Hacking & Security

Ersatz Scheme Deceives Hackers, Protects Stored Passwords

Threatpost - 21 Květen, 2015 - 20:35
Researchers at Purdue University have developed a scheme that protects stolen passwords from offline cracking.
Kategorie: Hacking & Security

Free Ransomware Decryption and Malware Removal ToolKit

The Hacker News - 21 Květen, 2015 - 20:11
A security researcher has compiled a ransomware removal and rescue kit to help victims deal with ransomware threats and unlock encrypted files without paying off a single penny to the cyber crooks. Ransomware is a growing threat to the evolution of cyber criminals techniques in an attempt to part you from your money. Typically, the malicious software either lock victim’s computer
Kategorie: Hacking & Security

Charter Communications Fixes Website Data Leak Vulnerability

Threatpost - 21 Květen, 2015 - 19:54
The internet-cable-television provider Charter Communications recently fixed an issue with its website that was inadvertently leaking the information of tens of thousands of its customers.
Kategorie: Hacking & Security

Head-Scratching Begins on Proposed Wassenaar Export Control Rules

Threatpost - 21 Květen, 2015 - 18:59
Experts point out that the proposed Wassenaar rules in the U.S. leave unanswered questions regarding exploit development and the use of commercial penetration testing tools.
Kategorie: Hacking & Security

Google Reveals the Problem With Password Security Questions

LinuxSecurity.com - 21 Květen, 2015 - 18:12
LinuxSecurity.com: Using one guess, an attacker has a 19.7 percent chance of guessing an English speaking user loves pizza, according to Google's findings, which looked at hundreds of millions of questions and answers for account recovery claims.
Kategorie: Hacking & Security

Practical IT: What is encryption and how can I use it to protect my corporate data?

Sophos Naked Security - 21 Květen, 2015 - 17:06
Businesses often don't realise why encryption is important, and how they can use it to protect their data. The latest in our Practical IT series tells you what encryption is and how you can use it in your business.

1.1 Million Affected by CareFirst BlueCross BlueShield Breach

Threatpost - 21 Květen, 2015 - 17:02
CareFirst BlueCross BlueShield announced this week that hackers broke into one of its databases and made off with a variety of sensitive customer information.
Kategorie: Hacking & Security

Security Questions Not So Secure

Threatpost - 21 Květen, 2015 - 16:44
The Internet knows a lot about you, including your mother’s maiden name, your favorite food, and what street your first pet grew up on. And, according to some new research from Google, attackers have a good chance of figuring those things out pretty easily, too. The security questions that Google and other companies ask users as […]
Kategorie: Hacking & Security

Pozor na (australské) seznamky

Novinky.cz - bezpečnost - 21 Květen, 2015 - 16:00
Oběti on-line podvodů v Austrálii v roce 2014 přišly o v přepočtu 1,7 miliardy korun. Největší podíl na tom mají internetové seznamky.
Kategorie: Hacking & Security

Spy Agencies Hijack Google Play Store to Install Spyware on Smartphones

The Hacker News - 21 Květen, 2015 - 15:51
I have an Android phone with a five different gmail accounts configured in it. But what if any one of them get compromised via phishing, malware or any other way? The Hacker would be able to access my Google account and obviously Google Play Store account too, which allows anyone to install any Android application remotely into my phone without my knowledge and confirmation… What if
Kategorie: Hacking & Security

Carefirst Blue Cross Breach Hits 1.1M

Krebs on Security - 21 Květen, 2015 - 15:03

CareFirst BlueCross BlueShield on Wednesday said it had been hit with a data breach that compromised the personal information on approximately 1.1 million customers. There are indications that the same attack methods may have been used in this intrusion as with breaches at Anthem and Premera, incidents that collectively involved data on more than 90 million Americans.

According to a statement CareFirst issued Wednesday, attackers gained access to names, birth dates, email addresses and insurance identification numbers. The company said the database did not include Social Security or credit card numbers, passwords or medical information. Nevertheless, CareFirst is offering credit monitoring and identity theft protection for two years.

Nobody is officially pointing fingers at the parties thought to be responsible for this latest health industry breach, but there are clues implicating the same state-sponsored actors from China thought to be involved in the Anthem and Premera attacks.

As I noted in this Feb. 9, 2015 story, Anthem was breached not long after a malware campaign was erected that mimicked Anthem’s domain names at the time of the breach. Prior to its official name change at the end of 2014, Anthem was known as Wellpoint. Security researchers at cybersecurity firm ThreatConnect Inc. had uncovered a series of subdomains for we11point[dot]com (note the “L’s” in the domain were replaced by the numeral “1”) — including myhr.we11point[dot]com and hrsolutions.we11point[dot]com.

ThreatConnect also found that the domains were registered in April 2014 (approximately the time that the Anthem breach began), and that the domains were used in conjunction with malware designed to mimic a software tool that many organizations commonly use to allow employees remote access to internal networks.

On Feb. 27, 2015, ThreatConnect published more information tying the same threat actors and modus operandi to a domain called “prennera[dot]com” (notice the use of the double “n” there to mimic the letter “m”).

“It is believed that the prennera[dot]com domain may have been impersonating the Healthcare provider Premera Blue Cross, where the attackers used the same character replacement technique by replacing the ‘m’ with two ‘n’ characters within the faux domain, the same technique that would be seen five months later with the we11point[dot]com command and control infrastructure,” ThreatConnect observed in a February 2015 blog post.

Turns out, the same bulk registrant in China that registered the phony Premera and Anthem domains in April 2014 also registered two Carefirst look-alike domains — careflrst[dot]com (the “i” replaced with an “L”) and caref1rst[dot]com (the “i” replaced with the number “1”).

Additionally, ThreatConnect has unearthed evidence showing the same tactics were used on EmpireB1ue.com (note the “L” replaced with a number “1”), a domain registered April 11, 2014 (the same day as the phony Carefirst domains). EmpireBlue BlueCross BlueShield was one of the organizations impacted by the Anthem breach.

Kategorie: Hacking & Security

Understanding the Shared Security Model in Amazon Web Services

The Hacker News - 21 Květen, 2015 - 14:51
Security in the Amazon EC2 environment is a responsibility shared by both the end user and Amazon. This is because within this environment there are specific parts that Amazon has control of and specific parts that are controlled by the end user. For the end user, they are responsible for securing the operating systems running on their instances, as well as the applications running on those
Kategorie: Hacking & Security

Writing Python Compiled Modules

InfoSec Institute Resources - 21 Květen, 2015 - 14:15

Any code that you write utilizing any compiled language like C, C++, or Java can be integrated or imported into another Python script. This code is considered as an “extension.” A Python extension module is nothing more than a C library. On UNIX machines, these libraries customarily end in .so (for shared object). On Windows […]

The post Writing Python Compiled Modules appeared first on InfoSec Institute.

Kategorie: Hacking & Security

Mumblehard Malware

InfoSec Institute Resources - 21 Květen, 2015 - 14:00

Introduction In this article, we will learn about a malware known as Mumblehard which is known for targeting Linux and BSD OS. This malware opens a backdoor that gives the full control of the infected machine to cybercriminals. Mumblehard malware -Components Perl Backdoor Perl backdoor will request for commands from its Command &Control Server and […]

The post Mumblehard Malware appeared first on InfoSec Institute.

Kategorie: Hacking & Security

How I Got Here: Marcus Ranum

LinuxSecurity.com - 21 Květen, 2015 - 14:00
LinuxSecurity.com: Dennis Fisher talks with security pioneer Marcus Ranum about writing an early Internet firewall at DEC, the security gold-rush era of the 1990s and early 2000s, why he never patented most of the ideas he has come up with and how he found peace of mind. - See more at: https://threatpost.com/how-i-got-here-marcus-ranum/112924#sthash.YKgN9qhE.dpuf
Kategorie: Hacking & Security

eNom discloses DNS attack to customers

LinuxSecurity.com - 21 Květen, 2015 - 13:58
LinuxSecurity.com: On Thursday, Taryn Naidu, the CEO of domain registrar eNom, sent a letter to customers disclosing a "very sophisticated attack" that targeted the DNS settings on four domains.
Kategorie: Hacking & Security

HTTPS-crippling attack threatens tens of thousands of Web and mail servers

LinuxSecurity.com - 21 Květen, 2015 - 13:57
LinuxSecurity.com: Tens of thousands of HTTPS-protected websites, mail servers, and other widely used Internet services are vulnerable to a new attack that lets eavesdroppers read and modify data passing through encrypted connections, a team of computer scientists has found.
Kategorie: Hacking & Security

How your next password could be your brain

Sophos Naked Security - 21 Květen, 2015 - 13:25
Researchers found that brains react to acronyms in a way that's unique to each individual. Ready to slap some electrodes on your head?

Google to Introduce New Photo-Sharing Platform to Kill Instagram

The Hacker News - 21 Květen, 2015 - 13:17
Google is reportedly going to launch a new online photo-sharing service and storage option at its developer conference later this month, which Bloomberg says, will not be a part of its Google+ social network. At the moment, Google offers a photo sharing service known as "Google+ Photos," which comes pre-installed with every Android device. Google+ Photos automatically backs up photos in
Kategorie: Hacking & Security

Apple Watch lets nimble-fingered crooks use your Apple Pay

Sophos Naked Security - 21 Květen, 2015 - 13:04
Nimble-fingered crooks can exploit the one-second lag before Watch senses it's off a wrist and asks for a passcode.
Syndikovat obsah