John Leyden

Contact Mail Follow Twitter RSS feed
Type arms of an old typewriter

Malware ads' steganography

A malicious online advertising campaign dubbed AdGholas threw malware at up to a million netizens a day, and infected thousands of Windows machines, for over a year, we're told. AdGholas picked out normal users to attack, as opposed to security researchers investigating the code in virtual machines, by studying their language …
John Leyden, 28 Jul 2016
Undrey http://www.shutterstock.com/gallery-950635p1.html

Security FUD and malware outbreaks boost Sophos' coffers

Revenues at Sophos were buoyed by the growing threat of ransomware and the like to its target mid-market customer base. For the quarter ending 30 June 2016, Sophos recorded revenues of $127.4m, 12.2 per cent up from the $113.5m its business brought in during Q1 2016. Kris Hagerman, chief executive officer, commented: "Our …
John Leyden, 28 Jul 2016
Woman in balaclava with shopping bags. Photo by Shutterstock

Oh deer.io: Cyber crimelords using one-stop DIY web biz shops

Updated Cybercrime miscreants seem to be flocking to a one-stop online web business shop. The use of sites like Deer.io prove the barriers to entry for cybercrime are continually being lowered, according to threat intel firm Digital Shadows. Darkside.global, a URL associated with cybercriminal Tessa88 who has distributed leaked …
John Leyden, 27 Jul 2016
CSIRO Parkes Radio Telescope

Google Drive trojan fling

Cybercrooks have taken to using a combination of shortened links and a shared file hosted on Google Drive to deliver the 9002 trojan, a cyber-espionage threat. The use of Google Drive to host malicious files is uncommon but far from unprecedented. Palo Alto Networks’ threat intelligence group, Unit 42, reckons that use of a …
John Leyden, 27 Jul 2016

Saved from ransomware thugs... by rival ransomware thug

Private keys of the Chimera ransomware have been leaked by a rival cybercriminal. Rather than "white hat" activity, the good deed appears to have be done by a criminal going by the handle of Janus - known for being the author of Petya - who tweeted their competitor's (Chimera) keys in an apparent bid to stifle ransomware …
John Leyden, 27 Jul 2016
Image by gyn9037 http://www.shutterstock.com/gallery-691846p1.html

Odds are your office is ill-prepared for network-ransacking ransomware

Organizations are unprepared for future strains of more sophisticated ransomware, a report by Cisco warns. The networking giant's 2016 Midyear Cybersecurity Report concludes that the next wave of ransomware is expected to be more pervasive and resilient. While current strains typically infect a single computer, future …
John Leyden, 26 Jul 2016
Panic button

It's 2016 and your passwords can still be sniffed from wireless keyboards

Millions of low-cost wireless keyboards are susceptible to a vulnerability that reveals private data to hackers in clear text. The vulnerability – dubbed KeySniffer – creates a means for hackers to remotely “sniff” all the keystrokes of wireless keyboards from eight manufacturers from distances up to 100 metres away. “When we …
John Leyden, 26 Jul 2016
lg_rolly_keyboard_648

A10 snaps up Appcito

Application networking and security firm A10 Networks has acquired cloud application firm Appcito. Financial terms of the deal, announced Monday, were undisclosed. A10 Networks said Appcito’s microservice and container architectures tech will allow it to deliver comprehensive secure application services. Products and services …
John Leyden, 26 Jul 2016
lg_rolly_keyboard_648

Locky now top email menace

Locky claimed top spot for email-based malware in Q2, overtaking Dridex, a banking trojan. Many Locky and Dridex slingers turned to JavaScript files attached to email messages to install payloads, email security firm Proofpoint warns. Among email attacks that used malicious document attachments, 69 per cent featured the new …
John Leyden, 26 Jul 2016
Password

O2 customer DATA GRAB: Not-a-hack creds for sale on dark web

Hackers have gained access to customer data on UK telco O2 – and put it up for sale on the dark web. The compromised data was likely obtained by using usernames and passwords stolen from gaming website XSplit three years ago in order to log onto O2 accounts. When the login details matched, the hackers could access O2 customer …
John Leyden, 26 Jul 2016
a HUSKY DOG DIGS A HOLE ON THE BEACH. pHOTO BY shUTTERSTOCK

Tinder porn scam: Swipe right for NOOOOOO I paid for what?

Crooks on Tinder are using online safety as a lure to trick users into unwittingly paying for adult content. Automated spam bots masquerading as Tinder users are supposedly tricking other users of the mobile dating app into visiting a malicious third-party website to “verify their profiles”. “The spam bots instruct the user …
John Leyden, 25 Jul 2016
phishing_648

Is digital fraud big in UK? British abacus-botherers finally have some answers

Reports of fraud have doubled, according to official statistics – because the Office for National Statistics (ONS) is now including cyber crimes in its figures. The UK's ONS reckons, in crime statistics released last week, that more than two million computer misuse offences and 3.8 million online fraud offences took place in …
John Leyden, 25 Jul 2016

GOP delegates suckered into connecting to insecure Wi-Fi hotspots

A Wi-Fi hack experiment conducted at various locations at or near the Republican National Convention site in Cleveland, US, underlines how risky it can be to connect to public Wi-Fi without protection from a VPN. The exercise, carried out by security researchers at Avast, an anti-virus firm, revealed that more than 1,000 …
John Leyden, 21 Jul 2016

Ransomware gang: How can I extort you today?

Three out of four ransomware criminal gangs are willing to negotiate the shakedown price. And all the operators of file encrypting ransomware scams will give victims more time to pay up. So say security researchers at F-Secure, who investigated the "customer experience" of five active crypto-ransomware variants, beginning with …
John Leyden, 21 Jul 2016

DDoS trends: Bigger, badder but not longer

DDoS attacks once again escalated in both size and frequency during the first six months of 2016. Netscout's DDoS mitigation arm Arbor Networks warns that attacks greater than 100Gbps are far from uncommon. The security firm has monitored 274 attacks over 100Gbps in the first half of 2016, versus 223 in all of 2015. The …
John Leyden, 19 Jul 2016

Carbon Black snaps up cloud-dwelling threat-sniffing 'next-gen AV'

Endpoint security firm Carbon Black has bought "next-generation antivirus" firm Confer. Financial terms of the deal, announced today, were undisclosed. Carbon Black plans to re-badge Confer’s security software as “Cb Defense” and offer it alongside its existing roster of application control, incident response, and threat …
John Leyden, 19 Jul 2016
Curser icon over a news paper folded

IoT baby monitor style hacks still a threat

Lessons have not been learned from an incident where a Russian website provided links to access baby monitor cameras, according to the UK’s data protection watchdog. The website allowed people to watch footage from insecure cameras around the world, prompting a warning from the Information Commissioner’s Office (ICO) back in …
John Leyden, 19 Jul 2016
News room with blur motion effect

Pokemon Go driver woes

A worrying minority of drivers freely admit to using their smartphone while behind the wheel. According to a new survey by used car specialists HPL Motors, more than one in five people have used a non-hands-free mobile phone to take a call or text whilst driving. A second survey revealed that more than one in 10 people had …
John Leyden, 19 Jul 2016
virus_1_648

Your antivirus doesn't like Ammyy. And fraudsters will use that to RAT you out (again)

Crooks have once again targeted users downloading Ammyy's remote access software as a conduit for spreading malware. The tactic – which has been witnessed before, specifically in the infamous Lurk banking trojan – has been in play since early February, 2016. Ammyy Admin is a legitimate software package (used by top …
John Leyden, 19 Jul 2016
China will see you on the dark side of the moon

Maxthon web browser blabs about your PC all the way back to Beijing

A web browser developed by Chinese company Maxthon has allegedly been collecting telemetry about its users. Polish security consultancy Exatel warns [PDF] that Maxthon is phoning home information such as the computer's operating system and version number, the screen resolution, the CPU type and speed, the amount of memory …
John Leyden, 19 Jul 2016
Hackers

UKFast owner slurps app security biz Pentest

Secarma, the cyber security business owned by UKFast chief exec Lawrence Jones, has bought application security specialists Pentest Limited reportedly for £10m. The CHECK and CREST accredited company, whose 45-strong team work with global blue chip organisations, will add a team of ethical hackers to Secarma's roster. John …
John Leyden, 18 Jul 2016

Hackers steal millions from ATMs using 'just their smartphones'

Authorities in Taiwan are trying to work out how hackers managed to trick a network of bank ATMs into spitting out millions. Police suspect that two Russian nationals wearing masks cashed out dozens of ATMs operated by Taiwan's First Bank on Sunday and left the country the following day. The crooks stole an estimated T$70m ($2 …
John Leyden, 15 Jul 2016
Pokemon Go game

Silently clicking on porn ads you can't even see – this could be you...

Security firms have repeated warnings that unofficial versions of Pokemon Go are likely tainted with spyware or trojans. RiskIQ has found more than 215 unofficial versions of the app in more than 21 app stores. Separately security researchers at security software firm ESET warn that the first ever fake lockscreen app on the …
John Leyden, 15 Jul 2016
Bank vault

BAE Systems partners with SWIFT to bolster hacker intel

BAE Systems has been recruited to help SWIFT's newly formed Customer Service Intelligence team in a bid to get ahead of cyber-criminals targeting banks connected to the global financial messaging service. The announcement follows the analysis and identification of malware that BAE Systems’ threat intelligence team was able to …
John Leyden, 15 Jul 2016

Security gurus get behind wheel of driverless car debate

Security experts have already waded into the UK government's consultation into self-driving technologies. The two month session comes against a backdrop of increasing concerns about connected cars. Infosec vendors argue security needs to be considered alongside other issues such as changes to driving regulations (the Highway …
John Leyden, 15 Jul 2016