Hackers Gaining Power of Subpoena Via Fake “Emergency Data Requests”

Credit to Author: BrianKrebs| Date: Tue, 29 Mar 2022 14:07:27 +0000

There is a terrifying and highly effective “method” that criminal hackers are now using to harvest sensitive customer data from Internet service providers, phone companies and social media firms. It involves compromising email accounts and websites tied to police departments and government agencies, and then sending unauthorized demands for subscriber data while claiming the information being requested can’t wait for a court order because it relates to an urgent matter of life and death.

Read more

On browsers and bugs

Credit to Author: Susan Bradley| Date: Mon, 28 Mar 2022 09:27:00 -0700

We’re told that one of the best ways to stay secure is to make sure our computers are patched. But we need to always be aware that at any given time, there are several vulnerabilities probably known and in use by attackers. The good news is that the number of days between when a bug is identified and when it’s patched is slowly going down, according to the Google Project Zero. It tracks how long it’s taking vendors to patch bugs and found that “in 2021, vendors took an average of 52 days to fix security vulnerabilities reported from Project Zero. This is a significant acceleration from an average of about 80 days [three] years ago.”

To read this article in full, please click here

Read more

How to boost cybersecurity defenses using your router

Credit to Author: Paul Gillin| Date: Fri, 11 Mar 2022 12:01:00 -0800

COVID-19 has made us all more aware of the need to protect our computers at home from online evil. But when was the last time you pointed your browser at your router? The little box that connects your PC and all the other devices in your home to the internet has an array security features that many people are unaware of.

After speaking to Derek Manky, chief of security insights and global threat alliances at Fortinet’s FortiGuard Labs, I logged into my Verizon FIOS router for the first time in years and discovered there were no less than 18 devices connected to it, including TVs, printers, thermostats and a half dozen Amazon Echoes. Each is a potential security vulnerability. “If you look at your home router, you’ll be surprised what you find there,” Manky said.

To read this article in full, please click here

Read more

Estonian Tied to 13 Ransomware Attacks Gets 66 Months in Prison

Credit to Author: BrianKrebs| Date: Fri, 25 Mar 2022 17:10:34 +0000

An Estonian man was sentenced today to more than five years in a U.S. prison for his role in at least 13 ransomware attacks that caused losses of approximately $53 million. Prosecutors say the accused also enjoyed a lengthy career of “cashing out” access to hacked bank accounts worldwide.

Read more

10 easy steps to make Chrome faster and more secure

Credit to Author: JR Raphael| Date: Thu, 24 Mar 2022 03:00:00 -0700

Gather ’round, kiddos — ’cause it’s time for a story.

Once upon a time, Chrome was a lean, mean browsing machine. It was the scrappy lightweight kid in a block filled with clunky old blobs of blubber. People had never seen a browser so fast, so thoughtfully constructed! It stripped everything down to the essentials and made the act of browsing the web both pleasant and secure — qualities that were anything but standard back in that prehistoric era.

Chrome was “minimalist in the extreme,” as The New York Times put it — with “extremely fast” page loads and a “snappy” user interface, in the words of Ars Technica. Its sandbox-centric setup and emphasis on supporting web-based applications made the program “the first true Web 2.0 browser,” as some other tech website opined.

To read this article in full, please click here

Read more

A Closer Look at the LAPSUS$ Data Extortion Group

Credit to Author: BrianKrebs| Date: Wed, 23 Mar 2022 22:00:43 +0000

Microsoft and identity management platform Okta both disclosed this week breaches involving LAPSUS$, a relatively new cybercrime group that specializes in stealing data from big companies and threatening to publish the information unless a ransom demand is paid. Here’s a closer look at LAPSUS$, and some of the low-tech but high-impact methods the group uses to gain access to targeted organizations.

Read more

‘Spam Nation’ Villain Vrublevsky Charged With Fraud

Credit to Author: BrianKrebs| Date: Tue, 22 Mar 2022 16:33:35 +0000

Pavel Vrublevsky, founder of the Russian payment technology firm ChronoPay and the antagonist in my 2014 book “Spam Nation,” was arrested in Moscow this month and charged with fraud. Russian authorities allege Vrublevsky operated several fraudulent SMS-based payment schemes, and facilitated money laundering for Hydra, the largest Russian darknet market. But according to information obtained by KrebsOnSecurity, it is equally likely Vrublevsky was arrested thanks to his propensity for carefully documenting the links between Russia’s state security services and the cybercriminal underground.

Read more

iCloud goes down: Live by the service, die by the service

Credit to Author: Jonny Evans| Date: Tue, 22 Mar 2022 08:04:00 -0700

Read more