• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Network Security

Who Got Hacked This Week? Nov. 12 Edition

Who and what was hacked this week, November 12th, 2016? Read on to find out.

November 12, 2016 Jonathan Blackwood Leave a Comment

Who Got Hacked

Note: Each week we bring you the latest hacking news on the internet. Read on to find out who and what was hacked this week.

 

20,000 Tesco Bank Member Have Money Stolen

The banking arm of the UK’s biggest retailer fell victim to a hacking attack late Saturday night and in the early hours of Sunday morning. Almost 20,000 Tesco Bank customers have had money stolen from their accounts. Tesco Bank confirmed that 40,000 of 136,000 accounts were affected. Tesco Bank has frozen online transactions to try to protect customers. Customers can still use debit and credit cards for cash withdrawals and payments. Tesco Bank assured customers it will reimburse any financial loss.

 

Indian Embassy Website Hacked in 7 Countries

The Indian Embassy Website was temporarily shut down after attackers hacked the site in Switzerland, Italy, Romania, Mali, South Africa, Libya and Malawi. The attackers leaked data on hundreds of Indian citizens living abroad, including name, address, email, passport number and phone number. According to The Hacker News, security pen-testers Kapustkiy and Kasimierz claimed responsibility, and did it for fun and to make the Indian Embassy aware of the sites insecurity.

 

U.S. Government Preventative Hacks Russia

U.S. military hackers penetrated Russia’s electric grid, telecommunications networks, and the Kremlin’s command systems prior to the election, according to NBC News. The act was a preventative measure to ensure that Russia did nothing to affect the election results. The hack left Russia vulnerable to attack by cyber weapons in case any action was taken. American officials have long said that Russia and other nations have left malware in parts of the U.S. critical infrastructure, and it has been suspected that the U.S. has done the same. Luckily, it seems no moves were made during the election.

 

318,000 Android Devices Compromised Thanks to Chrome Browser Vulnerability

Since August, 318,00 Android devices across the world have been infected by a Trojan virus. The attack tricks users to change device setting and allow installation of a third-party app in order to install the banking Trojan app by citing malware threats on the mobile device. The pop-up ad appears out of nowhere and instructs users to install a security app to remove the malware. It then automatically downloads an Android app installation file to the device without requiring approval. Google is working on a patch now.

 

Man Hacks Amazon Alexa to Speak Through Wall Mounted Fish

https://www.youtube.com/watch?v=eRoE6Hoz8DM

Developer Brian Kane modified his Amazon Echo and a Big Mouth Milly Bass device in order to speak to the fish.

 

Internet of Things Hacking Experiment Delivers Poor Results

Following the DDoS attack on Dyn that utilized IoT devices, Andrew McGill of The Atlantic designed an experiment to test IoT vulnerability. He set up a virtual Internet-connected toaster, put it online, and waited to see how long it took to be hacked. It only took 41 minutes for the toasters to be hacked. You can read a full interview with Andrew discussing the experiment at NPR.

 

Hackers Shut Down Finnish Heating System

A DDoS attack in Finland recently knocked out heating systems. At least two housing blocks in the city of Lappeenranta went offline due to the attack. Both the central heating and hot water systems attempted to fight back against the cyberattacks, automatically rebooting. This left them in an endless loop of restarting, resulting in the shutting down for over a week.

 

Voting Machine is Proven to be Susceptible to Hacking

Prior to the election, Cylance researches demonstrated techniques to prove that Sequoia AVC Edge Mk1 voting machine could be hacked.

Hillary Clinton’s Emails Potentially Hacked by 5 Countries

FBI investigators are now “99 percent sure” that Hillary Clinton’s private email server was breached by foreign hackers, sources close to the investigation claim.

Virginia Road Sign Hacked to Display Slur

In Woodbridge, Va., a road sign was hacked to display anti-Clinton and pro-Trump messages. The sign read, “CROOKED HILARY (sic) IS A B****” and “VOTE TRUMP.” No word on whether this sign affected Virginia voting trends.

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Jonathan Blackwood
Jonathan Blackwood

Jonathan Blackwood is the Editor-in-Chief of TechDecisions. Jonathan joined TechDecisions in 2014 and writes about technologies that help to innovate and improve practices for companies of all sizes, K-12 and higher education, government, healthcare, hospitality, retail and large venue spaces. He is especially interested in the future of work and education and the Internet of Things. Follow him @BlackwoodTweets.

Tagged With: Corporate, Cyber Attacks, Cyber Security

Related Content:

  • Cybersecurity and information or network protection. Future technology web services for business and internet project CrowdStrike Cyber Armageddon: How Do Firms Now Build…
  • DDoS, NETSCOUT Arbor Insight 7 Layers of DDoS Attacks and How To…
  • cisco webex-rooms-modern-space AVI-SPL Receives Cisco 2023 Reimagine Workspaces Partner of…
  • data breach Nearly 900 Schools Impacted by National Student Clearinghouse…

Free downloadable guide you may like:

  • Download TechDecisions' Blueprint Series report on Security Awareness now!Blueprint Series: Why Your Security Awareness Program is Probably Falling Short

    Learn about the evolution of phishing attacks and best practices for security awareness programs to ensure your organization is properly prepared to defend against them in this report from TechDecisions' Blueprint Series.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.