While investigations are ongoing, Twitter reported it was the victim of a “coordinated social engineering attack.” The company confirmed that threat actors targeted and successfully manipulated a small group of employees and used their credentials to gain unauthorized access to an administrative tool that is “only available to internal support teams.”
According to Chako social engineering attacks like this one are “so effective because they use psychological manipulation to convince a person to take an action or divulge sensitive information that they shouldn’t. In fact, cyber attackers are the ultimate psychologists.”
Using these psychological tricks, the attackers were able to hijack Twitter accounts then post messages to dupe social media users into donating Bitcoin payments to fraudulent causes.
t’s hard to argue that that all web services and applications should not be secured using HTTPS. However, securely obtaining and deploying the certificates needed for securing web services is a challenge, especially for developers.
Simply put, there is no easy way for developers to request certificates that comply with corporate policy. First, they need to know where the internal CA is, then they must be granted access to it and possess the proper credential to authenticate.
TLS (transport layer security), also known as SSL (secure socket layer), is the cryptographic protocol that enables billions of people across the world to use the internet by protecting their privacy and data security. It forms the very foundation of website security.
The strength of TLS protection lies in the encryption algorithms and security parameters that it works on. These algorithms and parameters differ from one SSL/TLS version to another. When a security element of a TLS version is found to be seriously vulnerable, that version of SSL/TLS is deprecated and is replaced by a newer version.
The biggest security problem is a weak password. Either individual password or enterprise server passwords. Maintaining good password is very challenging. And, We all end up using same weak password in multiple places.
This video gives a good understanding of how password can be cracked within a seconds. Listen here.
Your browser can pick up ultrasonic signals you can’t hear, and that sounds like a privacy nightmare to some
People can generally hear audio frequencies ranging from 20 Hz and 20,000 Hz, though individual hearing ranges vary. Audio frequencies below and above the threshold of human hearing are known as infrasound and ultrasound, respectively.
A few years ago, digital ad companies began using ultrasonic signals to track people’s interests across devices: if a TV advert, for example, emits a sneaky inaudible signal, a nearby smartphone could pick it up and pass it to an app, which updates the owner’s ad-targeting profile with details of what they were watching and when. Now you know when someone’s into cooking shows on the telly, or is a news junkie, or likes crime documentaries, and so on. Read more in
New cybersecurity report says China-based group is hacking Asia-Pacific governments
A China-based hacking group has been quietly carrying out a five-year cyber espionage campaign against Asia-Pacific governments after it previously “slipped off the radar,” a new report claims.
A China-based hacking group has quietly been carrying out a five-year cyber espionage campaign against governments in the Asia Pacific region, a new report by Check Point revealed.
The collective known as Naikon has targeted countries including Australia, Indonesia, Philippines, Vietnam, Thailand, Myanmar and Brunei.
For six years Samsung smartphone users have been at risk from critical security bug. Patch now
Samsung has released a security update for its popular Android smartphones which includes a critical fix for a vulnerability that affects all devices sold by the manufacturer since 2014.
On its Android security update page Samsung thanks researcher Mateusz Jurczyk of Google Project Zero for the discovery of the vulnerability that could – he claims – be exploited to run malicious code on a targeted device, without alerting the user.
Such an attack, if successful, could result in a remote hacker gaining access to a wide variety of information – including a user’s call logs, address book, SMS archive, and so forth. Read more in
It’s definitely not business as usual. Threat actors are taking full advantage of these uncertain times by launching a wave of new cyber-attacks, leveraging tactics such as phishing, ransomware, and credential stuffing. Ransomware attacks alone skyrocketed 148% in the past month, according to VMware Carbon Black threat researchers. At the same time, many organizations are being forced to downsize staff and delay planned IT security projects.
To improve cyber resilience under the current conditions, it’s vital to focus on the effectiveness of security controls in the context of hackers’ tactics, techniques, and procedures ― often called TTPs.
The following five best practices, based on an analysis of threat actors’ TTPs, can improve cyber resilience without the need for more resources:
Establish Secure Remote Access… for Workforce and IT Admins
Avoid Taking the (Phishing) Bait
Step Up Your Multi-Factor Authentication Game
Boost Your Infrastructure Immunity Against Ransomware