{"id":11995,"date":"2024-07-07T13:07:21","date_gmt":"2024-07-07T13:07:21","guid":{"rendered":"https:\/\/thisbiginfluence.com\/?p=11995"},"modified":"2024-07-07T13:07:21","modified_gmt":"2024-07-07T13:07:21","slug":"hackers-leaking-taylor-swift-tickets-dont-get-your-hopes-up","status":"publish","type":"post","link":"https:\/\/thisbiginfluence.com\/?p=11995","title":{"rendered":"Hackers Leaking Taylor Swift Tickets? Don\u2019t Get Your Hopes Up"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p>Proton, the corporate behind Proton Mail, <a href=\"https:\/\/www.wired.com\/story\/proton-docs-end-to-end-encryption-google-docs\/\">launched an end-to-end encrypted alternative to Google Docs<\/a>, in search of to compete with the cloud large on privateness. We broke down how Apple is taking the same method with its implementation of AI, utilizing a system it calls <a href=\"https:\/\/www.wired.com\/story\/apple-intelligence-android-hybrid-ai-privacy\/\">Private Cloud Compute<\/a> in its new Apple Intelligence options.<\/p>\n<p class=\"paywall\">In different information, we dug into how the US bans on TikTok and Kaspersky software program, regardless of their nationwide safety justifications, <a href=\"https:\/\/www.wired.com\/story\/tiktok-kaspersky-us-ban-internet-freedom\/\">pose a threat to internet freedom<\/a>. We went inside a <a href=\"https:\/\/www.wired.com\/story\/us-state-department-diplomacy-school\/\">crash course for US diplomats<\/a> on cybersecurity, privateness, surveillance, and different digital threats. And we printed an in-depth investigation into the origins of the world\u2019s hottest 3D-printed gun, which revealed that its creator was a <a href=\"https:\/\/www.wired.com\/story\/3d-printing-guns-fgc9-creator-jacob-dugyu-jstark1809\/\">self-described \u201cincel\u201d with fantasies of right-wing terror<\/a>.<\/p>\n<p class=\"paywall\">However that\u2019s not all. Every week, we spherical up the safety information we didn\u2019t cowl in depth ourselves. Click on the headlines to learn the complete tales, and keep secure on the market.<\/p>\n<p class=\"paywall\">The large <a href=\"https:\/\/www.wired.com\/story\/snowflake-breach-ticketmaster-santander-ticketek-hacked\/\">hack against Ticketmaster<\/a> could have taken one other twist. In June, felony hackers claimed that they had stolen 560 million folks\u2019s data from the ticketing firm owned by Dwell Nation. The corporate has since confirmed a breach, saying its data was taken from its <a href=\"https:\/\/www.wired.com\/story\/epam-snowflake-ticketmaster-breach-shinyhunters\/\">Snowflake account<\/a>. (Greater than 165 Snowflake prospects had been impacted by assaults on the cloud storage firm that exploited a <a href=\"https:\/\/www.wired.com\/story\/snowflake-breach-advanced-auto-parts-lendingtree\/\">lack of multi-factor authentication and stolen login details<\/a>).<\/p>\n<p class=\"paywall\">Now in a put up on cybercrime market BreachForums, a hacker going by the title of Sp1d3rHunters is threatening to publish extra information from Ticketmaster. The <a data-offer-url=\"https:\/\/x.com\/troyhunt\/status\/1809079453882200513\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/x.com\/troyhunt\/status\/1809079453882200513&quot;}\" href=\"https:\/\/x.com\/troyhunt\/status\/1809079453882200513\" rel=\"nofollow noopener\" target=\"_blank\">account claims to be sharing<\/a> 170,000 ticket barcodes for upcoming Taylor Swift gigs within the US throughout October and November. The hacker demanded Ticketmaster \u201cpay us $2million USD\u201d or it should leak \u201c680 million\u201d customers\u2019 data and publish thousands and thousands extra occasion barcodes, together with for concert events by artists corresponding to Pink and Sting, and sporting occasions corresponding to NFL video games and F1 races.<\/p>\n<p class=\"paywall\">The claims seem like doubtful, nonetheless, as Ticketmaster&#8217;s barcodes aren&#8217;t static, in response to the corporate. \u201cTicketmaster\u2019s SafeTix expertise protects tickets by robotically refreshing a brand new and distinctive barcode each few seconds so it can&#8217;t be stolen or copied,\u201d a Ticketmaster spokesperson tells WIRED in a press release. The spokesperson provides that the corporate has not paid any ransom or engaged with the hackers\u2019 calls for.