Independent

ComputerWorldIndependent

7 tips to strengthen online security

Credit to Author: Ryan Francis| Date: Wed, 12 Apr 2017 04:00:00 -0700

Seeing the light
online security

Image by Pexels

A lightbulb. We can connect a lightbulb in our house to the internet in case we need to turn the lights on or off while we’re away – or if we’re too lazy to walk to the light switch. The more lightbulbs, devices, apps and online services we use and connect with on a daily basis, the more we expose ourselves to security risks. This is the nature of how our digital lives have evolved and it requires more active participation as individuals to protect ourselves and minimize exposure.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

Hacked Dallas sirens get extra encryption to fend off future attacks

Credit to Author: Matt Hamblen| Date: Tue, 11 Apr 2017 14:37:00 -0700

Read More
IndependentSecuriteam

SSD Advisory – Sentora Web Hosting Control Panel Multiple Vulnerabilities

Credit to Author: noam| Date: Tue, 11 Apr 2017 10:23:24 +0000

Vulnerabilities Summary The following advisory describes two (2) vulnerabilities found in Sentora Web Hosting Control Panel that lead to remote code execution. Sentora is a free to download and use web hosting control panel developed for Linux, UNIX and BSD based servers or computers. The Sentora software can turn a domestic or commercial server into … Continue reading SSD Advisory – Sentora Web Hosting Control Panel Multiple Vulnerabilities

Read More
IndependentKrebs

Fake News at Work in Spam Kingpin’s Arrest?

Credit to Author: BrianKrebs| Date: Tue, 11 Apr 2017 15:51:46 +0000

Over the past several days, many Western news media outlets have predictably devoured thinly-sourced reporting from a Russian publication that the arrest last week of a Russian spam kingpin in Spain was related to hacking attacks linked to last year’s U.S. election. While there is scant evidence that the spammer’s arrest had anything to do with the election, the success of that narrative is a sterling example of how the Kremlin’s propaganda machine is adept at manufacturing fake news, undermining public trust in the media, and distracting attention away from the real story.

Read More
ComputerWorldIndependent

Bank gets lesson in the security failings of third parties

Credit to Author: Evan Schuman| Date: Tue, 11 Apr 2017 04:00:00 -0700

The most effective cyberattacks turn the tables on the security measures we take to ward off attacks. We’re always countering the attacks that have worked in the past, rarely thinking about the opportunities our countermeasures might open up.

And opportunities always abound. If malware is being delivered via attachments, we put out memos forbidding employees from opening attachments from strangers. Cybercriminals see this, and they come up with phishing — sending out attachments in emails that appear to come from the recipients’ close co-workers. So then we warn employees to not open an attachment unless it was expected. All right, say the attackers; we’ll just wait for an attachment heads up and then launch our attack.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

Suspected CIA spying tools linked to hacks in 16 countries

Credit to Author: Michael Kan| Date: Mon, 10 Apr 2017 11:17:00 -0700

The suspected CIA spying tools exposed by WikiLeaks have been linked to hacking attempts on at least 40 targets in 16 countries, according to security firm Symantec.

The tools share “close similarities” with the tactics from an espionage team called Longhorn, Symantec said in a Monday post. Longhorn has been active since at least 2011, using Trojan programs and previously unknown software vulnerabilities to hack targets.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

Hack of Dallas emergency sirens prompts more warnings to bolster cybersecurity

Credit to Author: Matt Hamblen| Date: Mon, 10 Apr 2017 09:39:00 -0700

Dallas emergency management officials continue to investigate a hack that activated all 156 emergency tornado sirens citywide for about 90 minutes early Saturday.

The city declared the sirens were activated Friday night in a hack that officials believe came from the Dallas area.

The event was a warning that businesses and organizations, including cities and emergency operations centers, need to guard against similar breaches, whether they may come from disgruntled employees, hackers trying to pull a stunt, or a more nefarious group working for an enemy state, analysts said.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

New ransomware demanded high score on anime-style shooter game not bitcoins

Credit to Author: Darlene Storm| Date: Mon, 10 Apr 2017 09:23:00 -0700

Never underestimate what a person can come up with when he or she is bored as was recently highlighted by the accidental release of a ransomware that required victims to reach an astronomically high score on an anime-style shooter game instead of paying an outrageous ransom in bitcoins.

The Malware Hunter Team was surprised to discover Rensenware; they said the ransomware did not ask “for any money, but to play a game until you reach a score – and it’s not a joke.”

Victims who wanted their files decrypted were required to score over 200 million points in the “lunatic” level of the game TH12 ~ Undefined Fantastic Object.

To read this article in full or to leave a comment, please click here

Read More