Data Security News Headlines 1st April 2017

  1. Aadhaar can be hacked, data leaked, government finally admits

Delhi: In the recent past, there have been several cases of UID data being compromised with. While the government has constantly denied any possibility of a compromise. The New Indian Express published on Friday a report on how the NDA government has acknowledged that personal identity of individuals, including Aadhaar number and other sensitive information, has been leaked to the public domain.  Leaked data included personal identity or information of residents, including Aadhaar number and demographic information and other sensitive personal data such as bank account details.

Cyber Security Tips:  To protect from such data leak always keep your data servers secure with security devices such as Firewall, Intrusion Detection and prevention Systems and keep monitoring your sensitive data servers.

  1. Man falls prey to cyber fraud, loses Rs 50,000

GURGAON: Illegally transferring money from victims account is not a new for us. The latest victim is Nirmal of Maruti Kunj.  Nirmal of Maruti Kunj got a call from an unknown person posing as a bank executive. He sought Nirmal’s ATM card details and transferred Rs 50,000 from his account to three of his e-wallets. The cyber cell, a FIR was registered against the accused under Section 66-D of IT Act and Section 420 (cheating) of IPC in Bhondsi police station on Thursday, two months after the crime and investigating the fraud.

Cyber Security Tips:  To protect yourself from such fraud never share your banking details such as credit card details, One-time password, ATM pin ad other banking details.

  1. McDonald’s Canada Says Job Applicant Information Was Hacked

McDonald’s is an American hamburger and fast food restaurant chain. According to McDonald Canada, personal information of about 95,000 restaurant job applicants was compromised in a cyber-attack on its careers website. The information included names, addresses, email addresses, phone numbers and employment backgrounds of candidates who applied online for jobs at McDonald’s Canada restaurants between March 2014 and March 2017. The careers website was shut down after McDonald’s learned of the attack, and will remain closed until an ongoing investigation is complete, the unit said. There is no evidence found by an investigator. The Company said there is no sensitive data such as social insurance numbers, banking or health information been compromised.

Cyber Security Tips:  To prevent from such hacking keep your website secure, do Vulnerability Assessment and penetration Testing (VAPT) to find weaknesses in your web application, keep your database secure, check for file extension for uploading resume to website, to get excellent VAPT service visit; http://www.anacyber.com/

  1. Telegram Messenger Adds Encrypted Voice Calls

Mobile messaging app Telegram introduced voice calls today, bringing the communications platform’s secure feature list up to date and more in line with rival chat apps WhatsApp, Viber, Messenger, and Signal. The Telegram said on voice call feature voice calls are based on the same end-to-end encryption methods as its Secret chats feature.  End to end encryption provide secure communication. According to Telegram; whenever possible, calls go over a peer-to-peer connection, “using the best audio codecs to save traffic while providing crystal-clear quality. One of the features of the voice call is emoji-based secure key exchange to authenticate users and make sure their calls are even more secure. Telegram version 3.18 which includes new features, such as Voice Calling, is free to download for iPhone on the App Store and Android phone on the Google Play Store.

  1. Samsung Galaxy S8’s Facial Unlocking Feature Can Be Fooled With A Photo

Samsung launched new smartphone S8 in 2017 with some advanced feature including locking with the face. All users need to do is simply hold their Galaxy S8 or S8 Plus in front of their eyes or their entire face, as if they were taking a selfie, in order to unlock their phone. Biometric technology – that involve person’s unique identification (ID), such as Retinal, IRIS, Fingerprint or DNA is now being integrated into more consumer devices for improved security. But hackers are now smart they are targeting Biometric security systems, which prove that fingerprint scanner and IRIS scanner are less secure than a passcode and can be fooled by anyone, perhaps, using a photograph of the user. But according to the report, Galaxy S8 Facial recognition can be bypassed With a Photo. But it is unclear yet what type of photo can be used to bypass this feature.

Cyber Security Tips: Users are recommended to use passcode methods to unlock your smartphone instead of the facial unlocking feature.

  1. Data-Stealing Malware ‘Dimnie’ Targeting Developers on Github

GitHub is a web-based Git or version control repository and Internet hosting service. It offers all of the distributed version control and source code management (SCM) functionality of Git as well as adding its own features. According to new research series of malware attacks has occurred, and this time, the targets are the owners of Github repositories. Developers who own these repositories were a target of phishing emails that contained a malware capable of stealing data through keyloggers and modules that take screenshots. Attacker targeted developer by phishing methods, developers at GitHub received supposed job offer emails attached with malicious .doc files containing embedded macro. The macro executed a PowerShell command that would grab the malware from command and control center and execute itself.

Cyber security Tips:  Github developers are strictly recommended that avoid to open such spam mails, check if any keylogger is installed on your system immediately uninstalled it and be aware of phishing attack.

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

Create a free website or blog at WordPress.com.

Up ↑

%d bloggers like this: