What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
grahamcluley.webp 2016-09-01 14:41:07 \'Identity and access management solution without compromise\' is compromised (lien direct) OneLogin describes itself as the "identity and access management (IAM) solution without compromise." Which means it must be OneLogin's very worst nightmare to discover that it has itself been compromised. It appears that a hacker was able to view "Secure Notes" updated by OneLogin users between 25 July and 25 August 2016, because of a bug that was exploited after a hacker gained access to the company's systems after stealing a OneLogin employee's password. Security staff at the identity management firm say no other systems have been affected. OneLogin says that the issue has impacted a "small subset" of its customers, but that's really beside the point. Damage has been done to the company's reputation, and when a company has actively promoted itself for so long as a solution for securing enterprise data it will take a long time before clients and prospective customers forget about their security snafu. More details can be found in OneLogin's blog post.
grahamcluley.webp 2016-09-01 09:26:10 OS X malware spread via signed Transmission app... again (lien direct) Transmission app thumbFor the second time this year, the Transmission BitTorrent client has been compromised. David Bisson reports.
grahamcluley.webp 2016-08-31 11:50:48 Millions of Dropbox users are being advised to change their passwords (lien direct) Millions of Dropbox users are being advised to change their passwordsYes, hackers did manage to steal millions of account credentials back in 2012. Make sure you have protected your account, and enabled two-step verification.
grahamcluley.webp 2016-08-31 09:47:34 I went on holiday. Hackers didn\'t. (lien direct) I went on holiday. Hackers didn't.Here are some of the security stories I didn't write about...
grahamcluley.webp 2016-08-25 09:15:48 Practical steps for strengthening your company\'s password rules (lien direct) Practical steps for strengthening your company's password rulesIf we can build better rules for acceptable passwords, we can do a better job of protecting users' privacy and confidential company databases. Read more in my article on the Bitdefender Business Insights blog.
grahamcluley.webp 2016-08-23 01:25:22 DetoxCrypto ransomware-as-a-service rears its ugly head (lien direct) Ransom thumbPokémon-friendly ransomware has monstrous intentions. David Bisson reports.
grahamcluley.webp 2016-08-22 13:33:29 Wikipedia\'s Jimmy Wales didn\'t die this weekend, despite what his hacked Twitter account said (lien direct) Wikipedia's Jimmy Wales didn't die this weekend, despite what his hacked Twitter account saidNo, Jimmy Wales, founder of Wikipedia, isn't dead. But his Twitter *did* get hacked. Read more in my article on the Hot for Security blog.
grahamcluley.webp 2016-08-22 12:00:34 Smart IoT socket suffers from dumb security vulnerabilities (lien direct) Smart IoT socket suffers from dumb security vulnerabilitiesResearchers have come across flaws in an internet-enabled power socket as part of their ongoing efforts to raise awareness about IoT security. David Bisson reports.
grahamcluley.webp 2016-08-22 11:56:23 Now WikiLeaks is distributing malware (lien direct) Veteran anti-virus researcher Vesselin Bontchev has discovered that there are thousands of samples of malware available for download from the WikiLeaks website. The malware found by Bontchev is found in a large tranche of emails leaked from AKP, a Turkish political party. Bontchev writes: Since many of the AKP members have been recipients of malware sent by e-mail (most likely random spam but could have also been targeted attacks), the received malware in the e-mails is also present in the dump. As a result, the Wikileaks site is hosting malware. For the record, I consider this to be extremely irresponsible from the part of Wikileaks. Malware distribution is not "journalism" by any definition of the term. Bontchev found 3277 malicious files on the WikiLeaks site, accessible to anyone on the internet via a single click. Of course, it's perfectly possible that the true number of malware samples published on the WikiLeaks site is much larger than this. Bontchev's focus so far has been on one particular email dump, and used the VirusTotal service to determine if a file was identified as malicious or not. Furthermore, one cannot discount the possibility that some of the email dumps published by WikiLeaks contain targeted attacks that are not presently detected by any anti-virus product. WikiLeaks has been criticised before for its unwillingness to curate the leaked information that it leaks - by, amongst others, no less than Edward Snowden. Anti-virus industry old-timers like me and Bontchev are left with our heads in our hands when we hear that WikiLeaks is apparently making no efforts whatsoever to prevent its readers from encountering malware samples.
grahamcluley.webp 2016-08-19 14:19:47 New firmware update? No, it\'s the devious Marcher Android trojan up to no good (lien direct) Macher thumbThe Marcher trojan has come up with a new way to infect Android users: pose as a fake firmware update. David Bisson reports.
grahamcluley.webp 2016-08-18 15:49:36 Following data breach, Sage employee arrested at Heathrow airport (lien direct) City of London Police arrested a 32-year-old woman at Heathrow airport yesterday on "suspicion of conspiracy to defraud". According to police, the arrested woman is a current employee of Sage. Sage made the headlines earlier this week after the online accounting and payroll company announced it had suffered a data breach, putting the details of approximately 280 UK and Irish companies at risk. Sage described this as a "small number" of their customers. And it is a small percentage, considering over half a million British businesses are thought to be using Sage's payroll software. But, of course, that's little consolation if you're one of the customers whose data was put at risk by the breach. And the number alone doesn't tell us anything about the size of the companies affected, or how many employees of those companies could also potentially have had their identities and financial details put in danger. Police say that the woman arrested at Heathrow airport has been released on bail. Sage said that an internal login had been used to access the sensitive information. It's worth underlining that the woman arrested has not been charged with any offence, let alone convicted... but this might be a timely reminder for all businesses to not focus solely on external attackers over the internet but recognise that there can also be considerable dangers posed by insiders if your workforce turns rogue.
grahamcluley.webp 2016-08-18 14:53:08 Why do we ignore up to 90% of computer security alerts? Because we\'re terrible at multi-tasking… (lien direct) Why do we ignore up to 90% of computer security alerts? Because we're terrible at multi-tasking…Interrupting security pop-ups are ineffective, researchers claim after studying brain activity. Read more in my article on the State of Security blog.
grahamcluley.webp 2016-08-18 12:47:36 Bitcoin website suspects it will be targeted by state-sponsored hackers, warns users (lien direct) Bitcoin website suspects it will be targeted by state-sponsored hackers, warns usersBitcoin users are once again being spooked by security fears. Read more in my article on the Hot for Security blog.
grahamcluley.webp 2016-08-18 10:51:48 A new low! SMS scammers prey on parents\' fears to make a few bucks (lien direct) A new low! SMS scammers prey on parents' fears to make a few bucksFraudsters are sending fake SMS messages to parents, purporting to be about a terrible car accident involving their children. David Bisson reports.
grahamcluley.webp 2016-08-17 12:19:53 Beware bogus blue verified checkmark scams on Twitter (lien direct) Beware bogus blue verified checkmark scams on TwitterScammers are exploiting Twitter users' desire to get their accounts "verified" - take care what you click on! Read more in my article on the Hot for Security blog.
grahamcluley.webp 2016-08-16 14:41:38 Pokémon Go for Windows? Beware ransomware! (lien direct) Pokémon Go for Windows? Beware ransomware!Ransomware disguises itself as a version of Pokémon Go for Windows in an attempt to lure unsuspecting game players. David Bisson reports.
grahamcluley.webp 2016-08-16 08:16:39 A simple way to kill off Twitter trolls (lien direct) @th3j35t3r writes on his blog: Simply put. If Jim is blocked by John, Jim can no longer even utter Johns handle/twittername in a tweet. If he attempts to the tweet simply doesn't process or gets sinkholed. Period. The end. Forever, or until John unblocks him. This approach would not infringe on Jim's 'freedom of speech', he can still say whatever he likes, but he can't include John. This approach would be self-policing essentially allowing users to decide if they are being abused or harassed and allowing them to take immediate actions without relying on Twitter to minimize the problem effectively. This approach would not be an overhead on Twitters current infrastructure and would require NOTHING by way of extra storage capacity. Trolls are the ugly side of Twitter, but @th3j35t3r's proposal seems very elegant to me. So how about it Twitter? Find out more, and check out his amusing flowchart, by reading @th3j35t3r's blog post.
grahamcluley.webp 2016-08-15 12:23:59 Someone seems to be trying to spy on VeraCrypt\'s security audit (lien direct) At the start of this month OSTIF (the Open Source Technology Improvement Fund) announced that it had agreed a plan to get the open source disk encryption tool VeraCrypt independently audited. The audit, which would look for security holes and weaknesses in VeraCrypt's code, would be done in co-ordination with vulnerability researchers from QuarksLab. So far, so good. Especially as you may remember that VeraCrypt's predecessor, TrueCrypt, was mysteriously discontinued a couple of years back leading to all manner of conspiracy theories. Now, the bad news... OSTIF says that its confidential PGP-encrypted communications with QuarkLabs about the VeraCrypt security audit may be being mysteriously intercepted: We have now had a total of four email messages disappear without a trace, stemming from multiple independent senders. Not only have the emails not arrived, but there is no trace of the emails in our “sent” folders. In the case of OSTIF, this is the Google Apps business version of Gmail where these sent emails have disappeared. This suggests that outside actors are attempting to listen in on and/or interfere with the audit process. We are setting up alternate means of encrypted communications in order to move forward with the audit project. If nation-states are interested in what we are doing we must be doing something right. Right? Let the speculation begin... Guideline ★★★★★
grahamcluley.webp 2016-08-12 14:21:06 How to protect yourself from mobile ID theft (lien direct) Mobile fraudp thumbAn emerging form of ID theft has recently surfaced over in the United States - involving your mobile phones. Yasin Soliman reports.
grahamcluley.webp 2016-08-12 07:59:29 Hacked Instagram accounts seducing users with adult dating spam (lien direct) Hacked Instagram accounts seducing users with adult dating spamYour Instagram account could have been spiced up by spammers.David Bisson reports.
grahamcluley.webp 2016-08-11 07:25:40 Almost all cars sold by VW Group since 1995 at risk from unlock hack (lien direct) Wired writes:Later this week at the Usenix security conference in Austin, a team of researchers from the University of Birmingham and the German engineering firm Kasper & Oswald plan to reveal two distinct vulnerabilities they say affect the keyless entry systems of an estimated nearly 100 million cars. One of the attacks would allow resourceful thieves to wirelessly unlock practically every vehicle the Volkswagen group has sold for the last two decades, including makes like Audi and Skoda. The second attack affects millions more vehicles, including Alfa Romeo, Citroen, Fiat, Ford, Mitsubishi, Nissan, Opel, and Peugeot.The researchers are led by University of Birmingham computer scientist Flavio Garcia, who was previously blocked by a British court, at the behest of Volkswagen, from giving a talk about weaknesses in car immobilisers.At the time Volkswagen argued that the research could "allow someone, especially a sophisticated criminal gang with the right tools, to break the security and steal a car." That researchers finally got to present their paper a year ago, detailing how the Megamos Crypto system – an RFID transponder that uses a Thales-developed algorithm to verify the identity of the ignition key used to start motors – could be subverted.The team's latest research doesn't detail a flaw that in itself could be exploited by car thieves to steal a vehicle, but does describe how criminals located within 300 feet of the targeted car might use cheap hardware to intercept radio signals that allow them to clone an owner's key fob.The researchers found that with some "tedious reverse engineering" of one component inside a Volkswagen's internal network, they were able to extract a single cryptographic key value shared among millions of Volkswagen vehicles. By then using their radio hardware to intercept another value that's unique to the target vehicle and included in the signal sent every time a driver presses the key fob's buttons, they can combine the two supposedly secret numbers to clone the key fob and access to the car. "You only need to eavesdrop once," says Birmingham researcher David Oswald. "From that point on you can make a clone of the original remote control that locks and unlocks a vehicle as many times as you want."Sounds to me like it's time to turn to the car manufacturers to ask what on earth they are going to do to fix the millions of potentially vulnerable vehicles they have sold in the last couple of decades.Read more, including the researcher's paper, on Wired.
grahamcluley.webp 2016-08-10 15:29:50 Microsoft rushes to fix issue that unlocks devices protected by Secure Boot (lien direct) Secure boot golden key thumbMicrosoft is scrambling to fix an issue that unlocks Windows tablets, phones, and other devices protected by Secure Boot.David Bisson reports.
grahamcluley.webp 2016-08-10 09:54:54 Microsoft says patch your Windows PCs now against critical security vulnerabilities (lien direct) Microsoft says patch your Windows PCs now against critical security vulnerabilitiesDon't rest on your laurels. Critical security vulnerabilities have been discovered, so patch your vulnerable computer systems now.Read more in my article on the We Live Security blog.
grahamcluley.webp 2016-08-09 18:28:47 Project Sauron stands on the shoulders of past state-sponsored malware (lien direct) Sauron thumbAs government agencies, military organisations, telecom firms, and financial institutions are targeted, the obvious question to ask is - who is behind the attacks?
grahamcluley.webp 2016-08-08 22:33:29 19-year-old wins one million airmiles after finding United Airlines bugs (lien direct) 19-year-old wins one million airmiles after finding United Airlines bugsVulnerability researcher Olivier Beg from Amsterdam has been handsomely rewarded with one million airmiles by United Airlines, after finding some 20 security holes in the company's software. ★★★
grahamcluley.webp 2016-08-08 15:39:54 Almost a billion devices may be at risk from QuadRooter Android flaw (lien direct) Uh-oh.Check Point researchers have warned of a security hole in the microchips used in almost a billion Android devices that - if exploited - could give hackers complete access:An attacker can exploit these vulnerabilities using a malicious app. Such an app would require no special permissions to take advantage of these vulnerabilities, alleviating any suspicion users may have when installing.The set of vulnerabilities, dubbed QuadRooter, disclosed during a session at Def Con in Las Vegas, and are present in Qualcomm chipsets used by many of the most popular Android devices, including:BlackBerry PrivBlackphone 1 and Blackphone 2Google Nexus 5X, Nexus 6 and Nexus 6PHTC One, HTC M9 and HTC 10LG G4, LG G5, and LG V10New Moto X by MotorolaOnePlus One, OnePlus 2 and OnePlus 3Samsung Galaxy S7 and Samsung S7 EdgeSony Xperia Z UltraIf left unpatched, the QuadRooter vulnerabilities could give attackers complete control of compromised devices, allow malicious hackers to access sensitive information, and plant malware.Check Point has released a free scanner app to help Android users know if their personal devices are at risk.In addition Check Point offers sensible advice in its blog post for Android users to apply the latest OS security updates (if they are made available, of course...), to be wary of installing apps from unknown sources, and to double-check that the permissions requested by Android apps are appropriate.
grahamcluley.webp 2016-08-08 09:18:02 How to spear-phish Twitter users with greater success (lien direct) Twitter spear phishing thumbA new automated spear-phishing framework maintained a success rate of between 30 percent and 66 percent among its targets on Twitter.David Bisson reports.
grahamcluley.webp 2016-08-05 12:26:09 iOS 9.3.4 released, fixing critical security hole. Update now (lien direct) iOS 9.3.4 released, fixing critical security hole. Update nowApple has released iOS 9.3.4, the latest versions of its mobile operating system for iPhone and iPad users, and owners of the devices are recommended to upgrade as soon as possible.Read more in my article on the Hot for Security blog.
grahamcluley.webp 2016-08-05 08:46:25 Earn up to $200,000 as Apple *finally* launches a bug bounty (lien direct) The Verge writes:Apple is planning a new bug bounty program that will offer cash in exchange for undiscovered vulnerabilities in its products, the company announced onstage at the Black Hat conference today. Launching in September, the program will offer cash rewards for working exploits that target the latest version of iOS or the most recent generation of hardware. It's the first time Apple has explicitly offered cash in exchange for those vulnerabilities, although the company has long maintained a tip line for disclosing security issues.Ivan Krstic, Apple's head of security engineering and architecture, made the announcement during a presentation at Black Hat on Thursday.The top reward comes for finding flaws in vulnerabilities in Apple's "secure boot" process, which if broken could seriously compromise security.As Hacker News reports, for now Apple's bug bounty program is invite-only - meaning that the only people likely to be ushered in are those who have a track record in finding exploitable flaws in the company's code. Hopefully things will loosen up over time, and from the sound of things they are open to adding others who come forward after finding critical vulnerabilities in key areas.Frankly, an Apple bug bounty is long overdue.Apple was looking incongruous in not offering a reward for security researchers who uncovered critical vulnerabilities in its products. After all, if you were a vendor you would rather have those who find security vulnerabilities in your products work with you rather than selling off their exploits to a third-party, wouldn't you?With a bug bounty in place, serious exploitable vulnerabilities are more likely to be responsibly disclosed to Apple, and users are more likely to be protected in a timely fashion.Good.
grahamcluley.webp 2016-08-04 22:51:17 Israeli security firm hacks ISIS forum, discloses future targets (lien direct) Israeli security firm hacks ISIS forum, discloses future targetsAn Israeli security company hacked an ISIS forum and disclosed where members of the terrorist organization might be planning future attacks.David Bisson reports.
grahamcluley.webp 2016-08-04 10:23:47 Does dropping malicious USB sticks really work? Yes, worryingly well... (lien direct) Does dropping malicious USB sticks really work? Yes, worryingly well...Good samaritans and skinflints beware!Plugging in that USB stick you found lying around on the street outside your office could lead to a security breach.Read more in my article on the Tripwire State of Security blog. Guideline
grahamcluley.webp 2016-08-03 16:14:05 Password changes for the sake of it don't improve security, says FTC technologist (lien direct) Password changes for the sake of it don't improve security, says FTC technologistA technologist with the Federal Trade Commission (FTC) argues frequent mandatory password changes don't actually improve security.David Bisson reports.
grahamcluley.webp 2016-08-03 11:36:40 Apple's lack of 2SV for Find My Phone nearly costs student his digital life (lien direct) Apple's lack of 2SV for Find My Phone nearly costs student his digital lifeA computer science graduate student who almost had his iPhone and Mac wiped by online criminals feels that Apple should do more to protect accounts.David Bisson reports.
grahamcluley.webp 2016-08-02 11:47:27 (Déjà vu) Car hacking at speed - where vulnerabilities turn from critical to fatal (lien direct) Car hacking at speed - where vulnerabilities turn from critical to fatalWhat car hacking researchers Charlie Miller and Chris Valasek have discovered is worrying enough. But it sends a shudder down the spine to even contemplate how much worse things could be. Read more in my article on the We Live Security blog.
grahamcluley.webp 2016-08-02 07:55:29 Advertisers could be tracking you via your battery status (lien direct) A legitimate reason to poll your battery's status is to stop intensive operations from executing if you're running low on juice.But it's also open to exploitation by those who want to track your online activity, writes Lukasz Olejnik:The information provided by the Battery Status API is not always changing fast. In other words, they are static for a period of time; it may give rise to a short-lived identifier. At the same time, users sometimes clear standard web identifiers (such as cookies). But a web script could analyze identifiers provided by Battery Status API, which could then possibly even lead to recreation of other identifiers. A simple sketch follows.An example web script continuously monitors the status of identifiers and the information obtained from Battery API. At some point, the user clears (e.g.) all the identifying cookies. The monitoring web script suddenly sees a new user - with no cookie - so it sets new ones. But battery level analysis could provide hints that this new user is - in fact - not a new user, but the previously known one. The script's operator could then conclude and reason that those this is a single user, and resume with tracking. This is an example scenario of identifier recreation, also known as respawning.A recent study [PDF] reported that battery status is being monitored by some tracking scripts.It sounds like it would be a positive step if browsers stopped accessing such detailed information about our battery.Aside from tracking, there are other ways that battery information could be exploited.Uber, for instance, says that it knows customers are more likely to accept a much higher price to hire a cab when their battery is running low. Guideline Uber
grahamcluley.webp 2016-08-02 00:06:47 The AdGholas malvertising network was using steganography, researchers reveal (lien direct) The AdGholas malvertising network was using steganography, researchers revealThe AdGholas malvertising network planted malicious ads on popular sites including The New York Times and The Verge.David Bisson reports.
grahamcluley.webp 2016-08-01 13:59:16 Secure email service GhostMail shutting down, in fear of being abused (lien direct) GhostMail, a site that offered "military encrypted and self-destructing email accounts", has announced that it is closing down:GhostMail in its current form will be closed down as per 1. of September 2016.Since we started our project, the world has changed for the worse and we do not want to take the risk of supplying our extremely secure service to the wrong people – it's simply not worth the risk.In general, we believe strongly in the right to privacy, but we have taken a strategic decision to only supply our platform and services to the enterprise segment.We hope you understand this decision and we refer to other free services available, as an alternative to our platform i.e. Protonmail.PRO users will be refunded and contacted directly.If we take GhostMail's statement at face value, one assumes that GhostMail is concerned that criminals and terrorists might abuse its services to hide their communications. As GhostMail has no way of perusing its customers' encrypted conversations it wouldn't know who would be up to no good, and who wouldn't.So, bad news for regular folks who were using GhostMail for their secure, private webmail (switching to alternatives like Protonmail, Neomailbox or Runbox sounds like a natural next step) but potentially the company might be able to offer a more focused offering for enterprise customers.If you are a GhostMail user make sure to download any messages from its servers that you wish to keep before 1st September.
grahamcluley.webp 2016-07-29 12:01:32 Would you risk running a VPN in the United Arab Emirates? (lien direct) Iain Thomson of The Register writes:A royal edict from the president of the United Arab Emirates (UAE) may have effectively made it illegal for anyone in the country to use a VPN or secure proxy service.Those caught could face jail time and fines of between 500,000 and 2,000,000 UAE dirham (US$136,130 and $544,521).The wording is ambiguous and technologically illiterate. Essentially, it seems, you are not allowed to use systems that hide the fact that you're committing a crime or covering one up. If you're routing your network traffic through a secure VPN or proxy server, you could be evading the eyes of the state while breaking a law, and that's now a big no-no.You could claim you were using the VPN or proxy for legit reasons, and that no criminal activity was being committed or concealed, but since your packets were encrypted, you may have a hard time proving your innocence.That certainly does sound like a bit of a pickle for businesses and individuals who want to use the internet safely while in the United Arab Emirates.You want to run VPN software to secure your communications, and keep your confidential information out of the hands of hackers sniffing data out of the air at public Wi-Fi hotspots, and beyond the grasp of over-reaching intelligence agencies. There are also plenty of people who have legitimate excuses for using the internet anonymously, and concealing their true identity.But let's take a closer look at the wording of this new legislation:Whoever uses a fraudulent computer network protocol address (IP address) by using a false address or a third-party address by any other means for the purpose of committing a crime or preventing its discovery, shall be punished by temporary imprisonment and a fine of no less than Dh500,000 and not exceeding Dh2,000,000, or either of these two penalties.The key thing to emphasise in the above is, I would argue, the words "for the purpose of committing a crime or preventing its discovery".Hopefully the UAE is planning to use this legislation to crack down on illegal activities on the internet, rather than those who use a VPN and other secure proxy services legitimately.But if you were to find yourself *forced* to reveal what you had been doing (to prove it wasn't illegal) well, you've just flushed your privacy down the lavatory.I would worry that we could find ourselves slipping into a situation where the very use of a VPN and encrypted communications is considered itself inherently suspicious, rather than sensible.
grahamcluley.webp 2016-07-28 17:13:23 Get Transcript IRS fraud lands married couple in prison (lien direct) Get Transcript IRS fraud lands married couple in prisonA married couple has received jail time for abusing the Internal Revenue Service's "Get Transcript" feature to commit fraud.David Bisson reports.
grahamcluley.webp 2016-07-28 09:10:55 How should businesses respond to the TechCrunch hack? (lien direct) How should businesses respond to the TechCrunch hack?The notorious OurMine hacking gang compromised the TechCrunch website. What lessons can other companies running WordPress learn from the security breach?Read more in my article on the Bitdefender Business Insights blog.
grahamcluley.webp 2016-07-27 22:20:26 Donald Trump asks for help from Russian hackers. Cher isn't happy (lien direct) Donald Trump asks for help from Russian hackers. Cher isn't happyCould this be Cybor Warfare? (sic)Donald Trump wonders out loud whether hackers might help him dig up some dirt on Hillary Clinton.
grahamcluley.webp 2016-07-27 11:50:43 LastPass security hole could have seen hackers steal your passwords (lien direct) Mathias Karlsson, a security researcher at Detectify Labs, writes:Stealing all your passwords by just visiting a webpage. Sounds too bad to be true? That's what I thought too before I decided to check out the security of the LastPass browser extension.In his article, Karlsson explains how he was able to trick LastPass into believing that it was on the real Twitter website, and cough up the users' credentials because of a bug in the LastPass password manager's autofill functionality.The same technique could have been used to steal passwords associated with other websites.Yeuch!The good news is that Karlsson believes in responsible disclosure, and so informed LastPass of the problem. In more good news LastPass fixed the issue in less than a day (and awarded Karlsson a $1,000 bug bounty for his efforts).Karlsson recommends that LastPass users disable the autofill functionality and enable multi-factor authentication for better security.Although his discovery is troubling, I agree with Karlsson when he points out that using a password manager is still better than reusing passwords on different websites.PS. Well-known vulnerability researcher Tavis Ormandy has also tweeted overnight that he has also found a flaw in LastPass. Details have not yet been made public, and LastPass is reportedly working with him on resolving the issue.PPS. Readers with good memories will recall that LastPass was acquired by LogMeIn last year to the concern of some. Overnight it has been announced that LogMeIn is itself being acquired by Citrix. LastPass
grahamcluley.webp 2016-07-26 19:57:07 SentinelOne says if you get hit by ransomware, it will pay the ransom (lien direct) SentinelOne writes:We've created the first ever Ransomware Cyber Guarantee – a warranty for our product's performance. It'll give you the best protection from ransomware attacks – and if we miss something and you get infected – we'll pay the ransom. It's that simple. And it's how security is supposed to be. If you can block something – why not guarantee it? Would you buy a new shiny car without manufacturer warranty?In other words, self-proclaimed "next generation endpoint security solution" SentinelOne says it's entirely comfortable paying money to criminals.Of course it's a marketing stunt, but still one - I must admit - that leaves a nasty taste in my mouth.Couldn't SentinelOne have just offered to throw in a decent backup program? ★★★★
grahamcluley.webp 2016-07-26 12:19:00 Three men charged for international cell phone fraud scheme (lien direct) Three men charged for international cell phone fraud schemeA federal judge has charged three men for their alleged participation in a sophisticated international cell phone fraud scheme.David Bisson reports.
