News Items

  • news

    Visible to the public "How Smartphones Can Verify Your Identity"

    PXL Vision, a spin-off from the ETH Zurich, one of the leading international universities for technology and the natural sciences, offers a more secure and easier solution for verifying the identity of a person. Identity verification is essential in activities such as opening bank accounts or purchasing mobile phone subscriptions. However, current solutions for identity verification pose a risk to the privacy of users as they still need to interact with another person to verify themselves. In India, commercially available solutions still require users to interact with an employee via video chats to verify their identity. PXL Vision's automated technology, called Daego (digital alter ego) requires a user to scan their ID and take a selfie video via an app, which are then scanned and matched to prove their authenticity. The potential applications of Daegoin in the private realm include hiring babysitters and private tutors, as well as online dating. This article continues to discuss the secure digital identity verification solution offered by PXL Vision regarding its process, security, application by companies, and response from customers, as well as how it is an improvement over human interaction-based verification.

    ETH Zurich reports "How Smartphones Can Verify Your Identity"

  • news

    Visible to the public "Microsoft Looks to Rust Language to Beat Memory Vulnerabilities"

    Microsoft has been working on a project called Project Verona. This project is an ambitious plan to stop common vulnerabilities hiding in old Windows code by using an implementation of the open-source Rust programming language. Traditionally Microsoft Windows software requiring fine control, such as device drivers, low-level OS functions such as storage and memory management, has been written in C or C++. Software requiring fine control comes at the expense of mistakes that lead to insecure code, particularly memory issues, which account for up to 70% of the vulnerabilities that Microsoft finds itself patching later. Rust has built-in protections against common memory problems such as use after free, type confusion, heap and stack corruption, and uninitialized use. Mozilla has already implemented Rust. However, Microsoft's Rust implementation is more complicated because the software needs more capabilities to work across a broader range of components. It is still not clear when Rust programing language might be implemented on Microsoft software used by customers, but it is starting to look inevitable at the current rate of progress.

    Naked Security reports: "Microsoft Looks to Rust Language to Beat Memory Vulnerabilities"

  • news

    Visible to the public "When Rogue Insiders Go to the Dark Web"

    Researchers who investigate the Dark Web are seeing an increase in the distribution of stolen company data by rogue employees. Researchers have seen rogue employees selling data stolen from the organizations at which they are employed as well as the access to this data in the underground markets. According to researchers, most of these rogue insiders work for financial and telecommunications companies. Telecommunications employees were found selling sensitive information such as text message logs and geolocation data from SIM cards, which could be used by attackers to harm VIPs or government employees. Rogue financial firm employees have been seen selling customer banking data and information that could be used for insider training. This article continues to discuss the growth in rogue employees inside the Dark Web, what type of stolen information they are selling, the processes of insider recruits in the underground markets, and the threat posed by rogue insiders.

    Dark Reading reports "When Rogue Insiders Go to the Dark Web"

  • news

    Visible to the public "Ethical Hacking: The Challenges Facing India"

    A security researcher, named Avinash Jain, found a vulnerability in India's state-run health portal, which is used by patients to book appointments at government hospitals online. The vulnerability allowed him to access sensitive details about a patient such as their full name, address, history of appointments made on the health portal, patient ID, unique biometric identification number, and recorded medical conditions. Following Jain's disclosure of the vulnerability to the Indian Computer Emergency Response Team (CERT-In), the flaw was patched. However, the responsible disclosure of critical vulnerabilities by researchers is not always appreciated by the Indian government. Although ethical hackers in India help to improve the security of data, they can still face legal consequences from the Indian government when they disclose vulnerabilities associated with government agency systems. This article continues to discuss the vulnerability discovered in India's ORS Patient Portal, other incidents in which the global healthcare industry has been targeted by cybercriminals, and the lack of legal protections for security researchers in India.

    BBC reports "Ethical Hacking: The Challenges Facing India"

  • news

    Visible to the public "Can Anyone Be Completely Anonymous?"

    Vasileios Chatzistefanou and Konstantinos Limniotis, researchers at the Open University of Cyprus, did a study on the security of five anonymous social media applications to find out if they allow third parties to access personal data or track users. The anonymization of personal data is supposed to ensure that users' privacy is protected from data mining and data publishing systems. However, user privacy is not guaranteed despite the removal of personal identifiers. Characteristics of the data can be used to create a unique fingerprint through the application of different techniques. This fingerprint can then be used to determine the identity of a user. This article continues to discuss the aim of data anonymization, the characteristics that can be used to identify users in a data set, and findings of personal data processing in anonymous applications.

    TechXplore reports "Can Anyone Be Completely Anonymous?"

  • news

    Visible to the public "Crooks Are Exploiting Unpatched Android Flaw to Drain Users’ Bank Accounts"

    A new Android vulnerability, called StrandHogg, could be exploited by attackers to steal mobile banking credentials and money from bank accounts. The discovery was made by the Norwegian app security company, Promon, after being informed by Wultra, an Eastern European security company, about the disappearance of money in customer bank accounts in Czech Republic. The investigation of StrandHogg revealed that it affects all versions of Android and puts the top 500 most downloaded Android apps at risk. This malware is said to be unique because it can be executed without having to root a device or get special permissions on the device. StrandHogg abuses a flaw in Android's multitasking system to launch attacks that would enable malicious apps to appear legitimate. This article continues to discuss the StrandHogg vulnerability in relation to its discovery and capabilities, as well as what Android users should lookout for.

    Help Net Security reports "Crooks Are Exploiting Unpatched Android Flaw to Drain Users' Bank Accounts"

  • news

    Visible to the public "A Bug in Microsoft’s Login System Put Users at Risk of Account Hijacks"

    Security researchers at CyberArk discovered a vulnerability in Microsoft's login system that could have allowed attackers to hijack users' accounts. According to researchers, attackers could have exploited the bug to steal account tokens, which are granted to users by websites and apps to enable them to access their accounts without having to re-enter their passwords. The researchers discovered the use of unregistered subdomains linked to some highly trusted apps developed by Microsoft to generate access tokens. Once an unsuspecting victim clicks on a malicious link contained by an email or website, their account token is stolen. This article continues to discuss the bug found in Microsoft's login system, what the exploitation of this bug could have allowed attackers to do, and how Microsoft responded to this discovery.

    TechCrunch reports "A Bug in Microsoft's Login System Put Users at Risk of Account Hijacks"

  • news

    Visible to the public "This Trojan Malware is Being Used to Steal Passwords and Spread Ransomware"

    There is a new hacking campaign happening right now, targeting healthcare and education organizations with custom-built, Python-based trojan malware. The malware gives attackers almost full control of Windows systems with the ability to monitor actions and steal sensitive data. The remote access trojan, dubbed PyXie RAT, can perform the following functions: keylogging, credential harvesting, video recording, cookie theft, the ability to perform man-in-the-middle attacks, and the capability to deploy other forms of malware onto infected systems. The malware also does it's best to clear evidence of the suspicious activity, to make it hard for an individual to detect the malware.

    ZDNet reports: "This Trojan Malware is Being Used to Steal Passwords and Spread Ransomware"

  • news

    Visible to the public "Cultural Differences Account for Global Gap in Online Regulation"

    A new study conducted by researchers at the University of Birmingham suggests the correlation between a country's cultural values and their commitment to cybersecurity regulation. The study suggests that web users in more competitive national cultures are more likely to be risk-takers, calling for stricter regulation, while web users in less competitive cultures take fewer risks, prompting lighter cybersecurity regulation. For example, China's culture is more competitive, thus creating more risk-taking web users and resulting in the enforcement of stricter cybersecurity regulation. Risky behavior in regard to cybersecurity, personal data, privacy, cybercrime, and negligence includes, but is not limited to using unsecured Wi-Fi connections, allowing web browsers to remember passwords, and visiting potentially harmful websites on devices that do not have anti-virus protection software installed. This article continues to discuss the study and its findings in relation to how cultures contribute to global differences in online regulation.

    EurekAlert! reports "Cultural Differences Account for Global Gap in Online Regulation"

  • news

    Visible to the public "Netflix Account Freeze – Don’t Click, It’s a Scam!"

    There is a new phishing email going around trying to trick Netflix users that their account was frozen, and specific information is needed to unlock the account. There are quite a few misspellings in the email, and when one clicks on the link, it doesn't bring one to the real Netflix website, but to a website that the adversary had created using a domain name that starts with a 32-character hexadecimal string. If one enters any information, it is then sent to the adversary, not to Netflix. If the user tried to log in on the bogus site, the crooks know their password. The user should then go to the official Netflix login page as soon as they can and change their password. If the user gave away their credit card details, the adversaries know those too. They should call their bank as soon as they can to cancel their card. It is essential to always do one's research before entering information.

    Naked Security reports: "Netflix Account Freeze - Don't Click, It's a Scam!"

  • news

    Visible to the public "Bad RCS Implementations Are Creating Big Vulnerabilities"

    There are multiple vulnerabilities associated with how the new messaging standard aimed at replacing SMS (Short Message Service) is being implemented by carriers. In some instances, carriers' implementation of the communication protocol, RCS (Rich Communication Services), creates major vulnerabilities that could be exploited by attackers to track a user's location, intercept messages, spoof phone numbers, and more. In one case, a carrier's implementation of RCS allowed an app to download a user's RCS configuration file, which enabled the app to have access to voice calls and text messages. In another case, researchers discovered that the six-digit code used by a carrier for user identity verification could be guessed through the execution of a third-party brute-force attack. This article continues to discuss the aim of RCS, the vulnerabilities being created by the way carriers are implementing RCS and GSMA's response to the RCS implementation issues discovered by researchers.

    The Verge reports "Bad RCS Implementations Are Creating Big Vulnerabilities"

  • news

    Visible to the public "Need to Safeguard Drones and Robotic Cars Against Cyber Attacks"

    Researchers at the University of British Columbia (UBC) demonstrated three different covert attacks on robotic vehicles, suggesting the vulnerability of robotic vehicles such as Amazon delivery drones or Mars rovers to getting hacked. The attacks designed by the researchers were able to cause both real and simulated drones and rovers to crash, miss targets, or be delayed in the completion of a mission. These attacks were executed through the exploitation of major flaws in robotic vehicle software. According to researchers, these attacks could not be detected, using the most commonly used detection methods. This discovery emphasizes the need to increase the development and implementation of security mechanisms to protect drones and robotic cars from cyberattacks. This article continues to discuss the attacks developed by UBC researchers to bring further attention to the vulnerability of robotic vehicles to cyberattacks, suggested countermeasures, and the growing use of robotic vehicles.

    Science Daily reports "Need to Safeguard Drones and Robotic Cars Against Cyber Attacks"

  • news

    Visible to the public "CISA Wants a Vulnerability Disclosure Program At Every Agency"

    The U.S. Homeland Security Department's Cybersecurity & Infrastructure Security Agency (CISA) wants a vulnerability disclosure policy in place for every federal agency. Each federal agency would be required to create a formal process for security researchers to safely and legally disclose the vulnerabilities that they discover in the agency's public-facing websites, as well as security flaws found in other IT infrastructure. The implementation of vulnerability disclosure policies would alleviate concerns among public security researchers about the violation of laws when disclosing discovered security vulnerabilities to the government. The proposed directive would require agencies to create a web-based system for receiving information from researchers about potential vulnerabilities, develop a vulnerability disclosure policy, set clear limitations regarding hacking methods, and more. This article continues to discuss the directive proposed by CISA and the importance of establishing vulnerability disclosure policies.

    NextGov reports "CISA Wants a Vulnerability Disclosure Program At Every Agency"

  • news

    Visible to the public "This Tool Predicts Cybercriminal Activity Even Before It Happens"

    Group-IB, a Singapore-based cybersecurity company, developed a new tool that can help analysts in security operations centers and computer emergency response teams predict cyberattacks before they occur. The tool is also available to threat intelligence experts and forensic researchers. Clients will be able to use the internal tool for graph network analysis to find connections between scattered data, increasing the speed at which the malicious actor responsible for the launch of a cyberattack is identified. The tool could also be used to analyze and predict threats that could be faced by a specific organization or industry. In addition, the framework of attackers, as well as the tactics they use, can be further examined through the use of this tool. This article continues to discuss the capabilities and design of Group-IB's graph network analysis tool.

    CISOMAG reports "This Tool Predicts Cybercriminal Activity Even Before It Happens"

  • news

    Visible to the public "Should Cybersecurity be Taught in Schools?"

    Human behavior is one of the biggest threats when it comes to cybersecurity. The education system teaches children not only with elementary competencies but also equips them with at least some of the skills that they'll need to navigate their daily lives successfully. In our technology-infused era, it is now argued that also basic cybersecurity skills are among the kinds of skills that help people thrive in life. At the moment, there is a program called Cybersecurity Education Training Assistance Program that is run by the US Department of Homeland Security.

  • news

    Visible to the public "APT33 Has Shifted Targeting to Industrial Control Systems Software, Microsoft Says"

    The Iranian government-linked hacking group, known as APT33, has shifted targets in that the group is now going after industrial control systems (ICS) instead of just probing IT networks. APT33 was previously known to have targeted defense, transportation, oil, and gas sector organizations in the U.S. and Saudi Arabia. If the group were to successfully infiltrate the critical infrastructure supply chain, they could execute a major cyberattack that could inflict damage and endanger public safety. This article continues to discuss the latest targets, operations, and possible motive of APT33.

    CyberScoop reports "APT33 Has Shifted Targeting to Industrial Control Systems Software, Microsoft Says"

  • news

    Visible to the public "Most Organizations Have Incomplete Vulnerability Information"

    According to a new report released by Risk Based Security, if a company only uses the Common Vulnerabilities and Exposures (CVE) system or National Vulnerability Database (NVD) to gain insight into vulnerabilities, they are vulnerable to a significant number of security issues as 33% of disclosed flaws are missing from the CVE/NVD. Researchers at Risk Based Security have identified 5,970 more vulnerabilities than what is included in the CVE/NVD. Researchers also found that many of the disclosed flaws that are not reported in the CVE/NVD are considered to be high risk or critical. As the CVE/NVD only lists flaws disclosed directly by security vendors and researchers, thousands of flaws that are reported in other ways are not getting included in these sources. This article continues to discuss the absence of major security flaws in the CVE/NVD, the reliance on these sources for vulnerability information, the different ways in which researchers disclose flaws, and the companies that disclosed the most flaws in their products last year.

    Dark Reading reports "Most Organizations Have Incomplete Vulnerability Information"

  • news

    Visible to the public "Attackers Demand $14 Million Ransom From IT Services Firm"

    On November 17th Virtual Care Provider Inc., which provides cloud hosting and other services to more than 110 healthcare entities, including nursing homes and assisted living facilities, had been affected by ransomware. The type of ransomware that was used is called Ryuk, and the TrickBot virus was used to spread the ransomware. The adversaries are demanding a 14 million dollar ransom. The attack has affected nearly all of VCPI's core offerings, including internet service, email, access to patient records, client billing, phone systems, and even the firm's payroll operations that serve nearly 150 company employees. Virtual Care Provider Inc., are trying to fix the servers that provide Active Directory access, email, eMAR (electronic medication administration records system), and electronic health records applications first. The reason for the high ransom demand is because the attacker believes that they have Virtual Care Provider Inc. in a situation where they have to pay, or they risk losing their business.

    BankInfoSecurity reports: "Attackers Demand $14 Million Ransom From IT Services Firm"

  • news

    Visible to the public "PoS Malware Exposes Customer Data of Catch Restaurants"

    Point-of-sale (PoS) systems used at popular NYC restaurants, including Catch NYC, Catch Roof and Catch Steak were found to contain malware that could allow attackers to search for track data read by PoS devices from payment cards. The data includes cardholder names, card numbers, expiration dates, and internal verification code. The discovery emphasizes the importance of applying encryption on all connections. According to the Catch Hospitality Group, which owns the three restaurants, the malware was removed and additional security measures were implemented to improve the protection of payment card data. PoS malware is expected to be a major concern for retailers during the holiday season. This article continues to discuss the credit card data scraping malware found on PoS systems in popular Catch restaurants, the response to the discovery of this malware, incidents of PoS malware infections faced by other large brands, and why PoS systems are an easy target for cybercriminals.

    Threatpost reports "PoS Malware Exposes Customer Data of Catch Restaurants"

  • news

    Visible to the public "Cyberattack Hit 10% of Louisiana's State Government Servers"

    Neal Underwood, Louisiana's deputy chief information officer, recently discussed the ransomware attack that impacted 10% of computer network servers used by the Louisiana state government to conduct operations. Although the ransomware attack did not result in the loss of data and a ransom payment to the perpetrators behind the attack, some agencies, including those at the Office of Motor Vehicles, were significantly affected by the attack. Technology staff are still working to get online systems and services functioning again. According to Underwood, some computer systems that were affected by the attack will have to be rebuilt, using backup and recovery systems. The source of the cyberattack is still unknown. This incident further emphasizes the importance of improving the security of state and local governments against ransomware attacks and other cyberattacks. This article continues to discuss the ransomware attack that hit Louisiana's state government servers in regard to its impact and response.

    Security Week reports "Cyberattack Hit 10% of Louisiana's State Government Servers"

  • news

    Visible to the public "A Model to Classify Cyberattacks Using Swarm Intelligence"

    A team of researchers at Glasgow Caledonian University and COMSATS University in Pakistan developed a new intrusion detection scheme to improve the security of information shared via the internet. The proposed scheme is based on the Artificial Bee Colony (ABC) algorithm and the Random Neural Network (RNN-ABC). The intrusion detection RNN-ABC scheme was trained on the NSL-KDD Train+ dataset, which is a dataset used in the training of algorithms to identify the performance of cyberattacks. According to researchers, their scheme has been successful at classifying novel cyberattacks with an accuracy of 91.65%. This article continues to discuss the intrusion detection RNN-ABC scheme in relation to its level of accuracy and how it compares with an existing intrusion detection system based on Hybrid Multilayer Perceptron (MLP), along with the security threat posed by the growth of Internet of Things (IoT) devices.

    TechXplore reports "A Model to Classify Cyberattacks Using Swarm Intelligence"

  • news

    Visible to the public "Cyberattackers Taking Auto Industry for a Ride, FBI Reportedly Warns"

    The FBI issued an alert to a select group of companies in the U.S. auto industry about the exploitation of network vulnerabilities as well as the execution of brute force attacks and phishing attacks to gain access into their networks. According to the FBI, there has been a significant increase in cyberattacks against the auto industry as indicated by recent ransomware attacks targeting car manufacturers, the compromise of systems used by these manufacturers, and the exfiltration of data such as employee email accounts. In addition to stealing sensitive information, malicious hackers have also been reported to be executing fraudulent wire transfers. The automotive attack surface is expected to expand as more autonomous, connected vehicle technology is implemented. This article continues to discuss the FBI alert issued to companies in the automotive sector about the advancement of cyberattacks on the auto industry and suggestions from security experts on how auto manufacturers can improve their security.

    SC Media reports "Cyberattackers Taking Auto Industry for a Ride, FBI Reportedly Warns"

  • news

    Visible to the public "Data Security and Automation top IT Projects for 2020, AI not a Priority"

    In a new study, researchers surveyed 1045 IT professionals worldwide to name their top five IT projects for the year 2020. The research concluded that 74 percent of the respondents identified data security as their top IT priority for 2020. 54% of respondents want to focus on automating manual tasks. 43% of organizations ranked data privacy among their top five priorities; 52% of them are subject to privacy regulations. 33% of organizations intend to focus on digital transformation, integrating their existing solutions, and performing cloud migrations. 20% of organizations are planning on addressing the IT skills shortage either through education of existing IT personnel or talent acquisition in 2020. And interestingly, AI was not chosen by many organizations to be one of their main focuses in 2020. Only 14 percent of large organizations (10,000-50,000 employees) stated that they were going to focus on deploying AI-based solutions in 2020.

    Help Net Security reports: "Data Security and Automation top IT Projects for 2020, AI not a Priority"

  • news

    Visible to the public SoS Musings #31 - Kid Hackers

    SoS Musings #31 -
    Kid Hackers

  • news

    Visible to the public SoS Research Profile: KU Leuven, Belgium

    SoS Research Profile: KU Leuven, Belgium

  • news

    Visible to the public Pub Crawl #32

  • news

    Visible to the public "T-Mobile Reveals Data Breach Affecting Prepaid Customers"

    It has been discovered that telecommunications operator T-Mobile was victim of a data breach. The breach was reported to authorities on November 21st. This breach has affected an undisclosed number of customers. The number of individuals is said to be small, and the breach only impacted customers using T-Mobile's prepaid services. Users' financial data, social security numbers, and passwords were not compromised. The data that was accessed includes name, billing address, phone number, account number, rate plan, and added features. Anyone who is notified about being breached should change their password immediately.

    United States Cybersecurity Magazine reports: "T-Mobile Reveals Data Breach Affecting Prepaid Customers"

  • news

    Visible to the public Cyber Scene #38 - Back to the Future

    Cyber Scene #38 -
    Back to the Future

  • news

    Visible to the public "Your Holiday Guide to Safe Cybershopping"

    Security researchers are cautioning consumers about the spike in cybercrime that usually occurs during the holiday season when people do more online shopping. Consumers should be aware of the expected increase in cybercriminal activities such as the performance of phishing scams, creation of fake shopping sites, deployment of card skimming software, and more. Security experts have provided tips for consumers on how to avoid falling victim to these cybercrimes, which include keeping security software updated, using strong passwords, making sure browsers support SSL encryption, using virtual private networks, and avoiding phishing links. This article continues to discuss the different ways in which cybercriminals can take advantage of unsuspecting consumers and what consumers can do to protect themselves when shopping online.

    CSO Online reports "Your Holiday Guide to Safe Cybershopping"

  • news

    Visible to the public "Brand New Android Smartphones Shipped With 146 Security Flaws"

    In a new analysis, it was uncovered that brand new android phones come with 146 CVE-level flaws in devices from 29 smartphone makers. The defects found could perhaps allow the modification of system properties (28.1%), app installation (23.3%), command execution (20.5%), and wireless settings (17.8%). These Android smartphones made by Samsung, Xiaomi, and other manufacturers, have never been turned on, or have had a malicious app downloaded onto them. These phones are shipped with these flaws. The culprit of these flaws is a range of software specific to each manufacturer, installed in addition to Android itself or its Google applications. The only way to fix the flaws is for the smartphone maker to issue a fix.

    Naked Security reports: "Brand New Android Smartphones Shipped With 146 Security Flaws"

  • news

    Visible to the public "IBM Launches Open Technology to Speed Response to Cyber Threats Across Clouds"

    IBM has launched Cloud Pak for Security, a platform aimed to address cybersecurity threats across multicloud and hybrid environments, and helping security teams increase the speed at which they respond to cyberattacks. The platform is said to be the first to use open-source technology developed by IBM to search and translate security data from different sources. Cloud Pak for Security can connect with any security tool, run in any environment, connect data sources to gain security insights without having to transfer data, and connect security workflows to a unified interface to speed up security teams' incident response times. As organizations are increasingly adopting new security technologies to keep up with the evolving cyber threat landscape, they are using disconnected tools that may not work well together all the time. This issue can be addressed by using open technologies and unified platforms such as IBM Cloud Pak for Security. This article continues to discuss the design and capabilities of this new platform.

    PR Newswire reports "IBM Launches Open Technology to Speed Response to Cyber Threats Across Clouds"

  • news

    Visible to the public "Exposed Database Left Terabyte of Travelers’ Data Open to the Public"

    Security researchers have discovered an unprotected database belonging to Gekko Group, which is one of Europe's largest hotel booking companies. According to the researchers, the exposed database contains sensitive data such as travelers' names, home addresses, lodging details, credit card numbers, and passwords stored in plain text. The information stored on the unprotected database belongs to 140,000 clients, each of which could be an individual, organization, or traveling group. The database was discovered during an online scan for servers with inadequate security protections. This discovery brings further attention to the risks associated with the increased use of cloud servers by companies to store data. This article continues to discuss the exposure of travelers' data by an unprotected database, the impact of this exposure, Gekko Group's response to this discovery, and other recent discoveries of exposed databases.

    CNET reports "Exposed Database Left Terabyte of Travelers' Data Open to the Public"

  • news

    Visible to the public "Only 11% of Organizations Can Detect Intruders in Under One Minute"

    In new study, 1,900 senior IT decision-makers and IT security pros in the U.S., Canada, U.K., Mexico, Middle East, Australia, Germany, Japan, France, India, and Singapore across major industry sectors were surveyed to see how fast they could detect intruders. The majority of respondents (80%) reported that in the past 12 months, they have been unable to prevent intruders on their networks from accessing their targeted data, with 44% of the participants pointing to being too slow to detect intruders as the cause. Currently, 95% of respondents surveyed, fell short of meeting the three-time standards of detecting intruders. Out of the individuals surveyed, only 11% of respondent organizations can detect intruders in under one minute, 9% can investigate an incident in 10 minutes, 33% can contain an incident in 60 minutes, and only 5% can do all three. The average time for an organization to detect an attack, investigate an attack, and contain an attack takes an average of 162 hours.

    Help Net Security reports: "Only 11% of Organizations Can Detect Intruders in Under One Minute"

  • news

    Visible to the public "Thousands of Hacked Disney+ Accounts Are Already for Sale on Hacking Forums"

    Shortly after the launch of the Disney+ video streaming service, hackers began hijacking user accounts. The Disney+ launch was accompanied by technical problems as many users complained about not being able to stream movies or shows. However, within the flood of reports pertaining to technical issues, there were complaints about the lost of access to accounts. A number of users reported that hackers were taking over their accounts by logging them out of all of their devices and changing emails as well as passwords for the accounts. Upon further investigation, researchers found that the hijacked Disney+ accounts were being sold on hacking forums for up to $11 per account. This article continues to discuss the technical problems with the Disney+ service, the hijacking of user accounts, the availability of these accounts for purchase on hacking forums, as well as the importance of multi-factor authentication and using unique passwords.

    ZDNet reports "Thousands of Hacked Disney+ Accounts Are Already for Sale on Hacking Forums"

  • news

    Visible to the public "GitHub Initiative Seeks to Secure Open Source Code"

    GitHub recently announced the launch of a new Security Lab. The purpose of the GitHub Security Lab is to improve upon the security of open source software. The new Security Lab will improve the coordination of efforts among researchers, developers, code maintainers, and organizations to address security vulnerabilities contained by open source software. The Security Lab has a dedicated team of security researchers that will work with peers from other organizations to detect security vulnerabilities in open source projects and report the bugs. In addition, developers and maintainers will collaborate in the development of patches for the disclosed flaws. This article continues to discuss the new Security Lab launched by GitHub and how this initiative will improve the security of open source software, along with the growing concern surrounding the vulnerabilities in such software.

    Dark Reading reports "GitHub Initiative Seeks to Secure Open Source Code"

  • news

    Visible to the public "Design Flaw Could Open Bluetooth Devices to Hacking"

    According to new research conducted at Ohio State University, Bluetooth devices contain an inherent design flaw that could allow them to be hacked. The vulnerability derives from the way in which Bluetooth Low Energy devices communicate with mobile apps that are used to control them. The exploitation of the design flaw can leave Bluetooth Low Energy devices vulnerable to being accessed by unauthorized entities as well as eavesdropping attacks. This article continues to discuss the fundamental flaw that leaves these devices vulnerable to being hacked, the potential exploitation of the flaw by hackers, and the development of an automated tool to help researchers examine all of the Bluetooth Low Energy apps available for download in the Google Play Store.

    Science Daily reports "Design Flaw Could Open Bluetooth Devices to Hacking"

  • news

    Visible to the public "As 5G Rolls Out, Troubling New Security Flaws Emerge"

    5G is the next generation of wireless technology that is expected to improve upon bandwidth, capacity, and reliability. However, new security vulnerabilities are expected to emerge in conjunction with the arrival of 5G networks. Although 5G networks are already going live in major cities around the world, researchers are still finding major security vulnerabilities in the 5G specification. Researchers from Purdue University and the University of Iowa recently gave a presentation at the Association for Computing Machinery's Conference on Computer and Communications Security in which they discussed 11 new design issues they discovered in 5G protocols. Using a new custom tool, called 5GReasoner, the researchers discovered these flaws that could allow attackers to expose a user's location, track communication, increase wireless bills, and more. This article continues to discuss the discovery of security flaws in the 5G standard and GSMA's response to these findings.

    Wired reports "As 5G Rolls Out, Troubling New Security Flaws Emerge"

  • news

    Visible to the public "Macy’s Online Store Compromised in Magecart-Style Attack"

    It has been discovered that on October 7, 2019, an unauthorized third party added unauthorized computer code to two pages on macys.com. The unauthorized code that was added, was highly specific and only allowed the third party to capture information submitted by customers on the following two macys.com pages: the checkout page, if credit card data was entered and 'place order' button was hit; and the wallet page, if accessed through My Account. Macy's successfully removed the unauthorized code on October 15, 2019. The stolen information includes customers' first and last name, full address, phone number, email address, payment card number, security code, and expiration date, but only if these were typed into the two mentioned webpages.

    Net Security reports: "Macy's Online Store Compromised in Magecart-Style Attack"

  • news

    Visible to the public "Trusted Certificates make Phishing Websites Appear Valid"

    In a new study, researchers analyzed suspicious domains targeting 20 major retailers in the U.S., U.K., France, Germany, and Australia. They discovered over 100,000 look-alike domains that use valid TLS certificates to appear safe and trusted. The growth in the number of look-alike domains has more than doubled since 2018, outpacing legitimate domains by nearly four times. The researchers also discovered that the total number of certificates that used look-alike domains is more than 400% greater than the number of authentic retail domains. Retailers are often targets of cybercriminals, one top U.S retailer, in particular, has over 49,500 look-alike domains targeting their customers. Over half (60%) of the look-alike domains that have been discovered use free certificates from Let's Encrypt.

    Help Net Security reports: "Trusted Certificates make Phishing Websites Appear Valid"

  • news

    Visible to the public "USB and Bluetooth Accessories Can Be Used to Attack Android Phones and Spy on Owners"

    A team of researchers from Purdue University and the University of Iowa have published a paper in which they bring attention to the presence of a major flaw in popular Android smartphones. The exploitation of the flaw could allow hackers to use Bluetooth and USB accessories to perform a number malicious activities such as block incoming phone calls, forward calls to a different number, disrupt cellular internet connectivity, intercept text messages, track the location of owners, and more. The vulnerability derives from the way in which some Android smartphones enable Bluetooth and USB accessories communicate with baseband firmware. Researchers developed a tool, called ATFuzzer, to find potentially harmful commands to the baseband firmware. Using ATFuzzer, the researchers discovered 14 commands, which could allow hackers to perform malicious activities on 10 different Android smartphones. This article continues to discuss the new security exploit that impacts several popular Android smartphones, the responses to this discovery from Android device manufacturers, and what Android owners can do to protect themselves.

    Android Police reports "USB and Bluetooth Accessories Can Be Used to Attack Android Phones and Spy on Owners"

  • news

    Visible to the public "Holiday Shoppers Beware: 100K Malicious Sites Found Posing as Well-Known Retailers"

    Cyberattacks are expected to increase during the holiday season when consumers do more online shopping. Security researchers at Venafi have discovered more than 100,000 phishing sites masquerading as legitimate sites belonging to popular retailers. According to researchers, these copycat phishing sites are using trusted, valid TLS certificate to appear legitimate, increasing the chances of success at tricking consumers into entering sensitive account and payment information. The lookalike domains target top retailers in the U.S., U.K., France, Germany and Australia. This article continues to discuss the increase in holiday e-commerce sales from 2017 to 2018, the expected increase in cyberattacks during the holiday season, the discovery of 100,000 malicious domains posing as legitimate retailers, and the significant leap in the number of copycat sites.

    Threatpost reports "Holiday Shoppers Beware: 100K Malicious Sites Found Posing as Well-Known Retailers"

  • news

    Visible to the public "APT33 Has Used Botnets to Infect Targets in the U.S. and Middle East, Researchers Say"

    According to security researchers at Trend Micro, an Iranian government-linked hacking group, dubbed APT33, has been using botnets to infect organizations in the Middle East, the U.S. and Asia. The targets of APT33 include oil exploration companies, military hospitals, universities, and a U.S. national security firm. Each botnet used by APT33 to distribute malware and maintain ongoing access on a targeted network only consists of a dozen computers. APT33 has also been discovered to be using their own virtual private network to access sites belonging to penetration-testing firms and sites in relation to cryptocurrency. Further research has revealed that the group is also interested in websites that help recruit employees in the oil and gas industry. This article continues to discuss findings surrounding APT33 in relation to the group's operations, targets, and motives.

    CyberScoop reports "APT33 Has Used Botnets to Infect Targets in the U.S. and Middle East, Researchers Say"

  • news

    Visible to the public "Phishing Campaigns Spoof Government Agencies: Report"

    New research has lead to the discovery of a new hacking group. The hacking group is using an array of sophisticated spoofing and social engineering techniques to imitate government agencies, including the U.S. Postal Service. They do this to plant malware in victims' devices and networks via phishing campaigns. They have been successful, and the malware they deliver through their emails includes backdoor Trojans as well as certain strains of ransomware.

    Bank Info Security reports: "Phishing Campaigns Spoof Government Agencies: Report"

  • news

    Visible to the public "WPI Researchers Discover Vulnerabilities Affecting Billions Of Computer Chips"

    An international team of researchers led by Worcester Polytechnic Institute (WPI) security researchers Berk Sunar and Daniel Moghimi, found flaws that affect Intel and STMicroelectronics CPUs. These security vulnerabilities impact billions of devices, including laptops, servers, tablets, and desktops. The flaws are contained by trusted platform modules (TPMs), which are specialized, tamper-resistant computer chips with cryptographic functionality to prevent unauthorized access to devices. According to researchers, the exploitation of the newly discovered vulnerabilities in TPMs could allow hackers to execute timing side-channel attacks to steal cryptographic keys stored by the chips. Using the stolen cryptographic keys, hackers can alter encrypted information, forge digital signatures, and more. This article continues to discuss the new vulnerabilities found in computer chips made by Intel Corp. and STMicroelectronics.

    Science Blog reports "WPI Researchers Discover Vulnerabilities Affecting Billions Of Computer Chips"

  • news

    Visible to the public "Facebook Confirms Bug That Activated iOS Cameras"

    It has been discovered that there is a new bug affecting Facebook's iOS application. While using Facebook's iOS app, it activates the iPhone owners' cameras while they scroll through their news feeds. The bug started when the company tried fixing an issue, with the way Facebook's iOS app launched. A Facebook representative commented that "They inadvertently introduced a bug that caused the app to partially navigate to the camera screen adjacent to News Feed when users tapped on photos. We have seen no evidence of photos or videos being uploaded due to this bug." Facebook has reported the bug to Apple to be fixed. Even though this was a mistake, it is causing users of Facebook to be more worried about their privacy.

    CyberScoop reports: "Facebook Confirms Bug That Activated iOS Cameras"

  • news

    Visible to the public "Facebook Bug Turns on iPhone Cameras"

    Facebook users are facing another privacy issue stemming from the social media platform's app. Users of Facebook have reported that their iPhones' rear cameras turn on and function in the background when they view photos and watch videos on their timelines via the app. The camera-related bugs have sparked further discussions about the possible planting of such bugs to collect information for the purpose of improving targeted advertising. Facebook's vice president of integrity, Guy Rosen, has confirmed that the camera-related bugs have not resulted in the uploading of user pictures or videos to Facebook. This article continues to discuss the new Facebook bug, as well as how these privacy incidents impact the trust between companies and the public.

    Infosecurity Magazine reports "Facebook Bug Turns on iPhone Cameras"

  • news

    Visible to the public "Malware Attacks on Hospitals are Rising Fast, and the Problem is About to get a lot Worse"

    In a new study, it has been found that healthcare organizations are being increasingly targeted by attackers because they are seen as an easy target. In the first 9 months of 2019 alone, there has been a 60% increase in trojan malware detections. The rise has been particularly significant in the third quarter of this year, with an 82% increase in detections when compared with the previous quarter. Trickbot and Emotet are the most common forms of trojan malware targeting the health sector. These trojans can be used as a gateway to deliver other malicious payloads, and have been used to drop ransomware onto compromised systems

    ZDNet reports: "Malware Attacks on Hospitals are Rising Fast, and the Problem is About to get a lot Worse"

  • news

    Visible to the public "Iowa Asked Researchers to Break Into a Courthouse, Then It Arrested Them"

    Recent ransomware attacks on the cities of Atlanta and Baltimore have emphasized the importance of improving the protection of state and municipal governments against such cyberattacks. These incidents prompted the state of Iowa to hire security researchers from the cybersecurity firm Coalfire to conduct a penetration test on servers and physical buildings to find vulnerabilities that could be exploited by attackers to gain access to sensitive data or equipment. However, two Coalfire researchers were charged with felony accusations of burglary after checking the lock of an open door to the Dallas Courthourse. Although the charges were expected to be dropped, they were instead reduced to criminal trespass. Such incidents continue to raise concerns among security experts as to whether they will be protected by contracts with their clients. This article continues to discuss the Coalfire-Iowa incident and the potential impact of this incident on security research.

    Engadget reports "Iowa Asked Researchers to Break Into a Courthouse, Then It Arrested Them"

  • news

    Visible to the public "Nautilus ATM Flaws Could Allow Hackers Access to Cash, Data"

    Brenda So and Trey Keown, security researchers at Red Balloon Security Inc., discovered flaws in ATMs manufactured by Nautilus Hyosung America, the leading provider of ATMs to retail and financial institutions in the U.S. The exploitation of these vulnerabilities could allow hackers to steal cash, credit card data, debit card data, and other personal financial information. According to the researchers, if a hacker were to gain access to the network to which a targeted ATM is connected, they could hijack the machine and circumvent the security measures that were implemented for it. These vulnerabilities only impact retail versions of Nautilus ATMs. In addition, the researchers also brought further attention to the availability of master keys to the ATMs for purchase on Amazon. This article continues to discuss the vulnerabilities found in Nautilus ATMs, what the exploitation of these vulnerabilities could allow criminals to do, how many machines have been impacted by the security flaws, and how Nautilus Hyosung America responded to this discovery.

    Bloomberg reports "Nautilus ATM Flaws Could Allow Hackers Access to Cash, Data"

  • news

    Visible to the public "Researchers Find New Approach to Attacking Cloud Infrastructure"

    Igal Gofman, head of security research at XM Cyber, and Yaron Shani, XM senior security researcher, will demonstrate a new approach to attacking cloud infrastructure at the 2019 Black Hat Europe. In regard to the use of public cloud infrastructure by organizations, there is a lack of understanding about the cloud identity and access management layer, often leading to security failures such as misconfigurations that threaten customer privacy and security. Existing security practices and controls have been proven inadequate in the mitigation of risks presented by misunderstandings of the public cloud. Research conducted by Gofman and Shani revealed that many traditional defense mechanisms only address specific attacks vectors. In addition, these mechanisms are usually defensive, not predictive. The methodology developed by Gofman and Shani involves the use of a graph to help red and blue teams understand permission relationships between different entities in cloud environments. Further understanding of these connections would reveal how features can be abused by attackers to gain privileges. This article continues to discuss the common misunderstandings about cloud infrastructure, as well as popular defense mechanisms for the cloud and the new approach to attacking such infrastructure.

    Dark Reading reports "Researchers Find New Approach to Attacking Cloud Infrastructure"