iVirus iTrouble

image

Here comes the new trouble called the KeyRaider. This is the latest virus, which prefers jailbreaked iPhones. What is even more interesting, this threat can be associated with the jailbreak solutions made in China, in the overwhelming majority of all cases. So, how does it work?

Well, as soon as your iPhone starts communicating with an iTunes and Apple Store the hackers jump in. Your iPhone will pay and do what you do not want or do not approve. So, what is the moral of our disturbing KeyRaider story? You should avoid jailbreak options for your smartphone?

Does it also mean that somewhere out of our sight the busy little bees in Apple are laughing at us? They told us, but we failed to listen and comply? No, it would not be fair to say such a thing. You are absolutely free to do whatever you like with your iPhone. You just need to be extremely careful.

Executing a jailbreak operation can be a risky operation, if you are reckless and impatient. Some hacker has obviously done his homework properly. Apple can, but still does not have an obligation to help you in this case. Do not accept a free ride of the notorious KeyRaider. That is the only advice we can give you.

China vs China

image

China has arrested more than 15,000 hackers and cyber criminals. When you have almost 1,5 billion of your own citizens, this really seems like a meaningless drop in the ocean. Or, everything and anything has to be huge and impressive in China, including the number of hackers.

On the other side, there are quite raised eyebrows and suspicious faces that this battalion of arrested hackers is not going to end up in prison. What is that supposed to mean, exactly? Well, China has quite a notorious reputation for its numerous and merciless hacking teams.

It is not an unimaginable thing to witness Nikita scenario for Chinese hackers. It is better to work for the Chinese government or military things you are doing best, than to dream about computers from your cell in some God forsaken province. It is not much of a choice, is it?

So, what is China supposed to do, in order to gain our trust? Even if they arrest 150,000 hackers, we are still going to be suspicious, aren’t we? We sure hope China is doing some serious job in this field. Otherwise, hackers can easily hack the entire China one day. We are not exaggerating.

The Trouble In Firefox Paradise

0802_imela_2

Here is a bad news for all Windows and Linux Mozilla users. There is a security flaw in Firefox JavaScript sector, which leaves an open door for hackers to exploit. What is happening with Mac users? Well, for the time being, their apple Apple is safe from harm.

What can we do about it? According to Mozilla, all what you have to do is to upgrade your Firefox to the latest version available. On the other side, there is no point of crying over the spilled milk in the earlier versions, is it? Is that all cyber-folks?

Apparently, it is. The business is going to be as usual for Mozilla. The users, who are going to experience a couple of privacy related inconveniences here and there, will not have a decent chance to complain. In the matter of days, we are very likely to forget this most recent trouble.

So, what is the moral of this story? Well, it is good to be fully aware about the imperfections of our existing cyber-empire. But, at the same time, you should not worry too much about it. Why? Because, there is not much you can do about it.

Hacking MS Team

0705_imela_3

What is your very fist impression, when you hear a name for a group – the Hacking Team? Probably, not such a positive one. Right? Who is to blame us, for our cyber prejudices? However, in this particular case, the busy little bees in the Hacking Team helped both Microsoft and us, a lot.

The Hacking Team has identified a security bug associated with the specific font’s driver. On the other side, grandpa Microsoft has delivered a security update, silently and efficiently. This is how it is supposed to be done. I tell you that something is wrong or broken. You fix it.

The end of potentially dangerous cyber story. As simple and as complicated as that. We have to say that we area dying to hear, what grandpa Microsoft sent to the Hacking Team as a sign of its gratitude. This is something we would like to hear and share with you.

It seems that every time your hear words, such as hacking or a hacker, this does not necessarily mean that something bad is going to happen. Just ask grandpa Microsoft, we are quite sure, it has so much to tell you about it. Good job, Hacking Team!

Million Miles Away From Hacker’s Home

wpid-wp-1413765967231.jpeg

When there is a will, there has to be a way of improving our extremely compromised cyber security. Even if you do not have or do not want to pay money for cyber security services, you can always compensate. Just ask United Airlines, because they certainly have a lot to tell you all about it.

For what is worth, the busy little bees in the United Airlines have launched a genuine bug bounty program. So, what is so special about it? Well, if you knock them off their feet, your reward is not going to be a financial one. Surprised?

How about a one million miles of free flights reward, for a change? The United Airlines has decided that it is worth of every mile. What for? Well, thanks to the cyber bug bounty hunters, their website is bulletproof, when it comes to potential hacker’s attacks.

That is not all. One of the biggest worries for every airline company is a serious threat of a cyber hijack of a plane. In this worst case scenario, no price is too high to pay for a proper safety measure. Our hats off to this brilliant move. We should follow United Airlines’ example.

