News Items

  • news

    Visible to the public "New Security System to Revolutionize Communications Privacy"

    Researchers at the University of St Andrews, King Abdullah University of Science and Technology (KAUST) and the Center for Unconventional Processes of Sciences (CUP Sciences) have developed a new security system said to be uncrackable by hackers. The system proposed by the team of scientists aims to bolster the privacy of communications through the use of inexpensive, electronic compatible optical chips. The silicon chips used in the system allows information to be sent in a one-time key that cannot be recovered or intercepted by attackers. According to researchers, the system addresses the threat posed by quantum computers, which are expected to crack current communication methods in the future. The keys generated by the optical chips to unlock messages are never stored or communicated with the message. Additionally, the keys cannot be recreated by the users, which adds another layer of security. This article continues to discuss the new uncrackable security system that strengthens communications privacy and how the method used in this system is an improvement over current standard cryptographic techniques.

    The University of St Andrews report "New Security System to Revolutionize Communications Privacy"

  • news

    Visible to the public "Detecting Backdoor Attacks on Artificial Neural Networks"

    A team of researchers at Duke Engineering's Center for Evolutionary Intelligence has made an advancement in the detection of backdoor attacks against machine learning models. The execution of backdoor attacks involves poisoning the data fed to a machine learning model so that the model produces incorrect output or predictions. For example, a model can be taught by an attacker to label anyone wearing a black-and-white cap as "Frank Smith". According to researchers, these types of backdoors are hard to detect because the shape and size of their triggers can be designed by attackers. These triggers can be a hat, flower, or other harmless-looking objects. The team's software identifies backdoor triggers by finding out the class in which the trigger was injected, where the trigger was placed, and the form of the trigger. This article continues to discuss the concept of backdoor attacks on artificial neural networks, the significant threat posed by such attacks, and the software developed by the Duke team to identify backdoor triggers.

    Duke reports "Detecting Backdoor Attacks on Artificial Neural Networks"

  • news

    Visible to the public "FBI Warns Against Using Free WiFi Networks While Traveling"

    If you are traveling this holiday season, the FBI is warning travelers of the dangers of using free WiFi networks while traveling, such as hotels or airports. Connecting to a free WiFi network can allow an adversary to load malware, steal the user's passwords and PINs, or take remote control of the user's contacts and camera. If you do use a public WiFi network, then do not use the network to look or login to anything that could contain sensitive information, for example, like bank accounts.

    ZDNet reports: "FBI Warns Against Using Free WiFi Networks While Traveling"

  • news

    Visible to the public "Twitter Warns Millions of Android App Users to Update Immediately"

    Twitter discovered a flaw in its Android application that could let hackers see users "nonpublic account information" and commandeer their accounts to send tweets and direct messages. The hacker who found the flaw could also access data like location information and protected tweets. Twitter's iOS application does not have this flaw. Twitter patched the vulnerability in a new update. Android users need to update the application to the newest version. There is currently no evidence to suggest any bad actors have exploited this vulnerability.

    Gizmodo reports: "Twitter Warns Millions of Android App Users to Update Immediately"

  • news

    Visible to the public "Wawa Reveals Massive Data Breach"

    Wawa locations have been affected by a data breach. The breach was discovered on December 10, 2019, contained by December 12, 2019, and has potentially affected all Wawa locations beginning at different points in time after March 4, 2019. The data breach affected credit and debit card numbers, expiration dates, and cardholder names for potentially all purchases made in Wawa locations and at fuel dispensers. No other personal information was accessed, including PIN numbers, credit card CVV2 numbers, and driver's license information.

    Business Insider reports: "Wawa Reveals Massive Data Breach"

  • news

    Visible to the public "Seizure-Triggering Attack Is Stark Example of How Social Media Can Be Weaponized"

    Attackers sent GIFs and videos to followers of the Epilepsy Foundation's Twitter account, showing flashing strobe lights in an attempt to cause those with the condition to have seizures. The attackers sent the GIFs and videos to followers, using the foundation's Twitter handle and hashtags, during National Epilepsy Awareness Month. Although this activity does not have the traditional characteristics of a cyberattack in that users were not tricked into clicking malicious links or websites, and the Twitter account did not get hacked, such attacks would still be considered cyberattacks. These attacks show that the normal functions of an online platform can be used to execute attacks designed to cause physical harm to targets. This article continues to discuss the seizure triggering attacks performed on Twitter, how the social media platform responded to the attacks and another cyber incident in which a strobe light GIF was sent to a journalist with epilepsy.

    CyberScoop reports "Seizure-Triggering Attack Is Stark Example of How Social Media Can Be Weaponized"

  • news

    Visible to the public "Attackers Using Taylor Swift Image to Hide Malware Payloads"

    Security researchers at Sophos have discovered the use of steganography techniques by a hacking group, named MyKingz. Steganography is an ancient practice in which messages are communicated via formats that conceal the delivery of the messages. Cybercriminals have been using steganography techniques to hide malicious data or malware in image files, video clips, audio files, and other unsuspecting formats. The MyKingz group is applying steganography by using a JPEG image of Taylor Swift to hide a malicious EXE file. According to researchers, the group has been targeting Windows systems to execute cryptojacking attacks. This article continues to discuss the concept of steganography, the use of this technique by the MyKingz group, and other notable attacks in which steganography methods were used.

    CISOMAG reports "Attackers Using Taylor Swift Image to Hide Malware Payloads"

  • news

    Visible to the public "Ransomware 'Crisis' in US Schools: More Than 1,000 Hit So Far in 2019"

    Many hackers target school organizations. The main form of attack used against schools are Ransomware attacks. New data due to be published today by security firm Armor concludes that a total of 72 US school districts so far have suffered ransomware attacks this year, which means the number of victimized schools could be at 1,040 to date. Even more unnerving: 11 of those school districts, home to 226 schools, have been attacked just since late October.

    DarkReading reports: Ransomware 'Crisis' in US Schools: More Than 1,000 Hit So Far in 2019

  • news

    Visible to the public "'Inconsistent and Misleading' Password Meters Could Increase Risk of Cyber Attacks"

    A study conducted by Steve Furnell, Professor of Information Security and leader of the Centre for Security, Communications and Network Research (CSCAN) at the University of Plymouth, explored the effectiveness of password meters. Password meters are supposed to guide users in the creation of strong passwords to bolster the security of their accounts and personal data. However, the assessment of 16 commonly used passwords meters revealed that the effectiveness among these meters vary as some push for the creation of more complex passwords, while other meters allow significantly weak passwords. In addition to examining the effectiveness of dedicated password meter websites, the study also assessed meters embedded in Dropbox, Reddit, and other common online services, as well as those used by some devices. This article continues to discuss the study and its key findings surrounding password meters.

    The University of Plymouth reports "'Inconsistent and Misleading' Password Meters Could Increase Risk of Cyber Attacks"

  • news

    Visible to the public "Brainwave Devices Can Leak Sensitive Medical Conditions and Personal Information"

    Brain-computer interfaces (BCI) are devices that allow people to use their brain activity to control their computers. A study conducted by UAB (University of Alabama at Birmingham) researchers on the privacy of BCI devices found that these devices can reveal a user's personal information and privacy-sensitive medical conditions such as their age and whether they have an alcohol use disorder (AUD). It was discovered that access to the brainwave signals recorded by BCI devices is not controlled. BCI devices' lack of control over access to brainwave signals can allow attackers to use malicious apps or websites to record a user's brainwaves as they browse the internet. The researchers designed an attack, called Hemorrhage, to analyze brainwave signals captured when a user views an image or video to determine whether they have an AUD and belong in a certain age group. This article continues to discuss the use of BCI headsets, as well as the study and its findings on the privacy of these devices.

    UAB reports "Brainwave Devices Can Leak Sensitive Medical Conditions and Personal Information"

  • news

    Visible to the public "Hacking and Malware Cause 75% of all Data Breaches in the Financial Services Industry"

    Financial services firms made up 6 percent of all the breaches in 2019. In total, more than 60% of all leaked records in 2019 were exposed by financial services organizations, partly due to the Capital One mega breach, which compromised more than 100 million records. Despite this outlier, average breaches in financial services companies still tend to be more significant and more detrimental than other sectors' breaches. Hacking and malware remain the primary cause of data breaches in financial services at 74.5%.

    Help Net Security reports: "Hacking and Malware Cause 75% of all Data Breaches in the Financial Services Industry"

  • news

    Visible to the public "Visa Warns Against New PoS Attacks, Fin8 Fingered As the Culprit"

    Visa's Payment Fraud Disruption department identified three separate attacks on point-of-sale (PoS) systems used by gas stations and hospitality merchants. According to the credit card company, these attacks began last summer. These attacks aimed to steal payment card data. One attack was executed through the performance of a phishing attack on a company employee. The success of the phishing attack led to the installation of a remote access trojan, which then allowed cybercriminals to move laterally through a network to the PoS system. In another attack, criminals were able to compromise the PoS environment by accessing the company network using a RAM scraper and an unknown method. Findings from the analysis of the malware used in these attacks suggest that FIN8, a financially-motivated hacking group, is likely the perpetrator. This article continues to discuss the new PoS attacks and the supposed group behind the launch of these attacks.

    SC Magazine reports "Visa Warns Against New POS Attacks, Fin8 Fingered As the Culprit"

  • news

    Visible to the public "Your Car May Be Vulnerable to Cyberattacks – Even the Smartest of Smart Cars Have Issues"

    While smart cars offer unique benefits, they also introduce significant security risks that have the potential to lead to loss of life. As vehicles increase in connectivity to the internet, they become more vulnerable to being hacked, manipulated, and disabled. The presence of vulnerabilities in connected vehicles creates more opportunities for cybercrime. A study conducted by researchers at Michigan State University explores automotive cybersecurity through the lenses of criminal justice theory and social sciences as such aspects are often under-examined. The study calls for automotive and equipment manufacturers to be active guardians in the cybersecurity of smart cars by constantly applying system patching updates, writing new code, and more. Automotive manufacturers need to be as active as smartphone manufacturers in the release of security updates to connected vehicles. This article continues to discuss key findings of the study and suggestions on how to improve automotive cybersecurity.

    SciTechDaily reports "Your Car May Be Vulnerable to Cyberattacks - Even the Smartest of Smart Cars Have Issues"

  • news

    Visible to the public "Manhattan Hotel to Pilot Cyber-Safe Travel Program"

    A historic New York hotel will be implementing a program to protect its guests from cybercriminals. The Martinique New York on Broadway will pilot a program, called Cyber Safe Travel, designed to protect guests' mobile devices through the use of keystroke encryption, advanced login breach protection, and screen scraper technologies. The Cyber Safe Travel product also comes with a feature that issues warnings about click-jacking attacks, increasing the mitigation of cyber threats. These features would protect guests' personal data from ending up in the hands of cybercriminals. StrikeForce Technologies' military-grade technology is behind the operation of the product. Mark Kay, the CEO of StrikeForce, further emphasized the need for such protection, stating that hackers are constantly looking for ways to trick travelers when they connect to a new or unfamiliar Wi-Fi service. This article continues to discuss how the Cyber Safe Travel program will protect guests at the Martinique and StrikeForce's other plans for this product.

    Infosecurity Magazine reports "Manhattan Hotel to Pilot Cyber-Safe Travel Program"

  • news

    Visible to the public "Researchers Bypass Airport and Payment Facial Recognition Systems Using Masks"

    The implementation of biometrics technology such as facial recognition continues to grow. However, researchers from the artificial intelligence company, Kneron, have proved that facial recognition biometrics is not as strong or foolproof as one would think. The researchers were able to fool facial recognition systems applied at banks, airports, and crossing checkpoints, using high-quality 3D masks of another person's face. The 3D mask allowed researchers to bypass these systems and make purchases under the guise of another person. They also displayed a photo of a person's face to trick a self-boarding system as well as a train station system in which facial recognition is used to allow travelers to make payments. This article continues to discuss the demonstrated use of masks and photos to trick facial recognition systems, as well as the concerns raised by such technology.

    Engadget reports "Researchers Bypass Airport and Payment Facial Recognition Systems Using Masks"

  • news

    Visible to the public "Major Vulnerabilities Found in Popular Wireless Presentation System"

    During new research F-Secure consultants, discovered several exploitable vulnerabilities in Barco's ClickShare wireless presentation system. The vulnerabilities discovered would allow attackers to intercept and manipulate information during presentations, steal passwords and other confidential information, and install backdoors and other malware. To exploit the vulnerabilities, some require physical access, and others can be done remotely if the system uses its default settings. The company Barco have been notified of the vulnerabilities. Barco published a firmware release on its website to mitigate the most critical vulnerabilities. Several of the issues involve hardware components that require physical maintenance to address.

    Help Net Security reports: "Major Vulnerabilities Found in Popular Wireless Presentation System"

  • news

    Visible to the public "Organizations Moving Toward More Rigorous Security Testing to Ensure Compliance"

    The 2020 State of Compliance and Security Testing Report released by Synack highlights results from a survey in which 311 North American organizations shared information about their security compliance testing. The results gave insight into the challenges faced by organizations in their efforts to ensure that their business assets comply with security standards. According to the report, the expense of security testing is a major challenge for organizations as they incur costs from test activity, remediation, efficient scaling, false positives, the integration with DevOps processes, and more. Other challenges include scheduling security tests, managing testers, ensuring effective testing, and the time it takes to conduct such tests. The survey also found that most organizations are spending 20 hours or less on security testing, perhaps due to limited budgets and small teams. However, as cyber incidents continue to grow in frequency and complexity, organizations will have to implement continuous security testing solutions that require 1500-2000 hours a year. This article continues to discuss key findings from Synack's report in regard to the common challenges and current trends in security testing.

    TechRepublic reports "Organizations Moving Toward More Rigorous Security Testing to Ensure Compliance"

  • news

    Visible to the public "The Race for Quantum-Proof Cryptography"

    There needs to be an increase in mathematical research aimed at developing quantum-proof cryptography as the era of fully developed quantum computers approaches. Such research is needed because quantum computers are expected to be capable of breaking current encryption algorithms, RSA and ECC. Quantum-mechanical properties would allow the technology to perform calculations at a significantly faster speed than today's computers. The future of quantum computing poses a threat to national and economic security in that currently encrypted data could be exposed by adversaries through the use of quantum computers. NTRUEncrypt is a lattice-based encryption algorithm developed by Dr. Jill Pipher, President of the American Mathematical Society, and mathematicians Jeffery Hoffstein and Joseph Silverman in 1996, which is said to be a quantum-resistant alternative to RSA and ECC. However, NTRUEncrypt is still relatively new and has not been tested. This article continues to discuss the threat posed to existing cryptographic systems by the future of quantum computing, the NTRUEncrypt algorithm, and the need for more collaborative research in quantum-proof cryptography.

    CSO Online reports "The Race for Quantum-Proof Cryptography"

  • news

    Visible to the public "Snatch Ransomware Reboots Machines In Safe Mode to Bypass Endpoint Protection"

    The Sophos Managed Threat Response (MTR) team discovered a sample of Snatch ransomware when they were investigating an organization's network for a ransomware infection. Further analysis of the new strain of Snatch ransomware revealed that it evades security tools by rebooting infected machines in Safe Mode. This technique allows the ransomware to more effectively encrypt victims' files since most security solutions are automatically disabled in Safe Mode. Snatch is just one of a few ransomware strains that have recently adopted such evasive techniques. Samples of ShurLOckr ransomware were discovered by Comodo to be circumventing security screenings performed by Google Drive and Microsoft 365 to infiltrate the cloud and infect users of an organization's cloud platform. This article continues to discuss the Snatch ransomware, the increase in evasive ransomware, and how security professionals can defend against such ransomware.

    Security Intelligence reports "Snatch Ransomware Reboots Machines In Safe Mode to Bypass Endpoint Protection"

  • news

    Visible to the public "Most Security Pros Admit to Accidental Internal Breaches at Their Organization"

    A survey conducted by Egress to which 500 IT security decision-makers in the U.S. responded. Findings from the survey reveal that inadvertent internal breaches are becoming a greater threat to organizations. In addition to accidental employee breaches, IT security decision-makers have expressed the most concern about malware and external hacks. Despite the increase in such threats, security awareness training for employees is still lacking. The most common applications that have led to accidental data leaks include email, file-sharing services, collaboration tools, and SMS instant messaging. Compliance with the General Data Protection Regulation (GDPR) and the California Consumer Protection Act (CCPA) also remains a top concern for organizations. This article continues to discuss the growth in accidental internal breaches, the applications that have contributed to the rise in such breaches, the steps taken by organizations to comply with privacy regulations, as well as their concerns surrounding these regulations.

    Help Net Security reports "Most Security Pros Admit to Accidental Internal Breaches at Their Organization"

  • news

    Visible to the public "New Orleans Has Declared a State of Emergency After a Cyberattack"

    New Orleans declared a state of emergency following the detection of a cyberattack on its networks. According to the city's head of IT, Kim LaGrue, shortly after the detection of suspicious activity in the city's networks, there was a sharp increase in attempted phishing and ransomware attacks. Once the IT team was sure that the city was being hit with a cyberattack, servers and computers were immediately shut down and a declaration of a state of emergency was filed by city authorities with the Civil District Court. Work is still being done to recover the data that was impacted by the attack. This article continues to discuss the cyberattack faced by New Orleans, how the city responded to this incident, other cities that have recently experienced such attacks, and why there has been an increase in the targeting of government authorities by cybercriminals.

    Technology Review reports "New Orleans Has Declared a State of Emergency After a Cyberattack"

  • news

    Visible to the public "Plundervolt – Stealing Secrets by Starving Your Computer of Voltage"

    Researchers discovered a new vulnerability, and are calling it Plundervolt. The vulnerability is caused by an individual running a processor on a voltage that's a little bit lower than it usually expects, for example, 0.9V instead of 1.0V. The machine may carry on working almost as usual but will get some calculations very slightly wrong. The undervoltages required varied by CPU type, model number, and operating frequency, so they were found by trial and error. This vulnerability might let one pull off a hack, but the chances are slim. There is a patch to this vulnerability. A BIOS update turns off access to the processor instruction used to produce undervoltages, thus stopping any software, including code inside the kernel, from fiddling with your CPU voltage while the system is running.

    Naked Security reports: "Plundervolt - Stealing Secrets by Starving Your Computer of Voltage"

  • news

    Visible to the public "Secure Data Backup of Medical Records Using Secret Sharing and Secure Communications"

    A secure data backup system for medical records, called Healthcare Long-term Integrity and Confidentiality Protection System (H-LINCOS), was developed by the National Institute of Information and Communications Technology, Kochi Health Science Center, and other collaborating research teams. The system would be useful if a disaster occurs as it would allow medical records to be cross-referenced and shared between hospitals. The researchers demonstrated the distributed storage of medical records as well as the quick restoring of medical information such as prescription records and allergy information. Secure communication and secret sharing technologies are used to ensure the confidentiality of medical records. These records can also be easily shared and cross-referenced because the system conforms to a standardized data format. This article continues to discuss the importance of H-LINCOS, the demonstration of this system by researchers, and how the system will continue to be improved.

    EurekAlert! reports "Secure Data Backup of Medical Records Using Secret Sharing and Secure Communications"

  • news

    Visible to the public Open for Nominations - Submission Period Extended!

    The 8th Annual Best Scientific Cybersecurity Paper Competition is now open for nominations. This year's nominating period runs through midnight on March 31, April 15, 2020. We look forward to receiving your nominations.

  • news

    Visible to the public "SaaS Security Fears: Is Your Data Exposed To Potential Risk?"

    In a new survey, findings prove that IT executives have rising SaaS security fears, and worry about cloud security, proprietary data encryption, as well as the loss of independent control due to access limitations. Nearly all executives surveyed (92 percent) believed that they would require SaaS vendors to provide more tailored and flexible security options in the future. Seventy percent of companies surveyed said they had made at least one security exception for a SaaS vendor. Only 19 percent of respondents said 75 percent or more of their SaaS vendors meet all of their security requirements. Overall, those surveyed said they are troubled by the current level of security and accountability provided by their SaaS vendors. Nearly two-thirds are so concerned that they intend to retire applications that do not provide the level of security control they want. The survey also shows that IT executives not only understand the importance of security as it relates to today's SaaS applications but that they are taking swift and necessary steps to protect their enterprises by retiring these applications as quickly as possible.

    Help Net Security reports: "SaaS Security Fears: Is Your Data Exposed To Potential Risk?"

  • news

    Visible to the public "Cyberattacks on Retailers Could Increase 20% this Holiday Season"

    Findings from the analysis of threat data by VMWare Carbon Black suggest that the number of attempted attacks against retailers will grow by 20% this holiday season. Based on the analysis, ransomware attacks and commodity malware will make up a significant portion of attacks on retailers. Retailers should be concerned about the compromise of their mobile apps and websites through the performance of watering-hole attacks in which malicious actors target a specific group of users by installing malware on the websites frequently visited by that group. There also should be concerns about lateral movement, which refers to the systematic movement of cybercriminals through a network in search of data and assets to steal or expose. One-third of the CISOs surveyed by VMWare Carbon Black revealed that their organizations experienced cyberattacks because of the lateral movement of attackers via the network of a business partner or vendor. Another report conducted by Cybereason highlights another threat facing retailers that is the TrickBot malware. Researchers have seen attackers using TrickBot to infect point-of-sale (PoS) systems. This article continues to discuss key findings regarding the expected increase in cyberattacks on retailers during this year's holiday shopping season.

    Dark Reading reports "Cyberattacks on Retailers Could Increase 20% this Holiday Season"

  • news

    Visible to the public "Hacked Ring Camera Found In Child’s Bedroom"

    Another incident further raises a concern about the growing use of inadequately secured Internet of Things (IoT) devices. A video recently surfaced online, in which a hacker is heard to talking to a little girl in her bedroom via her family's Ring security camera. This nightmarish event calls for consumers to make more of an effort to secure their smart home devices as Ring has stated that the incident was not the result of a breach or compromise of Ring's security. Ring pointed out that customers often use the same username and password across multiple accounts on different services, increasing the success of credential stuffing attacks. Such attacks refer to the use of stolen account credentials from data breaches to access accounts on other services. The company suggested that users enable two-factor authentication (2FA), increase the complexity of their passwords, and regularly change their passwords. This article continues to discuss the incident in which a hacker accessed a family's Ring camera to talk to a child, what consumers should do to secure such devices and other incidents where children were targeted by hackers.

    Silicon UK reports "Hacked Ring Camera Found In Child's Bedroom"

  • news

    Visible to the public "Aviation Industry Playing Catch Up on Cybersecurity"

    The aviation industry continues to grow in connectivity and digitalization, which increases the risk of cyberattacks on aircraft computer systems. A new report from the Atlantic Council highlights the need to implement cybersecurity into frameworks focussed on governance accountability for flight safety, security, and more. Findings of a survey conducted together with the report to which 244 aviation industry members responded, show that there are major concerns about the effectiveness of existing cybersecurity and standards, as well as the lack of global standards for cybersecurity practices in the aviation sector. The aviation industry is encouraged to support and adopt the cybersecurity strategy developed by the International Civil Aviation Organization (ICAO) to establish a baseline for cybersecurity standards and practices for aviation organizations. The ICAO strategy touches on international cooperation, governance, information sharing, security awareness training, and other pillars aimed at improving the resilience of the civilian aviation sector against cyberattacks. This article continues to discuss the importance of protecting aircraft computer systems, the ICAO strategy, and efforts that are being made to bolster aviation security.

    FCW reports "Aviation Industry Playing Catch Up on Cybersecurity"

  • news

    Visible to the public "IoT Smartwatch Exposes Kids’ Personal, GPS Data"

    Researchers at AV-TEST have discovered vulnerabilities in the SMA M2 smartwatch, manufactured by Shenzhen Smart Care Technology Ltd. According to researchers, the smartwatch designed for children contains vulnerabilities that could allow hackers to perform malicious activities such as eavesdrop on users, leak personal data, expose GPS position data, and masquerade as a child's parent via messages and phone calls. The exploitation of these vulnerabilities gives potential attackers the ability to track the location of children and access data on their parents' accounts. The personal data that can be accessed by hackers through the abuse of the IoT smartwatch's flaws include names, addresses, ages, and contacts such as relatives. The flaws derive from weak authentication and a lack of encryption. More than 5,000 children and 10,000 parents are impacted by the vulnerability of this smartwatch to hacking. This article continues to discuss the presence of vulnerabilities in the SMA M2 smartwatch, how these security issues can be abused by hackers, SMA's response to this discovery, and findings of security flaws in other popular IoT smartwatches.

    Threatpost reports "IoT Smartwatch Exposes Kids' Personal, GPS Data"

  • news

    Visible to the public "Chrome 79 Includes Anti-Phishing and Hacked Password Protection"

    There is a new version of Chrome out, which does a better job protecting the user against phishing sites and credential stuffing attacks. The older version of Chrome protected users against phishing by checking the sites they entered their Google credentials into, against a list of known phishing sites. Google used to synchronize a list of bad sites with the browser every 30 minutes, but because sites change so quickly, that meant users could still fall victim to new sites that had come online just minutes earlier. The new version of Chrome, now performs the phishing protection in real-time, even for users with the synchronization feature turned off. Google believes that this new feature will protect users in 30% more cases. The new version will also protect all the passwords stored in the Chrome password manager rather than just Google accounts.

    Naked Security reports: "Chrome 79 Includes Anti-Phishing and Hacked Password Protection"

  • news

    Visible to the public "Number-Crunchers Set New Record for Cracking Online Encryption Keys"

    A team composed of computer scientists from the University of California San Diego, the French National Center for Scientific Research, the University of Limoges, and the French research institute for digital sciences Inria, has set a new record for cracking the largest encryption key. The team was able to factor an RSA key that has 240 decimal digits and 795 bits. The previous record was made in 2010 in which a key with 232 decimal digits and 768 bits was cracked. The team also computed a discrete logarithm that is 795 bits in size. According to researchers, it took them a total of 35 million core hours to crack RSA-240 and compute the discrete logarithm. The calculation does not pose a threat to computer security as the size of the RSA key broken in this record is much smaller than the size of keys used by modern computers. However, based on Moore's Law, computer scientists expect to be able to crack larger keys as the processing power of computers increases. This article continues to discuss RSA cryptography, the importance of discrete logarithms, and the new record set for cracking encryption keys.

    New Scientist reports "Number-Crunchers Set New Record for Cracking Online Encryption Keys"

  • news

    Visible to the public "New York Water System Audit Finds Cybersecurity Flaws"

    An audit of the New York water system by the New York State Comptroller's Office revealed cybersecurity flaws associated with policies and procedures. State-hired technology experts discovered vulnerabilities that could have been exploited by hackers to infiltrate the city of Middelton's networked water system. According to a report from the New York State Comptroller, policies and procedures did not cover the security duties to be performed by technology employees, the proper usage of portable devices by employees, or the continuous monitoring of devices connected to the networked water system. The audit also called for the implementation of security awareness training for employees. Jacob Tawil, commissioner of public works for the city, said these flaws will be addressed. This article continues to discuss findings from the New York water system audit.

    GovTech reports "New York Water System Audit Finds Cybersecurity Flaws"

  • news

    Visible to the public "Smart Lock Has a Security Vulnerability That Leaves Homes Open for Attacks"

    A vulnerability in the KeyWe smart lock has been discovered by security researchers at F-Secure. KeyWe's smart lock was designed to make it easier for homeowners to lock and unlock their doors by allowing them to do so through the use of an app. However, the vulnerability discovered by researchers could allow hackers to sniff the traffic between the mobile app and the smart lock to recover the secret key needed to unlock the smart lock. One researcher pointed out that the exploitation of this flaw can be performed, using inexpensive network-sniffing devices. The researchers also found that the flaw cannot easily be patched because the firmware used by the current version of the lock can't receive over-the-air updates. This article continues to discuss the smart lock vulnerability, KeyWe's response to this discovery, and the risk posed by IoT devices because of the lack of cybersecurity standards for such devices.

    CNET reports "Smart Lock Has a Security Vulnerability That Leaves Homes Open for Attacks"

  • news

    Visible to the public "Hackers Can Mess With Voltages to Steal Intel Chips' Secrets"

    Researchers from the University of Birmingham in the UK, TU Graz in Vienna, KU Leuven in Belgium, Technische Universitat Darmstadt in Germany, and the University of California have discovered a new method that can be used by attackers to steal sensitive data stored in an Intel Chip. The technique, called Plundervolt, is performed by injecting malware into a targeted computer that lowers the CPU voltage, inducing computation faults. These faults are bit flips in which ones are turned to zeros or vice versa. Bit flips in Intel's Software Guard Extensions (SGX) enclave can be exploited when cryptographic computations are being performed to recover the secret key as a change to a bit in cryptographic key weakens it. The researchers also demonstrated the execution of Plunderbolt to make the processor write data to the portion of memory that is not protected instead of the secure SGX enclave. This article continues to discuss the Plunderbolt technique, Intel's response to this research, and other attacks that have broken Intel's SGX feature.

    Wired reports "Hackers Can Mess With Voltages to Steal Intel Chips' Secrets"

  • news

    Visible to the public "Over 750,000 Applications For US Birth Certificate Copies Exposed Online"

    A U.K.-based penetration testing company Fidus Information Security found more than 752,000 applications for copies of birth certificates on an Amazon Web Services (AWS) storage bucket. The bucket discovered also had 90,400 death certificate applications, but these could not be accessed or downloaded. TechCrunch verified the data by matching names and addresses against public records. An online company that allows users to obtain a copy of their birth and death certificates from U.S. state governments is responsible for the exposed massive cache of applications. The bucket wasn't protected with a password, allowing anyone who knew the easy-to-guess web address access to the data. The applications dated back to late-2017, and the bucket was updating daily. In one week, the company added about 9,000 applications to the bucket. Fidus Information Security and TechCrunch have warned the online company, Amazon, and the local data protection authority of the security lapse.

    TechCrunch reports: "Over 750,000 Applications For US Birth Certificate Copies Exposed Online"

  • news

    Visible to the public "The Drums of Cyberwar"

    If the U.S. were to experience a major attack on its critical infrastructure, there could be major consequences. Recent studies have shown that a cyberattack on critical infrastructure has the potential to harm public health and significantly reduce safety. According to a study conducted by Lloyd's of London and the Center for Risk Studies at the University of Cambridge, if the electric grid in fifteen states and Washington D.C. were to be disabled by hackers, more than 90 million people would lose electricity. An incident like this would result in the loss of life, decline in trade, disruption of water supplies, and damage of transport networks. The economy would also take a massive hit in that a cyberattack of such magnitude could cost $243 billion to $1 trillion in damages. This article continues to discuss studies on the potential consequences of cyberattacks against critical infrastructure.

    Homeland Security News Wire reports "The Drums of Cyberwar"

  • news

    Visible to the public "Australian and European Police Shut Down Access to Popular Criminal Hacking Tool"

    A widely-used remote-access hacking tool, called the Imminent Monitor Remote Access Trojan (IM-RAT), was recently taken down by Australian and European law enforcement. The tool had been sold to a little over 14,000 buyers in 124 countries via the black market for about seven years. More than 115,000 different attacks were executed against Palo Alto Networks' customers through the use of IM-RAT. Officials have said that the tool was used by cybercriminals to steal different types of personal data from victims' machines such as photos, passwords, and videos. This article continues to discuss IM-RAT in relation to its widespread distribution, application in the execution of attacks, evolution, creator, and takedown by police.

    CyberScoop reports "Australian and European Police Shut Down Access to Popular Criminal Hacking Tool"

  • news

    Visible to the public "Microsoft Demystifies Email Attack Campaigns Targeting Organizations"

    Using email is the preferred method for adversaries to gain a foothold into organizations. A new tool is now available to some Microsoft enterprise customers called Campaign Views. This new tool allows security teams to see how successful specific email attack campaigns have been at compromising their organization. The tool also allows security teams to identify users who have fallen prey to the attack. One can take remediation steps faster, spot and remediate configuration flaws that allow the attack to be successful, use the indicators of compromise to investigate related campaigns and hunt and track threats so they can thwart future attacks.

    Help Net Security reports: "Microsoft Demystifies Email Attack Campaigns Targeting Organizations"

  • news

    Visible to the public "A Quantum Computing Future Is Unlikely, Due to Random Hardware Errors"

    Google announced that it had achieved quantum supremacy by performing a specific quantum computation at a greater speed than the best classical computers. IBM contested Google's claim of quantum supremacy, expressing that it had already made this breakthrough with its classical supercomputer having the capability to perform the computation almost at the same speed as Google's latest quantum processor, but with a higher degree of accuracy. However, there are still doubts about quantum computing as Michel Dyakonov, a theoretical physicist at the University of Montpellier in France has stated reasons as to why practical quantum supercomputers will never be built. Random errors, which are unavoidable in any physical system, make the future of quantum computing unlikely. This article continues to discuss what a quantum computer is, the need for noise and error correction in quantum computing, as well as quantum cryptography.

    The Conversation reports "A Quantum Computing Future Is Unlikely, Due to Random Hardware Errors"

  • news

    Visible to the public "Linux Bug Opens Most VPNs to Hijacking"

    Security researchers at the University of New Mexico and Breakpointing Bad discovered a vulnerability that is contained by most Linux distributions. The researchers used a proof-of-concept exploit that allowed them to determine whether a user is connected to a virtual private network (VPN), find out the user's virtual IP address, inject forged packets into the connection used to communicate with remote servers, and more. In addition to affecting Linux distributions, including Ubuntu, Fedora, Debian and Unix-like operations systems such as FreeBSD and OpenBSD, the bug affects macOS, iOS and Android. In regard to VPN technology, the proof-of-concept exploit can be used against OpenVPN, WireGaurd, and IKEv2/IPSec. This article continues to discuss an attack that could be executed through the exploitation of the Linux bug, as well as which operating systems and VPNs are affected.

    Threatpost reports "Linux Bug Opens Most VPNs to Hijacking"

  • news

    Visible to the public "Compromised Passwords Used on 44 Million Microsoft Accounts"

    In a news study, Microsoft has found that 44 million Microsoft Azure AD and Microsoft Services accounts are vulnerable to account hijacking due to users using compromised passwords. Microsoft forced users to change their passwords if they found that the user's password matched the ones that were compromised. Microsoft suggests that users set up Multi-factor authentication to help prevent account hijackings. NIST suggests companies should verify that passwords are not compromised before they are activated. Passwords should also be checked frequently against a dynamic database comprised of known compromised credentials.

    Help Net Security reports: "Compromised Passwords Used on 44 Million Microsoft Accounts"

  • news

    Visible to the public "Honeypots: Best Bet for IoT Security?"

    The electronics manufacturer, Panasonic, recently discussed how it improved the security of its Internet of Things (IoT) devices. The company is using specially crafted honeypot sites to trick cybercriminals into executing attacks against what appear to be connected home appliances to observe and monitor attackers' operations, techniques, and tools, without putting real systems at risk of damage. The honeypots are used as a way for security officials at Panasonic to learn more about the IoT threat landscape and develop countermeasures against such threats. This article continues to discuss the concept of honeypots, Panasonic's execution of honeypots to improve its IoT security, the success of this technique, and the increased targeting of IoT devices by cybercriminals.

    CISOMAG reports "Honeypots: Best Bet for IoT Security?"

  • news

    Visible to the public "Fingerprint Login Should Be a Secure Defense for Our Data, But Most of Us Don't Use It Properly"

    The implementation of biometrics-based security in Apple's iOS such as fingerprint authentication is supposed to add an extra layer to the protection of users' sensitive information. However, this feature is still being improperly used by most people. A study on the use of Apple's biometric fingerprint technology, Touch ID, shows that most users are unaware of this feature's purpose and proper use. In order to use Touch ID, a user must create a PIN or password for additional security validation after the device is restarted or when 48 hours has passed since the device was unlocked. A study conducted by researchers found that most Touch ID users are unaware that they could use passwords instead of PINs. Those that are aware, use easy PINs because they are easier to remember. This article continues to discuss the lack of awareness about the purpose of technologies such as Touch ID, the types of attacks that can be used to reveal passcodes, and studies that have shown that biometric systems are still not completely secure.

    NextGov reports "Fingerprint Login Should Be a Secure Defense for Our Data, But Most of Us Don't Use It Properly"

  • news

    Visible to the public "Cookie Leak Allows White-Hat Researcher to Access HackerOne Vulnerability Reports"

    HackerOne, a company that hosts bug bounty programs for organizations, recently disclosed an incident in which a human error led to the access of company vulnerability reports by a white-hat hacker known as haxta4ok00. One of HackerOne's security analysts accidentally sent a session cookie to the white-hat researcher, which was then used to access the vulnerability reports. Following the disclosure and investigation of the incident, the researcher as rewarded $20,000 for their discovery. HackerOne then took steps to change its cookie policy and establish a process for responding to an event in which a hacker is suspected of accessing sensitive material. In addition, the company plans to re-examine and alter its security analyst permission model, as well as enhance education for employees and white-hat hackers. This article continues to discuss how the incident occurred, HackerOne's response to the incident, and the expected increase in attacks targeting crowd security testing platforms.

    SC Magazine reports "Cookie Leak Allows White-Hat Researcher to Access HackerOne Vulnerability Reports"

  • news

    Visible to the public "New Ransomware Attacks Target Your NAS Devices, Backup Storage"

    Security researchers have observed an increase in ransomware attacks targeting network-attached storage (NAS) and backup storage devices. Ransomware continues to be a major threat to enterprises, hospitals, and utilities. NAS systems are devices connected to a home or enterprise network that functions as a centralized location for authorized network users to store and recover data. According to security researchers, attackers can circumvent user authentication as a result of vulnerable integrated software in NAS systems, allowing the execution of ransomware attacks on these devices. This article continues to discuss the concept behind ransomware, the increase in ransomware attacks on NAS systems, and other recent findings pertaining to the use of ransomware by cybercriminals.

    ZDNet reports "New Ransomware Attacks Target Your NAS Devices, Backup Storage"

  • news

    Visible to the public "Hackers Find Ways Around a Years-Old Microsoft Outlook Fix"

    Email remains a weakness in security as highlighted by the ongoing exploitation of a flaw in Microsoft Outlook that was disclosed and patched in October 2017. The U.S. Cyber Command issued a warning about the exploitation of the vulnerability in July of this year. Security researchers discovered that the vulnerability has been abused by the Iranian government-linked hacking group, known as APT33, and another Iran linked- hacking group, APT34. The vulnerability derives from Outlook's Home Page feature, which can be used as a home screen and to load external content. If a hacker were to gain access to a user's account credentials, they could abuse the bug in the Home Page to upload malicious content, remotely execute exploit code, and take over a device's operating system. This article continues to discuss how hackers could be getting around the fix for the Microsoft Outlook bug.

    Wired reports "Hackers Find Ways Around a Years-Old Microsoft Outlook Fix"

  • news

    Visible to the public "Web Payment Card Skimmers Add Anti-Forensics Capabilities"

    Researchers from Visa's Payment Fraud Disruption (PFD) team have found a new JavaScript-based payment card skimmer, dubbed Pipka, which has affected 16 e-commerce websites. Web skimming refers to the injection of malicious scripts into online merchant sites to steal payment card information. Web skimming attacks are usually performed by inserting malicious scripts into checkout pages where users enter their payment card information. Pipka differs from another web skimmer, called Magecart, in that it is customizable, allowing attackers to set the skimmer's targeted form fields from which they want data to be stolen. In addition to other features that sets Pipka apart from Magecart, the new web skimmer is capable of deleting itself from a web page's source code after it has been executed. This article continues to discuss the concept of web skimming, known skimmers such as Magecart, the capabilities of Pipka, and suggested mitigation measures against this attack.

    CSO Online reports "Web Payment Card Skimmers Add Anti-Forensics Capabilities"

  • news

    Visible to the public "FBI Issues Smart TV Cybersecurity Warning"

    The FBI recently issued a warning to consumers about the threat posed by unsecured smart TVs to their security and privacy. According to a statement released by the Oregon branch of the FBI, cybercriminals can abuse an inadequately secured TV connected to the Internet to perform malicious activities such as alter volume settings, display inappropriate videos, and spy on users via the TV's camera or microphone. Shoppers are encouraged to learn how to properly change security settings on these devices before purchasing them. Users should also be aware of how to disable microphones, cameras, and the collection of personal data, as well as if it is possible to disable these features. This article continues to discuss the warning issued by the FBI on smart TV cybersecurity in relation to what attacks can be performed by abusing unsecured TVs and how consumers can protect themselves from such attacks.

    Infosecurity Magazine reports "FBI Issues Smart TV Cybersecurity Warning"

  • news

    Visible to the public "Hackers Could Disrupt Elections by Altering Websites"

    Florida's Secretary of State, Laurel Lee, recently discussed the insecurity of state and county elections websites with the governor's Cybersecurity Task Force. She stressed the importance of bolstering the security of these websites against hackers as their attacks could alter election results and erode the public's trust in the election process. According to Lee, the Florida Department of State is working to improve the security of those sites, stay up-to-date on cyber threats, and learn about security tactics. The Department of State established the Joint Election Security Initiative (JESI) in which 67 county elections offices are trained to identify vulnerabilities and recognize attacks such as phishing attacks, denial-of-service (DoS) attacks, and more, facing election infrastructure. Lee pointed out that these attacks are often executed through the exploitation of human behavior, further emphasizing the importance of security awareness training. This article continues to discuss the importance of securing election infrastructure and efforts that are being made to improve election security.

    GovTech reports "Hackers Could Disrupt Elections by Altering Websites"

  • news

    Visible to the public "Facebook and Twitter Warn of Malicious SDK Harvesting Personal Data From its Accounts"

    Researchers discovered that some third-party apps on Facebook and Twitter have quietly scraped personal information from people's accounts without their consent. Some third-party iOS and Android apps use "malicious" software development kits (SDKs). The "malicious" SDKs were designed to display ads. Experts noticed that once users of the social networks were logged into either service using one of these applications, the SDKs then silently accessed their profiles to collect information. The apps that includes the SDK code can collect user names, email addresses, and tweets via unspecified Android apps. Twitter and Facebook reported the incident to Google, Apple, and other industry partners, to have them take action to block the malicious SDK and apps that include its code.

    Cyber Defense Magazine reports: "Facebook and Twitter Warn of Malicious SDK Harvesting Personal Data From its Accounts"