article thumbnail

Chinese Hacking of US Critical Infrastructure

Schneier on Security

Everyone is writing about an interagency and international report on Chinese hacking of US critical infrastructure. Lots of interesting details about how the group, called Volt Typhoon , accesses target networks and evades detection.

Hacking 220
article thumbnail

Hacking the Layoff Process

Schneier on Security

My latest book, A Hacker’s Mind , is filled with stories about the rich and powerful hacking systems, but it was hard to find stories of the hacking by the less powerful. Here’s one I just found.

Hacking 244
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hacking Pickleball

Schneier on Security

Sports are filled with hacks, as players look for every possible advantage that doesn’t explicitly break the rules. My latest book, A Hacker’s Mind , has a lot of sports stories.

Hacking 217
article thumbnail

Discord Admins Hacked by Malicious Bookmarks

Krebs on Security

A number of Discord communities focused on cryptocurrency have been hacked this past month after their administrators were tricked into running malicious Javascript code disguised as a Web browser bookmark. On May 9, MetrixCoin reported that its Discord server was hacked, with fake airdrop details pushed to all users.

Hacking 277
article thumbnail

Hacking Suicide

Schneier on Security

Here’s a religious hack : You want to commit suicide, but it’s a mortal sin: your soul goes straight to hell, forever. It’s a clever hack. I didn’t learn about it in time to put it in my book, A Hacker’s Mind , but I have several other good hacks of religious rules. Problem solved.

Hacking 222
article thumbnail

Hacking Trespass Law

Schneier on Security

But there’s a hack: Some hunters have long believed, however, that the publicly owned parcels on Elk Mountain can be legally reached using a practice called corner-crossing. This particular hack will be adjudicated in court. It’s the act of adjudicating hacks that allows systems to evolve.

Hacking 252
article thumbnail

Hacking the Tax Code

Schneier on Security

That’s not hacking the tax code. It’s hacking the processes that create them: the legislative process that creates tax law. This provision didn’t come into force in 2018, so someone came up with the clever hack to prepay 2018 property taxes in 2017. A hack subverts the intent of a system. The tax code can be hacked.

Hacking 229