Posts Tagged ‘crackers’

China hackers

https://www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies

Nested on the servers’ motherboards, the testers found a tiny microchip, not much bigger than a grain of rice, that wasn’t part of the boards’ original design. Amazon reported the discovery to U.S. authorities, sending a shudder through the intelligence community. Elemental’s servers could be found in Department of Defense data centers, the CIA’s drone operations, and the onboard networks of Navy warships. And Elemental was just one of hundreds of Supermicro customers.

interdiction, consists of manipulating devices as they’re in transit from manufacturer to customer. This approach is favored by U.S. spy agencies, according to documents leaked by former National Security Agency contractor Edward Snowden. The other method involves seeding changes from the very beginning.

In emailed statements, Amazon (which announced its acquisition of Elemental in September 2015), Apple, and Supermicro disputed summaries of Bloomberg Businessweek’s reporting.

The Chinese government didn’t directly address questions about manipulation of Supermicro servers, issuing a statement that read, in part, “Supply chain safety in cyberspace is an issue of common concern, and China is also a victim.” The FBI and the Office of the Director of National Intelligence, representing the CIA and NSA, declined to comment.

+++++++++++++
more on hackers in this IMS blog
https://blog.stcloudstate.edu/ims?s=hacker

Protect Student Data

Six Ways to Protect Student Data and Prevent Cyberattacks

By Ricky Doyle     Dec 10, 2018

https://www.edsurge.com/news/2018-12-10-six-ways-to-protect-student-data-and-prevent-cyberattacks

School administrators and IT staff can be super-vigilant, but the hackers are getting better and better at sneaking through security.

the most common cybersecurity threats, and how can school staff avoid them?

Eavesdropping / Man-in-the-Middle (MiTM) Attacks

What they are: It’s likely that you sometimes use a school laptop or mobile device to gain internet access via Wi-Fi networks in public places like coffee shops or airports. If so, be aware that there may be hackers eavesdropping to try and gain entry to any two-party exchange you make so they can filter and steal data.

How to avoid them: Always use a school-verified SIM carddongle or VPN(virtual private network) to access the internet in public places.

Social Engineering Attacks

According to Verizon’s 2018 Breach Investigations report, 92 percent of malware is delivered via email, often referred to as social engineering attacks. The aim is to interact with the user and influence and manipulate their actions to gain access to systems and install harmful software. Malware uses various guises. Here are some of the most common:

1. Phishing emails

2. Baiting attacks

3. Quid pro quo requests

4. Pretexting attacks

5. Contact with a ‘compromised’ website

hackers versus crackers: Guccifer

Hackers versus crackers

http://www.techrepublic.com/blog/it-security/hacker-vs-cracker/

http://www.pctools.com/security-news/crackers-and-hackers/

Federal court sentences original Guccifer

By Mark Rockwell Sep 02, 2016

https://fcw.com/articles/2016/09/02/guccifer-sentence-rockwell.aspx

+++++++++++++++++

more in this blog on hackers and crackers

https://blog.stcloudstate.edu/ims?s=hackers

https://blog.stcloudstate.edu/ims?s=crackers

 

hackers and hard drive noises

Hackers could acquire sensitive data through monitoring hard drive noises

++++++++++++++

more on hackers in this IMS blog:
https://blog.stcloudstate.edu/ims?s=hackers

ransomware

Adobe issues emergency update to Flash after ransomware attacks

http://www.reuters.com/article/us-adobe-systems-cyber-ransomware-idUSKCN0X502K

Ransomware

https://en.wikipedia.org/wiki/Ransomware

Ransomware is a type of malware that restricts access to the infected computer system in some way, and demands that the user pay a ransom to the malware operators to remove the restriction. Some forms of ransomware systematically encrypt files on the system’s hard drive, which become difficult or impossible to decrypt without paying the ransom for the encryption key, while some may simply lock the system and display messages intended to coax the user into paying. Ransomware typically propagates as a trojan, whose payload is disguised as a seemingly legitimate file.

Beware the Rise of Ransomware

Kim Boatman

http://us.norton.com/yoursecurityresource/detail.jsp?aid=rise_in_ransomware