Category Archives: security

The 4 most popular cyber crimes

Phishing – The aim is to trick people into handing over their card details or access to protected systems. Emails are sent out that contain either links or attachments that either take you to a website that looks like your bank’s, or installs malware on your system.

A report by Verizon into data breach investigations has shown that 23% of people open phishing emails.

Identity theft – According to fraud protection agency Cifas, the number of victims rose by 31 per cent to 32,058 in the first three months of 2015. Criminals use online ‘fraud forums’ to buy and sell credit cards, email addresses and passports.

Hacking – In a Verizon study of security breaches there were 285 million data exposures, which works out to about 9 records exposed every second. 26% of these attacks were executed internally within organisations.

It is estimated that 90% of all data records that were used in a crime was a result of hackers employed by organised crime.

Online harrassment – Over half of adolescents and teens have been bullied online, while 73% of adult users have seen someone harassed in some way online and 40% have experienced it.

German cyber security watchdog raises attack alert level

Germany has raised its alert level against against cyber attacks to “heightened readiness” ahead of parliamentary elections, saying government websites are already subjected to daily assault, according to reports.

“We are noticing attacks against government networks on a daily basis,” Arne Schoenbohm, president of Germany’s Federal Office for Information Security (BSI), told the newspaper Welt am Sonntag.

BSI is in close contact with election officials, political parties and German federal states to discuss how to guard against cyber attacks and stands ready to react to potential attacks ahead of the elections, Mr Schoenbohm said.

The newspaper did not give details of the number and types of alert levels, but said the level has been raised since cyber attacks interfered in the US presidential election.

BSI could not immediately be reached for comment. It is due to hold a press conference in Hanover on Monday at CeBIT, Germany’s largest annual technology conference.

The president of Germany’s BfV domestic intelligence service, Hans-Georg Maassen, warned in late February that industrialised countries were becoming increasingly vulnerable to cyber attacks as industry increases the adoption of digital technologies.

Simple ways an SME can guard itself from cybercrimes

1. Get secure office hardware.

“In the scramble to secure the cloud, hardware is often overlooked,” says Christoph Schell, president, Americas, HP Inc. “The truth is, if you have 500 employees, it is easier to have one secure cloud structure than it is to secure 500 laptops. Reduce your risk through security-centered device management and proactive practices and policies to engage each employee in the security process.”

In addition to creating a secure network, small businesses must select secure hardware and adopt secure protocols to really protect themselves. HP Inc., has developed security software Touchpoint Manager to help companies streamline their protection policy, minimize security vulnerabilities and monitor protected systems.

2. Keep spies out of your email.

Marketers, lawyers and sales people are widely using email tracking solutions to improve sales and better engage with prospects and current clients. Those solutions are popular in CRM systems as well. But cybercriminals are also using these tools to track the date and time emails are opened, where they are opened, where they are forwarded and so forth.

MailControl allows companies to block spymail from hitting their inbox. It is an especially effective tool in preventing targeted phishing attacks from reaching your business.

3. Stop ransomware.

The most prevalent cyber security risk to small businesses today is ransomware. The FBI estimates that over 4,000 U.S. businesses are infected by ransomware every day.  Ransomware takes control of the files on small business networks by encrypting them and holding them for ransom. The existing tools, like anti-virus, are not effective against the rapidly changing variants.

WatchPoint has an easy to use tool, called CryptoStopper, which small businesses can download and install to protect their network. CryptoStopper deploys bait files throughout a network. When these bait files are encrypted, the infected user is isolated, and the ransomware is stopped before doing damage. This is a new and unique approach to stopping ransomware.

4. Train your employees.

One of the most common, and preventable, attacks on small businesses is a social-engineering attack triggered by phishing attempts, improper web use or incoming phone calls. The most current training systems on the market are designed for large enterprises, but some companies set up our solution to help any size business, from those with just a few employees to those with thousands.

Security Awareness Training — Security Mentor: Employees aren’t always ready to combat a cyberattack or know when they are being baited into one. Security Mentor has created 10-minute lessons with its Security Awareness Training program. Small businesses will be able to train employees to be aware and alert, while making the right choices in a potential cyber crisis through these brief, online lessons.

5. Get SLL for your website.

Traditionally, companies have used SSL/TLS certificates (displayed as “https”) only on shopping carts or login pages. This can help, as it encrypts the data being sent between the customer’s computer and the SMB’s web server. Also, if companies use an Extended Validation (EV) certificate, the web browser will display a green padlock and website-address bar, as well as the company’s name next to the website address.

