ATM ‘jackpotting’ hacks reach the US

For some ATM thieves, swiping card data involves too much patience — they’d rather just take the money and run. The US Secret Service has warned ATM makers Diebold Nixdorf and NCR that “jackpotting” hacks, where crooks force machine to cough up large sums of cash, have reached the US after years of creating problems in Asia, Europe and Mexico. The attacks have focused largely on Diebold’s front-loading Opteva ATMs in stand-alone locations, such as retail stores and drive-thrus, and have relied on an combination of malware and hardware to pull off heists. In previous attacks, the thieves disguised themselves as technicians to avoid drawing attention. After that, they hooked up a laptop with a mirror image of the ATM’s operating system and malware (Diebold also mentioned replacing the hard drive outright). Security researcher Brian Krebs understands American ATMs have been hit with Ploutus.D, a variant of “jackpotting” malware that first launched in 2013. The mirror image needs to be paired with the ATM to work, but that’s not as difficult as you might think — the intruders used endoscopes to find and press the necessary reset button inside the machine. Once done, they attached keyboards and used activation codes to clean out ATMs within a matter of minutes. NCR hasn’t been explicitly targeted in these attacks, but it warned that this was an “industry-wide issue” and urged caution from companies using its ATMs. It’s definitely possible to thwart attacks like this. The Secret Service warned that ATMs still using Windows XP were particularly easy targets, and that updating to Windows 7 (let alone Windows 10) would protect against these specific attacks. Diebold also recommended updating to newer firmware and using the most secure configurations possible. And both organizations recommended physical security changes, such as using rear-loading ATMs, locking down physical access and closely watching for suspicious activity like opening the machine’s top. The catch, of course, is that ATM operators either haven’t been diligent or may have a hard time justifying the updates. It’s telling that victim machines have been running XP, a 16-year-old platform whose official support ended in 2014 — the odds aren’t high that companies will keep their ATMs up to date, let alone replace them with more secure models or institute advanced defenses. You may not see a widespread attempt to combat jackpotting in the US until the problem becomes too large to ignore. Via: Reuters Source: Krebs on Security

Continue reading here:
ATM ‘jackpotting’ hacks reach the US

Number of Births in Japan To Hit Record Low in 2017

An anonymous reader shares a report: The number of births in Japan this year has fallen to is lowest since records began more than a century ago with about 941, 000 new babies, the health ministry said on Friday, proof if any were needed that it faces an ageing and shrinking population. The number of births will be about 4 percent lower than last year and the lowest since the government started compiling data in 1899, the ministry said. Read more of this story at Slashdot.

View post:
Number of Births in Japan To Hit Record Low in 2017

China’s most popular game is about to launch in the US

You might not have even heard of Arena of Valor (outside of a Twitch tourney ), but it’s all-consuming in its native China, with 200 million registered players and over 80 million daily active users. Tencent’s mobile-only MOBA game, known as Honor of Kings in its original form, is so popular in its homeland that tournaments are everywhere and the game has time limits to prevent kids from playing too long. And now, Tencent wants it to become a household name in the rest of the world. In a confirmation of some earlier rumors , the tech giant is formally launching Arena of Valor worldwide on December 19th, with users in North and South America getting their first crack at the Android and iOS hit. Watch Arena of Valor MAJOR Announcement & Giveaways! from ArenaofValor on www.twitch.tv Arena sticks to Honor’s core MOBA formula, where teams of five distinctive heroes clash in a bid to take over each other’s bases. The largest change is a cultural one: Arena drops Chinese legends in favor of Western fantasy tropes, and it switches to Facebook for connecting friends instead of WeChat. The game has been available in Europe since August, and has had at least some success with more than 2 million downloads. The problem, as The Verge notes, is that Chinese companies have historically had problems translating the success of their domestic games to an international audience. The titles rarely have any name recognition outside of China, and there are differences in gaming habits that make success difficult. Where limited access to games has led to MOBAs becoming wildly popular on phones in China, there’s a stigma against mobile gaming in North America. Tencent is creating an eSports league to boost competitive play and is partnering with livestreamers to drum up hype, but there’s no guarantee of success — certainly not when it has to take on established titles like Vainglory . However, it’s the attempt that matters. Chinese behemoths like Tencent know they’ll have to move beyond their home turf to keep growing, and that means doing more than acquiring foreign companies (Tencent owns League of Legends ‘ Riot Games and a piece of Activision Blizzard) to ride on their successes. Source: The Verge , Twitch

Read more here:
China’s most popular game is about to launch in the US

Toyota plans to offer more than 10 EV models by the early 2020s

Toyota recently hinted that it was finally ready to embrace pure electric cars , and now we have a better sense of what that commitment entails. The automaker has outlined its goals for low- and zero-emission cars in the next decade, and it expects to field “more than 10” EVs worldwide by the early 2020s, starting with China before spreading to markets like Europe, Japan and the US. And by 2025, every Toyota and Lexus will either be EV-only or have an electrified option like a hybrid or hydrogen fuel cell . Not that the company’s goals are especially ambitious. It hopes to have sold somewhere over 1 million zero-emission cars (either pure EVs or hydrogen models) by 2030, and 5.5 million with some kind of electric powerplant. That sounds like a lot, but it’s fairly modest in practice. Ford has said that it wants at least 10 percent of its sales to be EVs by 2020, while GM hopes to have 20 EVs on the market by 2023. And of course, Tesla may well beat Toyota’s numbers far in advance. There were roughly half a million Model 3 reservations by August , and that’s not including other EV models. Nonetheless, the targets are important. Even though Toyota is hedging its bets by making hydrogen a part of its future, it’s treating EVs as a significant part of its lineup. And when Toyota is clearly one of the world’s largest car brands, that’s bound to make an impact on what people drive. You may at least consider an electrified car where it wasn’t an option before. Source: Toyota

Read this article:
Toyota plans to offer more than 10 EV models by the early 2020s

FBI arrests UK security researcher who stopped WannaCry outbreak (Updated)

Marcus Hutchins, the 23-year-old security researcher who is credited with halting the spread of the WannaCry malware program earlier this year has been arrested by the FBI while attending the DefCon security conference in Las Vegas, Motherboard reports . This is a developing story and details remain scarce as of the publication of this post, however The Telegraph states that “UK law enforcement and security agencies confirmed a British citizen has been arrested” as part of an ongoing FBI investigation. I can confirm @MalwareTechBlog was detained yesterday and FBI/US Marshalls won’t tell me where he is. https://t.co/lV5SxZjsRi — Andrew Mabbitt (@MabbsSec) August 3, 2017 Hutchins was hailed as a hero in May when he found the killswitch to the WannaCry virus, a malware program that had infected vulnerable targets across Europe and Asia, including the UK’s National Health Service and a Spanish telecommunications company. Hutchins, who works for Kryptos Logic, halted the virus’ spread by registering a web domain that the program’s code relied on. Motherboard reports that as of early Thursday morning Hutchins was being held in the Henderson Detention Center in Nevada, however he was later moved to an undisclosed location. “I’ve spoken to the US Marshals again and they say they have no record of Marcus being in the system. At this point we’ve been trying to get in contact with Marcus for 18 hours and nobody knows where he’s been taken, ” an unnamed friend of Hutchins told Motherboard . “We still don’t know why Marcus has been arrested and now we have no idea where in the US he’s been taken to and we’re extremely concerned for his welfare.” Engadget has reached out to Kryptos Logic and the FBI for comment. This story will be updated as they reply. Update (2:29 pm EDT): Hutchins has reportedly been located and is being held at the FBI’s Las Vegas field office. Finally located @MalwareTechBlog , he’s in the Las Vegas FBI field office. Can anyone provide legal representation? — Andrew Mabbitt (@MabbsSec) August 3, 2017 Update: (2:45 pm EDT) : The Department of Justice has just announced that Hutchins is in custody not for his role in the Wannary event but for “his role in creating and distributing the Kronos banking Trojan.” According to the DoJ, between July 2014 and July 2015 Hutchins developed the malware and shared it online. Source: Telegraph UK , Motherboard

