FireSale HackBoy

Knowledge Shared By FireSale HackBoy...

Thursday, January 31, 2019

Russia alleges Cyber Attack on its Presidential Elections from West

Russia, the country led by President Vladimir Putin has alleged that two nations from the west have launched cyber attacks on its Presidential Elections in March 2018 to influence the election results. In what seems to be direct blame on the United States and Dan Coats, the UK intelligence officer, Nikolai Murashov, the deputy director of the National Coordination Center for Computer Incidents, Moscow accused the nations residing in the west for launching cyber attacks on critical infrastructure since June 2017. Murshov says that the 1st serious...

APT10 Group Targets Multiple Sectors, But Seems to Really Love MSSPs

Threat Actors That Don’t Discriminate  When it comes to threat actors and the malware variants they use, let’s talk dating — or rather, the way people date — because one could argue there are marked similarities between the two. You see, there are criminal groups who have a “type,” i.e. using malware that targets specific industries or even organizations — say, financial...

New Mac Malware steals iPhone text messages from iTunes backups

By Waqas The IT security researchers at Palo Alto Networks’ Unit 42 have discovered a dangerous new Mac malware capable of targeting devices for multi-purposes including stealing cryptocurrency. Dubbed CookieMiner by researchers; the Mac malware is a variant of OSX.DarthMiner, another nasty piece of malware known for targeting MacOS. But, CookieMiner aims at much more than its predecessor. See: 400% increase in […] This is a post from HackRead.com Read the original post: New Mac Malware steals iPhone text messages from...

2018 Annual Digest of Identity and Access Management

Identity and Access Management continues to be a key component in building an enterprise’s cyber security strategy. Today we are presenting our observations of Identity and Access Management in 2018. What happened this year? What can enterprises learn from events in the media in terms of Cyber Security in general, and Identity and Access Management specifically? Here is a...

DOJ discloses North Korean Joanap Botnet Cyber Attack

Department of Justice(DOJ) has disclosed details of a fresh cyber attack which was launched on the critical infrastructure of the United States and is all set to issue a warning soon to victims who were infected by with Joanap Botnet launched and developed by a hacking group being funded by North Korean government. Recently, the law enforcement has issued a search warrant with which the special forces conducted search operations which allowed them to track down the network of infected devices. It was then that the forces discovered about the Joanap...

The Internet of Energy: delivering safe, smart energy in the smart city era

We hear and talk a lot about smart cities, and with good reason. They represent the realisation of the IoT’s promise – a network of connected devices helping everyone living inside to enjoy better convenience, security and, ultimately, a better quality of life. One element of the smart city that has been developing rapidly in recent times is energy. So, we wanted to look at its role today and how it will evolve in the years ahead. It goes without saying that the efficient use of energy is critical to life in a city. It’s something we often take...

Selfie stealing malware found in popular Android beauty camera apps

By Waqas We all want to look perfect in the pictures that we post online and beauty camera apps are our best bet in order to fine-tune our pictures. However, according to the findings of Trend Micro researchers, these kinds of applications are performing more functions than what we think they are. Reportedly, some of the Android […] This is a post from HackRead.com Read the original post: Selfie stealing malware found in popular Android beauty camera apps January 31, 2019 at 07:12...

Wednesday, January 30, 2019

Intel invests in Cloud Security and data storage startups

Intel Capital, a business arm of Intel Corporation has made it official that it is investing in startups called Fortanix and Pliops to strengthen and secure its standing in Cloud Computing and Security fields. CyberSecurity Insiders has learned that Intel will be investing around $23 million in raising the funding of Fortanix to $31 million which includes other investments from Foundation Capital and Neotribe. Fortanix is known to protect data by developing a system which helps applications run in separate enclosures which prevent the data from...

Facebook Research App data scandal

Facebook which is trying hard to shrug off its presence from the Cambridge Analytica data scandal is reportedly caught up in the latest which is about a paid ‘Research App’. From the past three years i.e. from 2016, the Mark Zuckerberg Company has been testing an app meant for teens and young adults (aged 13 to 35). But in the background security researchers from TechCrunch have found that Facebook is offering a payback of $20 per month plus referral fees to those who are ready to sell their privacy. They argue that the paid app has unconfined...

