Author: Disini & Disini Law Office

WannaCry Attackers Cashes Out Bitcoin Earnings

WannaCry Attackers Cashes Out Bitcoin Earnings

Hackers responsible for the infamous global WannaCry ransomware attack were reported to have withdrawn their Bitcoin ransom payments last Thursday. The global outbreak affected over 300,000 computers from organizations throughout China, Europe, Russia, and America. It infected systems and locked out users from their programs, extorting payments in exchange for system access. Since the outbreak in May, wallets with the extorted payments were left uncashed by attackers. However, after changes in Bitcoin value resulted in $140,000 worth of cryptocurrency, the wallets began to get empty. The widespread attack may have infected thousands of computers, but a flaw in its makeup […]

Facebook to Improve Fact-Checking and Hoax Detection in the Fight Against Fake News

Facebook to Improve Fact-Checking and Hoax Detection in the Fight Against Fake News

Berlin — Social media giant Facebook vows to take better measures against fake news by sending suspected fake articles to outsourced fact-checkers and will only publish their findings after the material has been verified. According to Facebook, they will be using intelligent machine learning technology to identify malicious hoax articles, which will then be forwarded to qualified fact checkers for verification of its sources. In recent years, the social media network has gone under fire for being used as a platform for widespread fake articles. This includes possibly affecting votes during the 2016 U.S. presidential election. In Europe, Germany plans […]

Mozilla Launches Three New Experimental Applications for User Review

Mozilla Launches Three New Experimental Applications for User Review

Developers at Mozilla have released three new exploratory features through its Test Pilot program, enabling users to check new applications through a specialized add on. Once a feature gets a good rating, it will be part of the Firefox core. The new applications are called Send, Voice Fill, and Notes. The platform also has other features like Pulse, Page Shot, SnoozeTabs, and Activity Stream. Send is a new file-sharing program that allows users to drag and share encrypted files. It gives a URL that can only be downloaded once before it is removed from the system. Voice Fill is the […]

McAfee-based Security Experts Reveal TCU Flaw in Vehicles Infiniti, Ford, BMW

McAfee-based Security Experts Reveal TCU Flaw in Vehicles Infiniti, Ford, BMW

Last Tuesday, security experts from McAfee’s Advanced Threat Research Team discovered some security flaws in a couple of luxury vehicle models, specifically in the built-in telematics control units (TCUs) of various car models. Affected high-end vehicles include units manufactured by Ford, Nissan, BMW, and Infiniti. The Department of Homeland Security (DHS) also released an alert listing which car models had flawed TCUs. TCUs are modems with 2G networks that connect vehicles to mobile apps, online panels, and various remote setting tools. Experts explained that attackers can exploit one TCU flaw via remote access, and the other by directly tampering with […]

Netflix Releases Tools That Can Detect Flawed APIs Prone to DDoS Attacks

Netflix Releases Tools That Can Detect Flawed APIs Prone to DDoS Attacks

Earlier this week, Netflix was reported to have posted public information and source codes that can help defenders in finding weak application program interfaces (APIs) that could be exploited by hackers to run distributed denial of service (DDoS) attacks. Netflix security engineers caution users that intruders can start taking advantage of application layer attacks because these widespread systems depend on microservices architecture, running independent applications that communicate with other services. In the Def Con convention last week, Netflix security engineers Bryan Payne and Scott Behrens explained that microservice architectures have APIs that are likely to send a single request to […]

Interpol and Group-IB Identify Pro-ISIS Hacking Group

Hackers running pro-ISIS organization United Islamic Cyber Force (UICF) have been uncovered by Interpol in collaboration with Russian cybersecurity firm Group-IB. The UICF had been orchestrating numerous disruptive hacktivist campaigns since January 2014. They have targeted organizations such as Operation Free Palestine, OpIndia, and the TV5Monde television network. Group-IB reported they traced UICF members’ usernames to people residing in India, Pakistan, Algeria, Kosovo, Indonesia, and Morocco. The hacking group is said to have had around 40 members who appear to be young, impressionable adults with limited experience. Group-IB found their websites with their actual names. Moreover, the hackers are not […]

Slow Start for Bitcoin Cash After August 1 Blockchain Split

Slow Start for Bitcoin Cash After August 1 Blockchain Split

Reports last Wednesday revealed that it took almost 6 hours to mine the first batch of Bitcoin Cash following the recent forking to create the blockchain split. This spells a notably slow start for the new cryptocurrency, which is said to have very few miners contributing to its mining operation.   According to the managing director of trading site eToro, the Bitcoin Cash’s sluggish progress is likely due to the low number of miners supporting the new currency. However, Bitcoin Cash blockchain co-founder Jeff Garzik assured traders that less computing power will eventually be needed to mine new blocks, which […]

Apple Shares Soar After Exceeding Quarterly Estimates

Apple Shares Soar After Exceeding Quarterly Estimates

Apple reached its highest trading shares on Wednesday’s opening, rising at 6.42% to around $159.69 in Q3. After decreasing sales running for 13 quarters, the tech giant finally reversed the trend, with the  notable surge in earnings attributed to booming MAC and iPad product sales, with 14% more iPads successfully sold this year. Wall Street predicted the tech giant would only sell $1.57 per share with a total revenue of $44.95 billion. However, results overcame analysts’ expectations when the Apple obtained a revenue of $45.4 billion at $1.67 per share. Following this development, investors are said to anticipate when the […]

UK Home Secretary Says Encryption is Problematic, Militant Content Should Be Banned

UK Home Secretary Says Encryption is Problematic, Militant Content Should Be Banned

In a report last Tuesday, UK Home Secretary Amber Rudd stated that use of encrypted messaging had become problematic in the wake of recent terror attacks. Rudd informed major tech companies like Facebook, Google, and Microsoft during the first Global Internet Forum to Counter Terrorism in San Francisco that militant content must not be uploaded online in any way. This entails blocking suspicious extremist content before it’s sent. She also explains that encryption is an issue for authorities because they cannot access implicating information without warrants. She said companies must also voluntarily give messages’ metadata to authorities. However, privacy rights […]

Expert Warns IoT-based Servers Without Encrypted Passwords Can Be Disastrous

Expert Warns IoT-based Servers Without Encrypted Passwords Can Be Disastrous

Last Monday, a report detailed how IOActive senior security expert Lucas Lundgren could easily open prison locks and modify pacemakers by exploiting MQTT protocols in IoT-based servers that are not secured with encrypted passwords. MQTT is a common messaging function in online IoT-based smart devices and sensors that use low bandwidth to communicate. It is found in online equipment such as industrial systems, electronic billboards, gauges, prison cell locks, and even medical devices. Lundgren said exposure to threats increase because many IoT servers lack the proper commands like encrypted usernames or passwords to stop attackers. According to his port scans, […]