Hacked Pacemaker Transmitters Could Turn Pacemakers to Literal Heartstoppers

Pacemakers save millions of lives, but a security researcher has shown that they can be used to kill on a massive scale as well. Speaking at the Breakpoint security conference, Barnaby Jack of IO Active reverse engineered a pacemaker transmitter – a device like this one used to monitor installed pacemakers – eventually enabling him to wirelessly deliver 830v shocks to a pacemaker using his laptop. Yikes.

no pacemaker sign by library mistress

Image Credit: Library Mistress

Even worse, Jack warned that a hacked transmitter could control all pacemakers within 30ft. Aside from jolting people, the compromised device could also be used to read and write patient data or load infected firmware into a pacemaker. These infected firmware could even be made to jump and infect other pacemakers, extending a malicious attackers’ range and possibly resulting to mass murder. Jack says he demonstrated this flaw in order to warn pacemaker manufacturers to step up the security of their device. Let’s hope they do.

[via SC Magazine via DVICE]

 

 


Malware Is "Rampant" Across Medical Devices in Hospitals [Malware]

Medical technology is relying more and more heavily on computational power to streamline the healthcare process. But there’s a problem: computerized medical technology is increasingly vulnerable to malware infections, and nobody’s doing anything about it. More »

Facebook expands AV Marketplace with 7 new partners

Nearly six months ago, Facebook launched the AV Marketplace, offering users access to antivirus applications. This morning, the company announced a deal with seven new partners: avast!, AVG, Avira, Panda, Kaspersky, Webroot, and Total Defense. In addition, Facebook’s existing partners McAfree, Norton, TrendMicro, Microsoft, and Sophos, are also now providing antivirus apps for mobile devices.

For PC users, the AV Marketplace offers Trend Micro Titanium Internet Security 2013 (free), avast! Free Edition, Avira (free), a 6-month subscription to McAfee Internet Security, a free trial of Norton AntiVirus, Total Defense Free with Free Cloud-Based Security Assessment, AVG Free 2013, Microsoft Security Essentials, a free 6-month subscription to Webroot SecureAnywhere 2013, a free subscription to Kaspersky PURE Total Security, and a 6-month subscription for Panda Internet Security 2013. Mac users can download Kaspersky Security for Mac, avast! Free Edition, Trend Micro Titanium Internet Security 2013, a free trial of Norton, Avira (free), and Sophos Anti-Virus for Mac Home Edition (free). Android users can grab either McAfee Mobile Security or Norton Mobile Security Lite for Android.

This is the latest move from Facebook on increasing user security. The company recently implemented a series of phishing protection mechanisms, as well as the launch of phish@fb.com, where users can report phishing attempts. In July, the company also launched malware checkpoints, and is using a URL blacklist system, which scans links and compares them with their partners’ databases to verify that they aren’t malicious.

According to Facebook’s announcement, “Effective security must be a cooperative effort; by adding these new partners to the Facebook Security family we are sure we can keep our community even better protected from threats both on Facebook and elsewhere on the web.” The company plans to announce new tools in the future. The products from these seven new partners, plus the new mobile apps, are available for download now.

[via Facebook]


Facebook expands AV Marketplace with 7 new partners is written by Brittany Hillen & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.


Kaspersky Labs preps its own OS to guard vital industry against cyberwarfare

Kaspersky Labs preps its own OS to guard industry against cyberwarfare

Kaspersky Labs’ namesake Eugene Kaspersky is worried that widely distributed and potentially state-sponsored malware like Flame and Stuxnet pose dire threats to often lightly protected infrastructure like communication and power plants — whatever your nationality, it’s clearly bad for the civilian population of a given country to suffer even collateral damage from cyberattacks. To minimize future chaos and literally keep the trains running, Kaspersky and his company are expanding their ambitions beyond mere antivirus software to build their own, extra-secure operating system just for large-scale industry. The platform depends on a custom, minimalist core that refuses to run any software that isn’t baked in and has no code outside of its main purposes: there’ll be no water supply shutdowns after the night watch plays Solitaire from an infected drive. Any information shared from one of these systems should be completely trustworthy, Kaspersky says. He doesn’t have details as to when the OS will reach behind-the-scenes hardware, but he stresses that this is definitely not an open-source project: some parts of the OS will always remain confidential to keep ne’er-do-well terrorists (and governments) from undermining the technology we often take for granted.

Filed under:

Kaspersky Labs preps its own OS to guard vital industry against cyberwarfare originally appeared on Engadget on Tue, 16 Oct 2012 13:28:00 EDT. Please see our terms for use of feeds.

Permalink The Next Web  |  sourceEugene Kaspersky, Securelist  | Email this | Comments

IC3 warns Android users about malicious malware

Friday, the Internet Crime Complaint Center, more commonly known as IC3, released a warning concerning mobile malware. This warning comes in response to the growing number of malware that targets Android, potentially leaving users’ data and devices vulnerable. Following the warning is a series of safety tips aimed at helping consumers keep their mobile devices malware-free.

The report states, “The IC3 has been made aware of various malware attacking Android operating systems for mobile devices. Some of the latest known versions of this type of malware are Loozfon and FinFisher.” The report goes on to describe two pieces of malware. Loozfon steals information, while FinFisher is spyware that, once installed, can be used to monitor and take remote control of the mobile device it infects.

Back in August, Kaspersky Labs reported that malware targeting Android increased threefold in Q2 of 2012, with 14,900 new malicious programs added to its database. According to the report, nearly half of the items added to its database were “multi-functional trojans” that mined contact info from infected phones, such as names and phone numbers. Backdoor trojans accounted for 18% of the threats detected.

What can you do to help safeguard your Android device from malware? IC3 recommends turning off features on the phone that aren’t needed to “minimize the attack surface of the device,” using encryption, reviewing app publishers and reviews before downloading, and understanding the permissions you give an app, among a few others. The report recommends using a passcode as a first layer of security, and changing the settings so that the passcode is enabled after the phone is idle for a few minutes. While all the tips are fairly straight-forward, it’s good to keep them in mind.

[via CNET]


IC3 warns Android users about malicious malware is written by Brittany Hillen & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.


Surgical Attack Tool miniFlame Joins the Big Happy Cyberweapon Family [Security]

We already know about the state-sponsored malware triplets Flame, Gauss, and Stuxnet, but now a new one is rearing its little head. Dubbed as “miniFlame” by Kapersky Labs, it’s a lot less cute and more dangerous than it sounds. More »

SOPA’s Back From the Dead and This Time It’s a Virus [Sopa]

If you thought SOPA was dead, well, you’d be mostly right. Its bloated corpse, however, has been resurrected by hacker puppeteers for the valiant purpose of scamming people out of their cash. More »

Google Play Store gets good cop / bad cop APK update, will add wish lists and malware scanner

DNP Google Plays good cop  bad cop in new APK update with malware scanner, wish list

A recent scan by Android Police through the latest Google 3.9.16 APK for its Play Store has revealed that wish lists are coming along very well, thank you, and that Mountain View will likely introduce a malware scanner soon too. The latter hasn’t appeared on our radar before, and it looks like the search giant will soon be able to scope all the apps you’ve already installed and also bar the door to any suspicious-looking software before it can sully your smartphone or slate, unless you specifically request otherwise. So, perhaps you’ll feel a bit safer once the Google Play portal is being watched from both sides.

Filed under: , , ,

Google Play Store gets good cop / bad cop APK update, will add wish lists and malware scanner originally appeared on Engadget on Fri, 12 Oct 2012 11:18:00 EDT. Please see our terms for use of feeds.

Permalink Android Police  |  sourceGoogle Play  | Email this | Comments

New Rogue PC Software Is Mascarading as Antivirus to Scam You [Malware]

There’s some new malware preying on your PC, and you might not even realize is malware at all. More »

German Police monitor Gmail, Skype, and Facebook via snooping malware

malwarealertEfficient Germany might have run into a hiccup – especially after the government allegedly let it be known (by accident, of course), that the police in Germany did state that they perform monitoring duties on Skype, Google Mail, MSN Hotmail, Yahoo Mail and Facebook chat should the need arise. This raises a whole lot of ethical and privacy questions. Just how do the German police get around snooping on what their targets communicate over the mentioned email services as well as VoIP programs? Well, snooping malware is the answer of the day.

I guess when it comes to the collective safety of the whole nation being at stake, some actions are justified by select parties, although not everyone is going to agree to it. If you do not want to be snooped on, use a more traditional method of communicating then, what say you? This is also a good reminder that we can always do our part to encrypt communication channels whenever possible, and avoiding those that cannot be encrypted. You should not get hauled up to the local station by posting more cat videos though.

By Ubergizmo. Related articles: German authorities relies on spyware for surveillance, FTC shuts down telemarketing scammers posing as tech support ,