Computer

now browsing by tag

 
 

How to #Know If Your #Slow #Computer Is #Secretly #Mining #Cryptocurrency

Mining cryptocurrency used to require thousands of dollars worth of equipment to see any kind of meaningful return, but not anymore. Newer digital currencies like Monero, ByteCoin, and AEON have given would-be miners the ability to mine tokens right from their laptops. This might benefit small-time miners that want to get involved in the sector, but for every good thing online there are always people that figure out a way to use it for bad.

Hackers have begun using these tools to infect computers and websites to secretly mine cryptocurrencies. This emerging type of malware attack has been dubbed as “cryptojacking”, and it could cause your computer to overheat and crash. Luckily, spotting these hidden miners isn’t all that difficult.

Cryptojacking essentially hijacks your computer’s CPU power to mine. This means when you’re browsing the web, the malware is running in the background completely unbeknownst to you. There are a few types of this malware, and some run only when you visit a certain website and others can be maliciously installed on your computer. The best way to prevent this is by using antivirus software and adblockers.

If you’ve already been hit with this kind of malware, you’ll notice either your computer acting sluggish, getting warmer than usual, or its fan constantly spinning. If you aren’t running any kind of demanding software, like video games or video editing programs, this should be the first hint that your computer is working overtime.

If you’ve noticed your laptop acting up, it’s time to go check on what’s going on under the hood. Mac users can view a detailed breakdown of everything their computer is running by searching “Activity Monitor” and using the magnifying glass icon at the top-right of the screen. Windows users can simply hold down the Ctrl-Alt-Del keys to bring up “Task Manager.”

Both of these menus will display a graph of how much of your computer’s processing power is being used. Any massive spikes should be red flags. You’ll also see an ordered list of the programs using the most processing power at the moment. Before ending any of these programs be sure to research what they are, as you could be ending a crucial part of your operating system.

Both Tesla and the Los Angeles Times have had their sites infected by cryptojacking software. Companies with popular websites are the most at risk, as hackers can embed code onto their servers and use the CPU power of everyone who visits the site. But making it a habit to check on how your computer is running will ensure your device isn’t getting used to make someone else a crypto fortune.

advertisement:

The post How to #Know If Your #Slow #Computer Is #Secretly #Mining #Cryptocurrency appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Computer #Hackers Are #Demanding #Money From #Cities, #States, And #Companies In The #U.S.

Computer hackers are getting more sophisticated. They are not afraid to hold cities, states, and companies’ hostage until they pay a ransom. Hackers are modern day tech pirates that disrupt computer programs and turn shareholders into anxiety-ridden puppets. Computer networks in Denver, Atlanta, and Baltimore, as well as a computer network of Boeing Airlines, are recent victims. Atlanta’s computers went down on March 22nd when a hacker locked important data behind an encrypted wall. The wall would stay in place, according to the hackers, until the city pays the hackers $51,000 in Bitcoins. Atlanta has a week to comply. If the city doesn’t pay, all that important data will vanish, according to the computer pirates. No one is sure if Atlanta paid the money, according to a Fox News report. But Mayor Keisha Lance Bottoms didn’t rule out payment.

The hacking group calls itself “SamSam.” SamSam is not new to the hacking world. The group pocketed more than $800,000 in 2017. The city of Leeds, Atlanta paid SamSam $12,000 in February 2018 to release their data. But Atlanta is not the only city that SamSam has in its hacking sights this month. Officials in Baltimore said their 911 dispatch system was under attack. The system was down for 17 hours recently to prove the hackers were serious. The hackers were able to get into the system after the city made an internal change to their firewall. But the Baltimore hackers didn’t ask for money, and that is concerning, according to Frank Johnson, Baltimore’s chief information officer.

Boeing, the world’s top aerospace company, is also under attack by the now famous WannaCry ransomware. WannaCry is the same ransomware that crippled Britain’s healthcare services in 2017. The Boeing attack is not as serious as the attack in Britain, according to Boeing’s head of communications Linda Mills. Mills also said the 777 jet program was not part of the hack. Mills said only a few company machines were under attack.

Denver also had a suspicious outage when denvergov.org and pocketgov.org, as well as other online services, suddenly stopped in March. Some city staffers lost access to their email account. Denver officials claim the shutdown was the work of a computer bug, but Colorado’s Department of Transportation was a SamSam victim in February. The hackers said the information would come back to them if Colorado paid in Bitcoins, according to a news report by Denver7.

advertisement:

The post Computer #Hackers Are #Demanding #Money From #Cities, #States, And #Companies In The #U.S. appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

International Conference Advanced Computer Information Technologies (ACIT)

General Cybersecurity Conference

 June 1 – 3, 2018 | Ceske Budejovice, Czech Republic

Cybersecurity Conference Description 

PURPOSES OF THE CONFERENCE:

1. Providing podium for scientists to present the results of their researches and scientific results in the field of advanced computer information technologies.
2. Motivation for scientific activity.
3. Exchange of progressive ideas and research results.
4. Development of creativity in scientific activity.

Read More….

advertisement:

The post International Conference Advanced Computer Information Technologies (ACIT) appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

The #future of #computer #security is #machine vs #machine

A growing number of computer security thinkers, including myself, think that in the very near future, most computer security will be machine versus machine–good bots versus bad bots, completely automated. We are almost there now.

Fortunately or unfortunately, I don’t think we’ll get to a purely automated defense for a long, long time.

Today’s security defenses
Much of our computer security defenses are already completely automated. Our operating systems are more securely configured out of the box, from firmware startup to the operating system running apps in secure hardware-enforced virtual boundaries, than ever before. If left alone in their default state, our operating systems will auto-update themselves to minimize any known vulnerabilities that have been addressed by the OS vendor.

Most operating systems come with rudimentary blacklists of “bad apps” and “bad digital certificates” that they will not run and always-on firewalls with a nice set of “deny-by-default” rules. Each OS either contains a built-in, self-updating, antimalware program or the users or administrators install one as one of the first administrative tasks they perform. When a new malware program is released, most antimalware programs get a signature update within 24 hours.

Most enterprises are running or subscribing to event log message management services (e.

Read More….

advertisement:

The post The #future of #computer #security is #machine vs #machine appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Russian group #hacked German #government’s secure #computer #networks

Source: National Cyber Security News

A Russian-backed hacker group known for many high-level cyber attacks was able to infiltrate the German government’s secure computer networks, the dpa news agency reported Wednesday.

Dpa cited unidentified security sources saying the group APT28 hacked into Germany’s foreign and defence ministries and managed to steal data.

The attack was noticed in December and may have lasted a year, dpa reported.

The Interior Ministry said in a statement that “within the federal administration the attack was isolated and brought under control.” The ministry said it was investigating.

A spokesman wouldn’t give further details, citing the ongoing analysis and security measures being taken.

“This case is being worked on with the highest priority and considerable resources,” the ministry statement said.

APT28, which has been linked to Russian military intelligence, has previously been identified as the likely source of an attack on the German Parliament in 2015, as well as on NATO and governments in eastern Europe.

Also known by other names including “Fancy Bear,” APT28 has also been blamed for hacks of the U.S. election campaign, anti-doping agencies and other targets.

