A flaw in several Netgear wireless routers can allow hackers to access admin passwords, wireless keys, and other sensitive information. The SOAP (Simple Object Access Protocol) in the Netgear routers can be tricked by using carefully-crafted HTTP requests which can allow access to private information. For more on this topic, please click here:: Got a Netgear wireless router? You’ve got a security problem
[sc:mbta]
Fishing for Phishing Solutions
Carbanak is believed to have stolen $1 billion from 100 banks using specialized cyber attack tools. Equation can infect the operating systems on hard drives. Desert Falcons is believed to have infected thousands of Windows and Android devices. What do they all have in common? They all primarily used phishing to infect their targets.
Phishing is defined as an attack that spreads malware using infected messages posing as coming from a trustworthy source. Emails, Facebook messages, tweets, and other forms of online communication can be used for phishing. Companies need to educate their employees about malware-infected emails along with building up their data encryption in order to curb the chances of a data breach. For more on phishing, click here:: We need to solve the phishing problem to balance the Equation
[sc:mbtc]
Android Malware Spies On You On or Off
PowerOffHijack is a new form of malware that allows hackers to spy on Android users even when the user believes their phone is off. The malware hijacks the shutdown process of a user’s mobile phone and mimics the shutdown animation, making the user believe their phone is off as the malware steals data in the background. For more details on this malware, click here:: Android Malware Can Spy On You Even When Your Mobile is Off
[sc:mbta]
Will Government Cyber Security Protect Your Identity?
Cyber security is a hot button issue today. The data breaches of Anthem, Target, Home Depot, and so many others have opened wide and exposed the issue of poor cyber security. President Barack Obama has even publicly stated that he wants a $14 billion increase in U.S. cyber security. With that said, will government involvement even help protect your identity?
As of now, the answer is no. When the government sponsored malware, Stuxnet, hit the scene it certainly didn’t help. Stuxnet was superior to any criminal malware at the time, but now criminals have been able to copy aspects from it to make even greater malware after Stuxnet was publicly dissected. If the government wants to help the public to fight cybercrime, the answer isn’t by indirectly making better weapons for it. For more on this topic, click here:: Our Governments Are Making Us More Vulnerable
[sc:mbtc]
Internet Voting Has a Long Way to Go
Accurate voting is imperative in order for people’s candidate to become elected or a new legislation to pass. We are aware of the controversial “hanging chad†issues during the 2000 presidential election and that was with physical votes. Voting on the Internet needs more safeguards before it can be fully endorsed.
While internet voting has been implemented in Alaska and New Jersey as an option, a Galois attack can easily install malware into a voter’s device that can redirect traffic or deny service. This subtle attack can prevent votes from being collected, much less seen. While progress marches onward, we might have to keep voting as an analog practice until it is fully figured out and protected. For a full article on this topic, click here:: Internet Voting Hack Alters PDF Ballots in Transmission
[sc:mbtc]
- 1
- 2
- 3
- 4
- Next Page »