SECURITY EVANGELIST

This week, we’ve updated and republished two of our most important articles, one of which covers the most important warning signs of a malware infection, while the other goes over 50+ cybersecurity tools that might improve your online safety. 

We’ve also published a new article about DDoS attacks and the methods malicious hackers use to execute them.

Security articles of the week (July 17-21, 2017)

A quiet week in cybersecurity, without any particularly big hackings. It’s the middle of summer, so all of the malicious hackers out there are probably in a holiday or something. Or preparing their next big Mirai or WannaCry. But hopefully they are on a permanent vacation.

In any case, here are this week’s top cybersecurity stories:

1. These 10 US states have the highest rate of malware infections in the country

If you are one of the almost half a billion people who at some point used to be on Myspace, the hottest social network of the early 2000s, you should know that almost anyone can hack into your account.

2. Elon Musk’s top cybersecurity concern: Preventing a fleet-wide hack of Teslas

“AI is a fundamental, existential risk for human civilization,” Tesla and Space X CEO Elon Musk said at the National Governors Association summer meeting. He doesn’t think people “fully appreciate that.” AI and a possible robot apocalypse is just one topic covered by Musk, and we’ll get back to that; but since a Tesla is “like a laptop on wheels,” Musk also talked about his top cybersecurity concern: a fleet-wide hack of Teslas.

3. IoT ‘Smart’ Alarm has Vulnerabilities that Could Help Black Hat Burglars

An Internet of Things-based ‘smart’ alarm dubbed iSmartAlarm has several vulnerabilities that could help criminals to set up a cyber-assisted burglary.

4. Didn’t get your Oreo cookie shipment? Last month’s global cyber attack may be to blame

Confectionary giant Mondelez, the makers of Oreo Cookies and Cadbury chocolates, which found its offices as far away as Tasmania had fallen foul of NotPetya/GoldenEye, forcing production to halt.

5. Most Americans reuse passwords, with millennials the worst culprits

A new survey of over 1,000 US adults reveals that 81 percent of people surveyed admit to using the same password for more than one account.

Among millennials where 92 percent say they use the same password across multiple accounts. More worrying still, more than a third (36 percent) report that they use the same password for 25 percent or more of their online accounts.

6. But how does our ransomware make you feel?

Ransomware crooks have become skilled psychological manipulators in their attempts to fleece victims of file-encrypting malware.

Analysis of the psychology behind ransomware “splash screens”, the initial warning screens of ransomware attacks, commissioned by SentinelOne, reveals how social engineering tactics are used by cyber criminals to manipulate and elicit payments from individuals.

7. Undetected For Years, Stantinko Malware Infected Half a Million Systems

A massive botnet that remained under the radar for the past five years managed to infect around half a million computers and allows operators to “execute anything on the infected host,” ESET researchers warn.

Dubbed Stantinko, the botnet has powered a massive adware campaign active since 2012, mainly targeting Russia and Ukraine, but remained hidden courtesy of code encryption and the ability to rapidly adapt to avoid detection by anti-malware solutions.

8. Modified versions of Nukebot Trojan spotted in wild after code leak

In March, the source code for a new banking Trojan, dubbed Nuclear Bot (Nukebot ), was available for sale in the cyber criminal underground.The Nuclear Bot banking Trojan first appeared in the cybercrime forums in early December when it was offered for $2,500. The malicious code implements some features commonly seen in banking Trojans, it is able to inject code in Mozilla Firefox, Internet Explorer and Google Chrome browsers and steal sensitive data provided by the users.

9. Cracked Your Smartphone Screen? Think Again Before Buying Aftermarket Replacement

How secure is your smartphone? Do you know what you can do to help the hackers who increasingly see it as a desired and lucrative target?

Fortinet’s Threat Landscape Report found that mobile malware as a percent of total malware rose from 1.7% in the last quarter of 2016 to 8.7% in the first quarter of 2017.

10 . Critical security vulnerabilities enable full control of the Segway miniPRO electric scooter

New IOActive research exposes critical security vulnerabilities found in the Segway miniPRO electric scooter.

If exploited, an attacker could bypass safety systems and remotely take control of the device, including changing settings, pace, direction, or even disabling the motor and bringing it to an abrupt and unexpected stop while a rider is in motion.

By the way: if you want to see what we’re reading and dive straight into the most important security news from the industry and beyond, we’ve set up a Flipboard magazine just for that. You can browse through it right now.

This week, we’ve published an article covering the best practices in maintaining an organization’s data integrity, and also an analysis of all the critical vulnerabilities found in Windows that make it vulnerable to a new wave of cyber attacks. 

Security articles of the week (July 10 – 14, 2017)

Possibly the biggest story of the week was the Verizon leak that exposed data on millions of its customers. Other stories of interest include the new Apple Mac money stealing malware and the Android HighRise malware that the CIA used to intercept SMS messages.

1. Millions of Verizon customer records exposed in security lapse

An Israeli technology company has exposed millions of Verizon customer records, ZDNet has learned.

As many as 14 million records of subscribers who called the phone giant’s customer services in the past six months were found on an unprotected Amazon S3 storage server controlled by an employee of Nice Systems, a Ra’anana, Israel-based company.

2. Biometric data stolen from corporate lunch rooms system

A US payment kiosk vendor has been stung by malware scum.

Avanti Markets helps employers monetise the lunch-room and get rid of counter-service, going beyond a simple vending machine to cover the whole sandwiches-fruit-drinks-junk-food with one payment system.

3. ‘HighRise’ Android Malware Used by CIA to Intercept SMS Messages

WikiLeaks on Thursday published a user guide describing what appears to be a tool used by the U.S. Central Intelligence Agency (CIA) to intercept SMS messages on Android mobile devices.

Named HighRise, the version of the malware described in the WikiLeaks document is disguised as an app called TideCheck, and it only works on Android versions between 4.0 and 4.3.

4. “Particle” Chrome extension turns into adware after being sold to a new developer

Users who have Particle For YouTube extension installed on their browsers should consider removing it as soon as possible. The original developer of the extension sold the extension to a new developer, which turns out to be a collector of abandoned Chrome extensions.

5. Australia to Compel Chat Apps to Hand Over Encrypted Messages

Social media giants like Facebook and WhatsApp will be compelled to share encrypted messages of suspected terrorists and other criminals with Australian police under new laws unveiled Friday.

6. What can be hacked in 2017

Modern technology is a terrific thing, however, like everything else in this world, it is not ideal.
Everything that is connected to the Internet directly or with the help of some wireless technology, is “under risk”. From cars and houses to medical devices and ATMs these are 11 crucial things of our life that could be hacked.

7. Samsung Tizen Accused of Being Home to at Least 27,000 Findable Bugs

A purveyor of static code analysis wished to pitch his product to Samsung. What better way, he thought, than to run his product against the Samsung Tizen operating system, and demonstrate the results. The demonstration fell through, and the purveyor decided instead to publish his findings.

8. Watch out for this money stealing macOS malware which mimics your online bank

A recently discovered strain of Apple Mac malware has begun mimicking major banking websites in an effort to steal credentials from victims.

First uncovered in May, OSX.Dok affected all versions of Apple’s older OS X operating system and was initially used to spy on victims’ web traffic.

9. Windows 10 Finally Getting a Feature to Reset Passwords from the Lock Screen

Windows 10 users will finally be allowed to reset their account passwords from the lock screen, with Microsoft currently testing a feature that would enable password recovery with help from digital assistant Cortana.

10. Cyberespionage: Your intellectual property under threat

Cyberespionage conjures up nightmare scenarios for private and public organizations. For governments, it might involve the prospect of foreign agents filching details on a new missile system. For an auto company, it could be hackers stealing their blueprints for a next-generation auto.

By the way: if you want to see what we’re reading and dive straight into the most important security news from the industry and beyond, we’ve set up a Flipboard magazine just for that. You can browse through it right now.

This week, we’ve published an article detailing how malicious insider threats operate, and how they can seriously mess up a company’s security. In short, these are employees that hack or sabotage their own company, either for profit or simply vengeance. We recommend you check out the whole article, for all of the stories that we’ve included. 

Security articles of the week (July 3-7, 2017)

Last week’s Petya/NotPetya attack left again left us wondering just how much worse cyber attacks are going to be. Within a year, we’ve had the Mirai attack, WannaCry and now Petya. Judging from the state of cybersecurity, these attacks aren’t going to stop anytime soon. Fortunately for those affected by Petya, a decryption key was made public by its author.

In any case, here are this weeks top cybersecurity articles:

1.     Google Patches Critical Vulnerabilities in Android

Google on Wednesday announced that a total of 138 vulnerabilities were addressed in the Android platform with the release of this month’s set of security patches.

The July 2017 Android Security Bulletin was split in two partial security patch level strings: the 2017-07-01 security patch level that addresses issues in the platform itself, and the 2017-07-05 security patch level, which resolves device-specific vulnerabilities in various components supplied by manufacturers.

2.     Someone’s phishing US nuke power stations. So far, no kaboom

Don’t panic, but attackers are trying to phish their way into machines in various US power facilities, including nuclear power station operators.

It seems so far whoever behind the campaign has tried phishing and watering-hole attacks, but haven’t got beyond corporate networks (which in critical infrastructure should be on separate networks from the operational systems).

3.     iPhone Bugs Are Too Valuable to Report to Apple

The iPhone’s security is so tight that it’s hard to find any flaws at all, which leads to sky-high prices for bugs on the grey market. Researchers I spoke to are reluctant to report bugs both because they are so valuable and because reporting some bugs may actually prevent them from doing more research.

4.  14 Million Android Phones Infected with CopyCat Malware

Android users have once again been exposed to malware, as security company Check Point detected a new form of CopyCat that hit no less than 14 million devices across the world.

5.  Petya author releases master decryption key for all versions of the ransomware

Janus Cybercrime Solutions has provided a key that work with all “official” variants of Petya (meaning NotPetya is not included). The key was released to — of all places — Mega, and its authenticity has been verified. While Petya has already been cracked, the key offers the fastest and most reliable decryption method yet.

6.  Satellite phone communications can be decrypted in near real-time

Satellite phone communications encrypted with the GMR-2 cipher can be decrypted in mere fractions of a second, two Chinese researchers have proved.

7. Major cryptocurrency exchange hacked – customers’ Bitcoin and Ethereum accounts plundered

One of the world’s largest cryptocurrency exchanges has fallen victim to hackers, who were able to use information they stole to plunder users’ accounts.

According to local media reports, Bithumb informed the Korea Internet & Security Agency (KISA) late last week that the personal information on approximately 32,000 customers was compromised – although passwords were not taken.

8. Help! Hackers Stole My Password Just By Listening To Me Type On Skype!

For many, everyday life involves sitting in front of a computer typing endless emails, presentation documents and reports. Then there’s the frequent typing of passwords just to get access to those files. But beware: researchers have hacked together a tool that can harvest what’s being typed simply by listening to the sounds of the keys.

9. Ransomware Smackdown: NotPetya Not as Bad as WannaCry

Microsoft says the outbreak of NotPetya – aka SortaPetya, Petna, ExPetr, GoldenEye, Nyetya and Diskcoder.C – that began June 27 resulted in “a less widespread attack” than WannaCry, aka WannaCrypt. That was despite NotPetya being even more sophisticated than WannaCry – by many security experts’ reckoning – as well as NotPetya targeting the same EternalBlue server message block exploit in Windows that had enabled WannaCry to spread far and fast.

10. Pre-Installed Software Flaws Expose Dell Systems to Code Execution

Flaws in pre-installed software expose Dell systems to attacks that could result in the disabling of security mechanisms, privilege escalation, and arbitrary code execution within the context of the application user.

By the way: if you want to see what we’re reading and dive straight into the most important security news from the industry and beyond, we’ve set up a Flipboard magazine just for that. You can browse through it right now.

We’ve also published a security alert for the big ransomware attack that took place earlier in the week. Turns out copy cats are now trying to emulate WannaCry’s legacy.

And be sure not to miss our latest article that explores how malicious websites end up infecting a user’s PC.

Security articles of the week (May 26-30, 2017)

By far the biggest news headline of the week was the Petya (or is that NotPetya?) ransomware attack. Petya used the foundations laid out by WannaCry, and makes us wonder how many similar attacks will occur in the future.

In the meantime, here are the other big stories of the week:

1.         Google’s Elite Hacker SWAT Team vs. Everyone

Brash. Controversial. A guard against rising digital threats around the globe. Google’s Project Zero is securing the Internet on its own terms. Is that a problem?

2.         Windows 10 to Get Built-in Protection Against Most Ransomware Attacks

In the wake of recent devastating global ransomware outbreaks, Microsoft has finally realized that its Windows operating system is deadly vulnerable to ransomware and other emerging threats that specifically targets its platform.

To tackle this serious issue, the tech giant has introduced a new anti-ransomware feature in its latest Windows 10 Insider Preview Build (16232) yesterday evening, along with several other security features.

3.         List of data breaches and cyber attacks in June 2017 – 199 million records leaked

As we hit the midpoint of 2017, Petya ransomware is infecting systems all across the globe – leaving hundreds of businesses unable to operate.

However, let’s not let this outbreak distract us from other cyber attacks and breaches that have also taken place this month.

4.         Everything you need to know about the Petya, er, NotPetya nasty trashing PCs worldwide

The malware, dubbed NotPetya because it masquerades as the Petya ransomware, exploded across the world on Tuesday, taking out businesses from shipping ports and supermarkets to ad agencies and law firms. Once inside a corporate network, this well-oiled destructive program worms its way from computer to computer, trashing the infected machines’ filesystems.

5.         CIA contractors fired for stealing from hacked IoT snack machines

FreedomPay: it’s the kind of vending machine technology that makes paying for snacks “faster, simpler, safer, and smarter”, the company says.

Handy for, say, CIA agents who feel a hankering for a lunch of peanuts and Pepsi.

Here’s how it works, and here’s how a bunch of contractors working for the US Central Intelligence Agency (CIA) got themselves some free goodies… And got caught red-handed… And got fired.

6.         Google halts Gmail scanning for targeted ads

In an attempt to end further confusion between its free and paid products, Google will soon end the controversial practice of scanning the emails of Gmail users.

7.         The British Parliament was hit by “sustained and determined” cyber attack

On Friday, the British Parliament was hit by a cyber attack. Hackers tried to get access to all email accounts of the members of the Parliament and the parliamentary staff. In order to secure the network, the email service was shut down immediately. MPs were unable to login to their emails remotely or via phones.

8.         Year-old vulnerability allowed pro-ISIS hackers to hack US Government websites

As Hot for Security reported yesterday, a number of US government websites were defaced over the weekend by a group known as Team System DZ, who posted disturbing pro-ISIS messages.

9.         Microsoft confirms Windows 10 source code leak

Microsoft is the latest company to fall victim to a major online leak after a small portion of the source code for its Windows 10 operating system was posted this week.

10.                         Hacker Steals Millions of Accounts from Internet Radio Service 8tracks

Millions of accounts for internet radio service 8tracks are being traded on the digital underground, judging by a set of stolen user details obtained by Motherboard.

By the way: if you want to see what we’re reading and dive straight into the most important security news from the industry and beyond, we’ve set up a Flipboard magazine just for that. You can browse through it right now.

Have you ever been worried about hackers taking control of your email or social media account? It’s scary thing to imagine, and it can happen even to the best of us. Fortunately, there are a number of ways available for you to recover them. This is the topic of the  article we published this week, which we recommend you check out. 

Security articles of the week (June 19-23, 2017)

The biggest story of the week, by far, was the huge leak of nearly 200 million American voters. However, because the fallout was limited to Americans, it didn’t take up as much headline space in other countries.

In any case, here are this week’s biggest cybersecurity stories:

1. How PayPal Protects Billions of Transactions

How does PayPal, one of the world’s largest internet payment companies with over 203 million active users, maintain a fraud loss rate of just .032 percent? Guru Bhatt, PayPal’s general manager of technology and head of engineering, says it comes down to a combination of sophisticated automation, machine learning, and human insight.

2. Meet 5 of the World’s Most Dangerous Hacker Groups

Hacking has come a long way from the days of maladjusted teenagers wreaking digital havoc from their basements. As Fortune explains in the cover story of our Jul. 1 issue, today the biggest and baddest hacker groups are backed by nation-states. They’re called “advanced persistent threats” or APTs, in the cyber jargon, a phrase meant to convey their supreme and underlying quality: ferocity. Below are a few of the most notorious—and feared—state-affiliated hacking groups around.

3. Why So Many Top Hackers Hail from Russia

Conventional wisdom says one reason so many hackers seem to hail from Russia and parts of the former Soviet Union is that these countries have traditionally placed a much greater emphasis than educational institutions in the West on teaching information technology in middle and high schools, and yet they lack a Silicon Valley-like pipeline to help talented IT experts channel their skills into high-paying jobs.

4. 198 million Americans hit by ‘largest ever’ voter records leak

A huge trove of voter data, including personal information and voter profiling data on what’s thought to be every registered US voter dating back more than a decade, has been found on an exposed and unsecured server, ZDNet has learned.

