now browsing by tag


#childsafetytips | GO NZ: Reader tips and camping hacks for successful holidays | #parenting | #parenting | #kids

Zipping the kids in their own tent is one way to have a successful camping holiday, but there are lots of other, easier ways to make it great. Photo / […] View full post on National Cyber Security

#cybersecurity | hacker | Ring camera hacks show the need for better IoT security

Source: National Cyber Security – Produced By Gregory Evans

Ring camera doorbells gained fame for catching porch pirates steal packages but after several high-profile cases where hackers gained control of them they are being held up by the cybersecurity industry as a prime example why companies and homeowners need to take IoT security seriously.

The Ring
cases revolve around malicious actors hijacking these devices and using them to
communicate with people inside the home. In an incident in Mississippi a
malicious actor used an internal Ring camera to talk to a young girl using racial
slurs and back in October another hacker gained control of a Nest camera and
threatened to kidnap a baby.

It is believed in each case the malicious actors took advantage of the device’s poor security to gain access. In the case of the Ring camera, which his owned by Amazon, the company recommended to those buying or who already have a Ring to not reuse old passwords and to implement MFA to make it more difficult to hack.

Keeping home
devices up to date with secure logins and having the latest security patches is
now a must for anyone who has installed this or any type of IoT said Avast Vice
President Leena Elias.

people now need to be able to assess the security of new tech devices that
could be used against them,” We need to use a wide variety of security measures
to ensure that devices connected to our home networks are secure,” she said,
adding to not forget about the home’s router which is frequently shipped with a
standard admin login that needs to be changed.

One of the reasons consumers don’t update is that they are simply unaware of the need and the benefits of doing so. Another factor is difficulty. Gaining access to the admin functions is not always a simple matter for the average person.

studies in the financial industry have found consumers are willing to embrace
more engagement around fraud prevention if it means their information is
secured (think: multi-factor authentication.) However, if consumers aren’t
aware of the benefits associated with taking more control, they leave
themselves vulnerable to malicious attacks. Sherif Samy, senior vice president,
North America for Entersekt.

Original Source link

The post #cybersecurity | hacker | Ring camera hacks show the need for better IoT security appeared first on National Cyber Security.

View full post on National Cyber Security

Hacks In Taiwan

General Cybersecurity Conference

 July 27 – 28, 2018 | Taipei City, Taiwan

Cybersecurity Conference Description 

What is HITCON
In the hacker world, the line between evil and justice is blurred. Instead, we believe that the term hacker represents the spirit of being ever challenging and the possession of tremendous knowledge and skills.

Hacks in Taiwan (HITCON) is a highly technical security conference in Taiwan to gather the various information security researchers and their expertise, the first of its kind in Taiwan. HITCON aims to provide everyone interested in security and hacking to meetup face to face, so they can exchange their experiences and share their newest and most exciting findings. It was first held 10 years ago by chr00t security group.

All HITCON talks are carefully chosen to ensure that they represents the latest trends or technologies, presents excellent hacking techniques, and is not commercial advertisement by vendors. Besides, we also have an IRC channel that is displayed on a large screen on stage in real time. There is also the sheep wall, which sniffs the network traffic during the conference and displays them on the screen on stage. These interesting and unique peculiarities attracts alot of people who are interested in security and hacking.

HITCON is the hacker’s party and we invite everyone to come to Taiwan to join the party to experience the hacker culture in Taiwan, follow up with the most interesting and sensitive topics, and to social with hackers as well as hacker groups.


The post Hacks In Taiwan appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Cyber #hacks driving ‘bug bounty’ #jobs and #programs in #corporate #America

Source: National Cyber Security News

If you have the skills to stop a cyber hacker in their tracks, you may soon be getting calls from recruiters trying to fill a new crop of jobs throughout corporate America.

Criminal data breaches are predicted to cost businesses a total of $8 trillion over the next four years, outstripping worldwide IT security spending, which is expected to be upwards of $120 billion by 2021, according to Gartner. Meanwhile, there is a shortage of talent, and an anticipated 1.8 million cybersecurity jobs will be unfilled by 2022, with millennials likely playing a big role as cited in a report from the Center for Cyber Education and Safety. These jobs will be in demand as the the number of reported cybersecurity incidents (which doubled between 2016 and 2017) continues to rise. Even with expert cybersecurity firms on retainer to improve overall cyber resilience, companies are struggling to stay ahead in the battle against malicious hackers.

To help close the gap, more businesses are turning to another kind of hacker: the ‘white hats’. Through carefully implemented bug bounty programs, organizations can crowdsource the expertise of security researchers to help identify vulnerabilities in exchange for money and recognition, and fix vulnerabilities before they can be exploited.

Read More….


View full post on National Cyber Security Ventures

The most #notorious #hacks in #history, and what they mean for the #future of #cybersecurity

Source: National Cyber Security News

Where has the time gone? February is almost over, and already we’ve seen several major vulnerabilities and hacks this year! As we head further into what’s sure to be another busy year for cybersecurity, it’s important to take a step back and examine how we got here.

For nearly four decades, cyber criminals have been exploiting the latest and greatest technology for fun, profit and power. In that time, the word “hacker” has taken on many meanings. At first, it referred to mischievous young techies looking to build a reputation on the internet, but it has since become a worldwide title for data thieves, malicious online “entrepreneurs” and geopolitical operatives. The threats and tactics that hackers use have evolved, too – from small-time scams to dangerous worms and earth-shaking breaches.

As a result, the security industry has been in game of “cyber cat and mouse” for the better part of a half-century, looking to evolve security technology to thwart the constant evolution in malware and techniques used by sophisticated threat actors.

Let’s take a look back at the past four decades to assess the most notorious hacks in each era, why they mattered, and how the security industry responded.

Read More….


View full post on National Cyber Security Ventures

Is our #smart home #growing more #vulnerable to #hacks?

Source: National Cyber Security – Produced By Gregory Evans

As more of our cameras, speakers, thermostats and locks connect online, they’re increasingly open to meeting up with hackers.

Hackers have come up with new ways to break into your data — sending attacks through our appliances, locks, blinds and anything that connects to the internet. These are part of the so-called Internet of Things (IoT), and hacking attacks sent through these devices “became the preferred weapon of choice,” for starting denial of service attacks last year, says a new report from Arbor Networks, a security software company.

Read More….

The post Is our #smart home #growing more #vulnerable to #hacks? appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Get #ready for more #hacks in #2018

Get #ready for more #hacks in #2018

After the year we’ve had, do you need any more convincing that your personal information is constantly being exposed to hackers?

It wasn’t just the Equifax hack, which leaked 145.5 million Social Security numbers, or the WannaCry ransomware attack that locked up our computers and demanded a ransom paid in bitcoins.

Even the security software on millions of our computers became suspect when, for example, the US government banned the widely popular Kaspersky Lab software over concerns about connections to the Russian government. And experts made us question whether we can trust the invisible systems that connect our devices to the internet, like Wi-Fi.

But as scary as all this news is, I don’t recommend putting your fingers in your ears and chanting “fa la la la” until the next hack (though sometimes I’m tempted to do that myself).

The good news is that even as things get worse, you can still do a lot to protect yourself from many types of cyberattacks. In fact, it’s because these trends aren’t likely to turn around in 2018 that you should do all of the following:

Start by backing up your photos, music and other important stuff. Also, update all your software. If you’re not doing these two things, the rest of this is useless.
Next, learn how to adopt some of the increasingly easy-to-use tools for locking down your accounts, like authentication apps, Yubikeys and services like Google Now that come with an authentication tool built in.
Finally, don’t give up on security software — you’ll still need it in 2018 with the way things are going.
Sound like too much work? You should really carve out some time for this stuff. If you’ll permit me to be Debbie Downer for a moment, our security situation is likely to get worse, not better in 2018. Here’s how.

Ransomware will get sneakier, so your backups will be even more important

It’s hard to imagine how ransomware could get much worse. In the WannaCry attack, hackers used NSA hacking tools that leaked into the criminal underworld, repurposing them to launch ransomware at regular computer users.

But the attacks will get stealthier, according to Dave Dufour, vice president of cybersecurity and engineering at Webroot. That’s because hackers are coming up with ransomware attacks that are harder for consumer security products to detect. Instead of running files on your computer that your antivirus software can flag as malicious, hackers will rely more on code that looks legitimate because it runs in programs like Microsoft Word.

Patch your phone, patch your Mac, patch your Windows machine.
Dave Dufour, VP, Webroot
Antivirus tools will have to catch up with that trend to protect consumers. But if you don’t want to wait for that to happen (and you shouldn’t), you can keep backups of your files on the cloud and on external devices, Dufour said.

“If you back it up, you don’t have to care about ransomware,” Dufour said.

There’s one more thing you should do to prevent the pain of ransomware. Consider the ransomware attacks of 2017: “Many of them could have been mitigated by patching your systems,” Dufour said. “Patch your phone, patch your Mac, patch your Windows machine.”

Data breaches will continue, so don’t just rely on passwords

The passwords you and I use daily are a terrible security tool that we only rely on because nothing better has come along.

I mean, really, if someone said they’d protect your bank account with a key that anyone can copy at any moment, you probably wouldn’t use it. But that’s what we do with passwords.

Fortunately, that’s beginning to change. More ways to log in and unlock devices came on the scene this year, and you can expect more in 2018.

Apple made the biggest splash here by introducing FaceID in the iPhone X — the first widely available device using facial recognition technology. FaceID raised privacy concerns and inspired attempts to fool the technology with masks. But if users find it as simple and intuitive to use as Apple’s Touch ID fingerprint system, it will add your face to the list of biometrics that can lock down your accounts.

Better security is getting easier

There’s another tool for keeping your accounts secure that’s getting safer and easier to use, though it’s not quite as futuristic and sexy as a 3D scan of your face.

It’s called two-factor authentication.

This system works by adding another step to your login process, so just having your password isn’t enough for malicious actors to get into your accounts. I know, that’s more work for you, and remembering your password is hard enough. But if you use it, you’ll get to feel smug instead of scared the next time there’s a data breach like the one that, as we learned in October, affected all 3 billion Yahoo accounts.

Popular services are adopting more convenient ways for you to use two-factor authentication. In 2017, Facebook started letting you use a piece of physical hardware called a Yubikey to verify your identity. You plug in the device to your computer’s USB drive and tap it to get into your account. Google introduced Google Prompt, which lets you tap a button on your phone to verify your identity when you log into your accounts.

That’s way easier — and safer — than the industry standard of years past, which was entering in a one-time code sent by SMS to your phone.

Security software is still your friend

Things got a little weird this year with security software like antivirus scanners and password managers. Kaspersky antivirus software was banned from US government computers and taken off the shelves by some retailers. Password manager LastPass patched a big security flaw, and OneLogin got hacked. And dozens of antivirus apps on the Google Play store turned out to be malicious.

Security software will continue to be a target for hackers, who would love to trick you into downloading a malicious tool with high-level access to your computer or phone. But that software is still the best (and sometimes only) way to stop some of the most prevalent hacking attacks.

Unless you’re some kind of memory savant, password managers are the only sensible way for you to use unique passwords on all your accounts. That helps keep one data breach at, say, Yahoo, from letting hackers access more of your accounts.

And despite concerns about compromised or outright malicious antivirus scanners, the software hasn’t outlived its usefulness yet. That’s according to Jerome Segura, a security researcher at Malwarebytes, a firm that focuses on catching malicious code that traditional antivirus software can’t catch.

“It’s important to have security software, especially if you’re running Windows,” Segura said.

All that being said, these steps only mitigate damage caused by hackers. As the companies that protect and store our data keep getting compromised, we’ll likely all receive another helping of apologies and free credit monitoring in 2018.

“You are kind of at the mercy of companies if they get hacked,” Segura said.

View full post on National Cyber Security Ventures

Simple Registry Hacks Bypass Windows Digital Signature, Opening Gates For Malicious Code

Source: National Cyber Security – Produced By Gregory Evans

Windows Digital Signature check is a mechanism included in Microsoft Windows to make sure that the software or driver you’re trying to install is signed by a trusted entity, and the integrity of its binary file is preserved. This digital frisking is done with the help of their home-grown code-signing…

The post Simple Registry Hacks Bypass Windows Digital Signature, Opening Gates For Malicious Code appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Israeli firm hacks the hackers, and has advice how to beat them

Source: National Cyber Security – Produced By Gregory Evans

Hackers are a lot like the rest of us, a new study by Israeli cybersecurity firm Imperva shows. Just as some honest computer users are quick to respond to phishing messages – email scams designed to steal personal information – so do hackers respond to documents and files with titles…

The post Israeli firm hacks the hackers, and has advice how to beat them appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Crypto currency hacks: Hacking the unhackable

Source: National Cyber Security – Produced By Gregory Evans

When asked to name a cryptocurrency you’d likely think of Bitcoin, but today there are now over 900 cryptocurrencies on the market. In theory, the blockchain that cryptocurrencies use should be un-hackable and yet last month we saw hackers make off with $32 million worth of the cryptocurrency Ether. Before…

The post Crypto currency hacks: Hacking the unhackable appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures