Monthly Archives: December 2014

LizardSquad?

LizardSquad sounds like a name from a video game. Unfortunately they are a hacking group that attacked Sony’s PlayStation and Microsoft’s Xbox networks over Christmas. They were indeed successful at taking both networks down on Christmas day.

So who are these guys?

Of course we don’t really know because anonymity is their best defense. Two people that claim to be the LizardSquad did an interview with BBC. You can read about the interview over at Krebs. But what we do know is that the attack was not a very sophisticated one. It was a simple DDoS attack, the surprising thing is that the PlayStation network in the Xbox network was so vulnerable to a common or basic type of attack. It appears the group was really looking for fame and perhaps some money – which they got in the form of $300,000 worth of vouchers from Megaupload.

It seems unlikely we will hear from this group again as one person has been arrested in Finland and there are reports that a second person is being sought at this time.

Hopefully they did not interrupt your Christmas plans – although we have a PlayStation and an Xbox here they are rarely used so they did not interfere with my Christmas.

Happy new year!

– Dave

Are Finger Prints Secure?

According to welivesecurity.com

…Jan Krissler, claims to have ‘copied’ the thumbprint of Germany’s Defense Minister from standard photos, in machine-readable form.

Does this mean that fingerprints are not a secure biometric method?

We can expect that as more devices rely on fingerprints to secure them, the evil hackers will be working on ways to overcome fingerprint readers. 2 Factor authentication is the best method for keeping your information safe.

You can read my blog on 2 factor authentication here, or watch a video of how to use with gmail here:

-Dave

Anonymous Leaked A Massive List Of Passwords And Credit Card Numbers

If you have an Amazon, Xbox Live, or Playstation network account, you will want to at the very least change your passwords and monitor the credit card linked to the account.
-Dave

Merry Christmas!

Wishing everyone a Merry Christmas and Happy New Year!

iStock_000030791044Large

-Dave

Volvo, Ericsson and POC show off crash-avoidance cycling helmet

Volvo always trying to keep us all safe…with a bike helmet avoidance system.

Gigaom

A trio of Swedish firms — car manufacturer Volvo, helmet maker POC and networking outfit Ericsson — have announced a collaboration around the avoidance of collisions between cars and cyclists.

At the Consumer Electronics Show next month, the companies will show off a system that determines when the helmet-wearing cyclist and a Volvo driver are likely to crash into one another. The driver will get a warning through the car’s heads-up display, and the cyclist will be alerted through a flashing light in the helmet.

Volvo POC cycle helmetThe POC helmet will need to connect to Volvo’s cloud through a location-tracking app such as Strava, while the car will need to be one of the newer Volvos that already use radar and cameras to detect cyclists and automatically brake when a collision is imminent.

It’s a nice idea, and one that should draw attention to Volvo’s noble ambition that “nobody should die or…

View original post 75 more words

It’s Official Sony was Hacked by North Korea

The FBI released a statement today concluding that North Korea was involved with the hack of Sony Pictures. From FBI Statement:

  • Technical analysis of the data deletion malware used in this attack revealed links to other malware that the FBI knows North Korean actors previously developed. For example, there were similarities in specific lines of code, encryption algorithms, data deletion methods, and compromised networks.

  • The FBI also observed significant overlap between the infrastructure used in this attack and other malicious cyber activity the U.S. government has previously linked directly to North Korea. For example, the FBI discovered that several Internet protocol (IP) addresses associated with known North Korean infrastructure communicated with IP addresses that were hardcoded into the data deletion malware used in this attack.

  • Separately, the tools used in the SPE attack have similarities to a cyber attack in March of last year against South Korean banks and media outlets, which was carried out by North Korea.

The full text of the FBI statement can be read here.

-Dave

Fed Releases Payment Fraud Summary

The Federal Reserve bank of Minneapolis released its 2014 payment fraud summary survey of banks. Why is this interesting? From the executive summary:

Payments fraud remains a significant concern for financial institutions and other corporations in the ninth district and surrounding region. While financial institutions are much more likely to report payment fraud attempts (75% experienced attempted fraud) and losses (70%) than non-financial companies, the proportion of financial institutions reporting fraud attempts and losses has actually decreased since 2012, when most respondents reported fraud attempts (94%) and losses (90%).

While attempted payment fraud has decreased over the past two years from 94% to 75% is still at a very high level. The financial institutions have been implementing stronger fraud prevention techniques which are beginning to have some success. Beginning in October 2015, merchants that haven’t installed a card swipe terminal that accepts chip cards will be liable for all the fraud involved with a chipped card. This policy is making the merchants accept some of the burden of fraudulent charges. Currently the financial institutions bear the majority of the direct cost of fraudulent charges.

In 2015 if you have the option to change your credit or debit card to a chipped card I would recommend that you do so. This will better protect you and your financial institution from having your information “stolen.”

I have been wondering why the financial institutions don’t change their credit and debit cards from an “always on” model to a model where your credit card is “always off.” In other words when I go to purchase something at the store when I am ready to complete the purchase I tap an app on my phone and turn on the card for a single purchase and it automatically turns the card off after the transaction is complete. This model would certainly cut down on the amount of fraud that is generated, and it appears that we have all the technology we need to accomplish it.

The full text of the Federal Reserve fraud summary can be read here:

2014PaymentsFraudSurveySummaryofRegionalResults

-Dave

Another Holiday Season Breech

We may need to change the name from the Holiday Season to the Hacker Season. How does “Happy Hackers” sound.

It doesn’t sound good to me either.

Krebs is reporting that Bebe Stores inc. is the latest victim of a data breech as reported by Krebs:

Data gathered from several financial institutions and at least one underground cybercrime shop suggest that thieves have stolen credit and debit card data from Bebe Stores Inc., a nationwide chain of some 200 women’s clothing stores.

The full article can be read here.

-Dave

Let the Holiday Season Begin with Some Phishing…

Looks like we can add Target and Walmart to the list of companies that the phishing scheme is impersonating. You can find more details on the scheme over at Krebs on Security.
-Dave

The Right SOCS

We couldn’t get through the first holiday weekend with some cyber crime. welivesecurity.com is reporting that 2 phishing emails are making the rounds from their article:

Two phishing emails have shown up in my inbox in the last two days, masquerading as orders from popular American retailers: The Home Depot (a home-improvement store chain) and Costco (a warehouse club). Both serve as timely reminders that, as Americans recover from their Thanksgiving celebrations and the online search for holiday bargains begins, criminals are also active online, seeking to exploit the seasonal surge in shopping activity, from Black Friday to Cyber Monday, and beyond. Hopefully, it goes without saying that you should delete messages like this right away (if you really are expecting notification about an order from a retailer, confirm it with a phone call, or by typing the company URL into your browser and navigating to the order tracking page).

View original post 18 more words

New cord cutting data spells trouble for traditional TV

It is getting easier and easier to find the content online with the need for a cable or Satellite box. I have a streaming device connected to every TV in the house.
-Dave

Gigaom

Yup, it’s happening: TV viewers are abandoning traditional broadcast and cable networks for online streaming services, and new devices in their living rooms are making it easier for them to cut the cord. That’s the gist of two new studies from Nielsen and GfK.

Nielsen is reporting that traditional TV viewing dropped four percent last quarter, according to the Wall Street Journal. The average American watched 141 hours of TV per month during that time period, compared to 147 hours during the same time last year. Viewing of streaming services, on the other hand, rose to 11 hours per month, up from seven hours per month a year ago.

If that still seems like a steep imbalance, then it’s worth keeping in mind that Nielsen has effectively been undercounting [company]Netflix[/company] usage for years by only looking at PC-based streaming. The company is just now beginning to measure Netflix streaming…

View original post 111 more words