Who Will Guard The Guardians?

wpid-wp-1415098377104.jpeg

One National Guard member has exposed sensitive and private data of more than 850,000 of his fellows. How could this be? This is how, we have ended up in a vicious circle of game to blame. Really, who is to blame? The system or an individual, who has wrongfully used it?

Well, if the system works flawlessly with all of its security features, then there is nothing to worry about the potential misuse. However, if there is a flaw, then someone will take an advantage of it, sooner or later, this way or another. So, we have to blame the system. Right?

Maybe, the basic presumption that our own staff cannot do anything wrong is to be blamed. We are focused all the time to the threats coming from outside that we have completely forgotten about the cyber hazards working from inside. Which brings us back to our question.

Who and how will guard our cyber guardians? There should not be exceptions from our safety procedures and standards. On the contrary, we should apply special and additional standards for our guardians, because they are in a favorable position of taking an advantage over the system. Right?

The Call of The Dark Cyber Side

wpid-wp-1423350122242.jpeg

The most recent scandal in the IT security community has raised quite a few eyebrows, while making us to examine one more time the unsustainable claim that hacking can sometimes be an ethical thing to do. So, what happened actually, and why it is so important for us?

It turns out that one young and promising IT security consultant had an “intriguing” hobby and a part time job. The “hero” of our story was creating malicious software solutions. In addition, he was selling them online. You can imagine the surprise of his colleagues at work.

To make the situation even more interesting and even funnier, this consultant was working on his own “case”. During his regular working hours, he was solving problems he created the nights before. This modern time Dr. Jekyll and Mr. Hyde did not have a happy ending.

It is hard to say what is the proper moral of this unusual story. It seems that the call of the dark-cyber-side can be quite a strong one. This does not necessarily mean that we should play spy games with our friends and colleagues. However, we should be aware of the true power of the dark cyber side.

Browser Hijackers

image

Is there at least one place in our brave new cyber world, which is safe from hacker’s harm? We have seen quite a few troubling things, and heard so many horrific stories, but this is simply too much to handle. Now, our precious web browsers are not going to be left aside, “thanks” to the so-called browser hijackers.

The use of the term hijacking, says a lot about this extremely annoying cyber menace, doesn’t it? Someone hijacks your browser in order to change its settings without your knowledge nor permission. So, what do you get as a result? Well, you do not have to guess twice, do you?

Your browser is very likely to pump up some website’s search results or even worse to steal your privacy and logging data. Unfortunately, this is almost a fully legitimate way to do some illegal things. There is more. This is not the worst  thing about the web browser hijackers. Can you guess what it is?

It turns out that you yourself are to be blamed for your hijacking situation. You have installed some completely unnecessary piece of software or you have followed some naughty link. Either way, no one hacked your browser in a traditional sense. Remember that. Prevention is still the best cyber defense.

The Four-Million Super-Hack

image

No one knows for sure, what has actually happened. Maybe, we are too embarrassed to admit it. Yet, for what is worth, some 4 million federal employee data were stolen. Does it mean that all federal data are compromised? How many federal employees, we have in the first place?

Or, let us ask the right question. Who is to blame? It turns out that all eyes are on Chinese hackers, for the moment. Although, it is not quite clear, what are you supposed to do with these federal data. Can you sell them? Are these people more attractive to people, because they have reliable sources of income?

The black-cyber-markets can be very generous for these types of data. On the other hand, this is a huge blow straight in the face of the federal cyber security. If the US government cannot protect its own employees, then what is going to happen to the so-called ordinary citizens?

You can rest assured that this cyber embarrassment is not going to disappear so easily. We are going to write and read much more about the aftermath of this hack attack of epic proportions. Can you hack an entire country? Now, under these circumstances, this question does not sound crazy at all.

One In Four

image

There are some impressive and intriguing statistics, we just cannot decide whether or not they are pessimistic or optimistic ones. We leave it up to you to decide. Here is goes. Buckle up for this ground shaking news. It seems that one in four hackers in the USA is actually working for the FBI.

Or, some other government agency. So, what is the trouble with this discovery? We hate to disappoint you, but you have no other choice than to look for the bigger picture. When you hear something like this, it can mean only one thing. The government is in the full control of the entire situation.

If you have so many whistleblowers deeply incorporated into the living tissue of the US hackers’ community, then there is nothing to worry about. Right? Or, maybe we are facing a much greater danger than the hackers themselves. What are your feelings about the state sponsored hackers?

We like to complain about the North Korean, Chinese or Russian state sponsored hacker groups. However, we tend to forget our own good boys in black, who are doing the bad things in the cyber world. What if this one in four is actually a hacker’s team leader? Who is responsible for all the trouble?