton experiencing uptick in cyberattack attempts (CBC) The City of Fredericton’s chief information officer said logs show a significant increase in attempts to attack the city's computer system, mirroring a trend around the province. Some types of attempts have increased by 10 times the typical amount.
()
Italian classification society repels cyber attack (Lloyd's List) <p>‘Rina’s IT department managed to repel subsequent attacks and immediately took the necessary countermeasures to contain their effects,’ the Italian classification society said</p>
Derby’s Griffin Hospital website taken down in major ransomware incident (StamfordAdvocate) Griffin Hospital confirmed that the company which runs its websites is dealing with a ransomware attack, but believes that no patient information has been exposed.
Keene, N.H., Officials Urge Vigilance After Data Breach (Government Technology) City officials are asking the public to monitor their financial information after unauthorized access to a database was discovered. As many as 5,525 individuals could have been affected.
Why You Should Care About the Tracks Left By Your Digital Footprint (MakeUseOf) You leave a lot of information online without even knowing it. Is this digital footprint a risk to your privacy?
Security Patches, Mitigations, and Software Updates
Microsoft rolls out protection for critical accounts in Office 365 (BleepingComputer) Microsoft has launched Office 365 priority protection for accounts of high-profile employees such as executive-level managers who are most often targeted by threat actors.
Remote Code Execution Vulnerability Patched in Drupal (SecurityWeek) Drupal updates released on Wednesday patch a critical remote code execution vulnerability that exists due to Drupal failing to properly sanitize the names of uploaded files
Google Launches Strong Encryption for Android Messages (SecurityWeek) Google is rolling out End-to-end encryption to ensure that no one, including Google and third parties, can read the content of Android messages
Google Asks Chrome Extensions to Post Privacy Policies (SecurityWeek) Google this week announced an update to its Chrome store policies that requires all extensions to be explicit about the collection and use of user data
Cyber Trends
Council Post: Rising Bug Bounties Underscore The Urgency Of Strong Cybersecurity Personnel (Forbes) Ethical hackers are now a valuable and welcome part of the cybersecurity battlefield — it takes a hacker to catch a hacker.
Cybersecurity Workforce Study Needs to be Taken with a Pinch of Salt (SecurityWeek) While the ISC2 figures show the workforce gap narrowing slightly, we cannot assume from this that the cybersecurity skills gap is narrowing.
Business interruption drives 60% of cyber losses: Allianz (Business Insurance) Business interruption losses accounted for 60% of cyber insurance claims in the past five years, according to a report published Thursday by Allianz Global Corporate & Specialty SE.
Remote workers are 'self-sabotaging' their online security (ITProPortal) We wouldn't leave our front door open, so why are we treating our computers differently?
U.S. Oil, NatGas Sector Increasingly Concerned about Cybersecurity Attacks from Foreign Nations (Natural Gas Intelligence) As the United States has become the world’s largest producer of oil and natural gas, cybersecurity concerns in the sector have shifted from primarily
Marketplace
Ubiq Closes $6.4 Million Seed Round to Grow API Encryption Platform (Ubiq) Ubiq Security, a developer-focused security startup, today announced it has raised $6.4 million in a seed equity investment round.
E-Commerce Fraud Prevention Firm Forter Raises $125M at $1.3B Valuation (SecurityWeek) E-commerce fraud prevention company Forter has achieved “unicorn” status after raising $125 million in a Series E funding round.
FireEye Announces $400 Million Strategic Investment Led by Blackstone | FireEye (FireEye) Investment Supports Vision to Create Industry’s Leading Intelligence-led Cyber Security Platform and Services Company
Respond Software Joins the FireEye Team (FireEye) Respond Software joins the FireEye team, bringing an AI Based Cloud native XDR Engine that automates the investigation of security alerts at machine speed.
Telos Corporation Announces Pricing of Upsized $254 Million Initial Public Offering (GlobeNewswire) Telos® Corporation (“Telos”), a leading provider of cyber, cloud and enterprise security solutions for the world’s most security-conscious organizations, announced today the upsizing and pricing of its previously announced initial public offering of 14,968,859 shares of common stock at a price of $17.00 per share (the “Offering”).
Palo Alto Networks Spends Another $800 Million to Keep Pace With a Fast-Changing Cybersecurity Industry (The Motley Fool) So far, Palo Alto Network's acquisition-happy strategy has helped it pace a fast-changing industry.
Experian Acquires Tapad, a Leading Digital Identity Resolution Provider (Odessa American) Experian, the global information services company, today announces that it has completed the acquisition of Tapad – a leading provider in digital identity resolution for marketers that helps to connect brands to consumers, primarily in the United States.
Near Acquires Location Intelligence Platform Teemo (PR Newswire) Near, the world's largest source of intelligence on people and places, today announced it is acquiring Paris-based location intelligence...
Facebook offers up first-ever estimate of hate speech prevalence on its platform (Reuters) Facebook Inc for the first time on Thursday disclosed numbers on the prevalence of hate speech on its platform, saying that out of every 10,000 content views in the third quarter, 10 to 11 included hate speech.
IBM plans to axe 8,000 jobs across Europe (Computing) About 2,000 jobs will be cut in the UK and Ireland
Recorded Future Ranked Among Fastest-Growing Companies in North America on Deloitte's 2020 Technology Fast 500™ (PR Newswire) Recorded Future, the largest security intelligence provider, today announced it ranked 269 on Deloitte's Technology Fast 500™, a ranking of the...
CyberArk Named a Privileged Identity Management Leader (CyberArk) There’s never been a better time to be a cyber attacker. The mobile, cloud and digital world is opening new doors and pathways to organizations’ most valuable assets. Stopping every attack is now...
TrueFort Wins 2020 Red Herring Top 100 North America Award (BusinessWire) TrueFort's application-centric approach to protecting businesses and their critical data from cyber threats clearly resonated with the judges.
Lisa Young Joins Board of Directors of Leading Cybersecurity Professional Organization (Yahoo) Lisa Young, Vice President of Cyber Risk Engineering for Axio, a leading cyber risk management Software-as-a-Service company, today announced the appointment to the Board of Directors for (ISC)², the world’s largest nonprofit association of certified cybersecurity professionals.
Sue Gordon Gets INSA Intell, Security Leadership Recognition (ExecutiveBiz) Sue Gordon, a board member at CACI International and a two-time Wash100 awardee, has been selected a
Zimperium Names Proven Finance and Operations Leader, Brian Szeto, Chief Financial Officer (BusinessWire) Zimperium, the global leader in mobile device and app security, today announced that Brian Szeto has joined the company as Chief Financial Officer.
Products, Services, and Solutions
Cloud Security Alliance Opens Registration for CloudBytes Connect: From the SOC to the Boardroom (Yahoo) Registration has opened for CSA's upcoming CloudBytes Connect virtual symposium, "From the SOC to the Boardroom," taking place Feb. 2-4, 2021.
Cloud Security Alliance, Tiro Security Partner to Offer Complimentary Cloud Certification Exam to Cybersecurity Women, Minorities in nextCISO Program (AiThority) The Cloud Security Alliance (CSA), help ensure a secure cloud computing environment, announced that it has partnered with Tiro Security
GitLab Completes Integration of Fuzzing Solutions to Bolster DevSecOps Capabilities (GlobeNewswire) Implementation of Peach Tech and Fuzzit enable customers to shift left and find vulnerabilities that traditional testing and quality assurance technique may miss
DLT Solutions Bolsters Hybrid Cloud, AI, Security and Other Software Offerings for the U.S. Public Sector with IBM Solutions (PR Newswire) DLT Solutions, LLC., a wholly owned subsidiary of Tech Data and a premier government technology solutions aggregator, is working with IBM to...
Fintech investors say ‘yes’ to novel tech helping breach victims fight back (Agility PR Solutions Newsroom) VentureTech participants select Breach Clarity platform as Best in Show
Businesses at Risk of Data-Breach Fines Due to User Error (BusinessWire) Widespread employee confusion around new data protection regulations could be placing businesses at risk of hefty fines and reputational damage. Quest
PiiQ Media Launches Contextualized Spear Phishing Training Solution (Tullahoma News) PiiQ Media is excited to announce the next evolution in human layer social engineering risk remediation and advanced security training simulations:PQ-SPEAR.
Honeywell and Nozomi Networks Announce Partnership to Significantly Strengthen Operational Technology Cybersecurity (Nozomi Networks) Offering includes security solutions from Honeywell Forge Cybersecurity and Nozomi to deliver industry’s most comprehensive vendor-neutral cybersecurity portfolio to better protect OT environments, detect threats and reduce cyber risk.
CyberKnights Partners with CompTIA in Support of Cybersecurity Talent Assessment, Development, and Retention (Shelby News) CyberKnights, a product of Rofori Corporation, is a portal for cyber practitioners, employers, academia, and training providers. It promotes and facilitates cybersecurity talent assessment,
Palantir Enters Mission Command Space With US Army Futures Command Prototype (Odessa American) Palantir Technologies (NYSE:PLTR) announced today it was chosen by the US Army to receive one of two prototype contracts for the Common Data Fabric and Data Security solution to support network design experimentation for the Army’s next network modernization set of technology, termed Capability Set 23.
New Partnership Aims to Put Breach Mitigation in CU Members’ Hands (Credit Union Times) Sontiq teams up exclusively with Breach Clarity to deliver personalized data breach risk management tools.
Palo Alto Networks launches 5G-native security solutions (Back End News) Palo Alto Networks today introduced the industry’s first 5G-native security offering, bringing its expertise in securing networks, clouds and devices to the 5G world. This new offering enables serv…
Pindrop Helps Avaya Customers Verify Legitimate Callers and Detect Fraud (StreetInsider.com) Pindrop® Passport and Pindrop® Protect Products now rated “Avaya Compliant,” compatible with Avaya OneCloud™ CCaaS solutions
Privacy In The Age Of Pandemic (Avast) Avast Chief Privacy Officer Shane McNamee discuss the various steps that Avast has taken during 2020 in support of privacy and data protection.
Healix Sentinel enables businesses to get people moving again (ITCM - Incentive Travel & Corporate Meetings) Integrated range of security and risk management solutions gives risk managers peace of mind for international operations...
Microsoft Announces Pluton Security Processor for Windows PCs (MSSP Alert) Microsoft introduces the Pluto Windows PC security processor, which uses root-of-trust technology to protect credentials, encryption keys & personal data.
Microsoft gives Linux a security boost with these new attack detection tools (TechRepublic) Linux endpoint detection and response will help Microsoft Defender customers secure Linux servers and networks against security nasties.
Anexinet Enhances Its Cybersecurity Offering With Alert Logic Managed Detection and Response (GlobeNewswire) AI-Powered MDR Solution Strengthens Cyber Threat Detection and Resolution
New infosec products of the week: November 20, 2020 (Help Net Security) The featured infosec products this week come from the following vendors: Qualys, Sysdig, Trilio, Amazon Web Services, and Zyxel.
Technologies, Techniques, and Standards
Data Protection and Brexit: Key Areas to Consider (cyber/data/privacy insights) For better or for worse: 2020 is shortly coming to an end. This means that the end of the Brexit transition period is also just around the corner.
Background
On December 31, 2020, the post-Brexit transitional arrangements between the EU and the UK will expire. However, the EU GDPR will be reta
35 stats that matter to your Security Operations team (TechBeacon) A constantly changing threat environment and risks posed by remote workers took the crown. Here are the SecOps stats your team should be tracking.
()
Why Do Zero Day Security Technologies Fail to Protect Against Zero Day Attacks? (Security Boulevard) Today's security technologies fail to detect true zero day attacks, K2 has a video that explains why these security technologies fail to protect against zero day attacks and the need for deterministic security. The post Why Do Zero Day Security Technologies Fail to Protect Against Zero Day Attacks? appeared first on K2io.
Why SIEMs need threat intelligence to defeat Cyberthreats (Blueliv) Security professionals the world over crave compliance management and the ability to pull deep insights from their complex IT environments.
How the FBI and Siemens Demonstrate the Need for Automation (Electro Pages) Why is automation becoming more popular, how can predictive algorithms improve workflow, and what do the FBI and Siemens announcements represent?
Design and Innovation
This free online game claims to "inoculate" you against disinformation by teaching you how it works (Boing Boing) Harmony Square is a “game about fake news.” As the player, you take on the role of the town’s Chief Disinformation Officer, and it’s your job to sow dissent and stoke the te…
Facebook says AI has fueled a hate speech crackdown (The Verge) But AI improvements still can’t take humans out of the loop.
Facebook defends decision to bring content moderators back to offices despite Covid-19 risks (CNBC) Facebook executives defend the company's decision to bring some content moderators back into offices in the midst of the coronavirus pandemic.
