TweakTown
Tech content trusted by users in North America and around the world
6,251 Reviews & Articles | 40,801 News Posts
TRENDING NOW: Sony teases PlayStation 5 could be a cloud-based console

TweakTown News

Refine News by Category:

Hacking & Security Posts - Page 75

Ethiopian government spying on phones and PCs of political rivals

The Ethiopian national government is using foreign technology to compromise PCs and phones of political opponents, according to a recent study released by the Human Rights Watch (HWR). Not surprisingly, government officials disregarded the security report, saying it's just a smear campaign, with growing concern of government oppression.

 

TweakTown image news/3/6/36567_01_ethiopian_government_spying_on_phones_and_pcs_of_political_rivals.jpg

 

The hardware used to carry out cyber surveillance originally stemmed from China, Italy, Germany, and the United Kingdom, the report states. To make matters worse, all phone and Internet access within the country's borders are provided through a single company, which is state-owned.

 

"Repressive measures aimed at restricting freedom of expression and association, as well as access to information, have increased since the controversial 2005 elections," the report states. "These measures include the harassment, arbitrary detention, and prosecution of opposition leaders, journalists, and activists."

 

The report also makes independent recommendations to the Ethiopian government, international companies operating in the African country, foreign national governments, and the World Bank.

Avast launches GrimeFighter PC cleanup tool

Security company Avast Software today launched its GrimeFighter PC cleanup tool, designed to help boost PC performance.

 

TweakTown image news/3/6/36572_01_avast_launches_avast_grimefighter_pc_cleanup_tool.jpg

 

GrimeFighter boots into Linux to better detect and remove problems that aren't as easily noticeable with Microsoft Windows running. The software is a standalone product available now, with the Avast website offering a free scan.

 

"Most PC-cleanup utilities don't really improve performance - some actually slow down PCs," said Vince Steckler, Avast CEO, in a press statement. "Since they run in Windows, they are unlikely to find problems with files and registry entries that are locked, protected, or otherwise hidden. Ironically those are the ones most often robbing users of performance and stability. With avast! GrimeFighter, we didn't want to introduce another me-too product - we wanted to eliminate the problem of slow PCs."

 

There are a handful of legitimate and free PC optimization tools - but AVAST is a well-known, reputable company - and GrimeFighter's ability to build a cloud-based threat intelligence database further improves dependability.

South Korea, Japan want to talk cyberattacks, but not right now

In a growing effort to defend against cyberattacks, global alliances between nations with same political influences are carving out curious battle lines.

 

TweakTown image news/3/6/36566_01_south_korea_japan_want_to_talk_cyberattacks_but_not_right_now.jpg

 

"It is true that allies need to share military intelligence to counter threats posed by North Korea in light of its nuclear test and missile launches,"said Kim Min-seok, South Korea defense ministry spokesperson, during a preference conference. "Although working-level officials had considered the memorandum of understanding as one idea, the move is currently not under way as the situation is not yet ripe for that."

 

North Korea also has a blossoming cyberattack program, focusing mostly on targeting South Korea and Japan.

 

Both South Korea and Japan face growing political tensions from China and North Korea - and while most of the attention is rightfully on physical military force - all four countries must defend against cyberattacks from foreign sources.

Continue reading 'South Korea, Japan want to talk cyberattacks, but not right now' (full post)

Android corruption bug frightening security researchers

The recent Google Android bug discovered by security researcher Ibrahim Balic reveals a common technique could compromise the popular OS due to memory corruption - resulting in the device crashing.

 

TweakTown image news/3/6/36563_01_android_corruption_bug_frightening_security_researchers.jpg

 

In extreme cases, it appears memory code corruption vulnerability could be boosted and lead to arbitrary code execution, with users at risk of operating a rooted device.

 

"Although it's true that this vulnerability is capable of crashing Android mobile devices, it's important to point out that at this time there are no known instances or infections of this particular vulnerability 'in the wild,'" said Ryan Smith, Mojave Networks Lead Threat Engineer, in a statement. "Mobile malware distributors are typically motivated by money and information, and are therefore unlikely to use their established distribution channels to disseminate malware an app that simply crashes the device and doesn't gain them anything."

 

Even so, it's frightening the large amount of malware targeted towards Android devices - and security experts recommend using anti-malware and anti-virus software at the very least.

First US counterfeit apps case leads to guilty pleas

The leader of the Appbucket group, which was responsible for trafficking pirated Google Android apps, has pleaded guilty to one count of conspiring to commit criminal copyright infringement.

TweakTown image news/3/6/36535_01_first_us_counterfeit_apps_case_leads_to_guilty_pleas.jpg

 

Nicholas Anthony Narbone from Florida pleaded guilty, while co-conspirator Thomas Allen Dye from Florida pleaded guilty earlier this month. Both Narbone and Dye will be sentenced in July, while two others have court dates scheduled for April.

 

"These men trampled on the intellectual property rights of others when they and other members of the Appbucket Group distributed more than one million copies of pirated apps," said David O'Neil, Justice Department attorney general, in a statement. "These mark the first convictions secured by the Justice Department against those who illegally distribute counterfeit mobile apps."

 

The group shared more than 1 million copies of pirated apps worth more than $700,000 before being shut down.

 

The steady popularity of smartphones and tablets has led to a rush to steal apps - and either distribute them freely - or offer them for sale.

NIST report says employees suffer from 'password fatigue'

Companies need to be aware of so-called "password fatigue" and create easier-to-use password-protected system access, as employees are in a rush to get work done, according to a study released by the National Institute of Standards and Technology (NIST).

 

TweakTown image news/3/6/36534_01_nist_report_says_employees_suffer_from_password_fatigue.jpg

 

Employees are more inclined to remember a single password, even if it's longer and more complex, as opposed to needing multiple passwords for each account. This behavior could lead to potential security issues, so password managers or some other type of authentication could be utilized instead.

 

"'Password fatigue' is, in fact, a very common problem," the study states. Expecting users to simply adapt to an excessive authentication workload is not realistic. But from the user's perspective, what is excessive? In any case, if our participants' coping and avoidance strategies are any indication, the ways in which users adapt may not be desirable from an organizational perspective. Rather than trying to force users to adapt to authentication, organizations, security experts, developers, and engineers must find ways to make authentication adapt to users - in other words, to make it more usable."

Pure Hacking: Windows XP users, networks at risk as deadline looms

Microsoft Windows XP remains an extremely popular and well-liked operating system, but the security benefits alone of Windows 7 and 8/8.1 haven't been enough to get users to migrate. However, Microsoft and security experts are strongly urging both users and companies to upgrade, or potentially face harmful cyberattacks.

 

TweakTown image news/3/6/36529_01_pure_hacking_windows_xp_users_networks_at_risk_as_deadline_looms.jpg

 

Pure Hacking has a few tips regarding XP: Disable what users don't need on the OS, replace XP with Windows 7, segregate legacy installations, and implement application whitelisting control.

 

"Across Australia there are tens of thousands of machines still running Windows XP - just think POS terminals, let alone all those SMBs," said Gordon Maddern, Pure Hacking CTO, in a statement. "Anyone still on XP will be wide open to attack. All new vulnerabilities - and countless numbers of these are likely - will no longer be fixed by Microsoft. I cannot stress enough, it's time to migrate, migrate, migrate."

 

In reality, SMBs and corporations should have created a migration plan long ago - and should be well underway with the migration plan - but it's become evident that many companies will instead try to scramble to stay in compliance.

Continue reading 'Pure Hacking: Windows XP users, networks at risk as deadline looms' (full post)

Cybercriminals compromise ATMs to spit out cash by sending SMS message

As the Microsoft end of support for the aging Windows XP operating system quickly approaches, security researchers believe the banking industry faces a serious risk of compromised ATMs, according to Symantec.

 

TweakTown image news/3/6/36528_01_cybercriminals_compromise_atms_to_spit_out_cash_by_sending_sms_message.jpg

 

The Backdoor.Ploutus.B malware variant, an upgraded version of sophisticated malware that proved effective in 2013, allows cybercriminals to force ATMs to dispense cash.

 

The criminals simply send an SMS to a compromised ATM, walk up, and collect the stolen cash - using a network packet monitor (NPM) and other tools to properly infect the ATM.

 

"As soon as the compromised ATM receives a valid TCP or UDP packet from the phone, the NPM will parse the packet and search for the number '5449610000583686' at a specific offset within the packet in order to process the whole package of data," said Daniel Regalado, Symantec security researcher, in a blog post. "Once that specific number is detected, the NPM will read the next 16 digits and use them to construct a command line to run Ploutus."

University of California at San Francisco hit with data breach

The University of California at San Francisco (UCSF) recently suffered a data breach and almost 10,000 people have been compromised, according to school officials. Several desktop PCs with unencrypted information were stolen from the university's Family Medical Center in January, including personal and health information.

 

TweakTown image news/3/6/36501_01_university_of_california_at_san_francisco_hit_with_data_breach.jpg

 

Social Security numbers were exposed for 125 people, with a mix of patient names, birth dates, mailing addresses, medical record numbers, health insurance ID numbers, and driver's license numbers exposed in the breach.

 

The data theft is now being investigated by the California Department of Public Health, federal authorities, and the California Attorney General, with notification letters and free credit monitoring being offered to some of those exposed.

 

Security experts strongly urge companies, universities and research groups to encrypt data on PCs, especially if it includes personal or medical information.

China wants US government to explain itself over Huawei spying

The Chinese government is angry and now demands the US government to explain its reported spying actions against Huawei, a major Chinese electronics and telecom company. The report, led by insight taken from former NSA contractor Edward Snowden, accuses the NSA of spying on the company - and stealing information about Huawei customers.

 

TweakTown image news/3/6/36523_01_china_wants_us_government_to_explain_itself_over_huawei_spying.jpg

 

The NSA was specifically trying to find ties between Huawei and the People's Liberation Army, though stumbled across intellectual property of Huawei network switches and routers, reporters state.

 

"China has already lodged many complaints with the United States about reports of its espionage activities," said Hong Lei, Chinese foreign ministry spokesperson, in a statement to the media.

 

It's ironic that countries such as Russia and China, which have been accused of launching cyberattacks - and violating human rights - are now demanding the US government to explain itself.

Continue reading 'China wants US government to explain itself over Huawei spying' (full post)

Latest News Posts

View More News Posts

Forum Activity

View More Forum Posts

Press Releases

View More Press Releases