The Four-Million Super-Hack

image

No one knows for sure, what has actually happened. Maybe, we are too embarrassed to admit it. Yet, for what is worth, some 4 million federal employee data were stolen. Does it mean that all federal data are compromised? How many federal employees, we have in the first place?

Or, let us ask the right question. Who is to blame? It turns out that all eyes are on Chinese hackers, for the moment. Although, it is not quite clear, what are you supposed to do with these federal data. Can you sell them? Are these people more attractive to people, because they have reliable sources of income?

The black-cyber-markets can be very generous for these types of data. On the other hand, this is a huge blow straight in the face of the federal cyber security. If the US government cannot protect its own employees, then what is going to happen to the so-called ordinary citizens?

You can rest assured that this cyber embarrassment is not going to disappear so easily. We are going to write and read much more about the aftermath of this hack attack of epic proportions. Can you hack an entire country? Now, under these circumstances, this question does not sound crazy at all.

How YouTube Reveals Your Passwords

image

Every now and then, you stumble across something, which can be best described as the cyber-security-for-dummies. In some cases, the advice you can hear is unreliable and even a ridiculous one. However, the video we had a chance to see on YouTube was a little bit disturbing for our taste.

If you want to check it out yourself, all you have to do is type: “How to reveal a hidden password in the logging page”, or something similar. It really looks convincing, and this is something that worries us the most. So, how does it work? Here it is, if you are too lazy to look for a video.

You should use the right click on your mouse and choose inspect element option in the empty password field. Then, in the developer’s menu, you should replace “password” with “text”. According to what we have seen, this is supposed to work. We will try it ourselves, that is for sure.

What are the possible solutions for this surprising bug, if we could describe it as such? The very first thought that crosses our minds is to make sure your computer does not end up in the wrong hands. On the other side, should we cancel the inspect element option from our browsers?

Develop or Buy, Buy or Cry?

image

Should you develop your own fully customized cyber security solution, or rather simply buy an existing one? There is a third option, as well. You can adapt some solution, you have previously acquired. All options are free to use and explore. Just like there is no answer for this puzzle.

As always, it all comes down to your choice and inner voice. Do not waste your time looking for a universal advice, because you are going to end up in a huge disappointment. Maybe, we have moved in the wrong direction all of this time. Here is an additional explanation for this claim.

Do we really to trouble our brain over this unnecessary dilemma? The real question is quite a different one. What are you waiting for? Do you really need to think twice before introducing an appropriate solution, which may or may not be tailored to our specific needs? If this is a case, then what?

Then, you have already left an open door for the hackers. Then, you have lost a right to complain. While you are wondering what to do, the hackers are deciding where to attack. It is more than obvious that cyber security is not a place for philosophers, nor for dilemmas, such as to be or not to be my cyber security.

The Vawtrak Is On The Attack

image

The latest cyber monster, which is after your virtual money, has a name. The Vawtrak malware has begun with its global domination in Japan. So far, the serious estimates say that more than 100,000 computers have been infected. This malicious software follows your online banking transactions.

It has a simple goal. The Vawtrak transfers your money to the third party bank accounts. The users all over Asia have already lost more than hundreds of millions of dollars. Now, when we are fully aware about this financial danger, what can we do in order to eliminate it, for good?

You can rest assured that quite a few busy little bees in the cyber security sector work day and night on an efficient solution. As always, it is a merciless race against the time itself. The Vawtrak is moving from the West toward the East. How much time we have left before the real trouble?

As soon as it hits the cyber shores of Europe and the USA, we will be facing the completely new level of the cyber disaster. One important piece of the cyber puzzle is missing, though. No one told us, how all of those computers got infected in the first place. That is worth knowing. Is not that right?

The Deadly Window

image

The busy little bee called the Cylance come up with the disturbing discovery. It turns out that every single Windows version, including the Windows 10 Technical Preview, can be hacked and passwords easily extracted. How? Who left the window open for the hackers? What about Cylance’s discovery?

It is a weak comfort, but the grandpa Microsoft has already acknowledged the “mistake”, which allows you to control a device in an unprecedented way. How? According to the Cylance, all you have to do is to infiltrate a malicious link into the targeted computer. And voila, you are in the full control.

While Microsoft is already working on an appropriate security patch, we have a simple question to ask. Even the most sophisticated and deadliest viruses known to the cyber community need a helping hand from the inside. Unless you open a door yourself, there is no real danger of the cyber doom.

We are hopelessly obsessed with the harmful effect of a certain virus that we completely neglect, how we got infected in the first place. That is the catch we are neglecting so easily. Do not be an easy target for a newbie or an average hacker. This is something you can really do. How hard could it be?

On The Blue Cyber Danube

image

What is happening under the Alps? For the most of us Austria is a dream vacation country. What can possibly go wrong in this peaceful country with the breathtaking landscapes? Well, it turns out that the hackers are extremely active in this small country with the huge business potential. How and why?

It is really hard to believe that only a handful of companies take care about their cyber security in the right way. On the other hand, one in four Austrian companies gets under a serious cyber fire. As a result of the malicious hacker’s attacks the average damage includes more than 400,000 Euros.

If this is not enough to make the Austrian busy little business bees reconsidering the involvement of the top IT security consultants, then we do not know what is. With the average damage sum of $400,000 or Euros you can do so much job in the field of cyber security for more than one company.

However, there is a catch. First, you have to take care of all prejudices, which rooted deeply in the minds of the Austrian business people. They tend to believe that these nasty cyber things happen to someone else by default. Yet, sooner or later, your cyber address got picked up for trouble. Right?

The French Cyber-Kiss

image

One of the latest online surveys in France shed a surprising light on the behavior of the Internet users. It turns out that one in two French web users pays a visit to some of the financial websites, such as banks or insurance companies, at least once in a month. So, what is the big deal about it, you may ask?

Well, for what is worth, you should bear in mind that there are more than 50 million Internet users in France on a daily basis. That gives us more than twenty million visitors of the finance related websites. Or, to be even more precise, more than five million French cyber users hit a bank’s site each day.

The average time they spent on these websites is around seven minutes. If our math is correct that gives more than thirty million minutes for hackers to try something each day. We sure hope that someone has at least five minutes to spend for the potential cyber hazards. Too much to ask. Right?

That was France. What about Germany? We can expect the similar numbers, more or less. Can you imagine all of those millions and millions of unprotected cyber minutes? Oh dear, that is too much to handle. On the other hand, plenty of job opportunities for the busy European cyber security bees.

Smart Fitness – Dumb Security

image

The busy little bees in Kaspersky Lab just had a new assignment. This time they analyzed the security performances of the extremely popular fitness mobile gadgets, which are obviously extremely insecure. Why? It is actually a surprisingly simple situation. The smart-bracelets are not to be blamed.

The manufacturers are running blindly for the additional profit. They do not have time nor nerves to bother themselves with the “trivialities”, such as the optimal security and privacy protection, among other things. Why is this so important? You do not have to be a rocket scientist for this one, do you?

If you do not solve the problem with the smart-bracelets, then you are going to get into deeper trouble with the smartwatches. Do not forget that the iWatch wave is about to hit our customer’s shores. We have just opened an additional unsecured and the unprotected door for hackers to exploit.

Does it really have to be this way? First, we come up with a new concept and imminently face the security crisis, then we are trying to figure out what to do about it. Seriously? What happened to the predictions in the cyber security field, as our main and most trusted tool? Obviously, too much to ask.

Apple Store – Antivirus No More

image

Yes, it is official cyber boys and girls. From now on, it will not be able to find a single antivirus app in the Apple Store. What is that supposed to mean? You are absolutely safe in the IOS environment. Or maybe, these countless apps are giving you the false and hazardous sense of cyber security.

Which one of these two options is the correct one? Maybe only one. Maybe both. According to the numerous surveys and analysis, both anonymous and fully transparent ones, the best way for you to improve your mobile security is to remove your antivirus app. Oh dear, then what is left for us to do?

This is not a good news for the hackers. This is a beginning of a serious evaluation of our current condition. Security apps are much more than a cozy way to earn money through advertising. Maybe, this is exactly what we need. One huge and systematic purge of the alleged antivirus and anti-malware apps.

What is left is supposed to be absolutely trustworthy and efficient. It is really hard to believe that we have so many reliable antivirus apps. The most likely situation is that so many developers have come up with an idea of attracting the attention with something that is only called an antivirus app.

Android Financial Paranoid

image

The busy little Kasersky Lab bees have some bad news for us. Again. This time, the focus of their work was on the financial components and services of the mobile Android OS. For what is worth, we strongly advise you of taking a deep breath before hearing these disturbing statistical data, in the first place.

Here it goes. The number of the financially oriented Android attacks in 2014 is more than three times higher compared to the previous year. What can we expect in 2015? Well, we do not even dare to ask. It seems that the hackers of the restless Android seas are after your cyber wallets this time.

We should mention the two most notorious villains in this field. The Trojan-SMS and Trojan-Banker are the most lethal and efficient ones. Unfortunately, the unparalleled popularity of Android OS has shown its ugly side. There is a reasonable fear it is going to become even worse in 2015.

So, what can you do to protect yourself properly? It would be a great thing to treat your mobile OS in the same way yountreat and protect your desktop OS. Maybe, it is about time for you to invest some money in the top quality mobile cyber-security solutions. Better now, than never or too late.