Twitter March 2016

NC3-I_want_it

Return to Twitter Index page

March 31, 2016  Investigative reporter finds 60+ actions in 20+ states that attempt to compel tech companies with the All Writs Act not only for terrorism, but other underling charges. Some made “under seal” and away from watchful eyes. Just this once? Not.   This Update  Start of the Story  Tweet

March 31, 2016  US State Department Visa & Passport database exposes 500 million records including biometric identifiers. Worse: hackers could alter data allowing for issuance of passports and visas that would otherwise be denied.  Story  Tweet

March 29, 2016  20160329-ucUniversity of California students, staff and faculty were placed under electronic surveillance without notice by … the University of California. “Academic freedom” in the home of Silicon Valley and Berkely? What happened?   Story  Tweet

March 29, 2016  20160329-usmsMarshals Service Scam Widens. Bulletin issued and guidance on what to do if you get the call. Step 1) Remain Calm. Step 2) Remain Calm.   This Update  Start of the Story  Tweet

March 29, 2016  One way to defeat the Apple passcode counter, but did anyone try it? Also – some words from a self described tin-foil-hat conspiracy theorist.  This Update  Start of the Story  Tweet

March 28, 2016  20160328-appleDOJ will seek to dismiss case against Apple Computer stating that the San Bernardino iPhone was cracked without their assistance. No word on the information, if any, was obtained from the phone.   This Update  Start of the Story  Flash Tweet  Tweet

March 24, 2016  20160324-ukUK Payment Cards Industry Fraud Analysis. Summary: Has gotten worse in both absolute value and relative to sales.   Story  Tweet
 
 
 
March 24, 2016  20160324-victoryVictory for consumers! Four years after 31,800 people were compromised by a health care provider a class action lawsuit was settled in their favor. This Update   Start of the Story  Tweet

March 24, 2016  Update to large number of breaches unreported to the public or Congress. Damn Dam attackers indicted, but unlikely to ever appear in court.  This Update  Start of the Story  Tweet

March 23, 2016  20160323-hospitalAnother hospital reverts to 1970 after being compromised by ransomware. What happened, what you can do to prevent a catastrophic impact and discussion on paying or not.   Story  Tweet
 
 
March 23, 2016  20160323-carKeyless car fob range extended by crooks. Now the cars can be stolen without a scratch! Vulnerability known since 2011 ignored by auto manufacturers. Will keyless add to insurance premium?   Story  Tweet

March 23, 2016  20160322-ahAmnesty International released report citing encryption as necessary to the support of human rights and that forced backdoors are antithetical to those rights.  This Update  Start of the Story  Tweet

March 23, 2016  20160323-fbiWhat was the new support that might crack the San Bernardino iPhone and bring an end to the DOJ/FBI attempts to use the All Writs Act to compel Apple? Might be a renouned security company in Israel.  This Update  Start of the Story  Tweet

March 23, 2016  Verizon Customers – were you informed that personal information on 1,500,000 of you is up for sale?   Story  Tweet

March 22, 2016  20160322-memorexReal time video face alteration casts doubt on the truth of what we see. What the eyes see and the ears hear, the mind believes. Harry Houdini Master Illusionist. Story  Tweet

March 21, 2016  DOJ requests delay the day before Judge Pym was to reconvene in USA vs Apple Computer. Why? May have to do with new vulnerability announced earlier today.  This Update  Start of the Story  Tweet

March 21, 2016  Professor & students find new vulnerability in Apple iOS. Decidedly non-simple to exploit its appearance has disturbing impact on user security, but may provide a counter to the DOJ claim that the All Writs Act (AWA) is the only way.  This Story  Update to the AWA Story  Start of the AWA Story  Tweet

March 21, 2016  Inspector general finds major weaknesses in Veteran’s Administration Information Technology and Security for the 16th straight year. VA wants to double their cyber security budget to fix the problems within two years from the inspection.  Story  Tweet

March 21, 2016  Companies that allow bring your own device (BYOD) need to secure their information systems in a manner different than protection from company owned devices.  Story  Tweet

March 21, 2016  What country is the clear leader in getting bug bounties from Facebook since 2011? White hat hackers rule in India!  Story  Tweet

March 21, 2016  FBI NHTSA create public service announcement on protecting your car computers from hacking. Sounds like protecting your phone.   Story  Tweet

March 20, 2016  20160320-protonProtonMail ends 2 year beta and opens doors with end-to-end encryption for all. What they don’t have governments can’t get.  Story  Tweet

March 20, 2016  Use of the ‘secure’ in https measured and disclosed by Google for Google services and other domains. You might be surprised by what is and isn’t secured.  Story  Tweet

March 19, 2016  20160319-foiEver wonder what the some federal agencies know about you or grandpa? Don’t want to fill in all the forms? As a public service some folks have created a site to generate the forms. You still have to sign ’em and mail ’em, but you won’t get writers cramp doing it.  Story  Tweet

March 19, 2016  Security researcher investigating Bangladesh Central Bank $81M e-heist (attempted $1B) goes missing.  This Update  Start of the Story  Tweet

March 19, 2016  Small merchants who have EMV terminals face long delays in getting certified. They have no recourse except to wait while paying rising losses and interchange fees that include loss expense participation. So, two small merchants are suing and pursuing class-action status.  This Update  Start of EMV Story  Tweet

March 18, 2016  20160316-appleApple fires some criticism at the Department of Justice in another legal filing prior to the hearing scheduled for next Tuesday. Several interesting points about prior senior intelligence personnel taking the position that we are safer with strong encryption.  This Update  Start of the Story  Tweet

March 18, 2016  20160318-stageAndroid Users: Beware! StageFright has spawned an evil new variant Metaphor. To be compromised just watch a cute video for 15 seconds.  Story  Tweet

March 18, 2016  Major chip in ‘droid & IOT devices has severe vulnerabilities. Patches for affected phones are in the pipeline. Some IOT devices don’t get updates at all.   Story  Tweet

March 18, 2016  The consequences of identity theft get an information security professional arrested, at home, in front of his kids, for crimes committed by his identity. What happened before, after and how to prevent it from having that impact on you.   Story  Tweet
 
March 17, 2016  20160317-appleAceDeceiver for Apple devices, malware bypasses code review, enters AppStore, avoids all certificate controls, infects non-jailbroken devices and … you want more from a wallpaper app?   Story  Tweet

March 17, 2016  State of the Phish report – trends including impacts, costs, effectiveness, effect of personalization, sucker rate by industry, common protection types, and more.   Story  Tweet

March 17, 2016  Steam powered gaming: 77k accounts hacked per month by over 1200 Trojan groups that compromise accounts and steal game items that cost real money.   This Update  Start of the story  Tweet

March 16, 2016  20160316-malMassive Malvertising served from major web sites over the weekend. Angler exploit exposed many. Some web sites want you to drop your ad-blocker? “Just trust us” I do, but do I trust everyone you trust?   Story  Tweet

March 16, 2016  The inherent danger in the internet of things reaches to every room in the house and every connected device as aptly demonstrated at a recent press conference. (R-rated for explicit sex toy reference)  Story  Tweet

March 16, 2016  Update: Attempted theft of $1B from the Bangladesh Central Bank used internal messaging technology and appear to be fully authorized. May have been a breach from the outside or an inside job. Most funds stopped from leaving bank thanks to alert employees at intermediary banks (see start of story). $81M gone, 1 resignation, 3 fired.  This Update  Start of the Story  Tweet

March 16, 2016  Misconceptions on the debate between personal privacy and a surveillance state. How cybersecurity deliberately weakened by government act came back to expose much to our enemies. Good discussion.  This Update  Start of the Story  Tweet

March 16, 2016  Can someone with a tablet and skills open the blinds in your hotel room? Turn on the lights or open your door? Yes, if you’re in a place that used an old protocol without any authentication.  Story  Tweet

March 15, 2016  Florida Sheriff Judd will lock up that “rascal” Tim Cook, CEO of Apple if he won’t unlock an iPhone for him. We admire the clear presentation of intent but … Story  Tweet

March 15, 2016  20160315-swiperCrooks convert a charge card reader at a convenience store into a skimmer that works for them. All in just three seconds.   Story  Tweet
 
March 15, 2016  Apple vs FBI, the timing. Other encryption services currently operating. Futility of trying to curb encryption use when 2/3 of the products are from outside the US. A US Senator changes their mind in public.  This Update  Start of the Story  Tweet

March 15, 2016  Apple head of services worried that the next step is to compel Apple to remotely turn on camera and microphone of iPhones. The capability already exists. Where does privacy end?  Story  Tweet

March 15, 2016  President’s Speech at SXSW and a response from a presidential candidate.  This Update  Start of the Story  Tweet
 
March 15, 2016  20160315-usmsUpdate to the Marshals scam. Why it was so effective and what you should try to remember if this happens to you.   This Update  Start of the Story  Tweet
 
March 15, 2016  Locky update: New infection method (Word doc with macros no longer required) and a major increase in volume powered by the Dridex ‘bot network.  This Update  Start of the Story  Tweet

March 15, 2016  20160315-noiseThat cute image with sparkly noise can be part of a cyber security threat. The “noise” can be source code for malware, ready to be extracted with a snippet of code and infect your computer.   Story  Tweet

March 15, 2016  Your anti virus software is “certified” and that justifies the higher price tag for the superior protection. Are you sure? What does “certified” mean? Sometimes not so much.  Story  Tweet
 
 
March 14, 2016  20160314-usmsEver been called by the US Marshals Service and told they’re coming for you? It would have been a first for me, but my nose saved me.  Story  Tweet
 
 
 
March 14, 2016  20160303-drownUpdate on the DROWN vulnerability. Knowing is half the battle. Seems we’re not winning the other half any time soon.  This Update  Start of the Story   Tweet
 
 
 
March 13, 2016  20160313-javaOctober 2013 Oracle: Java problem fixed. March 2016: Umm, no it wasn’t and millions are still vulnerable.   Story  Tweet
 
 
 
 
March 12, 2016  20160312-amicusA person not a direct party to the ongoing battle between the DOJ/FBI has provided support friendly to Apple and hopefully of interest to the court as to official statements already submitted.   This Update  Start of the Story  Tweet

March 11, 2016  20160311-fbiFBI/DOJ files response to Apple in San Bernardino case. Interesting reading for the strong of stomach.  This Update  Start of the Story  Tweet
 
 
 
March 11, 2016  20160311-fingerSimplest way we know to defeat fingerprint biometric security on cell phones. Requires digital image of print (not even a great picture), a color inkjet printer, some commercially available paper and presto!  Story  Tweet

March 11, 2016  2.2 million exposed during breach of 12st Century Oncology more than five months ago.   Story  Tweet

March 11, 2016  Irony: “High security” web hosting company knocked off line by DDoS attack and apparently hacked exposing customer information including charge cards. Insult: along with public links to company information the hackers posted what not to do when running a “high security” hosting company.   Story  Tweet

March 11, 2016  Alert bankers stop almost one billion US dollars in multiple transfers from a nation’s central bank. Good nose!  Story  Tweet
 
March 10, 2016  20160310-isisDisillusioned member brings trove of information on 22,000 ISIS member.  Story  Tweet

March 10, 2016  Bad News: Tyupkin malware (ATM jackpotting, updated to new version “GreenDispenser”) breaks jail.   Story  Tweet

March 10, 2016  20160310-scYou get a parking ticket with a nice quick recognition code to scan for payment or protest. Do you scan it?  Story  Tweet

March 10, 2016  Searching the internet for “how to hack facebook”? Beware else you wind up being the one hacked. Someone did find a large, gaping security hole, and bravo to FB for closing it quickly.  Story  Tweet

March 10, 2016  20160310-truckTelematics (GPS, speed etc) for hundreds of trucks were found to be insecure using 40+ year old software.  Story  Tweet
 
 
 
 
March 09, 2016  20160307-irsA weak security measure was targeted and compromised by crooks victimizing people twice. The IRS has stopped issuing IP-PINs.  Targeted Story  Stopped Story  Tweet
 
 
March 09, 2016  20160309-hackersConverting some bad hackers into white hats. If you can’t beat ’em hire ’em!   Story  Tweet
 
 
 
 
 
March 09, 2016  20160309-nsaYou think you have a cyber security problem? How about 300 million hits a day? ouch!   Story  Tweet
 
 
 
 
March 08, 2016  20160308-ermAnother company gets a fake email from a “senior official” and sends off a print of W2 information for current and former employees.   Story  Tweet
 
 
 
March 08, 2016  20160302-wendyWendy’s confirms breach. Number affected remains unknown. Credit unions hit hard and fast with related debit card fraud.   This Update  Start of the Story   Tweet

March 08, 2016  DOJ Appeals Judge Orenstein’s ruling denying the requested application of the All Writs Act in New York.  Story  Tweet

March 07, 2016  20160307-appleA fully capable ransomware targets Macs. Introduced as a Rich-Text-Format document, part of a legitimate application installer. Signed by valid Apple developer certificate.  Story  Tweet

March 06, 2016  20160305-appleIn the boxing match that pits a surveillance state vs personal privacy in one corner stands the Attorney General and the FBI. In the other, the Secretary of Defense, the Secretary of State, the UN Commissioner for Human Rights, Apple, Google, AT&T and more.  This Update  Start of the Story  Tweet

March 06, 2016  20160309-seagateSeagate scammed out of W2 information for current and former employees in the same email spear phishing attack that speared SnapChat, but not others.   Story  Tweet

March 05, 2016  Four stories  Tweet    Update on breach under reporting at law firms Story    Irony strikes at RSA security conference Story    Clickjacking – misusing accessibility tools to get users to allow malware. Story    Oh no Dwolla, didn’t! Story

Happy Progress Day! March Fourth!

March 04, 2016  20160304-appleSmartphones hacked by listening to radiation and power level changes to extract signing keys from Elliptic Curve Digital Signature Algorithm (ECDSA) used in many applications such as Bitcoin wallets, Apple Pay, OpenSSL, CoreBitcoin, iOS and more   Story  Tweet

March 04, 2016  Amazon rips crypto from appliance and screw the people who were using it.   Story  Tweet

March 04, 2016  20160304-cpsUK Crown Prosecution Service published for public comment laws catching up to social media crimes. [ anyone in US paying attention? ]   Story  Tweet
 
 
 
March 04, 2016  20160304-pirateModern day sea pirates combine the historical tactics of their swashbuckling heyday and adopt some modern technology concepts.  Story  Tweet
 
 
 
March 03, 2016  20160303-drownMultiple legacy crypto weaknesses can now be exploited. An unintended byproduct of government influence and an argument against backdoors, deliberate, or like this.  Story  Tweet
 
 
March 02, 2016  20160302-appleA 1984 Supreme Court case and the 1994 Communications Assistance for Law Enforcement Act skewer Department of Justice attempt to use All Writs Act to bypass inconvenient law.  This Update  Start of the Story   Tweet

March 02, 2016  US smartphone market penetration rises for fourth straight quarter approaching 80%.   Story  Tweet

March 02, 2016  Multiple updates on surveillance vs privacy embodied in Apple v FBI.    Did the Department of Justice skip a step? This Update    FBI Director asks: What if Apple engineers are kidnapped? This Update    Proposed foreign legislation on forcing manufacturers to crack their own phone. This Update    Start of the Story     Tweet

March 02, 2016  McAfee Labs published a five year look ahead for threats against hardware, ransomware, payment systems, via and against cloud services, wearable technology, automobiles, cyber espionage, hacktivism, and more.  Story  Tweet


March 1, 2016  20160229-appleApple wins in New York as judge declined late yesterday to force them to comply with All Writs Act.   This update   Start of the Story   Tweet

March 01, 2016  Catch up on seven stories from February we couldn’t get to in time. Tweet
“Locky” Ransomware Story
CTB Ransomware attacks websites Story
Twitter password recovery bug exposed 10k. Story
Is your wireless printer exposing your network? Story
Police brew and refine their own surveillance trojan Story
TOR hacked by US University under DOD contract? Story
MouseJacking, not a joke, a cheaply mounted attack you don’t want to receive. Story

 
 
 
 

[ Some tweets tweaked for clarity
or revised URLs -ed ]
Return to Twitter Index page
Visit Us On FacebookVisit Us On Twitter