Search This Blog

Powered by Blogger.

Blog Archive

Labels

Footer About

Footer About

Labels

Netgear Working To Fix Security For Its Routers

(pc-Google Images)
Netgear has released firmware updates for several of its routers to address a critical command injection vulnerability that can be exploited to remotely hijack affected devices.

This after several Netgear routers were exposed to a critical security vulnerability, potentially allowing hackers to take control of those devices. The flaw enables code injection tactics by hackers with which they can gain root privileges into Netgear routers.

Initially, only Netgear R7000, R6400 and R8000 routers were believed to be affected, but the vendor’s analysis revealed that other models are impacted as well, including R6250, R6700, R7100LG, R7300DST and R7900.

Considering this, Netgear has released beta firmware for each of the affected devices mitigating the immediate security issue while it works on finalizing the production firmware. However, the company has notified that the beta firmware is offered as a temporary solution and it may not work for all devices as it has not been fully tested.

In a statement, Netgear said that, “We appreciate and value having security concerns brought to our attention. Netgear constantly monitors for both known and unknown threats. Being pro-active rather than re-active to emerging security issues is fundamental for product support at Netgear.”

IT Ministry Vows To Strengthen Cyber Security In India

(pc-Google Images)
In the wake of hacking of twitter accounts of many high-profile personalities e.g. Congress Vice-President Rahul Gandhi, liquor baron Vijay Mallya and some journalists; the ministry of electronics and IT has asked the social media portal to ‘strengthen security’.

Union minister of electronics and IT, Ravi Shankar Prasad said that he has ordered a review of the “entire IT infrastructure” of India and the need of the hour is “hardening” of the security wall.

“We have told Twitter so. If there are any incidents of cyberattacks, they should immediately inform CERT,” said Union minister Ravi Shankar Prasad. The Computer Emergency Response Team-India (CERT-In) is the nodal agency under the ministry that handles and counters cyberattacks. Twitter was unavailable for a comment. Sources said police and CERT sleuths were considering the matter and asked for the details of hacked accounts.

Prasad said that the ministry has started a review of the IT Act to strengthen it as the Act was formed in 2000, almost 16 year ago – and may have to be updated to deal with the move towards digital payments and mobile banking.

“The Act came into being in 2000. It has, by and large, served us well. Now, as we move towards a digital economy, we are reviewing if there is a need to relook at its architecture, to make it more deterrent for cyber criminals,” Prasad said.

The government has formed two teams in CERT-In, one to respond to cyber-attacks and the other to monitor digital payments.

“All digital payments agencies have been asked to report to CERT-In any unusual activity on their platforms. We are taking several measures to ensure a resilient system. We will audit the IT infra of NPCI (National Payments Corporation of India) and have formed crack teams at CERT-In for immediate response. CITOs (chief IT officers) have been appointed in every ministry and government department. We are undertaking a massive programme to create awareness among the administrative machinery,” the minister said.

Galaxy Note 7: Virgin flight delayed

A Virgin flight in America was halted in mid-air after a passenger pranked by changing the name of their wi-fi device to 'Samsung Galaxy Note 7'.

The US Department of Transportation has banned the  Samsung Galaxy Note 7 phones from planes by the US Department of Transportation after there was news that several of the devices caught fire.

Lucas Wojciechowski, a passenger on Virgin America flight 358 from San Francisco to Boston,  told BBC News that he took the screenshot of the hotspot after his laptop detected a wi-fi named   'Samsung Galaxy Note 7'.

Immediately there was a call for the passenger with a Note 7.

Mr. Wojciechowski twitted the the pilot's  warning after no one claimed to own a Samsung Galaxy Note 7.

"This isn't a joke. We're going to turn on the lights (it's 11 pm) and search everyone's bag until we find it.

"This is the captain speaking. Apparently, the plane is going to have to get diverted and searched if nobody fesses up soon."

After all this drama in the mid-air, the owner came forward and  confessed that  had changed the name of their SSID wireless device to 'Samsung Galaxy Note 7_1097.'

To ease the tension in the flight, the flight crew announced: "Ladies and gentlemen, we found the device. Luckily only the name of the device was changed to 'Galaxy Note 7'. It was not a GN7."

While, Serenity Caldwell, managing editor of Apple products news and reviews, was there on the ground where she has to board the flight. She twitted a series of the tweet:

"When I got to the airport (early) today, I found a huge line of people at the counter to my gate. Turns out, the flight had been canceled.

"It took about two hours for everyone to get their itineraries finally sorted. Finally, they all move on to their new gates and our crew comes.

"They're hanging out while we wait to begin boarding, and one of them lets this slip: "Know why the 9 am flight got canceled?

"The plane was mid-flight when an attendant noticed a wi-fi hotspot. A Galaxy Note 7 wi-fi hotspot. Everyone else makes a horrified face."

Vulnerabilities in McAfee enterprise system gives hacker root access

(pc-google images)
McAfee has issued patches for ten flaws in its enterprise version of VirusScan for Linux that allow attackers to remotely take over a system, after originally being notified of the security holes six months ago.

Security researcher Andrew Fasano from MIT Lincoln Laboratory said that a total of 10 security flaws allows the execution of code remotely as a root user.

“At a first glance, Intel's McAfee VirusScan Enterprise for Linux has all the best characteristics that vulnerability researchers love: it runs as root, it claims to make your machine more secure, it's not particularly popular, and it looks like it hasn't been updated in a long time,” he explained.

Four of the flaws are deemed critical. Attackers can exploit CVE-2016-8020, CVE-2016-8021, CVE-2016-8022, and CVE-2016-8023 to escalate their privileges to root and remotely force the target machine to run malicious script.

The six additional flaws involve a cross-site scripting vulnerability, file test and read bugs, HTTP response splitting, tokens forgery, and authenticated SQL injection.

All these vulnerabilities have already been confirmed in version 1.9.2 to 2.0.2, so all Linux systems are recommended to update to the latest release that McAfee shipped this month.

Vulnerabilities Found in cabin entertainment systems

A security researcher from Security firm IOactive  found security flaws in Panasonic's cabin entertainment systems.  The flaws were found back in March 2015 but were not reported till now.

Passengers who use in-seat USB ports, attackers could hack passengers' credit-card data when they pay to access to wifi or premium movies, spoof the data sent to seat-back screens, switch off lights, change altitude readings, display bogus maps and broadcast messages via the PA.

The vulnerabilities were found by Ruben Santamarta in the Panasonic Aero in-flight systems at security firm IOActive.

The Aero cabin entertainment system are used by many different airlines including Virgin, Emirates, AirFrance, American Airlines and KLM.

However,  Panasonic rebuked all the claims by the  IOActive and said that the findings were "not based on any actual findings or facts".

"The implied potential impacts should be interpreted as theoretical at best, sensationalizing at worst, and absolutely not justified by any hypothetical vulnerability findings discovered by IOActive," said a spokesman for Panasonic Avionics Corporation.

 Panasonic also claimed that they had reviewed "all of the claims made by Mr. Santamarta" all his concerns had been remedied.

Santamarta wrote on his blog, "So how far can an attacker go by chaining and exploiting vulnerabilities in an In-Flight Entertainment system? There’s no generic response to this, but let's try to dissect some potential general case scenarios by introducing some additional context (nonspecific to a particular company or system unless stated).

Relying exclusively on the DO-178B standard that defines Software Considerations in Airborne Systems and Equipment Certification, the IFE would technically lie within the D and E levels. Panasonic Avionics’ IFE, in particular, is certified at Level E. This basically means that even if the entire system fails, the impact would be something between no effect at all and passenger discomfort.

Also, I should mention that an aircraft's data networks are divided into four domains, depending on the kind of data they process: passenger entertainment, passenger-owned devices, airline information services, and finally aircraft control.

Physical control systems should be located in the Aircraft Control domain, which should be physically isolated from the passenger domains; however, this doesn’t always happen. Some aircraft use optical data diodes, while others rely upon electronic gateway modules. This means that as long as there is a physical path that connects both domains, we can’t disregard the potential for attack.

In-flight entertainment systems may be an attack vector. In some scenarios, such an attack would be physically impossible due to the isolation of these systems, while in others an attack remains theoretically feasible due to the physical connectivity. IOActive has successfully compromised other electronic gateway modules in non-airborne vehicles. The ability to cross the “red line” between the passenger entertainment and owned devices domain and the aircraft control domain relies heavily on the specific devices, software, and configuration deployed on the target aircraft."

Nigerian man behind hacking of Los Angeles county emails

A Nigerian national has been charged with the hacking of Los Angeles County emails which have exposed the personal data of more than 750,000 people.

According to the office of the Los Angeles County chief executive, the accused Kelvin Onaghinor, 37, faces nine charges against him which includes unauthorized computer access and identity theft.  However, he has not been arrested, and officials are not even able to trace his current location and now speculating that he left the US.

“My office will work aggressively to bring this criminal hacker and others to Los Angeles County, where they will be prosecuted to the fullest extent of the law,” District Attorney Jackie Lacey vowed in a statement Friday.

It is to be believed that there are more suspects in the hack, and the search for them is going on.  The hack happened in  May when a phishing email deceived 108 county employees into providing usernames and passwords.

A forensic  examination team found that about 756,000 individuals could have been affected by this breach.

According to county officials, the several  department's effects by the hack  include: Assessor, Chief Executive Office, Children and Family Services, Child Support Services, Health Services, Human Resources, Internal Services, Mental Health, Probation, Public Health, Public Library, Public Social Services and Public Works,

There was no evidence of any confidential information had been released because of the breach.

Information  which might have compromised  include first and last names, dates of birth, Social Security numbers, driver’s license or state identification numbers, payment card information, bank account information, home addresses, phone numbers, and/or medical information, such as Medi-Cal or insurance carrier identification numbers, diagnosis, treatment history or medical record numbers.

Cyber attacks to get worse in 2017

(pc-Google Images)
Data breaches in 2016 were not unexpected as cyber security experts had already made predictions for a year full of cyber warfare. There were hacking of presidential candidates and security dangers posed by the Internet of Things, ransomware, complex malware being sold by cybercriminals to less sophisticated cybercriminals, data breaches in the health care industry and the explosion of "spear phishing" as a method of initiating cybercrimes.

Given this state, it’s no wonder that cybercrime is bad – and it’s going to get worse. During 2016 there were several indications of what might be more prevalent in 2017.

1. Savvy attackers will use their ability to hack information systems to cause long-term, reputational damage to individuals or groups through the erosion of trust in the data itself.

2. Growth of the business model in which criminal cyber geniuses use the Dark Web to sell and lease malware — ransomware, botnets and the tech support necessary to effectively perpetrate massive cybercrimes. — to less savvy cybercriminals.

3. Ransomware attacks will increase and evolve to include taking control of companies’ computer-operated systems.

4. Distributed Denial of Service (DDoS) attacks such as we saw in October that temporarily took down Amazon, Twitter, Netflix and others will increase, fueled by botnets of infected computers.

5. IoT devices will serve as a growing entry point for external attackers wanting to gain access to private networks. Potential targets include hospitals, manufacturing companies and any facilities security cameras or climate control systems.

6. Cybersecurity of cars and medical devices in particular will become major issues in 2017.

Two states confirm alleged cyberattacks linked to DHS


Election agencies of two states have confirmed that the suspected cyber attacks were linked to U.S. Department of Homeland Security IP address as last month’s massive attack in Georgia.

The two states reporting the suspected cyberattacks were West Virginia and Kentucky.

West Virginia wrote in a letter, "This IP address did access our election night results on November 7, 2016." Kentucky responded the same IP address “did touch the KY (online voter registration) system on one occasion, 11/1/16.”

The 10 separate cyberattacks on its network over the past 10 months were traced back to DHS address. The most recent one was an attempt to look at the voter registration database.

On Friday (December 16), DHS said that the cyberattack was caused by an employee at the state's Federal Law Enforcement Training Center by copying-and-pasting some information from a state website onto an Excel sheet. Apparently, this person was doing a simple background check on new armed guards and wanted to make sure these people had the correct certification. That meant going to a Georgia state website to review the license numbers. This reportedly prompted a “medium-priority alert.” Excel sent out what’s known as an HTTP option command, a request for server information. DHS officials said Microsoft verified its conclusions.

The training centre regularly accesses that database to verify that potential employees are licensed.

Option commands are not rare; DHS claims its systems send out more than 4,200 every business day.

Last week, Georgia Secretary of State Brian Kemp sent a letter DHS head Jeh Johnson asking why the state’s systems had logged what he called an attempt to breach its network coming from a DHS internet address. Kemp said an attacker had tried to scan his systems.

DHS has yet to explain at least nine other suspected network scans linked to DHS IP addresses over the last year on or around important primary and presidential election dates.

CBI files FIR against Paytm customers for cheating


In a rare case, popular digital wallet, Paytm has filed a complaint against its customers from Delhi for allegedly cheating the company to the tune of Rupees 615, 000 ($ 9, 064.78). India’s national investigation agency, Central Bureau of Investigation (CBI) had filed a first information report (FIR) regarding the case after Paytm’s legal Manager, M Sivakumar, claimed that the company made payments for defective products received by customers and arranged for pickup of the damaged product which was sent to the merchant.

It is rare for CBI to take up such cases unless they have been referred by the central government or directed to do so by the Supreme Court or a high court because it is mostly overburdened with work and short-staffed. However, the CBI can register cases under IT Act in the territory of Delhi even on complaints from and against private individuals. This has been happening since 2000.

The digital wallet company has claimed that nearly 48 of its customers have duped it but the CBI has registered cases only against 15 customers who are residents of Kalkaji, Govindpuri and Saket areas besides unknown officials of One97 Communications - parent company of Paytm. The cases have been registered under various sections of the Indian Penal Code (IPC) and the Information Technology (IT) Act.

It was found that these 48 customers had allegedly received “refunds” for products that had successfully been delivered to them. The process is done by a team of customer care executives who have been assigned specific IDs and passwords to handle such complaints from the customers and arrange refund and pick up.

The CBI confirmed that the complaints were received that customers had “illegally” appropriated money refunded to their bank accounts and wallets between 2015-16. The company alleged that most of these customers had taken deliveries of products at common or similar addresses.

As a matter of fact, wherein delivery of orders was successful and satisfactory to the customer, the refund should not happen.

“Paytm has identified about 48 fraudulent users in the physical goods marketplace business who were trying to game the company’s consumer-friendly practices. Paytm regularly monitors its marketplace business to identify any fraudulent or suspicious behaviour. This is a part of the company’s security practices to ensure that genuine users are able to continuously avail the benefits brought to it by Paytm marketplace. We have robust risk management practices and regularly report users who try to game the company’s fair usage policies,” said Paytm officials.

A CBI official said that the agency has investigated complaints from Paytm and private banks such as ICICI Bank in the past, too.

The $5 billion digital wallet company which got a big boost in transactions after demonetisation of Rs 500 and Rs 1,000 notes announced by Prime Minister Narendra Modi on November 08 claimed that the accused first got details of the internal working of the company and then executed their plans.

Student to face trial for ‘abusing’ on Facebook

Do we have right to write and share anything on social media? Or there should be some kind of censorship? If there should be censorship, then what kind of censorship and who would ensure this?

An engineering college student in Bengaluru has been charged for writing an offensive comment against South Indians on his Facebook account. He moved to the Karnataka High Court to quash the case against him but the HC refuses the plea and said he has to face the trial. The court further added that the case was registered in lower court so it is for the lower court to decide whether his comments constitute an offense or not.

Pritish Kumar Patil, 22,  the accused is an engineering student from Maharashtra. The case if filed against him under  Section 505 of the IPC for “statements conducting to public mischief”. The complaint was filed by Sandeep Parswanath, president of the Samanya Kannadiga, a Kannada organization. The case is pending before the VIII Additional Chief Metropolitan Magistrate.

After a severe backlashing he was forced to retract his statements and apologize for the comments he made earlier this year. However, a police complaint against him has resulted in the case.

While, refusing  to quash the proceedings in the lower court, the HC in its order on December 6, said: “The content of the post which the petitioner (Patil) is said to have placed on his Facebook account, is the subject matter of the complaint by a Trust which is supposedly working for the betterment of the Kannada language. Therefore, the offense alleged could be made out with reference to the statement in the post and is to be tested at the trial. There is no warrant for quashing the proceedings.”

 The Facebook post was against a  BMTC bus conductor for conversing only in Kannada.  Following suggestions by local people, the post was altered to remove the offensive lines.

The fuel to this was added by one of his comments about ‘south Indians’ not learning Hindi and English but asking outsiders to learn their language.

After this, he was trolled and his personal information and address was widely shared online. To calm the situation he even issued an apology letter.

This is not the first time after a Facebook post someone is facing a legal action. In the past, there have been many cases in which accused even faced a jail term.

Obama on Russia hacking US election: 'We Need To Take Action. And We Will'

Recently US intelligence agencies confirmed that Russia hacked the US Presidential election and helped Donald Trump in winning the election. Russia attacked the democracy of the US, everyone wonder will the US retaliate for this when they have pro-Russian President in the elect.

 But Barack Obama has some other plans. In an interview with National Public Radio that will be aired today,  he warned Russia that the US will retaliate for its cyberattacks  during the presidential election.

The US president said he was waiting for a final report he has ordered into a range of Russian hacking attacks, but promised there would be a response.

"I think there is no doubt that when any foreign government tries to impact the integrity of our elections ... we need to take action. And we will — at a time and place of our own choosing. Some of it may be explicit and publicized; some of it may not be."

Last week only, The CIA has judged that the Russians were behind all the cyber attacks, including the hacking of emails from the Democratic National Committee, and their main aim was to influence the election in Donald Trump’s favor. However, the FBI has not concluded anything yet but they also gave hint that it was intended to favor the Republican contender.

Senators from both parties have called for a congressional inquiry, while Trump has rejected the reports.

The president-elect weighed in on Twitter to ask: “If Russia, or some other entity, was hacking, why did the White House wait so long to act? Why did they only complain after Hillary lost?”

Obama said that he won't say anything against Moscow till he gets a final report about the incidence but he said the impact of the intervention was clear. He said, “does not in any way, I think, detract from the basic point that everyone during the election perceived accurately – that in fact what the Russian hack had done was create more problems for the Clinton campaign than it had for the Trump campaign”.

He added: “There’s no doubt that it contributed to an atmosphere in which the only focus for weeks at a time, months at a time were Hillary’s emails, the Clinton Foundation, political gossip surrounding the DNC.”

“Elections can always turn out differently,” he said. “You never know which factors are going to make a difference. But I have no doubt that it had some impact, just based on the coverage.”

President Obama would hold a press conference in Washington on Friday at 2.15pm ET (7.15pm GMT) before leaving for his last annual family vacation in Hawaii as President.