TweakTown
Tech content trusted by users in North America and around the world
6,159 Reviews & Articles | 39,583 News Posts
TRENDING NOW: Star Citizen creator: "I don't care about consoles"

TweakTown News

Refine News by Category:

Hacking & Security Posts - Page 20

Cybersecurity bill approved by Senate Intelligence Committee

The controversial Cyber Information Sharing Act (CISA) was approved by the Senate Select Committee on Intelligence, aimed to help the government and private companies better defend against cyberattacks. The bill received a 12-3 vote, and is the latest step forward in an evolving battle to keep networks and users safe on the Internet.

 

TweakTown image news/3/8/38989_01_cybersecurity_bill_approved_by_senate_intelligence_committee.jpg

 

As part of CISA, the director of national intelligence will need to increase classified and unclassified cyberthreat information - and individuals and companies are authorized to roll out countermeasures to keep their own networks and consenting customers secure.

 

There is a large amount of concern regarding the controversial program, especially following former NSA contractor Edward Snowden disclosed organized federal government spying operations.

Continue reading 'Cybersecurity bill approved by Senate Intelligence Committee' (full post)

Security experts use anti-malware, anti-virus to defend against APTs

Most companies combat advanced persistent threats (APTs) using anti-virus and anti-malware security software, according to the "Advanced Persistent Threat Awareness" report released by the ISACA non-profit information security group. The study found 96 percent of survey participants note AV or anti-malware solutions as the most popular option - with 60 percent also relying on remote access.

 

TweakTown image news/3/8/38966_02_security_experts_use_anti_malware_anti_virus_to_defend_against_apts.jpg

 

APTs are described as stealthy, prolonged attacks typically aimed at cyberespionage attacks against businesses and governments. Due to large numbers of malware, security experts try to keep end-users and networks secure while pinpointing activity from command and control network traffic.

 

"The technical controls most often identified as being used to prevent APTs are network perimeter technologies, such as firewalls and access lists within routers, as well as anti-malware and anti-virus," according to the ISACA report. "While these controls are proficient for defending against traditional attacks, they are probably not as well suited for preventing APTs for a number of researchs," including spear phishing or zero-day threats.

E-ZPass informs customers to be aware of circulating phishing scam

E-ZPass customers in Massachusetts, New York and New Jersey are being warned of an email phishing scam from criminals claiming to be from the E-ZPass "Customer Service Center." The email subject is "Payment for driving on toll road," and informs customers that they have unpaid tolls.

 

TweakTown image news/3/8/38955_01_e_zpass_informs_customers_to_be_aware_of_circulating_phishing_scam.jpg

 

The fake email has the following message: "Dear customer, you have not paid a toll for driving on a toll road. This invoice is sent repeatedly, please service your debt in the shortest possible time. The invoice can be downloaded here."

 

Security experts point out a couple of different problems with this email, including: bad grammar and the realization that an official summons wouldn't ask recipients to download an invoice. Furthermore, the real E-ZPass Service Center doesn't email customers regarding payment problems and other correspondence.

Continue reading 'E-ZPass informs customers to be aware of circulating phishing scam' (full post)

Kaspersky Lab announces 2015 editions of security solutions

Security company Kaspersky Lab today announced its updated product lineup for home consumers, including the Kaspersky Anti-Virus 2015, Kaspersky Internet Security 2015 and Kaspersky Internet Security - Multiple-Device 2015. Designed to protect Microsoft Windows, Apple OS X and Google Android devices from current threats in a rather complex security world.

 

TweakTown image news/3/8/38941_01_kaspersky_lab_announces_2015_editions_of_security_solutions.jpg

 

New features include Webcam protection aimed at keeping built-in Web cameras safe and secure from outside hacking. Kaspersky also included a Wi-Fi security notification module that ensures public Wi-Fi hotspots are secure, informing users of vulnerable network connections or unsecured password transmission. Ransomware which encrypts files also is a major threat to PC users, so the Kaspersky Lab System Watcher module verifies all running processes to prevent criminals from encrypting files.

 

"Today's threat landscape is persistently evolving and at Kaspersky Lab we're continuously staying one step ahead of the cybercriminals," said Justin Priestley, Kaspersky Lab consumer sales SVP, in a statement. "We provide our customers with the most advanced protection tools available, like the innovative Webcam Protection and System Watcher features. Our 2015 suite of products, especially Kaspersky Lab Internet Security, is equipped with technologies that have proven to be effective not only in independent tests, but in the real-world, protection 300 million people across the globe."

Chinese hacker group Deep Panda targets US think tanks for Iraq data

A team of researchers at CrowdStrike is claiming China's "Deep Panda" cyber offensive group has begun targeting, and has now compromised, US national security think tanks. In an alarming statement, co-founder Dmitri Alperovitch asserted that the attacks seem to be tied into monitoring activity from the newly founded Islamic State of Iraq and the Levant (ISIS).

 

TweakTown image news/3/8/38931_01_chinese_hacker_group_deep_panda_targets_us_think_tanks_for_iraq_data.jpg

 

In a blog post, CrowdStrike's co-found Dmitri Alperovitch outlined the company's work with human rights groups and security think tanks. Former senior government officials frequently work in organizations like these, and so are a natural target of hostile intelligence services, Alperovitch said, adding that he has "great confidence" the Deep Panda group is affiliated with the Chinese government. It's one of 30 CrowdStrike closely follows in China, but the company points out it is also one of the most sophisticated.

 

As the armed ISIS faction launched an attack on an oil refinery, Alperovitch claims Deep Panda began a hunt for files from US thinktank employees. He pointed out that China is the top foreign investor in Iraq's oil infrastructure, and so espionage fits in with the country's national interests. "It wouldn't be surprising if the Chinese government is highly interested in getting a better sense of the possibility of deeper US military involvement that could help protect the Chinese oil infrastructure in Iraq," Alperovitch wrote. "In fact, the shift in targeting of Iraq policy individuals occurred on June 18, the day that ISIS began its attack on the Baiji oil refinery."

Utility companies should wake up to real-world cyberattack threats

Public utility companies and federal governments need to be more aware to the real threat of cyberattacks, with criminals reaching new levels of network penetration. Following suspicions of a cyberattack, companies need to conduct an in-house and third-party security audit to determine how the incident occurred.

 

TweakTown image news/3/8/38911_01_utility_companies_should_wake_up_to_real_world_cyberattack_threats.jpg

 

It was previously noted that public utility companies struggling to meet growing cyberattack threats - but the realization that eastern European hackers were able to compromise oil and gas companies as part of "Dragonfly" provides a more frantic view of cybersecurity. The U.S. government is mulling over stricter regulations to force utility companies to be more careful with network connections and security from outside threats.

 

"These infections not only gave the attackers a beachhead in the targeted organizations' networks, but also gave them the means to mount sabotage operations against infected (industrial control system) computers," Symantec noted.

Dailymotion hit by attack, leaving video viewers vulnerable

The popular video website Dailymotion was compromised by cybercriminals able to inject malicious code, redirecting visitors and secretly installing malware. The iframe first appeared on June 28 and installed the Sweet Orange Exploit Kit, targeting Oracle Java, Microsoft Internet Explorer and the Adobe Flash Player.

 

TweakTown image news/3/8/38896_01_dailymotion_hit_by_attack_leaving_video_viewers_vulnerable.jpg

 

It seems only a small number of users were compromised, and Dailymotion quickly restored videos and ensured they were safe again.

 

"If the kit successfully exploited any of these vulnerabilities, then Trojan.Adclicker was downloaded onto the victim's computer," according to Symantec researchers. "This malware forces the compromised computer to artificially generate traffic to pay-per-click Web advertisements in order to generate revenue for the attackers."

Continue reading 'Dailymotion hit by attack, leaving video viewers vulnerable' (full post)

iPhone 6 may get location sensitive security features

Most of us understand that one of the ways to keep people who aren't authorized to get into your iPhone out is by using a password. The problem for many is that unlocking the screen of your device with a password can be a nuisance. Apple is tipped to be working on a new feature for the iPhone 6 that will make password security easier to live with.

 

TweakTown image news/3/8/38899_3_iphone_6_may_get_location_sensitive_security_features.jpg

 

According to rumors floating around the web, the iPhone 6 will get automatic unlocking. Apple has filed a patent application that outlines ways that the next iPhone might get automatic unlocking. The app outlines a method where the iPhone will only deploy password locks when it is used on an unknown network.

 

That would mean if you try to use your iPhone at home, no password would be needed, but if you try to use it on a network at the local coffee shop, it would ask for a password. The patent app is titled "Location-Sensitive Security Levels and Setting Profiles Based on Detected Location." As with all patent apps, there is no guarantee that this tech will ever be used.

Stanford Federal Credit Union accidentally leaks data on 18,000

The Stanford Federal Credit Union contacted around 18,000 of its customers, informing them their personal information was accidentally included in an email to another bank customer. The personal information sent includes customer names, mailing addresses, member numbers, credit information, loan offers, and tax identification numbers.

 

TweakTown image news/3/8/38889_02_stanford_federal_credit_union_accidentally_leaks_data_on_18_000.jpg

 

The incident took place on April 30 and the bank began informing customers in early June. The employees quickly discovered the mistake and data was reportedly destroyed before the customer opened the email.

 

"While we are confident this information was never seen by unauthorized individuals and you are not at risk, we feel it is important to communicate with our members in any situation involving their information or accounts," said Joan Opp, Stanford Federal Credit Union CEO, in a statement. "I also want to emphasize that our electronic systems were in no way compromised and your accounts remain secure."

Continue reading 'Stanford Federal Credit Union accidentally leaks data on 18,000' (full post)

Around 140 ISPs disconnect persistent Internet pirates in US

Anti-piracy firm Rightscorp says more than 140 Internet service providers (ISPs) in the United States are disconnecting repeat copyright offenders. Most ISPs send notices to repeat copyright offenders, telling them that protected content, such as music, movies, and other content are being shared.

 

TweakTown image news/3/8/38886_01_around_140_isps_disconnect_persistent_internet_pirates_in_us.jpg

 

However, Rightscorp tracks what users are downloading and sharing on BitTorrent, then approaches user ISPs - and most fines are about $20 per shared file. Repeat offenders, however, need swifter punishment according to copyright holders, which is why Rightscorp is speaking with so many U.S. ISPs. It remains difficult to identify how many times a person must be caught sharing files to be considered a "repeat infringer," with companies such as AT&T refusing to unplug users unless a court order is issued.

 

"We push ISPs to suspend accounts of repeat copyright infringers and we currently have over 140 ISPs that are participating in our program, including suspending the accounts of repeat infringers," said Christopher Sabec, Rightscorp CEO, when speaking about the current state of copyright infringement.

Latest Tech News Posts

View More News Posts

Forum Activity

View More Forum Posts

Press Releases

View More Press Releases