<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>hack &#8211; Cincy Link</title>
	<atom:link href="https://cincylink.com/tag/hack/feed/" rel="self" type="application/rss+xml" />
	<link>https://cincylink.com</link>
	<description>Explore Cincy</description>
	<lastBuildDate>Thu, 03 Feb 2022 03:27:16 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.7.1</generator>

<image>
	<url>https://cincylink.com/pub/content/uploads/sites/27/2020/03/apple-touch-icon-precomposed-100x100.png</url>
	<title>hack &#8211; Cincy Link</title>
	<link>https://cincylink.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Tesla hack shows how vulnerable third-party apps may make cars</title>
		<link>https://cincylink.com/2022/02/02/tesla-hack-shows-how-vulnerable-third-party-apps-may-make-cars/</link>
					<comments>https://cincylink.com/2022/02/02/tesla-hack-shows-how-vulnerable-third-party-apps-may-make-cars/#respond</comments>
		
		<dc:creator><![CDATA[cincylink]]></dc:creator>
		<pubDate>Thu, 03 Feb 2022 03:27:16 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Cincinnati]]></category>
		<category><![CDATA[elon musk]]></category>
		<category><![CDATA[german teenager]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[mdnd]]></category>
		<category><![CDATA[Recent]]></category>
		<category><![CDATA[Relevant]]></category>
		<category><![CDATA[tesla]]></category>
		<category><![CDATA[Trending]]></category>
		<category><![CDATA[unlock doors]]></category>
		<guid isPermaLink="false">https://cincylink.com/?p=143315</guid>

					<description><![CDATA[A German teenager says he found a vulnerability in an app installed in some Teslas, which allowed him the ability to unlock doors, flash headlights and blast music. The hack highlights the relative lack of oversight in apps that some drivers can download to their cars.David Colombo identified a vulnerability in TeslaMate, a third-party app &#8230;]]></description>
										<content:encoded><![CDATA[<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- Homepage Mid -->
<ins class="adsbygoogle"
     style="display:block"
     data-ad-client="ca-pub-3589745434615936"
     data-ad-slot="3681180123"
     data-ad-format="auto"
     data-full-width-responsive="true"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
<br /><img decoding="async" src="https://cdn.cincylink.com/pub/content/uploads/sites/27/2022/02/Tesla-hack-shows-how-vulnerable-third-party-apps-may-make-cars.jpg" /></p>
<p>
					A German teenager says he found a vulnerability in an app installed in some Teslas, which allowed him the ability to unlock doors, flash headlights and blast music. The hack highlights the relative lack of oversight in apps that some drivers can download to their cars.David Colombo identified a vulnerability in TeslaMate, a third-party app that some Tesla owners use to analyze data from their vehicle. He was able to access 25 Teslas that use the app, and he did not have access to steering, braking or acceleration, which could be especially dangerous.The exploit did unlock a litany of potential unwelcome possibilities for drivers, the hacker said."Imagine music blasts at max volume and every time you want to turn it off  it just starts again or imagine every time you unlock your doors they just lock again," Colombo, the 19-year-old behind the hack, wrote in a Medium post. Colombo said that he could even track the location of Tesla vehicles as their owners went about their day.Colombo told CNN Business that he immediately reported the vulnerability that enabled the hack to involved parties, including Tesla. Colombo leads a cybersecurity company, and it is not uncommon for security researchers to seek out software vulnerabilities for potential compensation. Tesla offers cash incentives to people who report flaws in its software, but Colombo said he wasn't paid as the vulnerability was in a third-party app, not Tesla infrastructure.(TeslaMate and Tesla did not respond to a request for comment.)Cars, including Teslas, have been hacked before. But cybersecurity experts believe this is the first time a vehicle has been hacked through an app that has been granted access direct access to some vehicle controls and data. TeslaMate software is installed on a computer that is not the vehicle, and then accesses the vehicle through its interface for apps. Apps can delight drivers with services their car wouldn't otherwise have, as well as create new revenue for automakers through app-related fees.But cybersecurity experts caution that the auto industry must mature, as there are growing risks as in-car apps become increasingly common in the years ahead." need to think about self-defending cars before self-driving cars," Srinivas Kumar, a vice president at the cybersecurity company DigiCert who leads efforts to protect connected devices, told CNN Business. "If a car can't defend itself from an attack, do you trust it to be self-driving?"Colombo said that preventing future hacks will require collaboration between automakers, app makers and car owners.One way to prevent a hack of this nature, he said, would be if Tesla more thoroughly restricted apps' access to data and commands. For example, an app could be restricted to only be able to view data, such as whether the doors are locked, but not be able to unlock them."In a perfect world those apps in an app store that you could download to your Tesla wouldn't have access to anything critical," Colombo said.Third-party apps are increasingly becoming available in new cars. Some newer models offer a limited range of apps on their infotainment systems. Some Cadillac drivers can download Spotify, NPR and the Weather Channel, for instance. Newer Ford models offer apps like Waze, Domino's and Pandora.Tesla has not officially launched a way for app creators to add apps to its vehicles. But tech-savvy Tesla enthusiasts have written about how to do so.Moshe Shlisel, the CEO of Israeli cybersecurity company GuardKnox, said that automakers should scrutinize apps that end up on their vehicles to ensure safety. GuardKnox is developing a way for cars to monitor their apps and shut them down if they're doing something wrong, such as communicating to an off-limits part of the vehicle."It's a wake-up call to the entire industry," Shlisel said of Colombo's hack.He expects that cars in the future will have hundreds of thousands of apps to choose from.General Motors reviews apps and scans them for vulnerabilities, according to spokesman Darryll Harrison. Ford, which also allows a limited set of apps on some vehicles, declined to comment for this story.But screening apps displayed on infotainment systems won't stop a person with sophisticated technical abilities from running an app on a vehicle independent of the automaker's approval. This could be done through a USB connection or an over-the-air vulnerability as occurred in the Tesla hack, according to cybersecurity experts.The National Highway Traffic Safety Administration released best practices for cybersecurity in 2016, but it hasn't created standards for apps installed in vehicles. Neither has the auto industry."Right now it's open season," Shlisel said.
				</p>
<div>
<p>A German teenager says he found a vulnerability in an app installed in some Teslas, which allowed him the ability to unlock doors, flash headlights and blast music. The hack highlights the relative lack of oversight in apps that some drivers can download to their cars.</p>
<p>David Colombo identified a vulnerability in TeslaMate, a third-party app that some Tesla owners use to analyze data from their vehicle. He was able to access 25 Teslas that use the app, and he did not have access to steering, braking or acceleration, which could be especially dangerous.</p>
<p><!-- article/blocks/side-floater --></p>
<p><!-- article/blocks/side-floater --></p>
<p>The exploit did unlock a litany of potential unwelcome possibilities for drivers, the hacker said.</p>
<p>"Imagine music blasts at max volume and every time you want to turn it off [sic] it just starts again or imagine every time you unlock your doors they just lock again," Colombo, the 19-year-old behind the hack, wrote in a <a href="https://medium.com/@david_colombo/how-i-got-access-to-25-teslas-around-the-world-by-accident-and-curiosity-8b9ef040a028" target="_blank" rel="nofollow noopener">Medium post</a>. Colombo said that he could even track the location of Tesla vehicles as their owners went about their day.</p>
<p>Colombo told CNN Business that he immediately reported the vulnerability that enabled the hack to involved parties, including Tesla. Colombo leads a cybersecurity company, and it is not uncommon for security researchers to seek out software vulnerabilities for potential compensation. Tesla offers cash incentives to people who report flaws in its software, but Colombo said he wasn't paid as the vulnerability was in a third-party app, not Tesla infrastructure.</p>
<p>(TeslaMate and Tesla did not respond to a request for comment.)</p>
<p>Cars, including Teslas, have been <a href="https://money.cnn.com/2014/03/31/technology/security/tesla-hack/" target="_blank" rel="nofollow noopener">hacked</a> <a href="https://money.cnn.com/2015/08/06/technology/tesla-hack/index.html" target="_blank" rel="nofollow noopener">before</a>. But cybersecurity experts believe this is the first time a vehicle has been hacked through an app that has been granted access direct access to some vehicle controls and data. TeslaMate software is installed on a computer that is not the vehicle, and then accesses the vehicle through its interface for apps. Apps can delight drivers with services their car wouldn't otherwise have, as well as create new revenue for automakers through app-related fees.</p>
<p>But cybersecurity experts caution that the auto industry must mature, as there are growing risks as in-car apps become increasingly common in the years ahead.</p>
<p>"[Automakers] need to think about self-defending cars before self-driving cars," Srinivas Kumar, a vice president at the cybersecurity company DigiCert who leads efforts to protect connected devices, told CNN Business. "If a car can't defend itself from an attack, do you trust it to be self-driving?"</p>
<p>Colombo said that preventing future hacks will require collaboration between automakers, app makers and car owners.</p>
<p>One way to prevent a hack of this nature, he said, would be if Tesla more thoroughly restricted apps' access to data and commands. For example, an app could be restricted to only be able to view data, such as whether the doors are locked, but not be able to unlock them.</p>
<p>"In a perfect world those apps in an app store that you could download to your Tesla wouldn't have access to anything critical," Colombo said.</p>
<p>Third-party apps are increasingly becoming available in new cars. Some newer models offer a limited range of apps on their infotainment systems. Some Cadillac drivers can download Spotify, NPR and the Weather Channel, for instance. Newer Ford models offer apps like Waze, Domino's and Pandora.</p>
<p>Tesla has not officially launched a way for app creators to add apps to its vehicles. But tech-savvy Tesla enthusiasts have written about how to do so.</p>
<p>Moshe Shlisel, the CEO of Israeli cybersecurity company GuardKnox, said that automakers should scrutinize apps that end up on their vehicles to ensure safety. GuardKnox is developing a way for cars to monitor their apps and shut them down if they're doing something wrong, such as communicating to an off-limits part of the vehicle.</p>
<p>"It's a wake-up call to the entire industry," Shlisel said of Colombo's hack.</p>
<p>He expects that cars in the future will have hundreds of thousands of apps to choose from.</p>
<p>General Motors reviews apps and scans them for vulnerabilities, according to spokesman Darryll Harrison. Ford, which also allows a limited set of apps on some vehicles, declined to comment for this story.</p>
<p>But screening apps displayed on infotainment systems won't stop a person with sophisticated technical abilities from running an app on a vehicle independent of the automaker's approval. This could be done through a USB connection or an over-the-air vulnerability as occurred in the Tesla hack, according to cybersecurity experts.</p>
<p>The National Highway Traffic Safety Administration released best practices for cybersecurity in 2016, but it hasn't created standards for apps installed in vehicles. Neither has the auto industry.</p>
<p>"Right now it's open season," Shlisel said.</p>
</p></div>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- Homepage Mid -->
<ins class="adsbygoogle"
     style="display:block"
     data-ad-client="ca-pub-3589745434615936"
     data-ad-slot="3681180123"
     data-ad-format="auto"
     data-full-width-responsive="true"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
<br /><a href="https://www.wlwt.com/article/teen-s-tesla-hack-shows-how-vulnerable-third-party-apps-make-cars/38963881">Source link </a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://cincylink.com/2022/02/02/tesla-hack-shows-how-vulnerable-third-party-apps-may-make-cars/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cyberattacks could threaten our food supply</title>
		<link>https://cincylink.com/2021/12/11/cyberattacks-could-threaten-our-food-supply/</link>
					<comments>https://cincylink.com/2021/12/11/cyberattacks-could-threaten-our-food-supply/#respond</comments>
		
		<dc:creator><![CDATA[cincylink]]></dc:creator>
		<pubDate>Sat, 11 Dec 2021 07:57:10 +0000</pubDate>
				<category><![CDATA[Cincy News]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Cincinnati]]></category>
		<category><![CDATA[Cincy]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[cyber attack agriculture]]></category>
		<category><![CDATA[cyber attack farm]]></category>
		<category><![CDATA[cyber threats to agriculture]]></category>
		<category><![CDATA[food supply hack]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[hacker]]></category>
		<category><![CDATA[hackers target farmers]]></category>
		<category><![CDATA[Local]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Recent]]></category>
		<category><![CDATA[Relevant]]></category>
		<category><![CDATA[Trending]]></category>
		<guid isPermaLink="false">https://cincylink.com/?p=125952</guid>

					<description><![CDATA[BRIGHTON, Colo. — Cyberattacks are becoming more common and more disruptive to our daily life, and many experts worry the nation’s food supply is the next big target. “In the past, I don't think we gave a lot of thought to cybersecurity,” said Robert Sakata, a farmer in Brighton, Colorado. Sakata’s family has farmed for &#8230;]]></description>
										<content:encoded><![CDATA[<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- Homepage Mid -->
<ins class="adsbygoogle"
     style="display:block"
     data-ad-client="ca-pub-3589745434615936"
     data-ad-slot="3681180123"
     data-ad-format="auto"
     data-full-width-responsive="true"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
</p>
<div>
<p>BRIGHTON, Colo. — Cyberattacks are becoming more common and more disruptive to our daily life, and many experts worry the nation’s food supply is the next big target.</p>
<p>“In the past, I don't think we gave a lot of thought to cybersecurity,” said Robert Sakata, a farmer in Brighton, Colorado.</p>
<p>Sakata’s family has farmed for decades. </p>
<p>“So, my dad started the farm, and he and his family actually were farming in San Francisco when World War Two broke out, so they were moved to an internment camp, ended up in a camp in Utah,” said Sakata. “When he was released from that camp, Colorado was one of the few places that were actually not discouraging Japanese-Americans from coming in.”</p>
<p>Once the war ended, the Sakata family rebuilt their life and started a new farm 30 minutes outside of Denver.</p>
<p>Their farm, along with the thousands of other farms across the country, is now facing a new threat that didn’t exist just a few years ago.</p>
<p>“When you talked about security, it was somebody maybe coming out here, and believe it or not, that's what they've actually done—come out here and steal the wheels off of this sprinkler, steal the copper wire that's along there,” said Sakata.</p>
<p>But now, it’s also cybercriminals Sakata worries about. Any machine, like a tractor or a sprinkler system that’s connected to the internet could be hacked and remotely controlled.</p>
<p>These threats could mean interruptions to daily life for millions of Americans. </p>
<p>“If a CPA firm gets breached, a bunch of social security numbers get stolen, you're dealing with identity theft. That's one thing, right? But when people don't have food, you're talking about riots in the streets,” said <a class="Link" href="https://www.thebrunsgroup.com/who-we-are">Joseph Brunsman</a>, founder of the Brunsman Advisory Group. Brunsman is a provider for cybersecurity insurance.</p>
<p>Brunsman said these attacks, if large enough, could leave families hungry. </p>
<p>“A lot of people living on fixed incomes or people that are, you know, lower on the socio-economic scale, when food prices go up, you know, 10, 20, 30%, that means they have to make that decision: Am I going to pay for food? Am I going to pay for heating this month? So, it's really a serious, serious idea for a lot of people.”</p>
<p>Hackers can also stop farming equipment or food production equipment from working and demand a ransom be paid. Ransomware attacks have become more common, and food production has seen multiple large attacks in recent months.</p>
<p>Meatpacking company <a class="Link" href="https://jbsfoodsgroup.com/articles/jbs-usa-cyberattack-media-statement-june-9">JBS was hacked in June</a> and plants were shut down across the country after a ransomware attack.</p>
<p>JBS paid hackers $11M to get operations back online. </p>
<p>“This was a very difficult decision to make for our company, and for me personally,” said Andre Nogueira, the CEO of JBS USA. “However, we felt this decision had to be made to prevent any potential risk for our customers.”</p>
<p>“You hear about ransomware where you would totally lock up and we couldn't have control. That would be a real, real issue that then we couldn't water the crop at all,” said Sakata.</p>
<p>“Because everyone needs to eat, an attack, a successful attack within the food and agriculture industry can quickly cascade into a national security concern,” said <a class="Link" href="https://podcasts.apple.com/no/podcast/welcome-to-the-the-cyberhero-adventures-defenders/id1511151506">Scott Algier</a>, the executive director of the Information Technology Sharing and Analysis Center, known as IT-SAC. “We're seeing a lot of the same attacks on other industries already, but some of the potential consequences could be a little more impactful.”</p>
<p>In addition to ransomware, there’s concern about groups hacking and stealing intellectual property – like seed formulas.</p>
<p>“There's a lot of intellectual property that the fruit and agriculture industry has that that is of interest to other organizations, other countries,” said Algier.</p>
<p>“We could lose our entire year of income by somebody taking over something and creating a problem by not letting the sprinkler run or not having that shipment go through,” said Sakata. “So, it's a big risk not only just for my family, but then for whoever is depending on those food sources.”</p>
<p>These threats are why Sakata goes old school on some things. He doesn’t connect his storage refrigerator to Wi-Fi to keep his crops safe.</p>
<p>“The only way somebody can hack it is really to break in at the door and change the settings,” said Sakata. “Even then, I have a password!”</p>
<p>What he can protect digitally, he does, and he said he and other farmers now often discuss how to defend themselves from cybercriminals.</p>
<p>“Whether it's going now to multiple-step verification, you need maybe another key fob that identifies yourself, that is all going to be critical as we move forward,” said Sakata.</p>
<p>Brunsman said cybersecurity insurance can also help, but there are several other inexpensive options for smaller farmers as well. </p>
<p>“Even really basic, very affordable controls, such as multi-factor authentication, having multiple backups, having offline backups, email security, security awareness training, that kind of stuff. It's not super expensive. It's really quite affordable. In many cases, it's like the cost of a cup of coffee per person per month. That can really go a long way,” said Brunsman.</p>
<p>Those who study these attacks say they’re happening every single day on a small scale. It’s only a matter of time before the next large-scale attack occurs.</p>
<p>“The threats are coming up and several different sides, we're seeing, we've already seen threats against both producers and production facilities,” said <a class="Link" href="https://www.dougj.net/">Doug Jacobson</a>, a professor of electrical and computer engineering at Iowa State University. “We had a co-op here in Iowa that was attacked. So, we see it from the large organization side of things. But anybody on the internet, even a farmer can be attacked.”</p>
<p>“It's kind of scary,” said Sakata. “I think if you dwelled on it too long, it would keep you up at night.</p>
<p>He just hopes other farms will take the steps he’s taking to protect what we all can’t live without: our food supply.</p>
<p>“We need to really ensure that we're doing everything we can to protect that. It would be really scary if we ever got to the day where people would go to the grocery store and there wasn't, wasn't any food,” said Sakata.</p>
<p>Algier echoed the need for collaboration to stop cybercriminals. </p>
<p>“Cyberattacks are happening everywhere all the time. So, it is something that every enterprise, no matter your size, and no matter industry, something you need to pay attention to,” said Algier. "The cybersecurity threat is so big that nobody can do it, nobody can defend it against on their own.”</p>
</div>
<p><script>
    window.fbAsyncInit = function() {
    FB.init({
        appId : '1374721116083644',
    xfbml : true,
    version : 'v2.9'
    });
    };
    (function(d, s, id){
    var js, fjs = d.getElementsByTagName(s)[0];
    if (d.getElementById(id)) {return;}
    js = d.createElement(s); js.id = id;
    js.src = "https://connect.facebook.net/en_US/sdk.js";
    js.async = true;
    fjs.parentNode.insertBefore(js, fjs);
    }(document, 'script', 'facebook-jssdk'));
</script><script>  !function(f,b,e,v,n,t,s)
  {if(f.fbq)return;n=f.fbq=function(){n.callMethod?
  n.callMethod.apply(n,arguments):n.queue.push(arguments)};
  if(!f._fbq)f._fbq=n;n.push=n;n.loaded=!0;n.version='2.0';
  n.queue=[];t=b.createElement(e);t.async=!0;
  t.src=v;s=b.getElementsByTagName(e)[0];
  s.parentNode.insertBefore(t,s)}(window, document,'script',
  'https://connect.facebook.net/en_US/fbevents.js');
  fbq('init', '1080457095324430');
  fbq('track', 'PageView');</script><br />
<br /><script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- Homepage Mid -->
<ins class="adsbygoogle"
     style="display:block"
     data-ad-client="ca-pub-3589745434615936"
     data-ad-slot="3681180123"
     data-ad-format="auto"
     data-full-width-responsive="true"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
<br /><a href="https://www.wcpo.com/news/national-politics/the-race/cyberattacks-could-threaten-our-food-supply">Source link </a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://cincylink.com/2021/12/11/cyberattacks-could-threaten-our-food-supply/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Treasury Dept. email accounts compromised in hack</title>
		<link>https://cincylink.com/2021/10/13/treasury-dept-email-accounts-compromised-in-hack/</link>
					<comments>https://cincylink.com/2021/10/13/treasury-dept-email-accounts-compromised-in-hack/#respond</comments>
		
		<dc:creator><![CDATA[cincylink]]></dc:creator>
		<pubDate>Wed, 13 Oct 2021 04:48:51 +0000</pubDate>
				<category><![CDATA[Cincy News]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Cincinnati]]></category>
		<category><![CDATA[Cincy]]></category>
		<category><![CDATA[emails]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[Local]]></category>
		<category><![CDATA[Recent]]></category>
		<category><![CDATA[Relevant]]></category>
		<category><![CDATA[russia]]></category>
		<category><![CDATA[treasury]]></category>
		<category><![CDATA[Trending]]></category>
		<category><![CDATA[what did they get]]></category>
		<guid isPermaLink="false">https://cincylink.com/?p=23346</guid>

					<description><![CDATA[WASHINGTON (AP) — Dozens of email accounts at the Treasury Department were compromised in the massive breach of U.S. government agencies being blamed on Russia. That's according to an Oregon Democrat, Sen. Ron Wyden, who says hackers broke into systems used by the department’s highest-ranking officials. Wyden issued a statement Monday after he and other &#8230;]]></description>
										<content:encoded><![CDATA[<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- Homepage Mid -->
<ins class="adsbygoogle"
     style="display:block"
     data-ad-client="ca-pub-3589745434615936"
     data-ad-slot="3681180123"
     data-ad-format="auto"
     data-full-width-responsive="true"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
</p>
<div>
<p>WASHINGTON (AP) — Dozens of email accounts at the Treasury Department were compromised in the massive breach of U.S. government agencies being blamed on Russia. </p>
<p>That's according to an Oregon Democrat, Sen. Ron Wyden, who says hackers broke into systems used by the department’s highest-ranking officials. </p>
<p>Wyden issued a statement Monday after he and other members of the Senate Finance Committee were briefed by the IRS and the Treasury Department. </p>
<p>Wyden <a class="Link" href="https://apnews.com/article/technology-politics-ron-wyden-russia-hacking-572ac201e8f365cf6ec218b478742aa0">says that </a>though there is no indication that taxpayer data was compromised, the hack “appears to be significant." In addition, the breach appears to involve the theft of encryption keys from U.S. government servers, Wyden said.</p>
<p>“Treasury still does not know all of the actions taken by hackers, or precisely what information was stolen,” Wyden said <a class="Link" href="https://apnews.com/article/technology-politics-ron-wyden-russia-hacking-572ac201e8f365cf6ec218b478742aa0">in a statement</a>.</p>
<p>It is also not clear what Russian hackers intend to do with any emails they may have accessed.</p>
<p>A Treasury Department spokeswoman declined to comment on Wyden’s statement.</p>
<p>Treasury was among the earliest known agencies reported to have been affected in a breach that now encompasses a broad spectrum of departments. The effects and consequences of the hack are still being assessed, though the Department of Homeland Security’s cybersecurity arm said in a statement last week that the intrusion posed a “grave” risk to government and private networks.</p>
<p>In the Treasury Department’s case, Wyden said, the breach began in July. But experts believe the overall hacking operation began months earlier when malicious code was slipped into updates to popular software that monitors computer networks of businesses and governments.</p>
</div>
<p><script>
    window.fbAsyncInit = function() {
    FB.init({
        appId : '1374721116083644',
    xfbml : true,
    version : 'v2.9'
    });
    };
    (function(d, s, id){
    var js, fjs = d.getElementsByTagName(s)[0];
    if (d.getElementById(id)) {return;}
    js = d.createElement(s); js.id = id;
    js.src = "https://connect.facebook.net/en_US/sdk.js";
    fjs.parentNode.insertBefore(js, fjs);
    }(document, 'script', 'facebook-jssdk'));
</script><script>  !function(f,b,e,v,n,t,s)
  {if(f.fbq)return;n=f.fbq=function(){n.callMethod?
  n.callMethod.apply(n,arguments):n.queue.push(arguments)};
  if(!f._fbq)f._fbq=n;n.push=n;n.loaded=!0;n.version='2.0';
  n.queue=[];t=b.createElement(e);t.async=!0;
  t.src=v;s=b.getElementsByTagName(e)[0];
  s.parentNode.insertBefore(t,s)}(window, document,'script',
  'https://connect.facebook.net/en_US/fbevents.js');
  fbq('init', '1080457095324430');
  fbq('track', 'PageView');</script><br />
<br /><script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- Homepage Mid -->
<ins class="adsbygoogle"
     style="display:block"
     data-ad-client="ca-pub-3589745434615936"
     data-ad-slot="3681180123"
     data-ad-format="auto"
     data-full-width-responsive="true"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
<br /><a href="https://www.wcpo.com/news/national/senator-treasury-dept-email-accounts-compromised-in-hack">Source link </a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://cincylink.com/2021/10/13/treasury-dept-email-accounts-compromised-in-hack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Microsoft admits hackers were able to see some of its source code</title>
		<link>https://cincylink.com/2021/10/01/microsoft-admits-hackers-were-able-to-see-some-of-its-source-code/</link>
					<comments>https://cincylink.com/2021/10/01/microsoft-admits-hackers-were-able-to-see-some-of-its-source-code/#respond</comments>
		
		<dc:creator><![CDATA[cincylink]]></dc:creator>
		<pubDate>Fri, 01 Oct 2021 05:19:24 +0000</pubDate>
				<category><![CDATA[Cincy News]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[access]]></category>
		<category><![CDATA[Cincinnati]]></category>
		<category><![CDATA[Cincy]]></category>
		<category><![CDATA[compromise]]></category>
		<category><![CDATA[government]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[Local]]></category>
		<category><![CDATA[microsoft]]></category>
		<category><![CDATA[Recent]]></category>
		<category><![CDATA[Relevant]]></category>
		<category><![CDATA[Russian]]></category>
		<category><![CDATA[SolarWinds Orion]]></category>
		<category><![CDATA[Trending]]></category>
		<guid isPermaLink="false">https://cincylink.com/?p=25530</guid>

					<description><![CDATA[Microsoft now says suspected Russian hackers behind a massive campaign that impacted government agencies, local municipalities and companies were also able to view some of the company’s source code. In a blog post Thursday, Microsoft says the unauthorized access “has not put at risk the security of our services or any customer data.” "We detected &#8230;]]></description>
										<content:encoded><![CDATA[<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- Homepage Mid -->
<ins class="adsbygoogle"
     style="display:block"
     data-ad-client="ca-pub-3589745434615936"
     data-ad-slot="3681180123"
     data-ad-format="auto"
     data-full-width-responsive="true"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
</p>
<div>
<p>Microsoft now says suspected Russian hackers behind a massive campaign that impacted government agencies, local municipalities and companies were also able to view some of the company’s source code.</p>
<p>In a <u><a class="Link" href="https://msrc-blog.microsoft.com/2020/12/31/microsoft-internal-solorigate-investigation-update/">blog post </a></u>Thursday, Microsoft says the unauthorized access “has not put at risk the security of our services or any customer data.”</p>
<p>"We detected unusual activity with a small number of internal accounts and upon review, we discovered one account had been used to view source code in a number of source code repositories," Microsoft <u><a class="Link" href="https://msrc-blog.microsoft.com/2020/12/31/microsoft-internal-solorigate-investigation-update/">stated</a></u>. "The account did not have permissions to modify any code or engineering systems and our investigation further confirmed no changes were made. These accounts were investigated and remediated."</p>
<p>Source code is the basic building blocks of computer programs, like the instructions.</p>
<p>Last month, as news of the hacking campaign surfaced, Microsoft acknowledged using the IT management software SolarWinds Orion, which is how the attackers gained access to thousands of government, public, and private organizations.</p>
<p>Microsoft has said in earlier blog posts they were aware of clients they serviced who were compromised, Thursday’s update is the first time the company has confirmed the attackers compromised them.</p>
<p>Microsoft says they operate with a philosophy of making source code viewable, and do not rely on secrecy of this code for security. “So viewing source code isn’t tied to elevation of risk,” they stated.</p>
</div>
<p><script>
    window.fbAsyncInit = function() {
    FB.init({
        appId : '1374721116083644',
    xfbml : true,
    version : 'v2.9'
    });
    };
    (function(d, s, id){
    var js, fjs = d.getElementsByTagName(s)[0];
    if (d.getElementById(id)) {return;}
    js = d.createElement(s); js.id = id;
    js.src = "https://connect.facebook.net/en_US/sdk.js";
    fjs.parentNode.insertBefore(js, fjs);
    }(document, 'script', 'facebook-jssdk'));
</script><script>  !function(f,b,e,v,n,t,s)
  {if(f.fbq)return;n=f.fbq=function(){n.callMethod?
  n.callMethod.apply(n,arguments):n.queue.push(arguments)};
  if(!f._fbq)f._fbq=n;n.push=n;n.loaded=!0;n.version='2.0';
  n.queue=[];t=b.createElement(e);t.async=!0;
  t.src=v;s=b.getElementsByTagName(e)[0];
  s.parentNode.insertBefore(t,s)}(window, document,'script',
  'https://connect.facebook.net/en_US/fbevents.js');
  fbq('init', '1080457095324430');
  fbq('track', 'PageView');</script><br />
<br /><script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- Homepage Mid -->
<ins class="adsbygoogle"
     style="display:block"
     data-ad-client="ca-pub-3589745434615936"
     data-ad-slot="3681180123"
     data-ad-format="auto"
     data-full-width-responsive="true"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
<br /><a href="https://www.wcpo.com/news/national/microsoft-admits-hackers-were-able-to-see-some-of-its-source-code">Source link </a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://cincylink.com/2021/10/01/microsoft-admits-hackers-were-able-to-see-some-of-its-source-code/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to increase your wardrobe hanging space</title>
		<link>https://cincylink.com/2021/09/17/how-to-increase-your-wardrobe-hanging-space/</link>
					<comments>https://cincylink.com/2021/09/17/how-to-increase-your-wardrobe-hanging-space/#respond</comments>
		
		<dc:creator><![CDATA[cincylink]]></dc:creator>
		<pubDate>Fri, 17 Sep 2021 04:27:57 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Cincinnati]]></category>
		<category><![CDATA[closet]]></category>
		<category><![CDATA[clothes]]></category>
		<category><![CDATA[evergreen]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[khnd]]></category>
		<category><![CDATA[Recent]]></category>
		<category><![CDATA[Relevant]]></category>
		<category><![CDATA[Trending]]></category>
		<guid isPermaLink="false">https://cincylink.com/?p=93465</guid>

					<description><![CDATA[This hack will help you triple the amount of space for clothes in your closet All you need is a few empty cans. Updated: 7:57 AM EDT Sep 16, 2021 Video above: 8 tips to help you organize your child's closetChances are you have considered reorganizing your closet over the last few months. Granted, you &#8230;]]></description>
										<content:encoded><![CDATA[<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- Homepage Mid -->
<ins class="adsbygoogle"
     style="display:block"
     data-ad-client="ca-pub-3589745434615936"
     data-ad-slot="3681180123"
     data-ad-format="auto"
     data-full-width-responsive="true"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
</p>
<div>
<div class="mobile">
											<!-- blocks/ad.twig --></p>
<p><!-- blocks/ad.twig --></p>
<p><!-- article/blocks/headline --></p>
<section class="article-headline">
<p>This hack will help you triple the amount of space for clothes in your closet</p>
<div class="article-headline--subheadline">
<p>All you need is a few empty cans.</p>
</div>
<div class="article-social-branding share-content horizontal">
<p><!-- blocks/share-content/share-widget --></p>
<p><!-- /blocks/share-content/share-widget --></p>
<div class="article-branding">
												<img decoding="async" src="https://cdn.cincylink.com/pub/content/uploads/sites/27/2021/09/How-to-increase-your-wardrobe-hanging-space.png" class="lazyload lazyload-in-view branding" alt="Cosmopolitan"/></p>
<p>
					Updated: 7:57 AM EDT Sep 16, 2021
				</p>
</p></div>
</p></div>
</section>
<p><!-- /article/blocks/headline --><!-- article/blocks/byline --><br />
<!-- /article/blocks/byline --></p></div>
<p>
					Video above: 8 tips to help you organize your child's closetChances are you have considered reorganizing your closet over the last few months. Granted, you might not have actually gotten around to doing it — but you have likely thought about it at some point.Perhaps you've got to a point where you can't move the hangers on the (very full) rail. Or maybe you've forgotten what it's like to be able to close the doors to your closet, as the clothes are literally overflowing.If you're at that stage, we have got just the thing. What if we told you there's a super easy way to multiply your wardrobe hanging space? The best part is it only requires one thing: empty cans.What to doStart off by removing the pull tabs from a few empty cans. The amount you'll need is determined by how much storage space you want to free up. Start by using five to 10. Next, remove one of the hangers from your wardrobe and slip the pull tab over the hook on top of the hanger. Then, take another clothes hanger and hook it onto the other metal loop on the tab. As you go, you can see this immediately frees up space on the clothes rail, with your clothes hanging vertically as opposed to horizontally.You can repeat this process multiple times. It is recommended that you hang items in groups of three, which should triple your rail space without adding too much weight to the starting hanger.Watch the TikTok hack in full here:
				</p>
<div class="article-content--body-text">
<p><strong><em><strong>Video above: </strong>8 tips to help you organize your child's closet</em></strong></p>
<p>Chances are you have considered reorganizing your closet over the last few months. Granted, you might not have actually gotten around to doing it — but you have likely thought about it at some point.</p>
<p>Perhaps you've got to a point where you can't move the hangers on the (very full) rail. Or maybe you've forgotten what it's like to be able to close the doors to your closet, as the clothes are literally overflowing.</p>
<p>If you're at that stage, we have got just the thing. What if we told you there's a super easy way to multiply your wardrobe hanging space? The best part is it only requires one thing: empty cans.</p>
<h4 class="body-h4">What to do</h4>
<ol>
<li><strong>Start off by removing the pull tabs from a few empty cans. </strong>The amount you'll need is determined by how much storage space you want to free up. Start by using five to 10. </li>
<li><strong>Next, remove one of the hangers from your wardrobe and slip the pull tab over the hook on top of the hanger. </strong></li>
<li><strong>Then, take another clothes hanger and hook it onto the other metal loop on the tab.</strong> As you go, you can see this immediately frees up space on the clothes rail, with your clothes hanging vertically as opposed to horizontally.</li>
<li><strong>You can repeat this process multiple times</strong>. It is recommended that you hang items in groups of three, which should triple your rail space without adding too much weight to the starting hanger.</li>
</ol>
<p>Watch the TikTok hack in full here:</p>
<p>
	This content is imported from TikTok.<br />
	You may be able to find the same content in another format, or you may be able to find more information, at their web site.
</p>
</p></div>
</p></div>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- Homepage Mid -->
<ins class="adsbygoogle"
     style="display:block"
     data-ad-client="ca-pub-3589745434615936"
     data-ad-slot="3681180123"
     data-ad-format="auto"
     data-full-width-responsive="true"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
<br /><a href="https://www.wlwt.com/article/how-to-increase-wardrobe-space/33632003">Source link </a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://cincylink.com/2021/09/17/how-to-increase-your-wardrobe-hanging-space/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How this guy hacked his arm to make MIND MUSIC!! ??</title>
		<link>https://cincylink.com/2020/03/25/how-this-guy-hacked-his-arm-to-make-mind-music-%f0%9f%a4%af%f0%9f%a4%98/</link>
					<comments>https://cincylink.com/2020/03/25/how-this-guy-hacked-his-arm-to-make-mind-music-%f0%9f%a4%af%f0%9f%a4%98/#respond</comments>
		
		<dc:creator><![CDATA[cincylink]]></dc:creator>
		<pubDate>Wed, 25 Mar 2020 12:00:01 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Tech Videos]]></category>
		<category><![CDATA[Watch]]></category>
		<category><![CDATA[arm prosthetic]]></category>
		<category><![CDATA[bertolt meyer]]></category>
		<category><![CDATA[CNET]]></category>
		<category><![CDATA[crazy diy synth]]></category>
		<category><![CDATA[crazy modular synth]]></category>
		<category><![CDATA[crazy modular synthesizer setup]]></category>
		<category><![CDATA[crazy tech hacks]]></category>
		<category><![CDATA[custom music gear]]></category>
		<category><![CDATA[diy tech]]></category>
		<category><![CDATA[electronic music]]></category>
		<category><![CDATA[epic diy synth]]></category>
		<category><![CDATA[gear]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[hacked arm]]></category>
		<category><![CDATA[hacked arm prosthetic]]></category>
		<category><![CDATA[hacked prosthetic]]></category>
		<category><![CDATA[making music with your thoughts]]></category>
		<category><![CDATA[modular synthesis]]></category>
		<category><![CDATA[modular synthesis hacks]]></category>
		<category><![CDATA[modular synthesizer]]></category>
		<category><![CDATA[music]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[prosthetic]]></category>
		<category><![CDATA[science]]></category>
		<category><![CDATA[synlimb]]></category>
		<category><![CDATA[synth]]></category>
		<category><![CDATA[synth music]]></category>
		<category><![CDATA[synthesizer]]></category>
		<category><![CDATA[synthesizer hack]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[thought-controlled music]]></category>
		<guid isPermaLink="false">https://cincylink.com/how-this-guy-hacked-his-arm-to-make-mind-music-%f0%9f%a4%af%f0%9f%a4%98/</guid>

					<description><![CDATA[Meet Bertolt Meyer, the man who hacked his prosthetic arm to make thought-controlled music. The prototype device is called Synlimb, and it uses the same muscle signals that control Bertolt's prosthetic to change different parameters of the music, including pitch, filters, and more. Subscribe to CNET: CNET playlists: Download the new CNET app: Like us &#8230;]]></description>
										<content:encoded><![CDATA[<p><iframe  width="580" height="385" src="https://www.youtube.com/embed/4NBBfqhJ-R8?rel=0&modestbranding=1" frameborder="0" allowfullscreen></iframe><br />
<br />Meet Bertolt Meyer, the man who hacked his prosthetic arm to make thought-controlled music. The prototype device is called Synlimb, and it uses the same muscle signals that control Bertolt's prosthetic to change different parameters of the music, including pitch, filters, and more.</p>
<p>Subscribe to CNET:<br />
CNET playlists:<br />
Download the new CNET app:<br />
Like us on Facebook:<br />
Follow us on Twitter:<br />
Follow us on Instagram:<br />
<br /><a href="https://www.youtube.com/watch?v=4NBBfqhJ-R8">source</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://cincylink.com/2020/03/25/how-this-guy-hacked-his-arm-to-make-mind-music-%f0%9f%a4%af%f0%9f%a4%98/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
