Crypto-Ransomware Encrypts Files "Offline"

An anonymous reader writes: Ransomware comes in various forms, and not all ransomware encrypts files — some just block computers until the ransom is paid. When the file encryption feature is included, the encryption key is usually sent to the malware’s C&C server, which is controlled by the crooks — but not always. Researchers have recently analyzed a crypto-ransomware sample that demonstrated an alternative method of encrypting files and delivering the key (i.e., the information required to discover the right key) to the criminal behind the scheme — it doesn’t need to contact a C&C to receive an encryption key or to send it to the crook. Read more of this story at Slashdot.

Visit link:
Crypto-Ransomware Encrypts Files "Offline"

Somebody Just Claimed a $1 Million Bounty For Hacking the iPhone

citadrianne writes with news that security startup Zerodium has just paid a group of hackers $1 million for finding a remote jailbreak of an iPhone running iOS 9. Vice reports: “Over the weekend, somebody claimed the $1 million bounty set by the new startup Zerodium, according to its founder Chaouki Bekrar, a notorious merchant of unknown, or zero-day, vulnerabilities. The challenge consisted of finding a way to remotely jailbreak a new iPhone or iPad running the latest version of Apple’s mobile operating system iOS (in this case iOS 9.1 and 9.2b), allowing the attacker to install any app he or she wants app with full privileges. The initial exploit, according to the terms of the challenge, had to come through Safari, Chrome, or a text or multimedia message. This essentially meant that a participant needed to find a series, or a chain, of unknown zero-day bugs.” Read more of this story at Slashdot.

Continued here:
Somebody Just Claimed a $1 Million Bounty For Hacking the iPhone

Xen Patches 7-Year-Old Bug That Shattered Hypervisor Security

williamyf writes: ArsTechinca, The Register, and other outlets are reporting that today the XEN project patched a vulnerability in the ParaVirtualized VMs that allowed a guest to access the control OS of the hypervisor. Qubes researchers wrote: “On the other hand, it is really shocking that such a bug has been lurking in the core of the hypervisor for so many years. In our opinion the Xen project should rethink their coding guidelines and try to come up with practices and perhaps additional mechanisms that would not let similar flaws to plague the hypervisor ever again”. Read more of this story at Slashdot.

View post:
Xen Patches 7-Year-Old Bug That Shattered Hypervisor Security

Apple Tells US Judge It’s ‘Impossible’ To Break Through Locks On New iPhones

An anonymous reader writes: Apple told a U.S. judge that accessing data stored on a locked iPhone would be “impossible” with devices using its latest operating system, but the company has the “technical ability” to help law enforcement unlock older phones. Apple’s position was laid out in a brief filed late Monday, after a federal magistrate judge in Brooklyn, New York, sought its input as he weighed a U.S. Justice Department request to force the company to help authorities access a seized iPhone during an investigation. In court papers, Apple said that for the 90 percent of its devices running iOS 8 or higher, granting the Justice Department’s request “would be impossible to perform” after it strengthened encryption methods. Read more of this story at Slashdot.

Read this article:
Apple Tells US Judge It’s ‘Impossible’ To Break Through Locks On New iPhones

Build a Simple Door Detector with IFTTT Alerts Using an Arduino

One of the essential parts of any home security system is a door detector that lets you know when a door opens. Over on Adafruit, they show you how to build your own that hooks into IFTTT so you can be alerted any way you like when the door opens. Read more…

Follow this link:
Build a Simple Door Detector with IFTTT Alerts Using an Arduino

Russian hackers reportedly stole stock trading info from Dow Jones

Last week, Dow Jones (owner of The Wall Street Journal among other things) said that its customer database was hacked — but it’s possible the company has been contending with a much bigger data breach for a long time now. According to Bloomberg , the FBI, Secret Service, and SEC have all been investigating a theft of data from Dow Jones by Russian hackers who wanted to access insider trading information. There’s a bit of a twist to the story, however: Dow Jones is strongly denying the Bloomberg report. In a statement, Dow Jones says: “to the best of our knowledge, we have received no information from the authorities about any such alleged matter, and we are looking into whether there is any truth whatsoever to this report by a competitor news organization.” Despite that strong denial (and shade thrown at Bloomberg’s reporting), CNBC received confirmation from the FBI’s New York office that it was indeed aware of the hack and investigating it. For months, the FBI and SEC have been trying to determine exactly what sort of data was accessed and how the hackers could have profited from the breach. Some of Bloomberg’s sources claimed that the hackers were able to view news stories not yet released for publication, some of which could have provided information and news about companies that hadn’t been released to the public. And this isn’t the first hack centered around finding insider info: earlier this year, Ukrainian hackers infiltrated servers from PR companies like PR Newswire and Businesswire for five years to access unreleased press releases from major corporations. [Image credit: AP/Mary Altaffer] Source: Bloomberg , CNBC

See the article here:
Russian hackers reportedly stole stock trading info from Dow Jones

Apple already blocked the first malware for non-jailbroken iPhones

With certain exceptions , most iOS-focused malware targets jailbroken devices whose compromised security makes them easy prey. However, there’s been concerns that a recent strain of malware, YiSpecter , can attack even ‘pure’ devices running stock iOS. Do you have to worry about catching a bug online and losing control over your device? Probably not, if you ask Apple. In a statement to The Loop , the company notes that it not only fixed the vulnerability with iOS 8.4 , but blocked the apps handing out the offending code. The victims downloaded apps from “untrusted sources” (that is, outside of the App Store) Cupertino adds. In short, Apple believes this is a non-issue as long as you install updates and stay cautious — and given that more than half of its users are already running iOS 9, it might be right. Via: AppleInsider Source: The Loop

Continued here:
Apple already blocked the first malware for non-jailbroken iPhones

Patreon Hacked, Personal Data Accessed

AmiMoJo writes: In a blog post Jake Conte, CEO and co-founder of Patreon, writes: “There was unauthorized access to registered names, email addresses, posts, and some shipping addresses. Additionally, some billing addresses that were added prior to 2014 were also accessed. We do not store full credit card numbers on our servers and no credit card numbers were compromised. Although accessed, all passwords, social security numbers and tax form information remain safely encrypted with a 2048-bit RSA key.” Read more of this story at Slashdot.

Read more here:
Patreon Hacked, Personal Data Accessed

How the Newest Generation of Credit Cards Protects Your Information From Getting Stolen

Have you had your credit card info stolen recently? You’re not alone. It’s happened to me a couple of times in the past year, and it’s annoying as hell. Thankfully, credit card companies are finally tackling this issue head on, with technology that’s just now reaching the U.S. in full force. Read more…

Continued here:
How the Newest Generation of Credit Cards Protects Your Information From Getting Stolen