TweakTown
Tech content trusted by users in North America and around the world
6,072 Reviews & Articles | 38,997 News Posts

TweakTown News

Refine News by Category:

Hacking & Security Posts - Page 7

California Governor Jerry Brown to decide on smartphone 'kill switch'

California Governor Jerry Brown is now taking a look at the mandatory smartphone 'kill switch' bill after it was passed by the state legislature. If Brown approves the bill, all smartphone devices sold in the state following July 2015 must have some type of anti-theft technology.

 

TweakTown image news/3/9/39599_01_california_governor_jerry_brown_to_decide_on_smartphone_kill_switch.jpg

 

"Our goal is to swiftly take the wind out of the sails of thieves who have made the theft of smartphones one of the most prevalent street crimes in California's biggest cities," noted Mark Leno (D - San Francisco), author of the controversial bill.

 

California's decision has become the strongest effort to clamp down on smartphone theft, which has led to robberies and crimes in metropolitan areas. Apple already has a kill switch option on its devices, so owners are able to remotely shut off phones. Meanwhile, Google and Microsoft are working on similar solutions for their devices.

Northrop Grumman courts British kids for cyber warfare training

Warplane manufacturer Northrop Grumman is offering British children the chance to learn cyber defence skills in UK schools, targeting those between 12- to 18 years old.

 

TweakTown image news/3/9/39588_01_northrop_grumman_courts_british_kids_for_cyber_warfare_training.jpg

 

Northrap Grumman's program is dubbed CyberCenturion, and it will cater to any young person who wants to learn more about cyber security, including in the international arena. It's feared that there will be a skills gap if nothing is done to train young people in science and engineering, which the programme aims to address. It comes as part of the British government's Cyber Security Challenge UK, which seeks to promote cyber security particularly among young people through a series of competitions.

 

Those who do particularly well at certain competitions, such as checking virtual machines for vulnerabilities, could be offered an internship placement with Northrop Grumman. "The CyberCenturion competition will provide a way for young people interested in the world of cyber security to understand the cyber challenges of today, test their cyber defense skills and inspire them in their choice of career," the company's chief exec, Andrew Tyler, said.

Blackphone responds to claim it was hacked in under five minutes

The Blackphone was announced as a way for security conscious consumers to use their device in peace, without the fear of their communications being compromised - and it has now been 'hacked' at the Black Hat event in under five minutes.

 

TweakTown image news/3/9/39587_01_blackphone_responds_to_claim_it_was_hacked_in_under_five_minutes.jpg

 

@TeamAndIRC managed to gain root access to the Blackphone at the DefCon hacking conference within five minutes by going through the Android Debugging Bridge, and without using a bootloader to boot. Blackphone still seems to be solidly secure on the surface nonetheless, and now the company has responded to the discovery.

 

Blackphone said it is perhaps not as big of a disaster as it sounds: the company underplayed getting access through ADB, claiming it is just a part of the Android OS that the firm opted to turn off, and that a patch is on the way. But another vulnerability uncovered by TeamAndIRC, the company said in a blog post, is "accurate" - and a patch was released in three days of its initial discovery. Blackphone went on to congratulate the hacker for finding the bug.

Underground markets for stolen data as organized as real businesses

Criminals that compromise networks and steal large amounts of information are finding easier and more organized methods to quickly get rid of the data. Data dumps are one of the most popular products found on these underground forums, where buyers and sellers communicate in an organized fashion similar to an official business from the legitimate world.

 

TweakTown image news/3/9/39586_02_underground_markets_for_stolen_data_as_organized_as_real_businesses.jpg

 

Many cybercriminal groups are trying to steal bulk data, such as the Target and eBay breach, looking to offload the information as quickly as possible. Using organized underground hacker forums, many based in Eastern Europe and China, they are able to sell and trade the data.

 

"When we think about the markets themselves they are organized in a unique fashion," said Tom Hold, Michigan State University associated professor specializing in cybercrime. "At the individual level, we're talking about a process where we're seeing peers and colleagues; at the formal forum level, we're seeing a more formal organization that takes place."

Current USB technology 'critically flawed,' security experts warn

Cybersecurity experts Jakob Lell and Karsten Nohl have demonstrated a new vulnerability that makes it extremely difficult for users to defend against USB-based attacks. The current USB standard's vulnerability makes it hard to defend against attacks, even if manufacturers should begin developing additional security layers.

 

TweakTown image news/3/9/39575_01_current_usb_technology_critically_flawed_security_experts_warn.jpg

 

Specifically, empty USB flash drives can contain malware even if formatted - a troubling sign for many of the companies that rely on flash drives to transfer data.

 

"USB is ubiquitous across all devices," said Mike McLaughlin, First Base Technologies, in a statement to BBC. "It comes down to the same old saying - don't plug things in that you don't trust. Any business should always have policies in place regarding USB devices and USB drives. Businesses should stop using them if needed."

Continue reading 'Current USB technology 'critically flawed,' security experts warn' (full post)

Security experts want governments to step up cybersecurity efforts

The high-profile security data breaches of Target and eBay, among others over the past year, caused alarm among security experts wanting to see better government intervention to prevent future problems.

 

TweakTown image news/3/9/39570_01_security_experts_want_governments_to_step_up_cybersecurity_efforts.jpg

 

Former NSA contractor Edward Snowden disclosing massive government surveillance angered some Black Hat users, but sophisticated malware used by China, Russia and other state-sponsored are of greater concern. Cyberespionage attacks continue to increase in an effort to steal government and corporate secrets, while IT staff struggle to keep up.

 

"Either software houses deliver quality and back it up with product liability, or they will have to let their users protect themselves," said Dan Geer, venture capital firm In-Q-Tel, as he spoke for himself during the event. "The current situation - users can't see whether they need to protect themselves and have no recourse to being unprotected - cannot go on."

Yahoo to offer end-to-end email encryption for users by next year

Many people are very focused on security and keeping their communications private. Some of the focus on privacy and security came after Edward Snowden leaked documents to the world that showed the US government was capturing information on the internet from unencrypted websites.

 

TweakTown image news/3/9/39552_3_yahoo_to_offer_end_to_end_email_encryption_for_users_by_next_year.jpg

 

Yahoo announced this week that users of its email service will have the option of encrypting emails sent from start to finish. The encryption will be available starting next year and will be enabled via a browser plug-in.

 

Yahoo's announcement comes only a short while after Google made a similar announcement. Yahoo says that it will bootstrap Google's code and that the Yahoo and Google encryption services will be compatible. Once the encryption is complete, the people will be able to send emails that only the intended recipient can read. Yahoo will use PGP encryption for its email.

Google to use its dominance to push encryption on more websites

When it comes to getting better rankings for their websites, you can bet many business users will do anything that Google tells them to. Google has a formula that it uses to determine the page raking for the sites that are returned in its listings when you type in a word or phrase.

 

TweakTown image news/3/9/39551_2_google_to_use_its_dominance_to_push_encryption_on_more_websites.jpg

 

Exactly what Google uses to rank the pages is a secret, but it will occasionally give site owners an idea what they need to do to get better rankings. Such is the case with an announcement made this week that involves a change to the formula used to rank pages online.

 

Google has said that web pages that automatically encrypt their services will get a ranking boost in the Google recommendation system. Google says for now the encryption will be a small factor in ranking, but the company says that it may put greater emphasis on encryption in the future. Sites that start with "https" are going to get rankings boost.

Black Hat speaker gained access to 200 luxury hotel rooms with an iPad

A security consultant speaking at the Black Hat event has outlined how he gained access to the controls of 200 luxury hotel rooms in China.

 

TweakTown image news/3/9/39540_01_black_hat_speaker_gained_access_to_200_luxury_hotel_rooms_with_an_ipad.jpg

 

At a session called Learn How To Control Every Room At A Luxury Hotel Remotely at Black Hat, Las Vegas, Jesus Molina spoke of the time he spent staying at the St Regis hotel, Shenzhen. Molina became "bored" - at which point he picked up a complimentary iPad granted to guests and reverse engineered a home automation protocol, KNX/IP. He then had access to the lights, temperature and more in his room - but by simply changing one digit of the iPad's IP address he could control rooms all over the hotel.

 

Molina thought about testing the methods with the door lock mechanism but decided not to. "I thought about looking to see if a similar system controlled the door locks but got scared," he said, according to Sky News. Later he made sure to inform the parent company of the security flaw, which is apparently now shut.

Billions of credentials stolen in largest criminal data theft ever

An American web security company, Hold Security, claims Russian criminal rings have built enormous databases of 1.2 billion stolen usernames and passwords, along with half a billion email addresses.

 

TweakTown image news/3/9/39487_01_billions_of_credentials_stolen_in_largest_criminal_data_theft_ever.jpg

 

This heist will be the biggest identity theft of data in the history of the internet, according to Hold Security, and it is thought to have compromised roughly 420,000 websites. Hold has not named the companies it believes were hit but asserted brands both big and small are among those affected.

 

"We were amazed when 10,000 passwords went missing," company founder Alex Holden said. "Now we're in the age of mass production of stolen information. These guys did nothing new, they just did it better and on a mass level so it affects absolutely everybody."

Latest Tech News Posts

View More News Posts

Forum Activity

View More Forum Posts

Press Releases

View More Press Releases