An Associated Press report found Google continues to track a user's location even when that person attempts to turn off the various location services provided through the Android operating system and its apps.
The AP reported apps like Google Maps require a person's location to function, and notes the app does ask for permission to track an individual using a function called Location History. This app tracks every place a person has been and then displays it on a map in timeline fashion. While this tracking can be turned off, AP found Google used verbal gymnastics to inform its users they were no longer being tracked, while still keeping tabs on their location.
A new policy has been proposed that would mandate LAPD police officers to release footage within 45 days unless used for a critical court case.
Footage may have proven to be useful in criminal prosecutions, however there are a lot of risks involved in such technologies as the data in these body cameras can be prone to modification and outright deletion due to multiple vulnerabilities in the body camera software.
Josh Mitchell, Principal Cybersecurity Consultant at Nuix has listed a number of ways for which footage can be accessed remotely, ultimately leading to compromise of the evidence. Mitchell analysed the body camera models, which are marketed specifically for law enforcement purposes.
Mitchell has uncovered a number of other security problems that are associated with mobile applications, software, cloud services and body cameras using default credentials. Most of these devices don't use the cryptographic protection and none of the video files are digitally signed by the video camera.
Man-in-the-Disk is a new attack technique that targets Android storage systems that use insufficient storage protocols in third-party applications. Hackers are taking advantage of these protocols to crash a victims Android mobile device.
Hackers are targeting the way in which smartphones and the majority of the mobile devices are handling storage which does not get applied to Androids' sandbox storage. Researchers from Checkpoint claimed there are vulnerabilities in how Google's Android OS utilizes external storage resources. This usually occurs when developers are careless about where they store app data.
External storage is essentially a partition on the device's storage card which is shared by all applications. Man-in-the-Disk targets the external disk on mobile devices. There are some apps that use external storage over internal storage if there is no free storage available on the device.
Google suggests that developers should add validation for external storage, the company also says that files should be signed and cryptographically verified before loading dynamically.
Instagram has been hit by a widespread hacking campaign which appears to have affected hundreds of users, leaving them unable to recover their accounts.
Login attempts appear to be failing, and when password reset and recovery emails are requested, many users are reporting that the email addresses linked to their accounts have been changed to .ru domains.
While it is unknown who is behind the compromise, the use of .ru email addresses may indicate the source is from Russia -- or threat actors pretending to be from the country.
Usernames, profile images, passwords, email addresses and connected Facebook accounts are being changed, according to victims. A connection made between the compromised accounts is the use of Disney or Pixar characters when new profile pictures have been uploaded.
The hackers stole details of multiple Visa and Rupay debit card owners. The details were used to carry out around 12,000 transactions worth Rs 78 crore in 28 countries on August 11. Similarly in India, 2,841 transactions worth Rs 2.50 crore were carried out.
The attack did not stop here. On August 13, in another malware attack on the bank's server a SWIFT transaction was initiated and Rs 14.42 crore was transferred to the account of ALM Trading Limited in Hanseng Bank, Hong Kong.
The total amount stolen is around Rs 94.42 crore and Cosmos Bank had to pay payment gateways such as Visa, Rupay and National Payments Corporation of India.
Google's latest flavor of Android is jam-packed with all sorts of new features, including a brand-new gesture navigation system, new UI elements, and a heap of under-the-hood tweaks that aim to make this the best version of Android to date.What are the features?
Jackpotting, also known as a black box attack, is when an ATM is physically targeted. Drills and damaging the front of these machines can open the way for criminals to access the network and system within.
Once a threat actor has established a connection and exploited the system, an ATM can be forced to spew out cash uncontrollably. To make things worse, these systems are sometimes compromised and then remotely controlled later, when cash mules are waiting to grab the proceeds.
In order to try and tackle the issue, IBM Security has launched X-Force Red Labs, a set of four facilities to test and improve the security of devices including ATMs. IBM said the facilities will be based in Austin, TX; Hursley, England; Melbourne, Australia; and Atlanta, GA, and include a dedicated ATM testing practice "in response to increased demand for securing financial transaction systems."
Despite the game's minimalist graphics and lightweight concept, users began noticing device performance issues and discovered that the program was conducting significant amounts of network communication. The developers also encouraged users to leave the game running in the background for a chance to obtain rare items. Although patch notes expressly stated that the game was not crypto-mining malware, mounting evidence to the contrary forced Steam to remove it.
How to Minimize the Threat of Cryptojacking:
To avoid costly losses due to cryptojacking games and other malicious apps, IBM Security experts recommend implementing advanced security information and event management (SIEM) and behavioral analytics tools to detect high CPU and GPU usage.
Security experts also suggest using a managed cloud access security broker (CASB) to help mitigate the impact of shadow IT — which, in this case, could include crypto-mining games downloaded onto business devices and any other cloud-based apps that aren't approved by IT teams.
"Email spam is once again the most popular choice for sending out malware," says Päivi Tynninen, Threat Intelligence Researcher at F-Secure. "Of the spam samples we've seen over spring of 2018, 46% are dating scams, 23% are emails with malicious attachments, and 31% contain links to malicious websites."
Attackers have become smarter and savvier, which reflects in the kind of spam emails that are being sent. "Spam is becoming an increasingly successful attack vector, with click rates rising from 13.4% in the second half of 2017 to 14.2% in 2018," says Adam Sheehan, Behavioral Science Lead at MWR InfoSecurity.
India seems to have emerged as an attractive target for hackers. It emerged as a top victim in the SamSam ransomware attack that was first reported in 2015.
Hackers have reportedly made a killing launching SamSam ransomware into vulnerable computer systems. In thirty months, they have reportedly collected about $6.5 billion to release the information locked in the systems that were taken hostage by them. The ransom amount was initially pegged at $8,50,000, but with more attacks getting reported, the aggregate amount shot up to $6.5 million.
SamSam is different from the traditional ransomware attacks which, generally, are not targeted. Cyber security experts say the attack method is surprisingly manual. It is more like a cat burglar than smash-and-grab attack. "The attacker can employ countermeasures to evade security tools and if interrupted, can delete all trace of itself immediately, to hinder investigation," according to Internet security solutions company Sophos.
A newly-uncovered cyber espionage operation is combining known exploits with custom-built malware in a campaign that has targeted hundreds of organisations, particularly those in the government, finance, and energy sectors.
Discovered by researchers at Symantec, the group is called Leafminer. The attackers' activity suggests the goal of their campaign is to steal data, including emails, credentials, files, and information on database servers operated by compromised targets.
Leafminer uses three main techniques for compromising target networks: watering hole attacks, vulnerabilities in network services, and brute-force dictionary attacks which attempt to crack passwords. Researchers said that phishing emails might also be used, but evidence for this hasn't yet been seen.
The second quarter proved to be a busy one for distributed denial of service (DDoS) cybercriminals as botnets attacked online resources in 74 countries.
New botnets are causing more headaches for cybersecurity specialists, according to the report. A noteworthy case is the creation of a botnet formed from 50,000 surveillance cameras in Japan. And a serious danger is posed by a new strain of the Hide-n-Seek malware, which was the first of all known bots to withstand, under certain circumstances, a reboot of the device on which it had set up shop, it said.
Hackers and cybercriminals are increasingly targeting enterprise resource planning (ERP) software, with SAP and Oracle solutions at particular risk, according to a report from Digital Shadows and Onapsis.
The report doesn't unveil any new vulnerabilities. Rather, it focuses on known flaws and exploits the fact that many legacy businesses are falling behind in patching and updating their software. These attacks are "leveraging the inability of customers to keep up with security," the report said.
According to the report, there are thousands of vulnerabilities affecting systems from both companies dating back many years. However, the report page noted that Onapsis is working with SAP and Oracle to remediate the vulnerabilities as they come up.
There's a potentially serious vulnerability affecting Bluetooth that could lead to leaks of private data from Apple, Google and Intel-based smartphones and PCs. Patches are being made available, so concerned users should update where they can. Millions, if not hundreds of millions or billions, of devices are likely affected.
Devices containing Bluetooth from a range of vendors—including Apple, Intel, Broadcom and Qualcomm—are all affected. That's according to a warning from the U.S. Computer Emergency Response Team, run out of the Carnegie Mellon Software Engineering Institute. It described a vulnerability that was the result of a missing check on keys during the process of encrypting data sent over Bluetooth connections. More specifically, it was a missing validation contained in the method of encryption used in Bluetooth, a standard known as the "Diffie-Hellman key exchange."
Hackers are after personal data like names, addresses… and passwords.
In a credential stuffing attack, a hacker loads up a database with as many usernames passwords as he or she can get their hands on. Those login credentials are fed into an automated hacking tool that hammers away at a website. You can think of a hacker's password database as a key ring. The more keys there are, the more likely it is that the attacker will find one that unlocks your account.
In the last six months of 2017, ransomware accounted for 32 percent of attacks, while malicious cryptominers accounted for seven percent. By the first half of 2018, the figures had switched almost exactly: malicious cryptominers accounted for 32 percent of attacks while ransomware dropped to eight percent.
Cryptomining uses the computational power of compromised assets to create new blocks in the blockchain of like Bitcoin and Monero.
Mobile apps on BYOD handhelds tend to keep enterprise security pros worried. Between apps that are malicious, others that leak data and ones with pushy permissions – it's hard to determine what's safe and what might violate company rules.
For iOS devices, WhatsApp Messenger, Facebook Messenger, and Waze topped the list as the riskiest apps most often found in the enterprise. For Android, the riskiest apps were WhatsApp Messenger, Facebook Messenger, instant messaging and VoIP service Telegram.
Top app categories blacklisted by enterprises were messaging, social networking and dating apps.
European antitrust regulators fined Google a record 4.34 billion euro ($5 billion) on Wednesday and ordered it to stop using its popular Android mobile operating system to block rivals, a ruling which the U.S. tech company said it would appeal.
That's the largest ever antitrust penalty.
The European Commission levied the fine Wednesday, saying that Google has broken the law by forcing Android smartphone manufacturers to pre-install its own mobile apps and services, like Google Search, Chrome, YouTube, and Gmail, as a condition for licensing.
This tactic eventually gives Google's app and services an unfair preference over other rival services, preventing rivals from innovating and competing, which is "illegal under EU antitrust rules."
Google is rolling out a sweeping redesign of its popular Gmail service, but federal cybersecurity authorities warn that a key new feature on the system could make its 1.4 billion users more susceptible to dangerous phishing attacks that compromise users' vital personal information.
"Confidential Email" gives recipients access to content via a link and is designed to allow users to prevent the forwarding, copying, downloading or printing of emails; set an expiration date for confidential emails so the email is no longer accessible after that date; protect emails by allowing users to require recipients to go through a two-step security protocol; and revokes access to confidential emails – even after they have been sent -- so they can no longer be accessed by the recipient.
But the feature "presents an opportunity for malicious cyber actors to mimic the e-mail message and phish unwary users," according to the DHS intelligence note. Hackers use so-called phishing attacks to get users to input their personal information online, often by clicking seemingly trustworthy links.
Bitcanal, a Portuguese Web hosting firm long accused of helping spammers hijack large swaths of dormant Internet address space over the years, was summarily kicked off the Internet this week after a half-dozen of the company's bandwidth providers chose to sever ties with the company.
For years, security researchers have tracked the suspected theft of millions of IPv4 Internet addresses back to Bitcanal, which was also doing business under the name "Ebony Horizon". Experts say shortly after obtaining a chunk of IP addresses, Bitcanal would apparently sell or lease the space to spammers, who would then begin sending junk email from those addresses — taking full advantage of the good or at least neutral Internet reputation of the previous owner to evade anti-spam blacklists.
The dark web comprises of the part of the internet which is "hidden" and can only be accessed by specific software and configurations. A search engine like Google does not show results of the deep web, nor of the dark web.
If you are one of the curious ones, before venturing into the dark web, security is the most important thing to be taken into consideration. The dark web will contain bad people, especially hackers and scammers, just to name a few.Either ways, just to be on the safe side, security should be prioritized:
Reports of the issue started appearing on the Galaxy Note 8 subreddit recently. Users say that their phones appeared to be attaching random pictures to messages. On its own, that might not be a huge problem. When those messages are being sent to random contacts, however, things can take a turn rather quickly… especially when your phone decides to fire off 50 photos to the last person you messaged, as one Samsung owner's did.
A worrying new study by researchers from the University of California, Irvine, has revealed that hackers can steal your password based on the heat left by your fingers on the keyboard.
The researchers named this type of attack 'Thermanator', and say it can be used to gain access to text, codes and even banking pins. For the attack to work, the hacker must place a thermal camera in clear view of the victim's keyboard. The footage can be used to decode which keys the victim has pressed, which can then be assembled into different codes.
Site Isolation is a feature of the Google Chrome web browser that adds an additional security boundary between websites by ensuring that different sites are always put into separate processes, isolated from each other. Initially, Google described Site Isolation as an "additional security boundary between websites," and as a way to prevent malicious sites from messing with the code of legitimate sites.
Google's slow-moving plans towards Site Isolation's rollout changed a month after its launch, in January 2018, when the Meltdown and Spectre vulnerabilities were disclosed to the public. From an experimental project that's been in the works for several months, Site Isolation became Chrome's primary defense against Meltdown and Spectre attacks.
The Info Edge-owned company has been inaccessible for almost an entire day on July 11. Following a hat tip from an anonymous source, Entrackr has been trying to access 99acres throughout the day (from 10 AM July 11 to 2 AM July 12).
Importantly, it is hardly encountered such outage in the past few years when a coveted Indian Internet business went offline for such a long duration. Though the actual reason for this glitch is not clear but 99acres may have been facing some serious technical or data security issue.
Unlike last month, there were no zero-days patched this time. Adobe has released security patches for a total 112 vulnerabilities in its products, most of which have a higher risk of being exploited.
In total, Adobe fixed 112 security flaws, broken down as follows: 2 in Adobe Flash Player, 3 in Adobe Experience Manager, 3 in Adobe Connect, and 104 in Adobe Acrobat and Adobe Reader.
Download updated version from here: https://helpx.adobe.com/experience-manager/aem-releases-updates.html
Phishing, scanning/probing, website intrusions and defacements, virus/malicious code, ransomware, Denial of Service attacks, and data breaches are some ways in which hackers attack business websites, which can cause operational disruptions and potentially steal sensitive information.
In the words of Arne Josefsberg, Chief Information Officer of GoDaddy, "Many companies do not take security seriously enough until something bad happens. It is generally a lot more expensive to clean up after a security breach, than addressing it proactively."
Google has long allowed software developers the ability to access users' accounts as long as users gave them permission. That ability was designed to allow developers to create apps that consumers could use to add events to their Google Calendars or to send messages from their Gmail accounts.
But marketing companies have created apps that take advantage of that access to get insights into consumers' behavior, according to a new report in the Wall Street Journal.
The apps offer things such as price comparison services or travel itinerary planning, but the language in their service agreements allows them to view users' email as well. In fact, it's become a "common practice" for marketing companies to scan consumers' email, the Journal reported.
Right now, your mobile phone could be hosting invisible software that's helping hackers commit crimes across the globe -- and you'd have virtually no way of knowing it. Hackers use mobile bots to commit online crime while remaining anonymous.
A team of researchers at Distil Networks, an online security firm with operations in San Francisco made an alarming discovery of bot networks, infecting millions of mobile devices worldwide. Edward Roberts, a Distil Networks manager, told us his firm's findings emerged indirectly from an earlier online threat study.
The vulnerability resides in one of the core functions of WordPress that runs in the background when a user permanently deletes thumbnail of an uploaded image. Researchers find that the thumbnail delete function accepts unsanitized user input, which if tempered, could allow users with limited-privileges of at least an author to delete any file from the web hosting, which otherwise should only be allowed to server or site admins.
Researchers say that using this flaw an attacker can delete any critical files like ".htaccess" from the server, which usually contains security-related configurations, in an attempt to disable protection.
With the rise in cyber attacks and data breaches, internet users around the world could be on the verge of being hacked at any time.
To aim to cope up with this matter, Mozilla is set to launch a new feature that will notify the users about breaches. So, get ready to get your hands on Firefox Monitor. This new feature, termed ‘Firefox Monitor', will notify users in case of a breach. Plus, the users can directly search through the database to find out if their email address suffered breaches at any time.
Further, the number of mobile cryptojacking malware variants have grown from eight in 2017, to 25 by May 2018, a three-fold increase.
"Cryptojacking is emerging as a more cost-effective and efficient alternative to ransomware. With a ransomware attack, there is no guarantee that hackers will be paid a ransom. Cryptojacking, on the other hand, is empowering hackers to make use of infected endpoints for swifter and more assured financial gains. As of now, there are no reported instances of data loss in cryptojacking attacks", said Sanjay Katkar, Joint Managing Director, Quick Heal.
44% indicated they would keep their #Facebook accounts but minimize use, 14% said they've never used the service over security concerns, and 7% said they planned to delete their accounts. Another 25% plan to use it regularly "with appropriate privacy settings," while 10% said they've never used it due to lack of interest.
A new malware has been discovered by IT security researchers aiming at stealing cryptocurrencies, including Bitcoin and Ethereum, from the computer system of unsuspected users. Dubbed ClipboardWalletHijacker by researchers; the malware is targeting at Windows-based devices and is currently installed on over 300,000 devices.
So far ClipboardWalletHijacker has stolen over 5 Bitcoin while its last activity was detected on June 12th, 2018, indicating that malware is still active and stealing funds.
Security researchers have discovered another Android Trojan that poses a threat to banking apps. Termed as ‘MysteryBot' by ThreatFabric, it targets Android 7 and 8 devices worldwide.
The malware exhibits exceptional capabilities, taking complete control of the affected device. It can make calls from the phone, access phonebook details, copy text messages, manage call forwarding and can work as a keylogger. Moreover, it can also encrypt all files in the external storage and can delete contact details from the device.
Regarding its point of entry, the malware will enter your device by disguising itself as Adobe Flash Player. #MysteryBot can perform mobile banking activities without the victim's knowledge or consent. As everything will be performed in a seemingly legit way through the victim's device, the financial institutions will face difficulties in detecting malicious actions.
Quick Look feature generates thumbnails for each file/folder, giving users a convenient way to evaluate files before they open them. However, these cached thumbnails are stored on the computer's non-encrypted hard drive, at a known and unprotected location, even if those files/folders belong to an encrypted container, eventually revealing some of the content stored on encrypted drives.
As explained in his post, after running a simple command on his system, Wojciech Regula, the security researcher from SecuRing was able to find the path and cached files for both images left outside the encrypted containers. "If an attacker (or law enforcement) has access to the running system, even if the password-protected encrypted containers are unmounted (as thus their contents 'safe'), this caching 'feature' can reveal their contents."
In less than a decade, the sophistication of cyber-weapons has so improved that many of the attacks that once shocked us look like tiny skirmishes compared with the daily cyber-combat of today.
The fact that no intelligence agency saw either attack coming — and that countries were so fumbling in their responses — led a group of finance ministers to simulate a similar attack that shut down financial markets and froze global transactions. By several accounts, it quickly spun into farce: No one wanted to admit how much damage could be done or how helpless they would be to deter it.
Many smartphones include facial recognition, fingerprint scans and other biometric systems. However, the trouble with these easy-to-use tools is that once compromised they cannot be reset.
But now, American scientists have developed a security system that will use the smartphone's password as the brain of the user after it's been in the market. Smartphones will be unlocked only by recognizing the brainwaves in response to a series of pictures - an advance that could better protect devices from hackers. According to the scientists at Buffalo University, electroencephalography (EEG) is currently a very easy system, through which the waves of the brain can be recorded.
The "brain password," which presently would require users to wear a headset, but in the future, it has to be tried to make it even better.
This year, the company had already given out job offers to 20,000 on-campus candidates which had been the same as in the previous year. Off-campus hiring had been 4,000, the official said.
"Analytics, IoT (Internet of Things) and automation is changing the entire delivery process. We are going for hiring in an agile way which is on-demand," Global HR head and EVP of TCS Ajayendra Mukherjee said.
For TCS, it was more cost-effective to give training for re-skilling people in-house rather than hiring from outside.
The new malware campaign, dubbed Operation Prowli infecting number of industries such as finance, education, and government. Prowli malware uses various attack techniques such as brute-forcing, exploits, and weak configurations. It targets CMS hosting servers, backup servers, HP Data Protector, DSL modems and IoT devices.
Once they have servers compromised the attackers Prowli operation infects the server or IoT device with Monero miner and with the self-propagating r2r2 worm that brute-force SSH logins.
Security researcher Michal Bentkowski discovered and reported a high severity vulnerability in Google Chrome in late May, affecting the web browsing software for all major operating systems including Windows, Mac, and Linux.
Mishandling of CSP headers by your web browser could re-enable attackers to perform cross-site scripting, clickjacking and other types of code injection attacks on any targeted web pages.
The patch for the vulnerability has already been rolled out to its users in a stable Chrome update 67.0.3396.79 for Windows, Mac, and Linux operating system, which users may have already receive or will receive over the coming days/weeks.
So, make sure your system is running the updated version of Chrome web browser.
Facebook products such as the News Feed, Search and Ads use machine learning, and behind the scenes it powers services such as facial recognition and tagging, language translation, speech recognition, content understanding and anomaly detection to spot fake accounts and objectionable content.
Facebook's AI infrastructure needs to handle a diverse range of workloads. Some models can take minutes to train, while others can take days or even weeks. The News Feed and Ads, for example, use up to 100 times more compute resources than other algorithms. As a result, Facebook uses "traditional, old-school machine learning" whenever possible, and only resorts to deep learning--Multi-Layer Perceptrons (MLP), ConvolutionalNeural Networks (CNN), and Recurrent Neural Networks (RNN/LSTM)--when absolutely necessary.
The company's AI ecosystem includes three major components: the infrastructure, workflow management software running on top, and the core machine learning frameworks such as PyTorch.
Enhanced security at these events often focuses on physical security, with increased local police, physical barriers and identification checks. Yet, such measures should not overlook the need for heightened cybersecurity — not only because of the expanded digitization of sports venues but because the very attributes that make these events worthwhile open additional avenues for social engineering.
Malicious actors can prey on fans caught up in the emotion of a match or gain access to and release sensitive information at a moment when the effect would be most acute. Enhancing awareness, implementing preventive measures and eliminating the use of digital devices (where practical) would decrease the level of risk at international sporting competitions.Three primary groups are particularly at risk during global sporting events:
Jadavdpur University's vice-chancellor — Suranjan Das — lodged an FIR with the Bidhannagar cybercell department claiming someone has created a fake email ID in his name and has been using it to seek "help".
Das first learnt about this when a fellow received an email — purportedly from his Hotmail address — seeking professional help. "The professor found it highly suspicious that an academician as reputed as Das would seek such help. So he immediately contacted Das who assured him that he had no such email address," said an investigating officer.
The FIR lodged in this case includes charges of forgery and relevant sections under the IT Act.
Avast identified some 18,000 devices infected by the malware in more than 100 countries, including Russia, Italy, Germany, the United Kingdom, Ukraine, Portugal, Venezuela, Greece, France, and Romania.
Some phones and tablets from ZTE, Archos, and myPhone are coming with malware called Cosiloon pre-installed. It's an ad loader, and while it loads ads rather than steals information, it's also impossible to fully eradicate since it's built into the firmware of the infected devices.Most of the devices affected are not certified by Google, which is looking into remedies. Google said that as long as the malware is built into the firmware, there's really very little it can do.
Scientists have developed the first ultrasound-firewall that can prevent hackers from eavesdropping on hidden data transmission between smartphones and other mobile devices.
Researchers developed a procedure to expose the cookies and inform device users. For masking and blocking the ultrasonic data transfer, interference signals are transmitted via the loudspeaker of the mobile device.
Thus, acoustic cookies can be neutralized before operating systems or mobile applications can access them. Users can selectively block cookies without affecting the functionality of the smartphone.
Z-Wave is a wireless protocol used by 2,400 vendors; its wireless chipsets are embedded in an estimated 100 million smart devices ranging from door locks, lighting, heating systems and home alarms, according to Pen Test Partners, who released a report on the vulnerability.
"Z-Wave uses a shared network key to secure traffic. This key is exchanged between the controller and the client devices (‘nodes') when the devices are paired. The keys are used to protect the communications and prevent attackers exploiting joined devices," researchers explained.
Dashlane researchers discovered a high frequency of passwords containing combinations of letters, numbers, and symbols that are adjacent to one another on the keyboard. This practice, known as "Password Walking," highlights the apathetic attitude most users have towards password creation, preferring convenience over security.
When users "Password Walk" they are creating passwords that are far from secure. Most hackers are keenly aware of the human tendency to rely on convenience and can easily exploit these common passwords.
Unsurprisingly, said the study, pop culture references were also prevalent. It would be wise to remember that using passwords that use names or common phrases is not a safe practice.
On the first day of GDPR enforcement, Facebook and Google have been hit with a raft of lawsuits accusing the companies of coercing users into sharing personal data. The lawsuits, which seek to fine Facebook 3.9 billion and Google 3.7 billion euro (roughly $8.8 billion in dollars), were filed by Austrian privacy activist Max Schrems, a longtime critic of the companies' data collection practices.
The problem is finding and implementing a security system that enables doctors, patients, and properly authorized third-party organizations access to the data without creating openings for potential security risks.
The Blockchain technology is form of open cryptography that leverages public and private keys to secure information alongside a publicly available registry that is managed in an automated and decentralized manner. Once encrypted, you need both the passcode and the private key to unlock the information making it possible for all the encrypted data to be taken and still be utterly useless to the thief.
For the medical industry, it is best considered a form of security decentralized data storage that gives both medical institutions and patients the ability to access their records anywhere in a secure and equitable manner.
We love talking about driverless cars, ships and planes. We can't wait for 5G and Wi-Fi domes that solve all of our network access problems; and while we're getting a little worried about social media and privacy, we're still addicted to our ever-more-powerful smartphones.
But there's one technology that we all need to embrace: artificial intelligence (AI).
AI is special because it's more than one technology. In fact, it's a family of technologies. Secondly, AI is special because its application potential is so wide. Next, AI is special because it learns and sometimes even self-replicates. AI's also special because it satisfies ROI models of all shapes and sizes.
AI will profoundly impact healthcare, transportation, accounting, finance, manufacturing, customer service, aviation, education, sales, marketing, law, entertainment, media, security, negotiation, war and peace.
This was confirmed by Telangana IT secretary, Jayesh Ranjan who shared that the delegation will also include cyber security companies from the Netherlands.
The visit, he added, is aimed at intensifying Indo-Dutch cooperation in the cyber security sector and strengthening ties to focus on counter-terrorism and information sharing. "The agreement between member companies and institutions of the Hyderabad Security Foundation and the HSD will be signed on May 22.
The launch of the cluster is expected to catapult Hyderabad into the global cyber security eco-system in a big way.
Signal is one of the most popular and trusted end-to-end secure messaging apps. The encryption protocol was developed by Open Whisper Systems and is used by millions. It can be found in Signal's own app and is also used in WhatsApp and Facebook's Messenger "Secret Conversation" mode, and Google's Allo encrypted messaging service.
According to a blog post published, the vulnerability was accidentally discovered while researchers–Iván Ariel Barrera Oro, Alfredo Ortega and Juliano Rizzo–were chatting on Signal messenger and one of them shared a link of a vulnerable site with an XSS payload in its URL.
However, the XSS payload unexpectedly got executed on the Signal desktop app.
The newly discovered vulnerability poses the same threat as the previous one, allowing remote attackers to inject malicious code on the recipients' Signal desktop app just by sending them a message—without requiring any user interaction. The only difference between the two is that the previous flaw resides in the function that handles links shared in the chat, whereas the new vulnerability (CVE-2018-11101) exists in a different function that handles the validation of quoted messages, i.e., quoting a previous message in a reply.
A majority of companies are keen to hire candidates with a higher learn ability quotient, especially in the 0-5 years' experience slab. Senior level hiring demand is decreasing as people management roles are diminishing gradually and mid-level/senior executives are yet to catch up on the pace at which IT industry is transforming, both in terms of business and talent, according to the survey.
While the IT sector is looking for trained talent, only about 27% of companies showed interest in upskilling their workforce whereas globally the number is almost double, at a 53%. This could pose a challenge for IT employers.
The group, dubbed SilverTerrier, isn't a sophisticated operation, but has access to a number of malware families - including information stealers and remote-access trojans - which are distributed with the aim of infecting victims and stealing data.
What's appealing about these tactics for #SilverTerrier is that they're widely available on dark web and underground forums and the out-of-the-box nature of many of the malware kits means they're easy to distribute.
Researchers at Palo Alto Networks have been tracking SilverTerrier and have attributed 181,000 attacks, using 15 families of malware, to the group in the last year. Over the past 12 months, the group has fired off an average of 17,600 spam emails a month, representing a 45 percent increase from 2016.
Few stories and reports that suggest computer vision recognizes some types of images more accurately than humans, makes it seem like the Panopticon has officially arrived. In the US alone, 117 million Americans, or roughly one in two US adults, have their picture in a law enforcement facial-recognition database.
But the technology's accuracy and reliability at this point is much more modest than advertised, and those imperfections make law enforcement's use of it potentially sinister in a different way. They're prone to both false positives—a program incorrectly identifies Lisa as Ann—and false negatives, in which a person goes unidentified even if they're in the database.
A mass hacking campaign that targets a critical vulnerability in the Drupal content management system has converted more than 400 government, corporate, and university websites into cryptocurrency mining platforms that surreptitiously drain visitors' computers of electricity and computing resources, a security researcher said Monday.
The attacker behind the campaign took control of the sites by exploiting a Drupal vulnerability that makes code-execution attacks so easy and reliable it was dubbed "Drupalgeddon2."
Although Drupal maintainers patched the critical flaw in March, many vulnerable sites have been slow to install the fix. The lapse touched off an arms race among malicious hackers three weeks ago.
Twitter is asking users to change their account password immediately. This comes in after the social media giant identified a bug that was storing unmasked passwords in an internal log visible to everyone on Twitter.
According to Twitter, the bug occurred due to an issue in the hashing process that masks passwords by replacing them with a random string of characters that get stored on Twitter's system. But due to an error with the system, apparently passwords were being saved in plain text to an internal log, instead of masking them with the hashing process.
Twitter claims to have found the bug on its own and removed the passwords. It's working to make sure that similar issues don't come up again.
A virus that hijacks users devices and uses them to mine cryptocurrencies is spreading fast through Facebook.
The malware, named "Digmine", affects desktop versions of the app when running on a Google Chrome browser, according to researchers at Trend Micro.
How does the virus work?
If a user clicks on the malicious video link, it opens using Chrome browser and FacexWorm redirects the victim to a fake YouTube site.
The user is then urged to download an innocent-looking Chrome extension as a codec extension that's "needed" to play the video.
Once the extension is installed, the virus downloads more modules from its control server to perform a variety of malicious tasks.
The malware can access or modify data for any website the user visits since the extension applies all the extended permissions at the time of installation.
Now, it seems as though everyone wants to build on the blockchain or is at least interested in learning more about how to harness the technology's potential, and some financial gurus have been calling this the dot-com boom, all over again.
With all of the hype around blockchain technology, industry experts are looking to disrupt even the most specialized fields. Large companies like IBM and Walmart are working to track shipments of pork in China more effectively on the blockchain, and other more traditional applications include financial services, gaming, and cloud computing.
Here are a few ways blockchain technology may help disrupt not only the behemoths like IBM and Walmart, but even mom-and-pop shops, and how you can be prepared for what's to come:
In a letter to the Ministry of Electronics and Information Technology, the Central Provident Fund Commissioner has written that hackers have stolen data from the Aadhaar seeding portal of EPFO. He has also asked the ministry's technical team to plug vulnerabilities on the portal aadhaar.epfoservices.com that has now been temporarily shut. The portal links the Aadhaar number of employees with their provident fund accounts.
"Each person contributes 12% of salary as provident fund, so salary details could also have been stolen. Also the bank account numbers as people tend to withdraw their PF," said cybersecurity expert Anand Venkatnarayan.
The Telecom Commission has approved much-awaited proposal in-flight connectivity in Indian airspace. In January, TRAI issued a recommendations to allow both telephony and Internet services on domestic flights. Both the domestic and international carrier passengers would be able to make calls and web surfing after an aircraft fly above the minimum height of 3000 meters, the body has said in its recommendation.
The internet services will be allowed through Wi-Fi onboard. For calling services, the airplane/flight mode on the phone will have to be kept off. A separate category of IFC service provider should be created to permit IFC services in Indian airspace where service provider should be required to get itself registered with the DoT.
Soon after the Telecom Regulatory Authority of India (TRAI) recommendation to allow in-flight connectivity (IFC) in Airlines, Chicago-based in-flight internet company Gogo has announced its plan to enter the Indian market. It is eyeing Indian market with major investment plans.
A $700-million US-based in-flight connectivity provider will open an engineering and software development centre in Chennai.
A new "confidential mode" can also be used to stop recipients being easily able to forward, copy, download or print correspondence sent via Gmail.
Google's e-mail service is including the choice to permit messages to change into inaccessible after a set time because it prepares for harder information privacy legal guidelines.
Since it isn't sensible to remotely wipe emails from any individual else's pc after they've been downloaded, the self-destruct function works by sending a hyperlink to a web page the place the delicate content material will be considered moderately than together with the fabric within the authentic message.
In a matter of minutes a hacker with the right knowledge could spoof their way into almost any hotel room in the world.
Researchers say flaws they found in the equipment's software meant they could create "master keys" that opened the rooms without leaving an activity log.
How was the vulnerability exploited?
In theory, it's easy. First, an attacker would need to get hold of an electronic key – RFID or magstripe – either from a hotel or even one that operates a storage closet or garage. They would then need to buy a portable programmer online for a few hundred pounds to overwrite it, thus creating a master key within minutes. However, F-Secure says it is its custom software made this particularly hack possible, and it won't (for obvious reasons) be releasing it.
MazarBOT is a new malware sent as a SMS link to the victim to gain remote access to the latter's cellphone images, call records and texts.
Over a dozen Bengalureans have fallen prey to a new SMS-spoofing malware through which fraudsters have accessed their bank-generated One Time Passwords (OTPs) and swindled them of lakhs of rupees.
"The SMSs appear like regular text messages sent by banks. However, they are sent by fraudsters and contain a link. All the complainants clicked on the link, which resulted in a malware invading their phone, via which the conmen gained access to the device and all SMSs received by the user," revealed an investigating officer probing the fraud.
Trying to break the encryption on the iPhone is a constantly-evolving cat-and-mouse game, and not many law enforcement agencies are capable of taking part. Rather than hiring their own cryptographers, law enforcement around the country instead buys "exploits" from hacking firms, who sell their technology to anyone who can pay tens of thousands of dollars.
A new type of iPhone cracker, called the GrayKey, is a simple-to-use box that can reportedly crack the latest iPhone X running iOS 11, and as you'd expect, cops are lining up to buy it.
Police forces and federal agencies around the country have bought relatively cheap tools to unlock up-to-date iPhones and bypass their encryption, according to a Motherboard investigation based on several caches of internal agency documents, online records, and conversations with law enforcement officials. Many of the documents were obtained by Motherboard using public records requests.
Installing patches every month is an important first step, but is still insufficient unless all relevant patches are included in those updates. Most Android vendors regularly forget to include some patches, leaving parts of the ecosystem exposed to the underlying risks.
Google releases security patches every month to keep its Android ecosystem safe and secure from the underlying risks, but since every manufacturer and mobile carrier modify the operating system to make their smartphone unique, they often fail to apply all those patches in time.
At the Hack in the Box security conference in Amsterdam, researchers Karsten Nohl and Jakob Lell of the firm Security Research Labs plan to present the results of two years of reverse-engineering hundreds of Android phones' operating system code, painstakingly checking if each device actually contained the security patches indicated in its settings. They found what they call a "patch gap": In many cases, certain vendors' phones would tell users that they had all of Android's security patches up to a certain date, while in reality missing as many as a dozen patches from that period—leaving phones vulnerable to a broad collection of known hacking techniques.
YouTube's music video for the hit song Despacito, which has had over five billion views, has been hacked.
More than a dozen other artists, including Shakira, Selena Gomez, Drake and Taylor Swift are also affected. The original clips had been posted by Vevo. A number of high-profile music videos disappeared from YouTube and had their titles and hold images defaced, after the video streaming website was targeted by hackers.
All the affected videos were uploaded to YouTube artist accounts associated with the video hosting service Vevo. It is unclear whether hackers accessed individual accounts or Vevo as a whole. One of the hackers claims they used a script to change the video titles.
A Twitter account that apparently belongs to one of the hackers posted: "It's just for fun, I just use [the] script 'youtube-change-title-video' and I write 'hacked'."Don't judge me I love YouTube," it added.
The Tech Mahindra-Balbix partnership will help serve the market using a new proactive approach that combines advanced AITechnology and with deep domain expertise in cybersecurity and infrastructure.
It can prioritize the actionable intelligence for the proactive handling of identified critical risks; it also prevents security incidents and reduces compliance verification cycles from months to minutes. Additionally, the iSOC improves reporting by accurately measuring overall breach risk and cyber-resilience.
"Balbix and Tech Mahindra's partnership is aimed at catering to the growing needs of customers to combat the rampantly increasing number of cyber threats," said Gaurav Banga, CEO and Founder - Balbix.
Who could be accessing your camera and microphone?
You have numerous apps that take access to hardware on your mobile devices as you install them. Apps like WhatsApp, Facebook, Snapchat, Instagram, Twitter, LinkedIn, Viber might do a lot on their own even without you knowing.
The terms and conditions and privacy statements you sign up to when you buy a smartphone or download an app are rarely scrutinised before we tick the box and wade in.
The apps running in the foreground, can access both the front and the back camera and can record you at any time. It can also snap pictures and videos without telling you and upload them.
In addition to this, the hackers can access your device via apps, PDF files, multimedia messages and even emojis. An application, Metasploit on the ethical hacking platform Kali uses an Adobe Reader 9. The hacker can alter the PDF with the program by sending a malicious file to the user. Once they open it, the hacker can have total control over user's device remotely.
The security focused content delivery network provider, Cloudflare, opened up a global Domain Name System (DNS) for consumers to run both DNS-over-TLS and DNS-over-HTTPS. The service is called 126.96.36.199. That is the IPv4 address for Cloudflare's DNS resolver (along with 188.8.131.52).
With this offering, they're fixing the foundation of the Internet by building a faster, more secure and privacy-centric public DNS resolver. The DNS resolver, 184.108.40.206, is available publicly for everyone to use - it is the first consumer-focused service Cloudflare has ever released.
DDEattacks are also known as 'macro-less' malware. The attacks are able to use PowerShell and hidden scripts to dodge network defences.
Cybercriminals using MicrosoftOffice documents to conduct 'macro-less' attacks that dodge organisations' defences and inject malware – a technique that has been named a top threat in WatchGuard Technologies' Q4 2017 Internet Security Report.
Malicious Office documents generally targeted Germany, China and the United States, and there was a large increase in malicious documents during Q4, the report notes.
Egyptian internet users suddenly noticed that their computers were slowing down or overheating while taking in the entertainment. The slowdown was actually a result of the Egyptian government secretly hijacking its citizens' computers "en masse" in order to mine the cryptocurrency monero.
But it's not just criminals who think cryptomining is a way to make money. Some in the online media industry also see it as an alternative revenue generator that reduces their reliance on ads.
As cryptocurrencies only grow more popular, bad actors from hackers to criminal enterprises to corrupt governments are exploring ways to conduct massive campaigns, which risk compromising tens of thousands of computers and millions of smartphones along the way.
Mozilla is rolling out a new Firefox container extension that isolates web activity from Facebook and makes it harder for the social network to track user activity on other websites via third-party cookies.
Unsatisfied by Zuckerberg's apology tour, Mozilla said last week that it was pulling its advertising from Facebook in protest to the social network's data collection practices. When announcing the decision, Mozilla's chief business and legal officer, Denelle Dixon, acknowledged Zuckerberg's pledge to restrict third-party access to user data, but said that Facebook's default privacy settings were still a problem.
As for the Facebook Container, Mozilla said the add-on is not meant to be a direct jab at Facebook, but rather a tool that helps users better manage their online privacy and security.
A newly-discovered keylogger malware has been found infecting computers in the wild and spreading via infected USB drives, according to threat detection firm Cybereason.
Once executed, the malware gathers a list of drives on the machine and starts replicating itself to them, which allows it to spread to any of the connected external drives.
Furthermore, the keylogger renames the external drives to match its naming scheme. Specifically, the drive's new name would include its original name, its size, and the string "(Secured by Kaspersky Internet Security 2017)".The malware also creates an autorun.inf file to point to a batch script.
The user names, encrypted passwords and email addresses of at least 150m subscribers to the app, owned by US firm Under Armour, were stolen in February, the company said in a statement.
The company said on Thursday that the accounts were compromised in February, sending shares of the company down 3% in after-hours trade. The breach was not discovered until 25 March and users were informed four days later.
The app allows customers to monitor their calorie intake and measure it against the amount of exercise they are doing using a database of more than 2 million foods. While the breach did not include financial data, large troves of stolen email addresses can be valuable to cyber criminals.
Tighter controls after Facebook breach make Indian developers worried.
Facebook will become less attractive to app developers if it tightens norms for data usage as a fallout of the prevailing controversy over alleged misuse of personal information mined from its platform, say industry members.
India has the second largest developer base for Facebook, a community that builds apps and games on the platform and engage its users. With 241 million users, the country last July over took the US as the largest userbase for the social network platform.
"Apart from videos and posts, applications and games are what makes facebook entertaining. App developers help build Facebook's audience, so there wouldn't be any major restrictions for long.
The content streaming service,Netflix is ready to invite researchers worldwide to participate in the firm's bug bounty program and has now made the scheme public.
Over the past five years, Netflix has been accepting vulnerability reports from hackers and has been patching bugs through responsible disclosure setups, as well as a private bug bounty program.
The company says that over the past 18 months and after extending the scheme's reach beyond Bugcrowd's top 100 researchers to over 700 hackers, a total of 275 submissions have been made, of which 145 reports were valid.
"We have attempted to fine tune things like triage quality, response time and researcher interactions to build a quality program that researchers like to participate in," Netflix added.
Targets include the Netflix website, API, help center, and mobile applications for iOS and Android.
Over the past week we have been hearing how data from Facebook was used to potentially swing voters in the US elections and other campaigns by a firm called CambridgeAnalytica.
What is Cambridge Analytica?
It is a British company which uses social media data to help clients influence voters or consumers by targeting messages based on people's hopes and fears.
