Cybersecurity

Australia’s Anti-Encryption Law Still Allows for Backdoors, Expert Says

Australia’s Anti-Encryption Law Still Allows for Backdoors, Expert Says

In a blog post last week, University of Melbourne’s Dr. Chris Culnane said that Australia’s Assistance and Access Bill will not really prevent the creation of ‘backdoors’. Culnane, who is a lecturer at the university’s School of Computing and Information Systems, said that the bill will merely create an alternative entry point into a protocol or target system. He added that the bill contains a description of what sounds like a backdoor, albeit a ‘keyed’ backdoor. The bill will still have to undergo public consultation before being tabled in parliament. However, it is said that the government is expediting work […]

US, UK Fingers North Korea for NHS Malware Attack

US, UK Fingers North Korea for NHS Malware Attack

A North Korean man by the name of Park Jin Hyok has been charged by US prosecutors for his alleged involvement with the creation of a malware that was used in an attack on the UK’s National Health Service in 2017. Park Jin Hyok is also said to be a member of the Lazarus hacking group which is being blamed for hacking Sony Pictures in 2014. Park has been charged with one count of conspiracy to commit computer fraud and abuse, and wire fraud. Assistant Attorney General for National Security, John Demers, says that the scale and scope of the […]

Chrome, Firefox to Block Sites Using Symantec Certificates in October

Chrome, Firefox to Block Sites Using Symantec Certificates in October

Chrome and Firefox will be blocking user access to websites still using Symantec/DigiCert TLS certificates sometime this October when the latest version of the browsers will be released. Website owners still using Symantec, Thawte, GeoTrust and RapidSSL SSL/TLS certificates are urged to update immediately. DigiCert users can have theirs replaced for free and there are also other replacement options such as Comodo, Entrust, or Network Solutions. However, those seeking a replacement Google Chrome SSL/TLS certificate must have all their domains  revalidated and re-authenticates for Domain Validation (DV), Organization Validation (OV), or Extended Validation (EV) SSL Certificates. Source: ZDNet

Google Fixes Chrome WiFi Vulnerability

Google Fixes Chrome WiFi Vulnerability

Google said that Chrome version 6.9, which was released yesterday, includes a fix for a vulnerability which an attacker could exploit to steal a user’s WiFi logins. The flaw, called Wi-Jacking, was developed by UK security researcher Elliot Thompson of SureCloud. Thompson said that he was able to steal WiFi login data with the complex multi-step attack, which is something that Chrome does not handle in the first place. While the Opera browser is said to be susceptible to the attack as well, Firefox, Edge, and Internet Explorer are not affected.       Source: ZDNet

US Still Hosts the Most Number of Malicious Domains, New Report Says

US Still Hosts the Most Number of Malicious Domains, New Report Says

A new report from Palo Alto Networks’ Unit 42 says that the US still has the most number of domains serving web-based threats, and is currently the biggest source of exploit kits at  global level. The US was found to have been hosting 248 malicious domains in the second quarter of 2018, a drop from 257 in the first quarter. Aside from the US, top countries hosting the malicious URLs and distributing exploit kits are Russia, China, the Netherlands, and Australia. Source: Bleeping Computer

EU Security Researchers Find Banking Trojans on Google Play

EU Security Researchers Find Banking Trojans on Google Play

Security researchers from EU-based companies tweeted this week that a number of banking trojans and shady apps can still be found on Google Play. Lukas Stefanko from ESET said that he found three astrology apps that had the functionality to steal and send SMS, steal callLogs and banking credentials, and download and install apps. Meanwhile, Nikolaos Chrysaidos of Avast discovered five malicious apps that claimed to improve the performance of the user’s device, but were part of a banking malware campaign that was identified in the first week of August. Source: Bleeping Computer

Researchers Develop New Technique to Steal Unlock Patterns

Researchers Develop New Technique to Steal Unlock Patterns

Researchers from UK’s Lancaster University and Linköping University in Sweden have developed a new technique called SonarSnoop which can be used to steal unlock patterns on smart devices such as phones and tablets. The technique works by turning a smartphone’s built-in speaker and microphone into a sonar system. An attacker do this by infecting the target device with a malware that can make it emit sounds inaudible to humans. The sound waves bouncing off the user’s finger when unlocking the phone can then be picked up by the device’s microphone. The researchers said that the technique does not yield a […]

Chinese Spy Agencies Caught Using LinkedIn to Hire Americans

Chinese Spy Agencies Caught Using LinkedIn to Hire Americans

US counter-intelligence chief William Evanina revealed this week that Chinese espionage agencies are aggressively using LinkedIn to recruit Americans that have access to government and commercial secrets. Evanina said that the Chinese had contacted thousands of individuals using fake accounts and called on Microsoft to act on these efforts. The German and British government had already warned their citizens of the scheme before, and this is the first occasion that the issue had been publicly discussed. Evanina said that LinkedIn should follow the steps taken by Twitter, Google and Facebook and similarly purge fake accounts on their platform.    Source: […]

Trump Blames China for Hillary Email Hack

Trump Blames China for Hillary Email Hack

US president Donald Trump tweeted this week accusing Beijing of hacking into Hillary Clinton’s email and asked the FBI and the Department of Justice to look into the matter. Denying the claims, China’s foreign ministry spokeswoman Hua Chunying said that the country is a staunch defender of cybersecurity that opposes and acts on any form of internet attacks and data theft. Hua added that China supports a joint response by the international community to cybersecurity threats through dialogue and cooperation, on the basis of mutual respect, equality and mutual benefit. However, the Justice Department inspector general did not say in […]

Iranian Political Influence Operation Bigger Than Previously Thought

Iranian Political Influence Operation Bigger Than Previously Thought

Reuters recently said that the Iranian political influence operation currently seen targeting internet users all over the world seems to be significantly more extensive than expected. Around 10 sites and dozens more social media accounts on sites such as Facebook, Instagram, Twitter and YouTube have already been identified by Reuters. Cybersecurity company FireEye and ClearSky added that the sites and accounts belonging to the International Union of Virtual Media, or IUVM, was part of a larger campaign which US tech giants are trying to take down.    The IUVM was seen promoting online content aligned with the government of Tehran […]