Showing posts with label online security. Show all posts
Showing posts with label online security. Show all posts

Thursday, March 7, 2013

Online security firm accused of threatening its own users’ privacy



China is rarely thought of as a bastion of online security, but its private sector’s reputation took yet another hit this week after it was revealed that Qihoo 360 Technology, the country’s largest internet security service provider, had been accused of stealing the personal data of its vast customer base.
The National Business Daily, a Chinese newspaper, alleged that personal information of 400 million online users had been illegally obtained, using a complex and secretive browser tracking system. The software, the paper claimed, transmits users' online viewing habits to the company’s cloud storage servers - not exactly the type of behaviour that you expect from an internet security firm.
As if that wasn't enough, the company has also been accused of attacking its rivals by using software updates to uninstall their software from its user’s systems. In a possible tit-for-tat response, Apple Inc has already removed all of the company’s App Store applications and suspended its developer privileges. Qihoo, of course, denies that Apple's app removal is related to privacy issues.
The company built its impressive customer base by offering free online security services to privacy conscious Chinese web users, who often find themselves fighting a losing battle against their snooping state. Customers have understandably reacted with outrage on hearing the news, with one individual complaining that he was unable to use any other browser after installing the free Qihoo 360 option. Such tactics are perhaps unsurprising given that Qihoo is currently embroiled in high-profile bickering with rival firms.
The company has attempted to brush off the allegations, claiming that they are based on the accounts of “anonymous industry insiders” and blaming rumour-mongering by competitors. They have also offered the somewhat dubious explanation that the data was being harvested to aid in its anti-virus efforts for the benefit of its users.
If you’re concerned about the questionable practices of online security agencies, try using a reliable VPN service to give your system an added layer of protection. Using a VPN service makes it more difficult for would-be data thieves to access your private information and helping to ease your online privacy worries.

Sunday, September 9, 2012

Hacker gang touts limitless supply of zero-day time bugs

An elite cyberpunk team focusing on protection industry sub-contractors comes with an endless supply of zero-days, or vulnerabilities which have yet to be publicized, a smaller amount fixed, Symantec states.

In a article, the safety organization stated, "The actual group seemingly has an limitless supply of zero-day vulnerabilities."

Symantec also laid out its research into the bunch, that it stated was at the rear of a lot associated with episodes named the "Elderwood Task," after a source signal variable used by the actual hackers.

Among the group's differentiating characteristics, said Orla Coxswain, senior supervisor from Symantec's protection response division, is its victimization with a minimum of 8 absolutely no-day weaknesses since past due 2010, as well as four in a sixteen-7 days period this summer.

"We've never see a team use so many zero-days," said Coxswain within an interview today. "I was amazed whenever Stuxnet used 4 absolutely no-days, but this particular group has been in a position to discover 8 absolutely no-times. Much more, the truth that they have ready [their episodes] and are all set as soon as they have a brand new zero-day, and the pace along with which they begin using these absolutely no-days, is one thing we have not really seen prior to."

Stuxnet, first discovered this year, depended on exploits of four various Home windows absolutely no-day vulnerabilities in order to imbed it's focuses on, that the majority of experts now think had been Iranian atomic fuel enrichment amenities.

Coxswain said that Symantec thinks the actual cyber-terrorist discovered the actual zero-times on their own, and didn't buy them from other resources.

Based on Symantec's study, Elderwood used one zero-day in Dec 2010, three in 2011 and 4 this year during a stretch from April 24 through August 15.

This years absolutely no-day time attributed to the bunch had been notable: It had been used by the Trojan called "Aurora" by most protection experts, and called "Hydraq" by Symantec. Aurora was shipped utilizing an Internet Explorer (IE) absolutely no-day time, and targeted a lot of Traditional western companies, such as Google.

Google charged Chinese language hackers associated with entering its network using Aurora, a charge that motivated the research large to jeopardize a close-lower of its Chinese operations.

Symantec found hyperlinks between the Aurora/Hydraq episodes of late '09 and early this year with the campaigns which used 8 absolutely no-times over the last twenty+ several weeks.

The security company linked the actual dots between the various assault strategies by evaluating elements ranging from the underlying command-as well as-manage (D&D) infrastructure; the way the signal in every Trojan was obfuscated, or even masked; and the obvious sharing of a single customized-built malware improvement system, said Cox.

The actual Elderwood marketing campaign's focuses on additionally supplied hints that the intrusions from the 8 zero-days had been linked.

Elderwood targets defense sub-companies, second-tier companies which manufactures digital or even mechanised components which are after that sold to first-tier protection firms.

Symantec thinks that the attacks are targeted at sub-contractors because the assailants locate them simpler to take advantage of. Following infecting Windows Computers presently there, the cyber-terrorist rely on them to create the beachhead in companies additional in the provide string.

The Elderwood bunch specializes in discovering as well as exploiting zero-days within Microsoft's For example internet browser and Adobe's Flash Participant.

Coxswain called the group one of the "more elite" hacker teams, and even cited what she known as their "professionalism and reliability."

"The manner in which they've structure the job, dividing it amongst themselves, exhibits a certain professionalism," Cox stated. "They have a development platform in place, so that they just need to pull each one of these components collectively in order to release a new attack. With the group's sophistication, these people can quickly and easily pull together a brand new assault."

This season, for instance, the actual Elderwood group shifted things several times, quickly time for the attack with an exploit of a new zero-day time each time its forerunner had been sniffed away by protection researchers.

"This year, they utilized the Flash absolutely no-day time in April, then a couple of weeks later one in IE, then two or three days after that, an additional, one following the other," stated Cox.

A few of the zero-times attributed to Elderwood happen to be among the highest-profile bugs uncovered and patched this season. The vulnerability used by Elderwood at the end of Might, CVE-2012-1889, was in Microsoft XML Primary Services (MSXML). Attacks distributed broadly enough which additional protection firms observed, prodding Microsoft to patch the actual vulnerability in the July protection update slate.

How quickly the cyber-terrorist regroup following the patching of the susceptability informed Cox that they are extremely experienced. "I would believe, based on the pace of the episodes, they have some kind of stockpile of absolutely no-times," he explained. "I have to assume they have more within their toolbox compared to we've discovered."

As always whenever researchers pull apart the drape on the difficult-operating hacker bunch, the actual immediate presumption through numerous is that the assailants tend to be backed by a federal government. That's not always the situation, based on Cox, that stated Symantec experienced absolutely no hard evidence.

"However this is a full-time job," she stated, as well as a large group in order to dig up vulnerabilities, build intrusions, pack all of them in to malware, release episodes and then absorb the information they've taken. "The job they are doing is actually both skilled as well as time intensive. They would need to work at it full time, so someone is having to pay these phones do that."

Your woman stated it's most likely how the group is focusing on a contractual foundation, as well as attacking targets identified for them through their backer. "The analysis indicates that particular businesses have been hit diversely, showing that they're of particular curiosity to [their own paymasters]," Cox added.

While there's little opportunity a typical computer user will fall victim towards the targeted episodes launched through Elderwood -- usually conducted utilizing email messages aimed at specific people -- the actual gang also makes use of the actual "watering place" strategy to contaminate PCs.

Inside a watering hole campaign, hackers determine likely targets, even going to the individual level, after that search away that websites they frequently visit. Next the actual assailants compromise one or even more of these websites, plant adware and spyware on them, and like a lion waits in a watering place for victims, wait for unwary users to browse presently there.

In those instances, the general public can be, because Cox put it, "security damage."

Symantec's analysis of the Elderwood Project can end up being down loaded from its web site ( download Pdf file).

A few of the attacks through the 'Elderwood' cyberpunk gang happen to be carried out at so-known as 'watering holes.'

Saturday, August 18, 2012

Make yourself much less susceptible on the internet (video)

Online security breaches have become increasingly common. However there are methods a person can protect your self.
Zappos, LinkedIn, eHarmony, Yahoo, LastFm, environmentally friendly Protection Company, Stanford, and Columbia University -- all experienced on the internet data breaches lately, says the Private Privileges Clearinghouse.

Actually, this year alone, there has been 276 information breaches, according to the Identification Theft Source Middle. Statistics indicate which personal sector businesses and also the wellness-care business had been the majority of vulnerable, falling target to, correspondingly, 37 percent as well as thirty four percent of the breaches. Educational facilities and the federal government/army sector had breach rates of 14 percent and 11 %, respectively. The speed for financial companies arrived just a lot more than 3 percent, based on the ITRC.

Therefore if large companies as well as establishments along with, presumably, payrolled security staff can obtain popped, can there be any kind of assist for you? Here's a take a look at ways you can safeguard your self through episodes.

Thursday, May 10, 2012

What's Logged Into the VPN Link?


Internet Protection and VPN Connection:

The security issues more than Internet has been the hot the majority of subject in the cyber globe. With a lot of unwanted information robbing occurrences occurring around and with the improving demand for services of the Web Services, it's particular that the quantity of online users seeking for a safer web atmosphere is also growing. Apart from, because of the elevated number of customers, the net dependent protection methods are also getting into trouble in terms of mayhem upkeep as well as visitors management. In such a scenario the VPN or Virtual Private Network providers tend to be serving the basic and advanced protection requirements of the online users in an incredible way. In fact, security management within a VPN company is simpler since it provides a few central server based security system for the users. The actual registered or subscribed users are meant to log in to one of the main machines situated in the specific locations all over the world. And when the bond is made between your users and the servers, you’ data visitors are encrypted with the VPN connection funnel as well as gets to the server and then the server redirects the traffic to it's desired destination and for that reason, the actual unwanted attacks or even spying into the customers’ information is very hard. And since the machine includes a quite strong, in fact a nearly not possible to hack in security measure, the safety found here is a lot more than sufficient. Right now the actual questions occur, how about the VPN services themselves? How much access have they got within the users’ data? And how will they deal with customers’ personal particulars or even info and will they not pry into individual’s information?

What log performs VPN services keep?

By purchasing a VPN connection, you're actually redirecting all of your Internet protocol packets to some particular gateway server and allow packages be altered presently there to become proven as packets being generated from the server by itself, rather than in the computer that you are utilizing to get into the Internet. Just like your Internet Service Provider’s gateways that may monitor all you visitors, the actual VPN machine should also be able to monitor everything in regards to you.

So how will you obtain additional protection then? 
 
Really, the actual VPN service uses an amazing method for the data transfer, following the very first link between the person and also the server is established, immediately after the user log into the machine, the VPN server doesn't consider anything else other than the data packet redirecting. And it is only throughout the log in process as the VPN service tracks and make sure the information is alright. Later on, the service simply continues silence and runs on the encrypted information channel which may be decrypted just through the client side VPN software installed in user’s computer. However, the features referred to above are applicable only to a service supplier who is doing the whole thing within an honest way. If a VPN service provider decides to maintain track of all of your information and start decrypting your data it can do that. Just the trustworthy VPN services won't ever do this. Which means you certainly ought to select a dependable and trustworthy VPN maintained in the event you don’t want anyone to keep log of your online actions?

Best VPN service that will not log your data:

If you want to know that VPN service providers won't keep track of your information without your permission, then the best possible options for you will be the subsequent service providers.

 

Name of the Provider

Hide My Ass
Strong VPN
Switch VPN
Pure VPN
IAPS VPN