grahamcluley.webp 2016-07-26 09:15:30 Get FREE threat intelligence on hackers and exploits with the Recorded Future Cyber Daily (lien direct) Get trending info on hackers, exploits, and vulnerabilities every day for FREE with the Recorded Future Cyber Daily [Sponsor]Graham Cluley Security News is sponsored this week by the folks at Recorded Future. Thanks to the great team there for their support!Recorded Future provides deep, detailed insight into emerging threats by automatically collecting, analyzing, and organizing billions of data points from the Web.And now, with its FREE Cyber Daily email all IT security professionals can access information about the top trending threat indicators - helping you use threat intelligence to help make better decisions quickly and easily.Which means that you will be able to benefit from a daily update of the following:Information Security Headlines: Top trending news stories.Top Targeted Industries: Companies targeted by cyber attacks, grouped by their industries.Top Hackers: Organizations and people recognized as hackers by Recorded Future.Top Exploited Vulnerabilities: Identified vulnerabilities with language indicating malcode activity. These language indicators range from security research ("reverse engineering," "proof of concept") to malicious exploitation ("exploited in the wild," "weaponized").Top Vulnerabilities: Identified vulnerabilities that generated significant amounts of event reporting, useful for general vulnerability management.Infosec professionals agree that the Cyber Daily is an essential tool:"I look forward to the Cyber Daily update email every morning to start my day. It's timely and exact, with a quick overview of emerging threats and vulnerabilities. For organizations looking to strengthen their security program with threat intelligence, Recorded Future's Cyber Daily is the perfect first step that helps to prioritize security actions." - Tom Doyle, CIO at EBI Consulting.So, what are you waiting for?Sign up for the Cyber Daily today, and starting tomorrow you'll receive the top trending threat indicators.
If you're interested in exclusively sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.
grahamcluley.webp 2016-07-25 13:01:04 Clash of Kings forum hacked, 1.6 million account details put at risk (lien direct) Clash of Kings forum hacked, 1.6 million account details put at riskVulnerable version of vBulletin thought to be responsible for data breach which could impact almost 1.6 million game players.Read more in my article on the We Live Security blog.
grahamcluley.webp 2016-07-25 10:05:52 Police 3D print murder victim's finger to unlock his phone (lien direct) Fusion reports:A man was murdered, and the police think there might be clues to who murdered him stored in his phone. But they can't get access to the phone without his fingerprint or passcode. So instead of asking the company that made the phone to grant them access, they're going another route: having the Jain lab create a 3D printed replica of the victim's fingers. With them, they hope to unlock the phone. The numerous media reports I've read about this case don't mention what type of smartphone the police are trying to break into, but my hunch is that it's an Android.There are some big differences between how iOS and Android devices implement fingerprint authentication, and some of the design decisions Apple made make the scenario described above highly unlikely.For instance, an iPhone or iPad will time out the fingerprint sensor every time the device is restarted or after 48 hours of inactivity, requiring you to enter your passcode instead. However, on Android 4.4 - 5.1.1 the fingerprint unlock *never* expires. Even with Android 6.0 Marshmallow, which adds an official fingerprint authentication API for the first time, I don't believe there are any set requirements for when the fingerprint unlock should expire.It seems to me that fingerprint security has been pretty sloppy generally on Android, with some smartphones even storing unencrypted images of users' fingerprints in a non-protected folder.
grahamcluley.webp 2016-07-22 10:19:34 SoakSoak using compromised websites to spread CryptXXX ransomware (lien direct) SoakSoak using compromised websites to spread CryptXXX ransomwareThe SoakSoak botnet is compromising business websites so that they redirect visitors to the Neutrino exploit kit and CryptXXX ransomware.David Bisson reports.
grahamcluley.webp 2016-07-21 12:55:12 Playstation chief Shuhei Yoshida has his Twitter hacked by OurMine (lien direct) Playstation chief Shuhei Yoshida has his Twitter hacked by OurMineShuhei Yoshida, the popular president of Sony Computer Entertainment's worldwide studios, appears to be the latest victim of the OurMine hacking gang, after his Twitter account was hijacked.Read more in my article on the Hot for Security blog.
grahamcluley.webp 2016-07-21 09:29:43 Drupalgeddon hits Warframe - nearly 800,000 gamers' account details being sold on the net (lien direct) Drupalgeddon hits Warframe - nearly 800,000 gamers' account details being sold on the net.Are you a fan of Warframe?Is so, Digital Extremes, the company behind the popular online game has some bad news for you.Read more in my article on the Tripwire State of Security blog.
Last update at: 2024-06-02 05:07:59
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter