India’s Biggest ATM Breach? 3.2 Million Debit Cards Across 19 Banks May Have Been Compromised

A total of 32 lakh (3.2 million) debit cards across 19 banks could have been compromised on account of a purported fraud, the National Payment Corporation of India said in a statement. BloombergQuint adds: “The genesis of the problem was receipt of complaints from few banks that their customer’s cards were used fraudulently mainly in China and USA while customers were in India, ” the NPCI said. “The complaints of fraudulent withdrawal are limited to cards of 19 banks and 641 customers. The total amount involved is Rs 1.3 crore as reported by various affected banks to NPCI.” SISA Security, a Bengaluru-based company is currently undertaking a forensic study to identify the extent of the problem and will submit a final report in November. Initial reports had suggested that ATMs operated by Hitachi Payment Services had been attacked by malware and were the source of the breach. However, the company has said in a statement that an interim report by the audit agency does not suggest any breach or compromise in its systems. Read more of this story at Slashdot.

Read the article:
India’s Biggest ATM Breach? 3.2 Million Debit Cards Across 19 Banks May Have Been Compromised

Report: Russian Hackers Phished The DNC And Clinton Campaign Using Fake Gmail Forms

Citing a report from SecureWorks, BuzzFeed is reporting that Russian hackers “used emails disguised to look as Gmail security updates to hack into the computers of the Democratic National Committee and members of Hillary Clinton’s top campaign staff”: The emails were sent to 108 members of Democratic presidential nominee Hillary Clinton’s campaign and 20 people clicked on them, at least four people clicking more than once, Secureworks’ research found. The emails were sent to another 16 people from the DNC and four people clicked on them, the report said. Researchers found the emails by tracing the malicious URLs set up by [state-sponsored hacking group] Fancy Bear using Bitly, a link shortening service… “We were monitoring bit.ly and saw the accounts being created in real time, ” said Phil Burdette, a senior security researcher at SecureWorks, explaining how they stumbled upon the the URLs set up by Fancy Bear. The URL apparently resolved to accounts-google.com (rather than accounts.google.com), and Burdette says “They did a great job with capturing the look and feel of Google.” Read more of this story at Slashdot.

See the original article here:
Report: Russian Hackers Phished The DNC And Clinton Campaign Using Fake Gmail Forms

FBI Agreed To Destroy Laptops of Clinton Aides With Immunity Deal, Sources Say

An anonymous Slashdot reader quotes a report from Fox News: Immunity deals for two top Hillary Clinton aides included a side arrangement obliging the FBI to destroy their laptops after reviewing the devices, House Judiciary Committee sources told Fox News on Monday. Sources said the arrangement with former Clinton chief of staff Cheryl Mills and ex-campaign staffer Heather Samuelson also limited the search to no later than Jan. 31, 2015. This meant investigators could not review documents for the period after the email server became public — in turn preventing the bureau from discovering if there was any evidence of obstruction of justice, sources said. The Republican-led House Judiciary Committee fired off a letter Monday to Attorney General Loretta Lynch asking why the DOJ and FBI agreed to the restrictive terms, including that the FBI would destroy the laptops after finishing the search. The immunity deals for Mills and Samuelson, made as part of the FBI’s probe into Clinton’s use of a private email server when she served as secretary of state, apparently included a series of “side agreements” that were negotiated by Samuelson and Mills’ attorney Beth Wilkinson. The side deals were agreed to on June 10, less than a month before FBI Director James Comey announced that the agency would recommend no charges be brought against Clinton or her staff. Judiciary Committee aids told FoxNews.com that the destruction of the laptops is particularly troubling as it means that the computers could not be used as evidence in future legal proceedings, should new information or circumstances arise. Read more of this story at Slashdot.

Read More:
FBI Agreed To Destroy Laptops of Clinton Aides With Immunity Deal, Sources Say

Anonymous Hacker Explains His Attack On Boston Children’s Hospital

Okian Warrior writes: Martin Gottesfeld of Anonymous was arrested in connection with the Spring 2014 attacks on a number of healthcare and treatment facilities in the Boston area. The attacks were in response/defense of a patient there named Justina Pelletier. Gottesfeld now explains why he did what he did, in a statement provided to The Huffington Post. Here’s an excerpt from his statement: [Why I Knocked Boston Children’s Hospital Off The Internet] The answer is simpler than you might think: The defense of an innocent, learning disabled, 15-year-old girl. In the criminal complaint, she’s called ‘Patient A, ‘ but to me, she has a name, Justina Pelletier. Boston Children’s Hospital disagreed with her diagnosis. They said her symptoms were psychological. They made misleading statement on an affidavit, went to court, and had Justina’s parents stripped of custody. They stopped her painkillers, leaving her in agony. They stopped her heart medication, leaving her tachycardic. They said she was a danger to herself, and locked her in a psych ward. They said her family was part of the problem, so they limited, monitored, and censored her contact with them…” Read more of this story at Slashdot.

Visit site:
Anonymous Hacker Explains His Attack On Boston Children’s Hospital

Colin Powell’s Private Email Account Has Been Hacked

According to The New York Times, Former Secretary of State Colin Powell has been hacked and a password-protected archive of his personal emails has been published by DC Leaks. The Verge reports: DC Leaks is the same site that first published emails stolen from the Democratic National Committee, which many took as an explicit effort to influence the U.S. election process. Many experts in the U.S. intelligence apparatus have attributed that attack to the Russian government, although no public attribution has been made. Thus far, there’s no evidence tying Powell’s hack to Russia, and similar hacks have been carried out by mischievous teens without government affiliation. The immediate result of the hack has been political fallout for Powell himself. Last night, BuzzFeed News reported on an email in which Powell called Republican nominee Donald Trump a “national disgrace, ” and another in which he said the candidate was “in the process of destroying himself.” Read more of this story at Slashdot.

See original article:
Colin Powell’s Private Email Account Has Been Hacked

Half Of People Click Anything Sent To Them

Want to know why phishing continues to be one of the most common security issue? Half of the people will click on anything without thinking twice ArsTechnica reports: A study by researchers at a university in Germany found that about half of the subjects in a recent experiment clicked on links from strangers in e-mails and Facebook messages — even though most of them claimed to be aware of the risks. The researchers at the Friedrich-Alexander University (FAU) of Erlangen-Nuremberg, Germany, led by FAU Computer Science Department Chair Dr Zinaida Benenson, revealed the initial results of the study at this month’s Black Hat security conference. Simulated “spear phishing” attacks were sent to 1, 700 test subjects — university students — from fake accounts. The e-mail and Facebook accounts were set up with the ten most common names in the age group of the targets. The Facebook profiles had varying levels of publicly accessible profile and timeline data — some with public photos and profile photos, and others with minimal data. The messages claimed the links were to photos taken at a New Year’s Eve party held a week before the study. Two sets of messages were sent out: in the first, the targets were addressed by their first name; in the second, they were not addressed by name, but more general information about the event allegedly photographed was given. Links sent resolved to a webpage with the message “access denied, ” but the site logged the clicks by each student. Read more of this story at Slashdot.

More here:
Half Of People Click Anything Sent To Them

North Korea’s ‘Manbang’ is a state-approved streaming service

You can’t watch Netflix in North Korea , but the Democratic People’s Republic now has something , at least: Manbang — a state-approved set-top box that streams live TV, on-demand video content and newspaper articles over the internet. It’s a step forward for digital media delivery for North Korea , but it’s still fairly limited. Manbang, which ironically translates to “everywhere, ” is only available to citizens in Pyongynag, Siniju and Sariwon. The service’s limited availability is hardly a surprise. North Korea isn’t exactly known for having widespread internet access — and what it does have is fairly limited. That seems to be the case here, too: the service’s on-demand content seems to focus on Juche ideology and documentaries about North Korean leaders (we’re guessing The Interview won’t arrive on this service anytime soon). Viewers will also be able to call up educational programs designed to learn English and Russian. Naturally, the device isn’t being marketed so much as a propaganda delivery system as a convenience — North Korea’s KCTV describes Manbang as a respite from the “radio interference” that makes television broadcasts unwatchable in border cities. That sounds all well and good for citizens who want to watch what the state wants them to watch. As for everybody else? Well, there are options . Source: NK News

View original post here:
North Korea’s ‘Manbang’ is a state-approved streaming service

Personal Information of Nearly 200 Democrats Leaked in Latest Hack

We already knew that a recent hack that targeted Democratic officials was going to be more than just access to possibly incriminating emails, but we didn’t realize it would be this soon. Read more…

More:
Personal Information of Nearly 200 Democrats Leaked in Latest Hack

Notorious Group OurMine Hacks TechCrunch

Prominent technology blog TechCrunch — which is often cited on Slashdot — has become the latest victim of the OurMine hacking group. The notorious group gained access to Seattle-based writer Devin Coldewey’s account, and posted the following message earlier today: “Hello Guys, don’t worry we are just testing techcrunch security, we didn’t change any passwords, please contact us.” The post was then promoted as a ticker, the top banner in red and as the main story on TechCrunch’s front page. BetaNews adds: The OurMine website says that the group offers “top notch vulnerability assessment”, so it’s possible that the hack was little more than a PR stunt touting for business. It did not take TechCrunch long to notice and remove the story (and presumably change a series of passwords…) but the site is yet to issue a statement about what has happened. Read more of this story at Slashdot.

More:
Notorious Group OurMine Hacks TechCrunch

New evidence suggests DNC hackers penetrated deeper than previously thought

The suspected hacking of a Democratic National Committee consultant’s personal Yahoo Mail account provides new evidence that state-sponsored attackers penetrated deeper than previously thought into the private communications of the political machine attempting to defeat Republican nominee Donald Trump. According to an article published Monday by Yahoo News, the suspicion was raised shortly after DNC consultant Alexandra Chalupa started preparing opposition research on Trump Campaign Chairman Paul Manafort. Upon logging in to her Yahoo Mail account, she received a pop-up notification warning that members of Yahoo’s security team “strongly suspect that your account has been the target of state-sponsored actors.” After Chalupa started digging into Manafort’s political and business dealings in Ukraine and Russia, the warnings had become a “daily occurrence,” Yahoo News reported, citing a May 3 e-mail sent to a DNC communications director. (credit: Yahoo News) It was one of more than 19,000 private DNC messages posted to WikiLeaks on Friday. The massive e-mail dump came five weeks after DNC officials said hackers with backing from the Russian government had breached its network and made off with opposition research into Trump and almost a year’s worth of private e-mail. The airing on WikiLeaks, which included messages in which DNC officials derided Democratic candidate Bernie Sanders, has already led to the resignation of Chair Debra Wasserman Schultz. Now, the revelations about Chalupa’s Yahoo account suggest the hack may have gone deeper than previously reported. Read 3 remaining paragraphs | Comments

Read the article:
New evidence suggests DNC hackers penetrated deeper than previously thought