Skip to main content

Security

The flowering of voice control leads to a crop of security holes

posted onDecember 5, 2016
by l33tdawg

'Tis the season of cybersecurity threat predictions for 2017. Vendors' glossy reports shower onto the desks of customers and journalists like gentle Christmas snow. But so many of these reports, like so many snowfalls, are nothing but slush.

All year we've been hearing about the spreading plague of ransomware, and how the Internet of Things (IoT) will be a security nightmare. Remember the botnet made of video cameras? Vendors have been waving around phrases like "artificial intelligence" and "machine learning" and "threat intelligence sharing" like magic wands.

North Korea's government sanctioned Red Star OS can be remotely hacked, say security researchers

posted onDecember 5, 2016
by l33tdawg

North Korea's government sanctioned Red Star operating system (OS) contains a vulnerability that can allow attackers to hack into it remotely, according to security experts. The reclusive nation's secretive Linux-based OS was leaked to the world in 2015 and ever since, several critical vulnerabilities have been brought to light.

Cyber criminals move to exploit ‘safe’ social media spaces

posted onDecember 5, 2016
by l33tdawg

Following a few glasses of wine, John’s inhibitions had dropped when he went online to talk to a woman he had met through an internet dating site. Although they hadn’t met in person, they had been exchanging messages for about a week and a half.

Because of the familiarity built up through previous messages, and the effects of the alcohol, when she suggested that she would remove some of her clothes if he did the same, he agreed. Straight away he realised he had been scammed.

Microsoft Azure Flaw Exposed RHEL Virtual Machines to Hacking Risk

posted onNovember 30, 2016
by l33tdawg

In terms of delivering public cloud services, an Azure customer recently taught Microsoft a lesson in running a tight ship.

Ian Duffy, a software engineer at online retailer Zalando, had set out to create a secure, custom Red Hat Enterprise Linux (RHEL) machine image to be deployed on both Amazon Web Services (AWS) and Microsoft Azure. During the process, he discovered a vulnerability that could have provided an attacker root access to virtual machines.

Hackers have broken into a European bank and are blackmailing its customers

posted onNovember 30, 2016
by l33tdawg

Hackers have broken into a high-end European bank and are blackmailing its customers.

Customers of Valartis, a Chinese-owned Liechenstein bank, are being told by unknown blackmailers they must pay 10% of their life savings or face having account details sent to finance authorities and the media, German-language newspaper Bild reports.

'Dronejacking' may be the next big cyber threat

posted onNovember 30, 2016
by l33tdawg

A big rise in drone use is likely to lead to a new wave of "dronejackings" by cybercriminals, security experts warned Tuesday.

A report by Intel's McAfee Labs said hackers are expected to start targeting drones used for deliveries, law enforcement or camera crews, in addition to hobbyists.

Baidu link spam in Skype exposes need to secure your account

posted onNovember 30, 2016
by l33tdawg

Many Skype users have recently reported seeing spam messages with links to Baidu or LinkedIn recently, and it appears the issue isn't a small one. As reported by The Verge, hackers have managed to breach Skype accounts to send spam even when the accounts have been "secured" with Microsoft's two-factor authentication.

Microsoft confirmed the problem in a statement to The Verge, noting that Skype itself was not breached, but hackers obtained account credentials by other means: