header-pages-recommend-hacking-articles-v1

RECOMMENDED: HACKING / CYBERSECURITY ARTICLES

  • November 27, 2017

Welcome. This is a resource page with all recommended hacking articles/cybersecurity those in business nowadays should read. Every link shared here was personally read by PETERSON TEIXEIRA, hence the commentaries, the highlights and screenshots so you can know beforehand what you’re spending your time on before you click and read. Naturally, this resource page will be constantly updated and/or corrected to prevent any misleading information and to maintain a good, reliable list of top hacking/cybersecurity articles.

A WARNING
TARGET AUDIENCE: CEOs, Entrepreneurs
IMPORTANT: The majority of the articles here are recent, but you may find resources that date from 2013. Nonetheless, everything is extremely valuable if you intend to master the market. The goal is to provide all the greatest insights and information published online in these last years, “cybersecurity milestones” so to speak, so that you know everything there is to know from the Internet on Hacking and Cybersecurity in order to learn to identify threats, and also to protect your Business in our crazy online world.

LAST UPDATE: This page was last updated in November 27 of 2017

THE HACKING/CYBERSECURITY ARTICLES LIST
The list is decrescent, which means that the latest added article by PETERSON TEIXEIRA is the one on the top of the list. This doesn’t necessarily mean that the article’s publishing date is also recent because as said before, the objective is to collect all cybersecurity-related masterpieces from the whole Internet. Finding the needles in the haystack is the goal, not be the news.

The Links below are just so you can jump straight to the article, its highlights and commentary.

CYBERSECURITY ARTICLE #26

LINK: bit.ly/2B6AXCa
HEADLINE: Privacy: Extracting Location Data from Digital Images
PUBLISHER: The Guardian
COMMENTARY: Read this absurd. Read this. If you don’t yet know the whole story about Lavabit, the encrypted email provider that Snowden himself used to use and recommend, then you must check this out. This is cold hard proof of how governments are actively spying on citizens, making alliances with big businesses in order to violate people’s privacy with the “a matter of national security” excuse. Check all videos in the Lavabit Media mentions section and see what the founder went through in real life because of the FBI. Forbes used the right headline: ‘If You Knew What I Know About Email, You Might Not Use It’. Exactly. You wouldn’t.


CYBERSECURITY-Secrets-Lies-and-Snowden-email-why-forced-shutdown-Lavabit

CYBERSECURITY ARTICLE #25

LINK: bit.ly/2y54Pii
HEADLINE: Privacy: Extracting Location Data from Digital Images
PUBLISHER: Exposing The Invisible
COMMENTARY: Whenever you’re about to post some image online that was taken with your personal camera or smartphone, remember how hackers can explore your image’s metadata to discover private information about you. If you didn’t know about this, then read it. It’s a must. Then, test your personal images like the ones you took with your smartphone on tools like ReadExifData and ImageForensic. You’ll think twice before posting a picture online. And if you still need more motivation, here: What it looks like when the NSA Hacks into your Gmail and Facebook.


CYBERSECURITY-Extracting-Location-data-digital-images

CYBERSECURITY ARTICLE #24

LINK: bit.ly/2zsVkxh
HEADLINE: Hackers Can Steal Data from Air-Gapped Computers Using IR CCTV Cams
PUBLISHER: The Hacker News
COMMENTARY: When you think you saw everything there is to see in hacking, once again you find yourself extremely surprised. This is something I would only expect to see in the Scorpion Series, which makes this even more impressive. Make sure to check both videos in this article.


CYBERSECURITY-Hackers-can-steal-data-from-air-gapped-computers-using-IR-CCTV-cameras

CYBERSECURITY ARTICLE #23

LINK: bit.ly/2iHrY3U
HEADLINE: ISPs May Be Helping Hackers to Infect you with FinFisher Spyware
PUBLISHER: The Hacker News
COMMENTARY: You need to read this. This is why I constantly say there’s nothing 100% secure and that you cannot trust 3rd parties. There’s always something out of your control, whether you like it or not.


CYBERSECURITY-ISPs-may-helping-hackers-infect-you-with-FinFisher-spyware

CYBERSECURITY ARTICLE #22

LINK: bit.ly/2xuO1Dc
HEADLINE: Cybercriminal Investigations Report
PUBLISHER: Cybersecurity Ventures
COMMENTARY: One more time: Just like Cybersecurity Article #10 and Cybersecurity Article #20 and Cybersecurity Article #21 this joins the must-read collection. A horde of precious links so you can know what’s really happening to businesses, people and hackers all over the world when the subject is cybersecurity. See who is getting arrested, and how companies are getting punched in the face. Fun stuff. Enjoy your links my friend.


CYBERSECURITY-Cybercriminal-Investigations-Report

CYBERSECURITY ARTICLE #21

LINK: bit.ly/2eU3HFk
HEADLINE: Data Breach and Cyberattacks Report To C-levels and The Media
PUBLISHER: Cybersecurity Ventures
COMMENTARY: I know, repetitive right? But there’s no other way to say this. Just like Cybersecurity Article #10 and Cybersecurity Article #20, this is another must-read. This article also goes back up until January 3rd. Enjoy all the links.


CYBERSECURITY-Data-breach-cyberattacks-report-C-levels-the-Media

CYBERSECURITY ARTICLE #20

LINK: bit.ly/2w36EhN
HEADLINE: Dark Web Global Criminal Activity
PUBLISHER: Cybersecurity Ventures
COMMENTARY: Just like Cybersecurity Article #10, this is ANOTHER must-read and unique resource because of the vast number of high-quality links. This article proves that cybercrime is a present reality in our society, with many criminals moving under our noses through the Dark Web on a daily basis. Here you’ll see a lot of the dirt happening behind the scenes in the online space that mainstream media doesn’t talk about much. Very rare resource (it goes up until January 3rd). Enjoy.


CYBERSECURITY-Dark-Web-Global-Criminal-Activity

CYBERSECURITY ARTICLE #19

LINK: bit.ly/2B2IC4y
HEADLINE: Over 100 Snooping Tor Nodes Have Been Spying on Dark Web Sites
PUBLISHER: Motherboard (VICE)
COMMENTARY: If you think you’re secure just because you are browsing the Dark Web using Tor, then think again. Law enforcement and hackers are setting up onion honeyspots to investigate and uncover what Dark Web URLs people are visiting. Be careful. Karlstad University in Sweden partnered with SBA Research in Austria to publish a paper explaining the secrets discovered on this. Read it.


CYBERSECURITY-Over-100-tor-nodes-have-been-spying-dark-web-sites

CYBERSECURITY ARTICLE #18

LINK: bit.ly/2jh5FEY
HEADLINE: Equifax Breach, Affecting 45% of US Population, Raises Big Questions
PUBLISHER: Infosecurity Magazine
COMMENTARY: I’m just going to quote one powerful paragraph in this article: “The size of the breach, quality and quantity of personal information, and far-reaching impact make it unprecedented,” she told Infosecurity. “Imagine if one out of every two people walking down the street dropped their credit card, along with a sticky note on the back with all their personal information needed to access that card. Now imagine that happening in every city across the county.. This proves the dangers of having your own personal data in the hands of third-parties. The U.S. took a huge hit with this, because there are only 125 million households in the U.S. and the financial data of 143 million consumers was leaked. The irony about all this? It was The New York Times who made a very good job answering people in a massive article about how to protect yourself after the breach, not Equifax.


CYBERSECURITY-Equifax-breach-affecting-45-percent-US-population

CYBERSECURITY ARTICLE #17

LINK: bit.ly/2wUY83l
HEADLINE: The Great Big List of Cybersecurity Resources
PUBLISHER: CSO Online
COMMENTARY: A very I.M.P.R.E.S.S.I.V.E Cybersecurity Resource list. Seriously. Just check these links in this article and you’ll see what I’m talking about. And check PETERSON TEIXEIRA’s resource page too if links that allow you to master business and marketing on an international scale is what you want. Remember: If you know all the best business-related links on the Internet, you have a huge advantage over your competition. There’s precious information in the haystack, you just have to find them. You’re welcome.


CYBERSECURITY-Great-big-list-of-cybersecurity-resources

CYBERSECURITY ARTICLE #16

LINK: symc.ly/2iHpYIW
HEADLINE: Western Energy Sector Targeted by Sophisticated Attack Group
PUBLISHER: Symantec
COMMENTARY: This subject is no joke. Since we entered the Era of connectivity and information, almost everything in society relies on power grids and internet to function. Almost everything. This is why in the genius Live Free or Die Hard (Die Hard 4) movie with Bruce Willis, hackers do a “Fire Sale”, where they attack all USA’s infrastructure using just cyber attacks in 3 stages: 1) Shut down all transportation systems, such as traffic lights, railroad lines, subway system and airport systems; 2)Disable the financial systems; including Wall Street, banks and financial records; 3) Turn off public utility systems, such as electricity, gas lines, telecommunications and satellite systems. If the whole infrastructure is down, businesses, stores and banks are useless. This is a possible real-life scenario, hence the warning by Symantec. Bad, skilled hackers are aiming exactly at what we all need the most: our infrastructure. Conclusion: even if everything is going good, like stocks, the market and your revenue streams, it just takes a few cyber attacks to impact your country’s cybernetic defenses and ultimately, your business. So although you may be effective in protecting your business from hackers, if the whole infrastructure of your country falls, you’re done. Sadly, your business depends on 3rd parties. Just keep that in mind.


CYBERSECURITY-Western-energy-sector-targeted-by-sophisticated-hackers

CYBERSECURITY ARTICLE #15

LINK: bit.ly/2wKseGt
HEADLINE: Hackers Can Use Ultrasounds to Take Control of Alexa, Siri, Cortana
PUBLISHER: Bleeping Computer
COMMENTARY: Nothing is 100% secure. Nothing. Check it out what these chinese security experts did with Alexa, Siri, Google now and other famous voice assistants using just ultrasound waves to hack the systems. Just watch the 42-second video. This was published in a paper by the Zhejiang University security experts.


CYBERSECURITY-Hackers-can-use-ultrasounds-take-control-of-Alexa-Siri-Cortana-others

CYBERSECURITY ARTICLE #14

LINK: bit.ly/2jheH1r
HEADLINE: Malvertising is Threatening You More Than You Think
PUBLISHER: ITProPortal
COMMENTARY: A quick must-read. Read this. Especially because of the infographic with malvertising data at the end of this article. A few important warnings that many in the ad industry are ignoring. Enjoy.


CYBERSECURITY-Malvertising-threatening-more-than-you-think

CYBERSECURITY ARTICLE #13

LINK: ubm.io/2B45jp6
HEADLINE: New Facebook, Instagram Bugs Demonstrate Social Media Risk
PUBLISHER: Dark Reading
COMMENTARY: An article like this one involving temporary states isn’t what usually gets in this list, but this is just to prove that attackers are exploiting social media websites and apps to hack into business accounts, to do more damage later. People rely too much on social and forget the costly risks. The Dow Jones industrial average dropped almost 1% just because of fake tweets posted by hackers to the Twitter account of The Associated Press. Just like lack of proper security, bugs in social platforms can also give opportunities to hackers to do massive damage to a business. I think is time to ask yourself: How often Are Social Media Accounts Hacked?. Because depending on the brand’s size and reputation, consequences are huge and may involve lawsuits, brand reputation management etc. Evaluate all risks. Because third-party companies like Facebook and Instagram can suffer a hack and you also get hit in the face. Don’t forget that hackers can impersonate you on the phone once in possession of your personal data which usually gives them access (or semi-access) to additional accounts. Therefore, always consider all scenarios in business. Always. For every platform that has your data, there’s a business risk involved.


CYBERSECURITY-New-Facebook-Instagram-bugs-demonstrate-social-media-risk

CYBERSECURITY ARTICLE #12

LINK: ubm.io/2gpNZ8O
HEADLINE: Why You Need to Study Nation-State Attacks
PUBLISHER: Dark Reading
COMMENTARY: All top hackers are usually pioneers or very creative when attacking their targets, which is what allows them to make all big accomplishments that you see in the news. Therefore, nation-wide attacks reveal to the hacking community all moves made by true experts, where unique techniques are used to bypass cyber defenses and invade highly protected systems. So what’s the problem for companies? The problem is that when an attack gets the news, it validates some new hacking techniques for the less skilled hackers and to script kiddies as well, giving them the “How-Tos” and Guidelines to breach businesses and organizations of smaller size. Obviously. Hence the reason for businessmen, entrepreneurs, and cybersecurity experts to study nation-wide cyber attacks. Because many of the attacks coming for your business, are nation-wide attacks replicated on a smaller scale.


CYBERSECURITY-Why-you-need-study-nation-wide-attacks

CYBERSECURITY ARTICLE #11

LINK: bit.ly/2upbFAt
HEADLINE: Photographer Proves End of Privacy Is Here Through Random Photos
PUBLISHER: Anonymous News
COMMENTARY: GENIUS experiment. Just read this!


CYBERSECURITY-Protographer-proves-end-of-privacy-through-photos

CYBERSECURITY ARTICLE #10

LINK: bit.ly/2mSucls
HEADLINE: HackerApocalypse: Cybercrime Report
PUBLISHER: Cybersecurity Ventures
COMMENTARY: This is a very UNIQUE resource if you want to know more about cybercrime and cybersecurity data. Not because the article itself is extremely smart, but instead because of the HUGE number of precious links to many other expert and news resources. A feast for consulting companies and those who want to understand cybersecurity from a global perspective, backed by data. Another must-read. Enjoy.


CYBERSECURITY-Hackerapocalypse-cybercrime-report

CYBERSECURITY ARTICLE #9

LINK: bit.ly/2wqfmCF
HEADLINE: Anatomy of a Privacy Fail: When “Dark Data” Gives Away your Identity
PUBLISHER: Naked Security
COMMENTARY: Another must-read. Naked Security demonstrated some very powerful ways to deconstruct anonymized data to turn it into personal data, with some techniques being quite simple that almost anyone with basic internet knowledge can replicate. There are some great revelations in here. And if you read Cybersecurity Article #8 and its commentary, you’ll enjoy reading this for sure. This article is probably even better than Article #8 because of the technical demonstrations.


CYBERSECURITY-When-Dark-Data-gives-away-your-identity

CYBERSECURITY ARTICLE #8

LINK: bit.ly/2vn6JMb
HEADLINE: The Big Data Picture: Just How Anonymous Are “Anonymous” Records?
PUBLISHER: Naked Security
COMMENTARY: READ THIS! This is a must-read for anyone who trusts in third-party entities keeping their “anonymous data” because it shows how anonymous data is not actually anonymous at all, once you know how to deconstruct what you have at hand. What the researchers did with credit card metadata is impressive, to say the least. You’ll see how they uncover a person’s buying activity by cross-referencing different data sources. Another practical example is Bitcoin usage for shopping. Cybersecurity researchers proved that web merchants routinely leak data when Bitcoin purchases are made (like name and email), allowing bitcoin holders to be identified through these leaks. These two points are just a few facts that prove that data deanonymization is more real and doable than people think. Remember that every time you provide “anonymous data” to “secure” parties.


CYBERSECURITY-The-Big-Data-picture-how-anonymous-are-anonymous-data

CYBERSECURITY ARTICLE #7

LINK: mwne.ws/2ht8UIc
HEADLINE: Cisco Report Predicts NEW “Destruction of Service” Attacks Threats
PUBLISHER: Market Wired
COMMENTARY: Security experts are almost sure that the Petya attack was made with a cyber-espionage purpose targeting Ukraine. The argument to support that conclusion is that Petya doesn’t allow you to retrieve your data even if you choose to pay the hackers. The emails of the criminals responsible went offline, making any payments impossible. Therefore, makes sense that the goal of this “ransomware” was only one: To destroy. Because of this argument, that does qualify as a “destruction of service” attack. The Guardian also published an article talking about how Petya was NOT designed to make money. So what can we all conclude from this? Probably this: A) Script kiddies bought malicious code on the Dark Web and were testing its destructive power to have some fun; B) This was professional hackers testing the efficiency of the code for further use in cyber wars, or to use against businesses, organizations, power grids etc. The latter is more likely to be the truth, so you better get your cyber defenses ready because businesses may see the 1st War that also targets companies, to deteriorate a nation’s economy from within.


CYBERSECURITY-Cisco-Midyear-cybersecurity-report-predicts-destruction-of-service-attacks

CYBERSECURITY ARTICLE #6

LINK: read.bi/2hNfM0H
HEADLINE: Marine Cyber Warrior: Hackers are Transforming Modern Combat
PUBLISHER: Business Insider
COMMENTARY: Interesting read about how hackers and cyber attacks are disrupting even modern warfare. Check out all 5 areas.


CYBERSECURITY-Former-Marine-cyberwarrior-explains-how-hackers-will-transform-war

CYBERSECURITY ARTICLE #5

LINK: bit.ly/2A1tjvB
HEADLINE: The Ad-Tech Industry Must Finally Admit That Ads is Dangerous
PUBLISHER: Jeremiah Grossman
COMMENTARY: Jeremiah Grossman is a well-known security expert, founder of one of America’s most promising white-hat security companies (Forbes) and a speaker at BlackHat USA events. As you’re about to see, he revealed some interesting facts about the ad-tech industry. It seems that those in cybersecurity, will opt for Adblocker software over anti-malware in order to protect their computers from threats. That’s rather worrisome. Marketing folks now have additional pressure against their work because users will have another reason to block ads other than blocking retargeting. Make sure to check his short article. And if you’re also into fighting, you can check his jiu-jitsu fight against UFC fighter Nate Diaz as well.


CYBERSECURITY-The-Ad-Tech-industry-must-finally-admit-ads-is-dangerous

CYBERSECURITY ARTICLE #4

LINK: ubm.io/2B3mhnn
HEADLINE: FBI Highlights BEC, Tech Support Scams, Ransomware
PUBLISHER: Dark Reading
COMMENTARY: By reading this resource you’ll see how attackers are getting creative, especially through BEC attacks. As always, the weakest link in the security chain is the human. Therefore, if business people fail to notice what the “dark side” has been doing to steal some chips from the good side, then they deserve what’s coming their way.


CYBERSECURITY-FBI-Highlights-BEC-Ransomware-concerns

CYBERSECURITY ARTICLE #3

LINK: for.tn/2A1cHEI
HEADLINE: How Business Is Fighting Back Against the Explosion in Cybercrime
PUBLISHER: Fortune
COMMENTARY: Hacking and Cyberwarfare are two problems coming to haunt the business world where most victims are completely clueless and unprotected from cyber criminals. That’s the ideal scenario for those who want an easy criminal life. If you check the absurd numbers below, they’re in the house of BILLIONS. Just to give you an idea of the proportions of cybercrime profitability, Elon Musk’s SpaceX company is currently valued at a little more than 20 billion dollars. A few Russian Hackers made 5 million a day by simply faking 300M video views. Do that for a few months in a row and you got a “revenue” close to a real, top of the world company. Hackers know that. Also, things are getting a lot easier for those who want to hack. Hackers recreated NSA snooping Kit using off-the-shelf parts. You see that Rogue governments are also using off-the-shelf hardware/software, hackers-for-hire, and attacks against major enterprises and governments are just tens of thousands of dollars. Seems a lot to pay for a hack? Not if the prize is a billion dollar company. I see may entrepreneurs and businessmen ignoring this today, but the fact is that there’s real danger to businesses right now. Real danger. You can lose a whole company in a hack. Almost anyone with bad intent today can simply buy things like ransomware-as-a-service on the Dark Web and unleash mayhem upon companies, and that’s just one attack type you can buy. You can hire DDoS-as-a-service too if you want. Pick your hack and enjoy yourself. Therefore, you better be prepared for what’s coming because with a huge financial crisis coming our way, everybody will start looking for “easy money”. And with the right, professional-grade hacking tools, cybercrime is just that. Easy money.


CYBERSECURITY-How-business-is-fighting-back-against-explosion-cybercrime

CYBERSECURITY ARTICLE #2

LINK: bit.ly/2B44vk4
HEADLINE: Estonia’s Digital Policies are Ahead of Much of The Western World’s
PUBLISHER: Quartz
COMMENTARY: Impressive. Estonia evolved really fast in cybersecurity, data policies and government transparency. All this progress was forced upon them as a direct consequence of communism and a cyber warfare. The end result: Citizens aren’t afraid of new cyberwars happening in their country anymore, because they’re prepared. A lesson to countries that ignore the true dangers of online attacks.


CYBERSECURITY-Estonia-digital-policies-much-ahead-the-western-world

CYBERSECURITY ARTICLE #1

LINK: bit.ly/2zdlxf3
HEADLINE: Famed Hacker Kevin Mitnick Shows You How to Go Invisible Online
PUBLISHER: Wired
COMMENTARY: A MUST-READ. Kevin Mitnick explains step-by-step how to actually go invisible online, linking some points of the process to the Snowden saga to make you understand things better. It reveals what pieces of information some websites and the government are extracting from a normal internet user to then show you what actual technical actions need to be taken in order to become truly invisible online. Read this. Great article.


CYBERSECURITY-Hacker-kevin-mitnick-shows-how-to-go-invisible-online