Donald Trump Website Hacked by Iraqi Hacker : An Iraqi hacker going by the online handle of Pro_Mast3r ~ hacked and defaced a server associated with presidential campaign fundraising for Donald Trump. Site was defaced Sunday evening when Ars Technical noted that the home page for the server was displaying a deface page along with a message left by a defacer from Iraq. At the time of publishing this article the targeted server was offline, but this is not the first time that Trump’s website was hacked.
Charging your phone in a public port? Don’t get hacked : There’s a lot of software now if you plug in there’s no way your phone is going to be able to detect the port. The cord you use to charge your phone is also used to send data, says Timothy Caminos, the owner of Super Geeks in Honolulu. You see them at airports and inside conference rooms at hotels; USB charging stations for mobile devices are popping up everywhere, but experts say they’re a convenience that could end up costing consumers if hackers take control of the port’s software.
TeamSpy is back and it’s turning TeamViewer into the spying tool that no one wants : It seems that attackers are using social engineering techniques and taking advantage of people’s careless use of computers and the Internet to trick them into installing the malware. According to security firm Heimdal, a new spam campaign emerged over the weekend, carrying the TeamSpy malware which can give hackers full access to a compromised computer. TeamSpy is back and it’s turning TeamViewer into the spying tool that no one wants.
Google: Corporate Accounts More Likely to Receive Phishing, Malware but not Spam : Google Research analyzed over a billion emails passing through Gmail, and the results were presented yesterday at the RSA security conference in San Francisco. Extremely interesting stats: corporate email addresses are 6.2 times more likely to receive phishing attacks, 4.3X likely to receive malware compared to personal accounts, but 0.4X less likely to receive spam. This is the first time that results like this are published but it makes sense to the degree that corporate inboxes tend to contain more valuable information, which can be much more easily monetized.
Fake Saving Battery Android App Hides Malware That Steals Data : Google guarantees that all applications uploaded to the Play Store are verified, and users are advised to download them only from the official Android store, because they don’t hide malware. It seems that there’s a fake Saving Battery app known as Android/Trojan Downloader. Agent.JI that once it gets installed on a device, it allows more malware to be downloaded to it.If users deny access to the service, they are caught in an endless loop of pop-up screens telling them to enable Saving Battery, so under no circumstances they should grant administrator rights, because multiple malware apps will be installed on the device. It’s also important to ignore those pop-ups that suggest updating a certain application
Spy Android Malware That Hit Mobile Phones of Israeli Forces : The spy Android malware that has infected mobile phones of some 100 members of Israel Defense Forces (IDF) can do a lot of eavesdropping functions that would expose and compromise every victimized soldier’s whereabouts to a well-informed enemy. The malware once it enters into the phone’s system can access contacts list, read text messages, take photos and screenshots, record video and audio and send files at the command of an enemy remotely accessing the phone. Probers are still investigating cyber trails of attackers including the possibility of involvement of this Russian cyber espionage group or Hamas militants.
Malware Used to Attack Polish Banks Contained False Flags Blaming Russian Hackers : According to ESET, the malware used in the recent attacks on Polish, Uruguay, and Mexican banks uses the same dynamic API loading techniques observed in previous Lazarus group malware. All in all, putting together all these common techniques, and all the false flags that attempted to blame the attacks on Russian-speaking hackers, the recent attacks on Polish banks appear to be the work of North Korea, rather than Russia. Meanwhile, Symantec researchers discovered that the malware also used the same code strings, while BAE Systems researchers noted that the recent malware samples were also protected by the same Enigma Protector code packing system, and also shared the same “dropping” techniques.
India witnessing sophisticated cyber-attacks from organized and unorganized players : Increasingly, more and more Indian companies are witnessing sophisticated hacking attempts and cyber risks are increasing. Hacking attempts can be categorized in to three parts, one by amateur hackers who only deface websites, sophisticated hackers who are after money or information and state owned hackers who are guided by their country’s policies, said Sivarama Krishnan, leader, cyber security, at PwC India. Krishnan heads the country’s largest team of 300 cyber security experts including ethical hackers. While no figure is available officially, in-house analysis conducted by the biggest cyber security firms say that Indian companies lose anywhere around $ 4 billion every year due to cyber-attacks.
Connected car apps ‘cannot withstand’ cyber-attacks, warns Kaspersky Lab : Kaspersky Lab has warned drivers of connected cars to take action to protect themselves from potential cyber-attacks. For several car manufacturers, it discovered that all of the applications contain a number of security issues that can potentially allow criminals to cause significant damage for connected car owners. Kaspersky Lab tested seven remote car control applications developed by major car manufacturers which, according to Google Play statistics, have been downloaded tens of thousands, and in some cases, up to five million times. The research discovered that each of the examined apps contained several security issues.
Hackers Demand $25K-$30K After Ransomware Attack Takes Down Bingham County Servers : Bingham County officials are scrambling to rebuild parts of their computer infrastructure after a ransomware attack took down county servers on Wednesday, the phishing attack infected the county servers and made the data inaccessible to employees. A group of hackers, who have not been identified, then contacted the county and demanded they pay a ransom for a price between $25,000 and $30,000. The county chose not to pay the ransom and switched over to backup servers. Bingham County information technology staff thought the virus was contained but discovered around 4 a.m. Friday that the virus had infected at least one backup server, causing the entire county to go offline.