5. Virgin Media tells 800,000 customers to change passwords after routers found vulnerable to hackers

Virgin Media has warned 800,000 customers using its Super Hub 2 router to change their passwords because a security vulnerability could expose their passwords to hackers, enabling attackers to gain control of other smart devices on the network.

6. ‘How foul-mouthed hackers messed up my life’

It’s not normally a good idea to sign off your Powerpoint presentation pitching for work with an expletive.
But this is what Gary Berman did – albeit unknowingly.
Hackers had broken in to his home network via an internet-connected printer and sabotaged his files. Instead of signing off with “thank you”, the hackers changed the first word to something offensive.

7. WannaCry Ransomware Infects Australian Traffic Cameras, Human Error Blamed

It has been revealed that 55 traffic and speed cameras in the state of Victoria, Australia, have been accidentally infected with the WannaCry ransomware that struck organisations hard around the world last month.

8. Microsoft says ‘no known ransomware’ runs on Windows 10 S — so we tried to hack it

Microsoft claims “no known ransomware” runs on Windows 10 S, its newest, security-focused operating system. Microsoft touted the operating system as being less susceptible to ransomware because of its locked down configuration.

9. Google’s whack-a-mole with Android adware continues

Why can’t Google put a stop to adware on their official Android app marketplace? The analysis by Trend Micro researchers of a Trojan Android ad library dubbed Xavier tells the story.

10. How Hackers Manipulate Email to Defraud You and Your Customers

Internet fraud is one of the most common motivators of cybercrime. Millions of dollars are stolen every year from victims who are tricked into initiating wire transfer payments through social engineering tactics and computer breaches. This is typically accomplished using one of three methods: business email compromise (BEC), email account compromise (EAC), and spoofing.

By the way: if you want to see what we’re reading and dive straight into the most important security news from the industry and beyond, we’ve set up a Flipboard magazine just for that. You can browse through it right now.

This week, we’ve published an in-depth article about banking Trojans. This type of malware has been around for a very long time, but the past few years has seen it evolve new features and functionalities that make it much more terrifying than before.

Security articles of the week (June 12-16, 2017)

This week has seen a lot of interesting stories, and some of them have offered us information that is off the usually travelled path, such as how attackers try nearly 100,000 times to breach a system.

No more spoilers though, here are this week’s best cybersecurity stories:

1.         How a Single Email Stole $1.9 Million from Southern Oregon University

Southern Oregon University has announced that it is the latest organization to fall victim to a business email compromise (BEC) attack after fraudsters tricked the educational establishment into transferring money into a bank account under their control.

2.         The 15 worst data security breaches of the 21st Century

Data security breaches happen daily, in too many places at once to keep count. But what constitutes a huge breach versus a small one? CSO compiled a list of 15 of the biggest or most significant breaches of the 21st century.

3.         Report: 19% of business passwords ‘easily compromised’

Despite high profile breaches continuing to make headlines, weak passwords remain an issue for enterprises worldwide, leading to breaches and other security issues. An average of 19% of enterprise professionals use poor quality passwords or shared passwords that make their accounts “easily compromised,” according to a new report from security firm Preempt.

4.         Relentless Attackers Try Over 100,000 Times Before They Breach a System

One of the big reasons why security teams struggle to keep up with threats is because the bad guys are relentless with their attack attempts. The security community has long warned enterprises of the scope of cybercriminal efforts to seek out vulnerable targets of opportunity through automated attack tools. But sometimes it is hard to take in the scale of it all without a number to back it up. New research out this week from security start-up tCell did just that.

5.         Samsung Left Millions Vulnerable to Hackers Because It Forgot to Renew a Domain, Researchers Say

Samsung, the most popular smartphone maker in the world, left millions of customers vulnerable to hackers after it let expire a domain that was used to control a stock app installed on older devices, security researchers say.

6.         One million people affected by WSU data breach

Names and personal data of about a million people may have been compromised in a burglary involving Washington State University property. This month the university started alerting people who could be impacted.

7.         Report predicts banks to get €4.7bn fines in first 3 years under GDPR

A new report is “conservatively” forecasting that European finance organisations are about to shell out  €4.7 billion in first three years after the GDPR comes into power thanks to data breaches which they don’t currently have to declare.

