• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • COVID-19 Update
  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Subscribe
  • Project of the Week
  • About Us
    SEARCH
Network Security

Who Got Hacked This Week? Nov. 12 Edition

Who and what was hacked this week, November 12th, 2016? Read on to find out.

November 12, 2016 Jonathan Blackwood Leave a Comment

Who Got Hacked

Note: Each week we bring you the latest hacking news on the internet. Read on to find out who and what was hacked this week.

 

20,000 Tesco Bank Member Have Money Stolen

The banking arm of the UK’s biggest retailer fell victim to a hacking attack late Saturday night and in the early hours of Sunday morning. Almost 20,000 Tesco Bank customers have had money stolen from their accounts. Tesco Bank confirmed that 40,000 of 136,000 accounts were affected. Tesco Bank has frozen online transactions to try to protect customers. Customers can still use debit and credit cards for cash withdrawals and payments. Tesco Bank assured customers it will reimburse any financial loss.

 

Indian Embassy Website Hacked in 7 Countries

The Indian Embassy Website was temporarily shut down after attackers hacked the site in Switzerland, Italy, Romania, Mali, South Africa, Libya and Malawi. The attackers leaked data on hundreds of Indian citizens living abroad, including name, address, email, passport number and phone number. According to The Hacker News, security pen-testers Kapustkiy and Kasimierz claimed responsibility, and did it for fun and to make the Indian Embassy aware of the sites insecurity.

 

U.S. Government Preventative Hacks Russia

U.S. military hackers penetrated Russia’s electric grid, telecommunications networks, and the Kremlin’s command systems prior to the election, according to NBC News. The act was a preventative measure to ensure that Russia did nothing to affect the election results. The hack left Russia vulnerable to attack by cyber weapons in case any action was taken. American officials have long said that Russia and other nations have left malware in parts of the U.S. critical infrastructure, and it has been suspected that the U.S. has done the same. Luckily, it seems no moves were made during the election.

 

318,000 Android Devices Compromised Thanks to Chrome Browser Vulnerability

Since August, 318,00 Android devices across the world have been infected by a Trojan virus. The attack tricks users to change device setting and allow installation of a third-party app in order to install the banking Trojan app by citing malware threats on the mobile device. The pop-up ad appears out of nowhere and instructs users to install a security app to remove the malware. It then automatically downloads an Android app installation file to the device without requiring approval. Google is working on a patch now.

 

Man Hacks Amazon Alexa to Speak Through Wall Mounted Fish

Developer Brian Kane modified his Amazon Echo and a Big Mouth Milly Bass device in order to speak to the fish.

 

Internet of Things Hacking Experiment Delivers Poor Results

Following the DDoS attack on Dyn that utilized IoT devices, Andrew McGill of The Atlantic designed an experiment to test IoT vulnerability. He set up a virtual Internet-connected toaster, put it online, and waited to see how long it took to be hacked. It only took 41 minutes for the toasters to be hacked. You can read a full interview with Andrew discussing the experiment at NPR.

 

Hackers Shut Down Finnish Heating System

A DDoS attack in Finland recently knocked out heating systems. At least two housing blocks in the city of Lappeenranta went offline due to the attack. Both the central heating and hot water systems attempted to fight back against the cyberattacks, automatically rebooting. This left them in an endless loop of restarting, resulting in the shutting down for over a week.

 

Voting Machine is Proven to be Susceptible to Hacking

Prior to the election, Cylance researches demonstrated techniques to prove that Sequoia AVC Edge Mk1 voting machine could be hacked.

Hillary Clinton’s Emails Potentially Hacked by 5 Countries

FBI investigators are now “99 percent sure” that Hillary Clinton’s private email server was breached by foreign hackers, sources close to the investigation claim.

Virginia Road Sign Hacked to Display Slur

In Woodbridge, Va., a road sign was hacked to display anti-Clinton and pro-Trump messages. The sign read, “CROOKED HILARY (sic) IS A B****” and “VOTE TRUMP.” No word on whether this sign affected Virginia voting trends.

Jonathan Blackwood
Jonathan Blackwood

Jonathan Blackwood is the Editor-in-Chief of TechDecisions. Jonathan joined TechDecisions in 2014 and writes about technologies that help to innovate and improve practices for companies of all sizes, K-12 and higher education, government, healthcare, hospitality, retail and large venue spaces. He is especially interested in the future of work and education and the Internet of Things. Follow him @BlackwoodTweets.

Tagged With: Corporate, Cyber Attacks, Cyber Security

Related Content:

  • Zoom macOS Update Zoom on macOS Devices Now
  • DDoS, NETSCOUT Arbor Insight NETSCOUT Launches Arbor Insight for Enhanced DDoS Prevention
  • Video Production, Enterprise IT Modernizing Video Applications in Enterprise Environments
  • Zero Trust, ZTNA, Syxsense Syxsense Unveils New Module for Zero Trust Compliance

Free downloadable guide you may like:

  • Shadow ITBlueprint Series: How to Reduce Shadow IT

    The distributed work model gives employees the flexibility they demand, but it can lead to shadow IT and introduce unnecessary security risk. Research finds that this distributed work environment is leading to IT management blind spots and shadow IT.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Get the FREE Tech Decisions eNewsletter

Sign up Today!

Latest Downloads

Shadow IT
Blueprint Series: How to Reduce Shadow IT

The distributed work model gives employees the flexibility they demand, but it can lead to shadow IT and introduce unnecessary security risk. Resea...

Hybrid Work webinar
Featured Webcast: Collaboration 2.0 — Where Are We Now?

In this webinar, subject matter experts discuss the transformation of the workplace, the rise of hybrid workers, the importance of open connectivit...

guide to end user training cover
Pro Tips for Conducting End User Training

Effective trainings are the glue that can make the difference following a new technology implementation that your team has spent so much time, effo...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!
Sharp Microsoft Collaboration HQ Logo

Learn More About the
Windows Collaboration Display

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Subscribe to the Newsletter
  • Contact Us
  • Media Solutions & Advertising
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSTERMS OF USEPRIVACY POLICY

© 2022 Emerald X, LLC. All rights reserved.