Newsflash maandag 24 oktober 2016
'Kabinet wil dat politie beveiligingslekken geheim kan houden'
(nu.nl)

Het kabinet wil dat de politie geheime beveiligingslekken moet kunnen gebruiken om de computers van criminelen te hacken. Zulke lekken mag de politie dan ook een tijd geheim houden.

Dat wil het kabinet binnenkort voorstellen, stellen bronnen in Den Haag tegen de Telegraaf. Er wordt al enkele jaren gewerkt aan een nieuwe versie van de Wet computercriminaliteit, die de politie toestemming zou geven om verdachten te hacken.

Daarbij was echter nog onduidelijk in hoeverre de politie toestemming zou krijgen tot zogenoemde zero-day-lekken, die nog niet bekend zijn bij de maker van de kwetsbare software of hardware.

Adviesonderzoek: cookiewet is ergerlijk en beschermt privacy niet
(tweakers.net)

De cookiewet leidt alleen maar tot tijdsverspilling en irritatie bij gebruikers en beschermt hun privacy niet. Dat zou blijken uit een onderzoek van het Adviescollege toetsing regeldruk, of Actal, dat voor het kabinet en de Tweede Kamer is uitgevoerd.

"De cookiewetgeving in zijn huidige vorm levert slechts regeldruk en ergernis op," stelt Actal-voorzitter Jan ten Hoopen. Door de grote hoeveelheid van dergelijke meldingen zouden gebruikers de cookiemeldingen routinematig wegklikken.

Dit zou ook komen doordat gebruikers geen alternatief geboden wordt; het is niet ongewoon dat een website niet functioneert als gebruikers geen cookies accepteren.

Marktplaats-gebruikers doelwit van phishingaanval
(security.nl)

De afgelopen dagen zijn er allerlei phishingmails verstuurd die van de populaire veilingsite Marktplaats afkomstig lijken en proberen om de inloggegevens van gebruikers te ontfutselen. Volgens de berichten is het e-mailadres van de gebruiker voor Marktplaats veranderd.

Via de meegestuurde link kan dit echter ongedaan worden gemaakt. De link wijst naar een .com domein met vervolgens in de link "www.marktplaats.nl/account/login98af(dot)html".

Gebruikers zouden daardoor kunnen denken dat de link echt naar Marktplaats wijst, ook al gaat het hier om een directory van het .com-domein. Ook hebben de internetcriminelen achter de campagne domeinen eindigend op .ml gebruikt, het topleveldomein van Mali.

'Unprecedented' cyberattack involved tens of millions of IP addresses
(cnn.com)

Dyn, an Internet middleman company, was the target of the distributed denial-of-service, or DDoS, attack that hit in three waves. Dyn directs traffic when people type a URL into a browser. So the attack on the company caused temporary outages at many of the internet's most widely-trafficked sites.

On Saturday, Dyn revealed that a "sophisticated" attack involved "10s of millions of IP addresses." The outages were caused, at least in part, by malware sent by hackers to devices connected to the internet.

"The sheer volume and consistency of these attacks was unprecedented," said Dyn's chief security officer Kyle York. "We run 18 data centers globally and it was hitting all of them at different and unique times."

Chinese firm admits its hacked products were behind Friday's massive DDOS attack
(cio.com)

A Chinese electronics component manufacturer says its products inadvertently played a role in a massive cyberattack that disrupted major internet sites in the U.S. on Friday.

Hangzhou Xiongmai Technology, a vendor behind DVRs and internet-connected cameras, said on Sunday that security vulnerabilities involving weak default passwords in its products were partly to blame.

According to security researchers, malware known as Mirai has been taking advantage of these vulnerabilities by infecting the devices and using them to launch huge distributed denial-of service attacks, including Friday’s outage.

U.S. indicts Russian for hacking LinkedIn, Dropbox, Formspring
(computerworld.com)

The U.S. has charged a suspected Russian hacker with breaking into computers at LinkedIn, Dropbox and a question-and-answer site formerly known as Formspring.

On Thursday, a federal grand jury indicted 29-year-old Yevgeniy Aleksandrovich Nikulin following his arrest by Czech police in Prague on Oct. 5.

LinkedIn has said that Nikulin was involved in the 2012 breach of the company that stole details from over 167 million accounts. However, a U.S. court filing unsealed on Friday only gave limited details on Nikulin's alleged crimes.

Microsoft warns of malware dressed up as Security Essentials
(itnews.com.au)

A new Windows malware masquerading as a Microsoft Security Essentials (MSE) installer is making the rounds on the internet, attempting to trick users into contacting tech support scammers for paid assistance.

Microsoft said the malware, which it calls Hicurdismos, arrives as a drive-by download with the file name setup.exe, using an icon that looks similar to the company's MSE security program. It can also be bundled with other software that users download.

If users run the file, Hicurdismos generates a fake "blue screen of death" computer crash.

Anonymous’ Most Notorious Hacker Is Back, and He’s Gone Legit
(wired.com)

Six months ago, Hector Monsegur hit send on an email to about a dozen new hires on the IT staff of a certain Seattle-based tech company whose names were carefully chosen from social media.

The email, as he describes it, was a classic phishing scheme: It spoofed a note asking the targets to log into a company wiki that would “provide an information sharing platform within the group.”

But unlike the typical phishing spam linking to a sketchy Chinese URL any competent IT staffer would scoff at, the link was a respectable-looking subdomain of the company’s own web site.

As Reported Attacks Increase, Some Cops Will Police Online Transactions in Person
(nbcnews.com)

It's more common than you think — you reach a deal over an e-commerce site like Craigslist or eBay, but when you go to complete it, things go bad.

That's what happened last week to a 22-year-old man who thought he was buying an iPhone near Philadelphia. When it came time to show up in person to pay for the phone, he walked into an ambush and was shot in the leg by the "seller," who was really an armed robber, police said.

It wasn't the first time that's happened. Online deals gone bad are so common, in fact, that cops across the country are starting to step in, teaming up with residents to safeguard transactions in their neighborhoods by inviting online sellers and buyers to "safe exchange zones" at police offices, where surveillance cameras track all exchanges.

Every LTE call, text, can be intercepted, blacked out, hacker finds
(theregister.co.uk)

Hacker Wanqiao Zhang of Chinese hacking house Qihoo 360 has blown holes in 4G LTE networks by detailing how to intercept and make calls, send text messages and even force phones offline.

The still-live attacks were demonstrated at the Ruxcon hacking confab in Melbourne this weekend, with the demo offering a recording of the hack perpetrated in part on a live network. It exploits fall-back mechanisms designed to ensure continuity of phone services in the event of overloads.

The tested Frequency Division Duplexing LTE network is more popular than TDD-LTE and operates in Britain, the US, and Australia. The competing Time Division Duplexing (TDD) LTE network is more common in Asian countries and in regions where population densities are higher.

Hacking 3D manufacturing systems demonstrated by researchers
(helpnetsecurity.com)

Researchers from three universities combined their expertise to demonstrate the first complete sabotage attack on a 3D additive manufacturing (AM) system, illustrating how a cyber attack and malicious manipulation of blueprints can fatally damage production of a device or machine.

In their paper titled “Dr0wned,” researchers from Ben-Gurion University of the Negev (BGU), the University of South Alabama and Singapore University of Technology and Design detail how to sabotage the quality of a 3D-printed functional part, which leads to the destruction of a device.

The proof-of-concept video below shows how the researchers destroyed a $1,000 quadcopter UAV drone by hacking into the computer used to control the 3D printing of replacement propellers.

Cyber Training For First Responders To Crime Scene
(darkreading.com)

FBI ties up with police association and Carnegie Mellon University to improve working knowledge of cyber investigations.

The FBI’s cyber unit, in association with experts from Carnegie Mellon University and the International Association of Chiefs of Police (IACP), has developed a Cyber Investigator Certification Program (CICP) to provide a working knowledge of cyber investigations to the first responders to a crime scene.

A release on the Bureau’s website says the first responder’s course was launched in October 2015 and is aimed at improving cyber knowledge of law enforcement personnel. So far 5,000 officers have enrolled for the training, which is free of charge.

Police need to be better equipped to fight cyber crime
(scmagazineuk.com)

Cybercrime in the UK is on the increase in the UK and police are not well equipped to deal with the problem, according to experts.

The latest crime survey for England and Wales (CSEW) by the Office of National Statistics (ONS), found that there were 3.6 million fraud and 2.0 million computer misuse offences experienced in the 12 months.

The ONS said that the latest statistics showed an annual rise of five per cent in frauds referred to the police. Industry data on financial fraud, the vast bulk of which is unreported to the police, showed there were 1.9 million cases of frauds on UK-issued cards, an increase of 46 per cent from the previous year.

