Skip to main content

Security

Think tanks mull Geneva Convention for cybercrime

posted onJune 23, 2016
by l33tdawg

A Geneva Convention on cyberwar: That's how a panel of experts proposes to deal with the growing threat to critical infrastructure posed by the possibility of cyberattack.

With control systems in dams, hospitals, power grids and industrial systems increasingly exposed online, it's possible that nation states could seek to damage or disable them electronically.

Say hello to BadUSB 2.0: USB man-in-the-middle attack proof-of-concept

posted onJune 23, 2016
by l33tdawg

Oh peachy, say hello to BadUSB 2.0, a tool “capable of compromising USB fixed-line communications through an active man-in-the-middle attack. It is able to achieve the same results as hardware keyloggers, keyboard emulation, and BadUSB hardware implants. Furthermore, BadUSB2 introduces new techniques to defeat keyboard-based one-time-password systems, automatically replay user credentials, as well as acquiring an interactive command shell over USB.”

VIDEO: Exploit Kits: Hunting The Hunters

posted onJune 22, 2016
by l33tdawg

Exploit kits are one of the threats that is ever present on the Internet. Indiscriminately compromising users that are simply surfing websites. As ransomware has exploded so has the proliferation of these exploit kits. This combination of ransomware, tor, and bitcoin has created a financially lucrative monster.

New Android malware can secretly root your phone and install programs

posted onJune 22, 2016
by l33tdawg

Android users beware: a new type of malware has been found in legitimate-looking apps that can “root” your phone and secretly install unwanted programs.

The malware, dubbed Godless, has been found lurking on app stores including Google Play, and it targets devices running Android 5.1 (Lollipop) and earlier, which accounts for more than 90 percent of Android devices, Trend Micro said Tuesday in a blog post.

​Hackers hit central banks in Indonesia and South Korea

posted onJune 22, 2016
by l33tdawg

In the month since activist hacking group Anonymous pledged to target banks across the world, senior officials have said the public websites of the central banks of both Indonesia and South Korea have been hit by cyber attacks.

In response to the attempted hacks, Bank Indonesia has blocked 149 regions that do not usually access its website, including several small African countries, deputy governor Ronald Waas told Reuters.

Hackers sold access to 170,000 compromised servers, many in the US

posted onJune 22, 2016
by l33tdawg

The market for hacked servers might be much larger than previously thought, with new evidence suggesting that hackers sold access to over 170,000 compromised servers since 2014, a third of them located in the United States.

The new revelation comes from antivirus firm Kaspersky Lab, whose researchers reported last week that a black market website called xDedic was selling remote access to more than 70,000 compromised servers for as little as $6.

UAE businesses struggle with security breach declaration

posted onJune 21, 2016
by l33tdawg

Almost half of consumers in the United Arab Emirates (UAE) say their view of a company subjected to a cyber attack would be unfavourable, and more than half say they would stop buying from a compromised company and would take legal action, according to study from security supplier FireEye.

Meanwhile, a report from VMware says UAE businesses are struggling to come clean about data breaches because most IT leaders in the country are covering up information about attacks.

Good hacker uses vid vulns to spy on Quebec Liberal Party meetings

posted onJune 21, 2016
by l33tdawg

Closed-door meetings by Canada's Quebec Liberal Party were exposed to trivial eavesdropping thanks to flaws in its video conferencing software.

The flaws, found and reported by a resident white hat researcher, are being fixed.

The researcher speaking on the condition of anonymity told local tabloid Le Journal de Montreal (French) he accessed the video streams using a vulnerability and the default password which was in use.