now browsing by tag


Belgrade #Suspect #Arrested over Being #Part of #Hackers’ Group ‘The #Dark #Overlord’

Officials from Serbia recently detained a Belgrade resident who’s doubted as belonging to a hacking group named DarkOverlord or The Dark Overlord.

The resident, a man aged 38, uses the initials “S.S” for his name and is a Belgrade citizen.
Except for these, nothing about his identity is known.

The Federal Bureau of Investigation has kept silent giving no remarks about the arrest. However, Serbian officials state they executed the detention when they were conducting an operation for exposing the people using the moniker “The Dark Overlord” online.

Running active from 2016, DarkOverlord has gained notoriety for hacking schools and medical providers to seize their personal files followed with blackmailing the institutions into paying money if they don’t want their information to be sold on the underground world. Earlier, the hackers had apparently seized addresses, phone numbers and Social Security Numbers belonging to innumerable medical patients that could’ve been utilized for committing ID-theft. posted this, May 17, 2018.

Beginning from June 2016, The Dark Overlord infiltrated the systems of 50-or-so victims, stealing a variety of data such as intellectual property and crucial health information followed with demanding ransoms in exchange of leaving the filched data safe.

The hackers’ syndicate is well-known with regards to executing one cyber-crime series spanning 2-yrs and comprising extortion along with hacking followed with revealing episodes contained in a Netflix sequence namely “Orange-is-the-New-Black” and also breaking into U.S. school computers as well as threatening the country’s students with murder.

At times the crooks weren’t satisfied with hacking they’d start physical violence threat against the hacked entities. During 2017, an infamous campaign carried out in USA included breach of systems of high schools and then theft of personal data to be followed with holding those data for ransoms. And in case the schools did not pay up, the gang would find out the contact details of staff and students from the filched data and then threaten them.

It’s not clear whether The Dark Overlord group consists of one person or several individuals. However on Twitter, it frequently uses the words “us” and “we” as reference to the gang while blackmailing hacked victims.


The post Belgrade #Suspect #Arrested over Being #Part of #Hackers’ Group ‘The #Dark #Overlord’ appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

How to #Protect #Child #Identity from being #Stolen

Source: National Cyber Security – Produced By Gregory Evans

Many of us have heard news about identity theft, along with the warnings on how to avoid it.  But, do you know that children, including yours, can fall prey to identity predators, too?  According to an FTC report, 6 percent of identity theft victims are people 20 years old and below, and these statistics include young children and infants.  When ID thieves effectively obtain an identity, they can take out credit cards, rent a house and even get a mortgage using the child’s name.

As a parent, do you have a good understanding of child identity theft as well as to protect your child from identity theft? Keep in mind that whenever you give out your child’s social security number and other personal identifying information, you should take extra precautionary measures, because the last thing you may want to happen to your child is to become a victim of identity theft.

Why do thieves have to target children?

Basically, a child has a clean credit record, and this is what thieves are aiming for.  Since creditors and lenders will favor someone with a clean record rather than someone with bad credit, they will be more likely to accept the thief’s application using the child’s good name. Plus, children are not yet taking fail-safe methods to secure their identity, unlike adults who are more aware of the depth of the crime. They see kids as more lucrative targets, because the only time the problem may come to light is when they reach legal age and started checking their own credit or applying for a line of credit themselves, giving criminals ample time to hide their crime while continuously devastating the child’s identity. Therefore, the earlier the thieves started misusing a child’s identity, the longer they can exploit that victim’s credit.

What signs should warn you that your child is being victimized by id theft?

In order to know if your child’s identity is stolen, you should be vigilant in spotting any of these red flags:

• Pre-approved credit card offers – If your child receives unsolicited offers from credit card companies at a very young age, it may be a sign of identity theft.

• Collection agencies looking for your child – Are there collection agencies calling you for an unpaid bill in your child’s name? Don’t take this simply as a case of mistaken identity, there’s a chance that thieves have actually opened up a line of credit with your child’s identity and left it unpaid.

• Account statements from Social Security – SS account statements are records of annual contributions or benefit claims and these are usually sent to people who have a job. So, unless your kid has a job, receiving a social security account statement in the name of your child is indicative of identity fraud or theft.

Child identity theft protection: four important things to remember

Keep personal identifying information private – never share your child’s identifying information, especially his/her social security number and full name, to someone who has no legal business with you. A child’s social security number, along with the full name and date of birth, are what a thief needs to hijack your child’s identity.

Keep every one of your child’s documents at home safe and locked in a secure place. Ask questions if you must – if you are asked by the school, pediatrician or other organizations for your child’s social security number, don’t hesitate to ask why they need it and how they are going to protect it. Also, try asking if it’s okay if you give them another form of identification apart from your child’s social security information.

Finally, ask who will have access to your child’s information and how they are going to dispose of your child’s information afterwards. Watch out for the red flags – the warning signs mentioned above, such as phone calls or emails, concerning your child’s credit should not be taken lightly. Always watch out for these suspicious activities, because they indicate fraud. Educate children about online safety.

In the modern day we live in, children have become more inclined to use the power of the Internet. But, it’s also a place where identity thieves usually thrive. Emphasize to your kids not to give out their personal information and the passwords and usernames to their online accounts to strangers they met online. They should also avoid visiting unfamiliar sites or clicking strange links to prevent viruses and malware from invading their computer, because this method can be used by criminals to access their private information.

The post How to #Protect #Child #Identity from being #Stolen appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Do you have a #jailbroken #Apple TV running #Kodi? You are in #danger of being #hacked!

Source: National Cyber Security – Produced By Gregory Evans

The Apple TV has long been a wonderful device for consuming media on your big-screen television. From video to music, it is a great experience. Some people weren’t satisfied with the default functionality, however, opting to jailbreak Apple’s media box. In fact, the jailbroken Apple TV 2 was one of the most popular XBMC/Kodi boxes for this reason.

Are you running one of those jailbroken Apple TV 2 devices? You should be worried then. You see, as the folks over at TVAddons warn, the jailbreak process installed OpenSSH by default. This means your network could be compromised by the fairly outdated media box. A hacker only needs your ip address to attack you.

“Under normal circumstances, most people are aware of the need to set a strong password on their computer. However, in this circumstance, most users aren’t aware that their jailbroken Apple TV 2 is a computer that can be programmed for any purpose. Anyone who gains access to your insecured [sic] jailbroken Apple TV 2 device could run code to do things like send spam, DDoS, or even infiltrate your phone and personal computer,” says TVAddons.

The group also says, “Who’s to blame? We hate to say it, but the company behind the popular Seas0npass jailbreak for Apple TV 2 should have known better. For years Firecore distributed what was the only method of jailbreaking the Apple TV 2, and knowingly chose to include OpenSSH with the jailbreak. They should have seen this coming, and given the user the chance to change the SSH password at the time of jailbreak. Instead they likely turned a blind eye in order to make things simple for the average joe, to whom they also tried to upsell other premium apps.”

Before you get too scared, just know that disconnecting the jailbroken Apple TV 2 from your network will take away the threat. In other words, if you don’t use it, just get rid of it — it is outdated anyway. If you are still using it, however, you can just change the default root password to secure yourself — easy peasy.

The post Do you have a #jailbroken #Apple TV running #Kodi? You are in #danger of being #hacked! appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Hackers #target Office as #Microsoft warns of new #vulnerability being #exploited by Russia-linked #hackers

Source: National Cyber Security – Produced By Gregory Evans

Cyber crooks are taking advantage of a recently discovered vulnerability in Microsoft Office to hide malicious code in Word documents, the software giant has warned.

Furthermore, the flaws are being taken advantage of by a Russia-linked hacking group called APT28, who are expoiting a vulnerability in the Dynamic Data Exchange (DDE) component of Office.

According to the researchers, the hackers have been exploiting the flaw for around a month.

This is responsible for transporting data and messages between applications. The exploit affects Outlook email accounts, Word documents and Excel spreadsheets.