<\/p>\n<p class=\"paywall\">Hacker teams are recognized to lie, exaggerate, and overinflate their claims as they attempt to get victims to pay. The 680 million prospects that Sp1d3rHunters claimed to have information on is larger than the unique determine supplied when the Ticketmaster breach was first claimed, and neither quantity has been confirmed. Even when victims do determine to pay, hackers can nonetheless hold the info and attempt to <a href=\"https:\/\/www.wired.com\/story\/change-healthcare-ransomhub-threat\/\">extort companies for a second time<\/a>.<\/p>\n<p class=\"paywall\">Regardless of the breach at Ticketmaster initially being publicized in June, the corporate has <a data-offer-url=\"https:\/\/x.com\/troyhunt\/status\/1809079453882200513\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/x.com\/troyhunt\/status\/1809079453882200513&quot;}\" href=\"https:\/\/x.com\/troyhunt\/status\/1809079453882200513\" rel=\"nofollow noopener\" target=\"_blank\">only recently<\/a> begun emailing prospects alerting them to the incident, which occurred between April 2 and Might 18 this yr. The corporate <a data-offer-url=\"https:\/\/help.ticketmaster.com\/hc\/en-us\/articles\/26110487861137-Ticketmaster-Data-Security-Incident\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/help.ticketmaster.com\/hc\/en-us\/articles\/26110487861137-Ticketmaster-Data-Security-Incident&quot;}\" href=\"https:\/\/help.ticketmaster.com\/hc\/en-us\/articles\/26110487861137-Ticketmaster-Data-Security-Incident\" rel=\"nofollow noopener\" target=\"_blank\">says<\/a> the database accessed could embrace emails, telephone numbers, encrypted bank card data, and different private data.<\/p>\n<p class=\"paywall\">Lately, there\u2019s been a pointy uptick in cybercriminals deploying infostealers. This malware can seize all the login and monetary particulars that somebody enters on their machine, which hackers then promote to others who wish to exploit the knowledge.<\/p>\n<p class=\"paywall\">Cybersecurity researchers at Recorded Future have now printed <a data-offer-url=\"https:\/\/therecord.media\/stolen-credentials-csam-unmasked-report\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/therecord.media\/stolen-credentials-csam-unmasked-report&quot;}\" href=\"https:\/\/therecord.media\/stolen-credentials-csam-unmasked-report\" rel=\"nofollow noopener\" target=\"_blank\">proof-of-concept findings<\/a> displaying these stolen login particulars can be utilized to <a data-offer-url=\"https:\/\/www.recordedfuture.com\/caught-in-the-net-using-infostealer-logs-to-unmask-csam-consumers\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.recordedfuture.com\/caught-in-the-net-using-infostealer-logs-to-unmask-csam-consumers&quot;}\" href=\"https:\/\/www.recordedfuture.com\/caught-in-the-net-using-infostealer-logs-to-unmask-csam-consumers\" rel=\"nofollow noopener\" target=\"_blank\">potentially track down people visiting dark-web<\/a> youngster sexual abuse materials (CSAM) websites. Inside infostealer logs, the researchers say they had been capable of finding hundreds of login particulars for recognized CSAM web sites, which they might then cross-reference with different particulars and determine the potential real-world names linked to the abusive web site logins. The researchers reported particulars of people to regulation enforcement.<\/p>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/www.wired.com\/story\/ticketmaster-taylor-swift-ticket-leak-security-roundup\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Proton, the corporate behind Proton Mail, launched an end-to-end encrypted alternative to Google Docs, in search of to compete with the cloud large on privateness. We broke down how Apple is taking the same method with its implementation of AI, utilizing a system it calls Private Cloud Compute in its new Apple Intelligence options. In [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":11997,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[3469,5048,2251,9726,6382,1209,9727],"class_list":["post-11995","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech","tag-dont","tag-hackers","tag-hopes","tag-leaking","tag-swift","tag-taylor","tag-tickets"],"_links":{"self":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/posts\/11995","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=11995"}],"version-history":[{"count":0,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/posts\/11995\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/media\/11997"}],"wp:attachment":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=11995"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=11995"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=11995"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}