Welcome to Smokey's Security Forums.
Guests only have limited access to the board and it's features, please consider registering to gain full access!
Registration is free and it only takes a few moments to complete.

Smokey's Security Forums

Please login or register.

Login with username, password and session length
Advanced search  

News:

This malware just got more powerful by adding the WannaCry trick to its arsenal

The Retefe banking trojan is now using the EternalBlue exploit that helped spread WannaCry to make attacks more effective.

This malware just got more powerful by adding the WannaCry trick to its arsenal

Malware Log Analysis & Removal Help * Ransomware Encryption & Decrytion Techniques * Official Jetico Inc. Support Forums

Share this topic on FacebookShare this topic on MySpaceShare this topic on RedditShare this topic on TwitterAuthorTopic: Feds charge NSA contractor for leaking Top Secret report about Russia hacking election  (Read 75 times)

0 Members and 1 Guest are viewing this topic.

ChubbTopic starter

  • Freebies and Good Deals Mod
  • Administrator
  • *
  • Offline Offline
  • Posts: 66511
  • .: Freebie King
Feds charge NSA contractor for leaking Top Secret report about Russia hacking election
6 June 2017, 3:42 pm



Russian military intelligence hackers, believed to be working within the Russian General Staff Main Intelligence Directorate (GRU), tried to break into VR Systems, a company that sells voting registration equipment which was used in the 2016 election. That’s what the NSA determined, according to a classified intelligence report which was leaked to The Intercept.

An hour after The Intercept published the NSA document, the Justice Department announced charges against Reality Leigh Winner, a 25-year-old intelligence contractor working for Pluribus International Corporation in Georgia. She had only been working as a Pluribus contractor since Feb. 13. Winner, accused of “removing classified material from a government facility and mailing it to a news outlet,” has been charged with Espionage Act.

To read this article in full or to leave a comment, please click here



Source: Network World Security

>> To obtain the full NetworkWorld Security article, click the link in the first post line <<
 

* Permissions
You can't post new topics.
You can't post replies.
You can't post attachments.
You can't modify your posts.
BBCode Enabled
Smilies Enabled
[img] Enabled
HTML Disabled


Except where otherwise stated, all content, graphics, banners and images included © 2006 - 2017 Smokey Services™ -- All rights reserved
Design board graphics, banners and images by Meg&Millie - Emma aka Tinker

This site does not store profiling-, tracking-, third-party and/or any other non-essential cookie(s) on client computers and is fully compliant with the EU ePrivacy Directive
Smokey's does not use any Web Analytics/Analysis Service, and also does not use any browser fingerprinting techniques

    

  

Smokey's also provides free fully qualified FRST (Farbar Recovery Scan Tool) Log / Malware Analysis & Removal Help and System Health Checks
rifle
rifle
rifle
rifle