Skip to main content

Security

Macro-based malware is making a comeback, researchers warn

posted onJanuary 8, 2015
by l33tdawg

For the past several months, different groups of attackers have distributed malware through Microsoft Office documents that contain malicious macros, reviving a technique that has been out of style for over a decade.

Macros are scripts that contain commands for automating tasks in various applications. Microsoft Office programs like Word and Excel support macros written in Visual Basic for Applications (VBA) and these can be used for malicious activities like installing malware.

FBI Director Says 'Sloppy' North Korean Hackers Gave Themselves Away

posted onJanuary 8, 2015
by l33tdawg

FBI Director James Comey, today, said that the hackers who compromised Sony Pictures Entertainment usually used proxy servers to obfuscate their identity, but "several times they got sloppy."

Speaking today at an event at Fordham University in New York, Comey said, "Several times, either because they forgot or because of a technical problem, they connected directly and we could see that the IPs they were using ... were exclusively used by the North Koreans.

Thieves Jackpot ATMs With ‘Black Box’ Attack

posted onJanuary 8, 2015
by l33tdawg

Previous stories on KrebsOnSecurity about ATM skimming attacks have focused on innovative fraud devices made to attach to the outside of compromised ATMs. Security experts are now warning about the emergence of a new class of skimming scams aimed at draining ATM cash deposits via a novel and complex attack.

Sony CEO: We were the victim of a vicious and malicious hack

posted onJanuary 6, 2015
by l33tdawg

Sony CEO Kazuo Hirai noted his dismay at being the target of a notorious hack that sparked an international controversy between the US and North Korea.

Sony was "unfortunately the victim of one of the most vicious and malicious cyberattacks we've known certainly in recent history," Hirai said during a keynote presentation at this year's Consumer Electronics Show here.

This smart lock can secure your travel luggage with NFC

posted onJanuary 5, 2015
by l33tdawg

If keeping a suitcase secured with NFC and a smartphone instead of a key sounds interesting to you, the eGeeTouch smart luggage lock may be worth a look. Being shown off here at CES Unveiled, the lock lets you get at your luggage without a key or combination digit wheel — the ways travelers most often open a suitcase. (That's assuming you lock things down to begin with.) Instead, it uses NFC to know when you're nearby.

The Biggest Security Threats We’ll Face in 2015

posted onJanuary 5, 2015
by l33tdawg

As the clock strikes midnight on the new year, so begins the countdown to a new round of security threats and breaches that doubtless will unfold in 2015. But this year will be a little different. In the past, when we’ve talked about threat predictions, we’ve focused either on the criminal hackers out to steal credit card data and banking passwords or on the activist hackers out for the lulz (and maybe to teach corporate victims a lesson).

Your Mac Is Vulnerable to Thunderbolt Hacks and You Can't Do Anything About It

posted onJanuary 5, 2015
by l33tdawg

Dubbed Thunderstrike, the vulnerability reportedly allows a custom-crafted malicious Thunderbolt device to flash code to the boot ROM. In a lengthy video posted to ccc-tv, Hudson demoes how persistent firmware modifications can be fed into the EFI boot ROM of MacBooks equipped with Thunderbolt ports.

Lock your cloud backups away with an encryption key

posted onJanuary 5, 2015
by l33tdawg

It’s generally easier to keep safe the files we have under our control, on our internal and external drives, than those that waft far away from us on cloud-storage backup systems. Different backup services handle how they send data for storage and how they encrypt it once it arrives.