8.         Advanced CIA firmware has been infecting Wi-Fi routers for years

Home routers from 10 manufacturers, including Linksys, DLink, and Belkin, can be turned into covert listening posts that allow the Central Intelligence Agency to monitor and manipulate incoming and outgoing traffic and infect connected devices. That’s according to secret documents posted Thursday by WikiLeaks.

9.         WannaCry is North Korean, security researchers say

Nearly a month after it struck devices around the globe, new information has emerged surrounding the major WannaCry ransomware attack.

The BBC says British officials from the National Cyber Security Centre (NCSC) are now claiming infamous North Korean cyber-criminal group Lazarus was behind the attack.

10.      Scam App in Apple’s Top 10 Rakes in $80K Per Month

One of Apple’s top 10 productivity apps—“Mobile protection :Clean & Security VPN”—has been pulled from the Apple store after it was uncovered as a scam—and an obvious one at that, starting with the grammar issues in its name.

By the way: if you want to see what we’re reading and dive straight into the most important security news from the industry and beyond, we’ve set up a Flipboard magazine just for that. You can browse through it right now.

Business types will be interested in the latest article we’ve published this week: Your Essential Guide to Cyber Liability Insurance. As the name implies, it covers the basics of cybersecurity insurance, and why it’s such a good idea for businesses to consider.

Security articles of the week (June 5-9, 2017)

An unusually quiet week, with few major hackings, leaks, breaches and what not. Chances are the summer vacation has started for most malicious hackers out there. Or it can just be a temporary lull and next week we’ll have Pandemonium again.

In any case, here are this week’s top cybersecurity stories:

1.         Internet cameras have hard-coded password that can’t be changed

Security cameras manufactured by China-based Foscam are vulnerable to remote take-over hacks that allow attackers to view video feeds, download stored files, and possibly compromise other devices connected to a local network. That’s according to a 12-page report released Wednesday by security firm F-Secure.

2.         Outdated Operating Systems, Browsers Correlate with Real Data Breaches

Study shows companies running out-of-date OSes were three times more likely to suffer a data breach, and those with the outdated browsers, two times more likely.

3.         How computer security pros hack the hackers

If you want to meet a really smart hacker, talk to a cybersecurity defender. These talented professionals are working every day to make cybercrime harder and less lucrative.

4.         Android Malware ‘Dvmap’ Delivered via Google Play

Researchers at Kaspersky Lab recently came across a new Trojan designed to target Android smartphones. The malware, delivered via the Google Play store, is capable of rooting devices and it leverages some new techniques to achieve its goal.

5.         14-Year-Old Japanese Boy Arrested for Creating Ransomware

Japanese authorities have arrested a 14-year-old boy in Osaka, a prefecture and large port city, for allegedly creating and distributing a ransomware malware.

6.         Online Voting Is a Terrible Idea

After the onslaught of computer intrusions suffered by US institutions and political parties in the 2016 presidential election, the decade-old issue of electoral systems’ security was brought back into the public discourse. The American people had the concrete fear their vote too might be manipulated. They worried the election could be factually hacked.

7.         Botnet activity rises by 69 percent

There has been an increase of 69 percent in botnet activity. These botnets are led by the Ursnif malware, allowing cyber criminals access they need to kick off long-term intrusions. Other tools are also used for surveillance and espionage, like TrickBot, DELoader and Zeus Panda.

8.         Move Over, Mirai: Persirai Now the Top IP Camera Botnet

The success of the massive Mirai botnet-enabled DDoS attacks of last year has spawned a lot of me-too malware designed to break into and exploit vulnerable Internet of Things devices.

One such malware family that appears to have achieved more success than rivals is Persirai, a botnet malware targeting Internet Protocol (IP) cameras.

9.         Malicious Downloader Uses Mouse-Hovering to Deliver Banking Trojan

A malicious downloader waits for users to hover over modified text or an image file as a means of delivering a banking trojan.

10.    Sneaky hackers use Intel management tools to bypass Windows firewall

When you’re a bad guy breaking into a network, the first problem you need to solve is, of course, getting into the remote system and running your malware on it. But once you’re there, the next challenge is usually to make sure that your activity is as hard to detect as possible. Microsoft has detailed a neat technique used by a group in Southeast Asia that abuses legitimate management tools to evade firewalls and other endpoint-based network monitoring.

By the way: if you want to see what we’re reading and dive straight into the most important security news from the industry and beyond, we’ve set up a Flipboard magazine just for that. You can browse through it right now.

This week, we’ve had over 20 cybersecurity experts take part in our latest expert roundup, which sought to answer the question: “What is the best educational cybersecurity book?”. Be sure to check out the full article for all the answers and recommended good reads!

Security articles of the week (May 29 – June 2, 2017)

Things have finally settled down a bit after the momentous WannaCry attack, and we’re now back to our regular pattern. Unfortunately, the people who made WannaCry possible, the ShadowBrokers, still have many tricks up their sleeve.

1.  Shadow Brokers Launches 0-Day Exploit Subscriptions for $21,000 Per Month

As promised to release more zero-days exploits and hacking tools for various platforms starting from June 2017, the infamous hacking group Shadow Brokers is back with more information on how to subscribe and become a private member for receiving exclusive access to the future leaks.

The Shadow Brokers is the same hacking group who leaked NSA’s built Windows hacking tools and zero-day exploits in public that led to the WannaCry menace.

2.     Dark Web Hackers Are Attacking Each Other Relentlessly

Cybercriminals operating inside the Dark Web continuously launch attacks and surveillance attempts designed to disrupt their fellow black hats, new Trend Micro research has revealed.

3.     ShadowBrokers Hacker Group To Publish More NSA Code

New batch of stolen code to be auctioned by hacker group, despite earlier pledge to shut down operation

Hacker collective ShadowBrokers have warned that they will release in July a fresh batch of stolen code reportedly from the National Security Agency (NSA).

4.     Plastic surgery patients face extortion in wake of clinic data breach

Thousands of private photos have been leaked by cybercriminals following the hack of a Lithuanian cosmetic surgery clinic.

A hacking group, using the nickname “Tsar Team”, leaked images it claims came from the Grozio Chirurgija clinic servers. The group spaffed the data after targeted health facility’s customers failed to meet extortionate payment demands.

5.     ‘Lone Wolf’ Criminal Hacker Gets Doxed Thanks To Series Of Dumb Mistakes

A cybercriminal from Eastern Europe who has been hacking a Chinese company for years appears to have carelessly exposed his own real identity.

6.     Vulnerability affecting 1,000+ apps is exposing terabytes of data

A newly discovered backend data exposure vulnerability, dubbed HospitalGown, highlights the connection between mobile apps and insecure backend databases. Appthority documented more than 1,000 apps with this vulnerability, and researched in detail 39 applications with big data leaks, which exposed an estimated 280 million records.

7.     The Changing Face of Criminal Behavior

This infographic by the University of Cincinnati shows how traditional criminals slowly switch over to cybercrime. Cybercrime is more lucrative to malicious hackers than crimes such as car stealing or burglary.

8.     Judy malware campaign victimized as many as 36.5 million Android users

A malware campaign on Google Play has victimized as many as 36.5 million Android users with adware known as “Judy.”

Researchers at Check Point discovered 41 apps laden with the auto-clicking adware on the Play Store. After receiving word from the researchers, Google removed the programs from its app marketplace. But that wasn’t before the apps achieved between 4.5 million and 18.5 million downloads.

9.     Chrome bug that lets sites secretly record you ‘not a flaw’, insists Google

There’s a Google Chrome “bug” (depending on who you ask) that allows sites to surreptitiously record audio and visual, all without an indicator light. As BleepingComputer reports, AOL web developer Ran Bar-Zik discovered the issue – which Google says is not a security vulnerability – while at work, when he was dealing with a website that ran WebRTC code.

10.     Windows XP crashed too much to spread WannaCrypt

Yes, WannaCrypt can infect all those machines that still run Windows XP, but because XP is so flaky the zombie boxen are unlikely to have contributed much to the spread of the worm.

By the way: if you want to see what we’re reading and dive straight into the most important security news from the industry and beyond, we’ve set up a Flipboard magazine just for that. You can browse through it right now.

We’ve had a lot to write about this week. WannaCry, EternalBlue, Uiwix, BlueDoom. It seemed like we had an unending stream of cyber attacks. On top of that, we’ve written a quick guide on how to patch the EternalBlue vulnerability and also how a business can secure its IT network. Here’s a list of everything:

Security articles of the week (May 15-19, 2017)

Without a doubt, the WannaCry attack was the biggest even of the week. No, scratch that. It was the biggest even of the year, so far. The closest thing we can compare it to is the Mirai botnet attack in late last year.

But hidden in the shadow of the WannaCry attack however, are other big stories which each deserves attention.

Here is this weeks cybersecurity roundup:

1.     Twitter abandons ‘Do Not Track’ privacy protection

Twitter was one of the first companies to support Do Not Track (DNT), the website privacy policy. Now, Twitter is abandoning DNT and its mission to protect people from being tracked as they wander over the web.

2.     WannaCry Ransomware Decryption Tool Released; Unlock Files Without Paying Ransom

If your PC has been infected by WannaCry – the ransomware that wreaked havoc across the world last Friday – you might be lucky to get your locked files back without paying the ransom of $300 to the cyber criminals.

Adrien Guinet, a French security researcher from Quarkslab, has discovered a way to retrieve the secret encryption keys used by the WannaCry ransomware for free, which works on Windows XP, Windows 7, Windows Vista, Windows Server 2003 and 2008 operating systems.

3.     FCC votes to overturn net neutrality rules

The US Federal Communications Commission has voted to overturn rules that force ISPs to treat all data traffic as equal.

Commissioners at the agency voted two-to-one to end a “net neutrality” order enacted in 2015.

4.     Zomato Hacked! Database of 17 Million Users Stolen

Restaurant search website Zomato has announced that it has suffered a major security breach, resulting in the theft of a user database containing 17 million users’ names, email addresses and passwords.

5.     Ransomware attack: How a nuisance became a global threat

Ransomware was already becoming a higher priority before the WannaCry epidemic of last week, but it’s clear that it has now made the shift from nuisance to serious threat.

Ransomware has been an irritation for more than a decade, but only in the last few years has it become a real problem.

6.     Bell Canada Hack Hits 1.9 Million Customers

Bell Canada says an anonymous hacker has obtained some customers’ names and telephone numbers as well as email addresses.

The telecommunications giant says illegally accessed information included approximately 1.9 million active email addresses and approximately 1,700 customer names and active phone numbers.

7.     Bloke charged under UK terror law for refusing to cough up passwords

British police have charged a man under antiterror laws after he refused to hand over his phone and laptop passwords.

Muhammad Rabbani, international director of CAGE, was arrested at Heathrow in November after declining to unlock his devices, claiming they contained confidential testimony describing torture in Afghanistan as well as information on high-ranking officials.

8.     Facebook is losing the fight against the spread of fake news

Leaked photos showing how Obama practiced Islam in the White House! Trump’s legalization of bald-eagle hunting! … The president’s cancellation of Saturday Night Live!!!

What do they have in common?

They’re all fake news, they’ve all been debunked, and yet you can still find those “news” articles on Facebook.

9.     More than 600K User Accounts Exposed in DaFont Database Theft

A hacker compromised more than 600,000 users’ accounts when they stole a database operated by the font sharing site DaFont.

In early May 2017, the currently unnamed hacker stole a site database containing 699,464 usernames, email addresses, and hashed passwords after hearing of other attacks launched against it.

10.  DocuSign admits hackers accessed its customer email database, sent out malware

DocuSign has now discovered that hackers managed to breach its systems and gain access to a system that allowed the attackers to send out emails to DocuSign’s customers.

By the way: if you want to see what we’re reading and dive straight into the most important security news from the industry and beyond, we’ve set up a Flipboard magazine just for that. You can browse through it right now.

Security Tips and Tricks from Top Experts
2016.06.27 SLOW READ

50+ Internet Security Tips & Tricks from Top Experts

Expert Roundup Software Patching
2016.04.06 SLOW READ

15+ Experts Explain Why Software Patching is Key for Your Online Security

27 Cyber Security Experts
2015.08.25 SLOW READ

The Most Common Mistakes These 27 Cyber Security Experts Wish You’d Stop Doing

Comments

Howdy, I do think your blog could possibly be having internet browser compatibility problems. When I look at your web site in Safari, it looks fine but when opening in IE, it’s got some overlapping issues. I just wanted to provide you with a quick heads up! Aside from that, fantastic site!

Thanks for letting us know. Are you sure your browser resolution is set to the standard for your desktop resolution? We’ve found that other readers experienced this and, when they set their browser resolution to normal, the issue was gone. The fastest way to do this is to hold CTRL and press 0.

And thanks for the awesome feedback!

Leave a Reply

Your email address will not be published. Required fields are marked *

GO TO TOP
157 queries in 1.171 seconds