RSA Conference Attendees Get Hacked

The RSA Conference “is perhaps the world’s largest security event, but that doesn’t mean that it’s necessarily a secure event, ” reports eSecurityPlanet. Scanning the conference floor revealed rogue access points posing as known and trusted networks, according to security testing vendor Pwnie Express. storagedude writes: What’s worse, several attendees fell for these dummy Wi-Fi services that spoof well-known brands like Starbucks. The company also found a number of access points using outdated WEP encryption. So much for security pros… At least two people stayed connected to a rogue network for more than a day, according to the article, and Pownie Express is reminding these security pros that connecting to a rogue network means “the attacker has full control of all information going into and out of the device, and can deploy various tools to modify or monitor the victim’s communication.” Read more of this story at Slashdot.

Visit link:
RSA Conference Attendees Get Hacked

Bad Year For Piracy: 2016 Was The Year Torrent Giants Fell

From a report on TorrentFreak: 2016 has been a memorable year for torrent users but not in a good way. Over a period of just a few months, several of the largest torrent sites vanished from the scene. From KickassTorrents, through Torrentz to What.cd, several torrent giants have left the scene.Another notable website which vanished is TorrentHound. ThePirateBay is back, but is often facing issues. Not long ago, ExtraTorrent noted that it was on the receiving end of several DDoS attacks. Read more of this story at Slashdot.

Continued here:
Bad Year For Piracy: 2016 Was The Year Torrent Giants Fell

UK police crack down on people paying for DDoS attacks

Distributed Denial of Service (DDoS) attacks are on the rise, affecting individuals , private businesses and government-funded institutions alike. As part of a large warning to cybercriminals, the UK’s National Crime Agency (NCA) has arrested 12 individuals for using a DDoS-for-hire service called Netspoof. “Operation Vulcanialia” targeted 60 citizens in total, and led to 30 cease and desist notices, and the seizure of equipment from 11 suspects. The NCA says it had two focuses: arresting repeat offenders and educating first-time users about the consequences of cybercrime. The work formed part of Operation Tarpit , a larger effort co-ordinated by Europol. Law enforcement agencies from Australia, Belgium, France, Hungary, Lithuania, the Netherlands, Norway, Portugal, Spain, Sweden, the UK and the US targeted users of DDoS tools together, resulting in 34 arrests and 101 suspects being interviewed and cautioned. The UK’s contribution was spearheaded by intelligence gathered by the West Midlands Regional Cyber Crime Unit, and executed by Regional Organised Crime Units under the watchful eye of the NCA. Some of the arrests were detailed in a press release — all but one was under the age of 30. Netspoof allowed anyone to initiate potentially devastating DDoS attacks from as little as £4. Packages soared to as much as £380, however, depending on the user’s requirements. It meant almost anyone, regardless of their technical background, could take down sites and services by flooding them with huge amounts of data. The trend is representative of the increase in cybercrime and how easy it is for people to wield such powers. DDoS attacks aren’t comparable to hacking, but they’re still a worrisome tactic for businesses. Knocking a service offline can affect a company’s finances and reputation, angering customers in the process. Twelve arrests is by no means insignificant, but it almost certainly represents a small number of DDoS users. Still, it’s a warning shot from the NCA — it’s aware of the problem, and officers are putting more resources into tracking those who both use and facilitate such attacks on the internet. Via: Ars Technica Source: Europol , NCA

Read More:
UK police crack down on people paying for DDoS attacks

New York’s District Attorney: Roll Back Apple’s iPhone Encryption

An anonymous reader quotes Mashable: Manhattan District Attorney Cyrus Vance said Thursday that he wants Apple’s encryption to go back to how it was in early 2014. Back then, police could basically extract any information they wanted after getting a warrant. “Doing nothing about this problem will perpetuate an untenable arms race between private industry and law enforcement, ” Vance said on Thursday. “Federal legislation is our only chance to lay these arms aside.” Vance said he’s got 423 “lawfully-seized Apple devices” that his employees can’t do anything with. Forty-two of those devices “pertain to homicide or attempted murder cases” according to the district attorney’s office, and a similar number “relate to sex crimes.” The argument, of course, is that the district attorney’s office would have an easier time solving crimes if they had access to these phones… Apple believes being forced to hack into phones at the government’s will is an unreasonable burden. ZDNet adds that “the call for federal legislation could be given a popular boost by president elect Donald Trump, who previously called for a boycott on Apple products when it refused to help the FBI.” Read more of this story at Slashdot.

See more here:
New York’s District Attorney: Roll Back Apple’s iPhone Encryption

Feds Walk Into a Building, Demand Everyone’s Fingerprints To Open Phones

An anonymous Slashdot reader quotes the Daily Herald: Investigators in Lancaster, California, were granted a search warrant last May with a scope that allowed them to force anyone inside the premises at the time of search to open up their phones via fingerprint recognition, Forbes reported Sunday. The government argued that this did not violate the citizens’ Fifth Amendment protection against self incrimination because no actual passcode was handed over to authorities… “I was frankly a bit shocked, ” said Andrew Crocker, a staff attorney at the Electronic Frontier Foundation, when he learned about the scope of search warrant. “As far as I know, this warrant application was unprecedented”… He also described requiring phones to be unlocked via fingerprint, which does not technically count as handing over a self-incriminating password, as a “clever end-run” around constitutional rights. Read more of this story at Slashdot.

More:
Feds Walk Into a Building, Demand Everyone’s Fingerprints To Open Phones