How can data from Facebook potentially help in a political campaign?
Well, to start with, based on your interactions with Facebook over time, the platform has enough data about your likes and dislikes. It knows the kind of people you follow, the types of news sources you read and the range of actions and reactions these posts elicit from you. All these data points in combination are good enough to know your political affiliation, or a lack of such inclination.
How is this data used?
While none of us really use this, there is a Facebook ad preferences page that tells you how the social network sees you in reference to serving ads. It is not a perfect science at all, but based on your likes and dislikes Facebook lists the topics, people and interests which it thinks are good enough to push ads to you.
Emerging from several days in hiding while the Cambridge Analytica storm swamped his company, Facebook founder and CEO Mark Zuckerberg finally spoke on Thursday. "We have a responsibility to protect your data, and if we can't then we don't deserve to serve you," his post sets out.
Security researchers at CheckPoint have discovered that Chinese Cyber Criminals are using a malware named as RottenSys to attack android phones all over the world; almost 5 million android devices in their botnet network.
Dubbed RottenSys, the malware that disguised as a 'System Wi-Fi service' app came pre-installed on millions of brand new smartphones manufactured by Honor, Huawei, Xiaomi, OPPO, Vivo, Samsung and GIONEE—added somewhere along the supply chain.
To evade detection, the fake System Wi-Fi service app comes initially with no malicious component and doesn't immediately start any malicious activity. Instead, RottenSys has been designed to communicate with its command-and-control servers to get the list of required components, which contain the actual malicious code.
Routers are always an attractive target for hackers. They're always on and connected, often full of unpatched security vulnerabilities, and offer a convenient chokepoint for eavesdropping on all the data you pipe out to the internet.
A newly discovered nation-state cyber espionage campaign targeting Africa and the Middle East infects network routers in order to snare administrative credentials from its targets and then move freely throughout the network.
Infecting a router at a business or coffee shop, for instance, would then potentially give access to a broad range of users.
The flaw in 4G networks allows someone to make phone calls that appear to be from a number of their choice, which could be used by criminals to extract 4G customers' personal details to empty victims' bank accounts.
Using panic attack, attackers can create artificial chaos by broadcasting fake emergency messages about life-threatening attacks or riots to a large number of users in an area.
The mobile phone is the primary attack platform and mobile tracking is one of the fastest growing modes of spying worldwide.
Lots of tools that are used by companies to target ads on users could potentially be used also to spy on individuals, said Eva Galperin, director of cybersecurity at EFF, a digital rights organisation that helps activists and dissidents to protect their digital privacy.
Kali Linux, a very popular, free, and open-source Linux-based operating system widely used for hacking and penetration testing, is now natively available on Windows 10, without requiring dual boot or virtualization.
In Windows 10, Microsoft has provided a feature called "Windows Subsystem for Linux" (WSL) that allows users to run Linux applications directly on Windows. If this is your first time using Windows Subsystem for Linux (WSL), you need to enable this optional Windows feature before getting the Kali Linux app.
Follow these simple steps to enable WSL:
Now search for Kali Linux on Windows Store, download it with just a single click. Once you launch the application, it automatically completes Kali installation and will open the console window.
Putting a chip under your skin is not so very different from getting a piercing or tattoo - except there was often less blood.
At a trendy east London bar, a group of body hackers are putting forward their reasons for human augmentation to a packed audience of mainly under-35s, many of whom are sporting piercings and tattoos.
Bio-hacker Lepht Anonym has nine implants and strongly believes what she does will benefit humankind as well as her own curiosity.The magnets allow her to sense electromagnetic radiation so she can tell if a device is on or off, whether a microwave is running and identify where power lines are. All of which, she admits, is "not hugely useful".
She also has a chip under her skin that lets her interact with her phone and unlock doors. She hopes that the "primitive results" she has achieved can be used by other, more skilled people, to build something better.
Equifax Inc said on Thursday that it identified an additional 2.4 million U.S. consumers affected by last year's massive data breach, bringing the total number of people whose data was compromised to more than 147 million.
The new information is the latest blow to the industry giant, which lost three top executives — including its longtime CEO Rick Smith — in the fallout of the mega-breach that exposed private information belonging to 143 million people.
The data breach, which was discovered July 29, included sensitive information such as social security numbers, birthdays, addresses, and in some instances, driver's license numbers. Equifax said on Thursday it would contact the newly identified breach victims and offer them free identity theft protection and credit monitoring services.
Cellebrite may be using zero-day flaws in iOS to gain access to devices, which wouldn't be surprising—it's a commonly used trick. The concern for anyone with an iOS device would be the security of the exploits Cellebrite has discovered but not shared.
With Cellebrite claiming to be able to access the newest iPhones and iOS versions, it's safe to assume they've discovered new, unknown exploits. Previous leaks of government-level security tools have resulted in ransomware outbreaks like WannaCry, which means an attack on Cellebrite could lead to an iOS security incident on a level previously unseen.
If you have this software installed on your computer, it's time to download its latest version for windows as soon as possible.
World's most popular torrent download software µTorrent has been detected with multiple security flaws. If you have this software installed on your computer, it's time to download its latest version for windows as soon as possible.
The serious remote code execution vulnerability that lets attackers intrude into a user's computer is discovered by Google's security researcher Tavis Ormandy in both µTorrent classic version and the newly launched µTorrent Web version.
At least three fake social media accounts posing as young women have encouraged victims into downloading highly invasive Android malware.
Victims are sent a link to install what they're told is the Kik messaging platform in order to continue the conversation.
If the target goes through with the installation - which requires them to allow apps to be installed from unknown sources - they're provided with a very convincing copy of Kik, but one which is laced with commands for conducting espionage.
The malware contains a variety of modules for collecting information about the victim, including their contacts, photos, call logs and text messages, as well as information about the device including its geolocation - meaning the user can be physically tracked - number, network operator and model.
An easy-to-exploit security bug recently discovered in dating app,Tinder that left accounts and private chats exposed to hackers. A flaw in a Facebook-linked program called Account Kit let attackers access profiles armed with just a phone number.
Account Kit, implemented into Tinder, is used by developers to let users log in to a range of apps using mobile details or email addresses without a password.
But there was, until recently, a crack in this process that, according to Prakash, could let hackers compromise "access tokens" from users' cookies – small pieces of data on computers that remember browsing activity as people traverse the internet. The attacker could then exploit a bug in Tinder to use the token, which stores security details, and log in to the dating account with little fuss.
Ukraine-based hacking group, known as Coinhoarder, has been stealing cryptocurrency from Blockchain.ino users. blockchain.info is one of the most popular crypto wallet solution available and Coinhoarder has been manipulating this service to steal more than $50 million from its users.
The hackers bought ads that contained certain popular keywords related to cryptocurrency. After buying the ads, hackers could poison the victim's search results and display the compromised ads when a user googled terms such as "bitcoin", "wallet", or "blockchain". The malicious ads would show up and mislead users into thinking that they were being redirected to a legitimate website of blockchain.info wallet services.
A CRYPTOCURRENCY vault aimed at protecting online currencies such as Bitcoin from hacking is about to be launched by a digital Canadian bank, it has been reported.
The digital nature of cryptocurrencies means that many traders are often vulnerable to being hit by an online attack.
Mr Taylor added: "Our differentiator in this market is to be secure and super private. The bank wouldn't have any kind of back door to open up the vault, we're just providing the facility that folks could put their digital keys in."
The official 2018 Winter Olympics website went down for several hours causing a disruption to ticket sales and downloads during the opening ceremony. Localized Wi-Fi networks surrounding the games in South Korea also became temporarily unavailable in the preceding hours.
Olympic Destroyer uses the increasingly common combination of a malicious payload and credential stealer with two legitimate software tools, including Window's PsExec and WMI (Windows Management Instrumentation), to laterally move across an already compromised network in order to covertly delete files, like shadow backups, Boot Configuration Data (BCD) and event logs on infected machines. In other words, it wipes remote data located on mapped share folders; not local files.
Websites, including those belonging to the Information Commissioner's Office, Student Loans Company and Scottish NHS helpline, were infected with a malicious script.
While tracing it back to its source, a website plug-in called Browsealoud was found, which helps people with low vision, dyslexia and low literacy access the internet.
The cryptocurrency involved was Monero - a rival to Bitcoin that is created to make transactions in it "untraceable" back to the senders and recipients involved. Since the cryptocurrency's creation the value of one Bitcoin has soared from just 72p to £12,300.
McAfee recently uncovered Operation GoldDragon, a malware attack targeting organizations affiliated with the 2018 Winter Games. Further investigation by McAfee Advanced Threat Research analysts has uncovered the consequences for victims of malware implant GoldDragon include attackers' accessing end-user systems and collecting data stored on the device and connected cloud accounts.
Potential risks include: attacker's access to customer and employee financial or personal data, Winter Games related details, trade secrets, and more.
McAfee anticipates an increase in Winter Games cyber attacks using spear phishing techniques and cautions fans to be aware of suspicious links that attempt to lure victims into malicious content.
The Indian Railways has asked the Ministry of Electronics and Information Technology to block 19 websites over concerns of misuse of software on its catering and tourism portal for tatkal booking.
The 19 websites included myrailinfo.in, www.tatkalaap.com and www.tatkalsoftservice.com, according to a statement.
Samsung and Roku smart TVs are vulnerable to hackers and "raise privacy concerns by collecting very detailed information on their users."
A relatively unsophisticated hacker could change channels, play offensive content or crank up the volume, which might be deeply unsettling to someone who didn't understand what was happening," Consumer Reports said. "This could be done over the web, from thousands of miles away."
The good news is these TVs' security vulnerabilities apparently won't allow hackers to spy on you or steal your information, according to Consumer Reports.
There have been some ads on YouTube recently, created by a few unknown attackers, that have been slowing down YouTube users' computers, and using their CPUs and electricity to generate digital currency.
The ads forced them to help malicious actors earn the cryptocurrency Monero, a bitcoin alternative, by hogging their computer processing power.
"An analysis of the malvertisement-riddled pages revealed two different web miner scripts embedded and a script that displays the advertisement from DoubleClick," said Trend Micro.
The affected webpage will show the legitimate advertisement while the two web miners covertly perform their task.
Intel had issued its software patch to address a security issue affecting millions of its processors worldwide.
But the software caused many machines to reboot or shut down and Intel later told people not to install it. Researchers discovered gaps in security stemming from central processing units - better known as the chip or microchip - that could allow privately stored data in computers and networks to be hacked.
Facebook is tracking you more than anything, not Aadhaar, said American author Thomas Friedman.
Aadhar doesn't store anything about you except your biometrics. It's not tracking you.
"Facebook is tracking you much more today. If you are worried about privacy, then you shouldn't be using Google, Facebook, Twitter, any of these things."
At least six attacks have taken place within the last week. They ranged in location from the Pacific Northwest to the Gulf region to New England. Thieves have stolen over $1 million in attacks so far.
To execute the cyber-attack, a thief needs physical access to an ATM and will use malware, physical hacking tools, or both, to take control of the machine and force it to dispense cash quickly. If it works, cash pours out of the ATM like the hacker won a jackpot.
Several Modules have been identified performing different malicious activities. 27 Android gaming apps were listed On this malware module with all the famous gaming category.
The Malware used steganography method to inject malicious script into the Images file and send it to users to get infected.
Using a Module called Android.RemoteCode.127.origin it relied on connection to remote servers with a link to download additional module called Android.RemoteCode.126.origin.
The exploit chain triggers two vulnerabilities, CVE-2017-5116 and CVE-2017-14904, Chaining the vulnerabilities the attackers can remotely inject arbitrary code into the system_server process when a malicious URL in Chrome is accessed.
The victims can be tricked into clicking on such a URL by hackers that can fully compromise their mobile device.
The security researcher also received additional $7500 through the Chrome Rewards program.
Intel warned that you should stop deploying its current versions of Spectre/Meltdown patches, which Linux creator Linus Torvalds calls 'complete and utter garbage'.
Since last week, users are reporting that they are facing issues like spontaneous reboots and other 'unpredictable' system behaviour on their affected computers after installing Spectre/Meltdown patch released by Intel.
Keeping these problems in mind, Intel has advised OEMs, cloud service providers, system manufacturers, software vendors as well as end users to stop deploying the current versions of its patches until the chip giant develops 'a solution to address it'.
Oneplus admitted of their credit card information belonging to 40,000+ customers stolen by an unknown hacker.
The attack was possibly by targeting one of the firm's systems by inserting malicious script into the payment page code and sniff out credit card information.
The stolen data included card numbers, expiry dates, and security codes, directly from a customer's browser window.
Skygofree is a new Android spyware has been designed for targeted surveillance, and it is believed to have been targeting a large number of users for the past four years.
It steals Location-based audio recording using device's microphone, the use of Android Accessibility Services to steal WhatsApp messages, and the ability to connect infected devices to malicious Wi-Fi networks controlled by attackers.
GhostTeam, the new malware has been found so far in 50+ apps on Google Play Store that is designed to steal Facebook login credentials and aggressively display pop-up advertisements to users.
Play Protect security feature uses machine learning and app usage analysis to remove malicious apps from user's Android smartphones in an effort to prevent any further harm.
Yet another new and manipulation of default behaviour within Intel Active Management Technology (AMT) can allow an attacker to bypass login and gain control over a user's device in less than 30 seconds.
Anyone with physical access to the affected laptop can bypass the login of BIOS/BitLocker etc.
Steps of exploitation:
Security researchers discovered a vulnerability in Whatsapp & Signal which allows anyone who controls the servers to covertly add new members in a private group.
The purpose of implementing end-to-end encryption was to stop anyone, be it the company himself or the server that transmits the data, from decrypting it. The vulnerability can enable anyone with the access to the server to break the transport security layer and take full control over a group chat. Since Whatsapp & Signal failed to authenticate who is adding a new member in the group, it is possible to add a new member in a private group by someone who is neither a group administrator nor a member.
Source: : https://www.isoeh.com/research-article-details-private-end-to-end-encrypted-whatsapp-group-chats-are-not-secured.html
Fuxploider is an open source penetration testing tool that automates the process of detecting and exploiting file upload forms flaws.
It has ability to detect the file types allowed to be uploaded and is able to detect which technique will work best to upload web shells or any malicious file on the desired web server.
Security researchers discovered malicious apps designed to steal credentials from users have been downloaded million times from Google play store. Among these, the most popular app is a gaming app. Though, according to a blog post, it was a normal app without any malicious code but later it was updated with information-stealing capabilities.
Since these apps looked like they came from VK.com – for listening to music or for monitoring user page visits, requiring a user to login into his/her account through a standard login page did not look suspicious at all. The information stolen through the apps are helping cyber criminals to promote groups and increase their popularity.
To avoid your credentials being stolen, make sure to enable Google Play Protect in devices.
When it comes to account compromise, phishing poses a greater threat than data breaches, say researchers at Google and UC Berkeley.
Data collected by Google shows that 80 percent of all the phishing kits observed targeted usernames, passwords, and geolocation; followed by phone numbers and device details. A smaller subset of the phishing attacks also targeted secret questions, full names, credit card data, and Social Security Numbers. (tahawultech.com)
For some people, Google controls most of their identity online, and losing access to that critical account could be devastating. According to Google, enterprising hijackers are constantly finding out, and are able to realize, billions of different platforms' usernames and passwords on black markets.
The ads come with provocative headlines about hot-button political issues and targeted Facebook users likely to click based on political ideologies.
In September, an ad with the headline, "New Approval Ratings For President Trump Announced And It's Not Going The Way You Think," targeted Facebook users over 40. "Regardless of what you think of Donald Trump and his policies, it's fair to say that his appointment as President of the United States is one of the most…," ran the text. There was a "Learn more" button to lure the audience to click to read the whole news.
Those who clicked the button to read the elaborate news found their computers frozen with a warning and a phone number that users could call to get it fixed for a price. Though the freeze was temporary and restarting the computer would have unlocked it, some worried users who called the number were asked to pay to restore their access, according to computer security experts who have tracked the scam for more than a year.
The vulnerability in question stems from the fact that the affected apps' cryptographically signed certificate failed to verify the hostname on the server it attempted to connect with. This could allow malicious third parties on the same network as the victim to step in and take control of an online banking session, intercepting usernames and passwords to hijack an account.
Researchers have tested a new tool on a sample of 400 apps, and found that several banking apps had a critical vulnerability that could have allowed hackers to access anyone's username and password who is connected to the same network as the victim, to perform a 'Man in the Middle Attack.'
Apps from some of the world's largest banks were found to contain this flaw, which, if exploited, could have allowed an attacker to decrypt, view and modify network traffic from users of the app.
The cryptocurrency mining company NiceHash announced the breach in a statement where they recommended users to change their passwords. Nicehash had suspended their operations for the time being as the compromise of their payment system caused 64million loss.
Hackers made off with contents of the company's bitcoin account, according to Andrej Škraba, the Slovenian marketplace's head of marketing. He told Reuters that the compromise was highly professional and involved "sophisticated social engineering".
"There are certainly a number potential security issues to discuss, from API vulnerabilities to web application and database protection, however, without more details from NiceHash, we can only speculate by which method of attack their website was compromised," said Rusty Carter, vice president of product management for mobile app security company Arxan Technologies, via email.
Hackers may have obtained personal information for 1.6 million individuals after compromising the systems of Paypal's subsidiary TIO Networks.
An investigation conducted in collaboration with third-party cybersecurity experts revealed that TIO's network had been breached, including servers that stored the information of TIO clients and customers of TIO billers. Affected companies and individuals will be contacted via mail and email and offered free credit monitoring services via Experian.
The company has already been fined more than $40 million in the US over the scandal which involved tens of millions of people around the world.
Google is accused of bypassing the default privacy settings on Apple phones and successfully tracking the online behavior of people using the Safari browser which is then used. The data is used in its DoubleClick advertising business, which enables advertisers to target content according to a user's browsing habits.
Google believes that U.K. privacy laws do not apply to the company, and so British consumers that want to take the tech giant to court are facing a losing battle.
Three Chinese were charged for stealing 407 GB of sensitive data and trade secrets by sending "spearphishing" emails to computers in western Pennsylvania and around the world.
They were also accused of exploiting vulnerabilities in computer systems and using malware to gain access to confidential business and commercial information, work product, and sensitive employee information including usernames and passwords.
Imgur security breach probably happened because of an older hashing algorithm. The stolen passwords were scrambled with older SHA-256 hashing algorithm which could be easily cracked using brute force attacks.
Imgur stated of encrypting passwords of users in database, with the outdated SHA-256 which is quite feasible to be broken.
If you use Facebook as a backup drive to store important and often personal photos/videos, then drop this habit. A newly discovered Facebook vulnerability could let anyone with some technical know-how to delete any or all photos you posted on the social networking website.
This is because Facebook's Graph API wasn't checking permissions properly. If you sent a request to the Graph API to delete another user's photo album and toss your own Facebook for Android token as the required stamp of approval, it'd blindly accept it and the album would vanish.
Bloomberg has revealed that the company concealed for more than a year a massive data breach that exposed sensitive records of millions of drivers and customers. The stolen information included names, email addresses and mobile phone numbers of Uber users around the world, and the names and license numbers of 600,000 U.S. drivers.
Two attackers accessed a private GitHub coding site used by Uber software engineers and then used login credentials they obtained there to access data stored on an Amazon Web Services account that handled computing tasks for the company. From there, the hackers discovered an archive of rider and driver information. Later, they emailed Uber asking for money, according to the company.
Experts found 482 of the top 50,000 websites use session replay scripts. You may know that most websites have third-party analytics scripts that record which pages you visit and the searches you make. But lately, more and more sites use "session replay" scripts.
Hundreds of homepages, including those of Microsoft, Adobe and Wordpress, Spotify, Skype use secret code, called 'session replay' scripts, to monitor your online activity.
This could be used by third parties to reveal everything from credit card details to medical complaints, as well as putting you at risk of identity theft and online scams.
If you are an android user, then you are also among the billions of users whose smartphone is secretly gathering location data and sending it back to Google.
Android devices have been sending location information about nearby cell towers to Google since the beginning of 2017, with Google getting pinged every time a user entered the range of a new tower. Even if the user actively turned off location services, Google can still access their location and movements without their knowledge.
Cars on the road may already being targeted by hackers and it is feared that vehicles built after 2005 are vulnerable to be controlled remotely, although models up to 17 years old could also be affected.
The government is now being urged to create laws that would force car manufacturers to constantly provide software updates for their vehicles.
Carsten Maple, professor of cyber engineering at the University of Warwick, said: "We've already seen vehicles used as weapons. Cybersecurity researchers must ensure systems are engineered to stop new attacks."
Siri helpfully obeys the orders of any hacker who talks to her—even, in some cases, one who's silently transmitting those commands via radio from as far as 16 feet away.
It can use radio waves to silently trigger voice commands on any #Androidphone or #iPhone that has Google Now or Siri enabled, if it also has a pair of headphones with a microphone plugged into its jack.
Their clever hack uses those headphones' cord as an antenna, exploiting its wire to convert surreptitious electromagnetic waves into electrical signals that appear to the phone's operating system to be audio coming from the user's microphone.
Without speaking a word, a hacker could use that radio attack to tell Siri or #Google Now to make calls and send texts, dial the hacker's number to turn the phone into an eavesdropping device, send the phone's browser to a malware site, or send spam and phishing messages via email, Facebook, or Twitter.
Researchers found that that IOT cameras can be infected with a variant of a known malware program known as : Bashlite, or Lightaidra or GayFgt, specially designed for ARM versions of Linux.
The target of the DDoS attack was a rarely-used asset of a large cloud service, serving millions of users worldwide.
All of the compromised cameras monitored by the researchers were logged from multiple locations in almost every case, suggesting that several different hackers were abusing the weakness of unsecured CCTV cameras.
Top targeted countries for CCTV botnets around the world include India, China, Iran, Indonesia, US, and Thailand.
Chip-and-Pin Card Fraud: Man-in-the-Middle Attack
How it works?
A typical EMV transaction involves three steps:
When a buyer inserts the altered card, the original chip allows to respond with the card authentication as normal. But, during cardholder authorization, the POS system would ask to enter a PIN.
In this case, the fraudster could respond with any PIN, and the fraudulent chip comes into play and will result in a "YES" signal regardless of whatever random PIN the thief has entered.
The attacker intercepts the PIN query and replies that it is correct, whatever the code is!
Fixed — at least in Europe, researchers declined to fully detail new security measures.
AT&T and #Verizon's implementations of LTE are said to be vulnerable to "to several issues" that could result in eavesdropping, data spoofing, and over-billing for potentially millions of phones.
Android devices on these networks are at most risk because the software "does not have appropriate permissions model" for LTE networks.
LTE (also known as #4G) relies on packet switching, a common way of sending data across the internet, rather than the old method of circuit switching.
This new method of sending data allows for new kinds of attacks, particularly against the Session Initiation Protocol (#SIP), nowadays more commonly used in voice calls and instant messaging.
Researchers have found a method that exploits the way that SIP works, by spoofing phone numbers for calls or text messages.
It's also possible for an attacker to obtain free bandwidth for more data-intensive activities, like video calling, without incurring any additional costs.
In some cases, an attacker can establish multiple SIP sessions at the same time, which could lead to a denial-of-service attack on the network
US company #Battelle has developed a shoulder-mounted rifle to deal with unwanted drones flying around.
"#DroneDefender" the revolutionary weapon specifically designed to target and knock drones out of the sky at a range of just 400 meters,is incepted without totally destroying them.
The Battelle DroneDefender utilizes radio waves to neutralize in-flight Drones and force them to land or hover or return to its point of origin.
#DroneDefender emits radio pulses that interrupt the communications system of the drone (both drone and #GPS signal it sends out) and makes it think that it gone out of range, thereby preventing the drone from accepting any additional commands from its operator.
Nearly 5.6 Million Fingerprints of its federal employees were also stolen in the massive data breach took place in April this year.
The OPM, the US government agency that handles all federal employee data, reported that some 1.1 Million Fingerprints were stolen. which escalated to increased to 5.6 Million.
OPM's nteragency team –(members of the #FBI, Defense Department, and #Homeland Security) is reviewing the potential ways hackers could misuse the data.
Whoever has access to the #Goldmine – Stolen #OPM data – holds a highly Powerful, unchangeable key.
The Apple website is not secure. While surfing the Apple site http://www.apple.com/ I have found several encryption related vulnerabilities. Here are those:-
Appraisal letter from Apple:-
Re: Apple Developer Feedback
Thank you for contacting Apple Developer Support regarding the Developer website.
We appreciate that you have taken the time to send us your feedback. Please be assured that all of your comments have been forwarded to the appropriate Apple team.
If you have further questions or comments, please let us know.
Apple Developer Support
About the university:
Sikkim Manipal is one of the largest private University in India. The Institute attracts students from all over the country, with over 1700 students enrolled in the various engineering disciplines. 102 full-time faculties are employed.
Type of problem:
User Name: *sanjay*
[any name will work]
Password: *' OR ''='
*Choose "*Center Login*" radio button
You have access to the main admin panel. Option to download & print ALL student records, contact information, admit cards for upcoming examinations, assignments, results, etc. Option to change password.
About the university:
Calcutta University is the oldest existing University in Indian Subcontinent. Founded 1857, it is ranked 39th in the world.
Vulnerability:The main page is spreading virus. www.caluniv.ac.in It has iframe code injection & pulling virus from the Russian site pantscow.ru.
Hundreds will be infected while checking for results on the website.
Banks are warning customers of the risk of their mobile banking credentials being stolen by malware masquerading as a Flash player sent to them through unwarranted messages or through pop-ups on websites.Read Details