Posts

Dixons Carphone: Yeah, so, about that hack we said hit 1.2m records? Multiply that by 8.3

Image
Dixons Carphone today admitted that the data breach it discovered last month affected nine times as many people as first believed. The retailer 'fessed up to the hack in June this year, saying that it had involved 5.9 million payment cards and 1.2 million personal data records. However, in a statement  issued today  (PDF), Dixons Carphone revised this number, saying about 10 million records may have been accessed. The firm said that it now had evidence that "some of this data may have left our systems", but that the records don't contain payment card or bank account details. "There is no evidence that any fraud has resulted," it added. The biz – which owns Carphone Warehouse and Currys PC World – has now nearly completed a full investigation of the unauthorised access that it said took place in 2017. As a result, Dixons Carphone said it was contacting all of its customers "as a precaution" to apologise and advise them on how to reduce the risk

Analysis: Reported data breaches in Australia

Image
The Office of the Australian Information Commissioner (OAIC) has published the first full quarter report on data breaches that fall under Notifiable Data Breaches scheme and, thus, had to be reported to the OAIC. “The NDB scheme applies to agencies and organisations that the Privacy Act requires to take reasonable steps to secure personal information. This includes most Australian Government agencies, businesses and not-for-profit organisations with an annual turnover of $3 million or more, credit reporting bodies, private health service providers, and TFN [tax file number] recipients, among others,” the OAIC explained. The  report  encompasses 242 data breaches reported between 1 April and 30 June 2018. Data breach statistics The analysis of the reports reveals that 59 percent of those breaches were caused by malicious or criminals attacks, 36 percent by human error, and 5 percent by system faults. “Many cyber incidents in this quarter appear to have exploited vulnerabilities invo

HP will give you $10,000 to hack your printer Researchers can earn up to $10,000 for issues which allow attackers to target you through your printer.

Hewlett-Packard  hopes to entice researchers with a $10,000 reward for finding vulnerabilities in printers. The tech giant revealed the new bug bounty program on Tuesday. The scheme, which is launching as a private bug bounty, is tailored specifically for HP printer hardware. While many of us use home printers simply for printing the occasional document or photo, in the enterprise, these devices are often found in a network. MORE SECURITY NEWS Senator proposes Google, Facebook outline what your data is worth to their platforms US government's "do not buy" list shuts out Russia, China Why you're using Tor wrong New Spectre attack can remotely steal secrets, researchers say

Chinese Hackers LuckyMouse hit the National Data Center

Image
As per the report of Kaspersky Lab, a Chinese hacking group has prepared an attack on the National Data Center of an unnamed Central Asian country. The cyber hackers, called Lucky Mouse, are said to have been a group trying to get user information. This group is also called by names such as Iron Tiger, Threat Group-3390, EmissaryPanda, and APT27. The cyber attacks started in 2017, Kaspersky says, adding that malicious scripts were infected into the official website to conduct the country-level waterholing campaign. Kaspersky says that the gathering utilized the HyperBro Trojan remote organization device to sidestep antivirus devices between December 2017 and January 2018. The Russian security firm recognized the hacking effort back in March of this year. The firm refused to reveal the name of the Central Asian country that was targeted by the hacks. The firm did, however, release a comment, "Because of apparatuses and strategies being used, we ascribe the crusade to Luc

Announcing STARTTLS everywhere: Securing HOP-TO-HOP Email Delivery

Image
Today we’re announcing the launch of  STARTTLS Everywhere , EFF’s initiative to improve the security of the email ecosystem. Thanks to previous EFF efforts like  Let's Encrypt , and  Certbot , as well as help from the major web browsers, we've seen  significant   wins  in  encrypting the web . Now we want to do for email what we’ve done for web browsing: make it simple and easy for everyone to help ensure their communications aren’t vulnerable to mass surveillance. Note that this is a high-level, general post about STARTTLS Everywhere. If you’d like a deeper dive intended for mailserver admins, with all the technical details and caveats,  click here . It’s important to note that STARTTLS Everywhere is designed to be run by mailserver admins, not regular users. No matter your role, you can join in the STARTTLS fun and find out how secure your current email provider is at: https://www.starttls-everywhere.org/ Enter your email domain (the part of your email address

iPhone's Passcode can be Bypassed Through Brute-Force Attack without Erasing Data

Image
A new bug detected in iOS devices up-to-date iPhones and iPads shows that 4/6 digit PIN’s can be bypassed with a brute force attack. The data encrypted in your iPhone, iPad, or iPod touch devices are protected with a passcode and if the invalid passcode entered for 10 times, then the Operating system wipe’s all data from the phone. Security Researcher Matthew Hickey found a possible way to bypass the security limits with the latest version iOS 11.3. Hickey Explained  ZDnet  that when an iPhone or iPad is plugged in and if the hackers send keyboard inputs it would trigger an interrupt request that takes priority than any other request on the device. He posted a video explaining how the attack works, the demonstration starts with an iPhone or iPad plugged in, with the device plugged in attackers can send keyboard inputs for entering passcode instead of tapping the device screen. When the input received from the keyboard it would trigger an interrupt request that take’s pri

2000 Deep Web Links

Image
2000 deep web links The Dark Web, Deep Web or Darknet is a term that refers specifically to a collection of websites that are publicly visible, but hide the IP addresses of the servers that run them. Thus they can be visited by any web user, but it is very difficult to work out who is behind the sites. And you cannot find these sites using search engines. So that’s why we have made this awesome list of links 1. Xillia (was legit back in the day on markets)  http://cjgxp5lockl6aoyg.onion 2.  http://cjgxp5lockl6aoyg.onion/worldwide-cardable-sites-by-alex 3.  http://cjgxp5lockl6aoyg.onion/selling-paypal-accounts-with-balance-upto-5000dollars 4.  http://cjgxp5lockl6aoyg.onion/cloned-credit-cards-free-shipping 5. 6. ——————————————————————————————- 7. 8. 9. UNSORTED 10. 11. Amberoad  http://amberoadychffmyw.onion 12. KognitionsKyrkan  http://wd43uqrbjwe6hpre.onion 13. Malina  http://malina2ihfyawiau.onion 14. BB Compendium  http://jq.26zp5ygkpszripvv.onion 15. Hac