TweakTown NewsRefine News by Category:
The United States accounted for 23 percent of online banking malware attacks during the first quarter of 2014, according to security company Trend Micro's "TrendLabs 1Q 2014 Security Roundup" report. It's not a surprise to find the U.S. is the most popular target, with a growing number of malware-related bank attacks.
Joining the United States were the following countries: Japan (10 percent), India (9 percent), Brazil (7 percent), Turkey (4 percent), France, Malaysia, Mexico, Vietnam, and Australia all with three percent. Online bankers are warned to make sure they run anti-virus and anti-malware security, along with directly accessing their bank accounts - and to avoid clicking on suspicious emails.
Security experts struggle to keep up with the large volume of overly sophisticated attacks targeting their networks - and customers are increasingly finding themselves in the cross-hairs.
Cybercriminals are spoofing emails from a legitimate company, Berkeley Futures Limited, and the Zbot malware attached is now in the wild, security researchers have discovered. The attached ZIP file is password-protected so it cannot be scanned with anti-virus or anti-malware software until the user unlocks the file.
Users need to be more aware of cybersecurity issues, because an attached password in the body of the email should be an immediate red flag to Internet users. However, the cybercriminals behind it must find success if they are using the same tactic to compromise users.
The attachment has two files, a fake SCR spreadsheet file and a fake invoice in the form of a PDF. The file attachment is really a RAR file and not a ZIP file - a unique twist on compromising users, because many people have programs to attach ZIP files, but not everyone can open RAR files.
Sir Iain Lobban, the chief of British spy agency GCHQ, has publicly attacked the Guardian over its role in publishing information leaked by ex-NSA agent Edward Snowden.
He asserted that GCHQ and its sister agencies in British intelligence are protecting the UK "despite the best efforts of some of the media." According to the Telegraph, Lobban said at the IA14 cyber security conference: "GCHQ has some world-class intellectual property but you'll understand that even in these revelatory times we really do need major parts of that to remain secret. But we are working to share where we can, including contributing it to the open source community to encourage further development."
He went on to claim GCHQ's reputation - despite the role the media has played in exposing its part in the worldwide, online surveillance dragnet - is "helping UK industry." "Allies around the world want to talk to us about cyber security and they want to do business with companies that we can vouch for," he said.
Ireland's high court has passed a request on to the European Court of Justice to examine Facebook's compliance with data protection rules after its alleged role in providing data to the USA's National Security Agency.
Ireland's High Court has conceded it is not able to force an investigation from the country's data commissioner, which acts as watchdog to companies all across Europe. High Court Justice Gerard Hogan did say this application for review is likely to fail, as the European commission already ruled the USA has provided an "adequate level of data protection." However, the application does bring about questions on whether the EU data protection directive is in line with the EU's Charter of Fundamental Rights.
"The critical issue which arises is whether the proper interpretation of the 1995 directive and the 2000 Commission decision should be re-evaluated in the light of the subsequent entry into force of article 8 of the EU charter," Hogan said, in a statement which appeared to suggest laws were in dire need of an update for the technology age.
The Federal Bureau of Investigation (FBI) has arrested Timothy Justin French, 20, an alleged member of the NullCrew hacking group on federal hacking charges. Known online as "Orbit," French contributed to attacks against two unnamed universities and three private companies. He has been charged with conspiracy to commit computer fraud and abuse, a common charge when the federal governments snags hackers.
French was arrested without incident and the FBI is looking for other NullCrew members to prosecute. The FBI used a confidential witness, communicating with NullCrew members on Twitter, Skype and Cryptocat as they built their case against the hackers. During the investigation, the witness learned of past hacking operations, current plans, and future targets, while learning about the group's attack strategies.
The NullCrew first popped up on the radar after successfully hacking the Public Broadcasting Service (PBS) and World Health Organization (WHO), publicly publishing usernames, passwords, and email addresses.
Auction house eBay has banned the sale of smartphones from Chinese manufacturer Star, as the company's N9500 cheap Google Android-powered device ships with the Usupay.D Trojan malware pre-installed. The device tracks phone user activity and cybercriminals can remotely control and manipulate the phone, if necessary.
The only app shown running on the device is the Google Play Store icon, and the malware is completely hidden. After reports showed the phone was compromised, eBay decided to pull all sales of the Star N9500, which has become popular due to its low cost and close design to the Samsung Galaxy S4 smartphone.
"The options with this spy program are nearly unlimited," said Christian Geschkat, G DATA Product Manager of Mobile Solutions, in a press statement. "Online criminals have full access to the smartphone. G DATA customers reported a detection by our security solutions and thus alerted us to this criminal tactic."
Major phone manufacturer Nokia suffered a data breach more than six years ago that led cybercriminals to demand a ransom of a few million dollars. Alarmingly, the criminals stumbled across the mobile Symbian operating system's encryption key, and threatened to make the source code public. Nokia quickly paid the ransom.
Coordinating with the Finnish police, Nokia officials made the drop in central Finland, but authorities lost track of the criminals. It's a felony blackmail case that is years old, but police haven't said if they have new leads in the investigation.
Following a drop in Symbian dominance, Nokia later switched to Microsoft Windows Phone OS - and the U.S. based company purchased the Finnish handset manufacturer in early 2014 for $7.6 billion.
Over 600,000 Domino's Pizza customers in Belgium and France have had their personal data stole, and now an anonymous online bandit says the information will be published unless the company pays a cash ransom.
Phone numbers, email addresses, passwords, names and addresses were all pinched, reportedly from a server propping up an online ordering system the business is about to replace.
Somebody listed on Twitter as Rex Mundi has claimed that all the data will find its way online unless Domino's pays 30,000 euros. The account was suspended.
Children at younger ages are frequently using smartphones or tablets, and that has led to some problems for parents trying to limit technology use. Since 2011, children smartphone and tablet use has tripled, according to Common Sense Media, and that number is expected to only accelerate further.
The DinnerTime Parental Control app, designed for both Apple iPhones and Google Android devices, will let parents pause activity - giving children the chance to finish schoolwork, exercise, finish chores, or other activities. There also is a feature so parents are able to purchase app usage details, giving them a better look at how much time kids are using certain apps on their devices.
However, critics say parents should speak with their children about appropriate and inappropriate use of their devices - but that won't slow down the market for apps that provide parents with a better ability to limit technology use.
A new Trojan operating in the United States and United Kingdom, dubbed "Svpeng," demands $200 payment after locking smartphone users out of their devices. The likely Russian-made malicious code doesn't steal login credentials yet, but that is the likely next step, according to researchers from Kaspersky Lab.
Users that don't have some type of anti-malware solution on devices are at higher risk, and there are no easy ways to get around the Trojan once it has been installed. Unless a device has been previously rooted, the only other way to remove it is to boot into safe mode and erase all content on the phone.
The malware looks for the following mobile apps: USAA Mobile, Citi Mobile, Amex Mobile, Wells Fargo Mobile, Bank of America Mobile Banking, TD App, Chase Mobile, BB&T Mobile Banking, and Regions Mobile.