John Leyden

Contact Mail Follow Twitter RSS feed

US Secretary of State: Я буду работать с Россией по вопросам кибербезопасности

Analysis US Secretary of State Rex Tillerson has expressed a willingness to work directly with Russia on cybersecurity and other issues. The proposed partnership is surprising, given the continued controversy over allegations that the Russians interfered with last year's US presidential election – a serious accusation at the center of …
John Leyden, 23 Jun 2017

Virgin Media router security flap follows weak password expose

Virgin Media has urged 800,000 customers to change their passwords to guard against possible hacking attack. The move follows an investigation by consumer mag Which? that discovered hackers could access the UK cableco's Super Hub 2 router, allowing access to IoT devices connected through the same home network. The issue stems …
John Leyden, 23 Jun 2017
sir_humphrey_screengrab_648

Russian hackers selling login credentials of UK politicians, diplomats – report

Russians hackers are trading the email addresses and passwords of top UK politicians and diplomats. The login credentials of thousands of British politicians, ambassadors and other top officials are getting traded on the dark net, The Times reports. Even though the data is old and in some ways past its sell-by date, it still …
John Leyden, 23 Jun 2017
businessman shrugging - illustration via shutterstock

Microsoft PatchGuard flaw could let hackers plant rootkits on x64 Windows 10 boxen

Flaws in Microsoft PatchGuard create a means for hackers to plant rootkits on Windows 10, 64-bit OS devices. The newly discovered attack technique, dubbed GhostHook, allows attackers to completely bypass PatchGuard, security researchers at CyberArk Labs warn. PatchGuard (formally known as Kernel Patch Protection) was …
John Leyden, 22 Jun 2017
Sherlock Holmes

UCL ransomware attack traced to malvertising campaign

Security researchers have suggested that the ransomware attack on University College London last week was spread through a "malvertising" campaign. Proofpoint reckons the AdGholas group spread the infection using malware-tainted online ads. This was a "zero-click required" campaign that could infect users who simply visited a …
John Leyden, 22 Jun 2017

Cybereason snags $100m from Softbank to mount distribution, tech offensive

Cybersecurity startup Cybereason is looking to go to the next level after securing $100m in funding from SoftBank. Cybereason, with headquarters in Boston, Massachusetts and Tel Aviv, Israel, offers a range of endpoint detection and response, next-generation antivirus, and managed monitoring services. These are crowded …
John Leyden, 21 Jun 2017
Batman. Credit: DC Comics.

Breach at UK.gov's Cyber Essentials scheme exposes users to phishing attacks

Updated The operation behind the UK government's Cyber Essentials scheme has suffered a breach exposing the email addresses of registered consultancies, it told them today. The scheme's badges are required by suppliers bidding for "certain sensitive and personal information-handling [government] contracts". Companies were notified of …
John Leyden, 21 Jun 2017
honda crv engine

Honda plant in Japan briefly stops making cars after fresh WannaCrypt outbreak

Honda said today that it had briefly halted operations at a car plant in Sayama, Japan earlier this week because of the infamous WannaCrypt ransomware. The Japanese car maker halted production for one day at a domestic vehicle plant on Monday after finding samples of the WannaCrypt ransomware in its computer network, Reuters …
John Leyden, 21 Jun 2017

US is Number One! In sales register hacking attacks, at least

Hacking attacks against sales terminals have risen by nearly a third last year, and the US is still leading the way in being insecure. Incidents affecting sales tills and payment systems increased to 31 per cent in 2016, according to research by security firm Trustwave, while incidents affecting e-commerce environments fell to …
John Leyden, 20 Jun 2017
Angry Judge

Hacker exposed bank loophole to buy luxury cars and a face tattoo

A UK hacker who stole £100,000 from his bank after spotting a loophole in its systems has been jailed for 16 months. Unemployed James Ejankowski, 24, of Bridlington, squandered his ill-gotten gains by splurging on a BMW and a Range Rover, and getting his face tattooed (as shown in a story in the Teeside Evening Gazette here). …
John Leyden, 20 Jun 2017

Brit hacker admits he siphoned info from US military satellite network

A UK-based computer hacker has admitted stealing hundreds of usernames and email addresses from a US military communications system. Sean Caffrey, 25, of Sutton Coldfield in the West Midlands, broke in and pinched the ranks, usernames and email addresses of more than 800 users of a satellite communications system and of about …
John Leyden, 16 Jun 2017
Office Space

If you haven't already obliterated your Jaff-infected comp, there is an antidote available

Security researchers have developed a free decryption tool for victims of the ‪Jaff‬ ransomware, meaning they can regain access to files without paying crooks. The utility – developed by boffins at Kaspersky Lab – works on all variants released to date. Of course there is still the possibility that the criminals behind Jaff …
John Leyden, 15 Jun 2017

Cloud bigger than ever, biz suddenly keen to fork out for security. Put 'em together...

Growth cloud-based security services will remain strong, with the market reaching $5.9bn in 2017, up 21 per cent from 2016, analyst house Gartner predicts. Growth in the cloud-based security services market will outpace the overall information security market. Email security, web security and identity and access management ( …
John Leyden, 15 Jun 2017

Banking websites are 'littered with trackers' ogling your credit risk

A new study has warned that third-party trackers litter banking websites and the privacy-invading tech is being used to rate surfers' creditworthiness. Among the top 10 financial institution websites visited in the US and UK, there are 110 third-party trackers snooping on surfers each time they visit. Online privacy firm …
John Leyden, 15 Jun 2017

Don't all rush out at once, but there are a million devices ripe to be the next big botnet

A wormable vulnerability involving an estimated one million digital video recorders (DVR) is at risk of creating a Mirai-style botnet, security researchers warn. UK-based security consultancy Pen Test Partners said that the issue stems from a zero-day (unpatched) flaw in networking software from Chinese manufacturer XiongMai …
John Leyden, 15 Jun 2017

Internet hygiene still stinks despite botnet and ransomware flood

Network security has improved little over the last 12 months – millions of vulnerable devices are still exposed on the open internet, leaving them defenceless to the next big malware attack. A follow-up audit by Rapid7 – the firm behind the Metasploit pen-testing tool – found that more than a million endpoints were confirmed …
John Leyden, 14 Jun 2017

Telegram chat app founder claims Feds offered backdoor bribe

The founder of chat app Telegram has publicly claimed that feds pressured the company to weaken its encryption or install a backdoor. "During our team's 1-week visit to the US last year we had two attempts to bribe our devs by US agencies + pressure on me from the FBI," Pavel Durov said on Twitter. "It would be naive to think …
John Leyden, 14 Jun 2017

Discredit a journo? Easy, that'll be $55k. Fix an election? Oh, I can do that for just $400k

Fake news has come to be associated with political intrigue but the same propaganda techniques are also abused by cybercriminals, according to a study by Trend Micro. The techniques and methods used to spread fake news and manipulate public opinion have a wide range of objectives and even a price list. Cybercriminals produce …
John Leyden, 13 Jun 2017
Prison

Jailed fraudster admits running same cold-caller con from behind bars

The jailed kingpin behind a multimillion-pound fraud has admitted attempting to run an almost identical con from behind bars. Feezan "Fizzy" Hameed, 26, ran a voice-based phishing fraud which claimed 750 RBS group victims (mainly small businesses such as accountants and solicitors) and resulted in loses of £113m. He used his …
John Leyden, 12 Jun 2017

Move over, Stuxnet: Industroyer malware linked to Kiev blackouts

Security researchers have discovered malware capable of disrupting industrial control processes. Industroyer can cause the same sort of damage as BlackEnergy, a malware strain blamed for attacks on energy firms that caused blackouts in Ukraine in December 2015. The malware may have featured in follow-up attacks last December …
John Leyden, 12 Jun 2017
A_KUDR http://www.shutterstock.com/gallery-1864778p1.html

Mac ransomware author is giving away malicious code to script kiddies

Security researchers have discovered a ransomware variant that targets Macs rather than Windows PCs. Although technically inferior to most current ransomware targeting Windows, it still encrypts or prevents access to victim's files, thereby causing real damage, according to researchers at Fortinet. MacRansom uses symmetric …
John Leyden, 12 Jun 2017
router

Virgin Media resolves flaw in config backup for Super Hub routers

A recently resolved flaw in Virgin Media wireless home routers gave hackers a means to gain unauthorised administrative-level access to the devices. Security shortcomings in software from the Super Hub 2 and Super Hub 2AC, manufactured by Netgear, were uncovered by researchers from Context Information Security, Jan Mitchell …
John Leyden, 12 Jun 2017
Witcher 3: Wild Hunt

Witcher dev CD Projekt Red says hackers stole game concepts and asked for ransom

CD Projekt Red, the Polish developer behind the critically acclaimed Witcher games, yesterday admitted that some of its internal files and concepts for upcoming title Cyberpunk 2077 have been snaffled by hackers and held for ransom. The dev downplayed concerns by telling gamers that the files involved are "old and largely …
John Leyden, 09 Jun 2017

Say hello to Dvmap: The first Android malware with code injection

A powerful Android trojan with novel code injection features that posed as a game was distributed through the Google Play Store before its recent removal. The Dvmap trojan installs its malicious modules while also injecting hostile code into the system runtime libraries. But Dvmap has other tricks up its sleeve. Once …
John Leyden, 09 Jun 2017
Mad Saudi

DDoS attack brings Qatar's Al Jazeera website to its knees

Qatar-based news network Al Jazeera yesterday said it was being targeted with systematic hacking attempts. DDoS assaults affecting Al Jazeera's websites and digital platforms follow a recent hack of the state news service that resulted in the promotion of false news and is blamed, in part, on an ongoing diplomatic crisis in …
John Leyden, 09 Jun 2017

Biting the hand that feeds IT © 1998–2017