The hackers, also known collectively as Fancy Bear and linked with the Russian government, have benefited from the protocol because it doesn’t warn users to enable macros. However, pop-ups asking users to update files may sometimes appear.

Security firm McAfee claimed that the hacking group has been taking advantage of the recent New York terror attack to propagate its malicious code, inserting malware into a document talking about the incident.

“McAfee Advanced Threat Research analysts identified a malicious Word document that appears to leverage the Microsoft Office Dynamic Data Exchange (DDE) technique that has been previously reported by Advanced Threat Research,” it claimed.

“This document likely marks the first observed use of this technique by APT28. The use of DDE with PowerShell allows an attacker to execute arbitrary code on a victim’s system, regardless whether macros are enabled.

“APT28, also known as Fancy Bear, has recently focused on using different themes. In this case it capitalised on the recent terrorist attack in New York City.

“The document itself is blank. Once opened, the document contacts a control server to drop the first stage of the malware, Seduploader, onto a victim’s system.”

Microsoft has since released a specialist advisory detailing the vulnerability and how it affects users. It is now working on a patch, but the Advisory effectively serves notice to other hacking groups of a glaring flaw in Office that others will now seek to exploit.

“In an email attack scenario, an attacker could leverage the DDE protocol by sending a specially crafted file to the user and then convincing the user to open the file, typically by way of an enticement in an email,” it said.

“The attacker would have to convince the user to disable Protected Mode and click through one or more additional prompts. As email attachments are a primary method an attacker could use to spread malware, Microsoft strongly recommends that customers exercise caution when opening suspicious file attachments.

“Microsoft strongly encourages all users of Microsoft Office to review the security-related feature control keys and to enable them. Setting the registry keys described in the following sections disables automatic update of data from linked fields.”

The post Hackers #target Office as #Microsoft warns of new #vulnerability being #exploited by Russia-linked #hackers appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

‘Unhackable’ #electronic #chip being #developed in #Abu Dhabi

Source: National Cyber Security – Produced By Gregory Evans

‘Unhackable’ #electronic #chip being #developed in #Abu Dhabi

Cyber security experts in Abu Dhabi have found a way to create an “unhackable” electronic chip that could potentially be used in phones, cars and computers.

With the evolution of technology and manufacturing process giving way to less safety, researchers at New York University Abu Dhabi have just received a grant to deploy their work into a solution.

“This is the first prototype for a chip that has security features built in at the hardware level,” said Ozgur Sinanoglu, associate dean of engineering and associate professor of electrical and computer engineering at the university. “The purpose of this chip is a proof-of-concept to show that we can take any chip design, apply our software on the design to lock [it], and create trustworthy locked chips that are resilient to hardware-level threats such as counterfeiting, piracy, reverse-engineering and tampering.”

His research at the university’s Centre for Cyber Security on hardware security and trust is being funded by the US National Science Foundation, the US Department of Defence and the UAE-owned semiconductor manufacturing company Global Foundries, as well as Mubadala Technology.

“We take smart devices for granted but can we really trust them?” asked prof Sinanoglu, who is also the director for design at the excellence lab at the university. “When hackers break into certain devices, they want to share that with everyone so they come up with a set of instructions published on a website. It goes viral and it’s a huge revenue loss for the company.

“Up until a decade ago, this is mainly what hardware security was about – chips with secret assets for people to extract or manipulate this secret information.”

Implications of breach are serious as such chips are found in phones, cars, computers, airplanes, nuclear power plants, medical devices and critical safety and security applications. “So once our trust is compromised on these chips, then it’s compromised on pretty much all applications that [almost] control our lives one way or another,” he said. “Everything used to be centralised in one controlled facility under the control of a few people but now, the process on a single chip spans across the globe, various teams and different companies.”

He spoke of Apple, which has headquarters in California but sources design facilities in Europe, China and India, fabricates in South Korea, tests in Taiwan and assembles its packaging in China.

“Because the flow is highly distributed today, people are concerned about a variety of things,” he said. “We’re talking about all sorts of piracy problems to be able to control chips remotely, or disable them, or leak information from them.”

The new chip ensures a secure platform from start to finish in terms of the hardware.

“If the hardware is compromised, you can have the strongest operation system but you can’t talk about a trustworthy system,” Mr Sinanoglu said. “The UAE is investing heavily in this research and we’re more confident that this will be unhackable because we have mathematical definitions and theorems backing [its] security. We were now offered a grant by the [Defence Advanced Research Projects Agency] as part of a four-university team to turn it into an actual solution that can be deployed and we are hoping to have our software solution adopted by chip design companies so they can produce trustworthy chips.”

He has also set up a platform allowing potential hackers to attempt to break in, because “crowd-sourcing is the best way to test your security”.

“Our locks are in there but they don’t know the secret key,” he added. “We give them virtual access to the chip too but the idea is to see whether someone with this information can break it. We expect no one to.”

Experts said hardware is an area sometimes overlooked in terms of cyber security.

“It’s an issue that is forgotten about,” said Dr Fadi Aloul, head of computer science and engineering at the American University of Sharjah. “Hardware also has bugs and today, with the Internet of Things, those are also being targeted, so it is needed with new smart chips.

“The closer the security measures are to the hardware, the harder it is for the hackers to really take advantage of this chip.”

However, Dr Aloul also said that “unhackable” is very hard to say as the general rule of security is that there is no perfectly secure system. “We can say it’s very hard to hack, but nothing is impossible,” he said. “Given the time and resources, a weakness, like a vulnerability, can be found and exploited.”

Matthew Cochran, chairman of the Defence Services Marketing Council, said security must be holistic as “you are only as strong as the weakest link”.

“Chip security and hardening is fundamental to this as everything else above it in the stack is dependent on the chip not being compromised,” he said. “There is no point in having a secure operating system and encryption if the chip control of all these functions is accessible by [criminals].”

The post ‘Unhackable’ #electronic #chip being #developed in #Abu Dhabi appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Cybersecurity’s Solar Eclipse: How We’re Being Blinded By Marketing Buzzwords

Source: National Cyber Security – Produced By Gregory Evans

This summer’s historic solar eclipse was an amazing sight that reminded us of the beauty of our solar system, as well as the fact that you should never look directly at the sun. The eclipse also reminded us that without being able to see something, understanding it can be very…

The post Cybersecurity’s Solar Eclipse: How We’re Being Blinded By Marketing Buzzwords appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Thousands of Australians could have pacemakers being recalled in US over hacking risk

Source: National Cyber Security – Produced By Gregory Evans

Thousands of Australians are believed to have pacemakers that have been recalled in the United States because they are vulnerable to being hacked. The US Food and Drug Administration (FDA) has recalled 465,000 devices from Abbott’s (formerly St Jude Medical) because hackers could remotely cause the batteries to rapidly go…

The post Thousands of Australians could have pacemakers being recalled in US over hacking risk appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

I had to deal with being somewhat of an ……….

To Purchase This Product/Services, Go To The Store Link Above Or Go To I had to deal with being somewhat of an outcast because it’s not socially acceptable to be a struggling musician. There have been times where I’ve felt sorry for the person I was dating. I felt…

The post I had to deal with being somewhat of an ………. appeared first on

View full post on

Preventing potential bad parents from being parents

To Purchase This Product/Services, Go To The Store Link Above Or Go To Being a parent is not an easy job because it’s not something that you can take classes for before becoming one. You can get advice from existing parents but everyone knows that each individual child (and…

The post Preventing potential bad parents from being parents appeared first on

View full post on

Developers are most wary of these technologies being hacked

Source: National Cyber Security – Produced By Gregory Evans

In a new survey by Netsparker Ltd., a provider of web applications security, developers agreed that the government and financial services are the two sectors most vulnerable to hacking and that smart home IoT is the most vulnerable technology. Propeller Insights conducted the recent survey of U.S.-based software developers for…

The post Developers are most wary of these technologies being hacked appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures