How should businesses respond to the TechCrunch hack?

How should businesses respond to the TechCrunch hack?

The notorious OurMine hacking gang compromised the TechCrunch website. What lessons can other companies running WordPress learn from the security breach?

Read more in my article on the Bitdefender Business Insights blog.

Read more...

Tags: , ,

Subscribe to the free GCHQ newsletter


Donald Trump asks for help from Russian hackers. Cher isn't happy

Donald Trump asks for help from Russian hackers. Cher isn't happy

Could this be Cybor Warfare? (sic)

Donald Trump wonders out loud whether hackers might help him dig up some dirt on Hillary Clinton.

Read more...

Tags: , , ,

Subscribe to the free GCHQ newsletter


Sorry, your Motorola Android isn't going to get monthly security updates

Well, this sucks if you've spent good money on a Motorola smartphone.

The firm has confirmed to Ars Technica that it isn't going to commit to monthly security updates, even though Google will have released patches for the Android operating system.

Here's what they told Ron Amadeo at Ars Technica:

"Motorola understands that keeping phones up to date with Android security patches is important to our customers. We strive to push security patches as quickly as possible. However, because of the amount of testing and approvals that are necessary to deploy them, it's difficult to do this on a monthly basis for all our devices. It is often most efficient for us to bundle security updates in a scheduled Maintenance Release (MR) or OS upgrade."

I guess people who care about security will be buying an Android smartphone from a company that does care about keeping them up-to-date with security patches - like Google or Samsung.

Or maybe they'll just buy an iPhone. But certainly not a phone made by Motorola.

Tags: , ,

Subscribe to the free GCHQ newsletter


LastPass security holes found by researcher, says password management firm – but no need to panic

LastPass security holes could have seen hackers steal your passwords

Working separately, two vulnerability researchers have found worrying ways to steal passwords from the popular online password manager LastPass.

Fortunately, LastPass has responded quickly - fixing the bugs before they can be maliciously exploited. Here is what you need to know.

Read more...

Tags: , , ,

Subscribe to the free GCHQ newsletter


SentinelOne says if you get hit by ransomware, it will pay the ransom

SentinelOne writes:

We’ve created the first ever Ransomware Cyber Guarantee – a warranty for our product’s performance. It’ll give you the best protection from ransomware attacks – and if we miss something and you get infected – we’ll pay the ransom. It’s that simple. And it’s how security is supposed to be. If you can block something – why not guarantee it? Would you buy a new shiny car without manufacturer warranty?

In other words, self-proclaimed "next generation endpoint security solution" SentinelOne says it's entirely comfortable paying money to criminals.

Of course it's a marketing stunt, but still one - I must admit - that leaves a strange taste in my mouth.

If I'm feeling mischievous, I might even wonder if some future ransomware might detect the presence of SentinelOne and increase its ransom demand accordingly...

Couldn't SentinelOne have just offered to throw in a decent backup program?

Tags: , ,

Subscribe to the free GCHQ newsletter


Yes, there has been a data breach at O2. But it's not really their fault

Yes, there has been a data breach at O2. But it's not really their fault

It's not just O2 customers who should be concerned, despite what some of the headlines may make you believe.

Read more...

Tags: , , , ,

Subscribe to the free GCHQ newsletter


Mac users who ignore the warning signs can be bitten by the Adwind RAT

Mac users who ignore the warning signs can be bitten by the Adwind RAT

The cross-platform remote access trojan (RAT) Adwind drops a payload onto Mac computers only after users overlook a series of potential red flags.

David Bisson reports.

Read more...

Tags: , ,

Subscribe to the free GCHQ newsletter


Three men charged for international cell phone fraud scheme

Three men charged for international cell phone fraud scheme

A federal judge has charged three men for their alleged participation in a sophisticated international cell phone fraud scheme.

David Bisson reports.

Read more...

Tags:

Subscribe to the free GCHQ newsletter


How to report a cybercrime

How to report a cybercrime

Gathering evidence and putting a case together against an online criminal is so much harder for the authorities, if they don't know about any victims.

Guest contributor Yasin Soliman explains how you can report a cybercrime to the police in your part of the world.

Read more...

Tags: ,

Subscribe to the free GCHQ newsletter


Clash of Kings forum hacked, 1.6 million account details put at risk

Clash of Kings forum hacked, 1.6 million account details put at risk

Vulnerable version of vBulletin thought to be responsible for data breach which could impact almost 1.6 million game players.

Read more in my article on the We Live Security blog.

Read more...

Tags: , ,

Subscribe to the free GCHQ newsletter


Happy ending for Pornhub after vulnerability researchers gain access to entire user database

The Register reports:

A trio of hackers have gained remote code execution powers on servers used by adult entertainment outlet Pornhub, using a complex hack that revealed twin zero day flaws in PHP.

Google sofware intern and security boffin Ruslan Habalov (@evonide) detailed the Return Orientated Programming hack in detailed debriefing explaining how he and fellow hackers @_cutz and Dario Weißer @haxonaut gained access to the entire Pornhub database including sensitive user information.

Regular readers will recall that earlier this year Pornhub announced its bug bounty program, asking vulnerability researchers to help harden its security.

The researcher threesome rose to the challenge, and earned themselves a tasty US $20,000 from Pornhub for their efforts. The Internet Bug Bounty threw an extra US $2,000 into the mix for the discovery of the PHP zero-day vulnerabilities.

