Search Results for “Wired”


September 11, 2019
Lily Hay Newman / Wired

Lily Hay Newman / Wired  
Operation reWired Results in Global Arrests of 281 Suspects in Business Email Compromise Schemes

In its biggest move to date against this kind of scam, the Justice Department announced the arrest of 281 suspects in connection with email scams and wire transfer fraud known as business email compromise. The mass effort, dubbed Operation reWired, involved extensive international coordination to make 167 arrests in Nigeria, 74 in the United States, 18 in Turkey, and 15 in Ghana, with the remaining arrests taking place in France, Italy, Japan, Kenya, Malaysia, and the United Kingdom. Numerous law enforcement agencies across the globe were involved, including, in the US alone, the DOJ, the Department of Homeland Security, the Treasury, the State Department, and the Postal Inspection Service.

Related: The Register – Security, Justice.gov, Homeland Security Today, Bleeping Computer, Data Breaches.net, TechNadu, Spyware, Austin-American Statesman, Cyberscoop, UPI.com, USATODAY, The Hill: Cybersecurity


September 27, 2019
Lily Hay Newman / Wired

Lily Hay Newman / Wired  
DEF CON 27 Voting Village Report Released Showing Vulnerabilities in Top Voting Machines Used in Nearly 30 States

The organizers of DEF CON’s annual voting machine hacking village released the results of this year’s efforts where participants vetted dozens of voting machines, including a prototype model built on secure, verified hardware through a Defense Advanced Research Projects Agency program. Their report highlights detailed vulnerability findings related to six models of voting machines, most of which are currently in use, including the ES&S AutoMARK, used in 28 states in 2018, and Premier/Diebold AccuVote-OS, used in 26 states that same year. Among the vulnerabilities found were inadequate physical security protections that could allow undetected tampering, easily guessable hardcoded system credentials, the potential for operating system manipulations, and remote attacks that could compromise memory or integrity checks or cause a denial of service.

Related: Dark Reading, Cyberscoop, CNN.com – Politics, The Register – Security, The Hill: Cybersecurity, Defcon (PDF), Politico

Tweets:@mattblaze @ericgeller @ericgeller

Dark Reading: Voting Machine Systems New & Old Contain ‘Design’ Flaws
Cyberscoop: DEF CON Voting Village report explores vulnerabilities in ballot-marking devices, calls for paper-based audits
CNN.com – Politics: Hackers find voting machines used throughout the US are vulnerable to attack
The Register – Security: Accept certain inalienable truths: Prices will rise, politicians will philander… And US voting machines will be physically insecure
The Hill: Cybersecurity: Hacker conference report details persistent vulnerabilities to US voting systems
Defcon: DEF CON 27Voting MachineHacking Village (PDF)
Politico: First in MC: DEF CON reveals election security findings

@mattblaze: Getting ready for the ?@VotingVillageDC ? report release, in the not-at-all-easy-to -find auditorium of the Capitol Visitor Center (turn around after you get through security and go through the doors and down the stairs.
@ericgeller: @VotingVillageDC has officially released the report that we brought you this AM, with lots of details about what hackers found in currently used voting systems: https://media.defcon.org/DEF%20CON%2027/voting-village-report-defcon27.pdfPress event starting shortly w/ @mattblaze @HarriHursti @MaggieMacAlpine @RonWyden @RepSpeier
@ericgeller: Obviously most people's attention is elsewhere right now, but...Scoop: Popular electronic voting machines contain a host of security vulnerabilities, @VotingVillageDC said in a report set for release today and provided first to Politico. Lots in here. https://politico.com/newsletters/mo


August 30, 2019
Lily Hay Newman / Wired

Lily Hay Newman / Wired  
Intricate Watering Hole Websites Were Used to Indiscriminately Hack Thousands of iPhones for Two Years, Attackers Able to Gain Complete Control Over Phones, Google Project Zero

For two years, an attacker used a rich collection of iPhone vulnerabilities to indiscriminately hack thousands of iPhones just by getting users to visit malicious “watering hole” websites, Google’s Project Zero security research team has revealed. In a rare and intricate situation, the websites had assembled five so-called exploit chains, tools that link together security vulnerabilities, allowing a hacker to penetrate each layer of iOS’s digital protections, exploiting a total of 14 security flaws, targeting everything from the browser’s “sandbox” isolation mechanism to the core of the operating system known as the kernel, ultimately gaining complete control over the phone. The researchers say the malicious sites were programmed to assess devices that loaded them and to compromise them with powerful monitoring malware if possible. Almost every version of iOS 10 through iOS 12 was potentially vulnerable to the sites which were active since at least 2017 and had thousands of visitors per week. The malware could provide deep access to the devices and could monitor live location data, or be used to grab photos, contacts, and even passwords and other sensitive information from the iOS Keychain. The malware could also allow the attackers to potentially read or listen to communications sent through encrypted messaging services, like WhatsApp, iMessage, or Signal.  Google says it alerted Apple to its zero-day iOS vulnerabilities on February 1, and Apple patched them in iOS 12.1.4, released on February 7.

Related: ZDNet Security, iNews, Techradar, Softpedia News, Digital Trends, 9to5Google, The Next Web, CNET, BetaNews, Tech Insider, City A.M. – Technology, Engadget, CTVNews.ca, Digital Journal, RAPPLER, Channel News Asia, Fast Company, The Verge, AppleInsider, The Hacker News, Glock Takes Stock, ibtimes.sg : Top News, MSPoweruser, TechSpot, VICE News, TechCrunch, VICE News, Techradar, NDTV Gadgets360.com, The Guardian, Silicon Republic, Mashable, The Guardian, ITV News, Sky News, Evening Standard, Google Project Zero

ZDNet Security: Google finds malicious sites pushing iOS exploits for years
iNews: iPhone hack: Apple security breach targeted contacts, images and other data for years, Google says
Techradar: A major Google Chrome bug could let criminals attack your PC remotely
Softpedia News: Google Finds Massive iPhone Vulnerability that Was Exploited for Years
Digital Trends: Google claims user data on iPhones was open to hackers for two years
9to5Google: Google researchers detail malicious website exploits that targeted iPhone users for years
The Next Web: Google researchers reveal data-stealing, web-based iPhone exploit that was active for years
CNET: Google says iPhone security flaws let websites hack them for years
BetaNews: Google security researcher warns that hackers are using malicious websites to exploit iOS flaws and monitor iPhone users
Tech Insider: Google researchers found a bunch of malicious sites that quietly hacked iPhones for years
City A.M. – Technology: Google uncovers ‘indiscriminate’ iPhone hack attack
Engadget: Google uncovers exploit-laden websites that stole data from iPhones
CTVNews.ca: Google finds years-long ‘indiscriminate’ iPhone hack
Digital Journal: Google reveals years-long ‘indiscriminate’ iPhone hack
RAPPLER: Google reveals years-long ‘indiscriminate’ iPhone hack
Channel News Asia: Google reveals years-long ‘indiscriminate’ iPhone hack
Fast Company: Google discovered websites that could hack your iPhone just by visiting them
The Verge: Google reveals major iPhone security flaws that let websites hack phones
AppleInsider: iPhone exploits in hacked websites went unnoticed for years
The Hacker News: Google Uncovers How Just Visiting Some Sites Were Secretly Hacking iPhones For Years
Glock Takes Stock: Google Says Malicious Websites Have Been Quietly Hacking iPhones for Years
ibtimes.sg : Top News: Google Project Zero reveals malicious websites habitually attacked iPhones for years
MSPoweruser: Google explains how visiting a website can leave your iPhone exposed to hackers
TechSpot: Google says hacked websites were attacking iPhones for years
VICE News: Google Says Malicious Websites Have Been Quietly Hacking iPhones for Years
TechCrunch: Malicious websites were used to secretly hack into iPhones for years, says Google
VICE News: Google Says Malicious Websites Have Been Quietly Hacking iPhones for Years
Techradar: iPhones “hacked for years” using malicious websites
NDTV Gadgets360.com: Google Reveals Malicious Websites Have Been Secretly Hacking Into iPhones for Years
The Guardian: Google says hackers have put ‘monitoring implants’ in iPhones for years
Silicon Republic: Google claims iPhones were vulnerable to ‘monitoring implants’ for years
Mashable: Hacked sites attacked thousands of iPhones every week for years using undiscovered exploits
ITV News: Google says hackers have been putting ‘monitoring implants’ in iPhones for years
Sky News: Hackers have been ‘monitoring iPhones for years,’ says Google
Evening Standard: Hackers have been putting 'monitoring implants' in iPhones for years, Google says
Google Project Zero:A very deep dive into iOS Exploit chains found in the wild


September 25, 2019
Lily Hay Newman / Wired

Lily Hay Newman / Wired  
After a Few Missteps, Cloudflare Relaunches Warp, a Streamlined Alternative to Buggy VPNs

Cloudflare, which announced in April Warp, a streamlined alternative to the buggy, slow and frustrating options that make up most of the mobile VPN market, has finally relaunched the VPN following a few missteps that left Warp with the same problems as other VPNs. Between then and now, the waitlist of users who want Warp grew to two million. The VPN builds on Cloudflare’s existing mobile app 1.1.1.1, which encrypts “domain name system” connections, so internet service providers or other lurkers can’t see which websites users access. It also offers end-to-end encryption to the web server and back and it does it quickly without draining batteries. It also offers an easy set-up.

September 23, 2019
Lily Hay Newman / Wired

Lily Hay Newman / Wired  
Google Resumes Human Audio Review of Google Assistant Recordings but with Tighter User Control, Improved Filters to Catch Recordings Made in Error, Promises to ‘Vastly Reduce’ Stored Audio

After pausing human audio review of its Google Assistant recordings worldwide in July, Google said that human review will now resume with increased options for user data control. Google said that sending audio for review has never been the default mode on its devices but now Assistant users will be prompted to review their settings choice if their devices are currently opted in to the “Voice & Audio Activity” program that potentially sends recordings out for vetting. Google says it has also taken steps to improve filters meant to catch and immediately delete even more sensitive recordings made in error, those that are created when a smart speaker mistakenly thinks it has detected its so-called wake word. Google said it will further update the Google Assistant policies to “vastly reduce” the amount of audio data the company stores.

Related: Engadget, BetaNews, VentureBeat, ZDNet Security, 9to5Google, Android Authority, TechNadu, Slashdot, Z6 Mag, The Keyword, Fast Company, Threatpost, CNET, Android Police, 9to5Google, Engadget, Android Authority, VentureBeat

Tweets:@wagner_digital @josephfcox

Engadget: Google vows to never store Assistant recordings without permission
BetaNews: Google to automatically delete more audio recorded by Assistant and introduce new privacy protections
VentureBeat: Google Assistant no longer saves voice recordings by default
ZDNet Security: Google revamps privacy policy to give users more control over Assistant voice recordings
9to5Google: Assistant gaining ‘Hey Google’ hotword sensitivity setting, will store less audio data
Android Authority: Google pledges to reduce amount of audio recordings for Assistant
TechNadu: Google Assistant Will Return to Eavesdropping You, but With Your Permission
Slashdot: Google Loans Cameras To Volunteers To Fill Gaps in ‘Street View’
Z6 Mag: Users now need to opt-in before Google can save Google Assistant recordings
The Keyword: Doing more to protect your privacy with the Assistant
Fast Company: Google restarts human audio reviews of Assistant recordings with new safeguards in place
Threatpost: Google Assistant Audio Privacy Controls Updated After Outcry
CNET: Google Assistant updates seek to calm privacy concerns over human review
Android Police: Google Assistant improves privacy and adds sensitivity options for hotword detection
9to5Google: Assistant gaining ‘Hey Google’ hotword sensitivity setting, will store less audio data
Engadget: Google vows to never store Assistant recordings without permission
Android Authority: Google pledges to reduce amount of audio recordings for Assistant
VentureBeat: Google Assistant no longer saves voice recordings by default

@wagner_digital: Google revamps privacy policy to give users more control over Assistant voice recordings. You will be spared human eavesdroppers, too, unless you choose to opt-in. https://zd.net/30l5ZXp via @ZDNet & @SecurityCharlie
@josephfcox: After revelations human contractors were listening to Google Assistant recordings, Google suspended use of human contractors. Now, it's started the program up again with some changes in place https://blog.google/products/assistant/doing-more-protect-your-privacy-assistant/


September 17, 2019
Brian Barrett / Wired

Brian Barrett / Wired  
Air Force Will Invite Hackers to Hack an Orbiting Satellite, Live Hacking Competition to Be Held at Defcon

After bringing an F-15 fighter jet to the Defcon conference in August, the U.S. Air Force hopes to up the ante by bringing an orbiting satellite to the hacker conference at next year’s Defcon, Will Roper assistant secretary of the Air Force for acquisition, technology, and logistics has promised. The Air Force will soon put out a call for submissions for hackers to submit proposals on how they would hack a satellite. Those proposals that seem viable will be invited to try out their ideas during a “flat-sat” phase, a test build comprising all the eventual components, six months before Defcon. The Air Force will fly the finalists out to Defcon for a live hacking competition.

September 6, 2019
Klint Finley / Wired

Klint Finley / Wired  
Facebook, Microsoft, Partnership on AI and Seven Universities Launch Deepfake Detection Challenge, $10 Million in Grants and Rewards to Academics Who Can Detect Realistic Deepfakes

A coalition of Facebook, Microsoft, the Partnership on AI and academics from seven universities launched a contest called the Deepfake Detection Challenge to encourage better ways of detecting deepfakes. Slated to run from late 2019 until spring of 2020, the contest will give screened participants access to a collection of deepfake videos that Facebook plans to release by December. The videos will feature professional actors who have consented to have their faces used in deepfakes which will look as much as possible like real Facebook videos. The contest is offering $10 million in research grants and rewards to challenge winners. The universities involved include Cornell Tech, MIT, University of Oxford, UC Berkeley, University of Maryland, College Park, and State University of New York at Albany.

Related: EJ InsightiTnews – Security, ZDNet, Reuters, Engadget, Venture Beat, Washington Post, CNET, Interesting Engineering, PC Mag.com, Motherboard, CNN.com, Facebook


September 5, 2019
Lily Hay Newman / Wired

Lily Hay Newman / Wired  
Google Offers New Set of Open-Source Differential Privacy Libraries to Better Protect User Privacy

Google has announced a new set of open-source differential privacy libraries that not only offer the equations and models needed to set boundaries and constraints on identifying data but also include an interface to make it easier for more developers to actually implement the protections. The purpose of the new libraries is to make it possible for companies to mine and analyze their database information without invasive identity profiles or tracking. Google currently uses differential privacy libraries to protect different types of data, such as location data generated by its Google Fi mobile customers. Differential privacy is complex and difficult to do and experts don’t recommend designing it from scratch because as many reviewers as possible are needed to catch all the flaws and issues. Google is also offering a testing methodology that lets developers run audits of their differential privacy implementation and see if it is actually working as intended.

October 14, 2019
Andy Greenberg / Wired

Andy Greenberg / Wired  
Researcher Planted Tiny Spy Chip in Cisco Motherboard to Give Remote Attacker Deep Control Using Only $200 in Equipment

A tiny spy chip could be planted in a company’s hardware supply chain with as little as $200 in equipment security researcher Monta Elkins will show at the CS3sthlm security conference later this month. Using a $150 hot-air soldering tool, a $40 microscope, and some $2 chips, Elkins was able to alter a Cisco firewall in a way that he says most IT admins wouldn’t notice, yet would give a remote attacker deep control. Elkins used an ATtiny85 chip, about 5 millimeters square, that he found on a $2 Digispark Arduino board and programmed to launch an attack as soon as the firewall boots up in the target’s data center; he then soldered it to the motherboard of a Cisco ASA 5505 firewall. Elkins said he could have reprogrammed the firmware of the firewall to make it into a more full-featured foothold for spying on the victim’s network.

Related: TechSpot, Slashdot, Security News | Tech Times, Boing Boing, HotHardware.com, Security – Computing, LinuxSecurity – Security Articles, Naked Security


August 31, 2019
Brian Barrett / Wired

Brian Barrett / Wired  
Anonymous Hacker Compromised Twitter CEO Jack Dorsey’s Account Through SIM Swapping and Tweeted String of Racist Messages, Bomb Threats

An anonymous hacker took over Twitter CEO Jack Dorsey’s account for 20 minutes and used it to send out a string of racist messages and bomb threats. A group that calls itself the “Chuckle Gang,” which has broken into other high-profile Twitter accounts before, apparently broke into the @jack account at 3:45 pm and sent out dozens of tweets and retweets. Other who have been attacked by these hackers blamed so-called SIM swap attacks, with a particular focus on AT&T and Twitter confirmed that Dorsey’s breach was a SIM swap as well. It’s unclear, however, how Dorsey was able to regain access to his account so quickly if the attack was a result of a SIM swap.

Related: Deutsche Welle, Digital Trends, The Hill: CybersecurityAvira Blog, Firstpost, Sydney Morning Herald, Reuters, The Next Web, Tech Insider, Stars and Stripes, PCMag.com, ZDNet, ABC News: U.S., CBC, TribLIVE, Financial Times, Washington Post, SlashGear » security, Stuff.co.nz – Stuff, CNET News, ZDNet, New York Times, CBC, The A.V. Club, BuzzFeed – Tech, Sky News, Mashable, TORONTO STAR, Dark Reading: Attacks/Breaches, USA Today, Social Media Today , Vox, OneZero – Medium, FOX News, The Verge, VentureBeat, Gizmodo, Evening Standard, Daring FireballWindows Central , TechCrunch, Daily Dot, Tech Insider, CBSNews.com, Digital Trends, Heavy.com, Quartz, Neowin, Daily Beast, The Verge, Slashdot, CNET News, CNN.com, Android Central , San Francisco Chronicle, SFist, Axios, Vox, MobileSyrup.com, The Inquisitr News, CCN, AP Breaking News, iAfrikan, TIME, iMore, Memeburn, The Guardian, Android Central , RT USA, Boing BoingAndroid Authority, The Register, CNN.com, San Francisco Chronicle, Quartz, Cybersecurity Insiders, SC Magazine, THE INQUIRER, DataBreachToday.com, THE INQUIRER, iTnews – Security, PCMag.com, Haaretz.com

Deutsche Welle: Twitter CEO Jack Dorsey’s account sent racist tweets after hack
Digital Trends: Twitter CEO Jack Dorsey’s account was hacked and used to tweet racist messages
The Hill: Cybersecurity: Hillicon Valley: Twitter CEO Jack Dorsey’s account hacked | Google found iPhone security bug | YouTube reportedly to pay up to $200M to settle child privacy investigation | DNC expected to nix Iowa virtual caucus plans
Firstpost: Twitter CEO’s hacked account sends racist tweets before being secured
Sydney Morning Herald: Twitter CEO Jack Dorsey’s account hacked, racist tweets sent
Reuters: Twitter CEO’s hacked account sends racist tweets before being secured
Channel News Asia: Twitter CEO’s hacked account sends racist tweets before being secured
The Next Web: Twitter CEO Jack Dorsey’s account has been hacked
Tech Insider: Twitter CEO Jack Dorsey’s Twitter account was hacked to send out racist tweets with the n-word and phrases like ‘Hitler is innocent’ (TWTR)
Stars and Stripes: Twitter CEO Dorsey’s account sent racist tweets after hack
PCMag.com: Twitter CEO’s Account Hacked, Defaced With Racist Posts
ZDNet: Jack Dorsey’s Twitter account got hacked
ABC News: U.S.: Twitter CEO Dorsey’s account sent racist tweets after hack
CBC: Twitter says CEO’s account sent out racist, vulgar tweets after it was hacked
TribLIVE: Twitter CEO Jack Dorsey hacked; account sent racist tweets
Financial Times: Jack Dorsey’s Twitter account hacked
Washington Post: Twitter co-founder Jack Dorsey’s account hacked
SlashGear » security: Twitter CEO’s @Jack account hacked [Update]
Stuff.co.nz – Stuff: Twitter CEO Jack Dorsey’s account sends racist tweets after hack
CNET News: Jack Dorsey’s Twitter account hacked – CNET
New York Times: Twitter C.E.O. Jack Dorsey’s Account Hacked
The A.V. Club: Someone hacked Jack Dorsey’s Twitter account to say even dumber stuff than usual
BuzzFeed – Tech: Jack Dorsey, The CEO Of Twitter, Was Hacked On Twitter
Sky News: Twitter founder’s account hacked as racist tweets posted
Mashable: Jack Dorsey’s Twitter account hacked to spread pro-Hitler message
TORONTO STAR: Twitter founder Jack Dorsey’s account hacked
Dark Reading: Attacks/Breaches: @jack Got Hacked — Twitter CEO’s Tweets Hijacked
USA Today: Twitter says it is investigating how CEO Jack Dorsey's account was compromised
Social Media Today : Hackers Gain Access to the Twitter Account of Platform CEO Jack Dorsey, Tweet Offensive Content
Vox: Jack Dorsey’s hack encapsulates Twitter’s struggle with problematic content
OneZero – Medium: Three Takeaways From the Hack of Jack Dorsey’s Twitter Account
FOX News: Twitter CEO Jack Dorsey’s own account was hacked, used to post vulgar messages
The Verge: Twitter CEO Jack Dorsey’s account has been hacked
VentureBeat: Twitter is investigating CEO Jack Dorsey’s account being hacked
Gizmodo: Jack Dorsey’s Twitter Account Was Hacked
Evening Standard: Twitter CEO Jack Dorsey's own Twitter account hijacked with series of racist tweets
Daring Fireball: Jack Dorsey’s Twitter Account Was Compromised
Windows Central : Jack Dorsey, Twitter’s CEO, had his account hacked
TechCrunch: A hacker has compromised Jack Dorsey’s Twitter account
Daily Dot: Twitter CEO’s account hacked, retweets pro-Nazi propaganda
Tech Insider: How to delete your Fitbit account and erase your personal data
CBSNews.com: Hackers tweet racial slurs from Twitter CEO Jack Dorsey’s account
Digital Trends: Twitter CEO Jack Dorsey’s account was hacked and used to tweet racist messages
Heavy.com: Jack Dorsey’s Twitter Account Hacked by ‘Chuckling Squad’
Quartz: Jack Dorsey’s Twitter account got hacked—here’s what we know
Neowin: Twitter CEO, Jack Dorsey, gets account taken over by hackers
Tech Insider: It took Twitter longer to secure Jack Dorsey’s account from hackers than it would for a nuclear missile to travel around the world — and that should terrify you
Daily Beast: Twitter CEO Jack Dorsey’s Account Gets Hacked, Posts Racist Messages
The Verge: Twitter CEO Jack Dorsey’s account has been hacked
CNN.com: Jack Dorsey’s Twitter account was hacked — and he’s the CEO of Twitter
Android Central : How to change your Twitter password and activate two-factor authentication
San Francisco Chronicle: Twitter CEO Dorsey’s account sent racist tweets after hack
SFist: Hackers Seize Jack Dorsey’s Twitter, Make Bomb Threats, Praise Hitler
Axios: Twitter CEO Jack Dorsey’s account hacked
Vox: Jack Dorsey’s hack encapsulates Twitter’s struggle with problematic content
MobileSyrup.com: Twitter CEO Jack Dorsey has been hacked
The Inquisitr News: Twitter CEO Jack Dorsey’s Account Was Hacked
CCN: Jack Dorsey Twitter Hack a Sick Way to Protest Hate Speech
AP Breaking News: Twitter CEO Dorsey’s account sent racist tweets after hack
iAfrikan: Jack Dorsey’s Twitter account hacked
TIME: Twitter CEO Jack Dorsey’s Twitter Account Has Been Hacked
iMore: Worried about getting your Twitter account hacked? Set up 2FA to protect it
Memeburn: Jack Dorsey’s Twitter account has been hacked, yet again
The Guardian: Jack Dorsey: Twitter CEO’s account hacked in embarrassing security lapse
Android Central : Jack Dorsey, Twitter’s CEO, had his account hacked
RT USA: Twitter CEO Jack Dorsey’s account ‘compromised,’ posted racial slurs
Boing Boing: How did Twitter CEO Jack Dorsey’s account get hacked?
Android Authority: Regularly changing your Twitter password is important, as Twitter CEO found out
Tech Insider: What we know about how Twitter CEO Jack Dorsey’s account was hacked, and the group called ‘Chuckling Squad’ who is claiming responsibility
The Register: JACK OF ALL TIRADES: Twitter boss loses account to cunning foul-mouthed pranksters
CNN.com: Jack Dorsey’s Twitter account was hacked — and he’s the CEO of Twitter
San Francisco Chronicle: Twitter CEO Dorsey’s account sent racist tweets after hack
Quartz: Hong Kong’s fast-learning, dexterous protesters are stumped by Twitter
Cybersecurity Insiders: Twitter Mobile Security flaw allows hackers to post Racist comments
SC Magazine: Twitter CEO’s account hacked in SIM-swapping scheme | SC Media
THE INQUIRER: Twitter CEO Jack Dorsey gets his Twitter account hacked
DataBreachToday.com: Hey Jack, How Was Your Account Hacked?
iTnews – Security: Twitter CEO’s hacked account sends racist tweets before being secured
PCMag.com: Twitter CEO’s Account Hacked, Defaced With Racist Posts
Haaretz.com: Twitter CEO Jack Dorsey’s account sends out pro-Nazi tweets after being hacked