• Phone scam: How Kenyans are losing money
    Image copyright AFP Image caption Kenya has the highest number of mobile money users in the world Mobile phones in Kenya are like bank accounts - some people keep all their savings on their phone - and fraudsters are trying to hack into them to steal the money. Despite not giving out his details - and reporting the fraud to Safaricom - he completely lost access to his number and only getting back control after three days. Mr Wanaina says Safaricom contacted him after his complaint and issued him with a new Sim card as a precaution - without giving further details about how he lost access to his number. Kenya has the highest number of users of mobile money in the world, a major reason why the recent Sim card fraud has caused such public alarm. Through partnerships, phone companies have also managed to integrate mobile money services with banks, allowing customers to seamlessly move money back and forth.Read More
  • Big Tech Set for Headaches With Exits of U.S. Cybersecurity Experts
    The View From Silicon Valley The departures of a handful of cybersecurity officials from the Federal Bureau of Investigation less than four months before midterm elections has further complicated what is already a growing headache for some of tech's biggest players.At least five officials have exited over clashes with the Trump Administration amid mounting concerns of cyber intrusions from Russia and other countries leading up to the Nov. 6 elections. Eight tech companies–Facebook (FB), Microsoft (MSFT), Apple (AAPL), Amazon.com (AMZN), Alphabet's Google (GOOGL), Twitter (TWTR), Snap (SNAP), and Verizon Communications (VZ) unit Oath–met with officials from the Department of Homeland Security and FBI at Facebook on May 23 to discuss the matter. At the same time, Facebook and Twitter took steps in late June to bring more transparency to ads leading into elections in the U.S. and elsewhere this year after Russian trolls were able to buy ads targeting U.S. voters in the months leading up to the 2016 presidential election.Read More
  • NATO’s Real Spending Emergency Is in Cyberspace
    As we saw again at last week’s NATO summit, virtually all of President Donald Trump’s focus on NATO has been over its members not living up to spending pledges. NATO’s 10-year-old Cyber Defense Center of Excellence in Tallinn, Estonia, does good work, but it is focused completely on policy and governance, not operational issues. Finally, all NATO members should join forces to develop defensive countermeasures and to research cyber-threats and vulnerabilities. There is a model for this: the NATO Special Operations Command in Mons, Belgium — right next to my former headquarters when I was the alliance’s supreme allied commander. As the NATO commander, I was unable to bridge this divide because each country wants to protect its “crown jewels” in both offensive and defensive cyber, even though they are willing to share on air defense, special operations, strategic airlift, unmanned vehicles and many other areas. In this respect, NATO should bring together the research and development of all members to not only establish a common operational infrastructure, but also to examine vulnerabilities and hunt for threats to the benefit of organizations and users throughout alliance countries.Read More
  • D-Link, Dasan Routers Under Attack In Yet Another Assault
    Dasan and D-Link routers running GPON firmware are being targeted by hackers in an attempt to create a botnet. Unpatched D-Link and Dasan GPON router vulnerabilities are being targeted by hackers attempting to build a botnet army, according to research published Friday by eSentire Threat Intelligence. Researcher observed on Thursday a massive uptick in exploit attempts from over 3,000 different source IPs targeting model D-Link 2750B and Dasan GPON routers running a version of the GPON firmware. He said an unspecified single actor was targeting a known command-injection bug (CVE-2018-10562) used in routers running the GPON firmware version ZIND-GPON-25xx. In May, researchers at Qihoo 360’s Netlab reported 1 million Dasan GPON routers were being targeted by attackers hoping to exploit CVE-2018-10562 and CVE-2018-10561. “The end of May 2018 has marked the emergence of three malware campaigns built on publicly available source code for the Mirai and Gafgyt  malware families that incorporate multiple known exploits affecting Internet of Things (IoT) devices,” wrote Ruchna Nigam, senior threat researcher with Unit 42.Read More
  • Microsoft Addresses Serious Vulnerability in Translator Hub
    A serious vulnerability in the Microsoft Translator Hub could be exploited to delete any or all of the 13000+ projects hosted by the service, a security researcher has discovered. The service allows interested parties to build their own machine translation system tailored for their organizational needs and then use it, via the Microsoft Translator Text API, in applications, websites, with Microsoft Document Translator, and more. According to Microsoft, the Translator Hub allows enterprises build translation systems, and allows governments, universities and language preservation communities to “build translation systems between any pair of languages, including languages not yet supported by Microsoft Translator, and reduce communication barriers.” While hunting for vulnerabilities on the Hub, security researcher Haider Mahmood discovered that the HTTP request for removing a project contained the “projectid” parameter, which is the ID of the individual project in the database.Read More
  • Adobe Patches Vulnerability Affecting Internal Systems
    Adobe has patched what researchers describe as a potentially serious security issue in its internal systems, but the company has downplayed the impact of the vulnerability. White hat hackers at Germany-based security research firm Vulnerability Lab claim to have discovered that code submitted through some of Adobe’s event marketing registration forms ultimately made its way to one of the company’s main databases, from where it propagated to emails and web services. The company claims it took until May for Adobe to identify the cause of the problem, with a patch being implemented in mid-June. Then it was synced into the main lead database of Adobe and we had several domains where we were able to place our codes with executable content,” explained Benjamin Kunz Mejri, CEO and founder of Vulnerability Lab. The exploit code was delivered via emails sent out by Adobe and on some of the company’s domains, Kunz Mejri said. Related: Over 100 Vulnerabilities Patched in Adobe Acrobat, ReaderRead More
  • Japan’s New Cybersecurity Strategy: Plugging The IoT Gap
    Japan should craft a new Cybersecurity Strategy to encourage risk-averse business leadership to tackle shadow IT and bring visibility and control on two key fronts: first, endpoint security to protect computers, servers, and wireless devices and second, cloud security to protect data, applications, and infrastructure of cloud computing.By Mihoko Matsubara*The Japanese government released a draft of the next Cybersecurity Strategy in June 2018 to share its vision for strengthening Japan’s cybersecurity capabilities for the coming few years. Japanese government and industry were both shocked that the WannaCry disrupted business operations in Japan, even for major Japanese manufacturers, not just foreign companies.Endpoint and Cloud SecurityIf the final Cybersecurity Strategy is to include a specific type of cybersecurity like endpoint security, it should also refer to cloud security to ensure comprehensive protection of IT resources, not just for the government but also for industry.Read More
  • Hackers automate the laundering of money via Clash of Clans
    According to a new report, popular smartphone games such as “Clash of Clans” are being used to launder hundreds of thousands of dollars on behalf of credit card thieves. And this particular gang was hoping to launder money stolen from these credit card accounts through mobile games. The security researchers realized that they were dealing with a carder gang who had created a sophisticated automated mechanism for creating fake Apple ID accounts with stolen card information and buying virtual “gold”, “gems”, and other in-game power-ups within games. In short, the gang was receiving money in exchange for the game currency or power-ups, without any making any obvious link to the stolen credit card data. Not only could your account be permanently banned, but you could be handing control of your Apple ID and Google Play account over to criminals: Such services request private login data (such as Apple ID, Google Play credentials, etc) in order to access your game account.Read More
  • Officials: Iran has made preparations for possible cyberattack on U.S.
    After the U.S. pulled out of the nuclear deal, known as the Joint Comprehensive Plan of Action (JCPOA), Homeland Security Secretary Kirstjen Nielsen testified before Congress that the U.S. was "anticipating it's a possibility" that Iran would increase cyberattacks in the coming weeks and months and that the U.S. "will be prepared." Nielsen said the U.S. has a posture called "shields up" it can institute when anticipating a possible attack.Should the JCPOA collapse entirely, said Behnam Ben Taleblu, an Iran expert and a fellow at the Foundation for Defense of Democracies, a conservative think tank in Washington, the infrastructure of Western countries might be an attractive target to the Iranians."Iran has a penchant for using such tools against the West," said Ben Taleblu.Read More
  • UK Gov Launches Consultation to Speed-Up Cybersecurity Strategy
    The Department for Digital, Culture, Media and Sport (DCMS) has launched a consultation into developing the cybersecurity profession in the UK to support the National Cyber Security Strategy (NCSS). This consultation, which closes on August 31, is for a broad range of interested parties including cybersecurity professionals, existing cybersecurity professional organizations in the UK, students and recent graduates, academia and law enforcement communities. Misconceptions and stereotypes about cybersecurity professionals remain and we heard clearly that many still consider cybersecurity to be a complex subject area and a career which lacks clear routes into and through it." By the end of 2019, there will be an early development and alignment of a coherent set of career specialism pathways into and through the cybersecurity profession and a draft Code of Ethics will be agreed between participating cybersecurity professional organizations. To support this, a number of established councils, chartered professional bodies, academics and industry groups have established a collaborative alliance to advance the development of the cybersecurity profession.Read More