Category Archives: Cybersecurity
6.8M Facebook Users Private Photos Exposed
The Facebook bug allowed 1,500 apps built by 800+ developers to view unposted private photos.
Friday Facebook disclosed that a bug in the platform enabled third-party apps to access unpublished photos of millions of users.
When your writing a new post and upload a photo but do not finish posting it Facebook will store it in the database as a draft. This gave the third party app creators access to these drafts.
Facebook has seen many other breaches, enough is enough. I’m sure there will be a class action lawsuit. I believe the reputation of Facebook has been continually tarnished by security issues and users are deeply thinking about disabling their accounts.
… Read the restMac Malware Injects Ads Into Encrypted Traffic
A newly discovered malware infection targeting macOS devices.
Malwarebytes security researchers say it has the ability of injecting ads into encrypted web traffic.
This malware is call OSX.SearchAwesome, the malware is delivered by a malicious installer that arrives as an app downloaded using a torrent file. The malware installer looks like a disk image file but doesn’t have the usual icon art that is used to make it look legitimate.
When the malware is launched, the image file installs the the payload silently and then it requests the user to authorize changes to the Certificate Trust Settings and to allow a component called spi to modify the network configuration. This will then allow the malware to inject itself to network traffic.
… Read the restMarriott Data Breach hits 500 million Starwood Guests
Marriott Data Breach hits 500 million Starwood guests. It was said that during the investigation, there had been unauthorized access to the Starwood network since 2014. The information copied from the Starwood guest database over all this time were names, mailing addresses, phone numbers, email addresses, passport numbers, Starwood Preferred Guest (“SPG”) account information, dates of birth, gender, arrival and departure information, reservation dates, and communication preferences.
Starwood brands include: W Hotels, St. Regis, Sheraton Hotels & Resorts, Westin Hotels & Resorts, Element Hotels, Aloft Hotels, The Luxury Collection, Tribute Portfolio, Le Méridien Hotels & Resorts, Four Points by Sheraton and Design Hotels. Starwood branded timeshare properties are also included.
Attempted Breach on DELL EMC Network
There was an attempted breach on DELL EMC customers using Dell.com. The company has been stressing customers to change their passwords. Dell cybersecurity teams are still not sure on how hackers got access to the information on the website. They are not sure if it was due to vulnerabilities or other causes. But it was said they took proper measures to mitigate any further attacks.
Dell Announces Potential Cybersecurity Incident
ROUND ROCK, Texas, Nov. 28, 2018 – Dell is announcing that on November 9, 2018, it detected and disrupted unauthorized activity on its network attempting to extract Dell.com customer information, which was limited to names, email addresses and hashed passwords. Though it is possible some of this information was removed from Dell’s network, our investigations found no conclusive evidence that any was extracted. Additionally, Dell cybersecurity measures are in place to limit the impact of any potential exposure. These
Hackers Breach Dunkin’ Donuts Accounts
Tuesday Dunkin’ Donuts posted an advisory on the website regarding to its credential stuffing attack on the companies data.
What does This Credential Stuffing mean?
Credential stuffing is a term related to a specific type of hacking that secures user credentials by breaching a system, and then attempts to use those credentials with other systems. Like other kinds of related hacking, credential stuffing attacks rely on hackers being able to get into a network and take out sensitive user information such as passwords and usernames.
Dunkin Brands Inc. (“Dunkin’”) is writing to provide you with information regarding a recent
incident involving your DD Perks account. Although Dunkin’ did not experience a data security
breach involving its internal systems, we’ve been informed that third-parties obtained usernames
and passwords through other companies’ security breaches and used this information to log into
some Dunkin’ DD Perks accounts. One of these may have been … Read the rest
Microsoft Warns of Apps Exposing Private Keys
On Tuesday Microsoft notified users that digital certificates have been compromised for two apps which allowed someone to remotely spoof websites and content. The issue was that the certificate and private key were the same for anyone who installed these two applications. Which allowed a hacker to decrypt the software’s private key which compromised the security of the windows computers. The certificate became susceptible to attacks like spoofing, phishing, or man-in-the-middle attacks.
November 23, following a vulnerability identified in Sennheiser HeadSetup and HeadSetup Pro, new versions have been made available.
Updating the software to its latest version will rid the software of vulnerable certificates. Additionally, the invalidation by Windows November 27th of the former certificates fully eliminate the possibility to exploit the certificates.
The latest software versions are as follows:
Mac users and Windows users, that
… Read the restOctobers HealthCare.gov Data Breach Exposed Individuals Personal Information
Octobers HealthCare.gov Data Breach Exposed Individuals Personal Information. The details that were surfaced about the data breach said that around 75,000 consumers were effected. Letters were sent out to affected people from the Centers for medicare and Medicaid Services and it said that the sensitive data exposed may have included Social Security numbers and a variety of other personal information including income, tax filing status, family relationships and immigration status. At least no Financial information was exposed this time around and none of the exposed data included patient diagnosis or treatments.
The system that was hacked was connected to the Healthcare.gov website. Anyone that used it to sign up for a new insurance plan were compromised, hackers targeted the behind-the-scenes system that insurance agents used to help customers directly enroll in their new plans, and not the consumer Healthcare.gov site itself.
Maintaining Security with Internet of Things
Our lives have been taken over with many many WiFi enabled capable devices. The internet of things (IoT) has quite a flaw which is security. Many vendors lax on providing security updates to their software that are used in smartphones, tablets, PC’s , Game Consoles , TV’s , your Fridge and many other devices. This day in age we have to maintain a due-care and due-diligence approach on security for all these IoT devices.
With this in mind, here are seven best practices on security for IoT:
- Use security gateways: They have the ability to inspect and audit the communications of your network.
- Use VLans: Put all IoT devices in a separate Vlan outside primary business network.
- Use strong authentication: Change those consumer devices default passwords!
- Disable services: Many devices use telnet, FTP and other risky services that may be exposed to the internet.
- Use secure protocols:
Skype For Business brought down by the Kitten of Doom Emoji Attack
Crash Skype for Business by sending a large number of emojis 800+ kittens in one message and the client freezes the program for a few seconds. This can be exploited to perform Denial of Service attacks against Skype for Business users and compromises the availability of the program.
How would an attacker go about performing this attack? Well its quite simple, the attacker can continuously send many messages to the chat window and it will freeze the program for all participants in the meeting room and prevent them from using the chat or seeing the video.
Are you affected?
You could send yourself a few hundred emojis and see if your client freezes but we wouldn’t recommend it. Plus, there is an easier way. Just check if your client is one of these:
- Skype for Business 2016 MSO (16.0.93).64-Bit or before
- Lync 2013 (15.0) 64-Bit part of Microsoft Office Professional
Ransomware saw massive growth year after year.
New reports on not just ransomware but all malware saw massive growth year after year. From SonicWall the cyber-security company detected 45 percent growth of malware infections towards desktops. SoncWall spotted 300,000 new attack variants so far this year. SonicWall’s recently announced Capture Cloud Platform is designed to counter these rising threats.
SonicWall Capture Threat Network, which includes more than 1 million sensors across the world, recorded the following 2018 year-to-date attack data through September 2018:
- 8.5 billion malware attacks (54 percent increase from 2017)
- 2.9 trillion intrusion attempts (49 percent increase)
- 262.4 million ransomware attacks (108 percent increase)
- 1.9 million encrypted threats (56 percent increase)
In September 2018 alone, the average SonicWall customer faced:
- 1,662 malware attacks (24 percent decrease from July 2017)
- 791,015 intrusion attempts (19 percent increase)
- 56 ransomware attacks (99 percent increase)
- 70.9 encrypted threats (61 percent decrease)
- 10 phishing attacks each day (92 percent decrease)