Google develops invisible web security Captcha form: Website security checks that challenge people to prove they are human are likely to “disappear” in favor of a new system developed by Google. Captcha checks typically ask people to complete a puzzle that a computer would struggle to complete correctly. Google’s new system tracks how a person interacts with a website to prove they are real, so the puzzles are no longer necessary for most people. Google’s reCaptcha system has already simplified the process by asking users to tick a check box on the website they are using. The box monitors how each person has interacted with it, to separate natural human clicks from bots.
Technology behind ‘all serious crime’: The “comprehensive” study of organized crime in Europe found a wide range of crime groups ranging from loose networks of individual criminals up to large trans-national bodies that generate profits which rival those of legitimate multi-national corporations. These cross-cutting criminal threats enable and facilitate most, if not all, other types of serious and organized crime, said the report. The steady increase in the number of reported burglaries across Europe was a “particular concern” for many nations, it said. Many groups now use cybercrime campaigns, including ransomware, document fraud, money laundering and online trade in illegal goods to generate cash that is then used to bankroll people and drug trafficking operations.
Beware, hackers will soon target your fitness tracker and Smart TV with ransomware: As the number of internet-connected devices grows, so does the potential that a cybercriminal will find and exploit vulnerabilities with them. Consumer devices including fitness trackers, smartwatches and televisions will soon become a key target of ransomware. “Connected consumer devices will contain huge amounts of personal data, which could be targeted by criminals seeking to commit extortion or fraud using tailored malware. It will present a challenge to manufacturers, and it is not yet known whether customer support will extend to assisting with unlocking devices and providing advice on whether to pay a ransom.
What President Donald Trump Means For Cybersecurity: President Trump has been more than vocal about his views on terrorism during his campaign year, and it is clear that when asked to choose between privacy and security, he is very likely to pick security. The EO, among other things, calls for the immediate formation of a Vulnerabilities Review Board to prepare an assessment of cyber-vulnerabilities throughout the country and prepare a list of recommendations to help counteract those vulnerabilities. In conclusion is that President Trump’s administration, just like his rather unconventional election campaign, has been fickle and unpredictable to say the least, and while the leaked document gives us a sneak peek at what seems to be an encouraging step towards digital awareness, only time will tell where this new generation of security-driven administrative policy is
US Air Force leak exposes ‘holy grail’ of top secret data including details of over 4,000 officers: IBTimes UK has reached out to MackKeeper security researcher Chris Vickery, who first tweeted about the data leak on 25 February and worked with fellow MacKeeper researcher to secure the breach, for further clarity on the matter. “Foreign powers might use that information to target those individuals for espionage or to otherwise monitor their activity in the hopes of gaining insight into US national security posture”. The leak reportedly contains sensitive and personal information on high-ranking and senior officials, some of whom have “top secret” security clearance and access to highly sensitive material, which is only allegedly made available via codeword-level clearance.
Russia may deliberately slow internet access to foreign websites for ignoring its data laws: Legislators in Russia have seemingly had enough of major technology firms trying to skirt around its tough domestic data laws, threatening a controversial new penalty for noncompliance: forcing the loading speeds of their websites to a crawl. Multiple sources, including employees of internet firms and telecommunications providers in the region, told he aim of the proposal is to crack down on companies bypassing Russian courts because they are registered abroad. Insiders said the threat to throttle internet access would not only apply to foreign companies, leading some Russian tech chiefs to issue statements – albeit anonymously – pushing back against the plans. The penalty could have a dramatic impact on services that rely on streaming to operate. The Moscow Times reported the law could be introduced via amendments to “anti-terror” legislation.
Google Chrome fake app designed to steal credit card data emerges: The malware was discovered by the Malware Hunter Team. The fake app is so well designed that lot of people are likely to fall for it thinking that it is the actual Google Chrome browser. The malware was dubbed as ‘Betaling – Google Chrome.exe’. It involves a fake application that looks like the original Chrome browser but is actually designed to steal credit card information. After it takes control of a victim\’s computer, it displays the standard Google Chrome icon on the desktop making it difficult to differentiate between the authentic and fake Chrome application. This information is later collected and emailed to an AOL email ID. An online scam has been discovered targeting Google Chrome browser users. The browser compels users to enter their payment card information before they can start surfing the internet. A URL navigation bar identical to the Chrome appears on the screen and displays the same HTTPS lock icon as the original Chrome. exe.
Malicious malware and ransomware found pre-installed on 38 Android phones by two companies: The devices belonged to a ‘large telecommunications company” and a “multinational technology company’. In addition, a user who receives a device already containing malware will not be able to notice any change in the device’s activity which often occur once a malware is installed. The powerful and complex Loki malware was also found on the devices which displays illegitimate ads to generate revenue, swipes data about the infected device and installs itself to the system “allowing it to take full control of the device and achieve persistency. According to security firm Check Point’s Mobile Threat Prevention team, the malware were pre-installed on the devices before users even received them. Security researchers have found a “severe infection” in 38 Android devices belonging to two unidentified companies that were riddled with an assortment of malware. Check Point researchers said most of the pre-installed malware on the infected devices were information stealers and rough ad networks, including the mobile ransomware Slocker. “
Tech companies response to Zero day bugs: Apple said it had already addressed some of the vulnerabilities. “As we have reviewed the documents, we’re confident that security updates and protections in both Chrome and Android already shield users from many of these alleged vulnerabilities,” the firm told the news site Recode. “We are aware of the report and are looking into it,” a spokesman from Microsoft said. “The World Wide Web Foundation – which campaigns for internet privacy – said the US government needed to issue a detailed response. The leaks also claimed that the CIA had created malware to target PCs running Microsoft’s Windows operating system. “The technology built into today’s iPhone represents the best data security available to consumers, and we’re constantly working to keep it that way,” it said. Google has also reacted to claims that the CIA was able to “penetrate, infest and control” Android phones due to its discovery and acquisition of “zero day” bugs.