Are Smart Phones Really That Smart?

Are Smart Phones Really That Smart?

With increased connectivity, the real world and the digital world are becoming intrinsically connected. The Internet of Things is growing exponentially and more and more devices in offices, on roads and in homes form part of this interconnected network. Cars are propelled without people at the wheel, big data is no longer just tech jargon, and it is becoming simpler to track mobile phones, cars, and even people remotely. While this is an exciting time for technological growth, these incredible developments also have a downside. One of the biggest drawbacks to global tech progress is that third parties now have unparalleled access to private information, which is ostensibly securely stored online. This creates various cyber vulnerabilities to businesses and individuals that are unfortunately mostly ignored.

Cyber Threats

After hackers penetrated hackable software in Chrysler’s database 1.4 million vehicles had to be recalled resulting in massive losses. Digital spies are exploiting trust relationships for financial or political gain.

personal details

Bank application personal details

Corporate companies have insane levels of access to consumers’ digital movements and personal information. These examples draw a rather bleak picture – and this is only the tip of the iceberg in our increasingly connected world. Research is being conducted to identify and assess potential threats, and to formulate solutions. Some of the findings were:

  • The movements and habits of online users are being tracked without their consent
  • Even when users are aware of this and take steps, pattern-matching algorithms still keep track of their movements
  • Options to limit data infringements are limited
  • These is a mammoth lack of digital privacy in the world
  • The need to address data privacy problems is increasing

Cyber Safety Options for Consumers and Companies

Once a consumer opts in to an affiliation, there is little they can do to secure their personal data, but the following protective measures are advised:

  • Download reputable software for blocking and deleting cookies
  • Avoid downloading unnecessary apps
  • Use strong passwords and do not repeat the same password

Unfortunately, the risks are higher for companies and maintaining cyber safety is far more complicated. It is highly recommended that companies approach a cyber-safety professional to implement preventative measures and to deal with threats.

An International Issue

While the security of a country is its own responsibility, the digital world stretches across the globe and it is not always possible to determine whose responsibility digital safety is. It is interesting to note that there is a significant lack of experts in the field of cyber security, despite the upsurge in digital tech. Research has revealed that at least a million skilled workers are needed to ensure the digital safety of companies around the world. One sector that has taken off recently is cyber insurance. Unfortunately it is not without issues. Policies are not providing protection to policy-holders for reasonable data protection and are rife with exceptions. The reality that has not yet sunk in is that the economy will be affected if measures are not taken to deter cybercrime. The first step for companies and consumers alike is to start gathering knowledge. Without revealing the cause, a problem cannot be properly addressed. The only way forward is to harness information to explore potential solutions to this major threat.

How Big Is the Threat Posed by Ransomware?

How Big Is the Threat Posed by Ransomware?

How worried should we be about the threats posed to our homes and incomes by the new kind of computer virus known as “ransomware”? The recent, very high-profile series of attacks in which over 150 different countries were targeted by the form of the ransomware virus known as “WannaCry” have made this question seem very urgent indeed. Essentially, these attacks have made us far more conscious of how much we are at risk from the nefarious activities of cyber criminals. According to some, the WannaCry attacks may even mark the start of a whole new era, one in which hackers have become dangerously adept in the art of finding vulnerabilities in our online security systems. New levels of interconnection mean that we need to be more aware of our cyber security needs and ready to apply all necessary measures quickly and effectively.

Cyber Security and Its Future

When certain Microsoft Windows operating systems were hit by the recent wave of WannaCry attacks, users found that ransomware had been downloaded onto their computers and that this malicious software computer under attackwas preventing them from accessing their computer systems. The cyber criminals responsible for these attacks instructed their victims that they would have to pay via the cryptocurrency known as Bitcoin if they wanted to regain access to their computer systems. Microsoft spokespersons were keen to say that the U.S. government was to blame for these failures of cyber security, but others point out that, with its commercially driven software updates, Microsoft itself helped to create the vulnerabilities that the cyber criminals exploited.

The ransomware attacks raise profound questions. Will cyber insurance become a big business? If so, how is it even possible to assess the financial value of data? Will governments now have to provide funding to defend their citizens against cyber criminality?

(source:https://goo.gl/puxdiz)

What Happens When The Cyber Alarms Don’t Work?

What Happens When The Cyber Alarms Don’t Work?

Over half of all organizations assume that their IT networks have been penetrated, or will be in the future. The number of IT professionals admitting that they really don’t have complete control over sensitive systems and data is increasing each year.

The First Line of Defense Has Already Fallen

Perimeter detection is the first line of defense against any attack, whether it be physical, think an alarm going off when security in your home is breached, or an ATM blocking your back card if there have been too many incorrect PIN entries. The issue currently facing many IT experts, security analysts and information security professionals is that there has previously been an over reliance on perimeter detection as the ONLY line of defense. Not only are cyber-attacks completely bypassing perimeter detection, a recent survey reported that up to 30% of all security breaches never triggered the virtual alarms, but that preventative discovery is close to non-existent in many organizations.

What is even more alarming is what happens after a security breach.cyber bypass detection

The speed with which an organization reacts after a breach is vital in not only securing sensitive information but in examining and investigating exactly what happened, finding the compromised end-points and determining the full data risk impact as fast as possible. The problem is that most organizations are reactive instead of proactively aggressive in their search for potential threats at all times. In the same survey, it was noted that up to 25% of IT security professionals were notified of data breaches and cyber-attacks by a 3rd party. By then it could be too late.
Figuring out what happened after the fact is essential. Yes. Creating a secure environment that STOPS attacks is even more vital. To do that security professionals need to be vigilant, proactive and relentless in their hunt for cyber threats before they become cyber casualties of war.

Flash Player zero-day vulnerability

Flash Player zero-day vulnerability

As indicated in FortiGuard Advisory FGA-2010-53, an attack exploiting a critical zero-day vulnerability in Adobe Flash Player was found very recently roaming in the wild. Although the attack vector in the wild is a PDF file, it is a Flash Player vulnerability indeed (Adobe Reader embeds a Flash Player).

After analyzing the PDF sample, we do confirm that the core ActionScript in the embeded flash file, which triggers the exploit, is almost exactly the same as that of an example on flashamdmath.com, as Bugix Security guessed.

Almost? Indeed: the only difference lies in a single byte (at 0x494A, for those who’d like to make a signature based on that ;)), changed from 0×16 in the example to 0×07 in the exploit code:

pic1

What does this correspond to? Simply to an ActionScript Class id sitting in the “MultiName” part of the file (According to Adobe’s ActionScript Virtual Machine 2 Overview):

pic2

So, the original fl.controls::RadioButtonGroup class in the example becomes a fl.controls::Button class in the sample. Thus, at runtime, all references that are supposed to point to fl.controls::RadioButtonGroup actually refer to fl.controls::Button… which, somewhere below, triggers the vulnerability:

pic3

Based on this, it is not extremely challenging to guess how the attacker discovered this 0day vulnerability: Simply by running a “dummy” fuzzer on basic flash files, as many bug hunters are doing. We had already noticed the same thing likely happened for CVE-2010-1297 and CVE-2010-2884.

Spying Malware Detected in Biomedical Company

Spying Malware Detected in Biomedical Company

Security experts have recently discovered a previously unknown Mac-based spy malware that preys on outdated coding practices to launch real-world attacks on computers in the biomedical research industry.

The unsophisticated and out-of-date code has remained undetected for years on macOS systems. The malware has been labelled Fruitfly and it was first discovered as ‘OSX.Backdoor.Quimitchin’. An IT administrator working for information security firm Malwarebytes was alerted to the malware due to unusual outgoing activity sourced from a Mac computer.

The First Malware of 2017

Researchers are labelling the Fruitfly the first Mac Malware of 2017. Fruitfly is said to contain code dating back to OS X and it has been conducting surveillance on targeted networks for over two years. Fruitfly uses a hidden pearl script which communicates with command and control servers. Disturbingly for targeted biomed companies, Fruitfly can capture webcam, screenshots, grab system uptime while moving and clicking the mouse cursor.

Fruitfly’s reach can extend to connected devices in the same network as the corrupted Mac as it attempts to connect to these also. Fruitfly uses a secondary script along with Java class to conceal its icon from displaying in the macOS Dock. It’s still unknown how the malware was distributed and infected the Macs.

Code Dating from 1998Shimon sheves- mac malware

Researchers have found that the malware’s code pre-dates Apple’s OS X and that it is running on “libjpeg” code, JPEG-formatted images files that were last updated almost 20 years ago in 1998.

How Has it Gone Undetected for so Long?

In a blog post written by Malwarebytes’ Thomas Reed, he speculated that Fruitfly has been used selectively in very tightly targeted attacks which have limited its exposure. International espionage is a buzz topic right now and the nature of this form of attack is a hallmark of past Russian and Chinese attacks aimed at US and European scientific research.