UK police crack down on people paying for DDoS attacks

Distributed Denial of Service (DDoS) attacks are on the rise, affecting individuals , private businesses and government-funded institutions alike. As part of a large warning to cybercriminals, the UK’s National Crime Agency (NCA) has arrested 12 individuals for using a DDoS-for-hire service called Netspoof. “Operation Vulcanialia” targeted 60 citizens in total, and led to 30 cease and desist notices, and the seizure of equipment from 11 suspects. The NCA says it had two focuses: arresting repeat offenders and educating first-time users about the consequences of cybercrime. The work formed part of Operation Tarpit , a larger effort co-ordinated by Europol. Law enforcement agencies from Australia, Belgium, France, Hungary, Lithuania, the Netherlands, Norway, Portugal, Spain, Sweden, the UK and the US targeted users of DDoS tools together, resulting in 34 arrests and 101 suspects being interviewed and cautioned. The UK’s contribution was spearheaded by intelligence gathered by the West Midlands Regional Cyber Crime Unit, and executed by Regional Organised Crime Units under the watchful eye of the NCA. Some of the arrests were detailed in a press release — all but one was under the age of 30. Netspoof allowed anyone to initiate potentially devastating DDoS attacks from as little as £4. Packages soared to as much as £380, however, depending on the user’s requirements. It meant almost anyone, regardless of their technical background, could take down sites and services by flooding them with huge amounts of data. The trend is representative of the increase in cybercrime and how easy it is for people to wield such powers. DDoS attacks aren’t comparable to hacking, but they’re still a worrisome tactic for businesses. Knocking a service offline can affect a company’s finances and reputation, angering customers in the process. Twelve arrests is by no means insignificant, but it almost certainly represents a small number of DDoS users. Still, it’s a warning shot from the NCA — it’s aware of the problem, and officers are putting more resources into tracking those who both use and facilitate such attacks on the internet. Via: Ars Technica Source: Europol , NCA

Read More:
UK police crack down on people paying for DDoS attacks

How to Turn a USB Stick into an Ultra Portable PC

Image: Gizmodo Who doesn’t hate carrying around their laptop? Even the lightest ones weigh a couple of pounds and can be a huge burden to lug around the city. That’s where portable apps, ones stored on a USB drive, come in. Read more…

Read More:
How to Turn a USB Stick into an Ultra Portable PC

There’s A New Way People Can Break Into Cars With Keyless Entry Systems And Drive Off

It’s freaky enough when hackers can disable brakes, control a steering wheel or shut down an engine as a vehicle goes down the road. But hacking can happen when a car is vacant, and there’s apparently a device making its way over from Europe that tricks keyless systems into unlocking and starting a car for theft. Read more…

Visit link:
There’s A New Way People Can Break Into Cars With Keyless Entry Systems And Drive Off

Bank Glitch Allows Man to Spend Over $1 Million and Walk Away Free

Normally a glitch is a bad thing. Maybe it means your video game character gets stuck in a wall or maybe a glitch gets you wrongfully arrested . For an Australian man named Luke Moore, a simple bank glitch meant that he was able to blow $1.3 million on cars, travel, strippers and drugs over the course of two years. Read more…

Read More:
Bank Glitch Allows Man to Spend Over $1 Million and Walk Away Free

How to Perfectly Fake a Glowing Lightsaber in Photoshop

It’s time to face the facts: lightsabers aren’t real, and they’re simply not going to exist in your lifetime. The closest you can get to realizing your Jedi fantasies is through this excellent tutorial by Mathieu Stern showing you how to properly fake a lightsaber using Photoshop. Read more…

Continued here:
How to Perfectly Fake a Glowing Lightsaber in Photoshop

United Airlines Will Start Charging for Use of Overhead Bins

Remember your last flight when you told yourself that at least flying couldn’t get any worse? Well, it’s about to get worse. United Airlines will soon start charging some customers for the privilege to use the overhead bins . Read more…

See the article here:
United Airlines Will Start Charging for Use of Overhead Bins

How to Download Netflix Movies to Your SD Card and Save Space on Your Phone

Rejoice, you can download Netflix movies and TV shows to watch offline. Unfortunately, it only downloads to your built-in storage by default, which can lead to some slow, cluttered phones. If you’d rather use the extra space on your SD card for all those Stranger Things episodes, here’s how. Read more…

Read the original post:
How to Download Netflix Movies to Your SD Card and Save Space on Your Phone

This Biohacker Wants to Spur a Genetic Engineering Revolution With Glowing Beer

If you ask Josiah Zayner, the genetic engineering revolution will not come in the form of designer babies or mutant super crops , but in the form of a bottle of glowing beer. Read more…

More:
This Biohacker Wants to Spur a Genetic Engineering Revolution With Glowing Beer

New Stegano Exploit Kit Hides Malvertising Code In Banner Pixels

An anonymous reader quotes a report from BleepingComputer: For the past two months, a new exploit kit has been serving malicious code hidden in the pixels of banner ads via a malvertising campaign that has been active on several high profile websites. Discovered by security researchers from ESET, this new exploit kit is named Stegano, from the word steganography, which is a technique of hiding content inside other files. In this particular scenario, malvertising campaign operators hid malicious code inside PNG images used for banner ads. The crooks took a PNG image and altered the transparency value of several pixels. They then packed the modified image as an ad, for which they bought ad displays on several high-profile websites. Since a large number of advertising networks allow advertisers to deliver JavaScript code with their ads, the crooks also included JS code that would parse the image, extract the pixel transparency values, and using a mathematical formula, convert those values into a character. Since images have millions of pixels, crooks had all the space they needed to pack malicious code inside a PNG photo. When extracted, this malicious code would redirect the user to an intermediary ULR, called gate, where the host server would filter users. This server would only accept connections from Internet Explorer users. The reason is that the gate would exploit the CVE-2016-0162 vulnerability that allowed the crooks to determine if the connection came from a real user or a reverse analysis system employed by security researchers. Additionally, this IE exploit also allowed the gate server to detect the presence of antivirus software. In this case, the server would drop the connection just to avoid exposing its infrastructure and trigger a warning that would alert both the user and the security firm. If the gate server deemed the target valuable, then it would redirect the user to the final stage, which was the exploit kit itself, hosted on another URL. The Stegano exploit kit would use three Adobe Flash vulnerabilities (CVE-2015-8651, CVE-2016-1019 or CVE-2016-4117) to attack the user’s PC, and forcibly download and launch into execution various strains of malware. Read more of this story at Slashdot.

Read the original post:
New Stegano Exploit Kit Hides Malvertising Code In Banner Pixels