The Heartbleed Can’t Stop Bleeding

image

Does it really have to be this way? Once you get a visit of a serious cyber threat, you always have to be on alert. Why can we do it this way? We have identified a new security menace. We will find a cure for it. Now, let us forget about it, and get back to our work. With no fear that a certain malware can trouble us in the future.

Unfortunately, we have to accept the bitter IT destiny. Every now and then, the notorious Heartbleed is to remind us that it is far from retiring. How much more we have to bleed, to be finally free from the Heartbleed, once and for all? It seems that we need more unpleasant reminders, such as this one.

For what is worth, the Chinese Heartbleed warriors are responsible for the unparalleled theft of more than 4,5 million personal patient’s data from one of the largest US hospital chains. Can you imagine that? It is almost like a small state. Now, they can do whatever they want it with no limitations.

When you hear or read something like this, it makes you wonder. What is happening with all those busy little IT security bees in large systems? Have they forgotten to do their job? Or, maybe they think that things like this happen to someone else avoiding them? We are sick and tired of the Heartbleed. How about you?

Oops, the UPS Got Hacked!

image

No wonder, we have a serious problem about convincing ourselves that we are supposed to feel safe. If the dinosaur system such as the UPS can be hacked, then what can we expect to happen with the other less sophisticated and considerably weaker defended systems? This one makes you wonder.

To make things, being even worse in this situation more than 50 UPS stores in 24 states had some serious issues with the IT security. As a result one percent of all users are very likely to experience some kind of troubles and inconveniences in the future, this way or another. One percent, one may say.

It is not such a big deal. Well, as a matter of fact, it is a gigantic deal. When you have hundreds of millions of users, then even one percentage can be a reason for a serious headache. The guys in the UPS headquarters have plenty of time to discuss what went wrong and eventually why.

Would that be enough? Well, when the gigantic systems fail, then we accept to evaluate our current IT security systems with the highest attention possible. Maybe, some good things will come out of this one, eventually. We sure hope we will not have to wait too long for that. Oops, my dear UPS.

Troubles Come In A Legit Disguise

image

It seems that modern hackers like to read the old books about the military strategy and the art of war. How else we are supposed to explain the sudden change of concept in the master design of the most malicious software? If you examine modern malware, you will notice an intriguing phenomena.

There is no need to attack the system, when you can skip it undetected. Why bother fighting, when you can do your job with a proper disguise. And, this is how we reached the point that top malware looks and works like a completely legitimate software. You realize that something is wrong when it is too late.

The new RAT or Remote Access Trojan for Android really does not have problems when it comes to a successful disguise in both paid and free apps. The more popular a certain app becomes, the more likely is that it carries an uninvited guest with it. So, what are we supposed to do in order to defend our Android territory?

Well, you do not have to be a general to know that new weapons on the battlefields simply call for new strategies and defense measures. If these malicious troublemakers can disguise themselves, then we can and should find a way to scan them properly before they hit the walls of our digital fortresses. Right?

The Malware Human Rights

5_2177_imela_4

The things are getting serious with hacking, aren’t they? Apparently, so serious that even The European Court of Human Rights (ECHR) has to intervene. What happened? It seems that the Latvian creator of the Gozi Trojan, which is specially designed to attack banks, thought he will face some unfair treatment by the US Justice Department.

Unlucky for him, in its opinion the ECHR sent a message that Gozi’s father has to answer for his wrongdoings, and that a legal treatment across the ocean will be just fine in this case. This was his last chance to prevent the extradition to the USA, and it has failed.

This obviously talented 29 year old hacker has every right to fight his legal battles. Why? Well, he is facing a 67 years of imprisonment penalty in the USA. You can do the math, can’t you? In other words, this a lifetime sentence. And, the message is strong. Who will dare to attack the US banks after this one?

Maybe, this Latvian hacker can make some kind of a deal with the US government. He can become the US version of Nikita. Why not? In exchange for his freedom he can provide training or even his own personal hacking services to the government. Who knows? He knows too much to work in the prison’s library. Right?

Hackers Love Superman Too

image

The guys from the McAfee have a sharp expert IT security eye for all intriguing things taking place in the background, or to be a little bit more precise in the backstage. So, what do they have for us this time? They came up with a Superman warning. What are we talking about?

Well, it seems that hackers are using some of the most popular superheroes to camouflage their malicious links. If you do not think twice before you click on a certain link associated with your favorite superhero, there is a chance that you make unwanted friendship with some malware or Trojan.

These superheroes may fly and have all kinds of super-powers. However, when it comes to the cyber space there are quite helpless. As soon as you experience a close encounter with some malware or Trojan you need to call heroes of a different kind. Your IT security experts come for a rescue.

It is a sad thing that flawless Superman’s reputation has been violated in such a shameless manner. To make things even worse for us movie fans the upcoming saga Superman vs Batman is very likely to be misused in a similar way. Oh dear, is there something sacred to these villains hackers?

Tesla For Hacker Dummies

4_2177_imela_6

All of our hats off to Nikola Tesla, one of the most brilliant minds in an entire human history. Thanks to his inventions we are able to write our posts in the first place and you enjoy them on your devices, as well. No wonder, the inventors of one of the most successful oil-free cars honored their model with his name.

Now, after this relaxing and educational introduction you are ready for the right stuff. Did you know that you can hack a car? This is exactly what happened with the Tesla Model S. To make things even more interesting the hacking took place during the SyScan +360 security conference. The Chinese guys were after a prize of $10,000, that is their sin.

How they did it? Well, all they had to do is to hack the six digit code for the Tesla Model S mobile app. It is a secret how they managed to take control of almost all vital car’s functions in the first place. Unfortunately, this is a weak comfort for all current and potential Tesla car users. So, what is left for us to do?

For what is worth, be careful with your Bluetooth, radio, wireless, and navigation maps in your car, because through them you can get some unwanted virtual guests next to your seat. Maybe, it was not a smart thing to put a computer in your car, in the first place. You do not need a smart car. You need a smart driver and reliable machine. No more, no less.

Internet Security: Who Is To Blame?

4_2177_imela_4

Finally! Someone has spoken our minds on this matter. The troubles with the IT Security are not one month or a year old. Seth Hanford, who is the head of Cisco’s Threat Research Analysis and Communications, has hit the right nerve with his observations. The proper IT Security has only been an illusion all of this time.

What does it mean to be a little bit more precise? Well, for what is worth, the situation with our IT Security has not been worse or better compared to the previous periods of time. The only difference is that we are now more aware about it. We conduct more surveys, tests and analysis. That is actually the only difference in this story.

In other words, it is similar to the situation when someone has accidentally turned on the light after nights and nights of complete darkness. And, we have apparently become aware of our current condition. On the second thought, this does not have to be necessarily bad. How do we dare to come up with such a claim?

Well, now that we are fully aware of all threats and dangers that are waiting for our next move in the cyberspace, we can finally do something about it. Not bad for a change and something that should have been done years and years ago. The old and wise Chinese said something like that a long journey starts with a small first step.

How To Hack Your Hotel Room?

 

4_2177_imela_3

Here is one hot topic literally. You are already there or planning to hit the road to a nice looking beach. Here is the catch. With a little bit of patience and nothing more than an iPad 2 you can take control over your hotel room. We are talking about the real control, including all the services your hotel room has to offer, such as cooling system, lights, TV, and others. You name it, you can have it.

However, there is also some bad news. Someone else other than yourself can easily hack your hotel room. Or, as a matter of fact the entire hotel. You can easily end up paying someone else’s hotel bills. Or, even worse, you can be forced to look for another hotel as soon as you arrive. According to the hotel books and computers everything is as it should be, but only you know that is not true.

It seems that the hotel industry has to update itself, as soon as possible. The times when hotel robbers took their tools with them are long gone. Nowadays, you do not have to get your hands dirty in order to rob a hotel. All you have to do is to play smart and use your smartphone or tablet. In this matter, the sky is the only limit you face while you walk down the virtual hotel lobbies.

Well, it is about time for prestigious hotels make some additional investments for appropriate software. It is not enough to have the top booking software. What about the security of hotel in the first place and its guests? The last thing you need is some new virtual hotel’s manager with the dishonest intentions to take over the control. The IT room service is at your door.

Malware On The Run

image

According to the recent findings of the Anti-Phishing Group more than one third of all world’s computers could have been infected with some form of malware by now. Who or what is responsible for this unprecedented malware explosion? Well, the things have changed immensely in the meantime.

Not so long ago you had only one virus, which attacked thousand computers. Nowadays, you thousands and thousands of completely different types of viruses, which attack only one computer. This was a rather simplified illustration of the problem, but very nice one for you to get the right picture.

Here is one more thing to contribute strongly to the dawn of the malware rule. The catch is to do your thing without being detected in the first place. Compared to the “traditional” viruses the modern day malware may cause less damage, but they are extremely hard to be detected by the anti-virus programs.

So, what can we do about it? There is a good news in this endless pessimistic sea filled with trouble. The modern day malware always knocks at your device’s door. This way or another you take part in your own IT doom, if you are not careful enough. Think about it.

The Philippino Storm

image

This one you have to hear. It seems that the Internet frauds are as efficient as we are willing to believe them. Yes, they are that simple and shameless, because sometimes we can be so naive that it hurts. So, here goes our story. We are talking about a group of scammers from China and Taiwan.

The Philippines were their base of operations, but they were targeting their countrymen in this case. The funny or sad part of this story is that they were able to convince their victims that the bank accounts used, were under a tremendous jeopardy.  What happened next?

Believe it or not, these poor people bought their story that the safest way for them to save the money was to transfer to this group. Maybe, you do not have to be a rocket scientist to learn some hacking 101. But, to be able to convince people about this one is really a magical manipulation.

So, why did they choose to operate from the Philippines? Well, someone told them that there they will be safe from prosecution there. It was their turn to be ridiculously naive. What is the moral of this story? Do not worry about hackers do your best to detect liars on time.