Security and Situational Awareness, Open Source Intelligence, Cybersafety and Cybersecurity, Threat Alerts, Geopolitical Risks, etc. Vanguard Of A Countering Violent Extremism Advocacy: "Nigerians Unite Against Insecurity, Terrorism and Insurgency". For Articles, Press Releases, Adverts etc, Email: donnuait(a)yahoo.com, Twitter: @DonOkereke.
Wednesday, 5 August 2015
European Central Bank Hacked; Norwegian Banks, Companies Hit By Cyber Attacks
Wednesday, 12 November 2014
Tuesday, 28 October 2014
Researchers Identify Sophisticated Chinese Cyber-espionage Group
Tuesday, 14 October 2014
Russian Hackers Exploit Bug In Microsoft Windows To Hack Nato Computers
Wednesday, 24 September 2014
Nigeria's Electronic I.D Card: National Security and Unintended Consequences
Written by:
Thursday, 7 August 2014
Russian Gang 'Steals' 1.2 Billion Usernames and Passwords
A Russian group has hacked 1.2 billion usernames and passwords belonging to more than 500 million email addresses, according to Hold Security - a US firm specialising in discovering breaches.
Hold Security described the hack as the "largest data breach known to date".
It claimed the stolen information came from more than 420,000 websites, including "many leaders in virtually all industries across the world".
Hold Security did not give details of the companies affected by the hack.
"They didn't just target large companies; instead, they targeted every site that their victims visited," Hold Security said in its report .
"With hundreds of thousands of sites affected, the list includes many leaders in virtually all industries across the world, as well as a multitude of small or even personal websites."
The New York Times, which first reported the findings , said that on its request "a security expert not affiliated with Hold Security analysed the database of stolen credentials and confirmed it was authentic".
"Another computer crime expert who had reviewed the data, but was not allowed to discuss it publicly, said some big companies were aware that their records were among the stolen information," the paper said.
The paper added: "Hold Security would not name the victims, citing nondisclosure agreements and a
reluctance to name companies whose sites remained vulnerable."
The Wall Street Journal later revealed that Hold Security intended to offer website owners the ability to check
whether they had been affected, but only if they paid a fee.
The firm has since posted a message on its site saying it will charge $120 (£71) a month for a "breach notification service".
One computer security expert said he was surprised by this approach.
"This situation is quite unusual in that the company has decided to charge for this information," Dr Steven Murdoch from University College London's computer science department told the BBC.
"Usually they would do an initial disclosure [of who had been affected] for free and then offer their services for a fee at a later stage.
"The company rightly points out that there is going to be a huge amount of work to securely contact all the
affected websites, but a common solution to this is to partner with a government or industry-funded
organisation to help with that."
Despite the large amount of credentials said to have been compromised, Dr Murdoch added that it would be premature to advise the public to reset all their passwords.
"Although there's a large amount of passwords involved, a lot of them could be irrelevant and many of the
websites tiny," he said.
"It's not necessarily the case that a large proportion of internet users have been affected. Until we get more statistics we won't know that.
"So, there's no reason to panic now, but perhaps it's a good reminder to follow best practice of not using the same password on multiple websites, because this will not be the last time such a breach happens."
Multi-pronged attack?
Hold Security, which has previously reported about hacks on Adobe and Target, said it took more than seven months of research to discover the extent of the latest hack.
Other security experts are surprised by the way Hold Security is sharing its information.
The firm claimed the gang initially acquired databases of stolen credentials from fellow hackers on the black market.
"These databases were used to attack e-mail providers, social media, and other websites to distribute spam to victims and install malicious redirections on legitimate systems," Hold Security said.
The hackers also got access to data from botnets - a network of computers infected with malware to trigger online fraud.
Hold Security said the botnets helped the hacking group- which it dubbed CyberVor - identify more than 400,000
websites that were vulnerable to cyber attacks.
"The CyberVors used these vulnerabilities to steal data from these sites' databases," the firm said.
"To the best of our knowledge, they mostly focused on stealing credentials, eventually ending up with the largest cache of stolen personal information, totalling over 1.2 billion unique sets of e-mails and passwords."
The firm is now marketing its breach notification service as a way to "stay ahead of the hackers ".
But one of its rivals expressed surprise at this approach.
"For a long time the security industry has freely shared information on breaches within its own community,"
said Vanja Svajcer, principal security researcher at Sophos.
"Researchers discovering credentials breaches usually help end users either by making the information about
compromised accounts public or by working with the company whose servers were compromised to inform all affected users.
"In this case, the credentials were harvested from thousands of servers and it would be difficult to work
with every server owner to inform the compromised users. Nevertheless, it is reasonable to expect the company to make the information freely available so everybody can check that none of their email addresses have been compromised."
Password tips:
The University of Surrey's Prof Alan Woodward suggests the following rules should be observed when picking a new password.
Don't choose one obviously associated with you:
Hackers can find out a lot about you from social media so if they are targeting you specifically and you choose, say, your pet's name you're in trouble.
Choose words that don't appear in a dictionary:
Hackers can precalculate the encrypted forms of whole dictionaries and easily reverse engineer your password.
Use a mixture of unusual characters:
You can use a word or phrase that you can easily remember but where characters are substituted, eg,
Myd0gha2B1g3ars!
Have different passwords for different sites and systems:
If hackers compromise one system you do not want them having the key to unlock all your other accounts.
Keep them safely:
With multiple passwords it is tempting to write them down and carry them around with you. Better to use some form of secure password vault on your phone.
Friday, 11 July 2014
Apple's iPhone Branded a 'National Security Concern'
Apple's iPhone has been labelled a "national security concern" by Chinese state broadcasters as relations between the country and US over cybersecurity worsen.
The influential state-sponsored China Central Television broadcast declared the iPhone a "national security concern" as part of its national noon broadcast on Friday, according to the Wall Street Journal. CCT criticized the "frequent locations" function present on Apple's iOS 7 operating system, declaring that researchers believe data points recorded by the service could give those with access to this data knowledge of Chinese concerns and even "state secrets."
Found in Settings , the "frequent locations" function is an opt-in feature which allows users to grant their
devices permission to record places they often go, in order to provide useful location-based information.
The relationship between China and the US in relation to cybersecurity has never been close, but became far more strained following the leak of
confidential documents by former US National Security Agency (NSA) contractor Edward Snowden earlier this year.
Out of all the leaks which showed the widespread surveillance activities of the intelligence agency, the NSA's secret tapping of networks belonging to Chinese telecom and internet giant Huawei were of interest to the country, as were disclosures which suggest the NSA hacked major telcos in China to mine text messages - as well as sustained attacks on Tsinghua University networks.
The broadcast touched upon the Snowden leaks, and according to the WSJ called the US technology firms'
databases a "gold mine." In addition, the broadcast quoted Chinese officials who insisted that Apple would need to "take on any legal responsibilities" if data leaks caused by the firm's devices caused harm.
In addition, the recent arrest of five "military hackers" who allegedly stole US corporate data by US law
enforcement is not likely to have improved matters. Following the arrests, China's defence ministry
said:
"From 'WikiLeaks' to the 'Snowden' case, US hypocrisy and double standards regarding the issue of cyber security have long been abundantly clear."
Apple is the latest in a string of US companies to be facing backlash over tense relations between China and
the United States, following questions raised by Chinese media in June over the security of Microsoft's Windows
operating system and an earlier ban of the use of Windows 8 in government computers by the Chinese Central Government Procurement Centre.
Courtesy:
ZDNet.com
Friday, 4 April 2014
Israel Revs Up Cyber-Security Defences
Worried by imminent fears of a cyber-attack by Palestinian activists, Israel has blocked international data from reaching government sites. By blocking traffic, Israel hopes to limit activists' ability to knock out official sites. In addition, government workers are being instructed to be wary of email messages from beyond the nation's borders.
The precautions are expected to be in place over the weekend.
The measures involve filtering traffic so only data originating within Israel reaches the sites. Systems that accept payment for government services made by people outside the country are also being put on hold.
Israeli web news site Walla said the precautions were being taken to deal with a "huge attack" being prepared by hacktivists acting for pro-Palestinian groups.
Reuters reported that Israeli government security teams were also carrying out work on official websites to make them more resistant to attack.
Israeli officials have declined to comment on the action the country is taking.
The precautions come a couple of months after security company Seculert revealed that activists had managed to breach Israeli government defences using a booby-trapped email.
The attack reportedly left the perpetrators in control of 15 computers that were used to manage some of Israel's armed forces.
BBC
Monday, 31 March 2014
United Kingdom Launches CyberSecurity Team
The minister also repeated the claim that one London-based company had suffered a security breach which cost it "£800m worth of revenue".
Featured post
The Metaverse Arms Race: Enterprise Prospects, Cybersecurity And National Security Implications
Introduction: Metaverse is derived from the phrase ‘meta’ and ‘universe’. The prefix meta originated from Greek and means "beyond’’, ...
Anti-Terrorism Advocasy
Search Blog
Popular Posts
-
A $10 billion-a-year effort to protect sensitive government data, from military secrets to So...
-
What is an employment or job scam (fraud)? A job scam (419 in the Nigerian parlance) happens when a swindler impersonates or fronts a...
-
The Parish Priest of St. Theresa Catholic Church in Ankwa Kachia Local Government Area of Kaduna state Rev. Fr. John Bako Shekwolo has b...
-
Preamble: Anyone up-to-date with the security situation and dynamics in Nigeria will attest that the country is grappling with multifa...
-
Written by: Don Okereke Preamble Security and safety are sine qua non for human existence, survival and development. Renowned ...
-
Quote: “The peace in [Taraba] state is under assault. There is an attempt at ethnic cleansing in this state and, of course, in al...
-
The United Nations Mine Action Service (UNMAS), on Thursday said explosive remnants of (war) of the Boko Haram conflict might have killed ...
-
S/election seasons in Nigeria are synonymous with war situations, a do-or-die affair. Barely six months to Nigeria’s defining 2019 gener...
-
The Nigerian Police Force has raised an alarm warning of coordinated plans to attack oil installations across the country.
-
More often than not, every organization strives to put square pegs in square holes as far as recruitment is concerned and to boost p...
Holistic Security Background Checks Limited
Anti-Terrorism Advocasy
Translate
Blog Archive
- March (1)
- February (1)
- January (2)
- September (1)
- August (1)
- March (5)
- February (1)
- November (2)
- June (1)
- April (3)
- March (3)
- February (1)
- November (1)
- October (1)
- September (3)
- August (2)
- July (2)
- June (5)
- April (4)
- March (1)
- February (5)
- January (10)
- November (7)
- October (3)
- September (3)
- August (8)
- July (16)
- June (17)
- May (20)
- April (23)
- March (24)
- February (14)
- January (21)
- December (15)
- November (15)
- October (21)
- September (11)
- August (16)
- July (17)
- June (31)
- May (24)
- April (20)
- March (14)
- February (16)
- January (20)
- December (30)
- November (27)
- October (24)
- September (31)
- August (23)
- July (22)
- June (23)
- May (33)
- April (21)
- March (32)
- February (32)
- January (35)
- December (42)
- November (44)
- October (45)
- September (50)
- August (51)
- July (41)
- June (51)
- May (34)
- April (38)
- March (49)
- February (40)
- January (39)
- December (35)
- November (49)
- October (56)
- September (59)
- August (71)
- July (81)
- June (62)
- May (83)
- April (88)
- March (83)
- February (84)
- January (80)
- December (84)
- November (115)
- October (119)
- September (59)
- August (94)
- July (137)
- June (75)
- May (48)
- April (23)
- March (23)
- February (2)