Independent

ComputerWorldIndependent

Sneaky Gmail phishing attack fools with fake Google Docs app

Credit to Author: Michael Kan| Date: Thu, 04 May 2017 03:51:00 -0700

Google Docs was pulled into a sneaky email phishing attack on Tuesday that was designed to trick users into giving up access to their Gmail accounts.

The phishing emails, which circulated for about three hours before Google stopped them, invited the recipient to open what appeared to be a Google Doc. The teaser was a blue box that said, “Open in Docs.”

In reality, the link led to a dummy app that asked users for permission to access their Gmail account.

screen shot 2017 05 03 at 2.38.57 pm Reddit

An example of the phishing email that circulated on Tuesday.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

Face it: Enterprise cyberattacks are going to happen

Credit to Author: Matt Hamblen| Date: Wed, 03 May 2017 11:00:00 -0700

There are now so many cyberattacks that many enterprises simply accept that hackers and bad actors will find ways to break into their systems.

A strategy some large businesses have developed over the past two years has been to quickly identify and isolate these attacks, possibly by shutting down part of a system or network so the hackers won’t get days or weeks to root around and grab sensitive corporate data.

This enterprise focus on rapid detection and response to various attacks on networks and computers doesn’t replace conventional security tools to prevent attacks. Instead, businesses are relying on both prevention software and detection software.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

NSA collected 151 million records of Americans' calls, allowed 1,934 to be 'unmasked'

Credit to Author: Darlene Storm| Date: Wed, 03 May 2017 07:15:00 -0700

Despite the USA Freedom Act of 2015, the NSA collected 151 million records of Americans’ phone calls last year, even though it had obtained warrants from the FISA court to spy on only 42 people suspected of having ties to terrorism. The NSA also complied with requests from government officials to reveal the identities of 1,934 U.S. persons ensnared in the foreign surveillance.

The annual report, issued by the Office of the Director of National Intelligence, provides the first assessment of the effectiveness of the 2015 USA Freedom Act which was meant to limit dragnet surveillance of millions of Americans’ phone records. In 2016, 151,230,968 was the total estimated number of Americans’ call details records, meaning metadata about calls such as the number of the caller and recipient as well as the duration and time of the call, which the NSA received from providers and then stored in NSA repositories.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

The Internet of messy things

Credit to Author: Steven J. Vaughan-Nichols| Date: Wed, 03 May 2017 04:00:00 -0700

In the beginning, devices on the internet were fun. My favorite was the Carnegie-Mellon’s Computer Science Department Coke Machine. Starting in the 1970s, you could “ping” it to see if it had sodas ready and if they were cold yet. It was good, silly fun. Now everything except the cat* is hooked to the internet, and that’s not so funny at all.

Oh, sure, some internet of things (IoT) devices are enjoyable and useful. I have an Amazon Echo in my bedroom and a Google Home in my kitchen. I use them every day. But I’m aware of their privacy problems. You should be too.

To read this article in full or to leave a comment, please click here

Read More
IndependentSecuriteam

SSD Advisory – Serviio Media Server Multiple Vulnerabilities

Credit to Author: Maor Schwartz| Date: Tue, 02 May 2017 10:58:33 +0000

Vulnerabilities Summary The following advisory describes a five (5) vulnerabilities found in Serviio Media Server. Affected version: 1.8.0.0 PRO, 1.7.1, 1.7.0, 1.6.1. Serviio is a free media server. It allows you to stream your media files (music, video or images) to renderer devices (e.g. a TV set, Bluray player, games console or mobile phone) on … Continue reading SSD Advisory – Serviio Media Server Multiple Vulnerabilities

Read More