Phone : +91 95 8290 7788 | Email : sales@itmonteur.net

Register & Request Quote | Submit Support Ticket

Home » Cyber Security News » Cyber Security News 1st Week August 2016

Cyber Security News 1st Week August 2016

  1. Telegram Hacked: Reuters and several media outlets are reporting that the phone numbers of 15 Million Telegram users in Iran have been compromised by Iranian hackers exploiting a SMS text message flaw. The attack targeted Telegram’s one-time SMS activation and not its end-to-end encryption. Telegram sends an SMS with a verification code to users who want to log in to the app from a new device. The SMS can be intercepted by phone companies and sold to hackers who can then access the user’s contact list and archived messages. ‘SMS Interception’ is not a Telegram’s vulnerability. Such attack can be used against any messaging app, like Whatsapp and Viber, whose registration is based upon SMS-based verification mechanism. No wonder that many experts are predicting possible end of SMS-based 2-Factor Authentication.
  1. Bitcoin exchange ‘Bitfinex’ hacked: Hong Kong-based Bitcoin exchange ‘Bitfinex’ has posted a note on their website announcing the shutdown of its operation after discovering a security breach that allowed an attacker to steal bitcoins worth $72 Million. The cause of the security breach and the hacker behind the incident is still unclear. After the news of the hack had broken on August 2, the price of Bitcoin dropped almost 20%. Maybe, it is safer to store cryptocurrency in an offline wallet; instead on any website or cryptocurrency exchange.
  1. Hacker Selling 200 Million Yahoo Accounts On Dark Web: A hacker who calls himself Peace, who was responsible for selling data dumps for LinkedIn, MySpace, Tumblr and VK.com is now selling what is said to be the login information of 200 Million Yahoo! users on the Dark Web. The leaked database includes usernames, MD5-hashed passwords and date of births. In some cases, there is also the backup email addresses used for the account, country of origin, as well as the ZIP codes for US users. This can increase the ‘Password reuse attacks’, it is high time users change their online passwords and have different passwords for different accounts.
  1. Pokémon GO creator’s Twitter account hacked: After hacking the Twitter account of Google’s CEO, Facebook’s CEO, Twitter’s CEO, Twitter’s ex-CEO, Oculus CEO, Ourmine last week hacked Pokemon GO creator’s Twitter account. Over 1 billion passwords are now available on the net after the high volume dumps from Yahoo, LinkedIn, MySpace, Tumblr and VK.com. Ourmine is believed to be reusing these passwords to hack well known people.
  1. Torrentz.eu shuts down forever! End of biggest Torrent search engine: Over two weeks after the shutdown of Kickass Torrents and arrest of its admin in Poland, the world’s biggest BitTorrent meta-search engine Torrentz.eu has apparently shut down its operation. The surprise shutdown of Torrentz marks the end of an era. Torrentz.eu was a free, fast and powerful meta-search engine that hosted no torrents of its own, but combined results from dozens of other torrent search engine sites including The Pirate Bay, Kickass Torrents and ExtraTorrent.
  1. Hack Apple & get paid up to $200k bug bounty Reward: Last week, Apple announced at the Black Hat security conference that the company would be launching a bug bounty program to pay outside security researchers and white hat hackers privately disclose security flaws in the company’s products. This decision comes in the wake of the recent Apple v/s FBI court case. Apple joins a long list of companies offering bug bounty programs, the list includes  – Fiat, MIT, Uber, General Motors, Pentagon. PornHub and Twitter paid bug bounty recently.
  1. Your battery status is being used to track you online: In HTML5, a feature called Battery Status API, was introduced. The API is intended to allow site owners to see the percentage of battery life left on a laptop, tablet, or smartphone in an effort to deliver an energy-efficient version of their sites. Some companies (like a famous taxi hailing app), analyze and monetize this access by charging differently for different levels of battery life. A person with low battery is likely to accept a higher price for a ride than a person with full battery life.
  1. Flaws hit HTTP/2 Protocol that could allow Hackers to disrupt servers: HTTP/2.0 which is used by nearly 10% of the websites, is a major revision of the HTTP network protocol. It was originally developed by Google. It has been around for four months now and last week in the Black Hat conference, researchers revealed four flaws in the HTTP/2 protocol. These vulnerabilities allow attackers to slow down the web servers. All the four vulnerabilities have already been fixed.
  1. This ATM hack allows crooks to steal money from chip based cards: A team of security engineers at Black Hat USA 2016 conference in Las Vegas demonstrated how a small and simple modification to ATM would be enough for attackers to bypass the Chip-and-PIN protections and enable unauthorized transactions. A device called Shimmer is added to the ATM, which can read data from the card as the ATM reads and transmit the data to the hacker’s smartphone enabling replication of the cards. We believed the chip based EMV cards are secure but that now stands shattered.

 

  1. Ransomware attack on Delhi based Diagnostic Centre: A Diagnostic Centre in the national Capital of India was recently targeted by unknown hackers, who gained illegal access to the Diagnostic Centre and encrypted its data. A Ransom of $1300 was demanded. The cyber cell of CBI has registered a case. Most of the times- Ransomware gains entry when users open links in spam or phishing emails. Training users, regular backup and good web security solution will help against such attacks. According to a leading cyber security firm – Nearly 40% of enterprises were hit by Ransomware last year.

Information Security - InfoSec - Cyber Security - Firewall Providers Company in India

 

 

 

 

 

 

 

 

 

 

 

 

What is Firewall? A Firewall is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies. At its most basic, a firewall is essentially the barrier that sits between a private internal network and the public Internet.

 

Secure your network at the gateway against threats such as intrusions, Viruses, Spyware, Worms, Trojans, Adware, Keyloggers, Malicious Mobile Code (MMC), and other dangerous applications for total protection in a convenient, affordable subscription-based service. Modern threats like web-based malware attacks, targeted attacks, application-layer attacks, and more have had a significantly negative effect on the threat landscape. In fact, more than 80% of all new malware and intrusion attempts are exploiting weaknesses in applications, as opposed to weaknesses in networking components and services. Stateful firewalls with simple packet filtering capabilities were efficient blocking unwanted applications as most applications met the port-protocol expectations. Administrators could promptly prevent an unsafe application from being accessed by users by blocking the associated ports and protocols.

 

Firewall Firm is an IT Monteur Firewall Company provides Managed Firewall Support, Firewall providers , Firewall Security Service Provider, Network Security Services, Firewall Solutions India , New Delhi - India's capital territory , Mumbai - Bombay , Kolkata - Calcutta , Chennai - Madras , Bangaluru - Bangalore , Bhubaneswar, Ahmedabad, Hyderabad, Pune, Surat, Jaipur, Firewall Service Providers in India

Sales Number : +91 95 8290 7788 | Support Number : +91 94 8585 7788
Sales Email : sales@itmonteur.net | Support Email : support@itmonteur.net

Register & Request Quote | Submit Support Ticket