Tuesday , 25 April 2017
Home » Author Archives: Japonica Jackson

Author Archives: Japonica Jackson

Japonica is head of editorial at IT Security Guru. If you'd like to get in touch with Japonica, please email editor@itsecurityguru.org.

China Hacked South Korea Over Missile Defense

Chinese state-backed hackers have recently targeted South Korean entities involved in deploying a U.S. missile-defense system, says an American cybersecurity firm, despite Beijing’s denial of retaliation against Seoul over the issue. In recent weeks, two cyberespionage groups that the firm linked to Beijing’s military and intelligence agencies have launched a variety of attacks against South Korea’s government, military, defense companies ... Read More »

Aadhaar Data Leak: Personal Information of More than 1 Million Jharkhand Pensioners Released Online

In a major gaffe, personal details of around 1.5 million penioners in Jharkhand were made public on a state website of social security. The details also included people’s Aadhaar card and bank account information. The details were put on the website because of a programming error, according to the Hindustan Times. There are nearly 1.6 million pensioners in Jharkhand and around 1.4 ... Read More »

Primary School is ‘Hacked by Extremists’ Who Threaten ‘Persecution’ in Website Rant

Police are investigating after “malicious” messages were left on a school website by Turkish nationalists in an apparent hacking attempt. Parents of students at North Mundham primary in Sussex were left concerned after the school’s website was taken over by a long message written in Turkish. The school website has been changed to a plain white background with a red logo, believed ... Read More »

Has Defence-in-Depth failed us?

Anthony Perridge, Regional Director,
ThreatQuotient

Defence-in-depth is a philosophy that we’re all familiar with, layering security controls throughout and IT systems so that if one fails or, if vulnerability is exploited, another is there to prevent an attack.  Having become standard practice for the vast majority, this sounds like a great approach, right? Well, perhaps wrong. If the slew of headlines about compromises and breaches ... Read More »

Researcher Finds LastPass 2FA Could Become 1FA

LastPass has resolved a number of issues with its two-factor authentication (2FA) implementation, after being alerted to the issues by Salesforce security researcher Martin Vigo. The company said the problems are now resolved, and users do not have to take any action. “To exploit this issue, an attacker would have needed to take several steps to bypass Google Authenticator,” LastPass ... Read More »

Script Kiddies Pwn 1000s of Windows Boxes Using Leaked NSA Hack Tools

The NSA’s Equation Group hacking tools, leaked last Friday by the Shadow Brokers, have now been used to infect thousands of Windows machines worldwide, we’re told. On Thursday, Dan Tentler, founder of security shop Phobos Group, told The Register he’s seen rising numbers of boxes on the public internet showing signs they have DOUBLEPULSAR installed on them. These hijacked machines can be used to sling ... Read More »

Free Hacking Tools ‘Help Young into Cyber-crime’

Free, easy-to-use hacking tools help many young people slip into a life of cyber-crime, according to a report. The National Crime Agency (NCA) has detailed the “pathways” taken by people who become criminals. Many started by getting involved with game-cheat websites or forums that talked about ways to change or “mod” games, its report said. Mentors, role models and positive ... Read More »

Can an IoT device ever be secure?

Ian Marsden, CTO,
Eseye

The cyber threat has never been greater, with high profile DDoS attacks putting the issue high on the agenda for both businesses and governments. Only at the end of last year an attack which was reported to be the largest of its kind, brought down most of the internet across the UK and America. The growth of such incidents stems ... Read More »

Vigilante Hacker Uses Hajime Malware to Wrestle with Mirai Botnets

Hajime, an IoT malware strain discovered last October, appears to be the work of a vigilante who has set out to take over and neutralize as many smart devices as possible before other botnets like Mirai can get ahold of them. While Hajime was first observed last year, it only recently became apparent to researchers that the author of this ... Read More »

eperi sets sights on the UK for rapid growth

eperi, the leading provider of cloud data protection (CDP) solutions, has announced expansion to the UK market to address cloud data protection in the wake of high Microsoft Office 365 adoption and the impending General Data Protection Regulation (GDPR) in Europe.  A recent winner of Microsoft Partner of the Year in the Open Source on Azure category, eperi hopes to ... Read More »