Daily NCSC-FI news followup 2020-11-29

Hacker Lexicon: What Is the Signal Encryption Protocol?

www.wired.com/story/signal-encryption-protocol-hacker-lexicon/ LAST WEEK, WITH little fanfare, Google announced a change that could soon make its 2 billion Android users worldwide far harder to surveil: The tech giant says it’s rolling out a beta version of its Android messaging app that will now use end-to-end encryption by default. That level of encryption, while limited to one-on-one conversations, is designed to prevent anyone else from eavesdroppingnot phone carriers, not intelligence agencies, not a hacker who has taken over the local Wi-Fi router, not even Google itself will have the keys to decrypt and read those billions of messages.. The news isn’t just a win for global privacy. It’s also a win for one particular encryption system: the Signal protocol, which is well on its way to accounting for a majority of the world’s real-time text conversations.

Älypuhelimeen saa ujutettua haittaohjelman tavalla, jota useimmat eivät tule ajatelleeksi

www.is.fi/digitoday/tietoturva/art-2000007646405.html Älypuhelimen kameralla skannattavat qr-koodit, eli neliönmuotoiset hieroglyfit ovat yleinen tapa avata esimerkiksi verkkosivu puhelimen selaimessa. Tämän tietävät myös rikolliset, tietoturvayhtiö Check Point varoittaa. On muistettava, ettei qr-koodi ole muuta kuin nopea ja kätevä tapa käyttää nettipalveluja. Emme voi olla varmoja, että koodi on aito ennen kuin olemme jo skannanneet sen ja silloin hyökkäys on jo voinut käynnistyä, toteaa Check Point Softwaren Suomen maajohtaja Sampo Vehkaoja tiedotteessa.

Quick Tip: Using JARM With a SOCKS Proxy

isc.sans.edu/forums/diary/Quick+Tip+Using+JARM+With+a+SOCKS+Proxy/26834/ Rik talked about JARM yesterday “Threat Hunting with JARM”. JARM is a tool to fingerprint TLS servers. I made some changes to the JARM code to support a SOCKS proxy.

The Top 20 Cybersecurity Startups To Watch In 2021 Based On Crunchbase

www.forbes.com/sites/louiscolumbus/2020/11/29/the-top-20-cybersecurity-startups-to-watch-in-2021-based-on-crunchbase/ Today, 797 cybersecurity, privacy and security startups have received a total of $10.73 billion so far this year, with $4.6 million being the median funding round and $17.5 million the average funding round for a startup. The number of startups receiving funding this year, funding amounts and the methodology to find the top 25 cybersecurity startups are all based on Crunchbase Pro analysis done today. New startups and established vendors are attracting record levels of investment as all organizations look to thwart increasingly complex, costly and unpredictable cyberattacks.

HS: Kansainvälinen sijoitushuijausverkosto vienyt suomalaisilta kymmeniätuhansia euroja

yle.fi/uutiset/3-11671748? Sadat suomalaiset ovat menettäneet merkittäviä summia rahaa bitcoin-sijoitushuijausverkoston uhreina. Näin kertoo Helsingin Sanomat, joka on selvittänyt asiaa kansainvälisen toimittajaryhmän kanssa. HS:n lainaamien viranomaisarvioiden mukaan suomalaisten menetykset nousevat kymmeniintuhansiin euroihin. Maailmanlaajuisesti huijauksen uhreilta on kiskottu vuosittain miljardeja euroja.

Pennsylvania county pays 500K ransom to DoppelPaymer ransomware

www.bleepingcomputer.com/news/security/pennsylvania-county-pays-500k-ransom-to-doppelpaymer-ransomware/ Delaware County, Pennsylvania has paid a $500,000 ransom after their systems were hit by the DoppelPaymer ransomware last weekend. On Monday, Delaware County disclosed that they had taken portions of their computer network offline after discovering that their network was compromised. “The County of Delaware recently discovered a disruption to portions of its computer network. We commenced an immediate investigation that included taking certain systems offline and working with computer forensic specialists to determine the nature and scope of the event. We are working diligently to restore the functionality of our systems,” the Delaware County alert stated.

You might be interested in …

Daily NCSC-FI news followup 2019-10-03

Casbaneiro: Dangerous cooking with a secret ingredient www.welivesecurity.com/2019/10/03/casbaneiro-trojan-dangerous-cooking/ Casbaneiro, also known as Metamorfo, is a typical Latin American banking trojan that targets banks and cryptocurrency services in Brazil and Mexico (Figure 1). It uses the social engineering method described in the introduction to our previous article, where fake pop-up windows are displayed. Just a GIF […]

Read More

Daily NCSC-FI news followup 2021-03-09

Dangerous Malware Dropper Found in 9 Utility Apps on Googles Play Store blog.checkpoint.com/2021/03/09/dangerous-malware-dropper-found-in-9-utility-apps-on-googles-play-store/ Check Point Research (CPR) recently discovered a new dropper spreading via the Google Play store. The dropper, dubbed Clast82, has the ability to avoid detection by Google Play Protect, complete the evaluation period successfully, and change the payload dropped from a non-malicious […]

Read More

Daily NCSC-FI news followup 2020-10-28

Vastaamo-kiristäjä pysyi piilossa vaikka lunnaiden maksuaika umpeutui nyt uhkana uhrien identiteettivarkaudet yle.fi/uutiset/3-11618253 Kiristäjä ei tiettävästi julkaissut uusia henkilötietoja tai potilaskertomuksia tiistaina, kuten uhkasi. Vastaamo-kiristyksen uhrien tietoja levitetään nyt uudella tavalla asiantuntijat: Harkitse tarkkaan, mitä kirjoitat someen www.is.fi/digitoday/art-2000006702529.html Tiedetään, että idiootit pimeässä verkossa ovat jo levittäneet poliisien, kansanedustajien ja muiden julkisuuden henkilöiden potilastietoja, sanoo F-Securen tietoturvajohtaja […]

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.