Posts Tagged ‘ cyber warfare ’

Flaws in Samsung’s “smart home” let hackers unlock doors and set off fire alarms

May 3, 2016
posted by

Wired    

"The security research community has been loudly warning for years that the so-called Internet of Things -- and particularly networked home appliances -- would introduce a deluge of new hackable vulnerabilities into everyday objects. Now one group of researchers at the University of Michigan and Microsoft have published what they call the first in-depth security analysis of one such 'smart home' platform that allows anyone to control their home appliances from light bulbs to locks with a PC or smartphone. They discovered they could pull off disturbing tricks over the internet, from triggering a smoke detector at will to planting a 'backdoor' PIN code in a digital lock that offers silent access to your home, all of which they plan to present at the IEEE Symposium on Security and Privacy later this month." (05/02/16)

https://www.wired.com/2016/05/flaws-samsungs-smart-home-let-hackers-unlock-doors-set-off-fire-alarms/?mbid=nl_5216  

No Comments »

With Rule 41, little-known committee proposes to grant new hacking powers to government

May 1, 2016
posted by

Electronic Frontier Foundation Electronic Frontier Foundation
by Rainey Reitman  

"The government hacking into phones and seizing computers remotely? It's not the plot of a dystopian blockbuster summer movie. It's a proposal from an obscure committee that proposes changes to court procedures -- and if we do nothing, it will go into effect in December. The proposal comes from the advisory committee on criminal rules for the Judicial Conference of the United States. The amendment would update Rule 41 of the Federal Rules of Criminal Procedure, creating a sweeping expansion of law enforcement's ability to engage in hacking and surveillance." (04/30/16)

https://www.eff.org/deeplinks/2016/04/rule-41-little-known-committee-proposes-grant-new-hacking-powers-government  

No Comments »

Cyberwarfare: Challenge of tomorrow

May 1, 2016
posted by

CounterPunch CounterPunch
by Alice Donovan  

"Computer hacking has become part of everyday life for the past few years Internet-connected devices have been hacked left and right, but most of the times, these are harmless so-called Internet of Things appliances, like kettles or fridges. According to the Boston hospital Beth Israel Deaconess, it is attacked about every 7 seconds, 24 hours a day, and the strikes come from everywhere: hacktivists, organized crime, cyberterrorists and even MIT students." (04/29/16)

http://www.counterpunch.org/2016/04/29/cyberwarfare-challenge-of-tomorrow/  

1 Comment »

Sanders Facebook pages shut down after porn cyber attack

April 26, 2016
posted by

Connecticut Post    

"Several Facebook pages supporting Bernie Sanders were quickly shut down late Monday night after self-proclaimed Hillary Clinton supporters flooded some of the pages with pornographic images. The pro-Sanders pages, including Bernie or Bust, Bernie Believers and Bernie Sanders is my HERO, had a combined 250,000 followers. According to The Hill, The attack began around 9 p.m. EDT on Monday night and lasted until just after midnight Tuesday. They have since been reinstated. ... According to eyewitness reports, the pages were flooded with pornographic images in what appeared to be coordinated fashion and then flagged for obscene content, prompting Facebook to remove them. ... At least one Facebook user linked to the Los Angeles-based pro-Clinton group 'Bros4Hillary' seems to have been a part of the attack. But the group told TheWrap they had no prior knowledge of the incident and that the member has been 'blocked' from the group's page." (04/26/16)

http://www.ctpost.com/entertainment/the-wrap/article/Bernie-Sanders-Facebook-Pages-Shut-Down-After-7376721.php  

No Comments »

US plan to drop “cyber bombs” on Islamic State will change the meaning of the term cyber war

April 26, 2016
posted by

Extreme Tech    

"Since its creation in 2009, US Cyber Command has focused its efforts mostly on sophisticated cyber-actors on the world stage, states like Iran, Russia, and North Korea. It acts mostly in the new realm of cyber-conflict, in which states can take digital shots at one another without getting too worried about starting a real shooting war. But now, the American war on ISIS is blurring the lines between digital and kinetic conflict, opening a new cyber-front in the physical world: For the first time in its short history, the US military's Cyber Command will now run its own aggressive operations as part of the War on Terror, and even augment regular, lethal military strikes with cyber capabilities." [editor's note: The idea that the US military hasn't previously engaged in cyber warfare is hilarious; openly admitting it is the only thing that's new - TLK] (04/26/16)

http://www.extremetech.com/extreme/227238-us-to-drop-cyber-bombs-on-isis-changing-the-meaning-of-the-term-cyber-war  

No Comments »

McAfee: If FBI gets backdoor to people’s phones, US society will collapse

April 24, 2016
posted by

Russia Today [Russian state media]
by Sophie Shevarnadze  

"They said that the war never changes -- but what if it does? The introduction of digital technologies, the cyberspace of the World Wide Web has introduced new battlefields. Law enforcement, drug trade, political fights and terrorism have gone online. The fight for information and access to the hidden data is raging on, both in the legal sphere, with authorities trying to tighten the grip on the digital flow, and international, with army-like hacker groups searching for the cracks in the cyber defense of nations. How far will this fight go? Who has the upper hand? And can battles in virtual reality claim real lives?" (04/22/16)

https://www.rt.com/shows/sophieco/340570-digital-war-information-fight/  

1 Comment »

Repetitive encryption tirades could be giving way to debate over “lawful hacking”

April 21, 2016
posted by

Jenna McLaughlin The Intercept
by Jenna McLaughlin  

"Attempts to regulate math are nonsensical. Encryption is here to stay. Arguing about it is a waste of time. At a House Energy and Commerce subcommittee hearing on Tuesday, a few Members of Congress pivoted away from that tired and ultimately fruitless policy argument to discuss instead what could be considered the next phase of the Crypto Wars. In that phase, the questions are about how law enforcement can get around encryption rather than break through it." (04/20/16)

https://theintercept.com/2016/04/20/repetitive-encryption-tirades-could-be-giving-way-to-debate-over-lawful-hacking/  

No Comments »

Secure cars, but not phones? Government doublespeak on cybersecurity

April 14, 2016
posted by

Jenna McLaughlin The Intercept
by Jenna McLaughlin  

"Privacy advocates say government officials are talking out of two sides of their mouths when it comes to cybersecurity. The latest case in point: Assistant Attorney General John Carlin calling for super-secure, hack-proof cars at an automotive conference on Tuesday, even as FBI Director James Comey continues to pressure phone manufacturers and technology companies to roll back their security to allow for law enforcement access. ... While Carlin is telling car companies that bulking up their cyber defenses is key to their long-term success, Comey has publicly suggested that phone manufacturers and communications providers like Apple, Google, and WhatsApp, who provide their customers with unbreakable encryption to secure their communications, should rethink their business models." (04/13/16)

https://theintercept.com/2016/04/13/secure-cars-but-not-phones-government-doublespeak-on-cybersecurity/  

No Comments »

Experts crack Petya ransomware

April 12, 2016
posted by

Ars Technica Ars Technica    

"A nasty piece of ransomware that took crypto-extortion to new heights contains a fatal weakness that allows victims to decrypt their data without paying the hefty ransom. When it came to light two weeks ago, Petya was notable because it targeted a victim's entire startup drive by rendering its master boot record inoperable. It accomplished this by encrypting the master boot file and displaying a ransom note. ... Now, someone who goes by the Twitter handle @leostone has devised a tool that generates the password Petya requires to decrypt the master boot file. ... Bleeping Computer, a reputable self-help computer forum, reports that the technique works as billed and provides [a] step-by-step tutorial that walks people through the entire process." (04/11/16)

http://arstechnica.com/security/2016/04/experts-crack-nasty-ransomware-that-took-crypto-extortion-to-new-heights/  

No Comments »

Philippines: Elections hack “leaks voter data”

April 11, 2016
posted by

BBC News BBC News [UK state media]    

"The Philippines may have suffered its worst-ever government data breach barely a month before its elections. Personal information, including fingerprint data and passport information, belonging to around 70 million people is said to have been compromised by hackers. The Philippine Commission on the Elections (Comelec) saw its website defaced at the end of March." (04/11/16)

http://www.bbc.com/news/technology-36013713  

No Comments »

A time bomb is hidden beneath the Panama Papers

April 6, 2016
posted by

John McAfee Business Insider
by John McAfee  

"Mossack Fonseca is the fourth-largest 'asset protection' law firm in the world, and its cybersecurity measures were obviously lacking. But they are not alone. Studies indicate that law firms are easy pickings for hackers, and Bloomberg reported last year that more than 80% of US law firms had already been hacked. Yet these law firms guard the gravest of our secrets, whether corporate secrets or those of an individual, and the damage done from a data breach could, as we might see, even bring down a head of state, as Iceland's prime minister is discovering. Why are law firms so vulnerable?" (04/05/16)

http://www.businessinsider.com/john-mcafee-panama-papers-evidence-we-need-better-cybersecurity-2016-4  

6 Comments »

CloudFlare: 94% of the Tor traffic we see is “per se malicious”

March 31, 2016
posted by

Ars Technica Ars Technica    

"More than ever, websites are blocking users of the anonymizing Tor network or degrading the services they receive. Data published today by Web security company CloudFlare suggests why that is. In a company blog post entitled 'The Trouble with Tor,' CloudFlare CEO Matthew Prince says that 94 percent of the requests the company sees coming across the Tor network are 'per se malicious.' He explains: 'That doesn't mean they are visiting controversial content, but instead that they are automated requests designed to harm our customers. A large percentage of the comment spam, vulnerability scanning, ad click fraud, content scraping, and login scanning comes via the Tor network.'" (03/30/16)

http://arstechnica.com/tech-policy/2016/03/new-data-suggests-94-percent-of-tor-traffic-is-malicious/  

No Comments »

FBI fights back against court order demanding Tor exploit source code

March 30, 2016
posted by

ZDNet ZDNet    

"The FBI is dragging its heels on a court order which requires the agency to reveal how an exploit was used against the Tor network to find a suspected child pornography viewer and their true IP address. US law enforcement says that revealing the source code of the Tor exploit, used to infiltrate the surveillance-thwarting network, is not necessary to the case, while the judge behind the order, Robert Bryan, considers it a 'fair question' to ask how the defendant was caught." [editor's note: Seems pretty simple to me. If the FBI doesn't want to reveal the code, they should just drop all cases associated with it and refund the money used to develop it to the taxpayers they stole it from. Plus interest at credit card rates, of course - TLK] (03/30/16)

http://www.zdnet.com/article/fbi-fights-back-against-court-order-demanding-tor-exploit-source-code/  

No Comments »

Guilty plea in Boeing hacking case with claimed Chinese regime involvement

March 24, 2016
posted by

Chicago Tribune Chicago Tribune    

"A Chinese businessman pleaded guilty Wednesday in federal court in Los Angeles to helping two Chinese military hackers carry out a damaging series of thefts of sensitive military secrets from U.S. contractors. The plea by Su Bin, a Chinese citizen who ran a company in Canada, marks the first time the U.S. government has won a guilty plea from someone [allegedly] involved with a Chinese government campaign of economic cyberespionage." (03/24/16)

http://www.chicagotribune.com/business/ct-chinese-cyberhacking-boeing-20160324-story.html  

No Comments »

ObamaCare website still vulnerable to hackers, federal watchdog warns

March 24, 2016
posted by

Fiscal Times    

"Federal officials have been lucky until now, but the Affordable Care Act's Internet web portal could become a hacker's playground -- with plenty of sensitive data compromised -- without a significant tightening of security, according to a new report by the Government Accountability Office. The new warning comes on the sixth anniversary of the enactment of the ACA and addresses security problems related to the personal information -- including names, addresses, Social Security numbers and sensitive income and tax details -- of literally millions of Americans who have enrolled in the insurance program online through HealthCare.gov." (03/24/16)

http://www.thefiscaltimes.com/2016/03/24/Obamacare-Website-Still-Vulnerable-Hackers-Federal-Watchdog-Warns  

No Comments »

McAfee: I know who’s helping the FBI hack Apple

March 23, 2016
posted by

CNBC    

"John McAfee said he's not the third party helping unlock an iPhone used by a terrorist -- but he knows who is -- and he's not fond of their approach. 'I promise you that [Apple CEO] Tim Cook and Apple are not going to be happy with the solution that the FBI has come up with,' McAfee, the controversial technology executive, told CNBC's 'Power Lunch.' 'Because it is almost as bad as a universal master key.' McAfee is the cybersecurity pioneer behind McAfee Security antivirus software products, now part of Intel. He declined to name with whom, or how, the FBI plans to move forward. But his comments come as the Justice Department says it may have found a third party to hack the iPhone at the center of a cybersecurity standoff." (03/22/16)

http://www.cnbc.com/2016/03/22/john-mcafee-speaks-out-on-fbi-apple-hacks-third-party.html  

8 Comments »

First live ransomware targeting Mac found “in the wild”

March 7, 2016
posted by

CNet News CNet News    

"Sorry Mac fans -- now you're no better off than regular old PC users. Security researchers have discovered what they believe to be the first ever ransomware attack targeted at Apple users that actually made it out 'into the wild.' And in bad news for downloading fiends, it's being spread through torrenting software. The problem was first detected on Friday, when a team of researchers at Palo Alto Networks found a popular OS X BitTorrent client infected with the ransomware, which they have dubbed 'KeRanger.'" (03/07/16)

http://www.cnet.com/uk/news/apple-users-beware-first-live-ransomware-targeting-mac-found-in-the-wild/  

No Comments »

US National Guard may join cyber offense against Islamic State

March 6, 2016
posted by

Reuters Reuters    

"U.S. Defense Secretary Ash Carter said the National Guard's cyber squadrons will play an increasingly important role in assessing the vulnerabilities of U.S. industrial infrastructure and could be asked to join the fight against Islamic State. The National Guard -- a reserve military force that resides in the states but can be mobilized for national needs -- is a key part of the military's larger effort to set up over 120 cyber squadrons to respond to cyber attacks and prevent them." (03/06/16)

http://www.reuters.com/article/us-usa-military-cyber-idUSKCN0W70UQ?feedType=RSS&feedName=technologyNews  

No Comments »

CA: UC-Berkeley alerts 80,000 people of cyber attack

February 29, 2016
posted by

CNN-IBN [India]    

"Officials at the University of California Berkeley said that they were alerting 80,000 people, including current and former students, faculty and vendors of a cyber attack on a system that stores social security and bank account numbers. ... The school said a hacker or hackers gained access to its financial management software in late December due to a security flaw present when the system is updating. Officials have notified law enforcement, including the FBI, and hired a private computer investigation company." (02/29/16)

http://www.ibnlive.com/news/tech/university-of-california-alerts-80000-people-of-cyber-attack-1209413.html  

No Comments »

I’ll decrypt the San Bernardino iPhone

February 18, 2016
posted by

Tech Insider
by John McAfee  

"Using an obscure law, written in 1789 -- the All Writs Act -- the US government has ordered Apple to place a back door into its iOS software so the FBI can decrypt information on an iPhone used by one of the San Bernardino shooters. It has finally come to this. After years of arguments by virtually every industry specialist that back doors will be a bigger boon to hackers and to our nation's enemies than publishing our nuclear codes and giving the keys to all of our military weapons to the Russians and the Chinese, our government has chosen, once again, not to listen to the minds that have created the glue that holds this world together. This is a black day and the beginning of the end of the US as a world power." (02/18/16)

http://www.techinsider.io/john-mcafee-ill-decrypt-the-san-bernardino-iphone-for-free-so-apple-doesnt-need-to-place-a-back-door-on-its-product-2016-2  

11 Comments »

Obama creates cyber panel, says long-term vigilance needed

February 18, 2016
posted by

The Washington Post Washington Post    

"President Barack Obama on Wednesday appointed his former national security adviser, Tom Donilon, to lead a new commission on cybersecurity that will make detailed recommendations on how the nation should better protect itself against computer attacks. Donilon will serve as chairman of the Commission on Enhancing National Cybersecurity. Obama will appoint former IBM chief executive Sam Palmisano to serve as vice chairman. Their task, Obama said, is to produce a report by Dec. 1 that will guide future presidents on the infrastructure necessary to confront long-term computer challenges." [editor's note: Obama isn't even in John McAfee's league on this subject. Just sayin' ... - TLK] (02/18/16)

https://www.washingtonpost.com/politics/obama-creates-cyber-panel-says-long-term-vigilance-needed/2016/02/18/6fa503e8-d600-11e5-a65b-587e721fb231_story.html  

No Comments »

Israel: Regime prepares cyber battle against BDS movement

February 17, 2016
posted by

Fox News Fox News    

"Israel is using its world-leading expertise in cyber security to take on the growing threat of the global pro-Palestinian movement to boycott Israel. The Israeli government recently allotted nearly $26 million in this year's budget to combat what it sees as worldwide efforts to 'delegitimize' the Jewish state's right to exist. Some of the funds are earmarked for Israeli tech companies, many of them headed by former military intelligence officers, for digital initiatives aimed at gathering intelligence on activist groups and countering their efforts." [editor's note: If Israel can afford to spend $26 million on propaganda, cyber warfare, or a mixture of the two, that's $26 million they shouldn't be getting from US taxpayers - TLK] (02/17/16)

http://www.foxnews.com/world/2016/02/17/israel-prepares-cyber-battle-against-pro-palestinian-boycott.html  

No Comments »

CA: Cyber extortionists zap computers at Hollywood hospital

February 17, 2016
posted by

Los Angeles Times Los Angeles Times    

"Hollywood Presbyterian Medical Center was the target of a ransomware extortion plot in which hackers seized control of the hospital's computer systems and then demanded that directors pay in bitcoin to regain access, according to law enforcement sources. ... Laura Eimiller, an FBI spokeswoman, said the bureau has now taken control of the hacking investigation, but declined to discuss specifics of the case. The attack has forced the hospital to return to pen-and-paper for its record keeping, and cyber security experts are addressing system weaknesses, according to sources." (02/17/16)

http://www.latimes.com/local/lanow/la-me-ln-cyber-extortion-20160216-story.html  

No Comments »

We’re a lot more exposed to hackers than you think

February 11, 2016
posted by

Business Insider
by John McAfee  

"An Intel study found that 97% of all computer users could not identify all 10 out of 10 phishing emails as not being legitimate. All that a hacker would have to do is to send multiple types of phishing emails to be guaranteed that over 90% of respondents would provide the hacker their passwords. ZDNET did a study and found that with a single phishing email, an average of 45% of users submitted their full login credentials. Please see how horrifying these statistics are." (02/10/16)

http://www.businessinsider.com/john-mcafee-more-exposed-to-hackers-than-you-think-2016-2  

1 Comment »

Kaspersky Lab details new banking, ATM attack campaigns

February 9, 2016
posted by

eWeek    

"Security firm Kaspersky Lab today revealed details on a trio of new financial industry attacks that are stealing money from banks and ATMs. One of the campaigns, Carbanak 2.0, is an evolution of an attack that Kaspersky first reported in 2015, while the Metel and GCMAN attacks are new. There is no direct connection between the Carbanak, Metel and GCMAN attacks, according to Kaspersky. The Metel and GCMAN campaigns are 'copycats' of Carbanak in some respects, explained Sergey Golovanov, principal security researcher with the Global Research and Analysis Team at Kaspersky Lab." (02/09/16)

http://www.eweek.com/security/kaspersky-lab-details-new-banking-atm-attack-campaigns.html  

No Comments »

Our Sponsors