Please create an account to participate in the Slashdot moderation system


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Submission + - Corporate Call Centers are Now the Weakest Link in Security

Trailrunner7 writes: Criminals are targeting corporate call centers at an unprecedented rate, resulting in a 113 percent spike in the fraud rate in the last year, new data compiled by Pindrop shows.

Phone fraud has become one of the favored tactics for criminals as they look for less-risky and more-profitable avenues to get into targeted organizations. The phone channel typically is not as well-defended as other channels, including the web and in-person transactions, making it a juicy target for fraudsters. Data published in Pindrop’s 2017 Call Center Fraud Report today shows that these criminals are having more than their share of success.

In 2016, one in every 937 calls was fraudulent, a significant increase from 2015, when one in every 2,000 calls was fraudulent. The data, extracted from more than 500 million calls to Pindrop’s customers’ call centers, is an indication that the fraudsters running these phone scams are getting better and better and continuing to develop new skills and schemes to get past call center agents.

“The sophistication of the fraudsters, the expansion of criminal rings, heightened security in other channels, and the amount of information available on the dark web is making the call center the easiest fraud target in virtually every industry,” said Vijay Balasubramaniyan, CEO and co-founder of Pindrop.

Submission + - WikiLeaks Reveals The "Snowden Stopper": CIA Tool To Track Whistleblowers (

schwit1 writes: As the latest installment of it's 'Vault 7' series, WikiLeaks has just dropped a user manual describing a CIA project known as ‘Scribbles’ (a.k.a. the "Snowden Stopper"), a piece of software purportedly designed to allow the embedding of ‘web beacon’ tags into documents “likely to be stolen.” The web beacon tags are apparently able to collect information about an end user of a document and relay that information back to the beacon's creator without being detected. Per WikiLeaks' press release

But, the "Scribbles" user guide notes there is just one small problem with the only works with Microsoft Office products. So, if end users use other programs such as OpenOffice of LibreOffice then the CIA's watermarks become visible to the end user and their cover is blown.

Submission + - Nearly Three-Quarters of Healthcare Breaches Involve Ransomware

Trailrunner7 writes: Ransomware attacks are becoming a larger and larger problem for enterprises, now accounting for nearly 75 percent of malware-related incidents in health care companies, according to new data released by Verizon.

Data from the 2017 Verizon Data Breach Investigations Report released Thursday shows that 72 percent of all malware incidents affecting health care organizations involved ransomware. The DBIR dataset, which includes more than 2,000 separate breaches, reveals a 50 percent increase in ransomware incidents compared to 2015, and also shows that ransomware is now the fifth most-common variety of malware found in breaches.

Submission + - Mastercard Replaces PINs With Fingerprint Sensor on New Cards 3

Trailrunner7 writes: Mastercard is rolling out a new payment card that includes a fingerprint sensor built right onto the card, a feature that is meant to eliminate the need for a PIN during in-person transactions.

The new card also has a chip embedded in it and it can be used at all of the existing chip-and-PIN terminals. During a transaction, the user would insert the card into the terminal and hold his thumb on the embedded biometric sensor while the terminal reads the chip. Rather than entering a PIN, the user’s print serves as a second factor of authentication. The user’s print is stored on the card and it is compared against the one used during each transaction.

Mastercard already has tested the new card in a pair of trials in South Africa, one with a large supermarket chain and another with a bank. The company plans wider trials this year and is aiming for a full rollout by the end of 2017.

Submission + - Facebook Launches Beta of New Account Recovery System

Trailrunner7 writes: Facebook has opened a beta program for its new Delegated Account Recovery system, which is designed to replace traditional email or SMS-based recovery processes.

The Facebook system allows users to connect their Facebook accounts with other services and use that trusted link to recover access to one of the accounts. The company has published an SDK and documentation on the system, which it has been testing for several months with GitHub. Now the program is entering a closed beta with the promise of a public release in the coming months. Delegated Account Recovery is meant to eliminate the use of insecure channels such as email or SMS to verify a user’s ownership of a given account.

“It’s an open protocol. Trust who you want. We’re really excited that GitHub is making the first connection with us,” Brad Hill, a security engineer at Facebook, said. “We really don’t want this to be a Facebook-only service, so that we can have that network effect protecting you. The best way for us to address that is to share it.”

Submission + - Inside the Tech Support Scam Ecosystem

Trailrunner7 writes: A team of three doctoral students, looking for insights into the inner workings of tech support scams, spent eight months collecting data on and studying the tactics and infrastructure of the scammers, using a purpose-built tool. What they uncovered is a complex, technically sophisticated ecosystem supported by malvertising and victimizing people around the world.

The study is the first analysis of its kind on tech support scams, and it’s the work of three PhD candidates at Stony Brook University. The team built a custom tool called RoboVic that performed a “systematic analysis of technical support scam pages: identified their techniques, abused infrastructure, and campaigns”. The tool includes a man-in-the-middle proxy that catalogs requests and responses and also will click on pop-up ads, which are key to many tech-support scams.

In their study, the researchers found that the source for many of these scams were “malvertisements”, advertisements on legitimate websites, particularly using ad-based URL shorteners, that advertised for malicious scams. This gives the scammers an opportunity to strike on what would seem like a relatively safe page. Although victims of these scams can be anywhere, the researchers found that 85.4 percentof the IP addresses in these scams were located across different regions of India, with 9.7 percentlocated in the United States and 4.9 percent in Costa Rica. Scammers typically asked users for an average of $291, with prices ranging from $70 to $1,000.

Submission + - FBI Disrupts Notorious Kelihos Botnet

Trailrunner7 writes: The Justice Department has disrupted the Kelihos botnet, one of the more prolific and long-running spam and malware networks, by sinkholing the botnet’s command-and-control servers after the arrest of a Russian man officials allege is Kelihos’s operator.

The botnet has been operating since at least 2010 and has infected hundreds of thousands of computers around the world, mainly in the service of a massive spam operation. Kelihos has been responsible for a large slice of the spam clogging the Internet for many years, and officials at the Justice Department on Monday filed a civil complaint against Peter Yuryevich Levashov, who was arrested last weekend in Spain. The complaint accuses Levashov of running Kelihos and using infected computers as part of his spam business.

Submission + - Senate Bill Seeks to Reinstate Broadband Privacy Rule

Trailrunner7 writes: Now that President Trump has signed into law legislation that eliminates an FCC rule that prevented broadband providers from selling users’ private information, some members of Congress have introduced a new bill that would restore the rule.

Sen. Ed Markey (D-Mass.) has drafted the bill and introduced it in the Senate in the hopes of reversing the effects of the law that Trump signed last week. That law, which drew criticism and opposition from a diverse set of privacy advocates, technologists, consumer groups, and legislators, gives broadband providers such as Comcast and Verizon the ability to sell users’ browsing histories and other personal information without customers’ consent.

The FCC last year had passed a rule that prevented broadband providers from selling that kind of customer information without clear consent, but opponents said the rule placed unfair restrictions on some companies. Markey’s bill seeks to put the FCC rule back in place.

Submission + - New Details Connect Moonlight Maze Attacks on US Government to Modern Campaigns

Trailrunner7 writes: Researchers investigating modern cyber espionage operations have found a direct link between the Moonlight Maze attacks that hit a number of United States military and government agencies in the 1990s and operations that are still ongoing today. The connections, through code samples, logs, and other data, show that some of the same tools and infrastructure used 20 years ago are still in use by advanced attackers right now.

The Moonlight Maze attacks were among the first major cyber espionage campaigns to gain public attention, and security researchers often point to the attacks as the beginning of the modern advanced threat era. The attacks went on for years and included highly complex techniques and the exfiltration of a huge amount of data. Researchers at Kaspersky Lab, working with counterparts from King’s College London, recently discovered that a backdoor used by the Moonlight Maze attackers in 1998 also has been used by the Turla APT attack group, possibly as recently as this year. The new details come from a months-long analysis of data and logs from a server that was compromised during the Moonlight Maze attacks and preserved by a systems administrator since then.

The original Moonlight Maze attackers mainly used Unix and had a large set of tools at their disposal. They were targeting Solaris systems for the most part and had a custom backdoor that they used often. One of the systems that they compromised was a server known as HRtest, which administrator David Hedges has kept. Hedges allowed Kaspersky’s researchers and Rid access to the server, including access logs, the attackers’ own logs, and an extensive toolset used by the attackers, including 43 separate binaries.

Submission + - Minnesota Legislature Takes Up ISP Privacy Regulations

BenFranske writes: After the recent US Senate vote to kill FCC broadband privacy rules which would require customers to opt-in to the sale of customer tracking data the Minnesota state legislative bodies have adopted an amendment to an appropriations bill that would prohibit

[The] collect[ing of] personal information from a customer resulting from the customer's use of the telecommunications or internet service provider without express written approval from the customer. No such telecommunication or internet service provider shall refuse to provide its services to a customer on the grounds that the customer has not approved collection of the customer's personal information.

