Alleged LulzSec leader arrested in Australia

The Australian Federal Police arrested a man in Sydney on Monday who claims to be the leader of Lulz Security, more commonly known as LulzSec. Though his name has not been revealed, ABC News Australia reports that he is 24-years-old, and worked in a “position of trust” in a NSW-local branch of an international IT company. Because of his work position, he had access to government client data.

LulzSec Australia

The name of the company for which he worked has not been specified, nor has the exact position he held. Says the AFP’s Commander Glen McEwan, he is someone “known to international law enforcement,” and that he is the first LulzSec member to be arrested by them. His arrest took place after being under surveillance for less than two weeks, something that was prompted by a compromised government website.

As a result, the alleged leader has been arrested and charged with one count of unauthorized access to a restricted computer system, as well as two counts of unauthorized modification of data to cause impairment. Such charges have a maximum prison sentence of 12 years. Some of the Australian targets of the hacking collective are said to be departments of the Victorian and NSW governments, local councils, and AusAid. In addition, ten high schools and universities had their login information and email accounts leaked.

The claim that this individual is LulzSec’s leader comes from posts he allegedly made on forums, in which he claimed to be the leader. The AFP also says that they have talked about it with him, and that he has discussed it. He’s due back in court on May 15. Says Commander McEwen: “The AFP will not tolerate the attempts of hackers to damage or destroy the online property of Australian individuals, companies or national infrastructure resources.”

[via ABC News]


Alleged LulzSec leader arrested in Australia is written by Brittany Hillen & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Verizon security report itemizes annual data breaches

Verizon has published its latest Data Breach Investigations Report, which is released annually and looks at the instances of data breaches that happened over the course of a year. According to the report, 2012 saw 621 data breaches – those that were confirmed, that is – in addition to a much higher approximately 47,000 so-called security incidents. The numbers give us a look at what kind of threats are present, and who is most affected.

Screenshot from 2013-04-22 23:52:09

A data breach is self-explanatory, meaning that information of some sort has been compromised, whether it is employee data or a roster of login information. A security incident, however, is something related that doesn’t quite achieve the “breach” threshold, such as a DDOS attack. According to the breakdown, no one was spared from the cyberattcks, with all sorts of businesses and organizations falling victim.

Small, medium, and large businesses, law enforcement agencies, media companies, financial institutions, commercial websites, organizations, and more all suffered from various security breaches and incidents last year. Out of them, it is said that 76-percent were the result of either stolen or weak usernames/passwords, with the the data being harvested using means ranging from skimmers to malware.

According to the New York Times, Wade Baker, a principal author of the Verizon report, said: “The results validate that any business that operates online is at potential risk of suffering a data breach … the report shows that no matter the size of the organization — large, small, government agencies, banks, restaurants, retailers — people are stealing data from a range of different organizations and it’s a problem everyone has to deal with.”

[via New York Times]


Verizon security report itemizes annual data breaches is written by Brittany Hillen & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Lookout security announces “BadNews” Android malware family discovery

In an announcement that should have Android users having a double-check of the applications they’ve downloaded in the recent past, the mobile security group Lookout has identified what they call the “BadNews” malware family. The applications affected by BadNews have, according to Lookout, potentially affected between 2,000,000 and 9,000,000 users due to the number of downloads recorded in the apps that have been tagged. Lookout has made it clear that not all downloads of these apps (especially early versions) contained malicious code, all those on the list should be cautious.

BadNewsMalwareLookout

According to Lookout, this operation has affected primarily Russian devices and has been aimed at devices in the Russian Federation and neighboring countries. The Ukrain, Belarus, Armenia, Kazakhstan, and others are on the list of those areas affected, and the full list of BadNews-toting apps can be found in the image immediately following this paragraph. If you’ve downloaded one of these apps, Lookout suggests that you take heed!

Screen-Shot-2013-04-18-at-9.16.29-PM

What happens here with BadNews is a series of actions. Once activated – and we’re not entirely clear on what activates said software – BadNews begins sending sensitive information from your smartphone to a remote server. Your phone number, serial number (IMEI), and more can be sent without the user’s knowledge.

From there, a “fake” advertisement will be targeted to the user through the app, this advertisement prompting the installation of a new piece of software. This step could show up as an update to “Vkontakte”, a popular Russian Social Networking app, an update to Skype, or various other oddities. If this piece of the puzzle is completed, BadNews will begin working with cash fraud apps such as AlphaSMS.

With AlphaSMS, it will appear that a user is making entirely free SMS messages, but the user will be sending cash to the malicious parties in charge of this whole operation without their knowledge.

To prevent this from happening to you, you’ll want to make sure you avoid the apps listed above (of course), and make sure your Android device’s system setting is unchecked for “Unknown Sources” installing apps. If you’ve got this checked, it’s possible (however unlikely) that an app can install itself without needing your permission. Stay smart!

[via Lookout]


Lookout security announces “BadNews” Android malware family discovery is written by Chris Burns & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

LulzSec hacker “Recursion” sentenced to a year in prison

It has been a long process, but one of LulzSec‘s hackers who went by the name “Recursion” has been sentenced, receiving one year in prison for his part in a cyberattack on Sony Entertainment. After serving his year, the hacker, who’s real name is Cody Kretsinger, will have to perform 1,000 hours of community service and home detention. Kretsinger plead guilty to a single count of conspiracy and unauthorized impairment of a protected computer, according to Reuters.

Lulzsec

LulzSec is a branch from the more popularly-known Anonymous hacker collective, and has claimed to have initiated quite a few high-profile cyberattacks against private and government websites alike. One such attack was against Sony, who’s website Kretsinger claims to have accessed, gathering information and spreading it to two other LulzSec hackers.

That information was then made public on the group’s Twitter account and on its website, resulting in what prosecutors say was in excess of $600,000 worth of damage to the corporation. Additional members of the hacking group are slated for sentencing, having plead guilty to various related charges earlier this month and back in the summer of 2012.

On April 9, LulzSec members Jake Davis, Mustafa al-Bassam, and Ryan Ackroyd all plead guilty in London to cyberattacks against Sony, in addition to other entities, such as the NHS and News International. Ackroyd, in particular, plead guilty to also plotting cyberattacks against many other websites, among them being 20th Century Fox. Davis and al-Bassam plead guilty to conspiracy to attack law enforcement agencies in both the UK and US. They will be sentenced on May 14.

[via Reuters]


LulzSec hacker “Recursion” sentenced to a year in prison is written by Brittany Hillen & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Google to roll out new Chrome safeguard against malicious extensions

Google is mighty proud of Chrome‘s security, something it has taken a proactive stance on. Back in December, the Internet giant put the kibosh on silent extensions, which are the sleeper-cell kind that slip in unnoticed and unwanted, installing by default. This move has been expanded on, with the company announcing earlier today a new safeguard that ensures malicious extensions stay out of your browser.

Google Chrome

This safeguard was just implemented into Chrome browser, and involves additional measures that keep an eye on extensions that don’t follow the path-laid-before-it mechanisms Google has deemed the proper route to extension installation. If a piece of software doesn’t follow these measures, Chrome will assume it is malware and will flag it as such.

The malware designation will be applied because such methods are typically used to circumvent the silent installation blockers that Google has in place for the purpose of fixing something in place that doesn’t belong. The way it does this results in installation by default, and as such the user will not be able to disable it or uninstall it like an ordinary extension. Other varieties of malicious software that use other methods to get around the system are also detected and flagged.

Users will be made known of this attempted installation via a Safe Browsing warning that will appear stating that a malicious download is present. The warnings won’t start appearing for another week or so, however. The result will not only be better protection, but also performance improvements and a better experience, says Google.

[via Google]


Google to roll out new Chrome safeguard against malicious extensions is written by Brittany Hillen & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Microsoft begins rolling out two-factor authentication

The popularity of two-factor authentication is too much for Microsoft, as they will buckle under the pressure and offer two-factor authentication for all 700 million Microsoft accounts. The company announced today that they will be rolling out the new feature over the next few days, giving Microsoft users a little more piece of mind.

windows-phone1

Two-factor authentication will protect an entire Microsoft account, including services like Skype and Xbox Live. Currently, the only Microsoft services that offers two-factor authentication are for credit card activities on various websites and services such as commerce.microsoft.com and xbox.com, and SkyDrive.

Two-factor authentication is essentially a new form of credentials. Instead of only needing a password, users are also required to have some sort of device to confirm logging in, such as a mobile phone. Whenever you log into an unknown computer, Microsoft will ask for your password as well as send you a unique code to your mobile phone that you will then enter in into the login screen.

You can set up two-factor authentication on Microsoft’s Account Management page, but as aforementioned, you may not see the new feature pop up until later in the week. We highly recommend setting it up if you rely on your Microsoft account a lot. Even with a secure password, hackers can still get in, but having two-factor authentication makes it much more difficult.


Microsoft begins rolling out two-factor authentication is written by Craig Lloyd & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Symantec security report reveals attacks up and spam down

Symantec has published its 2013 Internet Security Threat Report, revealing data about the state of the Internet and the threats in it. According to the security report, small and medium businesses have seen the greatest increase in threats, with over all targeted attacks in 2012 jumping to 42-percent, with 31-percent of those attacks being aimed at companies with less than 250 employees.

SYMC-ISTR-webattack-page12

According to the report, those who use social networks, particularly Facebook and Twitter, should be careful, with the instances of phishing websites that spoof popular social networks having jumped a huge 125-percent last year. Not all numbers jumped, however, with the amount of spam sent in 2012 dropping to 69-percent of all email sent during the year.

The number of vulnerabilities found last year clocked in at 5,291, with a fair chunk of them – 415, to be precise – being vulnerabilities with mobile OSs. In line with that is the numbers on data theft, with the report stating that 32-percent of the mobile threats resulted in stolen data. The number of web-based attacks also followed the upward trend, jumping 30-percent.

There were 14 zero-day vulnerabilities last year, as well as some big events, including 600,000 Macs being affected by a virus, and a single waterhole attack hit 500 organizations in one day. Other relevant data is contained in the infograph above, which was made by Symantec. Particularly of note is the increase in the number of web-based attacks that were blocked last year over 2011, jumping from 190,370 to 247,350.

[via Symantec]


Symantec security report reveals attacks up and spam down is written by Brittany Hillen & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Eric Schmidt dives into Google data security

This week Eric Schmidt spoke at Dive Into Mobile, the Google Executive Chairman making clear that Google’s dedication to security will stay strong through the future. Having already run down the Android activation numbers earlier in his talk, noting a staggering 1.5 million Android activations per day, Schmidt tipped an easy 1 billion Android devices set by the end of the year. With that number jumping from just 750 million confirmed by Google CEO Larry Page just this past month, security had certainly better be a big subject one way or another.

1188436262_su8TN-M-580x326

Data security has become an increasingly important issue as Google continues to take hold of the mobile device market across the universe. Here in 2013, with Android devices creating the most massive cross-section of smart devices on the planet, Google is assuring us that they’re keeping our safety in mind.

“Google has a responsibility to keep your data secure. You have a responsibility to keep your password secure and not install malware. With respect to your personal information, we allow you to take it out.” – Schmidt

Of course “take it out” refers to Google’s own takeout service, this allowing users to download the information they’ve added to Google databases in a friendly user-friendly way. Have a peek at our takeout rundown to see all the services you can work with today straight through https://www.google.com/takeout/ – and let us know what you’re going to serve up!

“The other thing is that we’re careful about when we use your information and we tell you that. We disclose what we do with your information, and we adhere to published principles. We have an absolute responsibility to keep your data secure” – Schmidt

Keep that in mind as we continue to see Google embroiled in security lawsuits in the future – watch Schmidt as he continues to assure us that all things remain safe with the big G!

[via All Things D]


Eric Schmidt dives into Google data security is written by Chris Burns & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Researchers use brainwave device to replace passwords with passthoughts

Many techies have dreamed of the day when they can control things by simply thinking about them, and that reality is yet a step closer thanks to researchers at the University of California Berkeley’s School of Information and a $99 brainwave device. Using NeuroSky’s Mindset wearable EEG headset and custom software, users have successfully replaced passwords with passthoughts.

Screenshot from 2013-04-11 02:22:20

While one might be inclined to imagine a huge, expensive headset beyond the means of the average consumer, NeuroSky’s brainwave headset is priced at only $99, and connects to a computer or mobile device via Bluetooth connectivity. The headset has an ear-piece for audio, a grounding clip that goes on the ear, and a small sensor that rests on the forehead. In many ways, it resembles a cross beween an audio headset and an augmented reality eye piece.

Using this device, the researchers measured participants’ brainwaves and were able to use the resulting data to unlock a computer using a so-called passthought rather than a password. The passthought involves thinking of a specific thing, such as a word repeatedly or a certain movement. Such a method is more secure than a conventional password, and takes biometric security to a whole new level.

Just like placing a finger on a biometric scanner won’t unlock a computer unless it has the right fingerprint, using a brainwave headset to think of the passthought won’t unlock the computer unless it is the owner. This is because one’s brainwaves are unique, and one person thinking of something won’t have the same pattern as another person thinking the same thing. Of course, recovering a forgotten passthought is sure to be more difficult than recovering a forgotten password.

[via Mashable]


Researchers use brainwave device to replace passwords with passthoughts is written by Brittany Hillen & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Vudu reveals March 24 burglary, says to reset passwords

Back on March 24 of this year, Vudu‘s offices were burglarized, with the robbers stealing a variety of items, including hard drives. As you can image, those hard drives were full of sensitive data, including information about the service’s customers and account passwords. The theft was kept a secret while law enforcement investigated, but now customers are being urged to reset their passwords.

vudu_logo

To make it simple for customers to get information about the theft, Vudu has published a FAQ page on the incident, which you can check out at the via link below. Fortunately, the hard drives that were taken did not have contain the full credit card numbers of customers, but they did include just about all the information identity thieves want to get their hands on.

Says Vudu, their investigation shows that the hard drives taken have their customers’ names, home addresses, email addresses, phone numbers, birth dates, and the last four digits of select credit cards. In addition, the hard drives also contain account activity, including encrypted passwords, which Vudu says it believes will make it hard for the thieves to access them, but that it isn’t impossible. Because of this, the company says users should reset their account passwords.

If you use the same password on other websites, such as Facebook, Twitter, or even your bank, you should change them, as well, to ensure all your accounts are safe. Vudu suggests monitoring accounts for user activity from elsewhere. Those who have used credit cards with the service don’t have to worry about their accounts being depleted, however; the service does not store complete credit card numbers. Some users have already been notified about the breach via email, while other users will receive a notification in the near future.

[via Vudu]


Vudu reveals March 24 burglary, says to reset passwords is written by Brittany Hillen & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.