TweakTown NewsRefine News by Category:
Home Depot is now working with banks and law enforcement to investigate a data breach that led cybercriminals to steal customer payment information, including debit and credit card data. The Home Depot breach could have started in April or May, and reportedly affected a large number of customers. The data made its way to an underground forum and was called "American Sanctions," reportedly in response to further U.S. and European sanctions against Russia.
"Protecting our customers' information is something we take extremely seriously, and we are aggressively gathering facts at this point while working to protect customers," said Paula Drake, Home Depot spokesperson.
Consumers are urged to use cash or credit card payments in retail stores - debit card payments can be risky, forcing shoppers to closely track their bank statements. Hackers taking a political stance, trying to retaliate against the U.S. for further sanctions in a tense situation between Russia and the Ukraine, adds another layer of chaos to data breaches.
The FBI is now investigating the celebrity hacker that posted numerous photos of celebrities on the Internet over the weekend. Many of the images, originally posted on 4chan and later shared on Reddit, Twitter and Imgur, featured celebrities such as Jennifer Lawrence, Kate Upton, Jenny McCarthy, and Mary Winstead.
Here is what the FBI noted: "The FBI is aware of the allegations concerning computer intrusions and the unlawful release of material involving high profile individuals, and is addressing the matter," said Laura Eimiller, FBI spokesperson, in a statement. "Any further comment would be inappropriate at this time."
Apple also is investigating the incident, as many of the images were reportedly stored online using its iCloud service.
The National Oceanic and Atmospheric Administration (NOAA) is being pressured by the U.S. Department of Commerce Office of Inspector General to fix several vulnerabilities currently found in the Joint Polar Satellite System (JPSS). There are at least a few different high-risk vulnerabilities found in the JPSS ground stations that could be exploited by clever cyberattacks.
Some of the issues would only require software updates or new security patches, but the NOAA is taking 11 to 14 months in some cases to fix the problems - the JPSS system requirements have 30 days to fix security problems, with the inspector general saying it shouldn't take more than three months to resolve problems.
"The remediation of high-risk vulnerabilities is critical to the continued success of the JPSS mission and should have a high priority," according to the report. "The more high-risk vulnerabilities that exist in the system, the higher the probability is that an attacker could compromise it. This could lead to a disruption of NOAA's ability to command and control the Suomi NPP satellite and to provide data that is used in numerical weather models that support weather predictions and climate monitoring."
A recent string of cyberattacks targeting U.S. financial institutions is now being investigated by the FBI and Secret Service. Foreign hackers continually attack western banks and corporations, with JPMorgan Chase and at least four unnamed banks targeted. It remains unknown whether this was simple theft or if it was used to help aid a cyberespionage campaign targeting U.S. banks and their customers.
Despite having increased cybersecurity to defend against attacks, banks struggle to detect - and shut down - sophisticated, coordinated attacks. Stolen data includes bank customer information, along with checking and savings account numbers from the cyber breach, with digital forensics now being studied. Phishing emails were sent, hosted on a Moscow-based server, and tricked users into turning over their personal information while also installing malware to further torment victims.
"We are working with the United States Secret Service to determine the scope of recently reported cyberattacks against several American financial institutions," said Joshua Campbell, FBI spokesperson, in a statement.
The Lizard Squad hacker group launched cyberattacks against Sony PlayStation Network, Battle.net, League of Legends and Microsoft Xbox Live over the weekend, and now has focused on attacking Twitch. The attack was halted after several high-profile Twitch users wrote "Lizard Squad" on their foreheads yesterday. Some critics say the hackers are working on borrowed time, as it seems like only a matter of time before they are caught for their antics.
The FBI became interested when John Smedley, Sony Online Entertainment president, was targeted by Lizard Squad tweeting a bomb hoax to American Airlines. The high-profile attacks against Sony, Microsoft and other companies would have drawn federal interest, but a fake bomb report should only expedite the FBI's investigation.
Reading through tweets on the Lizard Squad page reveals sometimes entertaining - and rather obnoxious tweets - including mentions of the Islamic State of Iraq and the Levant (ISIS) terrorist group fighting in Syria and Iraq.
Swann Security unveiled the Digital Wireless Security System, a camera and monitor utilizing motion triggered recording, designed to be a plug and play wireless surveillance system. The $249.99 system is available at HH Greg, B&H, Meijer and Petra.
The camera is 720p and can record video up to 165 feet away, able to record during daytime or nighttime using 20 infrared LEDs. The system can record audio up to 16 feet away, with owners able to receive updates to smartphones or tablets if the motion sensors are triggered.
"We continuously listen to user feedback, developing new products based on our customers' needs," said Jeremy Steweart, Swann Global Marketing VP, in a press statement. "More and more, consumers want to manage their own home security, whether it's setting up their own security systems or monitoring them remotely. The Swann Digital Wireless Security System provides these advantages while also enhancing technology, resulting in a truly exceptional product."
There has been a decrease in consumer confidence when it comes to online financial transaction security, as we've all seen a large number of point-of-sale (POS) data breaches in the past year. Forty-nine percent of survey respondents said they felt vulnerable when shopping online, with 42 percent saying they would use online payment more if they were better protected, according to security firm Kaspersky Lab and B2B International.
Consumers are becoming more aware of online threats, and cyber fraud detection is an important consideration for shoppers. However, users are still not doing a good job of protecting themselves, but 60 percent of survey respondents said it's up to banks and shops alike to ensure payment information is kept secure.
"Many users still feel safer paying cash or using their bank card at a physical point-of-sale, rather than purchasing online with their computer or mobile device, and this reluctance hampers the development of the online payment market," said Ross Hogan, Kaspersky Lab global head of fraud prevention, in a press statement. "To encourage people to start using electronic payment services more actively, banks, online stores and e-pay systems need to reassure users that they are safe from cyber fraudsters."
It's not uncommon to hear news of a successful cyberattack that causes financial losses and major headaches from government departments or the private sector. However, cyberattacks targeting the financial market could cause significant problems, highlighted by the large volume of attacks targeting banks, credit card companies and retailers.
Regulators and governments are uncertain how to defend against these attacks, with a global "toolbox" in the works to help identify information security procedures. Evidenced by the US Securities and Exchange Commission trying to study cyber resilience, it's going to be hard to clamp down on cyberattacks.
"The issue of cyber resilience is a bit of a sleeper issue, and one that we have to be proactive [about] in terms of making sure the risk management approach is robust," said Greg Medcraft, International Organization of Securities Commission (Iosco), told FT. "Cybercrime has a huge potential impact on markets."
Companies are having a hard enough time trying to keep data secure from cybercriminals overseas, but insider threats leave organizations helpless. A lack of proper training and budget constraints make it difficult, with more than 60 percent of IT and security experts saying they couldn't respond to a real insider attack, according to the SpectorSoft security firm.
Respondents from the United States, Europe and Latin America said a lack of training (55 percent) and budget problems (51 percent) are problematic, with 34 percent saying insider threats aren't currently a priority. There has been an estimated $2.9 trillion of employee fraud losses worldwide every year, as employee theft and fraud can be extremely difficult to detect.
"These statistics paint a bleak picture when it comes to securing company data against insider threats," said Rob Williams, SpectorSoft chief marketing officer. "With so many data breaches happening, C-level executives are coming to the realization that their jobs could be on the line if company data isn't protected. Proper defense must include a comprehensive security solution, and with humans involved, education is just as key. The market is ripe for a new approach to internal security."
Cybercriminals recently targeted JPMorgan Chase customers with a curious phishing attack designed to steal banking credentials and infect PCs so other usernames and passwords could be collected. JMorgan is the No. 1 bank in the United States based on assets, and confirmed the "Smash and Grab" cyberattack targeting its customers.
It seems spam filters stopped a large portion of the attacks, but the phishing scam looks authentic, so it likely did compromise customers. In addition to stealing JPMorgan Chase credentials, attached malware also targets Bank of America, Royal Bank of Scotland and Citigroup customers.
Financial institutions are struggling to try to defend customers from cyberattacks - and the use of social engineering is rising, with cybercriminals simply tricking users into providing the data. However, it's rather curious that these spammers are including malware that steals credentials of other banks, because it's more likely to be detected.