TweakTown NewsRefine News by Category:
In early March, it was discovered that Sally Beauty Store became the latest retailer to suffer a data breach, with an unknown number of customers compromised.
Shortly after, Sally Beauty said less than 25,000 customers were affected, though has more recently changed its mind and said a larger number were hit.
Although the company didn't disclose an exact number yet, it is believed to be higher than 25,000, with debit and credit card information exposed. "As we have said previously, we will not speculate on the scope of our recent data security incident until the forensic review progresses because experience with such incidents at other retailers has taught that it is difficult to ascertain the extent of a data breach incident until the required forensic review is complete."
Prior to former contractor Edward Snowden disclosing the NSA's mass surveillance efforts, many people turned to the Tor Web browser for anonymous Internet searching. However, the free and popular tool is no longer as secure, with law enforcement agencies also able to identify users they suspect of criminal activities.
"There's not a magic way to trace people [through Tor], so we typically capitalize on human error, looking for whatever clues people leave in their wake," said James Kilpatrick, Homeland Security Investigations agent, in a statement.
It was only a few years ago when law enforcement and federal agencies believed they couldn't crack Tor, but multi-agency efforts led to better data collection and social engineering patterns.
The mystery surrounding Malaysia Airlines Flight 370 and its unusual disappearance has captivated the world, with cybercriminals and scammers cashing in on the tragedy. The scam email says the flight wreckage has been found and invites users to click on a link to learn more, as many email viewers are curious to learn what happened to the flight.
The Better Business Bureau (BBB) recently issued a memo warning users to hover over links to see the URL address, don't trust friends' online tastes for liking and sharing, and report suspected scam posts.
Cybercriminals often use holidays, major events, and disasters to influence the spread of malware aimed to compromise users and steal personal information.
A new clever cryptocurrency mining malware has been located on digital video recorders (DVRs), in a continuing evolution of connected devices being targeted by security threats.
The malware actively searches for vulnerable devices, and then the exploit comes later. Researchers are still unsure how the camera DVRs are being infected with the malware, though with many home users installing custom surveillance systems at home, this could be a growing concern.
"After accessing a couple of the DVRs, we noticed that the malware was running on the
DVR itself," said Johannes Ullrich, from the SANS Technology Institution, which discovered the bug. Two pieces of malware typically ran: a customized version of minderd, the Bitcoin miner - [we] actually learned today that, in this case, it may mine Litecoin, not bitcoin - [and] a piece of software called cmd.so, which initiated the scans for Synology devices that we observed before and that led us to investigate the DVR."
Americans are still unsure what to think about former NSA contractor Edward Snowden's disclosures of widespread NSA spying, though appreciate the knowledge of such snooping activities.
In a recent poll, 33 percent of Americans believe Snowden leaking information was "the right thing to do," with 33 percent believing It was "the wrong thing to do," and 36 percent still on the fence regarding the entire situation. Interestingly, 45 percent believe Snowden should face prosecution if returned to the U.S., while 35 percent would support a full pardon.
However, more than half of those surveyed believe Americans have the right to know about the NSA surveillance programs revealed by Snowden.
Just days away from the Microsoft Windows XP end of service, to take effect on Tuesday, April 8, there are still millions of users relying on the aging operating system.
Between business computers and consumer PCs, XP market share is still 28 percent worldwide, amounting to about 300 million PCs - many of them including ATMs, electric and water, and similar critical infrastructure.
"[It's like] there's a big air bubble on the side of your tire and it's going to fail,"said Mark Bernardo, General Electric GM of automation software, when speaking to WSJ. "It's not a question of if, it's a question of when."
Microsoft and security vendors have repeatedly warned current XP users they will face significant security threats after the April 8 deadline.
The United States military is boosting its cyber capabilities as the Defense Department has almost 1,800 employees as part of its Cyber Mission Force. By the end of 2016, that staffing figure is expected to increase up to 6,000 before the end of 2016, while the US government continues to support in cyberattacks.
To try and increase the staffing level in such a short amount of time, military officials hope to recruit current military personnel - Silicon Valley cybersecurity specialists are unlikely to leave behind high-paying jobs to join the government's new programs.
"We spent a lot of time in the last two years in particular figuring out what the [recruiting] model would be,"a senior defense official recently told reporters. "Initially sometimes people will think about recruiting highly skilled people from the outside, and that is one option... but quite honestly, the way we're going to be most successful is using people within the force [including those with no cyber background] and giving them the training.
A free Google Chrome plugin that lets users view the email address of other LinkedIn profiles, even if they aren't connected, is in the legal cross hairs of LinkedIn.
The free Sell Hack extension provides a "hack in" button, and while it is being defended by its creators, LinkedIn and security experts aren't overly impressed with the feature.
"LinkedIn members who downloaded Sell Hack should uninstall it immediately and contact Sell Hack requesting that their data be deleted," said Krista Canfield, LinkedIn Senior Manager of Corporate Communications, in a statement to TNW. "We advise LinkedIn members to protect themselves and to use caution before downloading any third-party extension or app. Often times, as with the Sell Hack case, extensions can upload your private LinkedIn information without your explicit consent."
UPDATE: According to the Sell Hack Blog, the plugin no longer works with LinkedIn - and any collected information has been deleted by the company. A future update that doesn't violate the LinkedIn Terms of Service could be available later down the road.
The National Security Agency (NSA) had two encryption tools that were adopted by EMC-owned security firm RSA, allowing the federal government easier access to snoop on Web communications, academic researchers recently noted.
The researchers are largely made up from professors at the University of Wisconsin, University of Illinois and Johns Hopkins, as they found the "Extended Random" extension which is able to nullify the RSA Dual Elliptic Curve software faster.
"If using Dual Elliptic Curve is like playing with matches, then adding Extended Random is like dousing yourself with gasoline," a researcher told Reuters.
The man behind a successful Microsoft computer scam was handed a four-month suspended sentence, in what was a rather clever scam. Mohammed Khalid Jamil, based in Luton, England, created a fake company and outsourced calling efforts to an Indian firm, which led to British citizens cold called from people posing as Microsoft reps.
Victims were targeted for around $60 up to $250, and scammers would be given remote access from victims - leading to poor PC security - and a "software fix," a Microsoft-provided software patch available for free, which would solve the problem.
Jamil needs to pay $8,300 in fines, along with $9,440 in compensation, then pay almost $24,000 in court restitution penalties.