Could tweets influence your health insurance premium?
(itnews.com.au)

When people take to Twitter to comment on the great evening they enjoyed with good food and wonderful friends, reducing their monthly insurance bill is probably the last thing on their mind.

But such tweets could help insurers to price premiums for individuals, with research suggesting a direct link between positive posts and a reduced risk of heart disease.

This could lead to future insurance cover based on "sentiment analysis", in which big data and artificial intelligence make predictive models ever more accurate.

Warnings over Dirty Cow Linux bug
(bbc.com)

Users of the Linux operating system are being urged to update it to remove a "serious" bug that hackers could use to hijack systems. Known as the Dirty Cow bug, the vulnerability has been present in many versions of Linux for almost a decade.

The warnings come as malicious hackers start exploiting it to take over vulnerable computers. The vulnerability gets its name from the Linux sub-system, called Copy-On-Write or COW, in which it appears.

Updated versions of Linux that no longer suffer the bug are now being widely distributed. Millions of computers, including a majority of web servers, run Linux or one of its variants.

‘Wannabe’ cyber criminals – A new rising threat to financial institutions
(itproportal.com)

The financial services industry has done much to bolster its cyber resiliency in the face of criminals targeting its underlying infrastructures. Security has become a part of the boardroom agenda and many large financial institutions are now better prepared to deal with cyber threats than ever before.

However, while financial institutions have upped the ante in protecting themselves, cyber criminals show no sign of slowing down and are relentlessly trying to outsmart their targets by employing ever more sophisticated tactics.

A recent example is the creation of malicious and harmful services that are then sold to the highest bidder. The technique was first flagged by a Europol Cyber Crime Centre report in 2014. This claimed that criminals, lacking the intellectual capital to do it themselves, were buying ready-made cyber attack packages.

Indian Banks Hit By Debit Card Security Breach
(darkreading.com)

A cybersecurity issue has hit the debit card network in India with a possible compromise of the backend system of ATM operations, thus forcing several banks to replace cards or ask for changes in security codes, reports Reuters. Authorities say 3.25 million debit cards involving around 90 ATMs may have been impacted by the breach.

The matter came to light after complaints of fraudulent use of cards, prompting immediate action from network providers Visa, MasterCard, and RuPay. Sources say Hitachi Payment Services may be the switch provider that was compromised.

"Necessary corrective actions already have been taken and hence there is no reason for bank customers to panic," said A.P. Hota, CEO of National Payments Corp of India CEO (NPCI), which manages the largest shared-ATM network.

Bankers plan to give Corda blockchain code to Hyperledger project
(pcworld.com)

Corda, a distributed ledger platform developed by a finance industry consortium, will go open source next month when its developers donate the code to the Linux Foundation's Hyperledger Project.

The move was reported by Reuters on Thursday and the story subsequently reposted to the websites of Corda backer R3 and the Hyperledger Project.

A distributed ledger, sometimes referred to as a blockchain, is a database shared across a number of servers and that relies on a consensus among those servers to guarantee its integrity.

Build a bot or not? For banks, Forrester has an important answer
(venturebeat.com)

Whether ’tis smarter for banks to suffer the slings and arrows of potentially falling behind — or build bots with their attendant risk. That’s the question we’ll be answering in this VB Live event featuring Forrester senior analyst Peter Wannemacher. Join us for insight into how to leverage the power of banking bots while minimizing the real potential for danger to your brand.

“We could have written a report called, ‘Bots are just a fad; ignore them, you don’t need them,’” says Peter Wannemacher, senior analyst at Forrester Research. He’s referring to the newest Forrester report, “Bots Aren’t Ready to Be Bankers.”

Indeed, the report did take take a cautionary view specifically for the banking sector, but that doesn’t represent the whole story.

Google drops ban on personally identifiable web tracking
(theage.com.au)

When Google bought the advertising network DoubleClick in 2007, Google founder Sergey Brin said that privacy would be the company's "number one priority when we contemplate new kinds of advertising products."

And, for nearly a decade, Google did in fact keep DoubleClick's massive database of web-browsing records separate by default from the names and other personally identifiable information Google has collected from Gmail and its other login accounts.

But this year, Google quietly erased that last privacy line in the sand — literally crossing out the lines in its privacy policy that promised to keep the two pots of data separate by default. In its place, Google substituted new language that says browsing habits "may be" combined with what the company learns from the use Gmail and other tools.