Tag Archives: Hackers

Hacking group uses Google services to control malware

by Sead Fadilpasic, betanews

Carbanak, a powerful cyber-crime group, is using certain Google services as command and control for its malware and other malicious elements. The news was released by cybersecurity firm Forcepoint this week.

Forcepoint uncovered a trojanized RTF document, which, once ran, will “send and receive commands to and from Google Apps Script, Google Sheets, and Google Forms services.” Continue reading Hacking group uses Google services to control malware

‘Distributed guessing’ attack lets hackers verify Visa card details

by Peter Sayer, ComputerWorld

Armed with a card number, researchers tricked websites into helping them guess the expiry date and CVV

Add credit card fraud to the list of things that distributed processing can speed up.

An e-commerce site will typically block a credit card number after 10 or 20 failed attempts to enter the corresponding expiry date and CVV (card verification value), making life difficult for fraudsters who don’t have a full set of credentials. Continue reading ‘Distributed guessing’ attack lets hackers verify Visa card details

AT&T And NASA To Build National Drone Tracking System

by Jennings Brown, vocativ

The company wants to protect drones from hackers

The largest telecommunications company in the world wants to serve as a watchdog for all drones in the United States — and in the process, play a major role in supervising the national airspace.

On Nov. 10, AT&T announced that it was collaborating with NASA to develop an Unmanned Aircraft System Traffic Management program to allow agencies to monitor drones. An AT&T release states this program will make it safer for drone operators to plan and monitor flight paths, navigate drones, and use drones for surveillance. The company stated that its main focus is to lower the risk of drone-related cyber-attacks. Continue reading AT&T And NASA To Build National Drone Tracking System

Hackers can abuse LTE protocols to knock phones off networks

by Lucian Constantin, ComputerWorld

Attacks on the global mobile interconnection network are still possible even with the new LTE Diameter protocol, researchers say

When you travel between countries, the mobile operators that temporarily provide service to your phone need to communicate with your operator back home. This is done over a global interconnection network where most traffic still uses an aging protocol, called SS7, that’s known to be vulnerable to location tracking, eavesdropping, fraud, denial of service, SMS interception and other attacks. Continue reading Hackers can abuse LTE protocols to knock phones off networks

After cyber attacks, Internet of Things wrestles with making smart devices safer

by Jeremy Wagstaff and J.R. Wu, Reuters

Recent cyber attacks harnessing everyday devices such as cameras, video recorders, printers, routers and speakers are a wake-up call to the hidden dangers of the Internet of Things.

The problem for the device makers, though, is that few are well equipped to tackle the unfamiliar task of foiling hackers.

For a sense of that challenge, take AV Tech Corp, a once proud giant among CCTV camera makers whose 1990s building in a Taipei suburb hints at the gap it must overcome between hardware factories of a decade ago and those of today. Continue reading After cyber attacks, Internet of Things wrestles with making smart devices safer