Hacker group Gnosis takes credit for Gawker attack, plans more ahead

Gawker hackedWhile it originally appeared that yesterday’s Gawker hack was linked to WikiLeaks supporters Anonymous (which at this point has a slew of pseudonyms, including Operation Avenge Assange and Operation Payback), it now appears that’s simply not the case. According to the group now taking credit for it, the site’s security override wasn’t a gesture of a WikiLeaks alliance; it was simply to put Gawker in its place for thinking it could outsmart hackers.

In an interview with The Next Web, the group responsible for compromising approximately 1.5 million Gawker accounts, reveals that there is still a gaping hole in the site’s security. Three members of Gnosis (as they’re known) gave interviews exposing more about their group as well as some insight into Gawker’s situation.

Gnosis claims to be a 13-member (although there are “three ‘others’”), invite-only, leader-less group. While they reaffirm they are not connected to 4chan, one of the members does mention that “4chan’s influence on the net is large and several of our members visit the site. We don’t directly agree with some of 4chan’s tactics, or rather ‘anon’s’ tactics.”

They also claimed that the attack was completely unrelated to the tension between 4chan and Gawker, and once again said it was in response to Gawker’s “sheer arrogance.” One of Gnosis’ members also reached out to The Daily Beast, and claimed that a second hole remains open on Gawker’s site, and that user accounts are still not secure. The source also said that Gawker has been suffering security exposure for months and that staff knew about it.

And Gawker may not be the only site hit by Gnosis. In the interview, they report that when it comes to attacking elsewhere, they “have a few pokers in the fire,” and plan to “revisit” Gawker in the future to see if it’s learned a lesson in security. But Gnosis may not get the chance to, as the FBI is now investigating the digital break-in.


Shutdown makes dozens of .gov websites insecure due to expired TLS certificates

The US government shutdown is causing trouble in internet security. As the shutdown enters day 22, dozens of government websites have been rendered insecure or inaccessible due to expired transport layer security (TLS) certificates.
Movies & TV

From premiere date to footage: Here's all we have on 'Game of Thrones' season 8

With the eighth and final season looming, Game of Thrones fever has officially become a pandemic. Our list of all the relevant news and rumors will help make the wait more bearable, if you don't mind spoilers.

The most expensive Galaxy S10 could be the priciest Galaxy phone we've seen

Not long now; with 2019 underway, the Samsung Galaxy S10 is almost here. Before it arrives, here's absolutely everything you need to know about all three of Samsung's next flagships.

If we get a Nintendo 64 Classic, it needs to have these games

The Nintendo 64 introduced a long list of top-tier games, but which were the iconic platform's best? From Mario Party to Ocarina of Time to NFL Blitz, check out our picks for the best N64 games.

Stop your PC's vow of silence with these tips on how to fix audio problems

Sound problems got you down? Don't worry, with a few tweaks and tricks we'll get your sound card functioning as it should, and you listening to your favorite tunes and in-game audio in no time.

Yes, Android apps can run on your PC, and it's easier than you think

Wish you knew how to run Android apps in Windows? It's easier than you might think and there are a number of different ways to do it. In this guide, we break down the steps so you can follow along with ease.

Chip off the auction block – Intel’s i9-9990XE may be sold to the highest bidder

Intel's alleged Core i9-9990XE may only be sold at auction to OEMs, meaning that only a few of the 14-core, 28-thread, 5GHz CPUs will ever see the light of day in specific devices and systems.

Don't spend hundreds on Pro Tools or Logic. Try one of these free alternatives

Believe it or not, Pro Tools isn't the only digital audio workstation worth your time. Check out our picks for the best free recording software, whether you're looking for a lightweight app or a full-blown audio workstation.

How to share an external hard drive between Mac and Windows

Compatibility issues between Microsoft Windows and Apple MacOS may have diminished sharply over the years, but that doesn't mean they've completely disappeared. Here's how to make an external drive work between both operating systems.

Should you buy the affordable MacBook Air, or is the MacBook Pro worth the price?

Though they both share Retina Displays and similar keyboards, there are still some specs differences and other changes that differentiate the new 2018 MacBook Air and MacBook Pro. In this guide, we stack the two up against each other.

Mobile World Congress (MWC) 2019: Complete Coverage

There's no bigger show for mobile tech geeks than Mobile World Congress in Barcelona, Spain: where flagship phones are born and intriguing new wearables shine. And this year, where foldable phones and 5G are likely to dominate the news. For…

Google is giving its G Suite web apps new touches of visual improvements

Your G Suite applications will soon have a different look. Several of the web apps are getting updated with subtle visual improvements inspired by Google's Material Design guidelines. 
Emerging Tech

CES 2019 recap: All the trends, products, and gadgets you missed

CES 2019 didn’t just give us a taste of the future, it offered a five-course meal. From 8K and Micro LED televisions to smart toilets, the show delivered with all the amazing gadgetry you could ask for. Here’s a look at all the big…

Hackers are scoring with ransomware that attacks its previous victims

Computer viruses are always evolving. In a new one, dubbed "Ryuk," hackers are targeting PCs with ransomware that scours an infected network in order to pinpoint and attack and enterprises with big money.