Tech content trusted by users in North America and around the world
6,465 Reviews & Articles | 43,162 News Posts

TweakTown News

Refine News by Category:

Hacking & Security Posts - Page 71

Pew: Government interference on Internet is a great threat to users

The rise of hackers and cybercrime are problematic, but national governments maintaining security and political control on the Internet will remain the biggest threat. Specifically, there will be a rise in blocking, filtering, segmentation and balkanization of the Internet, according to a study published by the Pew Research group.

 

pew_government_interference_on_internet_is_a_great_threat_to_users_01

 

Thirty-five percent of those surveyed said they expected significant changes "for the worse" in regards to accessing and sharing online content by 20125 - a troubling concern as more people begin to access the Internet.

 

"Governments worldwide are looking for more power over the Net, especially within their own countries," said Dave Burstein, Fast Net News editor, in a statement. "Britain, for example, has just determined the ISPs block sites the government considers 'terrorist' or otherwise dangerous. There will usually be ways to circumvent the obstruction but most people won't bother."

Continue reading 'Pew: Government interference on Internet is a great threat to users' (full post)

New bank malware kicks in to steal banking login data only

Banks and financial institutions must work through a new generation of malware designed to lurk on Web browsers and only collects data when users access a banking website. Similar to other methods, it all starts with clever social engineering used to compromise victims, which leads to the malware being secretly installed.

 

new_bank_malware_kicks_in_to_steal_banking_login_data_only_01

 

The new tactic has led to at least 400 cases, with banking users often unaware of many threats that face them. At the very least, security experts recommend customers never click links in emails that look like something from their bank - but even if users go directly to the bank website, that's when the malware causes mayhem.

 

"It's going to have graphics and terminology that would make you believe, hey, that sounds pretty legitimate," said JD Sherry, Trend Micro VP of technology and solutions, in a statement. "Once you click on that, you don't have intelligence to basically say that's a bad link. The device is going to download that particular malware."

Hacker mercenaries targeting governments and drug dealers with attacks

The 'MiniDuke' hacker group are targeting governments and drug dealers, likely serving as cyber mercenaries working for a paid backer, using malware to compromise users. It's not uncommon to hear government departments, the private sector and public infrastructure being targeted, but focusing on drug dealers seems to be a newer twist.

 

hacker_mercenaries_targeting_governments_and_drug_dealers_with_attacks_01

 

A total of 23 countries were affected by MiniDuke, with an aim of plucking data and credential information - and the malware is evolving to now include commercial code, as it appears a subdivision could receive funds from law enforcement or rival criminal groups trying to steal drug-related information.

 

"They are more like underground cybercriminals than a typical nation state," said a Kaspersky Lab researcher. "This is what makes them stand out. They were collecting everything like emails, names, nicknames and handles."

Hacker accused of targeting Zendesk arrested and faces charges

Massachusetts resident Cameron Lacroix, 25, has been charged with attacking tech support company Zendesk, allegedly accessing the company's website in February 2013. Once he gained access, Lacroix reportedly disabled security features so he could view company customer information, U.S. Attorney Melinda Haag said.

 

hacker_accused_of_targeting_zendesk_arrested_and_faces_charges_01

 

Lacroix defaced Twitter feeds for two unidentified companies, after being able to export one million Twitter tech support tickets from Zendesk. If convicted, he faces up to 10 years along with a fine up to $250,000, plus restitution - with Zendesk and Twitter both suffering losses totaling more than $200,000. He also faces a separate federal charge for an unrelated crime.

 

The federal government has stepped up arrests against suspected hackers, but struggle to prevent the cyberattacks before they happen. However, prosecutors hope to send a message to hackers that they will be targeted and face prison time if convicted of cyber-related crimes.

Akamai: DDoS traffic down, while China still launches most attacks

Following a study of cyberattacks in Q1 2014, it looks like distributed denial-of-service (DDoS) attacks actually dropped, while China remains the country with the largest amount of source attack traffic, the Akamai "State of The Internet Report" indicates. It's a welcome trend considering half of companies last year suffered at least one DDoS attack, with many companies unable to effectively defend against the attacks.

 

akamai_ddos_traffic_down_while_china_still_launches_most_attacks_01

 

"This decrease accounted for the majority of the difference in attacks compared to previous quarters and might have had a more significant impact on the overall number of attacks if not for an increase in the number of attacks against public sector targets," said Martin McKeay, Akamai senior security advocate, in an interview with SC Magazine.

 

DDoS attacks remain an affordable, effective tool for cyberattackers trying to disrupt operations of companies and government networks. Almost 60 percent of companies note that DDoS attacks are near the top of the list among security threats, so defense strategy will continue to focus on how to defend against them.

UK government blocks 1 out of every 5 websites in censorship uproar

At least one in five websites are blocked in the United Kingdom, with a growing number of legitimate websites getting caught up in the censorship, according to the Open Rights Group.

 

uk_government_blocks_1_out_of_every_5_websites_in_censorship_uproar_01

 

The Open Rights Grouped tried to access 100,000 websites with default filter settings - or "normal" filtering with nothing set as a default - and there were almost 20,000 different websites blocked. It's a frustrating system that leaves some websites, such as Sherights.com, a blog focusing on violence against women and LGBT rights, blocked and inaccessible.

 

"We've been surprised to find the default filtering settings are blocking around a fifth of the Alexa top 100K websites," said Jim Killock, ORG Executive Director, in a statement. "That's a lot more than porn, which accounts for around 4 percent of that list."

Continue reading 'UK government blocks 1 out of every 5 websites in censorship uproar' (full post)

International ISPs targeting GCHQ because of spying activities

Following former NSA contractor Edward Snowden discussing surveillance activities by the NSA and its British counterpart, the GCHQ, a number of ISPs in the United States, United Kingdom, South Korea, Netherlands, Germany and Zimbabwe are targeting the GCHQ. Specifically, they say the spy agency used "malicious software" to compromise their networks while collecting data.

 

international_isps_targeting_gchq_because_of_spying_01

 

The GCHQ said online searches, which it considers "external communications" when routed overseas, don't require a warrant.

 

"Snowden's revelations have exposed GCHQ's view that independent operators like GreenNet are legitimate targets for Internet surveillance, so we could be unknowingly used to collect data on our users. We say this is unlawful and utterly unacceptable in a democracy," said Cedric Knight, from Dutch-based ISP, GreenNet.

Continue reading 'International ISPs targeting GCHQ because of spying activities' (full post)

Snowden shakes things up, physical data location becoming irrelevant

Former NSA contractor Edward Snowden has greatly changed data security after disclosing major surveillance programs targeting U.S. citizens and foreign citizens. This has caused such a shakeup that physical location of data will become irrelevant moving forward, with organizations using a combination of different strategies to stay more secure, according to research firm Gartner.

 

snowden_shakes_things_up_physical_data_location_becoming_irrelevant_01

 

Gartner lists the following types of data location: physical location, legal location, political location, and logical location. Companies trying to keep data secure will have to find ways to keep data offshore while ensuring encryption keys and other tools are located elsewhere, for example - critically important with cloud computing becoming more important.

 

"Business leaders must make the decision and accept the residual risk, balancing different types of risk: ongoing legal uncertainty, fines or public outrage, employee dissatisfaction or losing market share due to a lack of innovation, or overspending on redundant or outdated it," according to Gartner.

Continue reading 'Snowden shakes things up, physical data location becoming irrelevant' (full post)

Houston Astros MLB team hacked, trade information, other content taken

The Houston Astros baseball team playing in the Major League Baseball (MLB) league recently suffered a data breach, with information posted online. Some of the information includes private conversations related to possible trades with other teams, including the New York Mets and Miami Marlins.

 

houston_astros_mlb_team_hacked_trade_information_other_content_taken_01

 

After the team discovered it was compromised, officials alerted the MLB and a FBI-led investigation is currently underway.

 

"While it does appear that some of the content released was based on trade conversations, a portion of the material was embellished or completely fabricated," according to a statement released by the team.

Continue reading 'Houston Astros MLB team hacked, trade information, other content taken' (full post)

Norway ends e-voting experiment due to security concerns

Norway has conducted e-voting tests during local and national elections in 2011 and 2013, with the government pulling the blog, citing voter fears. During a test run in 2013, 70,000 Norwegians tested e-voting - but there was concern because prior to the election, when the encryption software was compromised.

 

norway_ends_e_voting_experiment_due_to_security_concerns_01

 

There was a political controversy and the e-voting process didn't generate additional interest to draw voters to the polls, according to the government. A small number of voters, just 0.75 percent of all voters, managed to double vote due to a glitch in the system.

 

"In order to push both the trustworthiness and transparency of the procedure, the source code for this year's e-voting system was put into the public domain, and anyone can now download and study the source code used from the e-voting project webpage," said Stig Oyvann.

Continue reading 'Norway ends e-voting experiment due to security concerns' (full post)

Latest News Posts

View More News Posts

Forum Activity

View More Forum Posts

Press Releases

View More Press Releases
Subscribe to our Newsletter
Or Scroll Down