Read More….

advertisement:

View full post on National Cyber Security Ventures

Computer Forensic Analyst

Source: National Cyber Security – Produced By Gregory Evans

Taxation & Finance, State – Albany, NY
Bachelor of Science Degree in Computer Forensics, Computer Science, or related field AND a minimum of (24) months of satisfactory experience performing the duties of a Computer Forensic Analyst 3 or its equivalent in another computer forensic environment; AND possession of a Computer Forensics certification such as EnCE, CFCE, ACE or similar certification. Certification may be substituted with a minimum of (160) hours of Computer Forensics training with computer forensic tools such as Encase, Access Data FTK and ASR SMART OR a professional certification such as the Certified Computer Forensics Examiner, Certified Computer Examiner, GIAC Certified Forensic Examiner or GIAC Certified Computer Analyst; AND verifiable training with computer forensics tools such as Encase, Access Data FTK and ASR SMART; AND significant Computer Forensics casework experience and experience testifying before a court of law or administrative hearing as a Computer Forensics expert. Candidates must be able to obtain and maintain a professional certification such as the Certified Computer Forensics Examiner, Certified Computer Examiner, GIAC Certified Forensic Examiner or GIAC Certified Computer Analyst within one year of appointment to this level. 

Substitution: (4) years of work-related experience in the field of Computer Forensics may be substituted for the required Bachelor’s Degree. 

The duties that the incumbent of the vacancy will be expected to perform. Duties Description 
Under the general direction of the Director, the Computer Forensic Analyst 4 performs the following duties: 

• In accordance with Department policy, rules and regulations, office guidelines and industry standards, conducts data acquisition and archival; hardware, software and tool testing and validation; and physical examinations of computers, electronic devices and various Department computer network systems. 

• Copies data from multiple operating systems and mobile computing devices. Prepares copied data for archiving into digital media. Verifies the integrity of the forensic copies to be used for analysis. 

• Conducts physical examinations of computer and other electronic computing devices by inspecting the hardware peripherals in devices submitted as evidence. Document the physical condition of evidence computers and devices. 

• Disassemble and reassemble various types of electronic data or communication devices. 

• Test and validate computer hardware, software and forensic analytical tools using established procedures and guidelines. 

• Prepare and submit required documentation for admittance into evidence in court proceedings. 

• Perform computer hardware, software, network and internet related research to troubleshoot and maintain computer forensic laboratory equipment and network. 

• Assist in the review and preparation of evidence. Prepare computer and multimedia digital evidence for court presentations. 

• Testifies in court and other proceedings regarding casework involving routine laboratory processes such as acquisition, archival and analysis. 

• Examine computers and other electronic storage devices submitted as evidence. Analyze data by using computer forensic utilities and analytical techniques. 

• Prepare comprehensive analysis reports to be used in the course of investigations and entered into evidence during court proceedings. 

• Research industry standards and assist Department Investigators in developing procedures for the various stages of computer forensic processes, such as acquisition, archival and analysis of data. 

• Properly maintains the chain of custody and meets evidence handling requirements. 

• Provide technical assistance to Department Investigators during extraction of multimedia digital evidence from computer networks and other technical forensic processes in the field. 

• Recommends changes in operating procedures, equipment, and personnel. 

• Assists with the implementation of hardware and software, as well as modifications to the laboratory equipment and network as requested by management. 

• Analyzes the most complex cases which may involve multiple operating systems and mobile computing devices. 

• Testifies in court or other adverse proceedings regarding the validity of analysis performed by lower-level Computer Forensic Analysts; the processes used, and the relation of evidence to the overall investigation. 

• Advise Department Investigators of possible alternative methods of analysis that would increase accuracy, efficiency and timeliness. 

• Review examinations and analyses completed by staff. 

Additional comments regarding the vacancy. Additional Comments This is a newly classified position and jurisdictional class assignment (non-competitive) is still pending approval. As such, the incumbent will serve temporary in the position until the jurisdictional class is approved. At that time, the incumbent’s status can be changed to permanent. 

Work hours to be determined.

The post Computer Forensic Analyst appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Two #Women #Charged With #Hacking Bucks #Computer #Systems

A Bucks student and her cohort were arrested and charged with hacking the college’s computer system to alter her grades and the grades of other students in a microbiology course.
The two women arrested were Aleisha Morosco, a 30-year-old part-time student, and Kelly Margaret Marryott, a 37-year-old employed at a medical office.

Bucks officials have suspected since July that someone had been meddling with students’ grades, and once it was reported to the police, the suspicion was confirmed.

Police said Marryott used the personal information of a Bucks faculty member she gained from her employment at a medical office. From there Morosco allegedly hacked the school’s computer network to change her own grade and the grades of other students.

Stephanie H. Shanblatt, president of Bucks County Community College, released the following statement about the incident:
“Dear Colleagues: Last week, the Newtown Township Police arrested two women in connection with an attempt to change grades at the college last summer. I wanted to assure you that this was an isolated incident. When the college discovered the problem, we reported it to Newtown Township Police and worked cooperatively with law enforcement to resolve the case. Bucks takes the integrity of our data systems very seriously. All of the grades altered in the breach were restored to their correct level. I would like to thank the Newtown Township Police Department for their professionalism in bringing this investigation to its appropriate conclusion. In addition, our gratitude goes out to the Office of Security and Safety, Information Technology, and Online Learning for their prompt attention to this matter.”

Both women have been charged with unlawful use of computer, computer crimes, computer trespass, identity theft, and criminal conspiracy.

Computer trespassing is a very serious crime. PhiladelphiaCriminal- Attorney.com states that “If you are indicted on federal computer crime charges, you can face being sent to a federal prison for years.” The two women were arraigned before District Judge Mick Petrucci and released on $40,000 unsecured bail.

View full post on National Cyber Security Ventures

Computer #Hackers are #Trying to Get Into Your #Wallet

Computer #Hackers are #Trying to Get Into Your #WalletA warning for when you open that next email, it could be hackers trying to get into your wallet. One Bowling Green woman didn’t want to take any chances when she received an email demanding thousands of dollars from someone she’s never met. WNKY News’ Cecilia Herrell found out what you can do to avoid […] View full post on AmIHackerProof.com | Can You Be Hacked?

Computer #hacking #investigation #leads to #huge #cache of #child porn

Source: National Cyber Security – Produced By Gregory Evans

A Parkville man was sentenced Wednesday to federal prison after pleading guilty to computer hacking and child pornography charges.

Jacob Raines, 38, was sentenced in U.S. District Court in Kansas City to six years in prison.

Raines pleaded guilty in May to charges of computer intrusion and using a computer to view child pornography over the internet.

The computer intrusion charge involved Raines using a remote server to copy proprietary source code files and file folders from his former employer.

When serving a search warrant in that case, investigators found thousands of sexually explicit images and videos of children, including toddlers and infants.

His attorney on Wednesday argued for a sentence of four years in prison, while prosecutors asked for seven years.

The post Computer #hacking #investigation #leads to #huge #cache of #child porn appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Ukrainian #hackers blamed for #computer problems that crashed #multimillion #dollar art #sale

Source: National Cyber Security – Produced By Gregory Evans

An auction house is blaming a paid, deliberate attack that originated from Ukraine for a computer meltdown that shelved a multimillion dollar sale of artwork on Tuesday night.

Scores of people had gathered at Chifley Tower in Sydney’s CBD for an art auction hosted by online start-up Fine Art Bourse, created by Tim Goodman, a former chairman of Sotheby’s, and Adrian Newstead, the founder of Cooee Art.

Buyers were competing for more than 80 artworks, including Emily Kame Kngwarreye’s Earth’s Creation I, which was expected to fetch at least $2 million.

But the auction was postponed after what was described as “an unusually high surge of traffic” overloaded the auction site’s server, which is based in Hong Kong.

William Ehmcke, a director of the online auction house, said in a statement on Thursday that the timing and size of the attack suggested it was paid and deliberate.

“There is also evidence that the auction platform database was hacked, just prior to the auction launch, to further disrupt the sale process,” he said. “All client data has now been removed from the FAB (Fine Art Bourse) database.”

Mr Goodman said: “Someone out there does not want us to succeed.”

The post Ukrainian #hackers blamed for #computer problems that crashed #multimillion #dollar art #sale appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures