Hillary-Clinton-Presidential-Campaign-hackedThere’s a lot more to come from the DNC Hack. The Associated Press confirmed yesterday that the computer systems used by Hillary Clinton’s presidential campaign were hacked as part of the recent Democratic National Convention (DNC) hack.

Last week’s email dump containing almost 20,000 emails from top DNC officials was just the beginning, which led DNC Chairwoman Debbie Wasserman Schultz to resign as the group’s leader, as WikiLeaks announced that it was part one of its new Hillary Leaks series.

This suggests WikiLeaks Founder Julian Assange has had his hands on more data from the DNC hack that, according to him, could eventually result in the arrest of Hillary Clinton.

Assange — Wikileaks’ Next Leak will lead to Arrest of Hillary Clinton

In an interview with Robert Preston of ITV last month, Assange made it clear that he hopes to harm Hillary Clinton’s chances from becoming president of the United States, opposing her candidacy on both policies as well as personal grounds.

Read more at
http://thehackernews.com/2016/07/hillary-clinton-hacked.html

CyberGhostIf you get caught using a VPN (Virtual Private Network) in Abu Dhabi, Dubai and the broader of United Arab Emirates (UAE), you could face temporary imprisonment and fines of up to $545,000 (~Dhs2 Million). Yes, you heard that right.

Online Privacy is one of the biggest challenges in today’s interconnected world. The governments across the world have been found to be using the Internet to track people’s information and conduct mass surveillance. Here VPNs and proxy servers come into Play.

VPNs and proxy servers are being used by many digital activists and protesters, who are living under the most oppressive regimes, to protect their online activity from prying eyes.

However, using VPN or proxy in the UAE could land you into great difficulty

Read more at
http://thehackernews.com/2016/07/vpn-is-illegal-in-uae.html

 

FILE - In this Friday, Jan. 16, 2015 file photo, a man walks past the European police agency Europol in The Hague, Netherlands. The head of European Union police organization Europol said at a meeting on Monday, Feb. 23, 2015 that intelligence and law enforcement agencies across the continent have to co-operate better to fight against the threat of terrorism. (AP Photo/Peter Dejong, File)The European Police agency Europol has joined forces with police and cyber security companies to launch a worldwide initiative to combat and tackle together the exponential growth of Ransomware used by cyber criminals.

Europol announced today the initiative, dubbed NO More Ransom, that has been backed by technology giant Intel, cyber security firm Kaspersky Lab and the Netherlands police, aiming at decreasing an “exponential” rise in Ransomware threat.

Ransomware is a piece of malware that typically locks victim’s device using encryption and demands a fee to decrypt the important data. The estimated number of ransomware victims tripled in the first quarter of this year alone.

Read more at
http://thehackernews.com/2016/07/ransomware-decrypt-tool.html

Lastpass

Password managers seem like a great idea, given rampant password reuse, poor abilities to create strong passwords by the average user and the sheer number of credentials we’re supposed to remember. But major vulnerabilities have been found in LastPass—opening the door to a full remote compromise for its users.

Independent security researcher Tavis Ormandy said that the zero-day flaw can be exploited using a drive-by technique with a malicious website. If successful, the attacker gains the digital keys to the kingdom—all of the credentials that the user has stored for online services.

“Are people really using this lastpass [sic] thing?” Ormandy tweeted. “I took a quick look and can see a bunch of obvious critical problems.”

One Ormandy Twitter follower responded, “I’m perplexed anyone uses an online service to store passwords”—to which Ormandy responded, “Yeah, me too.”

Read more at
http://www.infosecurity-magazine.com/news/major-lastpass-flaw-compromises/

BlackHatAh, the irony: As the security community gears up for Black Hat USA 2016, a flaw in the official conference app enables attackers to become anyone or spy on attendees.

Conference attendees can install the app on their mobile devices to browse the conference’s agenda, get exhibitor info, message attendees, schedule events they will attend and participate in a conference-wide Twitter-like activity feed. According to Lookout Security, a flaw opens the door to attendee impersonation—so users should be cautious of any activity or messages that are posted or received within the app.

“While investigating both the iOS and Android versions of the Black Hat USA 2016 app, we discovered that a user could register using any email address they want (as long as it hasn’t already been used to register with the app previously),” explained Lookout researcher Andrew Blaich, in a blog. “This includes any email address, whether or not the person signing up owns the email address. It doesn’t even matter if the email address exists at all.” Further, to log in, the Black Hat app does not require confirmation; the user is immediately logged into the app after typing in any email address.

Read more at
http://www.infosecurity-magazine.com/news/official-black-hat-usa-app-allows/

US-Homeland-SecurityThe U.S. Department of Homeland Security (DHS) has published guidelines on when, how and to which government agency US organizations should report cyber incidents. This follows last week’s release of Presidential Policy Directive 41 (PPD-41) on United States Cyber Incident Coordination — which specifically requires the DHS to ‘maintain and update’ such a fact sheet.

The fact sheet (PDF) makes no mention of PPD-41’s Incident Severity Schema. That schema defined six levels (0-5) that provide a common framework for evaluating incident severity; and according to PPD-41, government agencies should get involved from level 3 upwards.

The DHS guidelines first define a cyber incident (“an event that could jeopardize the confidentiality, integrity, or availability of digital information or information systems”), and then define whether the severity of the incident warrants reporting. “Victims,” it explains, “are encouraged to report all cyber incidents that result in significant loss; impact a large number of victims; indicate a compromise of critical IT systems; affect the critical infrastructure; or impact national security, economic security, or public health and safety. Fundamentally, it remains a value judgment by the affected organization.

Read more at
http://www.securityweek.com/dhs-details-cyber-incident-reporting-process

Riffle-Online-Anonymous-Proxy-ToolOnline privacy is an Internet buzzword nowadays. If you are also concerned about the privacy of your web surfing, the most efficient way is to use TOR – a free software that lets users communicate anonymously by hiding their actual location from snoopers. Although TOR is a great anonymous network, it has some limitations that could still allow a motivated hacker to compromise the anonymity of legions of users, including dark web criminals as well as privacy-minded innocents. Moreover, TOR (The Onion Network) has likely been targeted by the FBI to arrest criminals, including the alleged Silk Road 2 lieutenant Brian Richard Farrell, who was arrested in January 2014. Even the TOR Project accused the FBI of paying the researchers of Carnegie Mellon University (CMU) at least $1 Million to disclose a technique that could help the agency unmask TOR users and reveal their IP addresses as part of a criminal investigation. So, what’s next? Is there an alternative?
Well, most probably, YES.

Read more at
http://thehackernews.com/2016/07/riffle-anonymous-proxy.html

DARPA-Cyber-Grand-Challenge-2016Why we can’t detect all security loopholes and patch them before hackers exploit them?
Because… we know that humans are too slow at finding and fixing security bugs, which is why vulnerabilities like Heartbleed, POODLE and GHOST remained undetected for decades and rendered almost half of the Internet vulnerable to theft by the time patches were rolled out.
Now to solve this hurdle, DARPA has come up with an idea: To build a smart Artificial Intelligence System that will automatically detect and even patch security flaws in a system. Isn’t it a revolutionary idea for Internet Security?

The Defense Advanced Research Projects Agency (DARPA) has selected seven teams of finalists who will face off in a historic battle, as each tries to defend themselves and find out flaws without any human control. The DARPA Cyber Grand Challenge will be held at the annual DEF CON hacking conference in Las Vegas next month.

Read more at
http://thehackernews.com/2016/07/hacking-artificial-intelligence.html

YORKTOWN HEIGHTS, NEW YORK––IBM has created a computer, called Watson, that will play against the best Jeopardy contestants for three nights, Feb. 14, 15, and 16. The host of Jeopardy, Alex Trebek, rehearses for the upcoming show. (Photo by Carolyn Cole/Los Angeles Times via Getty Images)

IBM and leading universities will train IBM Watson to discover hidden patterns and cyber threats. IBM Security is giving its cloud-based cognitive technology Watson a new assignment: cybersecurity. The new Watson for Cyber Security is now in training at IBM to study the nuances of security research findings in order to more effectively discover patterns and hidden cyberattacks. IBM’s X-Force research library will be a central part of the materials fed to Watson for Cyber Security. That information includes 20 years of security research, details on 8 million spam and phishing attacks, and over 100,000 documented vulnerabilities. As part of a year-long research project, IBM this fall will work with eight leading universities and their students to further train Watson on the language of cybersecurity.

Read more at
http://www.darkreading.com/threat-intelligence/ibm-watson-will-help-battle-cyberattacks/d/d-id/1325506?

Secretary of Defense Ash Carter met with Swiss Defense Minister Guy Parmelin in Davos, Switzerland at the World Economic Forum on Jan. 21, 2016.(DoD photo by U.S. Army Sgt. 1st Class Clydell Kinchen) (Released)

The annual World Economic Forum (WEF) in Davos, Switzerland in January drew a powerful cyber-attack, according to Swiss defense minister Guy Parmelin. Swiss newspaper Tages-Anzeiger is reporting that the attack was not successful, but it does indicate a pattern of high-level attempts. Parmelin said that he suspects economic espionage as the reason behind the attack, but added that a nation-state led offensive could be plausible as well. He also said that he suspects the attackers to be of Russian origin—though no official accusations have been made. “Significant events, like the World Economic Forum, serve as a hub for important conversations and attract high-profile visitors from all over the world,” Kaspersky Lab researchers said. “But a high concentration of important people in one place also attracts malicious cyber-attackers, who consider public events a good opportunity to gather intelligence with the help of targeted malware.”

Read more at
http://www.infosecurity-magazine.com/news/swiss-defense-minister-davos-was/

nist-cyber-security-framework-cybersecurity-controls-policy

Security frameworks continue to see adoption, with the CIS Critical Security Controls for Effective Cyber Defense (CIS Controls) ranked as a leading framework in use, along with the National Institute of Standards and Technology (NIST) Framework for Improving Critical Infrastructure Cybersecurity. An adoption survey from Dimensional Research concluded that 84% of respondents used some type of security framework, and most organizations surveyed used more than one.  “The…survey shows strong adoption of both the NIST Cybersecurity Framework [CSF] and the CIS Controls, and notes that this is not an ‘either-or’ situation. The CIS Controls complement the overarching NIST CSF with a specific action plan to focus on the most effective technical controls that stop cyber attacks,” said CIS SVP Tony Sager. “By aligning the CIS Controls with the NIST CSF, we provide an ‘on-ramp’ to rapid security improvements for enterprises in a way that can be sustained, explained, and made part of the larger corporate risk management process.”

Read more at
http://www.infosecurity-magazine.com/news/nist-cis-security-frameworks-see/

BiometricsFor organizations considering biometrics as they move away from reliance on usernames and passwords, it’s important to remember that regulation of the personal information that such systems collect (fingerprint patterns, for instance) is becoming front and center for many governments. Fortunately, device-side matching of biometric data is a compelling approach to satisfy key privacy requirements, according to a white paper from PwC Legal and Nok Nok Labs comparing key privacy implications of on-device and on-server matching of biometric data. The protection of personal information like retinal scan or fingerprint identifiers becomes especially important in cross-border personal data transfers, as are the benefits of individual choice and control around such personal data.

Read more at
http://www.infosecurity-magazine.com/news/pwc-deviceside-biometrics-a-key-to/

FBI-TOR-Firefox-HackMozilla has filed a brief with a U.S. District Court asking the FBI to disclose the potential vulnerabilities in its Firefox browser that the agency exploited to unmask TOR users in a criminal investigation. Last year, the FBI used a zero-day flaw to hack TOR browser and de-anonymize users visiting child sex websites. Now, Mozilla is requesting the government to ask the FBI about the details of the hack so that it can ensure the security of its Firefox browser.TOR is an anonymity software that provides a safe haven to human rights activists, government, journalists but also is a place where drugs, child pornography, assassins for hire and other illegal activities has allegedly been traded.
 

 

Linux-KernelHow to Hack an Android device? It is possibly one of the most frequently asked questions on the Internet. Although it’s not pretty simple to hack Android devices and gadgets, sometimes you just get lucky to find a backdoor access. Thanks to Allwinner, a Chinese ARM system-on-a-chip maker, which has recently been caught shipping a version of Linux Kernel with an incredibly simple and easy-to-use built-in backdoor. Chinese fabless semiconductor company Allwinner is a leading supplier of application processors that are used in many low-cost Android tablets, ARM-based PCs, set-top boxes, and other electronic devices worldwide.

Read more at
http://thehackernews.com/2016/05/android-kernal-exploit.html

 

Facebook-Capture-the-flag-ctfHacking into computer, networks and websites could easily land you in jail. But what if you could freely test and practice your hacking skills in a legally safe environment? Facebook just open-sourced its Capture The Flag (CTF) platform to encourage students as well as developers to learn about cyber security and secure coding practices.Capture the Flag hacking competitions are conducted at various cyber security events and conferences, including Def Con, in order to highlight the real-world exploits and cyber attacks. The CTF program is an effective way of identifying young people with exceptional computer skills, as well as teaching beginners about common and advanced exploitation techniques to ensure they develop secure programs that cannot be easily compromised.

 

OpenSSL-Vulnerability
OpenSSL has released a series of patches against six vulnerabilities, including a pair of high-severity flaws that could allow attackers to execute malicious code on a web server as well as decrypt HTTPS traffic. OpenSSL is an open-source cryptographic library that is the most widely being used by a significant portion of the Internet services; to cryptographically protect their sensitive Web and e-mail traffic using the Secure Sockets Layer (SSL) or Transport Layer Security (TLS) protocol. One of the high-severity flaws, CVE-2016-2107, allows a man-in-the-middle attacker to initiate a “Padding Oracle Attack” that can decrypt HTTPS traffic if the connection uses AES-CBC cipher and the server supports AES-NI. A Padding Oracle flaw weakens the encryption protection by allowing attackers to repeatedly request plaintext data about an encrypted payload content. The Padding Oracle flaw (exploit code) was discovered by Juraj Somorovsky using his own developed tool called TLS-Attacker, which allows developers to test their TLS servers with specific TLS messages.

Read more at
http://thehackernews.com/2016/05/openssl-vulnerability.html

Protecting-WiFi

Wireless Networking (Wi-Fi) has made it very convenient for anyone to access the Internet via a computer, mobile phone, tablet, or other wireless device anywhere within range of a network’s signal. Every day thousands of people purchase a wireless router and attach it to their home networks. Most wireless routers are shipped with a default network name, default username and password, and no security settings enabled. This allows almost anyone to configure and setup their network within a matter of minutes. However, before connecting to the wireless network, the wireless router needs to be made as secure as possible to prevent unauthorized access.

Read more at
http://bit.ly/1SYSVOo

EncryptionGoogle is boosting the security of its Gmail service in an effort to keep them protected from phishing attacks, malware, and other threats.

On Tuesday, the company announced that it would start informing users about potentially unsafe messages in their inbox, including emails that are not encrypted, Gerhard Eschelbeck, VP, Security and Privacy, Google, explains in a blog post. Additionally, Gmail will warn users when sending messages to recipients on email services that do not support TLS encryption. A warning will be displayed when the sender’s domain couldn’t be authenticated as well, the Internet giant explains. The warnings will appear in the form of a broken lock icon when sending or receiving a message to/from a service that doesn’t support TLS encryption, or as a question mark where a profile photo or logo should otherwise appear, when receiving a message that can’t be authenticated.

Read more at
http://www.securityweek.com/google-enhances-security-alerts-gmail

US-Military-Cyber-SecurityThe US military’s secretive Cyber Command (CYBERCOM) is working to destroy the Islamic State group’s Internet connections and leave the jihadists in a state of “virtual isolation,” Pentagon chiefs said Thursday.

In what he described as the command’s “first major combat operation,” Defense Secretary Ashton Carter said CYBERCOM is playing an important role in the US-led military operation against the IS group in Iraq and Syria. “The objectives there are to interrupt ISIL command and control, interrupt its ability to move money around, interrupt its ability to tyrannize and control population, interrupt its ability to recruit externally,” Carter told lawmakers at a Senate Armed Services Committee meeting, using an acronym for the IS group. “We’re bombing them, and we’re going to take out their Internet and so forth as well. Carter’s top military advisor General Joe Dunford, who is Chairman of the Joint Chiefs of Staff, said the goal was to cut off the jihadists’ lines of communication. “The overall effect we’re trying to achieve is virtual isolation. And this complements very much our physical actions on the ground, and the particular focus is external operations that might be conducted by ISIL,” Dunford said.

Read more at
http://www.securityweek.com/pentagon-working-take-out-islamic-states-internet

Ransomaware-virus-Shuts-Down-ElectricRansomware has become an albatross around the neck, targeting businesses, hospitals, and personal computers worldwide and extorting Millions of Dollars. Typical Ransomware targets victim’s computer encrypts files on it, and then demands a ransom — typically about $500 in Bitcoin — in exchange for a key that will decrypt the files. Guess what could be the next target of ransomware malware? Everything that is connected to the Internet.There is a huge range of potential targets, from the pacemaker to cars to Internet of the Things, that may provide an opportunity for cybercriminals to launch ransomware attacks. Recently, the American public utility Lansing Board of Water & Light (BWL) has announced that the company has become a victim of Ransomware attack that knocked the utility’s internal computer systems offline.

Read more at
http://thehackernews.com/2016/04/power-ransomware-attack.html

FBI-Hack-any-Computer
The Federal Bureau of Investigation (FBI) can now Hack your computers anywhere, anytime.
The FBI appeared to have been granted powers to hack any computer legally across the country, and perhaps anywhere in the world, with just a single search warrant authorized by any United States judge. The U.S. Supreme Court approved yesterday a change in Rule 41 of the Federal Rules of Criminal Procedure that would let U.S. judges issue warrants for remote access to electronic devices outside their jurisdiction.

cfa8c851-83d4-42df-9adb-3d388cef005e

The federal government will lean heavily on the private sector to help it deliver its long-awaited national cyber security policy and initiatives like voluntary infosec health checks for businesses and joint threat sharing centres in capital cities. iTnews can exclusively reveal the policy, which is expected to be released in the coming weeks, will contain five key pillars intended to help Australia grow by embracing disruptive technologies from a secure footing in all areas of the economy. The 46-page strategy, sighted by iTnews, is the first update to Australia’s national cyber security policy since 2009. Businesses and government agencies have been awaiting the updated document since late 2014, when then-PM Tony Abbott announced a review of the ageing strategy.

Read more at
http://www.itnews.com.au/news/revealed-australias-new-cyber-security-strategy-418000

Swift-Software-ExploitedA bug in SWIFT banking software may have been exploited to allow hackers to make off with $81 million from Bangladesh’s central bank in February, according to reports. Investigators at British defense contractor BAE Systems told Reuters that the malware in question, evtdiag.exe, had been designed to change code in SWIFT’s Access Alliance software to tamper with a database recording the bank’s activity over the network. That apparently allowed the attackers to delete outgoing transfer requests and intercept incoming requests, as well as change recorded account balances – effectively hiding the heist from officials. The malware even interfered with a printer to ensure that paper copies of transfer requests didn’t give the attack away. It’s thought that the malware was part of a multi-layered attack and used on the SWIFT system once Bangladesh Bank admin credentials had been stolen. Although it was written specifically for this attack it could be repurposed for similar attacks in the future, BAE claimed.

Read more at
http://www.infosecurity-magazine.com/news/swift-software-exploited/

FBI-Unmask-TOR-UsersDo you know who created malware for the FBI that allowed Feds to unmask Tor users?
It’s an insider’s job… A former Tor Project developer. In an investigation conducted by Daily Dot journalists, it turns out that Matthew J. Edman, a former part-time employee of Tor Project, created malware for the Federal Bureau of Investigation (FBI) that has been used by US law enforcement and intelligence agencies in several investigations, including Operation Torpedo. Matthew Edman is a computer scientist who specializes in cyber security and investigations and joined the Tor Project in 2008 to build and enhance Tor software’s interactions with Vidalia software, cross-platform GUI for controlling Tor. After 2009, Matthew was hired by a contractor working for defense and intelligence agencies, including the FBI, to develop an anti-Tor malware.

Read more at
http://thehackernews.com/2016/04/tor-unmask-malware.html

 

Anonymous-Web-Surfing-Surf-AnonymouslyFacebook has hit another Milestone: More than 1 MILLION people, or you can say privacy conscious, are accessing Facebook over TOR. Facebook proudly announced today that, this month, for the first time, the people connected to the anonymous version of Facebook that’s accessible only through the TOR anonymity network exceeded 1 Million – an increase of almost 100% in the past ten months.