Contactless Biometric Payment Cards arrive in Italy

Italy has taken a step forward into the future of payments. The first ever contactless biometric card deployment from Mastercard launched with Intesa SanPaolo during the opening day of Il Salone dei Pagamenti 2018 – Payvolution— one of the world’s leading payment exhibitions. With this card, you can pay for goods using your fingerprint to authorize transactions instead of...

Transforming immigration and border crossing in Colombia with Automated Border Control

Anyone who’s travelled outside their country knows the drill: after a long and exhausting day of travel, you arrive home only to endure another long wait in the airport immigration queue. The fast-pace of globalization is making it ever more challenging for airports and customs authorities worldwide to maintain safety and security while simultaneously simplifying and speeding...

Top 5 Benefits of Public Cloud Computing Versus Traditional IT

This is part 2 of our two-part series on the benefits of public cloud computing, or Infrastructure as a Service (IaaS), versus traditional IT. Long before cloud computing, traditional IT infrastructure was great for enterprises that needed to run many different types of applications, because it gave them full control of their applications and data on their local servers. It also made security less complex. Back then you only had data centers to worry about, and the way that enterprises deployed applications was through someone serving as the application...

Finance: A Cloud Security Investigation (CSI)

This post was originally published here by Will Houcheime. In a recent Bitglass Security Spotlight, we enumerated the risks associated with failing to implement proper data and threat protection in financial services. Financial organizations are often targeted by hackers who are looking to seize personally identifiable information (PII) and nonpublic personal information (NPI) – this information is useful for identity theft and lucrative to sell on the dark web. Data loss prevention (DLP) and access controls are obvious...

HAPPY DATA PRIVACY DAY!

This post was originally published here by (ISC)² Management. This year, Data Privacy Day will spotlight the value of information. Whether you’re an individual looking to better manage your privacy and how your data is collected and shared, or a business collecting, using and storing that information, remember: Personal information is like money. Value it. Protect it. Data Privacy Day began in the United States and Canada in January 2008 as an extension of the Data Protection Day celebration in Europe. Data Protection Day commemorates the January...

PLANNING TO TAKE AN (ISC)² CERTIFICATION EXAM? GET YOUR FREE CERTIFICATION PREP KIT.

This post was originally published here by (ISC)² Management . Cheers to you on your decision to pursue an (ISC)² credential in 2019! You’re about to embark on a challenging and highly rewarding journey. Make sure you get the most out of it with the new (ISC)2 Certification Prep Kit. Preparing for the exam is no small task… Your path to success starts with the right study plan, and the Certification Prep Kit will help you map a course that fits your schedule and learning style. Dive right in for everything you’ll need to...

Windows 7 users should be aware of these Cyber Security vulnerabilities

All you Windows 7 users out there, its better you make a note of the following cybersecurity vulnerabilities to which your system will get exposed after December’ 19. 1.) Obsolete systems which do not receive security updates from their developers( Microsoft in this case) can easily be used to spread malware. 2.) Unless you go for extra support for a premium, you are not going to receive updates from then on. Meaning your system can become prone to Ransomware attacks such as Wannacry and NotPetya. 3.) As they are millions of PCs which still run...

Top 7 Tips for Improving Cyber Risk Management in 2019

With the constant barrage of headlines regarding breaches in the last few years, it seems that society in general has become numb to losing personal data. This year’s overarching cybersecurity theme is clear: We’re all in this together because we simply can’t do it alone. Effective defense demands a team effort where employees, enterprises, and end users alike recognize their...

Planning to Take an (ISC)² Certification Exam? Get Your FREE Certification Prep Kit.

Cheers to you on your decision to pursue an (ISC)² credential in 2019! You’re about to embark on a challenging and highly rewarding journey. Make sure you get the most out of it with the new (ISC)2 Certification Prep Kit. Preparing for the exam is no small task… Your path to success starts with the right study plan, and the Certification Prep Kit will help you map a course...

Tuesday, January 29, 2019

US Intelligence feels that China and Russia are the biggest cyber threats to the US

US Intelligence has told US Senators on Tuesday that countries like China and Russia were the biggest cyber threats to their country than they have been in decades. Dan Coats, the Director of National Intelligence said that the change in US policies on security and trade under trump administration are influencing the American allies in a negative way. As a result of which they are keeping a distance from Washington. “As countries like China, Iran, North Korea, and Russia use cyber warfare to threaten nations- just to steal information, influence...

Authorities shut down xDedic marketplace for selling hacked servers

By ghostadmin The domain for xDedic has been seized as well. In a joint operation, the Federal Bureau of Investigation (FBI) and authorities from several European countries have successfully taken down xDedic, a notorious dark web marketplace known for selling stolen digital goods such as login credentials, identity cards, and hacked servers. The operation was carried out on January 24th […] This is a post from HackRead.com Read the original post: Authorities shut down xDedic marketplace for selling hacked servers January 30, 2019...

New Firmware Version of Nintendo Switch Hacked in just 4 Hours

By Waqas Nintendo Switch Hacked: The company was claiming to have added advanced security codes in this version of Switch Firmware. The problems for Nintendo console owners are far from over as the latest firmware version got hacked in merely a few hours. According to reports, the newly rolled out Firmware for Nintendo Switch, the much-awaited version 7.0.0 […] This is a post from HackRead.com Read the original post: New Firmware Version of Nintendo Switch Hacked in just 4 Hours January 29, 2019 at 10:21...

Hackers sell credit card info of Saint John Parking System on Dark Web

Credit Card Information of nearly 6000 people or even more related to Saint John Parking System could have been sold on the dark web in the past 18 months as reports are in that hackers have gained access to the said information by intercepting the parking database at some time 2 year ago. In December’18 the IT staff of the parking system learned that the database related to the parking ticket fines municipal server was infected with malware which could have spilled critical details such as names, credit card numbers, card verification numbers...

Russia hit by a new kind of ransomware

All these days whenever a cyber attack of ransomware variant took place, media resources around the world reported that the hack could have been launched by hackers from Russia or those associated with Russian intelligence. But now, the news is out that the online users in Russia are facing a cyber threat from a new ransomware variant which spreads in the form of malicious javascript email attachments i.e phishing attacks. Known as Shade or Troldesh, the ransomware developed in the Russian language is reportedly spreading in the form of spam with...

US$85 billion to US$193 billion Global Cyber Attack loss

A new hypothetical report jointly compiled by Lloyd’s of London and AON says that a global cyber attack spread via phishing emails could fetch a loss ranging from $85 billion to $193 billion USD and this is said to put a strain on the insurance market in near future. Technical speaking, when a cyber attack takes place it generally leads to business interruption, cyber extortion, and incident response costs. This will ultimately lead to insurance claims which will surely show influence on the premium amounts quoted to businesses in future. God forbid,...

FaceTime bug exposes live audio & video before recipient picks call

By Waqas FaceTime bug is exposing calls and videos – Here’s how to disable FaceTime until this issue is fixed. According to reports, there is a major bug in iPhone FaceTime’s video calling function that lets users hear audio from the call even before the recipient has accepted the video call. Moreover, the flaw also lets people see […] This is a post from HackRead.com Read the original post: FaceTime bug exposes live audio & video before recipient picks call January 29, 2019 at 08:39...

Ways to Respond to a Breach

Breaches aren’t easy to deal with, especially if you are of the opinion that companies are people too. Having seen, been part of, and lent a shoulder to many a breach, here are nine of the common ways companies respond to breaches. Delayed response A delayed response is when a breach has occurred and the company is informed a long time after the fact, usually when the data...

Monday, January 28, 2019

Happy Data Privacy Day!

By Marie E. Olson, CISM, CISSP, FIP Deputy Chief Privacy Officer, The Boeing Company This year, Data Privacy Day will spotlight the value of information. Whether you’re an individual looking to better manage your privacy and how your data is collected and shared, or a business collecting, using and storing that information, remember: Personal information is like money. Value...