SCADA Systems Vulnerable Due to Hard Coded Passwords

We have discussed the dangers to what NIST identifies as Critical Infrastructure that exists because SCADA and other industrial control systems are designed to be run on “air-gapped” networks that are not connected to the public Internet.  Unfortunately, many of these systems are being connected to the Internet, if only in a tangential way.

The German security firm OpenSource Security recently found hard coded ...

Continue Reading →
0

LastPass Quickly Fixes Reported Flaws

I use LastPass to manage all my passwords, and recommend LastPass to my clients and followers.  Often, when I am talking about storing passwords in the cloud, as LastPass does, I get concerned questions about the safety of storing your digital “keys” online.  What happens if LastPass is breached?

Well, the bad news is that they were breached around June 15, 2015.  I remember getting the email alert from them at the time, ...

Continue Reading →
0

New Exploit Uses Office Documents

A new exploit is using Microsoft Office documents to deliver malware.  This is different from the reanimated macro exploits.  If this exploit, the target will receive an Office document, such as a Word file, as an email attachment.  Opening the attachment causes a malicious HTML application to be downloaded from the attackers C2 server.  This is executed as an .hta file, disguised as an RTF file.  The result is the attacker ...

Continue Reading →
0

Google reCAPTCHA Fooled By Bot

CAPTCHA, or Completely Automated Procedures for Telling Computers and Humans Apart, was a system first theorized by cryptographer Alan Turing in 1950.  We find these little “I am not a robot” challenges popping up all over the place, especially when creating a new account, registering for a web service the first time, or sometimes as form of poor man’s two-factor authentication.  (Something ...

Continue Reading →
0

Security Standards for the Internet of (Insecure) Things?

Everything you can think of and many things you have never dreamed of are being manufactured with little Linux operating systems and wireless Internet connections. Or in simpler terms, a brain, storage, and communications ability. This is the Internet of Things (IoT).  Lots and lots of “smart” devices talking to each other and phoning home to some data collection or dissemination point.  If only the people who are designing these devices, ...

Continue Reading →
0

Have I Been Breached?

Yes, I have.  A “breach” is an computer security incident where a website’s data has been illegally accessed by cyber-attackers and released publicly.

I know that my main email account has been compromised in the past, and used for sending Spam, because my hosting provider disabled my email account and hosting account until I had an opportunity to change my password.

I know that all my websites are under continuous automated password guessing attack, although ...

Continue Reading →
0

Who Needs Skynet? Robots Are Easily Hacked By Humans

We can’t talk about robots without thinking about robots running amok as in the Terminator movies.  But it turns out that most of the robots that are available today can be easily hacked by humans.

Robots are showing up in industrial settings, in hospitals, on our roads as autonomous vehicles, in secure facilities as guards, and in our homes, as carpet cleaners, children’s companions.  Soon they will be everywhere, assisting, working, moving ...

Continue Reading →
0

Scam Claims Your Tax Preparer Was Breached

We heard about a new twist all the Income Tax refund scam that is popular with cyber-criminals this time of year.  A March 27th email from the Minnesota Society of CPAs, warns about a scam that is appearing on the east coast, but could spread anywhere in the US.

“…the email scam claims a tax preparer has been victimized [or breached] and asks users to open a PDF ...

Continue Reading →
0

Interesting DDoS Ransom Threat Arrives By Postal Mail

When you work in a cybersecurity organization that serves other business entities, every now and again you see something really unique.  This one crossed my desk on March 28th.  A client of ours received a letter by postal mail that threatened to shut them down with a distributed denial of service attack.  They are probably trying to avoid the Computer Fraud and Abuse Act, but extortion by postal mail is a ...

Continue Reading →
0
Page 7 of 15 «...56789...»