websites

now browsing by tag

 
 

Scam at first sight: Criminals using dating websites to offer bogus investments | #relationshipscams | #dating | romancescams | #scams

Source: National Cyber Security – Produced By Gregory Evans

More than £15 million has been lost to criminals offering bogus investment opportunities on dating platforms this year, according to Action Fraud. he average loss per victim is £15,936, with […]

The post Scam at first sight: Criminals using dating websites to offer bogus investments | #relationshipscams | #dating | romancescams | #scams appeared first on National Cyber Security.

View full post on National Cyber Security

How Covid Has Impacted Online Dating Apps And Websites?| APN News | #tinder | #pof | romancescams | #scams

Source: National Cyber Security – Produced By Gregory Evans

Previous story: What is The Difference Between Gaming Routers vs Standard Routers? How Covid Has Impacted Online Dating Apps And Websites? Published on July 18, 2021 COVID-19, a deadly coronavirus, […]

The post How Covid Has Impacted Online Dating Apps And Websites?| APN News | #tinder | #pof | romancescams | #scams appeared first on National Cyber Security.

View full post on National Cyber Security

#deepweb | NSW shoots for the Holy Grail of government websites

Source: National Cyber Security – Produced By Gregory Evans

It is being modelled on the UK’s gov.uk, which under then minister Frances Maude crashed through deep resistance from the big departments to force a consolidation of content. Gov.uk is designed broadly around user life-cycle needs, such as the birth of a child.

In Australia, several states and the Commonwealth have been operating consolidated portals for several years, under their top-level domains, but NSW is the first jurisdiction, backed at cabinet level, to close down websites of smaller and mid-size agencies.

Not every NSW government website will be closed, with high-visibility web brands like the Opera House and agencies that need to be seen to be separate from government not within the project scope.

The first beta version will go live in about a month with content from within Mr Dominello’s customer service and regulation portfolio, including birth death and marriages and fire relief packages. It will use the Drupal content management system, consolidating its hold on the public sector, where Drupal’s purpose-built Gov CMS (and versions thereof) has emerged as the open-source publishing system of choice.

Shrinking pains

The federal government in 2015 launched a beta version of gov.au modelled on the UK using a series of exemplars, but it was shut when then CEO Paul Shetler left. He met deep resistance from the big departments, which thwarted any attempt to cull the Commonwealth’s estimated 900 websites.

The NSW move heralds a broader system redesign that would see government delivered through highly automated centralised service and publishing sites, making potentially redundant many of the smaller and mid-size agencies that have supported these services.

The newly formed Australia Data and Digital Council (ADDC) of digital ministers has prioritised work around life-cycle events, opening the opportunity for state and federal governments to begin creating common Australia-wide content across all governments.

The move to a consolidated easy-to-use web presence for users has challenged all governments, with a mix of governance, technical, design, content and maintenance issues thwarting moves to try and create integrated, easy to understand information for users in an ever-changing world.

The Victoria Government has been building out its single presence site around the services offered through the Department of Premier and Cabinet, but has not mandated its use by bigger agencies.

Produced after a long period of research around citizen user needs, it is built on a sophisticated open-source publishing stack that integrates into the front end of other websites – so-called “headless CMS” – enabling agencies to share development and maintenance costs.

This enables multiple agencies to use common publishing elements and functionality. Treasury and Finance, Victoria Police, and some divisions of Education and Health have moved to the platform.

Embracing commonalities

This approach also promotes a common look-and-feel, information menus and web architecture, so citizen users do not have to relearn how to navigate every new agency’s web site.

Rather than build a whole new tech system, it exploits the use of common technical interfaces (APIs) to easily connect agencies services and content into a single front end.

Importantly, this approach has been adopted by the ADDC, with the council late last year adopting national API design standards that will allow “all levels of government and trusted third parties to securely share, re-use and enhance data in real time”.

The bigger challenge is the curation and maintenance of content around user needs. This includes the management of a federated publishing model that enables agencies to distribute and maintain their content across multiple channels and web sites.

Gov.uk invested heavily in well-written content, curated around common citizen problems and concerns – a process that has taken several years to complete.

Research has suggested users use search for one-off questions about government, but typically browse government web sites, using the navigation to find what they think may be the solution. By ensuring this information is in one place, citizens will no longer be unsure if they have the latest or best information.

A working group from around Australia and NZ will meet in Melbourne this month to consolidate learnings from the various research and work around the development of life-cycle content and services.

Source link
——————————————————————————————————

The post #deepweb | <p> NSW shoots for the Holy Grail of government websites <p> appeared first on National Cyber Security.

View full post on National Cyber Security

#cybersecurity | #hackerspace | Protecting Websites from Magecart and Other In-Browser Threats

Source: National Cyber Security – Produced By Gregory Evans

The Rise of Third-Party Scripts

Modern web applications have become increasingly reliant on external code, services and vendors that execute JavaScript code in the browser… often referred to as third-party scripts. As a close-to-home example shown below, Akamai executes dozens of scripts to populate our home page.  Nearly 70% of these scripts come from outside sources.

Partial Request Map View of www.Akamai.com 

Source: https://requestmap.herokuapp.com/render/200107_S4_75af286693538a095b33ac5e4740b0b8/

We, like almost all other internet-based businesses, use third-party scripts because they enhance the web experience, are easy to add and modify, promote a consistent web experience and are pre-integrated and maintained by the third parties.  In fact, web sites today average 56% third-party scripts (Akamai has 68% third-party).

Source: Security and Frontend Performance, Challenge of Today: Rise of Third Parties, Akamai Technologies and O’Reilly Media, 2017

 

The Security Challenge

Magecart – a class of credit card hacker groups using new & more sophisticated attack methods has become the “poster child” of third-party scripts attacks.

protectingwebthree.PNG

Because third-party scripts come from a myriad of trusted and untrusted sources in a business’s supply chain, the attack surface for web-facing applications has become significantly larger and harder to protect.  Sites that use credit card processing are at constant risk – in fact out of the tens of thousands of sites hit with Magecart in the last few years, 1 in 5 victims are re-infected, often within months of the last attack.

Source: Sangine Security, 2018. https://sansec.io/labs/2018/11/12/merchants-struggle-with-magecart-reinfections/

Unfortunately, most application protection solutions today have tried to retrofit existing techniques to prevent third-party script threats using firewall and policy controls. When rigorously applied, this approach can restrict open business practices and the advantage of third-party scripts. And, when applied to loosely, can miss a lot of attacks.

The primary way, security teams keep their scripts clean, is via constant script review and testing… which is really hard.

Because of this constant, time consuming, invisible challenge for security teams to be able to detect and mitigate third-party script attacks, it often isn’t done making injecting malicious code into web pages via third-party Javascripts one of the most popular attack methods for credit card and credential skimming today. In 2019, an average of 4800 websites were compromised from third-party injected code every month, a 78% increase over 2018.

Source: Symantec 2019 Internet Security Threat Report

Akamai Page Integrity Manager

Page Integrity Manager is designed to discover and assess the risk of new or modified JavaScript, control third-party access to sensitive forms, and enable automated mitigation. The solution fully monitoring the behavior of each JavaScript workload in the session, through a series of detection layer, using machine learning model, heuristics, signatures and risk score model. This advanced approach identifies suspicious and malicious behavior, enable automated mitigation using policy-based controls, and block bad actors using Akamai threat intelligence to improve accuracy.

Prevented Threats

protectingwebfour.PNG

Capabilities

  • Behavioral detection technology constantly analyses the behavior of script execution, in real-user sessions, to identify suspicious, or outright malicious behavior and notify security teams with timely and actionable insights.
  • Outgoing network monitoring and script Intelligence: monitor network requests and know what real users are downloading and executing when they interact with your brand to detect potential malicious threats.
  • CVEs detection: continuously check all web resources, seen on the web application against open Common Vulnerabilities and Exposures database, to identify existing known vulnerabilities in runtime JavaScript code.
  • Edge Injection for rapid enablement: Page Integrity Manager is injected at the CDN level, easy to deploy, no code needed. 
  • Policy management: control your runtime JavaScript execution by optionally craft policies that monitor and/or restrict access to cookies, network destinations, local storage, sensitive data inputs, or DOM events per originating domains

Akamai will be launching Page Integrity Manager in 2020.

We are inviting customers to participate in a valuable beta project with a working product to help you be protected from malicious scripts.

To learn more, download our Beta Product Brief.

Join our beta program today by contacting your Akamai sales team.

https://securityboulevard.com/

*** This is a Security Bloggers Network syndicated blog from The Akamai Blog authored by Mike Kane. Read the original post at: http://feedproxy.google.com/~r/TheAkamaiBlog/~3/-QH1Nxqx7Mc/protecting-websites-from-magecart-and-other-in-browser-threats.html

Source link

The post #cybersecurity | #hackerspace |<p> Protecting Websites from Magecart and Other In-Browser Threats <p> appeared first on National Cyber Security.

View full post on National Cyber Security

#hacking | Turkish hackers target Greek government websites, stock exchange

Source: National Cyber Security – Produced By Gregory Evans Turkish hackers claimed on Friday to have hijacked for more than 90 minutes the official websites of the Greek parliament, the foreign affairs and economy ministries, as well as the country’s stock exchange. On their Facebook page, the hackers group, Anka Neferler Tim, justified their actions […] View full post on AmIHackerProof.com

#deepweb | Dark web websites: 10 things you should know

Source: National Cyber Security – Produced By Gregory Evans

Back in the 1970s, “darknet” wasn’t an ominous term: it simply referred to networks that were isolated from the mainstream of ARPANET for security purposes. But as ARPANET became the internet and then swallowed up nearly all the other computer networks out there, the word came to identify areas that were connected to the internet but not quite of it, difficult to find if you didn’t have a map.

The so-called dark web, a catch-all phrase covering the parts of the internet not indexed by search engines, is the stuff of grim legend. But like most legends, the reality is a bit more pedestrian. That’s not to say that scary stuff isn’t available on dark web websites, but some of the whispered horror stories you might’ve heard don’t make up the bulk of the transactions there.

We spoke to some security pros who offered to give us a bit of a guided tour of the web’s nether regions. Hopefully it will demystify things a bit.

Here are ten things you might not know about the dark web.

New dark web sites pop up every day…

A 2015 white paper from threat intelligence firm Recorded Future examines the linkages between the Web you know and the darknet. The paths usually begin on sites like Pastebin, originally intended as an easy place to upload long code samples or other text but now often where links to the anonymous Tor network are stashed for a few days or hours for interested parties. 

While searching for dark web sites isn’t as easy as using Google—the point is to be somewhat secretive, after all—there are ways to find out what’s there.  The screenshot below was provided by Radware security researcher Daniel Smith, and he says it’s the product of “automatic scripts that go out there and find new URLs, new onions, every day, and then list them. It’s kind of like Geocities, but 2018″—a vibe that’s helped along by pages with names like “My Deepweb Site,” which you can see on the screenshot.

fresh onions Daniel Smith

…and many are perfectly innocent

Matt Wilson, chief information security advisor at BTB Security, says that “there is a tame/lame side to the dark web that would probably surprise most people. You can exchange some cooking recipes—with video!—send email, or read a book. People use the dark web for these benign things for a variety of reasons: a sense of community, avoiding surveillance or tracking of internet habits, or just to do something in a different way.”

It’s worth remembering that what flourishes on darknet is material that’s been banned elsewhere online. For example, in 2015, in the wake of the Chinese government cracking down on VPN connections through the so-called “great firewall,” Chinese-language discussions started popping up on the darknet — mostly full of people who just wanted to talk to each other in peace.

Radware’s Smith points out that there are a variety of news outlets on the dark web, ranging from the news website from the hacking group Anonymous to the New York Times, shown in the screenshot here, all catering to people in countries that censor the open internet.

nytimes Daniel Smith

Some spaces are by invitation only

Of course, not everything is so innocent, or you wouldn’t be bothering to read this article. Still, “you can’t just fire up your Tor browser and request 10,000 credit card records, or passwords to your neighbor’s webcam,” says Mukul Kumar, CISO and VP of Cyber Practice at Cavirin. “Most of the verified ‘sensitive’ data is only available to those that have been vetted or invited to certain groups.”

How do you earn an invite into these kinds of dark web sites? “They’re going to want to see history of crime,” says Radware’s Smith. “Basically it’s like a mafia trust test. They want you to prove that you’re not a researcher and you’re not law enforcement. And a lot of those tests are going to be something that a researcher or law enforcement legally can’t do.”

There is bad stuff, and crackdowns means it’s harder to trust

As recently as last year, many dark web marketplaces for drugs and hacking services featured corporate-level customer service and customer reviews, making navigating simpler and safer for newbies. But now that law enforcement has begun to crack down on such sites, the experience is more chaotic and more dangerous.

“The whole idea of this darknet marketplace, where you have a peer review, where people are able to review drugs that they’re buying from vendors and get up on a forum and say, ‘Yes, this is real’ or ‘No, this actually hurt me’—that’s been curtailed now that dark marketplaces have been taken offline,” says Radware’s Smith. “You’re seeing third-party vendors open up their own shops, which are almost impossible to vet yourself personally. There’s not going to be any reviews, there’s not a lot of escrow services. And hence, by these takedowns, they’ve actually opened up a market for more scams to pop up.”

Reviews can be wrong, products sold under false pretenses—and stakes are high

There are still sites where drugs are reviewed, says Radware’s Smith, but keep in mind that they have to be taken with a huge grain of salt. A reviewer might get a high from something they bought online, but not understand what the drug was that provided it.

One reason these kinds of mistakes are made? Many dark web drug manufacturers will also purchase pill presses and dyes, which retail for only a few hundred dollars and can create dangerous lookalike drugs. “One of the more recent scares that I could cite would be Red Devil Xanax,” he said. “These were sold as some super Xanax bars, when in reality, they were nothing but horrible drugs designed to hurt you.”

The dark web provides wholesale goods for enterprising local retailers…

Smith says that some traditional drug cartels make use of the dark web networks for distribution—”it takes away the middleman and allows the cartels to send from their own warehouses and distribute it if they want to”—but small-time operators can also provide the personal touch at the local level after buying drug chemicals wholesale from China or elsewhere from sites like the one in the screenshot here. “You know how there are lots of local IPA microbreweries?” he says. “We also have a lot of local micro-laboratories. In every city, there’s probably at least one kid that’s gotten smart and knows how to order drugs on the darknet, and make a small amount of drugs to sell to his local network.”

xanax Daniel Smith

…who make extensive use of the gig economy

Smith describes how the darknet intersects with the unregulated and distributed world of the gig economy to help distribute contraband. “Say I want to have something purchased from the darknet shipped to me,” he says. “I’m not going expose my real address, right? I would have something like that shipped to an AirBnB—an address that can be thrown away, a burner. The box shows up the day they rent it, then they put the product in an Uber and send it to another location. It becomes very difficult for law enforcement to track, especially if you’re going across multiple counties.”

Not everything is for sale on the dark web

We’ve spent a lot of time talking about drugs here for a reason. Smith calls narcotics “the physical cornerstone” of the dark web; “cybercrime—selling exploits and vulnerabilities, web application attacks—that’s the digital cornerstone. Basically, I’d say a majority of the darknet is actually just drugs and kids talking about little crimes on forums.”

Some of the scarier sounding stuff you hear about being for sale often turns out to be largely rumors. Take firearms, for instance: as Smith puts it, “it would be easier for a criminal to purchase a gun in real life versus the internet. Going to the darknet is adding an extra step that isn’t necessary in the process. When you’re dealing with real criminals, they’re going to know someone that’s selling a gun.”

Specific niches are in

Still, there are some very specific darknet niche markets out there, even if they don’t have the same footprint that narcotics does. One that Smith drew my attention to was the world of skimmers, devices that fit into the slots of legitimate credit and ATM card readers and grab your bank account data.

And, providing another example of how the darknet marries physical objects for sale with data for sale, the same sites also provide data manual sheets for various popular ATM models. Among the gems available in these sheets are the default passwords for many popular internet-connected models; we won’t spill the beans here, but for many it’s the same digit repeated five times.

atm skinners Daniel Smith

It’s still mimicking the corporate world

Despite the crackdown on larger marketplaces, many dark web sites are still doing their best to simulate the look and feel of more corporate sites. 

elude Daniel Smith

The occasional swear word aside, for instance, the onion site for the Elude anonymous email service shown in this screenshot looks like it could come from any above-board company.

One odd feature of corporate software that has migrated to the dark web: the omnipresent software EULA. “A lot of times there’s malware I’m looking at that offers terms of services that try to prevent researchers from buying it,” he says. “And often I have to ask myself, ‘Is this person really going to come out of the dark and trying to sue someone for doing this?”https://www.csoonline.com/”

And you can use the dark web to buy more dark web

And, to prove that any online service can, eventually, be used to bootstrap itself, we have this final screenshot from our tour: a dark web site that will sell you everything you need to start your own dark web site.

docker Daniel Smith

Think of everything you can do there—until the next crackdown comes along.

Copyright © 2018 IDG Communications, Inc.

Source link
——————————————————————————————————

The post #deepweb | <p> Dark web websites: 10 things you should know <p> appeared first on National Cyber Security.

View full post on National Cyber Security

Hackers Are #Posting #Porn On #ISIS #Websites

Source: National Cyber Security – Produced By Gregory Evans

Growing up Muslim, ideas around sexuality are often suppressed and forbidden. No one ever really talks about sex or tells you about it. When I saw that scene in Titanic when DiCaprio’s hand slides down the foggy window, I was told to look away from the screen—my imagination was forced to fill in the gaps. When I first saw porn, it pretty starkly opposed the innocent picture my mind had conjured up about romance. I felt a little sick and very ashamed, then a little pissed off that my parents had been doing that. And then I felt sick again.

In an effort to take down ISIS, Iraqi hackers “Daeshgram” have exploited the guilt and anxiety of fundamentalists by posting porn on their official communication channels. During an announcement that a media centre will open in an Isis-controlled part of Syria, Daeshgram posted an image of a naked woman in a porno. A video of ISIS supporters watching the the announcement was altered to appear as if the extremists were actually watching a porn projection.

The stunt ended up planting seeds of doubts in online forums. ISIS supporters began dismissing the websites where the video circulated with statements like “the crusaders of media say that Amaq [Islamic State’s “News Agency”] is hacked.” The announcements were overshadowed by the shameful shock of indecency. The porn stream severed trust their most respected outlet.

Daeshgram pretended to confirm suspicions that they controlled the Amaq website by uploading a video that claimed to have hacked the Isis propaganda site. A number of group members began online feuds, others removed members from secret groups where they discussed plans. The peak of the hackers’ disruption efforts came when ISIS told its members not to trust Amaq anymore—a big deal, consider Amaq is the primary website the terrorist group uses to claim responsibilities for their attacks.

Daeshgram are a group of six Muslim men from Iraq who exploit modern technology to disrupt the “virtual caliphate” and its increasing popularity in the Middle East. The group of students, engineers and cybersecurity researchers all hide their activities from friends and family.

Earlier this month, Fossbytes reported that Amaq had previously claimed their website was “unhackable.” A Muslim hacker group called Di5s3nSi0N quickly replied “challenge accepted.” Within hours, they hacked Amaq and released emails detailing the information of their subscribers.

Similarly, in 2016 an anonymous hacked named WachulaGhost attacked ISIS social media profiles by repeatedly posting gay porn from their profiles. The hacker claimed to have hacked over 250 social media accounts associated with ISIS, replacing their content with gay pride messages and porn. WachulaGhost told CNNMoney “[We] discovered a vulnerability, so we thought ‘Hey let’s go start taking their accounts…and humiliating them.’”

When Muslim hackers exploit cultural sensitivities in acts of psychological warfare, they leave scars that last much longer than physical wounds. Pride and shame are the most important emotions in the social life of the Muslim world: suicides and murders often take place over fairly abstract ideals like “honour.” As a horny young teen I would rather get beaten up 100 times over then have my parents and friends be exposed to my search history—we all would, right? But in our culture, the psychological guilt is spiritually unforgiving.

The post Hackers Are #Posting #Porn On #ISIS #Websites appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Hackers target govt websites in cyber spillover from Arakan crisis

Source: National Cyber Security – Produced By Gregory Evans

Hackers targeted several government websites this week, according to state media, apparently in retaliation for Burma’s treatment of the country’s Muslim minority, as international attention on the plight of the Rohingya in northern Arakan State intensifies. The Burmese-language state-run daily Kyemon reported on Tuesday that six government websites had been…

The post Hackers target govt websites in cyber spillover from Arakan crisis appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Why do Hackers Hack Websites? And How do You Protect Yourself From them?

Source: National Cyber Security – Produced By Gregory Evans

There are many reasons behind why hackers target websites. Years ago, hackers did it out sheer vanity. To prove that they can hack websites, to boost their egos. But as technology improved, so have the reasons for hacking. In this blog, let’s try to understand why hackers target websites and…

The post Why do Hackers Hack Websites? And How do You Protect Yourself From them? appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Student hacker, 19, admits high-profile cyber-attacks on the websites of multinational firms including Amazon, Netflix, BT and the BBC

Source: National Cyber Security – Produced By Gregory Evans

A teenager has admitted carrying out a string of high-profile cyber attacks on the websites of multi-national firms. Jack Chappell, 19, of Stockport, committed Distributed Denial of Service (DDoS) attacks on NatWest, the National Crime Agency, Vodafone, the BBC, BT, 02 and Amazon. DDoS attacks involve crashing websites by flooding…

The post Student hacker, 19, admits high-profile cyber-attacks on the websites of multinational firms including Amazon, Netflix, BT and the BBC appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures