Wednesday, May 7, 2014

Cyber Attacks and Data Breaches in April

The large revelation of the Heartbleed vulnerability this month caused chaos across the globe. While organizations were ensuring that they weren’t vulnerable, cyber criminals were busy stealing valuable information and defacing websites.

The list below contains a collection of some of the largest breaches, as well as some of the most bizarre.


Data Breaches via Cyber Attack
Malware on Kaiser Permanente server since 2011 impacts 5,100 members
Security breach at AOL. Users told to change passwords
Iowa State server breach exposes SSNs of nearly 30,000
Hackers may have accessed details of 500,000 considering cosmetic surgery
German space centre endures cyber attack
French hard-drive maker LaCie cops to YEAR LONG card data leak
Medical staffers fall for phishing emails, data on 8,300 compromised
Chicago doctor’s email account accessed, held info on 1,200 patients
Deltek suffers cyber attack
Breach impacts thousands in Bibb County that applied for gov’t jobs
Unauthorized access gained to about 800 JSTOR accounts


Data Breaches via Physical Attack
Second burglary breach within a month for Coordinated Health
Tufts Health Plan data stolen, 8,830 members impacted
Fate of unencrypted drive unknown, PHI of 5,500 in Virginia at risk
Three laptops stolen from New York podiatry office, 6,475 at risk
Data on 55,000 VFW members impacted by attacker seeking military intel
More than 1,400 medical records compromised in Texas breach
GovWin IQ hacked, payment card data of 25,000 Deltek customers at risk
Drives containing info on 2,500 stolen from Michigan health department
Theft of computers from Texas non-profit risks data on nearly 3,000
Germany suffers biggest ever data breach in its history


DDOS
Games Maker Blizzard Suffers From European DDoS Attack
UK webhost 123-Reg in DDOS attack


Other Attacks, Breaches & Mistakes
Jailbroken iPhones at risk from new malware
Japan airport staff dash to replace passcodes after security cock-up
Google kills fake anti-virus app that hit No. 1 on Play charts
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Viber mobile messenger app leaves user data unencrypted
Triathlon camera drone falls out of the sky, owner claims it was hacked
Microsoft Xbox pwned by 5-year-old security researcher


Monday, May 5, 2014

Clean Windows Registry and Speed up your PC

The Windows registry is not exposed, are protected at all times for maximum speed and performance. In addition to topics such as hardware, memory problems, incompatibility of device drivers and problems that can not be removed from the registry, but most of them do I have to deal with themes of Windows registry problems with the Windows registry. You have to be repaired, or as soon as possible to keep your computer updated and corrected effectively.

You can find many problems in the registry now and have to run again. All modern operating systems Windows, the registry database or registry stores all the configuration settings for the respective components in the computer system.

If you have a program to install add value to the registry and configuration settings in the installed application. But if the program is not fully the location and other information are furnished partially saved or corrupt manner, that many problems and issues register later purchased.

Another important reason is that when you remove programs from your computer, some of the residue remains in the Windows registry, and delete them gradually collect debris and create more unwanted records in the database. These elements generate a lot of problems such as slow computer later, blue screen error and many such cases in your system.

Another important factor is computer viruses and other malicious programs. The virus can cause great damage to the Windows registry. He has the potential, and that it was designed to the registry is damaged before you do anything else. The virus changes the basic registry entries so that the safety of things can not detect or catch it, and they can do, what role is actually exercised.

These three things or issues that are important for Windows, sometimes corrupt registry, and then the system creates more questions. For the latter reason, for example, virus removal, you are a good and effective virus protection to all malicious entries must be deleted from your system and registry, anti-virus software is usually not intended to restore the damaged Registry. Since a reliable registry cleaning software is not required.

All the many thousands of corrupt registry keys as empty, directories, file path, the class ID, interface, font, links and many other similar and undesirable elements necessary for safe and effective registry repair tool that really convinced that it takes to be removed from the registry without the system and other programs on your computer.

Use Necessary Software to Keep System Clean
There are many tools available on-line registry cleaner, but not all of them are very efficiently and reliably. Most of them just happened to be the best is, but they do not work, and they are ineffective. In this case, choose the best thing you can do is download a trial version of the software in a while and watch the results of the software will decide whether further action: to buy or use.

Get the free CCleaner (www.piriform.com/ccleaner) which is available for both Windows and MAC. It makes short work of cleaning up your system's temporary files. MAC users can also use OnyX (www.titanium.free.fr) which offers advanced cleaning options.

SpeedUpMyPC (www.uniblue.com/software/speedupmypc) is the updated and successful program, designed to clean and repair all the unwanted stuff from your computer in an efficient manner.

Defraggler (www.piriform.com/defraggler) is a great tool that offers the option to defrag the entire hard drive or just specific folder. It displays a drive map that shows how the space of your hard drive is utilized.

TuneUp Utilities (www.tune-up.com) as you install more programs, you might notice that your PC takes longer to boot up. This happens because many applications and services automatically initialize during the boot process. Tune Up Utilities can analyses your PC's boot up time and removes unnecessary startup programs. It even lets you individually select the programs you want to remove from startup. MAC users can do the same by going to System Preferences > Accounts > Login Items and removing applications that you do not want to open automatically when you log in.

Friday, May 2, 2014

Facebook hackers fooled into hacking their own accounts

A video post making the rounds on Facebook shows how to hack the highly popular social media website in order to gain access to accounts and other features – but really it is a scam that only results in users hacking their own accounts.

Last week, researchers with Symantec discovered the scam impacting users in India, according to a Wednesday blog post, which explains that the operators are using a variation of a trick known as self cross-site scripting, or self-XSS, that dates back to 2011.

It is a fairly simple strategy.

The video post links to code stored on Google Drive and states that, by pasting the code into the browser console window, the Facebook hack will be successful within a couple of hours, Satnam Narang, a researcher with Symantec Security Response, wrote in the blog.

What actually ends up happening is that the victim's Facebook account begins following and "liking" posts by the scammers, according to the blog, which adds that accounts also tag their friends in a comment on the original video post, in order to spread the scam.

“The code impacts any Facebook user around the world,” Narang told SCMagazine.com in a Thursday email correspondence, noting users in the U.S. may have been affected. “It just so happens that this particular campaign was launched in India. The code is geo-location agnostic.”

The code, which contains hints that the authors may have been Turkish, is fairly lengthy and complex, Narang said, but he explained that what it essentially does is utilize commands and requests made to Facebook in order to perform the specific actions, such as subscribing to a profile.

“This particular scam is specific to Facebook and cannot be used on other social media websites and services,” Narang said. “The goal here, for these scammers, is to inflate the 'likes' and follower counts for their company and brand pages and their own profiles on Facebook."

Narang added that Facebook disabled consoles in some browsers and gives users a choice to turn it back on.