Author: Disini & Disini Law Office

Millions of Android and iOS devices affected by Broadpwn Bug

Earlier this month, security researcher Nitay Artensen discovered an Android bug that allows hackers to execute code on Android and iOS devices without needing any interaction from the user. Nicknamed “Broadpwn”, the vulnerability affects millions of Android and iOS users with Broadcom Wi-Fi chips in their devices. Google released a fix for the issue last July 5 after receiving a private report from Artenstein. Artenstein will hold a presentation this August at the Black Hat USA security conference in Las Vegas where he will be discussing Broadpwn and the risks from Broadcom Wi-Fi chips, specifically the Broadcom BCM43xx family.

Father of World Wide Web Greenlights Anti-Piracy Locks on Web Content

Inventor of the World Wide Web, Sir Tim Berners-Lee, has expressed support for the implementation of  anti-piracy mechanisms for online content. Web technology has traditionally been open, allowing anybody to view and reuse code. However, tech companies including Apple, Google, and Microsoft have continuously lobbied for the implementation of Data Rights Management (DRM) schemes to protect their content. An API called Encrypted Media Extensions provides the ability to support a simple set of content encryption. The application controls license exchange and allows authors to put authentication and authorization functions. John Sullivan, Executive director of the Free Software Foundation, expresses his […]

Cybersecurity Company Stocks Soar in the Wake of Cyber Assaults

A cyber assault on Mondelez International, an American multinational food and beverage company rallied stock prices of cybersecurity firms such as Barracuda, Palo Alto Networks, and FireEye on Friday. The Illinois-based snack and drink company reported an attack on June 27 that affected its invoicing and shipping capacities. Mondelez admitted that the cyber assault cost them about 3% off their revenue growth rate for the second quarter. According to Keybanc, 2016 was already a record year for data breaches and cyber assaults. A report to their clients showed a 35% increase in business ransomware, a 58% rise in Distributed Denial […]

Russian Politician Advises Russia’s Central Bank to Follow Japan in Legalizing Digital Currencies

Politician, billionaire, and Presidential Commissioner for Entrepreneur’s Rights Boris Titov has urged Russia’s Central Bank to regulate cryptocurrencies such as bitcoin and ether. In his letter to the bank’s head, he pointed out Japan’s use of digital currency as payment, rather than money, and outlined how the regulations would be applicable to Russia. In Japan, cryptocurrency exchanges have to be registered with the government and adhere to strict anti-money laundering (AML) and Know Your Customer (KYC) procedures. They are also subject to regular audit, and sales of digital currency are also VAT-free. Last May, Deputy of the Russian Central bank […]

Music Piracy is Now Done via “Stream-Ripping”

A study by the Intellectual Property Office and PRS for Music found out that “stream-ripping” is rapidly becoming the most popular way of pirating music in the United Kingdom. Stream-ripping sites copy and distribute illegally “tens, or even hundreds of millions of tracks” monthly, as claimed by record labels. The research also revealed that 15% of adults in UK regularly use the service. Out of that number, 33% come from the 16-24 age bracket. IPO’s Chief Economist Pippa Hall says that pirates are quick to find innovative infringement tactics to new piracy solutions. A single service is believed to service […]

Bitcoin Users at Risk with New Blockchain.info Phishing Email

Another round of phishing emails are being circulated, targeting Bitcoin users. In the past, multiple companies have succumbed to phishing attacks from anonymous cyber criminals. Blockchain.info is a platform that has been a favorite target that has received a number of phishing attempts in the last few years. The new phishing email tells its recipients that they need to download a backup of their blockchain.info wallet, then asks them to run an attachment named “backup wallet.pdf.exe” which infects the user’s computer. It remains unclear how the perpetrators get the email addresses of Bitcoin users. Some reports say that the emails could […]

Qualcomm says Apple Infringed Six iPhone & iPad Patents

Qualcomm Inc is asking the U.S International Trade Commission to prevent Apple from selling certain iPhones and iPads in the United States, claiming that these units use chips created by their competitor Intel Corp (INTC.O) that infringes up to six Qualcomm patents. Qualcomm is also requesting the U.S ITC to ban the importation of said Apple devices. The San Diego-based chip company filed another related lawsuit on Thursday in a California court, demanding monetary damages. In a related statement, Apple accused Qualcomm of unfairly adding a tax on Apple devices using their chips. Animosity between the two companies started to […]

Twitter Surveillance Lawsuit Moves Forward

Last Thursday, a US judge allowed Twitter Inc to move forward with a lawsuit that aims to end legal limits on information that tech companies are asked to provide in relation to national security. The tech company says that it seeks for “more transparency under the First Amendment”, and that they want technology companies to be allowed to speak openly about surveillance requests from the United States’ government. Oakland California U.S District Judge Yvonne Gonzalez Rogers cites in a statement that a failure of the U.S government to prove “clear and present danger” to justify the restraints on Twitter’s constitutional […]

Master Decryption Key for Original Petya Ransomware Released

Janus Cybercrime Solutions, the author of the original Petya ransomware, released the master decryption key for all previous Petya versions earlier this week. The person/group uploaded the master key as an encrypted file on Mega.nz and tweeted it last Wednesday. It claims to decrypt all Petya family ransomwares including the First Petya, Second Petya/ Mischa ransomware, and Third Petya/GoldenEye ransomware. The key does not decrypt NotPetya. Security researcher Anton Ivanov of Kaspersky Lab has tested and confirmed the key’s authenticity. However, it will only help those who have a copy of their encrypted data.   Source: The Bleeping Computer

Cyber Threat Targeting Germany Worse Than Expected

Last Friday, Germany’s BSI federal agency revealed that the recent cyber attacks that crippled the operation of several German firms for a week had been greater than expected.   Experts studies showed that a number of the attacks had been delivered via infected software updates of accounting software M.E.Doc since  April. Even as Germany is considered to have “gotten off lightly”, the country still incurred millions of euros in damages from the attack, said BSI President Arne Schoenbohm. The German government is still investigating the origin of the virus and has not yet confirmed Russia’s involvement in the attack, as […]