Data Security News Headlines 21st December, 2016

  1. MethBot ad fraud operators making $5 million revenue every day

A group of hackers is making between $3 Million to $5 Million per day from United States brands and media companies in the biggest digital ad fraud ever discovered. Online fraud-prevention firm White Ops uncovered this new Ad fraud campaign, dubbed “Methbot,” that automatically generates more than 300 Million fraudulent video ad impressions every day. A group of hacker AFT13, has developed Methbot robo-browser that spoofs all the necessary interactions needed to initiate, carry out and complete the ad transactions. The hackers are allegedly based in Russia, registered more than 6,000 domains and 250,267 distinct URLs impersonating brand and names of high-profile websites like ESPN, Vogue, CBS Sports, Fox News and the Huffington Post, and selling fake video ad slots. Cyber criminals behind Methbot are using servers hosted in Texas and Amsterdam to power more than 570,000 bots with forged IP addresses, mostly belongs to the United State.

Cyber Security Tips: To protect yourself from such a hack avoid to click on ads, links, use updated antivirus in your system and keep your system up to date.

  1. In-Flight entertainment system can be hacked easily!

In-flight entertainment (IFE) refers to the entertainment available to aircraft passengers during a flight. According to security researchers from IOActive, the security vulnerabilities resides in the Panasonic Avionics In-Flight Entertainment (IFE) system used in planes run by 13 major airlines, providing a gateway for hackers which is absolutely terrifying. Vulnerabilities in an in-flight entertainment system used by the leading airlines, including Emirates, United, American Airlines, Virgin, and Qatar, could let hackers hijack several flight systems and even take control of the plane. This vulnerability could be exploited by hackers that could allow them to spoof flight information like map routes, speed statistics, and altitude values, and steal credit card information. Attacker could access credit card details of passengers stored in the automatic payment system and use their frequent flyer membership details to capture personal data. The vulnerabilities affect 13 different airlines that use Panasonic Avionics system, which include American Airlines, United, Virgin, Emirates, Etihad, Qatar, FinnAir, KLM, Iberia, Scandinavian, Air France, Singapore, and Aerolineas Argentinas.

Cyber Security Tips: Emirates is working with Panasonic to resolve these issues and regularly update its systems said report, users need to keep watch on their account, change your passwords.

  1. Nigerian man behind hacking of Los Angeles county emails

Kelvin Onaghinor, 37, A Nigerian national has been charged with the hacking of Los Angeles County emails which have exposed the personal data of more than 750,000 people. The person got unauthorized computer access and able to identity theft. The hack happened in May when a phishing email deceived 108 county employees into providing usernames and passwords said report. According to county officials, the several department’s effects by the hack include: Assessor, Chief Executive Office, Children and Family Services, Child Support Services, Health Services, Human Resources, Internal Services, Mental Health, Probation, Public Health, Public Library, Public Social Services and Public Works. According to report compromised data include first and last names, dates of birth, Social Security numbers, driver’s license or state identification numbers, payment card information, bank account information, home addresses, phone numbers, and/or medical information, such as Medical or insurance carrier identification numbers, diagnosis, treatment history or medical record numbers.

Cyber Security Tips: To protect your personal computer as well as official systems from such attack keep your system secure with updated antivirus, protect your emails with strong password, two-way authentication.

  1. Pakistani hackers deface Google Bangladesh domain

A group of Pakistani hackers Team Pak Cyber Attackers hacked and defaced the official Google Bangladesh domain Tuesday morning. The group left a deface page along with a message on the targeted domain taunting security measures implemented by Google and displays “Pakistan Zindabad” slogan. It is unclear whether the defacement of Google Bangladesh domain. Investigation is going on. The reason and scenario is not cleared yet said report.

Cyber Security Tips: Google Bangladesh team need to check the issue present and need to fix it.

  1. Cybereason Launches Free Ransomware Alert Tool

Boston-based cybersecurity company Cybereason has released a real-time ransomware detection and response program called RansomFree. RansomFree uses “behavioral and proprietary deception techniques” to detect ransomware strains in action. Users receive a pop-up notification when ransomware has been found on their computer and is trying to encrypt files. The user can then decide to take action. According to Uri, the software can detect 99 percent of all ransomware. RansomFree is a free standalone product and is compatible with PCs running Windows 7, 8 and 10, as well as Windows Server 2010 R2 and 2008 R2. Besides using an anti-ransomware tool, you are also recommended to regularly backup your files, keep your OS and software programs up-to-date, disable Java and Flash when possible, do not download apps from unknown, untrusted websites, and be extra conscious when opening links and downloading attachments in an email.

How to download tool: Visit https://ransomfree.cybereason.com/download/  then download the tool and install it.

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

Blog at WordPress.com.

Up ↑

%d bloggers like this: