Google Cautions That Government-Backed Hackers May Be Targeting Journalists
Google has notified that some prominent journalists and their email accounts might be the subject of attacks from hackers who are supported by the government. The notification will say, "Warning: Google may have detected government-backed attackers trying to steal your password."
"Since 2012, we've notified users when we believe their Google accounts are being targeted by government-backed attackers," said Google spokesperson to Politico. However, the warnings may not necessarily indicate that someone else has already accessed the account. This was Google's way to ensure caution.
Keith Olbermann, a Liberal commentator, apparently got the alert about the potential hacks from Google. According to New York Magazine's Jonathan Chait, after the election period he also got a few messages from Google warning him about an attack from a government-backed hacker. Cait says the latest warning was sent two to three weeks ago.
Julia Ioffe, a recent writer at The Atlantic, uploaded a Twitter photo that showed the Google warning. She received the notification some time in January. Other people who said they received the warning include Vox founder Ezra Klein, CNN senior reporter Brian Stelter, Times columnist Paul Krugman, New York Times correspondent David Sanger and Yahoo Washington bureau chief, Garance Franke-Ruta.
As reported, Russian hackers are being suspected by a handful of journalists who received such notifications. The Russian embassy has not yet provided a reply to this suggestion.
"The fact that all this started right after the election suggests to me that journalists are the next wave to be targeted by state-sponsored hackers in the way that Democrats were during it," remarks a journalist who managed to get a notification. The journalist also worries that the outcome would end up being the same. That is, anyone is going to be hacked. The contents of emails can be used against them and all media.
Top Tech Hacks You Might Need
You might need to know how to perform these useful tech hacks in your daily life.
Ransomware Attacks Transform Into Multibillion Business
According to security experts, ransomware attacks are on the rise, transforming in an emerging multibillion business.
9 Hackers Involved In $17M Banking Theft Plot Arrested By Russian Authorities
It´s well known that Russia has some of the most dangerous and skillful hackers in the world, which has been quite inconvenient for this nation, considering that cyber crimes have been committed.
HTC Will Build Another Flagship Phone, Even After Billion-Dollar Deal with Google
HTC is showing signs of revival with the announcement of $1.1 billion smartphone business deal with Google.
Google Replacing Defective Nexus 6Ps with Pixel XL for Free
Owners of defective Nexus 6P units in the US and Canada are now receiving Google Pixel XL as free replacement.
MORE IN ITECHPOST
Invoice Templates - Finances Made Easy
Contractors offer a wide variety of services, be it consulting or remodeling. Whatever the service being offered, however, a contractor needs to be paid after the conclusion of the work. This is why contractor invoices play a crucial role, especially for independent contractors. A contractor invoice is used generally by people who work independently to request payment of the fee charged for services provided to the customer.
How Do Personal Emergency Response Systems Work?
Personal emergency response systems, known as PERS for short, are systems that help people to raise the alarm and get immediate help when a medical or personal emergency occurs. They are ideal for older people and anyone with a mobility issue or an injury or illness that can cause falls.
Eight Must-Have Tools to Keep Your Car Out of Garage
We all dread taking our car to a garage for repairs. We might just want to avoid the inconvenience of being off the road or maybe the costs associated, which can even lead to knock-on effects on things like our holiday plans.
6 Hacks for Students to Choose a Laptop While on a Budget
The modern world tries to drown us in the sea of choices. One can’t simply buy a laptop - there are hundreds of laptops around and sometimes our budget becomes the only real limitation we can rely on. But how to choose other parameters to get the best laptop possible?