Today, though, companies are encouraged to follow what’s known as Always on SSL. This means that the entire website is protected by https, instead of just a couple of pages. This helps protect against modern attacks that seek to steal information when a site visitor browses between secure and not-secure pages.

Finally, Dan Hubbard, product CTO of Cloud Security, Cisco Systems, shared some advice. “There are a few things small businesses can do,” he said. First, make sure you have security solutions in place that are proven to detect and stop the majority of malware — and make sure they are deployed at critical points within the company.

“Second, in terms of ransomware: Back up your data. If you have a copy of your information that the attackers can’t get to, you are not at their mercy.”

Cyber-security: Open Source Security Tools to secure networks and systems

There are thousands of open source security tools with both defensive and offensive security capabilities.

The following are 10 essential security tools that will help you to secure your systems and networks. These open source security tools have been given the essential rating due to the fact that they are effective, well supported and easy to start getting value from.

1. Nmap – map your network and ports with the number one port scanning tool. Nmap now features powerful NSE scripts that can detect vulnerabilities, misconfiguration and security related information around network services. After you have nmap installed be sure to look at the features of the included ncat – its netcat on steroids.

2. OpenVAS – open source vulnerability scanning suite that grew from a fork of the Nessus engine when it went commercial. Manage all aspects of a security vulnerability management system from web based dashboards. For a fast and easy external scan with OpenVAS try our online OpenVAS scanner.

3. OSSEC – host based intrusion detection system or HIDS, easy to setup and configure. OSSEC has far reaching benefits for both security and operations staff.

4. Security Onion – a network security monitoring distribution that can replace expensive commercial grey boxes with blinking lights. Security Onion is easy to setup and configure. With minimal effort you will start to detect security related events on your network. Detect everything from brute force scanning kids to those nasty APT’s.

5. Metasploit Framework – test all aspects of your security with an offensive focus. Primarily a penetration testing tool, Metasploit has modules that not only include exploits but also scanning and auditing.

6. OpenSSH – secure all your traffic between two points by tunnelling insecure protocols through an SSH tunnel. Includes scp providing easy access to copy files securely. Can be used as poor mans VPN for Open Wireless Access points (airports, coffee shops). Tunnel back through your home computer and the traffic is then secured in transit. Access internal network services through SSH tunnels using only one point of access. From Windows, you will probably want to have putty as a client and winscp for copying files. Under Linux just use the command line ssh and scp.

7. Wireshark – view traffic in as much detail as you want. Use Wireshark to follow network streams and find problems. Tcpdump and Tshark are command line alternatives. Wireshark runs on Windows, Linux, FreeBSD or OSX based systems.

8. BackTrack – an Ubuntu based Linux distribution that is configured with hundreds of security testing tools and scripts. Backtrack is well known with penetration testers and hobbyists alike.

9. Nikto – a web server testing tool that has been kicking around for over 10 years. Nikto is great for firing at a web server to find known vulnerable scripts, configuration mistakes and related security problems. It won’t find your XSS and SQL web application bugs, but it does find many things that other tools miss. To get started try the Nikto Tutorial or the online hosted version.

10. Truecrypt – encrypt all the things. Truecrypt is a strong encryption utility that can encrypt entire volumes or create an encrypted container within a file system. Use Truecrypt to protect your flash drives. If it gets lost, even the NSA will have trouble reading the data.

CloudPets teddy bears’ database exposed

CloudPets (a brand owned by Spiral Toys)data has leaked exposing kids’ recordings.

The data that was stored in a MongoDB was publicly facing network segment without any authentication required and had been indexed by Shodan (a popular search engine for finding connected things).

Unfortunately, things only went downhill from there. People found the exposed database online.

CloudPets had left their database exposed publicly to the web without so much as a password to protect it.

Major cyberattack knocks Twitter, Paypal, Spotify offline on 21-10-2016

s-aolcdn-com

Cyberattacks targeting a little known internet infrastructure company, Dyn, disrupted access to dozens of websites on Friday, preventing some users from accessing PayPal, Twitter and Spotify.

Dyn, whose customers include some of the world’s most widely visited websites, said it did not know who was responsible for the outages that began in the Eastern United States, then spread to other parts of the country and overseas.

The outages were intermittent, making it difficult to identify all the victims. But technology news site Gizmodo named some five dozen sites that were affected by the attack. They included CNN, HBO Now, Mashable, the New York Times, People.com, the Wall Street Journal and Yelp.

Dyn said attacks were coming from tens of millions of internet-connected devices — such as webcams, printers and thermostats — infected with malicious software that turns them into “bots” that can be used in massive denial-of-service attacks.

The U.S. Department of Homeland Security last week issued a warning about this powerful new approach, noting it was concerned about the potential for new incidents after code for malware used in these crimes was published on the internet.

Dyn said late on Friday that it was fighting the third major wave of cyberattacks launched from locations spread across the globe, making them harder to fight.

“The complexity of the attacks is what’s making it very challenging for us,” said Dyn’s chief strategy officer, Kyle York.

DevGuard Privacy Policy

This privacy policy governs use of DevGuard mobile application on your mobile device.

Dolphins Systems is committed to protecting your privacy and safety rights while using its mobile applications. In order to protect your privacy, the firm maintains the following privacy practices:

Personal information

DevGuard application collects telephony data upon installation and on receiving locate command requests from the user. This information is key for performance of the application in locating a lost mobile device. The information is only shared with one person whom the user selects as recipient of all tracking information.

Messaging

The application reads incoming SMS to only detect DevGuard commands that the user may send. Incoming messages are neither stored nor shared with a third party. The application sends SMS messages upon receiving locate command requests from the user. The SMS that contains personal information is only send to the Guard mobile number that the user inserted upon opening DevGuard application.

Location Data

The application requires location data to track a lost mobile device, upon installation and on receiving locate command requests from the user. The information is only shared with the Guard mobile number that the user inserted upon opening DevGuard application.

Contact

Any questions or concerns relating to privacy, should be communicated via email at devguardke [at] gmail [dot] com . Once your e-mail is received, we will review it to ensure that the privacy practices provided herein are enforced

Effective March 17, 2016

DevGuard

devguard

An Android mobile application that helps users track their lost mobile devices in Kenya. [Get from Google Play] [] []

DevGuard uses cutting edge features to increase the chances of the phone owner finding a lost phone and also preventing leakage of sensitive data to a third party.

Top Features:

• Receive fraudster alerts

• Detect SIM Card replacement

• Remotely locate lost mobile device using “locate” or “track” commands

• Remotely check telephony information

• Remotely set mobile device password using “reset password ****” command

• Remotely lock mobile device using “lock device” command

• Remotely wipe mobile device data using “wipe device” command

Note: Care should be taken when using “wipe device” command. The command should be used as a last resort because it will erase all device’s data.

DevGuard_Screenshot_1        DevGuard_Screenshot_3

Operations:

To be able to Lock the mobile device and wipe device data remotely, enable the device as Device Administrator upon installation.

A password is required to prevent unauthorized access to the mobile application.

Set up guard mobile number that will be used to remotely command the device when the mobile device is lost.

The mobile number will also receive all tracking information.

The guard mobile number should be of a trusted relative or friend because all tracking information will be send to the guard number when the device is lost.

On receiving the location coordinates, copy and paste the coordinates in https://maps.google.co.ke/ to see device’s current location.

You can search “Route” TO coordinates as “destination” to determine the path to your device.

NOTE: One should not retrieve a lost mobile device from the person in possession of the device without proper security. For your own security, liaise with a policeman to retrieve the device for you.

When a device is stolen, try as much as possible to locate the device within 15 minutes to prevent further damages your mobile device.

If the device cannot be located, send an email of the IMEI and scanned purchase receipt (for authenticity purposes) to devguardke [at] gmail [dot] com for further assistance.

googleplay

 

Free Kaspersky Tools and Utilities

  1. Kaspersky Virus Removal Tool 

    Virus Removal Tool is a utility designed to remove all types of infections from your computer. It employs the effective detection algorithms used by Kaspersky Anti-Virus and AVZ. It cannot substitute a resident antivirus application. Download

  2. Kaspersky Security Scan 

    Download the free, easy-to-use scanner that rapidly finds malware & threats that may be hidden on your PC – even if you already have an antivirus product or firewall installed. You’ll get a detailed report on your PC’s security status – plus tips on improving your PC’s protection. Download

  3. Kaspersky Rescue Disk 10 

    Kaspersky Rescue Disk is designed to scan, disinfect and restore infected operating systems. It should be used when it is impossible to boot the operating system. Download

List of Free Antivirus