Extra-Terrestrial Hacking

A NASA Astronaut is accused of hacking her spouse's bank Account from space. Anne McClain, whom the space agency says is "one of NASA's top astronauts," allegedly accessed the bank account of her estranged spouse, Summer Worden, while aboard the International Space Station earlier this year, according to local TV in Houston, Texas.

The two women are in the process of a divorce and battling over custody of a 6-year-old son, Worden told KPRC. She said she conceived the boy through in vitro fertilization and carried by a surrogate. Worden, who according to the New York Times is a former Air Force intelligence officer living in Kansas, said her son was a year old when she met McClain. The women got married in 2014. After about three years, they began having difficulties, Worden told reporters.

“I protect my son with everything I have. That is my No. 1 priority, but I didn't sense at that time that she was anybody that I needed to protect him against. I trusted her,” said Worden,

In 2018, McClain asked a judge to grant her shared parenting rights of the child, saying in court documents that she had been "there for his first steps and first words" and that they had “a very healthy and deep parental relationship."

McClain talked to the US NBC Today show in May 2018 about parenting as an astronaut and her upcoming trip later in the year to the International Space Station.

The court battle between the women has included an allegation that Worden assaulted McClain, an accusation that was eventually dropped. Worden says the two have never had a physical altercation.

Then, earlier this year McClain allegedly accessed Worden's bank account while the astronaut was at the space station.

Worden said her bank “did give evidence to my attorneys that she did access my bank accounts,.....I was shocked and appalled at the audacity by her to think that she could get away with that, and I was very disheartened that I couldn't keep anything private.”

Worden's attorneys wrote to the NASA Office of Inspector General in July this year about the alleged breach. An attorney representing McClain, Rusty Hardin, could not immediately be reached for comment.

NBC:                 Click2Houston:           Task&Purpose

You Might Also Read: 

NASA’s Poor Cybersecurity Is An Operational Threat:

 

 

« Seven Cybersecurity Issues That Easily Go Unnoticed
Maritime Shipping Is Badly Exposed »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

SafeUM Communications

SafeUM Communications

SafeUM Secure Messenger is an encrypted secure communications protection mechanism for instant messaging.

Kirkland & Ellis

Kirkland & Ellis

Kirkland & Ellis LLP is an international law firm with offices in the USA, Europe and Asia. Practice areas include Data Security & Privacy.

Red Hat

Red Hat

Red Hat is a leader in open source software development. Our software security team proactively identifies weaknesses before they become problems.

DataCore Software

DataCore Software

DataCore Software is a leader in Software-Defined Storage. Solutions offered include back up and disaster recovery.

MadSec Security

MadSec Security

MadSec Security is a leading consulting company whose expertise are information and cyber security.

STM

STM

STM provides system engineering, technical support, project management, technology transfer and logistics support services for the Turkish Armed Forces.

itbox.online

itbox.online

Itbox.online offers IT solutions to ensure that your company's technologies are always available and secure as your business demands.

HITRUST Alliance

HITRUST Alliance

HITRUST provides widely-adopted common risk and compliance management frameworks, related assessment and assurance methodologies.

SecondWrite

SecondWrite

SecondWrite’s next-generation malware detection engine delivers a combination of automatic deep code inspection and accurate scoring of zero-day malware.

Oman Technology Fund (OTF)

Oman Technology Fund (OTF)

Oman Technology Fund aims to make Oman the preferred destination for emerging tech companies in the region, and an attractive and stimulating destination for venture capital.

Netgo

Netgo

Netgo group meet the requirements of a complex, digitized world with IT consulting, IT solutions & services, managed & cloud services and software products & development.

Swish Data Corp.

Swish Data Corp.

Swish delivers when the problems are complex, requirements are difficult, and the mission is absolutely critical.

Cenobe Cyber Security

Cenobe Cyber Security

Cenobe provides customized solutions to keep you ahead of potential threats and ensure the security of your organization's systems and data.

Silk Security

Silk Security

Silk is the first platform that enables enterprises to take a strategic, sustainable approach to resolving code, infrastructure and application risk.

Zally

Zally

Using advanced behavioural biometrics and AI, Zally is the world's answer to next-generation security.

12Port

12Port

12Port network security solutions help companies tackle modern cybersecurity threats cost-effectively while implementing zero-trust architectures.