Read the original post:
FBI arrests UK security researcher who stopped WannaCry outbreak (Updated)

Electric Vehicles Have Another Record Year, Reaching 2 Million Cars In 2016

An anonymous reader shares a report from the International Energy Agency: The number of electric cars on the roads around the world rose to 2 million in 2016, following a year of strong growth in 2015, according to the latest edition of the International Energy Agency’s Global EV Outlook. China remained the largest market in 2016, accounting for more than 40% of the electric cars sold in the world. With more than 200 million electric two-wheelers and more than 300, 000 electric buses, China is by far the global leader in the electrification of transport. China, the US and Europe made up the three main markets, totaling over 90% of all EVs sold around the world. Electric car deployment in some markets is swift. In Norway, electric cars had a 29% market share last year, the highest globally, followed by the Netherlands with 6.4%, and Sweden with 3.4%. The electric car market is set to transition from early deployment to mass market adoption over the next decade or so. Between 9 and 20 million electric car could be deployed by 2020, and between 40 and 70 million by 2025, according to estimates based on recent statement from carmakers. Read more of this story at Slashdot.

Read More:
Electric Vehicles Have Another Record Year, Reaching 2 Million Cars In 2016

Java 9 Delayed Due To Modularity Controversy

An anonymous reader quotes InfoWorld: Java 9 won’t be released on July 27 after all. Oracle has proposed that Java 9 Standard Edition be delayed until September 21 so the open source community that is finalizing Java 9 can address the ongoing controversy over a planned but later rejected approach to modularity, said Georges Saab, vice president of software development in the Java platform group at Oracle and chairman of the OpenJDK governing board… The [Java Platform Module System] measure was sent back to the proposal’s expert group for further discussion. Since then, the group has reached consensus on addressing the modularity concerns, Saab said. But they cannot rework Java 9 in time for the original July 27 release date… If the revised JSR 376 approved, as expected, work can proceed on implementing it in the official version of Java 9 SE. This setback for Java 9s upcoming upgrade, however, should just be temporary, with Oracle expecting a more rapid cadence of Java SE releases going forward, Saab said. Read more of this story at Slashdot.

View original post here:
Java 9 Delayed Due To Modularity Controversy

‘WannaCry’ ransomware attack spreads worldwide (update)

England’s healthcare system came under a withering cyberattack Friday morning, with ” at least 25 ” hospitals across the country falling prey to ransomware that locked doctors and employees out of critical systems and networks. The UK government now reports that this is not a (relatively) isolated attack but rather a single front in a massive regionwide digital assault. #nhscyberattack pic.twitter.com/SovgQejl3X — gigi.h (@fendifille) May 12, 2017 The attack has impacted hospitals and transportation infrastructure across Europe, Russia and Asia. Organizations in dozens of countries have all been hit with the same ransomware program, a variant of the WannaCry virus, spouting the same ransom note and demanding $300 for the encryption key, with the demand escalating as time passes. The virus’s infection vector appears to through a known vulnerability, originally exploited and developed by the National Security Agency. That information was subsequently leaked by the hacking group known as Shadow Broker which has been dumping its cache of purloined NSA hacking tools onto the internet since last year. The virus appears to have originally spread via email as compressed file attachment so, like last week’s Google Docs issue, make sure you confirm that you email’s attachments are legit before clicking on them. Also, make sure your computers are using software that’s still receiving security updates, and that you’ve installed the latest updates available. Microsoft released a fix for the exploit used as a part of its March “Patch Tuesday” release, but unpatched Windows systems remain vulnerable. Update : Reuters reports a statement from Microsoft indicating that engineers have added detection and protection against the “Ransom:Win32.WannaCrypt” malware, so make sure your Windows Defender or other antivirus is updated before logging on to any corporate networks that may be infected. In a statement, a FedEx representative confirmed its systems are being impacted, saying “Like many other companies, FedEx is experiencing interference with some of our Windows-based systems caused by malware. We are implementing remediation steps as quickly as possible. We regret any inconvenience to our customers.” Source: New York Times

Originally posted here:
‘WannaCry’ ransomware attack spreads worldwide (update)

‘WannaCry’ ransomware attack spreads worldwide (update)

England’s healthcare system came under a withering cyberattack Friday morning, with ” at least 25 ” hospitals across the country falling prey to ransomware that locked doctors and employees out of critical systems and networks. The UK government now reports that this is not a (relatively) isolated attack but rather a single front in a massive regionwide digital assault. #nhscyberattack pic.twitter.com/SovgQejl3X — gigi.h (@fendifille) May 12, 2017 The attack has impacted hospitals and transportation infrastructure across Europe, Russia and Asia. Organizations in dozens of countries have all been hit with the same ransomware program, a variant of the WannaCry virus, spouting the same ransom note and demanding $300 for the encryption key, with the demand escalating as time passes. The virus’s infection vector appears to through a known vulnerability, originally exploited and developed by the National Security Agency. That information was subsequently leaked by the hacking group known as Shadow Broker which has been dumping its cache of purloined NSA hacking tools onto the internet since last year. The virus appears to have originally spread via email as compressed file attachment so, like last week’s Google Docs issue, make sure you confirm that you email’s attachments are legit before clicking on them. Also, make sure your computers are using software that’s still receiving security updates, and that you’ve installed the latest updates available. Microsoft released a fix for the exploit used as a part of its March “Patch Tuesday” release, but unpatched Windows systems remain vulnerable. Update : Reuters reports a statement from Microsoft indicating that engineers have added detection and protection against the “Ransom:Win32.WannaCrypt” malware, so make sure your Windows Defender or other antivirus is updated before logging on to any corporate networks that may be infected. In a statement, a FedEx representative confirmed its systems are being impacted, saying “Like many other companies, FedEx is experiencing interference with some of our Windows-based systems caused by malware. We are implementing remediation steps as quickly as possible. We regret any inconvenience to our customers.” Source: New York Times

Follow this link:
‘WannaCry’ ransomware attack spreads worldwide (update)

‘WannaCry’ ransomware attack spreads worldwide (update)

England’s healthcare system came under a withering cyberattack Friday morning, with ” at least 25 ” hospitals across the country falling prey to ransomware that locked doctors and employees out of critical systems and networks. The UK government now reports that this is not a (relatively) isolated attack but rather a single front in a massive regionwide digital assault. #nhscyberattack pic.twitter.com/SovgQejl3X — gigi.h (@fendifille) May 12, 2017 The attack has impacted hospitals and transportation infrastructure across Europe, Russia and Asia. Organizations in dozens of countries have all been hit with the same ransomware program, a variant of the WannaCry virus, spouting the same ransom note and demanding $300 for the encryption key, with the demand escalating as time passes. The virus’s infection vector appears to through a known vulnerability, originally exploited and developed by the National Security Agency. That information was subsequently leaked by the hacking group known as Shadow Broker which has been dumping its cache of purloined NSA hacking tools onto the internet since last year. The virus appears to have originally spread via email as compressed file attachment so, like last week’s Google Docs issue, make sure you confirm that you email’s attachments are legit before clicking on them. Also, make sure your computers are using software that’s still receiving security updates, and that you’ve installed the latest updates available. Microsoft released a fix for the exploit used as a part of its March “Patch Tuesday” release, but unpatched Windows systems remain vulnerable. Update : Reuters reports a statement from Microsoft indicating that engineers have added detection and protection against the “Ransom:Win32.WannaCrypt” malware, so make sure your Windows Defender or other antivirus is updated before logging on to any corporate networks that may be infected. In a statement, a FedEx representative confirmed its systems are being impacted, saying “Like many other companies, FedEx is experiencing interference with some of our Windows-based systems caused by malware. We are implementing remediation steps as quickly as possible. We regret any inconvenience to our customers.” Source: New York Times

Original post:
‘WannaCry’ ransomware attack spreads worldwide (update)