In the wrong hands, vulnerabilities like these could have caused enormous damage to the x-rated website and its many clandestine users, as well as potentially other sites too.

So, a happy ending all round.

Tags: , ,

Subscribe to the free GCHQ newsletter


Tinder spam bots trick users into paying for adult content

Tinder spam bots trick users into paying for adult content

Spam bots are tricking Tinder users into become paying members of multiple adult-themed websites.

David Bisson reports.

Read more...

Tags: , , ,

Subscribe to the free GCHQ newsletter


Police 3D print murder victim's finger to unlock his phone

Fusion reports:

A man was murdered, and the police think there might be clues to who murdered him stored in his phone. But they can’t get access to the phone without his fingerprint or passcode. So instead of asking the company that made the phone to grant them access, they’re going another route: having the Jain lab create a 3D printed replica of the victim’s fingers. With them, they hope to unlock the phone.

The numerous media reports I've read about this case don't mention what type of smartphone the police are trying to break into, but my hunch is that it's an Android.

There are some big differences between how iOS and Android devices implement fingerprint authentication, and some of the design decisions Apple made make the scenario described above highly unlikely.

For instance, an iPhone or iPad will time out the fingerprint sensor every time the device is restarted or after 48 hours of inactivity, requiring you to enter your passcode instead.

However, on Android 4.4 - 5.1.1 the fingerprint unlock *never* expires. Even with Android 6.0 Marshmallow, which adds an official fingerprint authentication API for the first time, I don't believe there are any set requirements for when the fingerprint unlock should expire.

It seems to me that fingerprint security has been pretty sloppy generally on Android, with some smartphones even storing unencrypted images of users' fingerprints in a non-protected folder.

Tags: , ,

Subscribe to the free GCHQ newsletter


Get trending info on hackers, exploits, and vulnerabilities every day for FREE with the Recorded Future Cyber Daily [Sponsor] SPONSOR

Get FREE threat intelligence on hackers and exploits with the Recorded Future Cyber Daily

Many thanks to the great folks at Recorded Future, who have sponsored my writing for the last week.

Recorded Future provides deep, detailed insight into emerging threats by automatically collecting, analyzing, and organizing billions of data points from the Web.

And now, with its FREE Cyber Daily email all IT security professionals can access information about the top trending threat indicators - helping you use threat intelligence to help make better decisions quickly and easily.

Which means that you will be able to benefit from a daily update of the following:

  • Information Security Headlines: Top trending news stories.
  • Top Targeted Industries: Companies targeted by cyber attacks, grouped by their industries.
  • Top Hackers: Organizations and people recognized as hackers by Recorded Future.
  • Top Exploited Vulnerabilities: Identified vulnerabilities with language indicating malcode activity. These language indicators range from security research ("reverse engineering," "proof of concept") to malicious exploitation ("exploited in the wild," "weaponized").
  • Top Vulnerabilities: Identified vulnerabilities that generated significant amounts of event reporting, useful for general vulnerability management.

Infosec professionals agree that the Cyber Daily is an essential tool:

"I look forward to the Cyber Daily update email every morning to start my day. It's timely and exact, with a quick overview of emerging threats and vulnerabilities. For organizations looking to strengthen their security program with threat intelligence, Recorded Future’s Cyber Daily is the perfect first step that helps to prioritize security actions." - Tom Doyle, CIO at EBI Consulting.

So, what are you waiting for?

Sign up for the Cyber Daily today, and starting tomorrow you'll receive the top trending threat indicators.


If you’re interested in exclusively sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Read more...

Subscribe to the free GCHQ newsletter


Edward Snowden's new case design detects if your iPhone is broadcasting its location

Edward Snowden's new case design detects if your iPhone is broadcasting its location

NSA whistleblower Edward Snowden has teamed up with hardware hacker Andrew "Bunnie" Huang to design an iPhone accessory that could help protect journalists working in dangerous parts of the world.

Read more in my article on the Hot for Security blog.

Read more...

Tags: , ,

Subscribe to the free GCHQ newsletter


When the people selling you IT security solutions hack into their rival's database...

The Register reports:

Five men working at UK-based IT security reseller Quadsys confessed today to hacking into a rival's database.

Owner Paul Streeter, managing director Paul Cox, director Alistair Barnard, account manager Steve Davies and security consultant Jon Townsend appeared before the beak at Oxford Crown Court.

"All pleaded guilty to obtaining unauthorised access to computer materials to facilitate the commission of an offence," the court clerk told us.

This is punishable by a minimum of 12 months in prison or a fine on summary conviction, or up to five years or a fine on indictment.

We all know that there are bad guys hacking into firms.

We want to protect our firms from online criminals, so we bring in third-parties to help us do that, and purchase solutions and services.

It's depressing to discover that some of those third party firms may have some rotten apples on their payroll, who don't know the difference between right and wrong, and think nothing of exploiting their technical skills to break the law if it helps them gain a commercial advantage.

Let this be a warning to others. Just because you can do something doesn't mean that you should.

Hacking into a rival's database to steal customer and pricing information might give you a short term advantage, but you are putting your personal future, and that of your business, at permanent risk.

Tags:

Subscribe to the free GCHQ newsletter