Submission + - Those IRS Scam Calls May Soon Disappear

Trailrunner7 writes: The FCC has moved one step closer to implementing a system that would prevent robocalls that spoof the caller ID of numbers that don’t initiate outbound calls, a move that could significantly reduce the volume of scam calls reaching businesses and consumers.

The commission on Thursday issued a notice that seems public comment on the concept of a Do Not Originate list, which would establish a set of phone numbers that never are used to initiate calls. This would help prevent fraudsters from spoofing the caller IDs of numbers owned by organizations such as the IRS, FBI, banks, and charities, a tactic that they use regularly to make their phone fraud schemes seem more plausible. The policy would allow carriers to block calls from numbers on the DNO list, something that they’re not allowed to do under FCC rules right now.

The proposal is an outgrowth of work done by the Robocall Strike Force, a group that the FCC and a number of carriers established last year in an effort to find answers to the robocall problem. The group has come up with a number of ideas, but the one that has the best potential to have an immediate effect is the DNO list. A trial of the DNO list concept last fall produced a 90 percent decrease in the number of IRS scam calls. Now, the commission is looking to allow carriers to implement this system on a permanent basis.

Submission + - Android Trojan Spreads Through Fake Cell Towers

Trailrunner7 writes: Attackers in China are using rogue cell base stations to spread versions of an Android banking Trojan that steals user credentials and has the ability to bypass two-factor authentication.

The malware, known as the Swearing Trojan for some impolite language found in the Chinese code, has been in circulation for several months and uses a number of different methods to spread, including traditional phishing emails and SMS messages. The most sophisticated method, though, is the use of the fake base transceiver stations, which the attackers employ to send SMS messages to victims. The texts appear to come from a Chinese telecom operator and contain a link that will infect the user’s device with the malware.

Submission + - Half of Android Devices Didn't Get Security Patches in 2016

Trailrunner7 writes: Google has made several changes to the Android security ecosystem recently, including providing monthly updates and working with manufacturers to get those patches in the hands of users more quickly. But despite those efforts, about 50 percent of Android devices didn’t install a single security update in 2016.

One of the issues with Android security over the years has been the way that patches are delivered to users. Google distributes updates directly to the Nexus and Pixel devices it sells, but carriers and other manufacturers are responsible for getting updates to their own customers. Some handset makers, including LG and Samsung, follow Google’s lead and send monthly updates to some of their devices on the day they’re released. But many others either deliver them much later or not at all.

In its annual report on Android security, Google said that while the monthly update schedule has helped, it hasn’t fixed the problem entirely.

Submission + - NSA: We Disclose 90% of the Flaws We Find

Trailrunner7 writes: In the wake of the release of thousands of documents describing CIA hacking tools and techniques earlier this month, there has been a renewed discussion in the security and government communities about whether government agencies should disclose any vulnerabilities they discover. While raw numbers on vulnerability discovery are hard to come by, the NSA, which does much of the country’s offensive security operations, discloses more than nine of every 10 flaws it finds, the agency’s deputy director said.

NSA has both defensive and offensive roles in cybersecurity and does its own vulnerability research and exploit development. Some of the flaws NSA finds are kept private and used for intelligence-gathering purposes in targeted exploitation operations. But many others are disclosed to the affected vendors as soon as possible, said Richard Ledgett, deputy director of NSA.

“Our historic numbers are around 90 percent, or a little better than 90 percent toward disclosure,” Ledgett said during a roundtable discussion on cybersecurity issues Tuesday hosted by the Aspen Institute.

Submission + - Critical Cisco Flaw Found Buried in Vault 7 Documents

Trailrunner7 writes: Hundreds of models of Cisco switches are vulnerable to a remote-code execution bug in the company’s IOS software that can be exploited with a simple Telnet command. The vulnerability was uncovered by company researchers in the CIA hacking tool dump known as Vault 7.

The bug is a critical one and an attacker who is able to exploit it would be able to get complete control of a target device. The flaw lies in the Cluster Management Protocol (CMP) that’s used in IOS, and Cisco said it’s caused by the incorrect processing of CMP-specific Telnet options, as well as accepting and processing these commands from any Telnet connection.

“An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device,” the Cisco advisory says.

Slashdot Top Deals

We don't know who it was that discovered water, but we're pretty sure that it wasn't a fish. -- Marshall McLuhan