iVirus iTrouble

image

Here comes the new trouble called the KeyRaider. This is the latest virus, which prefers jailbreaked iPhones. What is even more interesting, this threat can be associated with the jailbreak solutions made in China, in the overwhelming majority of all cases. So, how does it work?

Well, as soon as your iPhone starts communicating with an iTunes and Apple Store the hackers jump in. Your iPhone will pay and do what you do not want or do not approve. So, what is the moral of our disturbing KeyRaider story? You should avoid jailbreak options for your smartphone?

Does it also mean that somewhere out of our sight the busy little bees in Apple are laughing at us? They told us, but we failed to listen and comply? No, it would not be fair to say such a thing. You are absolutely free to do whatever you like with your iPhone. You just need to be extremely careful.

Executing a jailbreak operation can be a risky operation, if you are reckless and impatient. Some hacker has obviously done his homework properly. Apple can, but still does not have an obligation to help you in this case. Do not accept a free ride of the notorious KeyRaider. That is the only advice we can give you.

China vs China

image

China has arrested more than 15,000 hackers and cyber criminals. When you have almost 1,5 billion of your own citizens, this really seems like a meaningless drop in the ocean. Or, everything and anything has to be huge and impressive in China, including the number of hackers.

On the other side, there are quite raised eyebrows and suspicious faces that this battalion of arrested hackers is not going to end up in prison. What is that supposed to mean, exactly? Well, China has quite a notorious reputation for its numerous and merciless hacking teams.

It is not an unimaginable thing to witness Nikita scenario for Chinese hackers. It is better to work for the Chinese government or military things you are doing best, than to dream about computers from your cell in some God forsaken province. It is not much of a choice, is it?

So, what is China supposed to do, in order to gain our trust? Even if they arrest 150,000 hackers, we are still going to be suspicious, aren’t we? We sure hope China is doing some serious job in this field. Otherwise, hackers can easily hack the entire China one day. We are not exaggerating.

The Trouble In Firefox Paradise

0802_imela_2

Here is a bad news for all Windows and Linux Mozilla users. There is a security flaw in Firefox JavaScript sector, which leaves an open door for hackers to exploit. What is happening with Mac users? Well, for the time being, their apple Apple is safe from harm.

What can we do about it? According to Mozilla, all what you have to do is to upgrade your Firefox to the latest version available. On the other side, there is no point of crying over the spilled milk in the earlier versions, is it? Is that all cyber-folks?

Apparently, it is. The business is going to be as usual for Mozilla. The users, who are going to experience a couple of privacy related inconveniences here and there, will not have a decent chance to complain. In the matter of days, we are very likely to forget this most recent trouble.

So, what is the moral of this story? Well, it is good to be fully aware about the imperfections of our existing cyber-empire. But, at the same time, you should not worry too much about it. Why? Because, there is not much you can do about it.

Million Miles Away From Hacker’s Home

wpid-wp-1413765967231.jpeg

When there is a will, there has to be a way of improving our extremely compromised cyber security. Even if you do not have or do not want to pay money for cyber security services, you can always compensate. Just ask United Airlines, because they certainly have a lot to tell you all about it.

For what is worth, the busy little bees in the United Airlines have launched a genuine bug bounty program. So, what is so special about it? Well, if you knock them off their feet, your reward is not going to be a financial one. Surprised?

How about a one million miles of free flights reward, for a change? The United Airlines has decided that it is worth of every mile. What for? Well, thanks to the cyber bug bounty hunters, their website is bulletproof, when it comes to potential hacker’s attacks.

That is not all. One of the biggest worries for every airline company is a serious threat of a cyber hijack of a plane. In this worst case scenario, no price is too high to pay for a proper safety measure. Our hats off to this brilliant move. We should follow United Airlines’ example.

The Call of The Dark Cyber Side

wpid-wp-1423350122242.jpeg

The most recent scandal in the IT security community has raised quite a few eyebrows, while making us to examine one more time the unsustainable claim that hacking can sometimes be an ethical thing to do. So, what happened actually, and why it is so important for us?

It turns out that one young and promising IT security consultant had an “intriguing” hobby and a part time job. The “hero” of our story was creating malicious software solutions. In addition, he was selling them online. You can imagine the surprise of his colleagues at work.

To make the situation even more interesting and even funnier, this consultant was working on his own “case”. During his regular working hours, he was solving problems he created the nights before. This modern time Dr. Jekyll and Mr. Hyde did not have a happy ending.

It is hard to say what is the proper moral of this unusual story. It seems that the call of the dark-cyber-side can be quite a strong one. This does not necessarily mean that we should play spy games with our friends and colleagues. However, we should be aware of the true power of the dark cyber side.

Nintendo Malware Innuendo

0703_imela_5

Ah, those merciless hackers, they always strike where it hurts us the most. It comes without saying that the modern hackers are reading their potential victims like a book. This is exactly, what is happening with a series of apps, which allow you to play your favorite games from the 1980s and 1990s.

It is really great to get this wonderful feeling back on your smartphone. However, we have to ask, is not the price for it a little bit too high? What are we talking about? It turns out that an Android app, which allows you to play old Nintendo games on your smartphone, is a notorious El Dorado of malware and viruses.

So, who is to blame? Do not blame it on Google. To tell you the truth, we believe that the busy little bees in Google have no idea what is happening with all those apps, due to the overwhelming abundance of new apps, which are pumping out at an unparalleled speed.

So, what are you supposed to do? Should you say no to all your nostalgic feelings? Here is a hint. You should do some checking first for each app you are about to use. This is the only way to have the right kind of a feeling, you are hopping to achieve. With no regrets, of course.

Who’ll Guard The Guardians?

image

Can you imagine this worst case scenario? Your password manager just got hacked. That is the trouble with a strategy, let me put all of my eggs in one basket. On the other side, what other real options do we have? They say, do not use the same password for all of your various devices.

OK, we got it, but who is going to remember dozen of different passwords. Now, you see what is the big problem here. When it comes to the password managers, we expect from them to be bulletproof in terms of flawless cyber security. When they fail, what are we supposed to do?

Passwords are going to be our most annoying problem for quite some time. We are literally helpless. Every now and then, you hear about the more or less successful innovations in this field. There are some experts, who are suggesting us to use Emoji symbols as a password alternative.

Can you believe it? How about body implants? Can this work for you? Do we really need to trade our privacy for an adequate password? The more we talk about passwords, the more frustrated we eventually become. Should we use the word password for our only password?

Emoji Password

image

OK, we got it. We are not rocket scientists, but we know for sure that a password based on Emoji symbols is actually a picture-based security measure. It makes a perfect sense, doesn’t it? This new type of password is supposed to be a tougher challenge for hackers.

For what is worth, thanks to Emoji, we have more combinations at our disposal to play with. On the other side, we could not help ourselves noticing one obvious practical problem. How we are supposed to remember our new Emoji password? This is going to be a little bit harder, than it seems.

If you want a strong password, then you will have to use quite a few Emoji symbols. Very different ones. Right? Which eventually brings us back to the very beginning of our story about the bullet-proof passwords. Do we have to use a special program to memorize our Emoji passwords for us?

We are pretty much convinced that some reckless users are the perfect match for the category called the helpless-cyber-security-cases. Someone will just put six or eight smileys in a row. And, that will be it. The Emoji version of a password for the password.

When Experts Walks In, Security Walks Out

image

Here is the thing with the cyber security experts. They talk too much. When you ask them to give you a couple of life saving tips, this is what you get as a result. The very first thing you are going to hear is that you should always walk on the safe side of the cyber cliff. What is that supposed to mean?

Use only legitimate software. Avoid suspicious websites. Do not do anything foolish while being online. Seriously? It is just like they are referring to the regular users of the notorious Silk Road. What else do these brainiacs have to share with us that can improve our security?

We are supposed to forget about all those ridiculous passwords, which include among other hard to believe “crown jewels” of pure ingenuity, such as password, 123456, 123456789, iloveyou, and similar. Do you feel safer already? What is the moral of this story about the top cyber security secrets?

Well, either these experts were in the bad mood mode, or we, the users, are helplessly naive and reckless. Maybe, we can really strengthen our cyber security position, with a few simple steps, we fail to apply over and over again. Maybe, the image in our cyber security mirror is too scary to look at.

Browser Hijackers

image

Is there at least one place in our brave new cyber world, which is safe from hacker’s harm? We have seen quite a few troubling things, and heard so many horrific stories, but this is simply too much to handle. Now, our precious web browsers are not going to be left aside, “thanks” to the so-called browser hijackers.

The use of the term hijacking, says a lot about this extremely annoying cyber menace, doesn’t it? Someone hijacks your browser in order to change its settings without your knowledge nor permission. So, what do you get as a result? Well, you do not have to guess twice, do you?

Your browser is very likely to pump up some website’s search results or even worse to steal your privacy and logging data. Unfortunately, this is almost a fully legitimate way to do some illegal things. There is more. This is not the worst  thing about the web browser hijackers. Can you guess what it is?

It turns out that you yourself are to be blamed for your hijacking situation. You have installed some completely unnecessary piece of software or you have followed some naughty link. Either way, no one hacked your browser in a traditional sense. Remember that. Prevention is still the best cyber defense.