Month: December 2013

NSA to Reportedly Injecting Spy Malware on Laptops Purchased Online

As per a report published by Der Spiegel related to National Security Agency documents, the best hacking team of the agency is reportedly intercepting computers and other electronic items purchased via online retail outlets before they will get delivered to the customer. Hacking team of the NSA is planning to inject malware and other spying programs on those computers and electronics before they will be delivered. The Tailored Access Operations (TAO) division of NSA, which conducts significant hacks so far, is performing sophisticated hacking process to intercept laptops purchased via online retail stores. according to the reports by Der Spiegel, these elite hacking team is capable of hacking any device, from anywhere and anytime. Even this team of NSA has been responsible for hacking a world leader’s mobile phone this year. Is the Amazon order taking longer than usual? If the Amazon laptop order you placed this holiday is taking unusually longer then, your device could probably be the target of the NSA’s mission to install spy tools and malware. The NSA is not erratically picking any laptop order placed through any online shopping site, rather they are following a list of targets for malware install. NSA adopts QUANTUM hacking method TAO team of the NSA uses a sophisticated system of tools called QUANTUM. This new school of hacking methods uses social networking channels to trace their target. The system focuses...

Read More

Cryptolocker Strikes Again… Via USB Device

Just when you thought the ransomware virus has faded in the news, it is coming back to haunt your digital life once again. The news of Cryptolocker ransomware has been confirmed by the security vendor Trend Micro. Researchers at Trend Micro have reported of a ransomware which is believed to be a variant of Cryptolocker and is capable of spreading through USB drives. The security vendor has suggested that the process of proliferation indicates that the malware continues to spread. Abigail Pichel of Trend Micro has blogged that – “Aside from its propagation technique, the new malware bears numerous differences from known CryptoLocker variants. Rather than relying on a downloader malware—often UPATRE— to infect systems, this malware pretends to be an activator for various software such as Adobe Photoshop and Microsoft Office in peer-to-peer (P2P) file sharing sites. Uploading the malware in P2P sites allows bad guys to easily infect systems without the need to create (and send) spammed messages.” WORM_CRILOCK.A malware Trend Micro has detected that this Cryptolocker variant as WORM_CRILOCK.A is capable of spreading removable device which was not heard with any variant of Cryptolocker ransomware. Apart from the propagation, this new WORM_CRILOCK.A malware is quite different from earlier CryptoLocker variants. Instead of using a downloader malware such as often UPATRE for infecting computers, this new WORM_CRILOCK.A malware acts as an activator for reputed software Microsoft Office...

Read More

Samsung Knox BYOD Software is Vulnerable to Attacks, Researchers Reveals

The Samsung Knox, the privacy and security centric platform, is vulnerable to attacks. This security platform is built for major and flagship Android-based Samsung Smartphone devices, including Samsung Galaxy S4. A security researcher from the Ben-Gurion University (BGU) of the Negev’s Cyber Security Labs has uncovered the vulnerability in the software. Research findings Samsung Knox security architecture is designed for enterprise and government users in order to separate and compartmentalize data specific to business use from the personal data. BYOD software, Knox container of data is supposed to protect all the data inside it and split from the personal information to ensure complete protection from security threats and unsecure access. Ideally apps outside Samsung Knox container could be able to get access to apps, folders and other data locked inside Knox BYOD container. That way, data, apps and folder compartmentalized inside Samsung Knox container will still be protected even if the device becomes exposed to any malware threats or hackers’ attack. However, the flaw in the Samsung Knox may not enable users to protect the data under Knox. The vulnerability found by Mordechai Guri, a Ph.D. student at BGU, claimed to be exploited to crack the security container of Samsung Knox. Guri has spotted the flaw inside the latest flagship Samsung Galaxy S4 device. Galaxy S4 is vulnerable to attacks through this flaw Guri stated that “To us, Knox...

Read More

Target Credit Card Details Are Infiltrated in the Black Market, After Hacking

More bad news is in store for Target credit card breach victims. Recent updates reveal that hacked credit card numbers are now leaked in black market. Around 40 million credit card accounts are reportedly flooded in black market. Thus, Target shoppers are exposed to even more severe threats this holiday. But, here is a silver lining too. In their endeavor to seek apology to more than those 40 million Target shoppers for the alleged security breach, Target has offered special 10 percent discount for shoppers shopping from their stores. Credit card numbers being sold for $20? Do you think this repentant 10% reductions at target compensate the loss caused to credit card hack victims? Probably not as their card number leaks in black market will expose them to even more grave financial threats. As per the data revealed by KrebsOnSecurity, the site which reports cyber-security threats, hacked credit and debit card accounts are being infiltrated for varied rates, starting from $20 to $100. Those hacked card details are being leaked in batches of one million cards. Will Target’s apologetic discount appease shoppers or attorneys? Gregg Steinhafel, Chief Executive of Target has issued apology to customers who whose credit card and debit cards are now taken over by hackers. Shoppers who bought goods from Target stores within the period of Black Friday to December 15, 2013 are exposed to the...

Read More

Is Smartphone Safe for Shopping This Holiday?

Mobile payments are taking off this holiday season that shoppers are more likely to shop using their Smartphone for making payments, whether at shopping malls or during online shopping. Many stores at malls are accepting mobile payments. Major mobile carriers have their own proprietary mobile payment apps including AT&T, T-Mobile and Verizon. Some stores have adopted mobile retail payment using their own mobile payment apps that are Starbucks and Teavana which uses its own as well as Square Wallet app, CVS accepts variety of mobile payments via NFC and Apple carries out payments through a process called EasyPay which occurs through Apple Store App. But, are these devices safe enough to use for transactions for shopping? What are the most potential threats mobile phones are vulnerable to this holiday season? What are the threats of mobile payments? Smartphone users are using their devices for online shopping transactions starting from Thanksgiving and Cyber Monday. With mobile phones being used for online transactions at an increasing rate, which is nearly one in four transactions, mobile devices are also exposed to increasing rate of security threats. Both online transactions, whether banking or e-commerce, do not process through robust security and fraud protection measures as much our online transactions occur through desktop computers. Here we have explained some reasons why our mobile transactions are unsafe this holiday season. Mobile browsers Mobile browsers do...

Read More