Researchers Find New Version Of WanaDecrypt0r Ransomware Without A Kill Switch

Remember that “kill switch” which shut down the WannCry ransomware? An anonymous reader quotes Motherboard: Over Friday and Saturday, samples of the malware emerged without that debilitating feature, meaning that attackers may be able to resume spreading ransomware even though a security researcher cut off the original wave. “I can confirm we’ve had versions without the kill switch domain connect since yesterday, ” Costin Raiu, director of global research and analysis team at Kaspersky Lab told Motherboard on Saturday… Another researcher confirmed they have seen samples of the malware without the killswitch. Read more of this story at Slashdot.

Read More:
Researchers Find New Version Of WanaDecrypt0r Ransomware Without A Kill Switch

FTC Takes D-Link To Court Citing Lax Product Security, Privacy Perils

Reader coondoggie writes: The Federal Trade Commission has filed a complaint against network equipment vendor D-Link saying inadequate security in the company’s wireless routers and Internet cameras left consumers open to hackers and privacy violations. The FTC, in a complaint filed in the Northern District of California charged that “D-Link failed to take reasonable steps to secure its routers and Internet Protocol (IP) cameras, potentially compromising sensitive consumer information, including live video and audio feeds from D-Link IP cameras.” For its part, D-Link Systems said it “is aware of the complaint filed by the FTC.” According to the FTC’s complaint, D-Link promoted the security of its routers on the company’s website, which included materials headlined “Easy to secure” and “Advance network security.” But despite the claims made by D-Link, the FTC alleged, the company failed to take steps to address well-known and easily preventable security flaws such as “hard-coded” login credentials integrated into D-Link camera software — such as the username âoeguestâ and the password âoeguestâ — that could allow unauthorized access to the cameras’ live feed, etc. Read more of this story at Slashdot.

See the original article here:
FTC Takes D-Link To Court Citing Lax Product Security, Privacy Perils

Western Digital To Aquire SanDisk For $19 Billion

 Western Digital just bought a bunch of memory cards. The storage giant just announced that it has agreed to buy SanDisk Corp for about $19 billion. This comes after speculation that SanDisk was shopping for a buyer. The deal values SanDisk at $86.50 a share, which is a 15% premium on the previous day’s closing price, giving the company a value of $15.4 billion. SanDisk is currently up… Read More

Read More:
Western Digital To Aquire SanDisk For $19 Billion

Private Medical Data of Over 1.5 Million People Exposed Through Amazon 

Police injury reports, drug tests, detailed doctor visit notes, social security numbers—all were inexplicably unveiled on a public subdomain of Amazon Web Services . Welcome to the next big data breach horrorshow. Instead of hackers, it’s old-fashioned neglect that exposed your most sensitive information. Read more…

More:
Private Medical Data of Over 1.5 Million People Exposed Through Amazon 

TrueCrypt Gets a New Life, New Name

storagedude writes: Amid ongoing security concerns, the popular open source encryption program TrueCrypt may have found new life under a new name. Under the terms of the TrueCrypt license — which was a homemade open source license written by the authors themselves rather than a standard one — a forking of the code is allowed if references to TrueCrypt are removed from the code and the resulting application is not called TrueCrypt. Thus, CipherShed will be released under a standard open source license, with long-term ambitions to become a completely new product. Read more of this story at Slashdot.

Read More:
TrueCrypt Gets a New Life, New Name

Congressman Asks NSA To Provide Metadata For "Lost" IRS Emails

An anonymous reader writes in with news that the IRS lost email scandal is far from over. Representative Steve Stockman (R-TX) has sent a formal letter to the National Security Agency asking it to hand over “all its metadata” on the e-mail accounts of a former division director at the Internal Revenue Service. “Your prompt cooperation in this matter will be greatly appreciated and will help establish how IRS and other personnel violated rights protected by the First Amendment, ” Stockman wrote on Friday. The request came hours after the IRS told a congressional committee that it had “lost” all of the former IRS Exempt Organizations division director’s e-mails between January 2009 and April 2011. Read more of this story at Slashdot.

View post:
Congressman Asks NSA To Provide Metadata For "Lost" IRS Emails

FBI’s Smartphone Surveillance Tool Explained In Court Battle

concealment writes with news that a court battle has brought to light details on how the FBI’s “stingray” surveillance tool works, and how they used it with Verizon’s help to collect evidence about an alleged identity thief. Quoting: “Air cards are devices that plug into a computer and use the wireless cellular networks of phone providers to connect the computer to the internet. The devices are not phones and therefore don’t have the ability to receive incoming calls, but in this case Rigmaiden asserts that Verizon reconfigured his air card to respond to surreptitious voice calls from a landline controlled by the FBI. The FBI calls, which contacted the air card silently in the background, operated as pings to force the air card into revealing its location. In order to do this, Verizon reprogrammed the device so that when an incoming voice call arrived, the card would disconnect from any legitimate cell tower to which it was already connected, and send real-time cell-site location data to Verizon, which forwarded the data to the FBI. This allowed the FBI to position its stingray in the neighborhood where Rigmaiden resided. The stingray then “broadcast a very strong signal” to force the air card into connecting to it, instead of reconnecting to a legitimate cell tower, so that agents could then triangulate signals coming from the air card and zoom-in on Rigmaiden’s location. To make sure the air card connected to the FBI’s simulator, Rigmaiden says that Verizon altered his air card’s Preferred Roaming List so that it would accept the FBI’s stingray as a legitimate cell site and not a rogue site, and also changed a data table on the air card designating the priority of cell sites so that the FBI’s fake site was at the top of the list.” Read more of this story at Slashdot.

Continued here:
FBI’s Smartphone Surveillance Tool Explained In Court Battle

Loss of a Single Laptop Leads to $50k Fine Against Idaho Hospice

netbuzz writes “Losing a single laptop containing sensitive personal information about 441 patients will cost a non-profit Idaho hospice center $50,000, marking the first such HIPAA-related penalty involving fewer than 500 data-breach victims. Yes, the data was not encrypted. ‘This action sends a strong message to the health care industry that, regardless of size, covered entities must take action and will be held accountable for safeguarding their patients’ health information,’ says the Department of Health and Human Services.” Read more of this story at Slashdot.

Read the original:
Loss of a Single Laptop Leads to $50k Fine Against Idaho Hospice