• Windows security warning: Ransomware is growing fastest, and just got harder to tackle
    We are losing the ransomware fight: This is why An analysis of ransomware reporting over the past six months shows that while there's a big focus on big targets, going after individual users is still very popular. Tech security company Bitdefender analysed Windows security threats including ransomware, coin miners, fileless malware, PUAs ('potentially unwanted applications' that can compromise privacy or security), exploits (attacks based on unpatched or previously-unknown vulnerabilities) and banking Trojans. Bitdefender found that of all these threats, ransomware reports saw the biggest year-on-year increase -- 74.2%. According to the security company, the number of ransomware reports actually dropped during the first half of 2019, largely because the group behind the GandCrab ransomware throttled down their operation. But since then, ransomware reports climbed again as new ransomware has emerged to fill the void left by GandCrab (it's also possible they have now restarted operations).Read More
  • Google addressed an XSS flaw in Gmail
    Michał Bentkowski, Chief Security Researcher from security frim Securitum, found an XSS vulnerability in Gmail and responsibly disclosed it this week after Google has addressed it.  The flaw, described by Google IT staff as an awesome XSS issue, resides in the AMP4Email feature rolled out in July. The expert noticed that that the id attribute is not disallowed in tags, so decided to investigate whether or not AMP4Email could be subject to DOM Clobbering.  “DOM Clobbering is a legacy feature of web browsers that just keeps causing trouble in many applications. This behaviour (which is known as DOM Cloberring) can lead to interesting vulnerabilities if the application makes decisions based on existence of certain global variables (imagine: if (window.isAdmin) { … })..” The expert verified that the AMP4Email employs some protection against DOM Clobbering by forbidding certain values for the id attribute (i.e. AMP).Read More
  • New code for internet-connected devices to stop hackers
    Speaking at the 2019 Home Affairs Industry Summit in Melbourne, Mr Dutton will unveil the draft code of practice, which has been developed with input from the Australian Cyber Security Centre.The move would bring Australia into line with other countries such as Britain, which has also developed an industry code to help protect consumers from cyber crime.Mr Dutton earlier this year successfully pushed for security ministers of the "Five Eyes" intelligence alliance countries to sign a statement of intent to address security shortfalls in internet-connected devices.Cyber crime is a growing cost to the Australian economy, with the overall impact on businesses estimated to be in the billions of dollars every year.Mr Dutton said the rapid growth in internet-connected devices had brought significant benefits to Australians but the industry needed to keep up with the threats."Many of these devices have poor cyber security features, posing risks to Australia families, our economy and national security," Mr Dutton said.Loading"The safety of Australians and the security of our economy is paramount.Read More
  • Travellers warned to be aware of 'juice jacking' device charging scam
    To ensure travellers don’t fall victim to the scam, the DA’s office has shared some tips, including bringing your own charging cord and adapter base.  “Use an AC power outlet, not a USB charging station,” Sisak says, adding that people should also bring their own car chargers when they travel. On Android and iOS, you can see the apps and processes that are affecting your battery by going to Settings and Battery. For emergency situations, the DA’s office recommends considering buying a portable charger, so you are not reliant on USB charging ports.  According to Liviu Arsene, a cyber security expert at BitDefender, people should also avoid using USB cables already plugged into charging stations or given away for free.  “You can easily brand these things so you can make it look like any other cable,” he told The New York Times. There are plenty of portable battery chargers on the market that can charge themselves using solar power, but many of them are more trouble than they’re worth.Read More
  • It's time for us all to forget our passwords - forever
    Passwords were once one of our most trusted security measures, but over the past decade, the average person’s digital footprint has been exposed to increasing numbers of third parties. As digital platforms pile up gigabytes of data, including personal information and the credentials we use to get access to their digital services, the cost of attacks for hackers has decreased significantly. Without even looking at the costs of a cyberattack, the mere costs of password management, of time lost by employees typing passwords and chasing the IT department when they fail, can climb up to $70 per incident. This will allow the work of bodies such as the World Wide Web Consortium, which develops global standards for the web, and the Fido Alliance - an industry association dedicated to replacing passwords as our means of digital authentication - to rely on our devices and real-time attributes, so that users can verify themselves remotely and more securely.Read More
  • Auth0 Reveals 50,000 Unique IP Addresses Make Credential Stuffing Attempts on Daily Basis
    Breached credentials, in combination with 65% of people reusing passwords across accounts (Google), enables hackers to architect botnets – networks of exploited devices – to direct large-scale attacks in a coordinated manner. Whereas targeted attacks have a specific and designated entry in mind, large-scale attacks like credential stuffing are automated and intended to attack as many entry points as possible. Between July and September 2019 alone, Auth0 determined that during a credential stuffing attack, traffic for a particular website may surge as much as 180x the usual volume, with traffic related to the attack itself accounting for 70% of overall activity. This is instrumental in blocking credential stuffing attacks, since hackers rely on people reusing email and password combinations that have already been breached. In addition, Multifactor Authentication (MFA) is one of the best ways to prevent account takeovers, whether from a credential stuffing attack or something else. “Breached Password Detection and MFA functionality are the critical barriers for preventing credential stuffing attacks.Read More
  • Plixer Acquires Great Bay Software
    KENNEBUNK, Maine, Nov. 14, 2019 (GLOBE NEWSWIRE) -- Plixer, the company that solves real-world security and network operations challenges, today announced that it has acquired Great Bay Software, a leading provider of endpoint visibility solutions that identify managed, unmanaged, and unauthorized devices across complex networks. The platform enables security and network operations teams to discover and profile all devices on the network in real time, determine current and historical physical network location, identify the risk of each device, monitor behavior changes, and actively respond to anomalies. The combination of the Plixer and Great Bay Software product portfolios will deliver tremendous value to network operations and security teams enabling them to gain: Automated, prioritized incident response for network and security events “With this acquisition, we are unifying endpoint and network visibility across a combined solution enabling network and security teams to gain improved efficiency, reduced operational complexity and expense, and automated response to security incidents, dramatically lowering risk,” explains Plixer President and CEO Jeff Lindholm.Read More
  • Huawei Beats Google — Offers $220,000 For ‘Zero-Click’ Android Phone Hacks
    Huawei promises hackers $220,000 for demonstrations of successful, silent remote control of its ... [+] devices. In a bug bounty launch last week, Huawei said it would pay up to $220,000 (€200,000) for demonstrating a "critical" weakness in one of its Android devices, including the Mate, P, Nova, Y9 and Honor models. Huawei revealed the program at a private event for some of the world’s top Android hackers at a Munich, Germany, event last week. In giving an example of how they could get the top prize, Huawei told the hackers they would have to obtain remote access to the device without the target having to click anything. Huawei is, in one way, following Apple's lead in keeping the bug bounty as invite-only. Whilst the bug bounties are common amongst major smartphone makers - Apple and Google are behind two of the biggest - Huawei could have another reason to open up its devices.Read More
  • Phishers Targeting Microsoft Office 365 Admin Credentials
    Digital fraudsters are stealing Microsoft Office 365 administrator credentials as part of a broader phishing campaign targeting organizations. The campaign began with a phishing email that leveraged Microsoft and its Office 365 brand to lull recipients into a false sense of security. PhishLabs says this tactic gives attackers an advantage: This is beneficial for attackers because many email filtering solutions leverage the reputation of a sender domain as a major component of determining whether to block an email. By compromising an admin account, they can potentially gain control of the other email accounts that are associated with a given domain. They can also leverage an admin account’s elevated privileges to create other accounts for the purpose of sending out additional attack waves. Towards that end, they should educate all employees–including their administrators–about some of the most common phishing attacks that would seek to compromise their business account credentials.Read More
  • Staying Safe from Cyber Threats in Wired Networks
    The cyber threats associated with wireless networks are discussed extensively, but the wired networks are not totally secure either. To prevent a cyber attack through wired networks, it is essential to take the necessary precautions.Read More