Bad First Impressions Drive One-Third of Consumers to Delete Apps (BusinessWire) ForgeRock released volume two of its global report, “The New Normal – Living Life Online,” detailing consumer preferences for online experiences
Moving to a passwordless experience: Identity in the age of Covid (Computing) Emma Maslen, Vice President and General Manager for EMEA and APAC, Ping Identity, discuss how the pandemic is changing security needs and authentication strategies, and her experiences changing companies during the global health crisis
Research and Development
When AI Sees a Man, It Thinks 'Official.' A Woman? 'Smile' (Wired) A new paper renews concerns about bias in image recognition services offered by Google, Microsoft, and Amazon.
Academia
Almost 100% of Higher Ed CIOs Surveyed Agree That Automation Is Required to Ensure Compliance and IAM Best Practices (BusinessWire) Almost 100% of higher ed CIOs surveyed agree that automation is required to ensure compliance and IAM best practices.
How to get an A+ in cybersecurity now that schools are back in session (Security Info Watch) Online learning presents a new set of challenges to parents and security professionals
UTSA officially launches Cybersecurity Manufacturing Innovation Institute (UTSA Today) UTSA today formally launched the Cybersecurity Manufacturing Innovation Institute (CyManII), a $111 million public-private partnership.
Kemp reveals expansion of student cyber workforce program (WRDW) Governor Brian P. Kemp announced the start of Georgia’s third year of partnership with the SANS Institute and National Cyber Scholarship Foundation to launch CyberStart America.
CyberStart America offering Montana high schoolers cybersecurity skills, scholarships (KHQ Right Now) Montana is pairing up with SANS Institute again, offering high schoolers the chance to learn cybersecurity skills and become eligible for the National Cyber Scholarship Competition.
Legislation, Policy, and Regulation
Exclusive: Vietnam threatens to shut down Facebook over censorship requests - source (Reuters) Vietnam has threatened to shut down Facebook in the country if it does not bow to government pressure to censor more local political content on its platform, a senior official at the U.S. social media giant told Reuters.
UAE views Israel as a strategic cybersecurity partner, says head of national cyber authority (CTECH) "Israel has the best talent in the field and we are working together in order to protect the digital space," said Mohammad Al Kuwaiti
Cyberspace regulation always evolving: Govt (DailyNews) INFORMATION Communication Technology (ICT) minister Jenfan Muswere says the government must always be abreast with the latest technology trends in order to fully regulate the cyberspace.
A Missing Piece in Japan’s Cyber Defense (Diplomat) The case for a government process handling “zero day” vulnerability disclosure in Japan.
Britain announces its largest military investment since the Cold War (Washington Post) Prime Minister Boris Johnson on Thursday announced Britain's biggest boost in military spending since the end of the Cold War, as the country looks to head off threats from China and Russia and exert "global influence" as a power separate from the European Union.
UK's National Cyber Force comes out of the shadows (BBC News) It will use offensive capabilities to counter threats from terrorists, criminals and hostile states.
The UK's new offensive cyber unit takes on organised crime and hostile states (ZDNet) National Cyber Force will be made up of intelligence, cyber and military experts and aims to disrupt activity by hostile states or criminals.
UK unveils National Cyber Force of hackers to target foes digitally (the Guardian) New unit aims to disrupt online activities of hostile states, terror groups and paedophiles
Government announces National Cyber Force for digital defence (Computing) The new unit will be trained to launch cyber attacks against terrorists, criminals, and hostile states
UK to invest in AI and cyber as part of major defense spending hike (TechCrunch) The UK has announced a massive boost in defense spending — £16.5 billion ($21.8BN) over four years, the biggest such spending bump for 30 years — in what prime minister Boris Johnson has described as a “once in a generation modernization” of the UK’s armed forces and &…
China's tech authoritarianism too big to contain (POLITICO) Democracies will need to work together to counter China's military-industrial complex
When China’s predatory investments go unnoticed (Defense News) China is working tirelessly to control U.S. assets, and Congress must recognize this threat, according to a U.S. congressman.
Analysis | Huawei has an advantage in its push for global dominance. Now the U.S. is trying to counter it. (Washington Post) USAID announced a new financing plan to help countries buy from other telecom vendors.
China’s exclusion from US 5G market likely to continue with Biden administration (CSO Online) Telecom insiders discuss supply chain security and call for better communication, collaboration, and transparency from the federal government about threats within their industry.
Trump's refusal to concede creates strange gap between Biden and Harris on classified intelligence (CNN) Vice President-elect Kamala Harris took part in a classified briefing of the Senate Intelligence Committee this week and emerged in a strange position -- being more informed about current threats than President-elect Joe Biden but bound by congressional rules to keep that information from him.
Firing of CISA Chief Christopher Krebs Widely Condemned (Threatpost) President Trump fired US cybersecurity chief over Twitter Tuesday, an act widely condemned within the cybersecurity community.
How Trump chose disinformation over his own cyber chief (Axios) Krebs' firing could create expertise gaps during the presidential transition period, making the country less secure.
Analysis | The Cybersecurity 202: Conspiracy theories are all that’s left in Trump’s effort to overturn the election (Washington Post) His attorneys are ignoring evidence, relying on debunked claims.
US Cyber Command’s capability efforts lack clarity, says government watchdog (C4ISRNET) The command's vision for platforms and capabilities lacks clear goals and guidance, an audit from the Government Accountability Office found.
President Trump Naming Plankey to CISA Infrastructure Security Post (Meritalk) President Trump intends to appoint Sean Plankey Assistant Director for Infrastructure Security at the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA), according to an Oct. 7 release from the White House.
Energy official Sean Plankey eyed for senior CISA position after White House throws agency into turmoil (CyberScoop) Following President Trump’s removal of the director of the Department of Homeland Security’s cyber division, the man whom the White House tapped for a senior position there in October is preparing to join the agency amid questions about his security clearance.
Energy official Sean Plankey eyed for senior CISA position after White House throws agency into turmoil (CyberScoop) Following President Trump’s removal of the director of the Department of Homeland Security’s cyber division, the man whom the White House tapped for a senior position there in October is preparing to join the agency amid questions about his security clearance.
Think Tank Urges Financial Sector Action on Cyber Threats (Wall Street Journal) Despite decades of heavy investment in cybersecurity, the global financial system remains vulnerable to cyberattack because banks and regulators fail to coordinate their activities, a report from a leading think tank said Wednesday.
Protecting Personal Data in a Pandemic: GDPR Meets COVID-19 - Part 2 (JD Supra) Introduction - The Covid-19 pandemic brings a sharp focus to the difficult balance that GDPR strikes between the rights of individuals a...
Protecting Personal Data in a Pandemic: GDPR Meets COVID 19 - Part 1 (JD Supra) Introduction - The COVID-19 pandemic brings a sharp focus to the difficult balance that the GDPR seeks to strike between the rights of i...
The Murky Waters of the CCPA's Private Right of Action: Real and Perceived Ambiguities Complicating Litigation (JD Supra) The California Consumer Privacy Act (“CCPA”) gives individuals the right to seek statutory damages against a business in limited circumstances...
Litigation, Investigation, and Law Enforcement
EU Leans Heavily on U.S. Program Tracking Terror Financing (Wall Street Journal) A new review by a civil-liberties watchdog has revealed the extent to which European governments have come to rely on a U.S. initiative that monitors global financial transactions for links to terrorism.
Former EBay Execs Deny New Charges In Cyberstalking Case (Law360) Two former eBay executives pled not guilty on Thursday to an expanded indictment accusing them of working with a group of employees to harass a Massachusetts couple who ran an e-commerce blog critical of the company.
Two Plead Not Guilty in eBay Cyberstalking Case (EcommerceBytes) Two people pleaded not guilty on Thursday in the eBay cyberstalking case in which five others recently pleaded guilty to conspiracy to commit cyberstalking and conspiracy to tamper with witnesses. The two former eBay executives were arrested and charged in June and were indicted by a federal grand jury in Boston on November 3. According […]
Binance Sues Forbes for Defamation Over ‘Tai Chi’ Document Leak (CoinDesk) Binance sued Forbes for defamation Wednesday over a story last month that purported to reveal regulatory evasion tactics.
Cyber crooks seek to provide charitable donations (Marketplace) Several cybercrime groups are trying to brand themselves as ethical. But it's hard to know a hacker's actual motivation.
How an Online Attack ‘Brought Twitter to Its Knees’ (New York Times) A teenager from Florida is accused of breaching one of the most high-profile internet platforms in the world. Watch how Twitter was hacked in a new Times documentary airing tonight on FX at 10 p.m. and streaming on Hulu.