Independent

IndependentKrebs

“Stole $24 Million But Still Can’t Keep a Friend”

Credit to Author: BrianKrebs| Date: Wed, 16 Jan 2019 00:52:34 +0000

Unsettling new claims have emerged about Nicholas Truglia, a 21-year-old Manhattan resident accused of hijacking cell phone accounts to steal tens of millions of dollars in cryptocurrencies from victims. The lurid details, made public in a civil lawsuit filed this week by one of his alleged victims, paints a chilling picture of a man addicted to thievery and all its trappings. The documents suggest that Truglia stole from his father and even a dead man — all the while lamenting that his fabulous new wealth brought him nothing but misery.

Read More
IndependentKrebs

Courts Hand Down Hard Jail Time for DDoS

Credit to Author: BrianKrebs| Date: Mon, 14 Jan 2019 19:37:32 +0000

Seldom do people responsible for launching crippling cyberattacks face justice, but increasingly courts around the world are making examples of the few who do get busted for such crimes. On Friday, a 34-year-old Connecticut man received a whopping 10-year prison sentence for carrying out distributed denial-of-service (DDoS) attacks against a number of hospitals in 2014. Also last week, a 30-year-old in the United Kingdom was sentenced to 32 months in jail for using an army of hacked devices to crash large portions of Liberia’s Internet access in 2016.

Read More
ComputerWorldIndependent

How to create and open compressed files on iPhone, iPad

Credit to Author: Jonny Evans| Date: Thu, 10 Jan 2019 07:27:00 -0800

Many enterprises rely on zip files to exchange data, particularly confidential data – compression helps keep information safe, even against inquisitive ads trackers lurking inside “free” email or online storage services. How do you handle these things on iPad or iPhone?

How to handle zip files on iPhone

While it isn’t especially obvious, iOS provides some limited features that let you archive and decompress zip files. You can even create a nice little Shortcut to do this for you:

  • Open Shortcuts, Tap Create Shortcut
  • In the search bar, type Extract Archive: That shortcut should appear in the list below, tap it to add it to your workflow.
  • Returning to the search bar, type Save File. When it appears tap it to add it to the workflow you are building.
  • Tap the switch button at top right of the shortcut name
  • In the next pane you can name the shortcut and give it an icon. The most important change you should make is to enable Show in Share Sheet (flick to green).
  • You can create a second Shortcut to make archives. Just tupe Make Archive to find the relevant flow and then add Save File and Show in Share Sheet as decribed above. Don’t forget to give it a name, such as Make Archive.
  • Shortcuts can work with multiple compression formats, including .tar, .zip and .iso.

How to use it:

To read this article in full, please click here

Read More
ComputerWorldIndependent

Enterprise iPhones will soon be able to use security dongles

Credit to Author: Jonny Evans| Date: Wed, 09 Jan 2019 07:25:00 -0800

Enterprise security professionals will be pleased to learn that it will soon be possible to enhance the already considerable device security of Apple’s iPhones with hardware-based physical authentication dongles using the Lightning port.

A highly secure proposition

Announced at CES 2019, the key fits on a keyring and comes from the authorization experts at Yubico. The hardware connects to iOS systems using the Lightning connection and is also equipped with USB-C for Macs. This is quite a big deal.

To read this article in full, please click here

Read More
IndependentKrebs

Patch Tuesday, January 2019 Edition

Credit to Author: BrianKrebs| Date: Wed, 09 Jan 2019 14:46:31 +0000

Microsoft on Tuesday released updates to fix roughly four dozen security issues with its Windows operating systems and related software. All things considered, this first Patch Tuesday of 2019 is fairly mild, bereft as it is of any new Adobe Flash updates or zero-day exploits. But there are a few spicy bits to keep in mind. Read on for the gory details.

Read More
ComputerWorldIndependent

Details, details

Credit to Author: Sharky| Date: Wed, 09 Jan 2019 03:00:00 -0800

It’s a few years after Y2K when the IT security team at this university gets a rude awakening, reports a pilot fish in the know.

“They discovered that persons unknown had hacked into a university server,” fish says. “It was being used to launch denial-of-service attacks against a victim somewhere outside the university.”

The team’s first job is finding the server — which turns out to be in the alumni office — and taking it offline.

Then they start digging into the security logs. That’s when they find out that the attackers have been making use of the server for more than a year.

And once they start checking on the IP addresses of whoever it is that has accessed the server, they discover it’s not just one or two hackers. It seems people from all over the world have been using this server to launch attacks.

To read this article in full, please click here

Read More