Romanian man has been arrested and charged with conspiracy relating to his involvement in a prolific ATM malware campaign.
Emanual Leahu, 30, was arrested in the western city of Bacău, Romania by the London Regional Fraud Team (LRFT) London police run by the City of London Police on Tuesday 20 September, extradited to the United Kingdom last week.
Leahu is believed to be a member of a European ATM hacking gang that stole more than £1.5 Million ($2 Million) from cash machines across the UK in 2014 using ATM malware to bypass security controls.
The gang physically broke into ATMs to directly load malware onto the machines, allowing it to withdraw "large amounts of cash." The malware was good enough to erase itself to hide its tracks, making it difficult to identify the culprit.
Three out of Five Gang Members Arrested
Luckily, due to the gang's carelessness, one of its members was recorded by a hidden ATM surveillance camera, which allowed the police to identify and arrest him.
The gang hit 51 ATMs in standalone public places across the UK, including London, Portsmouth, Bognor Regis, Brighton and Liverpool over the 2014 May Bank Holiday weekend.
This is the third arrest in the case after Grigore Paladi and Teofil Bortos, who were arrested and sentenced in 2014 and 2015 to 5 and 7 years in jail for their roles in robbing vulnerable ATMs.
According to the UK authorities, the gang has five members, with the other two suspects still remain at large in Romania. European arrest warrants have already been issued in their names as well.
Friday, 7 October 2016
Spotify Free Service Caught Dropping Malware on User Browsers
MANY SPOTIFY USERS ARE COMPLAINING THAT ITS FREEMIUM SERVICE IS INFECTING THEIR BROWSERS WITH MALWARE.
“There’s something pretty alarming going on right now with Spotify Free. This started a several hours ago. If you have Spotify Free open, it will launch – and keep on launching – the default internet browser on the computer to different kinds of malware / virus sites. Some of them do not even require user action to be able to cause harm.”
“We’re currently looking into this with the team here. We’ll pass that information on to the investigating team. We’ll also make sure to update this thread once we have a further update to share with you.”
Two INDISHELL Hacker group’s members arrested at Noida
- Sumit Gupta (24)
- Ankit Singh (22)
Over 32 Million Twitter Accounts Possibly Hacked
Tuesday, 4 October 2016
Watch Out Gamers: Hacked Steam Accounts Distributing Malware
STEAM USERS ARE AGAIN UNDER THE RADAR OF CYBER CRIMINALS — THIS TIME, HACKED STEAM ACCOUNTS HAVE BEEN FOUND DISTRIBUTING REMOTE ACCESS TROJAN (RAT).
Monday, 3 October 2016
South Korea says their military cyber command was hacked
South Korea says its military cyber command center was hacked last month after officials found a malicious code in the system. It is unclear how the code got into the system but its target was a ”vaccine routing server” used by country’s military cyber command.
The vaccine routing server was installed to provide extra security to military computers connected to the Internet. According to Yonhap News country’s national defense committee member Kim Jin-pyo:
“A malicious code has been identified and it seems to have taken advantage of the vulnerability of the routing server,” he said. “In a cautious measure, the server has been separated from the network.”
Kim also suggested that the chances of stealing or leaking sensitive data are low as the military intranet was not connected to the targeted server.
The usual suspect of this attack is North Korea however the investigators are on a fact-finding mission and will not officially blame anyone until investigations are completed.
You shouldn’t be surprised if North Korea is found to be the culprit behind this attack. The South has blamed North several times for conducting cyber operations against its servers. Last year, North pointed their fingers on the South for hacking its Neaclure plant and subway system.
Unit 21 is one of the more well known state-sponsored hackers. Unit 121 is an elite group of highly trained hackers, who are solely focused on cyber espionage. This unit is made up of the best and brightest minds, that have been handpicked from a very early to be trained in cyber warfare.
New Lockscreen Ransomware Targeting Android Devices
Meet Linux.Mirai Trojan, a DDoS nightmare
Sunday, 2 October 2016
How To Increase Your Web Browing Speed. 3 Ways to hack DNS, which will increase your Web Browsing Speed
There is perhaps nothing more painful than having a slow internet connection in the modern world and it is even more painful if you have good bandwidth but it does not capitalizes the full potential of the bandwidth. One good way to make your browsing experience faster and more reliable is by hacking the Domain Name System (DNS) system.
The routers and internet servers do not understand the web address that you write in your browser, such as http://www.google.com. The website’s address is converted in to a string of numbers which is called IP address, such as 74.125.224.72. DNS server is the one which transforms a web address into an IP address. If your ISP’s connection with the DNS server is slow then it does not matter how big your bandwidth is since the full potential cannot be utilized as the DNS lookup will be slow.
Three ways are suggested in the following text to hack the DNS lookup process to make it faster by not using your ISP’s DNS server.
OpenDNS is the one that is preferred by many, more than 50 million, and it is our favorite too. It has 21 global data centers which are strategically located so that when a DNS request is made the closest DNS server resolves it. Thus, making the process faster as company describes it in the following words:
“Unlike other providers, OpenDNS’s network uses sophisticated Anycast routing technology, which means no matter where you are in the world, your DNS requests are answered by the datacenter closest to you.”
It is more reliable and secure than the ISP’s DNS server as well. On top of that it is very flexible and provides many additional features. When you signup then you will provided with a guided manual about the service.
Google Public DNS
Google has a vast knowledge base about DNS because of their search technology which requires crawling the web faster to answer search queries faster. Thus, they also have a very good, free and reliable DNS service. You can get more information instructions here.
namebench
namebench is very different from OpenDNS or Google Public DNS in the sense that it is a free software which you download and install on your device and then run it to find the best DNS system for you. It does not resolves the DNS itself but compares different DNS systems, such as OpenDNS or Google Public DNS or your ISP’s DNS.
from WordPress http://ift.tt/2dHCWq2
via IFTTT
Anyone can use Facebook servers for DDoS attacks: Vulnerability Exposed
Distributed denial-of-service (DDoS) attacks are ever increasing and the attackers are using novel and sophisticated ways to carry out their malicious acts. A new way is to use Facebook ‘Notes’ as a mechanism to trigger DDoS attack using the image, <img>, tag according to Chaman Thapa, known as ‘chr13’ who wrote in a blog recently.
“Facebook Notes allows users to include <img> tags. Whenever a <img> tag is used, Facebook crawls the image from the external server and caches it,” Thapa wrote.“Facebook will only cache the image once however using random get parameters the cache can be by-passed and the feature can be abused to cause a huge HTTP GET flood.”
He explained the steps needed to be taken in the blog one by one. The users can tag 1000 images in one Facebook Note or the same image can be tagged a 1000 times. Suppose each image is at least 1 Mb and if 100 users try to see the note at the same time then the amount of parallel requests for Facebook servers is already huge that is 1 * 100 * 1000 = 100,000 Mb or 97.65 Gb.
This can become even bigger if the image file is replaced with some other file of larger size. For example, Thapa used PDF file of 13 Mb and demonstrated that the impact can be huge.
“Getting rid of the browser and using the poc script I was able to get ~900 Mbps outbound traffic,” Thapa wrote in his blog. He continues:
“I was using an ordinary 13 MB PDF file which was fetched by Facebook 180,000+ times, number of Facebook servers involved was 112.”
He found similar issues with Google also which means that the method can be easily replicated to other services. After reporting the issue to Facebook, Thapa got a reply from them telling him that they will not fix it. Facebook wrote:
“In the end, the conclusion is that there’s no real way to us fix this that would stop “attacks” against small consumer grade sites without also significantly degrading the overall functionality.”
Thapa criticized Facebook for not taking it seriously. He wrote:
“I’m not sure why they are not fixing this. Supporting dynamic links in image tags could be a problem and I’m not a big fan of it. I think a manual upload would satisfy the need of users if they want to have dynamically generated image on the notes.”
from WordPress http://ift.tt/2cL19pm
via IFTTT
FBI admits “We have the ability to hack webcam without knowing you”
Most popular investigation agency “FBI” can easily activate the computer’s webcam without any user intervention.
At the time, when we turn on our webcam, there is usually a light which indicates us about the status of cam, but FBI can easily by -pass that and can switch on the webcam without turning on the light.
The agency has the ability to access webcam for years, Washington post reported.
It is also stated by the former assistant director of the FBI’s Operation Technology division ‘Marcus Thomas’-“Our agency can access webcams.”
Thomas pointed out that this ability has been used mainly in counter terrorism or any type of serious criminal investigation.
US officials say- This technique is used by the FBI sparingly, to keep public references to its online surveillance tools to a minimum.
After evidence is gathered, subjects are notified about the surveillance.
Thomas said, “Because of encryption and because targets are increasingly using mobile devices, law enforcement is realising that more and more they’re going to have to be on the device,” “They’re going to have to use these types of tools more and more.”
Until, there is not any rule on whether these types of techniques are attack on privacy.
Whereas, principal technologist for the American Civil Liberties Union ‘Christopher Soghoian’ said, “We have transitioned into a world where law enforcement is hacking into people’s computers, and we have never had public debate,” “Judges are having to make up these powers as they go along.”
from WordPress http://ift.tt/2dJHPLy
via IFTTT
Saturday, 1 October 2016
Cisco Battles Shadow Broker Exploits
Cisco has swung into action to combat a hacker group’s exploitation of vulnerabilities in its firmware. The group, known as the “Shadow Brokers,” released online malware and other exploits it claimed to have stolen from the Equation Group, which is believed to have ties to the United States National Security Agency.
Cisco earlier this month disclosed the vulnerability, along with intrusion prevention system signatures and SNORT rules, “even though the patches are still under development,” said Cisco spokesperson Yvonne Malmgren, “because we learned that there may be public awareness of the vulnerability.”
This will let customers “actively monitor and protect their networks,” she told the E-Commerce Times, and it ensures that they “have the same level of information and awareness that we do.”
Customers can check Cisco’s Events Response Page for updates about its investigation into the issue.
The vulnerability affects products running Cisco IOS XR 4.3.x to 5.2.x, as well as Cisco IOS XE 3.1S and up.
The Cisco IOS Software Checker identifies any Cisco security advisories that impact a specific IOS Software release, as well as the earliest patch for the vulnerabilities in each advisory.
Bracing for Breaches
The vulnerability is in the Internet Key Exchange version 1 packet processing code in Cisco IOS, Cisco IO XE and Cisco IOS XR software.
It’s due to insufficient condition checks in the part of the code that handles IKEv1 security negotiation requests.
Attackers could exploit it by sending a crafted IKEv1 packet to an affected device that’s configured to accept IKEv1 security requests, Cisco said. Exploiting the flaw lets attackers retrieve memory contents, which could lead to the disclosure of confidential information.
The flaw could have a “possibly substantial” impact, said Giovani Vigna, CTO of Lastline.
“Many devices out there are not managed well,” he told the E-Commerce Times. “They are installed and left to cyber-rot.” These mismanaged devices “are going to be vulnerable, and used as the first point of compromise in enterprise networks.”
When exploited, the vulnerability discloses information such as virtual private network configuration details and RSA private and public keys, said Thomas Pore, director of IT and services for Plixer.
They “cover a range of equipment that, in some cases, will likely never be patched,” he told the E-Commerce Times
Customers using Cisco products and others that are affected by this revelation “are bracing themselves for potential data breaches — or, even worse, finding out that some hidden resident malware has been lurking on their systems for an unknown period of time,” remarked Chenxi Wang, chief strategy officer for Twistlock.
“Cisco seems to be moving fairly fast to release fixes for the vulnerabilities disclosed by the Shadow Brokers,” she told the E-Commerce Times, but “the industry would love to see more publicized information on how Cisco achieves secure development lifecycle practices — and possibly a bug bounty program to boot.”
The NSA Connection
If it’s true that the Equation Group does have ties to the NSA, then “if the NSA has zero-day vulnerability information on all the top firewall brands, what other kinds of information do they have at their disposal to conduct surveillance on civilians and organizations at their discretion?” Wang asked.
Those ties could be why the NSA didn’t notify Cisco of the vulnerabilities, suggested Plixer’s Pore, and “the problem with not disclosing vulnerabilities for the sake of national security is that now many U.S. private and government organizations are vulnerable to potential nation-state attacks.”
from WordPress http://ift.tt/2cTjPXx
via IFTTT
Surviving the Internet’s Troll Apocalypse
Social media has sharpened humans’ age-old appetite for public shaming, providing a stage and unlimited seating for a seemingly unending stream of immorality plays. Those who share even the simplest identifying details about themselves are vulnerable to being pushed into the glare of the spotlight.
The anonymity the Internet provides frees many individuals of the consequences they might face offline for being abusive to other people. Perhaps appearing to their friends, family and connections as ordinary people in the real world, these Jekyll-and-Hyde netizens transform into trolls to carry out their online assaults.
Anonymity has been a hot button issue for just about the entire life of the Internet, and although there is no 100 percent solution in sight, the situation is not entirely hopeless, according to Charles King, principal analyst at Pund-IT.
“So long as public sites enable user anonymity, pathological behavior will continue, because it thrives in the shadows,” he told TechNewsWorld. “Forcing abusers into the sunlight may be difficult or impossible — but changes in rules, laws and enforcement practices could make their lives more complicated and less comfortable.”
Deep Dive Into Dirt
We know what the problem looks like, thanks to big data and analytics.
A recent analysis identified more than17,000 tweets related to body shaming, for example, and ranked the most common terms Twitter users lobbed at others to shame them for their weight.
Artificial intelligence soon might be able to catch and moderate cruel posts mere moments after publication, suggested a University of Lisbon team of researchers who have leveraged machine learning to teach AI to suss out sarcasm.
For now, the moderation and reporting tools available aren’t set up to prevent or discourage online abuse, said Rob Enderle, principal analyst at the Enderle Group.
“Reputation protection services can be used, but that doesn’t scale well — they target one person at a time — and it can be really expensive if you have to litigate and your attacker has no money,” he told TechNewsWorld.
What to Do?
It appears Reddit currently has the best system in place, in Enderle’s view, as its shadow-blocking tools shield users from whomever they wish to block, while allowing offenders to keep their accounts. Offenders are none the wiser, barring some detective work.
“Of course, publicizing shamers so they lose their jobs, gym memberships, and get attacked themselves does work,” he acknowledged, “and if it is done enough, that should change behavior.”
However, that approach so far hasn’t been used enough to make a difference, Enderle said.
That could change if social media sites and other forums were willing to make some changes.
They could take proactive steps that might make a difference, noted King, who pointed to a list ofsuggestions for Twitter, posted online by Randi Lee Harper, founder of the Online Abuse Prevention Initiative.
Those changes might result in a significant decrease in the prevalence of abuse on Twitter, but what will it take to inspire websites and their parent companies to intercede?
“Many, if not most, technology vendors bend over backward to avoid favoritism and maintain level playing fields for users of all stripes,” King pointed out. “I respect that attitude, but it’s often subject to being gamed by some users — and in some circumstances has resulted in online environments that amplify abusive behavior.”
Societal Shift
Machine learning tools one day might be capable of rejecting abusive comments before their intended targets ever see them. However, even if the companies running social networks work strenuously to stomp out online abuse, it’s ultimately up to humans to ensure that humanity prevails.
The best line of defense against social shaming starts at home, suggested counselor Scott A. Spackey.
“Family validation and bonding, and personal achievement with sports, school work and personal goals is the antidote to ANY source of social shaming,” he told TechNewsWorld.
People are more immune to criticism from outsiders when they have evidence to the contrary, provided by self knowledge and by those in their inner circles, Spackey said. For example, it’s easier to brush off being called “stupid” when one’s grades indicate otherwise.
“We all need to remember there’s no law against unfriending a social network contact at any time,” he noted. “Virtual life has same rules as non-virtual life: You get to have the final say on who you interact with and what you are exposed to.”
While it’s ideal to teach those lessons in the home, it’s never too late to improve oneself with education and re-education.
Pity the Fool?
When Playboy Playmate Dani Mathers snapchatted an image of an older woman nude in a locker room, that was an opportunity for education, according to relationship and etiquette expert April Masini.
“It was a moment to talk about what happens, naturally, to our bodies,” she told TechNewsWorld.
“There is a lesson for Ms. Mathers to learn that bodies age and they don’t look the same at 20 as they do at 60 or 70 or 80, and that it’s important to celebrate the changes of a healthy and aging human being,” Masini said, “instead of mocking the change that is often difficult to endure because it’s a signal life is slipping away — as it should.”
Mathers undoubtedly was “afraid of what she saw” to some degree, she suggested, and might not even be conscious of the aging of her own body.
“The impetus for body shamers and bullies is usually fear,” Masini said. “We see bravado and mean-spirited posts — we don’t acknowledge the fear behind the person posting.”
from WordPress http://ift.tt/2dECgl3
via IFTTT
Hacking Elections Is Easy, Study Finds
question whether hackers will influence the 2016 elections in the United States — only how much they’ll be able to sway them.
Leaked emails already have cost a Democratic Party chairperson her job, and the FBI last month issued a flash warning that foreign cyberadversaries had breached two state election databases.
Those two states — most likely Arizona and Illinois — aren’t alone in having their voter information compromised. Voter registration databases from all 50 states are being hawked on Deep Web marketplaces, an investigation by the Institute for Critical Infrastructure Technology has found.
Those databases could be used for all kinds of mischief, noted ICIT Senior Fellow James Scott, who collaborated with ICIT researcher Drew Spaniel on a study of voting system vulnerabilities.
For example, an attacker could sour a candidate’s supporters by sending bogus robocalls, supposedly originating from the candidate, at 3 a.m.
“An attacker could alter registration records on Election Day to delay and disrupt the election process and to spread disenfranchisement in the U.S. democratic process,” Scott told TechNewsWorld.
Dilapidated Black Boxes
Theft of voter registration records may be just the tip of the iceberg. U.S. voting systems are woefully vulnerable to hacker attacks, the ICIT maintained in the study released last week.
“Western democracy is held hostage to vulnerable code in black boxes on dilapidated bare bones PCs with virtually zero endpoint security, otherwise known as e-voting machines,” Scott and Spaniel wrote.
“Moreover, the systems are maintained and managed either by manufacturer personnel who obfuscate the insecurity of the systems or by local and state voting officials who are the very prototype of victims that repeatedly fall for spear phishing, ransomware and malware attacks and other easily avoidable cyber-attacks,” they continued.
“The problem in the sector is not merely a matter of lacking basic cyber hygiene, rather it is the sheer absence of the technical aptitude required to understand the cyber, physical and technical landscape available for exploit by the multitude of adversaries possessing a keen interest in manipulating the election process,” Scott and Spaniel added.
Safety in Fragmentation?
As vulnerable as U.S. voting systems are, it would be difficult for hackers to influence the outcome of an election, maintained Tellagraff CEO Mark Graff, a former CISO of Nasdaq and Lawrence Livermore Labs.
“It’s one thing to steal voter registration information from websites on the Internet, but it’s quite something else to modify that information on the sites,” he told TechNewsWorld.
There’s a difference between generating noise intended to undermine the credibility of the election and actually influencing the outcome, Graff pointed out.
“I don’t believe there is a credible case right now that they are trying to directly influence the outcome of the election,” he said.
“While our systems do have vulnerabilities, the fact that we have a federal system and all 50 states have their own systems is a strength,” Graff observed. “It might be possible to change some votes, but to change the outcome of an election and do so in a way that could not be detected is not practical at this point.”
Media Illusion
The fragmentation defense is an illusion propagated by the media, claimed ICIT’s Scott.
“The fragmented system does absolutely nothing to mitigate the risk of cybercompromise of election systems,” he argued. “If anything, the disjointed, distributed system makes it easier.”
The cybersecurity requirements of voting systems are not standardized or regulated, Scott explained. As a result, some states protect their systems, while other states only think that they protect their systems.
“Attackers only need to compromise one or a few counties in one or a few states to have a major impact on the national election,” he said. “It does not matter if some of the states adequately protect their systems, because the states that do not undermine the entire process.”
Brass Bull’s-eye
When it comes to ransomware, company brass have a bull’s-eye on their backs.
Upper management and C-level executives were popular targets of ransomware attacks, according to a recent Malwarebytes survey of 540 CIOs, CISOs and IT directors representing companies with an average of 5,400 employees across the U.S., Canada, UK and Germany.
Eighty percent of attacks affected mid-level managers or higher, the survey participants reported. A quarter of the attacks (25 percent) affected senior executives and the C-suite.
Ransomware in the wild increases by 46 percent or more every six months, noted Malwarebytes Senior Security Researcher Nathan Scott told TechNewsWorld. “That’s because ransomware makes so much more money than any other malware that we have ever seen.”
Breach Diary
- Sept. 19. Active Network of Texas offers two years of free identity repair services in letter to 1 million Oregon and 1.5 million Washington Department of Fish and Wildlife customers potentially affected by data breach of hunting and fishing license sales system maintained by Active in those states.
- Sept. 19. Payment systems at four Genghis Grill locations were compromised by malware between Feb. 9 and Sept. 7, placing at risk some 55,000 transactions by customers during that period, Dallas Morning News reports.
- Sept. 20. St. Francis Health Systems in Tulsa, Oklahoma, confirms data breach in which 6,000 names and addresses were stolen from a server.
- Sept. 20. A federal appeals court in Cincinnati has overturned a lower court ruling and is allowing class action lawsuit to proceed against Nationwide Mutual Insurance over 2012 data breach in which information of 1.1 million policy and non-policy holders was exposed to unauthorized parties, SC Magazine reports.
- Sept. 20. Paul O’Brien, founder of smartphone news and reviews site MoDaCo, confirms data breach that has exposed 880,000 subscriber identities.
- Sept. 21. Payment gateway Regpack is notifying its vendors that a data breach has placed at risk personal information in some 324,380 accounts, SC Magazine reports.
- Sept. 21. U.S. Rep. Ralph Abraham, R-La., has filed a bill allowing the director of management and the budget to recommend the removal of any agency head whose agency suffers a data breach because it failed to comply sufficiently with information security requirements or standards, NextGov reports.
- Sept. 21. University of Ottawa announces it is launching an investigation into the disappearance of a hard drive containing the personal information of 900 former and current students.
- Sept. 22. Yahoo confirms 500 million user accounts have been compromised in data breach.
- Sept. 22. Hacker group DCleaks makes public emails from a White House contractor containing sensitive information about schedules and procedures, as well as about Secret Service, military and White House personnel. DC Leaks is the same group that recently exposed emails of former Secretary Colin Powell.
- Sept. 22. H&L Australia, which provides point-of-sales systems for more than 300 restaurant and liquor stores, confirms data breach of its customer relationship management system, resulting in theft of 14.1 GB of customer information.
- Sept. 23. Ronald Schwartz, a New York resident, files class action lawsuit against Yahoo for gross negligence that led to data breach resulting in compromise of 500 million user accounts.
- Sept. 23. Trump Hotel Collection company agrees to pay $50,000 to settle case with New York State Attorney General’s office over data breach that exposed more than 70,000 credit card numbers and other sensitive data.
Upcoming Security Events
- Oct. 4. Cyber Crime — Why Are You a Target? 10 a.m. ET. Webinar by Richard Cassidy, UK Cyber Security Evangelist. Free with registration.
- Oct. 5. Cambridge Cyber Summit. Kresge Auditorium, 48 Massachusetts Ave., Massachusetts Institutue of Technology, Cambridge, Massachusetts. Registration: $250.
- Oct. 5-6. SecureWorld Denver. Colorado Convention Center, 700 14th St., Denver. Registration: conference pass, $325; SecureWorld Plus, $725; exhibits and open sessions, $30.
- Oct. 6. Smartphone Encryption Is Getting Stronger. Is It Enough To Keep You Safe? Noon ET. Webinar by ManTech. Free with registration.
- Oct. 5-7. APWG.EU eCrime Symposium 2016. Slovenská sporitelna, Tomásikova 48, 831 04 Nové Mesto, Bratislava, Slovakia. Registration: APWG members, 129 euros; student or faculty, 129 euros; law enforcement and government, 129 euros; all others, 149 euros.
- Oct. 7-8. B-Sides Delaware. Wilmington University, New Castle Campus, 320 North Dupont Highway, New Castle, Delaware. Free.
- Oct. 8. B-Sides Denver. SecureSet, 3801 Franklin St., Denver. Free, but tickets limited.
- Oct. 11. Your Credentials Are Compromised, So Now What? 1 p.m. ET. Webinar by Centrify. Free with registration.
- Oct. 11-14. OWASP AppSec USA. Renaissance Marriott, 999 9th St. NW, Washington, D.C. Registration: Non-member, $925; single day, $500; student, $80. Oct. 14-16. B-Sides Warsaw. Panstwomiasto, Andersa 29, Warsaw, Poland. Free.
- Oct. 12. Can You Really Automate Yourself Secure? Facts vs. Fantasies. Noon ET. Webinar sponsored by Cigital. Free with registration.
- Oct. 12. Why Are We Still Failing to Stop Cyber Attacks? 1 p.m. ET. Webinar by Cyphort. Free with registration.
- Oct. 13. ISSA SoCal Security Symposium. Hilton Long Beach & Executive Meeting Center, 701 West Ocean Blvd., Long Beach, California. Registration: members, $115; nonmembers, $140; students, $75; day of event, $190.
- Oct. 14-16. B-Sides Warsaw. Panstwomiasto, Andersa 29, Warsaw, Poland. Free.
- Oct. 17-19. CSX North America. The Cosmopolitan, 3708 Las Vegas Blvd. South, Las Vegas. Registration: before Aug. 11, ISACA member, $1,550; nonmember, $1,750. Before Oct. 13, member, $1,750; nonmember, $1,950. Onsite, member, $1,950; nonmember, $2,150.
- Oct. 18. IT Security and Privacy Governance in the Cloud. 1 p.m. ET. Webinar moderated by Rebecca Herold, The Privacy Profesor. Free with registration.
- Oct. 18-19. Edge2016 Security Conference. Crowne Plaza, 401 W. Summit Hill Drive, Knoxville, Tennessee. Registration: before Aug. 15, $250; after Aug. 15, $300; educators and students, $99.
- Oct. 18-19. SecureWorld St. Louis. America’s Center Convention Complex, 701 Convention Plaza, St. Louis. Registration: conference pass, $325; SecureWorld Plus, $725; exhibits and open sessions, $30.
- Oct. 18-19. Security of Things, A Smart Card Alliance Event. Hilton Rosemont Chicago O’Hare Hotel, 5550 N. River Rd., Rosemont, Illinois. Registration: members $775 before Oct. 8, $885; nonmembers, $895 before Oct. 8, $1,045.
- Oct. 20. Los Angeles Cyber Security Summit. Loews Santa Monica Beach Hotel, 1700 Ocean Ave., Santa Monica, California. Registration: $250.
- Oct. 20. B-Sides Raleigh. Marbles Kid Museum, 201 E. Hargett St., Raleigh, North Carolina. Registration: $20.
- Oct. 22. B-Sides Jacksonville. Sheraton Hotel, 10605 Deerwood Park Blvd., Jacksonville, Florida. Registration: $10.
- Oct. 27. SecureWorld Bay Area. San Jose Marriott, 301 S. Market St., San Jose, California. Registration: conference pass, $195; SecureWorld Plus, $625; exhibits and open sessions, $30.
- Nov. 1-4. Black Hat Europe. Business Design Centre, 52 Upper Street, London, UK. Registration: before Sept. 3, Pounds 1,199 with VAT; before Oct. 29, Pounds 1,559 with VAT; after Oct. 28, Pounds 1,799 with VAT.
- Nov. 9-10. SecureWorld Seattle. Meydenbauer Center, 11100 NE 6th St., Bellevue, Washington. Registration: conference pass, $325; SecureWorld Plus, $725; exhibits and open sessions, $30.
- Nov. 28-30. FireEye Cyber Defense Summit 2016. Washington Hilton, 1919 Connecticut Ave. NW, Washington, D.C. Registration: through Sept. 30, general admission, $495; government and academic, $295; Oct. 1- Nov. 21, $995/$595; Nov. 22-30, $1,500/$1,500.
from WordPress http://ift.tt/2d3XqV2
via IFTTT
Fancy Bears hacked MH17 crash investigators with spear-phishing campaign
NEW SPEAR-PHISHING CAMPAIGN TARGETS BELLINGCAT RESEARCHERS TRYING TO INVESTIGATE FLIGHT MH17 CRASH – RESEARCHERS BELIEVE THE TECHNIQUE IS EXACTLY WHAT HAS BEEN USED BY FANCY BEARS HACKERS IN THEIR PREVIOUS HACKS.
Thursday, 29 September 2016
World’s largest 1 Tbps DDoS Attack launched from 152,000 hacked Smart Devices
Do you know — Your Smart Devices may have inadvertently participated in a record-breaking largest cyber attack that Internet has just witnessed.
If you own a smart device like Internet-connected televisions, cars, refrigerators or thermostats, you might already be part of abotnet of millions of infected devices that was used to launch the biggest DDoS attack known to date, with peaks of over 1 Tbps of traffic.
France-based hosting provider OVH was the victim to the record-breaking Distributed Denial of Service (DDoS) attacks that reached over one terabit per second (1 Tbps) over the past week.
from WordPress http://ift.tt/2dlHyjW
via IFTTT
Tuesday, 27 September 2016
Russian hackers tried to disrupt UK general election, security sources say
Russian hackers reportedly tried to disrupt last year’s general election, in what is thought to be the first known cyberattack on the British political system.
The group known as Fancy Bears planned to target every Whitehall server, including the Home Office, Foreign Office and Ministry of Defence, and every major TV broadcaster, including the BBC, Channel 4 and Sky, but was thwarted by GCHQ.
The agency, which is responsible for all the security services’ communications surveillance, managed to discover the plot in time after analysing a successful attack on French broadcaster TV5Monde in April last year.
Posing as Isis supporters, the group forced the channel’s scheduled programme off the air for 18 hours and replaced them with a screen showing the terror group’s flag.
GCHQ had initially feared Isis’ hacking abilities had reach a new level of sophistication but the attack was eventually linked back to Moscow.
David Anderson QC, the independent reviewer of terrorism legislation, toldThe Sunday Times that the incident was a “possible imminent threat” to the UK and said GCHQ “deployed a capability to protect government networks from this cyber-attacker”.
Analysts were reported to have worried that an attack would “embarrass” the government and took defensive measures to shore up Whitehall’s cyber security as well as warning TV networks about the plot.
A security source told The Sunday Times: “We found signs of this particular group and activity — they were looking at government department networks in the UK.
“We had information, and it could have been activated, which is why it was an imminent threat. They certainly could have defaced a website for propaganda reasons and they could have possibly taken it down.”
The hackers, who are believed to have links to the Russian state, are also believed to have been responsible for the leak of medical data about top British athletes such as Sir Bradley Wiggins and Mo Farah.
This is the first time a Russian-based hacking group is known to have targeted British politics but there have been repeated attempts to undermine the US presidential election.
Last week DC Leaks, another Russian hacking group with alleged ties to the state, is said to have leaked Michelle Obama’s passport information.
The hack of DNC emails by a hacker known as Guccifer 2.0 in July led to the resignation of its chair Debbie Wasserman Schultz.
Emails, published on Wikileaks, dated from January 2015 to May 2016 between seven key DNC staffers appeared to suggest they were trying to undermine the campaign of Bernie Sanders.
Both the Russian government and Wikileaks founder Julian Assange have denied that the information came from Russian hackers.
Republican nominee Donald Trumpattracted heavy criticism in the days that followed when he appeared to call for the hackers to break into Hillary Clinton’s email server.
He said: “Russia, if you’re listening, I hope you’re able to find the 30,000 emails that are missing.
“I think you’ll be rewarded mightily by our press.”
When asked if he was concerned about encouraging a foreign power to spy on a political party he said it “gave him no pause” and he would “love to see” Russia or China getting involved.
from WordPress http://ift.tt/2d3fW5n
via IFTTT