Skip to main content

Posts

Featured Post

​Data of HSBC Bank USA customers compromised after hackers gain unauthorized access to online accounts

The attack occurred between  Gregorian calendar month   four  and  Gregorian calendar month   fourteen , 2018. The compromised  knowledge  includes full names, email addresses, phone numbers, physical addresses and  a lot of   of shoppers . HSBC Bank USA,  associate   yank  subsidiary of  UK   based mostly  HSBC, has suffered {a  knowledge |a knowledge|an information} breach that resulted  within the  compromise  of non-public  data of  many customers.  though   the amount   isn't   however   famed , the bank has confirmed that the attack occurred between  Gregorian calendar month   four  and  Gregorian calendar month   fourteen , 2018. What happened? According to  the information  breach notification, the firm found that  variety  of  on-line  accounts were accessed by unauthorized person(s)  t...
Recent posts

Lawsuit: Data security firm Trustwave owes $30M for 2009 data breach at Heartland Payment Systems

I've been gotten some information about digital protection commonly. My own musings are you should first put resources into layered security and play out an entrance test to demonstrate that you have done your due steadiness to ensure your system to abstain from being sued for not appropriately anchoring your system. Some of the time in any case, the seller is to blame significance they were the shortcoming that caused the break. Insurance agencies will look for any strategy to abstain from paying including evaluating you and the sellers you ensure your system. This is where the merchant fizzled and the insurance agencies followed them! The first post can be found HERE.  Two insurance agencies have combined to ask a Cook County judge to arrange an information security firm to pay $30 million to repay the guarantors for reserves they needed to pay out to settle claims coming about because of an information rupture at Heartland Payment Systems.  Two insurance agencies ha...

Security Glitch in IoT Camera Enabled Remote Monitoring

After researchers found a security glitch that let them hack into an IoT camera, the manufacturer of the camera has fixed the issue. Swann has patched a flaw in its connected cameras that would allow a remote attacker to access their video feeds. A research team, consisting of Andrew Tierney, Chris Wade and Ken Munro from Pen Test Partners, as well as security researchers Alan Woodward, Scott Helme and Vangelis Stykas, developed a proof-of-concept attack taking advantage of security issues in the device’s cloud service, Safe by Swann. They ultimately were able to access Swann-connected cameras via their mobile devices — so that they could see and hear footage on the other end. “As a consumer, I would be pretty bothered by the potential for someone else accessing my home video feed. Swann acted promptly and resolved the issue as soon as they became aware of it,” wrote Pen Test Partners in a posting on Thursday. After noticing a BBC article outlining how...

Google Bans Cryptocurrency Mining Android Apps From the Play Store

Following Apple's lead in banning  cryptocurrency mining apps , Google has also updated its Play Store policy this week to ban apps that mine cryptocurrencies on users' devices in the background. However, there are countless cryptocurrency mining apps, including MinerGate, AA Miner, NeoNeonMiner, and Crypto Miner, still available on the Play Store. Cryptocurrency mining is not a new concept, but the technology has recently been  abused in the past year  after hackers found it a great way to  make millions of dollars   by hijacking PCs to secretly mine cryptocurrency in the background without their users' knowledge or consent. Due to this practice, cryptocurrency mining has emerged as  one of the biggest threats , raising negative sentiments towards this alternative revenue scheme, and big tech giants like Apple and Google took strict measures to put restrictions on such apps. Over a month ago, Apple updated its App Store guidelines to ban cry...

CoinVault Ransomware Authors Sentenced to 240 Hours of Community Service

Almost three years after the arrest of two young Dutch brothers, who pleaded guilty to their involvement in creating and distributing  CoinVault ransomware malware , a district court in Rotterdam  today  sentenced them to 240 hours of community service. In 2015, the two suspects — Melvin (25-year-old) and Dennis van den B. (21-year-old) — were arrested from Amersfoort on suspicion of involvement in CoinVault ransomware attacks. The duo was arrested by law enforcement with the help of researchers from  Kaspersky Labs , who reverse-engineered the malware and found the full name of one of the suspects and their IP address left accidentally on the command and control server. CoinVault ransomware campaign that began in May 2014 was one of the most successful file-encrypting ransomware program of its time that encrypted over 14,000 Windows computers worldwide, primarily the Netherlands, the US, the UK, Germany, and France. Just like other ransomware attacks...

Blocking Cryptocurrency Mining Using Cisco Security Products

Cisco’s analysis team Talos, simply free a written report covering the priority of cryptocurrency mining. There has been a serious shift from threat actors infecting targets with Ransomware to turning target networks into Crypto mining centers for his or her own profit. many folks have asked Maine regarding a way to defend against this therefore here could be a new written report on this idea. the initial post will be found HERE. Cisco Talos is cathartic a whitepaper addressing Cryptocurrency mining and every one the ways in which to dam it mistreatment Cisco Security product. the worth of cryptocurrencies has fluctuated wildly, however the worth remains high enough to garner loads of attention, each legitimate and malicious. Most of the malicious activity we tend to see is finished for gain, and cryptocurrencies have provided attackers with a profitable new avenue to pursue: cryptocurrency mining. Over the past year, we've got seen a seismal shift within the threat la...

New Bluetooth Hack Affects Millions of Devices from Major Vendors

Yet another bluetooth hacking technique has been uncovered. A highly critical cryptographic vulnerability has been found affecting some Bluetooth implementations that could allow an unauthenticated, remote attacker in physical proximity of targeted devices to intercept, monitor or manipulate the traffic they exchange. The Bluetooth hacking vulnerability, tracked as CVE-2018-5383, affects firmware or operating system software drivers from some major vendors including Apple, Broadcom, Intel, and Qualcomm, while the implication of the bug on Google, Android and Linux are still unknown. The security vulnerability is related to two Bluetooth features—Bluetooth low energy (LE) implementations of Secure Connections Pairing in operating system software, and BR/EDR implementations of Secure Simple Pairing in device firmware. How the Bluetooth Hack Works? Researchers from the Israel Institute of Technology discovered that the Bluetooth specification recommends, but does not mandate de...