Posts Tagged ‘cyber security’

Mac OS High Sierra

ANYONE CAN HACK MACOS HIGH SIERRA JUST BY TYPING “ROOT”

ANDY GREENBERG 11.28.17 05:47 PM

https://www.wired.com/story/macos-high-sierra-hack-root/

THERE ARE HACKABLE security flaws in software. And then there are those that don’t even require hacking at all—just a knock on the door, and asking to be let in. Apple’s macOS High Sierra has the second kind.

malicious code running on the operating system could steal the contents of its keychain without a password.

Apple does have a bug bounty, but only for iOS, not MacOS.

bad rabbit virus

Bad Rabbit cryptoware attack: New virus hits companies in Russia, Turkey, Germany & Ukraine

https://www.rt.com/news/407655-bad-rabbit-cryptoware-attack/
Kaspersky Lab advised those who do not use anti-virus products to restrict execution of certain files (C:\Windows\infpub.dat, C:\Windows\cscc.dat) and shut down the Windows Management Instrumentation (WMI) service. My note: let the wolf in the shed with sheep.
The source of the attack remained undetermined, but earlier this month the head of Microsoft, Brad Smith, pinned the blame for it on North Korea, which allegedly used cyber tools or weapons that were stolen from the National Security Agency in the United States. The top executive, however, did not provide evidence to back his claims.

New ransomware attack hits Russia and spreads around globe

Malware WARNING: ‘Bad Rabbit’ virus causes flight delays, is YOUR PC susceptible?

http://www.express.co.uk/life-style/science-technology/870887/Bad-Rabbit-Ransomware-Malware-UK-Virus

Bad Rabbit ransomware outbreak

 https://nakedsecurity.sophos.com/2017/10/24/bad-rabbit-ransomware-outbreak/

++++++++++++
more on cybersecurity in this IMS blog
https://blog.stcloudstate.edu/ims?s=cybersecurity

cybersecurity kaspersky

Kaspersky Lab Has Been Working With Russian Intelligence

 Emails show the security-software maker developed products for the FSB and accompanied agents on raids. July 11, 2017, 4:00 AM CDT 
https://www.bloomberg.com/news/articles/2017-07-11/kaspersky-lab-has-been-working-with-russian-intelligence

WHY THE US GOVERNMENT SHOULDN’T BAN KASPERSKY SECURITY SOFTWARE

  09.04.17

https://www.wired.com/story/why-the-us-government-shouldnt-ban-kaspersky-security-software/

he General Services Administration (GSA) has ordered the removal of Kaspersky software platforms from its catalogues of approved vendors. Meanwhile, the Senate is considering a draft bill of the 2018 National Defense Acquisition Authorization (known as the NDAA, it specifies the size of and uses for the fiscal year 2018 US Defense Department budget) that would bar the use of Kaspersky products in the military.

W.H. cybersecurity coordinator warns against using Kaspersky Lab software

https://www.cbsnews.com/news/kasperksy-lab-software-suspected-ties-russian-intelligence-rob-joyce/

Kaspersky: Russia responds to US ban on software

14 September 2017 http://www.bbc.com/news/world-us-canada-41262049

 +++++++++++++++

KASPERSKY, RUSSIA, AND THE ANTIVIRUS PARADOX

 10.11.17

https://www.wired.com/story/kaspersky-russia-antivirus/

Israel and Russia’s overlapping hacks of Kaspersky complicate espionage narrative

Israel and Russia’s overlapping hacks of Kaspersky complicate espionage narrative

The whole ordeal is a nightmare for Kaspersky Lab. The company looks incompetent at preventing state-sponsored hacks in the best-case scenario and complicit with the Russian government in the worst-case scenario. However it plays out, the unfolding drama will certainly hurt the software maker’s footprint in the U.S., where Congress has already taken action to purge the government of the company’s software.

+++++++++++++
more on cybersecurity in this IMS blog
https://blog.stcloudstate.edu/ims?s=cybersecurity

wifi cybersecurity

All wifi networks’ are vulnerable to hacking, security expert discovers

WPA2 protocol used by vast majority of wifi connections has been broken by Belgian researchers, highlighting potential for internet traffic to be exposed

Mathy Vanhoef, a security expert at Belgian university KU Leuven, discovered the weakness in the wireless security protocol WPA2, and published details of the flaw on Monday morning.

The United States Computer Emergency Readiness Team (Cert) issued a warning on Sunday in response to the vulnerability.

“The impact of exploiting these vulnerabilities includes decryption, packet replay, TCP connection hijacking, HTTP content injection and others,” the alert says, detailing a number of potential attacks. It adds that, since the vulnerability is in the protocol itself, rather than any specific device or software, “most or all correct implementations of the standard will be affected”.

+++++++++++++
more on cybersecurity in this IMS blog
https://blog.stcloudstate.edu/ims?s=cybersecurity

fake emails

Why everyone still falls for fake emails

By Richard Matthews  Jul 31, 2017

https://gcn.com/articles/2017/07/31/why-fake-emails-still-work.aspx

Phishing is likely to get only more sophisticated.

Based on my experience in Tallinn, we will see companies become more transparent in how they deal with cyber attacks. After a massive cyber attack in 2007, for example, the Estonian government reacted in the right way.

free anti-phishing software

+++++++++++++++++++++
more on phishing in this IMS blog
https://blog.stcloudstate.edu/ims?s=phishing+

safe social media

Tips Toward a Safe and Positive Social Media Experience

By Stephen Spengler 06/01/17

https://thejournal.com/articles/2017/06/01/tips-toward-a-safe-and-positive-social-media-experience.aspx

Family Online Safety Institute recommends that parents engage in “7 Steps to Good Digital Parenting”

1. Talk with your children.

2. Educate yourself.

3. Use parental controls. Check the safety controls on all of the Android and Apple devices that your family uses. On the iPhone, you can tap SETTINGS > GENERAL> RESTRICTIONS and you can create a password that allows you enable/disable apps and phone functions. On Android devices, you can turn on Google Play Parental Controls by going into the Google Play Store settings

parental monitoring software such as NetNanny, PhoneSherriff, Norton Family Premier and Qustodio.

4. Friend and follow your children on social media. Whether it’s musical.ly, Instagram or Twitter, chances are that your children use some form of social media. If you have not already, then create an account and get on their friends list.

5. Explore, share and celebrate.

6. Be a good digital role model.

7. Set ground rules and apply sanctions. Just like chore charts or family job lists, consider using a family social media or internet safety contract. These contracts establish ground rules for when devices are to be used; what they should and should not be doing on them; and to establish sanctions based on breaches of the family contract. A simple internet search for “family internet contract” or “family technology contract” will produce a wealth of available ideas and resources to help you implement rules and sanctions revolving around your family’s technology use. A good example of a social media contract for children can be found at imom.com/printable/social-media-contract-for-kids/.

Managing Your Digital Footprint

Your digital footprint, according to dictionary.com, is “one’s unique set of digital activities, actions, and communications that leave a data trace on the internet or on a computer or other digital device and can identify the particular user or device.” Digital footprints can be either passive or active. The passive digital footprint is created without your consent and is driven by the sites and apps that you visit. The data from a passive digital footprint could reveal one’s internet history, IP address, location and is all stored in files on your device without you knowing it. An active digital footprint is more easily managed by the user. Data from an active digital footprint shows social media postings, information sharing, online purchases and activity usage.

  • Search for yourself online
  • Check privacy settings.
  • Use strong passwords
  • Update software.
  • Maintain your device.
  • Think before you post

Keep These Apps on Your Radar

  • Afterschool (minimum age 17) – The Afterschool App was rejected twice from the major app stores due to complaints from parents and educators. It is a well-known app that promotes cyberbullying, sexting, pornography and is filled with references to drugs and alcohol.
  • Blue Whale (minimum age 10) – IF YOU FIND THIS APP ON YOUR CHILD’S DEVICE, DELETE IT. It is a suicide challenge app that attempts to prod children into killing themselves.
  • BurnBook (minimum age 18) – IF YOU FIND THIS APP ON YOUR CHILD’S DEVICE, DELETE IT. It is a completely anonymous app for posting text, photos, and audio that promote rumors about other people. It is a notorious for cyberbullying
  • Calculator% (minimum age 4) – IF YOU FIND THIS APP ON YOUR CHILD’S DEVICE, DELETE IT. This is one of hundreds of “secret” calculator apps. This app is designed to help students hide photos and videos that they do not want their parents to see. This app looks and functions like a calculator, but students enter a “.”, a 4-digit passcode, and then a “.” again.
  • KIK (minimum age 17) – This is a communications app that allows anyone to be contacted by anyone and it 100 percent bypasses the device’s contacts list.
  • Yik Yak (minimum age 18) – This app is a location-based (most commonly schools) bulletin board app. It works anonymously with anyone pretending to be anyone they want. Many schools across the country have encountered cyberbullying and cyberthreats originating from this app.
  • StreetChat (minimum age 14) – StreetChat is a photo-sharing board for middle school, high school and college-age students. Members do not need to be a student in the actual school and can impersonate students in schools across the country. It promotes cyberbullying through anonymous posts and private messaging.
  • ooVoo (minimum age 13) – IF YOU FIND THIS APP ON YOUR CHILD’S DEVICE, DELETE IT. ooVoo is one of the largest video and messages app. Parents should be aware that ooVoo is used by predators to contact underage children. The app can allow users to video chat with up to twelve people at one time.
  • Wishbone (girls) & Slingshot (boys) (minimum age 13) – Both are comparison apps that allow users to create polls, including ones that are not appropriate for children. Many of the users create polls to shame and cyberbully other children, plus there are inappropriate apps and videos that users are forced to watch via the app’s advertising engine.

+++++++++++++++++++

Texas Teen May Be Victim in ‘Blue Whale Challenge’ That Encourages Suicide

Isaiah Gonzalez, 15, found hanging from his closet after an apparent suicide, as allegedly instructed by macabre online game

http://www.rollingstone.com/culture/news/texas-teen-latest-victim-in-challenge-that-promotes-suicide-w491939

Nationally, the Associated Press reports that educators, law enforcement officers and parents have raised concerns about the challenge, though these two back-to-back deaths mark the first allegations in the United States about deaths directly linked to the online game. Internationally, suicides in Russia, Brazil, and half a dozen other countries have already been linked to the challenge.

++++++++++++++++++++
more on social media in education in this IMS blog
https://blog.stcloudstate.edu/ims?s=social+media+education

girl scouts, badges for cybersecurity

Girl Scouts to Earn Badges in Cybersecurity

The education program is being developed in a partnership between the Girl Scouts and Palo Alto Networks. Jun 23, 2017

https://securitytoday.com/articles/2017/06/23/girl-scouts-to-earn-badges-in-cybersecurity.aspx

The education program, which aims to reach as many as 1.8 million Girl Scouts in kindergarten through sixth grade, is being developed in a partnership between the Girl Scouts and Palo Alto Networks, a security company, the organization said in a press release.

++++++++++++++++++
more on cybersecurity in this IMS blog
https://blog.stcloudstate.edu/ims?s=cybersecurity

K12 cyber incidents

K–12 Cyber Incidents Have Been Increasing in 2017

The creator of a national K–12 Cyber Incident Map warns that schools should act now, not later, to bolster their security.

By Richard Chang 06/08/17

https://thejournal.com/articles/2017/06/08/k12-cyber-incidents-have-been-increasing-in-2017.aspx

Ed Tech Strategies' K–12 Cyber Incident Map. Courtesy of Doug Levin.

K–12 Cyber Incident Map , Doug Levin, president of Ed Tech Strategies

Levin has been tracking the publicly disclosed K–12 incidents on a color-coded map on his website, edtechstrategies.com. His sources include media reports, DataBreaches.net and the Privacy Rights Clearinghouse.

In a post published this week on the newly revamped Ferpa Sherpa education privacy site, Levin argues that not only have schools been “experiencing an increasing number of cyber incidents,” but “the range of cyber threats affecting schools appears to be diverse and shifting over time.”

K12 cyber incidents 2016 to present

concrete steps schools can take to improve their security, such as:

  • Use special software or hardware to protect data;
  • Create better password and authorization policies;
  • Use secondary authentication methods;
  • Train school staff, particularly about phishing and downloading of unfamiliar files; and
  • Hire more staff with IT security expertise.

++++++++++++++++++++
more on cyber security in this IMS blog
https://blog.stcloudstate.edu/ims?s=cybersecurity

cyberwarfare

How to define cyber-enabled economic warfare

By Sean D. Carberry Feb 23, 2017

https://fcw.com/articles/2017/02/23/critical-ceew-cyber-carbery.aspx

“Framework and Terminology for Understanding Cyber-Enabled Economic Warfare,” a new report by Samantha F. Ravich and Annie Fixler for the Foundation for Defense of Democracies.

Cyber-enabled economic warfare is a “hostile strategy involving attack(s) against a nation using cyber technology with the intent to weaken its economy and thereby reduce its political and military power.”

For example, China’s economic theft of intellectual property from the U.S. is considered CEEW, along with Russia’s cyberattack on Estonia and Iran’s Saudi Aramco attack. The authors also contend that the U.S. sanctions on Iran using cyber means to cut off Society for Worldwide Interbank Financial Telecommunication access also falls under CEEW.

http://www.defenddemocracy.org/content/uploads/documents/22217_Cyber_Definitions.pdf

+++++++++++++++++++
more on cybersecurity in this IMS blog
https://blog.stcloudstate.edu/ims?s=cybersecurity

DHS social media proposal

Privacy groups slam DHS social media proposal

By Sean Carberry Aug 23, 2016

https://fcw.com/articles/2016/08/23/dhs-social-carberry.aspx

The Department of Homeland Security’s proposed policy to collect information on the social media profiles of foreign travelers violates the rights of travelers and their American associates, according to privacy groups.

n a strongly worded rebuke of the proposed Customs and Border Protection policy, the Electronic Frontier Foundation argued that the rule change would do little to enhance national security and would open the door to greater spying on Americans.

Visa Waiver Program (VWP) travelers by adding requests for social media identifiers to the Electronic System for Travel Authorization and I-94W forms.

As FCW reported in June, the rule change came on the heels of a number of policies CBP initiated after criticism from Congress that potential terrorists could be exploiting the VWP, which allows citizens of 38 countries to enter the U.S. without a visa for up to 90 days.

Other human rights groups and civil liberties organizations submitted a joint letter to CBP stating that “DHS collection of online identity information is an intelligence surveillance program clothed as a customs administration mechanism.”

In more supportive comments delivered to CBP, the Center for Data Innovation said that just as universities, employers and lenders check social media profiles of potential clients, DHS should collect social media information from foreign travelers.

1 2 3 4