Category Archives: Cybersecurity

FBI Released Public Announcement About Ransomware Threat

The FBI released a new public announcement about the ongoing ransomware threat. They stated that the attacks are becoming more targeted and with losses increasingly more damaging.

HOW DOES RANSOMWARE INFECT ITS VICTIMS?

The new public message lists the common infection vectors; namely, email phishing campaigns, Remote Desktop Protocol vulnerabilities and software vulnerabilities.

IF MY SYSTEM IS INFECTED, SHOULD I PAY THE RANSOM? SHOULD I CONTACT THE FBI?

You should avoid paying the ransom at all costs. This also emboldens the criminals to target other organizations and attempt to hold them for ransom as well. Remember just because you paid the ransom does not guarantee they will give you your data back.

HOW CAN I PROTECT MYSELF AGAINST RANSOMWARE?

The FBI Stated the following: “As ransomware techniques and malware continue to evolve and become more sophisticated, even the most robust prevention controls are no guarantee against exploitation. This makes Read the rest

Comodo Forums Hacked By Exploiting vBulletin Flaw

Comodo, one of the largest SSL Security Certificate Authorities notifies that their vBulletin Forum has been hacked. Comodo Group reported that 170,000 forum users had their data stolen by a hacker who exploited a recently disclosed vulnerability in vBulletin’s internet forum software.

Comodo notifies its forum users

According to the announcement from Comodo, an attacker exploited the vBulletin security flaw on Sunday 11/30/2019; their action resulted “in a potential data breach on the Comodo Forums.”

The Comodo Forum is powered by the open-source Simple Machine Forum software but vBulletin is used on another board dedicated for product updates and discussions, which has far fewer members.

ITarian a Free MSP platform solution. It’s forums, also by Comodo, has 45,300 users and is on vBulletin. They published a similar announcement and the same recommendations.

What was affected?

It was found that the affected data includes forum usernames, names, e-mail addresses, IP … Read the rest

What Is A Data Breach?

A data breach is a security incident in which information is accessed without authorization. Data breaches can hurt businesses and consumers in a variety of ways. They are a costly expense that can damage lives and reputations and take time to repair.

Personally identifiable information — such as full names, credit card numbers, and Social Security numbers — is the most common form of data lost to data breaches, with personal financial information close behind.

Corporations and businesses are extremely attractive targets to cyber criminals, simply due to the large amount of data that can be nabbed in one fell swoop.

Why do data breaches occur?

Cybercrime is a profitable industry for attackers and continues to grow. Hackers seek personally identifiable information to steal money, compromise identities, or sell over the dark web. Data breaches can occur for a number of reasons, including accidentally, but targeted attacks are typically carried

Read the rest

Remove These 25 Malware Infested Android Photo Editing Apps NOW

Many Android photo editing apps in the Google Play Store were found to be malware infested, cybersecurity firm Symantec said they should be removed Now.

Symantec uncovered 25 malware infested apps in the Play Store, which were downloaded more than 2 million times. Symantec reported the malicious apps to Google already but if they are still on your phone you should delete them as soon as you can.

Here are the apps that were found to be infected with malware: 

-Auto Blur Photo

-Auto Cut Out (Free)

-Auto Cut Out Pro

-Background Cut Out Pro

-Blur Image Plus

-Blur Image Plus (1.0)

-Blur Image Pro

-Cut Paste Photo Editor

-Cut Paste Photo Editor (X 1.0)

-Face Feature 

-Fashion Hairstyles Pic Editor

-Fashion Hairstyles Pic Editor 2.4.6

-Image Blur Editor

-Image Blur Editor (Free)

-Image Blur Editor (Unlimited)

-Hairstyles Photo Editor Plus

-Latest Hairstyles (Free)

-Motion On Picture Read the rest

DoorDash Data Breach Affects 4.9 Million People

DoorDash, a food-delivery service, disclosed a data breach affecting 4.9 million people. Drivers, restaurants, and customers are affected.

The company said in a blog post, user information was accessed by an unauthorized third party. Here’s a partial list of personal data that could have been affected.

  • Names
  • Email addresses
  • Delivery addresses
  • Phone numbers
  • Hashed and salted passwords (which can make the passwords indecipherable to third parties).

The DoorDash data breach occurred on May 4, 2019. Only users who joined the platform on or before April 5, 2018 were affected. Those nearly 5 million accounts include customers who order food, restaurants that prepare it, and “Dashers,” the drivers who deliver it.

What other information was accessed in the DoorDash data breach?

For some users, additional information was exposed in the DoorDash data breach. Here are the details and who might be impacted.

Customers. The DoorDash data breach accessed the last four digits … Read the rest

Microsoft Update Broke Windows Defender

All your Windows Defender is broken thanks to a recent Microsoft Windows Update. The signature update was to fix a file causing system file checks to fail but the patch caused an even bigger issue, making Defender antivirus scans to fail altogether.

The issue was in place for about a day before Microsoft re-patched the antivirus endpoint protection software but not before a ton of press reports and user complaints have gone to the masses.

The fix for that bug was issued on Tuesday in a silent update – but that update ended up causing manual or scheduled Defender malware scans to fail if the “Quick” or “Full” scan options were selected – causing users to take to online forums to report the bug. Real-time scanning was still enabled; and the “Custom” scan option, where users can choose the folders they want to be checked, was also still working, … Read the rest

Xeon and Other Intel CPUs Hit by NetCAT Security Vulnerability

Intel’s server-grade processors are suffering from a vulnerability, which they dubbed NetCAT. The researchers at Vrije University in Amsterdam revealed on Wednesday The vulnerability enables a side-channel attack that can infer what a CPU is working on and is said to rely on issues with two Intel technologies found primarily in the Xeon CPU line: Data-Direct I/O Technology (DDIO) and Remote Direct Memory Access (RDMA). According to the researchers, 

 

“While NetCAT is powerful even with only minimal assumptions, we believe that we have merely scratched the surface of possibilities for network-based cache attacks, and we expect similar attacks based on NetCAT in the future,” the researchers, from the Vrije Universiteit Amsterdam and ETH Zurich, wrote in a paper published on Tuesday. “We hope that our efforts caution processor vendors against exposing microarchitectural elements to peripherals without a thorough security design to prevent abuse.”

NetCAT is a complex attack and … Read the rest

Social Media Website Logins Can Compromise Your Account

Many websites are offering alternative login methods but they could potentially compromise your social media account if your not careful.

Our attention to internet security has been 110% focus these days. Why use them? Google, Facebook, LinkedIn and Microsoft all offer multi-factor authentication meaning that if someone guesses, steals or cracks your password then they still can’t get in to your account without the second piece of authentication (e.g. SMS). But this means you have to enable the available multi-factor authentication which is not enabled by default and the majority of end users do not use this useful security option.

The internet is full of interesting websites and many of them allow us to interact with them as long as we provide some sort of login information. Some of these websites could have these social media plugins that allow you to use your social media login to gain access to … Read the rest

Identity Thieves Pushing New Chase Phishing Scams

Identity thieves continually develop new ways to obtain your personal information. I personally have gotten the latest Phishing email scam these thieves are using. Looks like these Hackers didnt stop at just hacking Chase but now also taking advantage of the Chase breach to do more harm to people. This email is not legitimate. If you get any emails like these, don’t respond to them. 

Some common tip-offs that an email is phony are typos, grammatical mistakes, awkward language, missing words, extra spaces, and other signs that the email was written unprofessionally. Such emails might also ask you to look at an attachment or click a link and then give your personal information on a Web page or in a form. Or the sender’s email address might look suspicious. If you hover over the links you can even see that it would not direct you to legit URL. Here Are Read the rest

Millions of Qualcomm based Android Smartphones Vulnerable

Security researchers from Tencent’s Blade Team released a notice that the Qualcomm chipset exposes millions of android smartphones to hackers.

Any user with a tablet or phone that uses this cpu is effected by the flaw called QualPwn. The bug allows attackers to take control of the phones remotely by crafting special packets that are sent over the air.

Three bugs make up QualPwn (CVE-2019-10539, CVE-2019-10540 and CVE-2019-10538). The prerequisite for the attack is that both the attacker and targeted Android device must be active on the same shared Wi-Fi network.

“One of the vulnerabilities allows attackers to compromise the WLAN and modem, over-the-air. The other allows attackers to compromise the Android kernel from the WLAN chip. The full exploit chain allows attackers to compromise the Android kernel over-the-air in some circumstances,” wrote researchers.

 

Blade.tencent.com stated “QualPwn is a series of vulnerabilities discovered in Qualcomm chips. One of the

Read the rest