TweakTown NewsRefine News by Category:
Popular Twitter platform HootSuite suffered a DDoS attack yesterday morning, though was back up and running following the temporary interruption. There was no risk to user accounts or personal information, according to HootSuite officials, as they were able to swiftly resolve the problem.
HootSuite defends against numerous DDoS attacks, which typically is a rudimentary approach to crippling a website.
"I'm writing today to let you know that the HootSuite Engineering and Security teams are working to mitigate the DoS attack," said Ryan Holmes, HootSuite CEO, in an e-mail to users. "This interruption was the result of a malicious attempt by an outside party to flood our services in order to shut down the system."
Cybercriminals use DDoS attacks to flood networks and knock websites offline - and while most companies and online services bounce back quickly - it's still an annoyance that diverts IT teams and can lead to angry users and lost revenue. However, some security analysts believe DDoS attacks are being used by organized crime groups as an extortion technique, offering to cease cyberattacks in exchange for cash payments.
In an effort to keep users safer on the Internet, NoBullying.com, an online anti-bullying campaign, listed 10 Internet security tips that users should be aware of.
For those of you trying to provide a comprehensive guide to Internet safety for education purposes, NoBullying has a series of helpful documents available.
"It is essential for parents and educations to learn those online safety tips to make exploring the cyber world a much easier (and) safer experience for our children," said Macartan Mulligan, NoBullying.com co-founder, in a press statement.
An online predator group targeting children as young as three years old utilizing Tor was recently busted by the US Department of Homeland Security. So far, 14 members accused of leading the child pornography website were arrested and face charges related to conspiracy to operate an organized child exploitation enterprise.
Operating from June 2012 to June 2013, the group had more than 27,000 members across the world, with access to at least 2,000 videos.
"These indictments represent a strong coordinated strike - by Homeland Security, the U.S. Postal Inspection Service, and several U.S. Attorney's Office around the country - against child pornography and those who allegedly seek to harm our most vulnerable citizens, our young children," said Kenneth Allen Polite, Jr., U.S. Attorney, in a press statement.
Jonathan Johnson, 27, a Louisiana-based resident is accused of operating the organized Tor child porn ring, creating fake female personas to target and exploit children - while also teaching others in his group to conduct the same activities. He now faces 20 years to life in prison.
The growing threat of data theft and sophisticated malware could top $491 billion in 2014 alone, according to a joint study from the National University of Singapore (NUS) and IDC Research Group.
The research is focused specifically on piracy and the potential ramifications both consumers and businesses face when running pirated and illegal software.
Consumers face a large amount of different cyberthreats, with an estimated 1.2 billion hours of lost time and $25 billion spent to try and deal with malware from pirated software. However, four out of 10 consumers admit to rarely installing security updates on PCs and other devices.
Meanwhile, enterprises will spend $491 billion "because of malware associated with pirated software," with $127 billion related to security issues and $364 stemming from associated data breaches.
Following years of burying their heads in the sand, lawmakers in the United States are finally taking cybercrimes seriously. As noted in the "Gangs Beyond Borders: California and the Fight Against Transnational Organized Crime" report released by California Attorney General Kamala Harris.
The state of California led all states in organized attacks, with computer systems under threat from malware.
"With the rise of a global society connected by the Internet, criminal rings organized to commit hacking, fraud, pirating and other high-tech crimes across borders have rapidly profilerated," the report notes. "These rings operate frequently from Eastern Europe, but also from places as diverse as West Africa and China, and specifically target the citizens, computer networks, and companies of prosperous countries like the U.S."
The report notes both cybercrime and cyber-based threats such as phishing compromise users in the United States and across the world. For example, "Operation Phish Phry" stole more than $1 million, but once the group was busted, 100 hackers faced charges.
aThe NSA wants to be engaged in the continued global discussion of security and secrecy in the digital age, forced to the table following countless complaints of violating user privacy, according to NSA deputy director Richard Ledgett.
The NSA continues to face pressure from Internet users, foreign citizens, political leaders and tech companies, forcing the intelligence agency to go on the defensive. To help try and appear more transparent, there is a current proposal for the NSA to release transparency reports helping give insight into NSA operations.
Ironically, Ledgett said the NSA wanted to share a public point of view during TED to help counter the "half-truths and distortions" made public by Snowden. Ledgett also said Snowden put lives at risk, showing "the bad guys" some of the NSA's cybersecurity and snooping methods.
"If our adversaries see our methods they will move away from using them," Ledgett said. "We have evidence that terrorists, smugglers and nation states have moved away. We are losing visibility into what our adversaries are doing."
Google plans to roll out necessary encrypted HTTPS connection so user emails are encrypted when data is transferred over Google networks.
The 100 percent mandatory e-mail change will prevent outsiders from accessing email messages as all sent and received messages are encrypted while they bounce around servers and data centers.
"Starting today, Gmail will always use an encrypted HTTPS connection when you check or send email," said Nicolas Lidzborski, Gmail Security Engineering lead, in a blog post. "Gmail has supported HTTPS since the day it launched, and in 2010 we made HTTPS the default. Today's change means that no one can listen in on your messages as they go back and forth between you and Gmail's servers - no matter if you're using public Wi-Fi or logging in from your computer, phone or tablet."
Following revelations of widespread and organized NSA spying, Internet users have increased pressure on Internet companies to offer better protection.
Compromised web servers infected with Linux-based malware have been used to target visitors by spreading Windows malware, with up to 25,000 suspected cases in the past two years, researchers note.
Network operators and IT specialists have been informed to look out for select Linux malware, to ensure they haven't been caught up in the Operation Windigo cybercrime effort. The server takeover campaign still is running up to 10,000 hacked servers, which are used to distribute malware, send spam, and infect users with sophisticated rootkit exploits.
"There are two kinds of victims here: Windows end-users visiting legitimate websites hosted on compromised servers, and Linux/Unix server operators whose servers were compromised through that large server-side credential stealing network," researchers note.
Four European research groups helped compile the information, as the cybercriminals behind these threats are clever and don't leave behind a big electronic signature for investigators to follow.
At the request of Swiss authorities, Farid Essebar, working under the codename "Diabl0" was arrested in Thailand by the Department of Special Investigation (DSI), Office of the Attorney General, and the Immigration Bureau.
The Russian-born hacker from Morocco allegedly broke into bank computer networks and hacked bank websites in Switzerland, racking up more than $4 billion in damages to banks and customers in 2011.
"We arrested the suspect at a condominium on Rama IV Road," authorities said in a statement. "Next Thailand will send him to Switzerland within 90 days in accordance with the extradition agreement.
This isn't Diabl0's first run-in with law enforcement, after the hacker was arrested in 2005 for his role in helping create the Zotob computer worm - a nasty cyber effort that targeted Microsoft Windows 2000 and XP users across the world.
Convicted teenage hacker Jared James Abrahams has been sentenced to 18 months in federal prison following two years of compromising online accounts of women he later blackmailed. The 19 year old pleaded guilty last November to one count of unauthorized access of a computer and three counts of extortion, and reportedly broke into around 150 online accounts.
Abrahams grabbed headlines after he compromised Miss Teen USA 2013 winner Cassidy Wolf, in which he accessed her computer and used their webcams to photograph them.
"As digital devices, email accounts, and social media accounts now contain the most intimate details of the public's daily lives, the impact of this type of hacking and extortion becomes more pronounced, troubling, and far-reaching," the U.S. Department of Justice noted. "In some cases, this type of criminal behavior can be life-changing for the victims - especially for vulnerable victims who may feel it is impossible to rebuild their tarnished reputations."
Users need to be more diligent in the type of images, videos, and other personal information they share online - and ensure they keep accounts password-protected with hard-to-guess passwords - and have updated anti-virus and anti-malware software. As Abrahams showed, it's not a bad idea to keep webcams covered when not in use, as well.