Chinese ISPs Caught Injecting Ads and Malware into Web Pages

Found on Hacker News on Sunday, 28 February 2016
Browse Internet

Chinese ISPs had set up many proxy servers to pollute the client's network traffic not only with insignificant advertisements but also malware links, in some cases, inside the websites they visit.

In general, 14 different ISPs had been discovered with malicious background, and out of these 10 are from China, 2 from malaysia, and 1 each from India and United States.

Solution? HTTPS.

Tor Project Accuses CloudFlare of Mass Surveillance, Sabotaging Tor Traffic

Found on Softpedia on Friday, 26 February 2016
Browse Internet

Tor Project maintainers are saying that CloudFlare's anti-DDOS technology often malfunctions and forces users to fill in CAPTCHAs multiple times over before reaching their desired website. This issue is also confirmed by your reporter who often times had to fill in CloudFlare CAPTCHAs for more than ten times before finally being redirected to a desired website.

Currently, Tor Project maintainers are thinking of adding a message that would read "Warning this site is under surveillance by Cloudflare," whenever Tor users would be accessing a CloudFlare-protected website.

As if Tor users are more of a problem than every other user. For most, the decision to block them is just based on negative journalism, bringing Tor in connection with illegal activities.

Twitter shares drop on faltering user growth

Found on BBC News on Thursday, 11 February 2016
Browse Internet

Twitter reported a net loss of $90m (£62m) for the last three months of 2015 versus a loss of $125m a year ago.

This is the first quarter in Twitter's history that the number of monthly active users has not grown.

Investors had been anticipating the announcement of major changes to Twitter's product offerings to increase the user base.

Nothing of value was lost. Investors do not care about the product and only take a look at the share values. If you make bold claims, investors will bury you under money; just tell them that the growth of your product will be unlimited.

Gmail to warn you if your friends aren’t using secure e-mail

Found on Ars Technica on Wednesday, 10 February 2016
Browse Internet

Google has confirmed a number of changes to Gmail with the arrival of two new features that will let you know if the people you’re corresponding with aren’t hip with TLS encryption.

In 2014, the company announced that its search engine would be using HTTPS as a ranking signal. A year after, it revealed it would be adjusting its indexing system to look for more HTTPS websites.

Of course, this does not enhance your privacy in any way, because the TLS encryption only scrambles the transmission itself, but not the actual content, so Google can still analyze your email for advertising. If you really want to be secure, use end-to-end encryption, like PGP/GnuPG or S/MIME.

Mysterious spike in WordPress hacks silently delivers ransomware to visitors

Found on Ars Technica on Friday, 05 February 2016
Browse Internet

It's still not clear how, but a disproportionately large number of websites that run on the WordPress content management system are being hacked to deliver crypto ransomware and other malicious software to unwitting end users.

People running WordPress sites should take time to make sure their servers are fully patched and locked down with a strong password and two-factor authentication.

How? The problem is that they are running Wordpress. It's a big attack vector and home to lots of bugs and holes.

YouTube stars U-turn on trademarks after online fury

Found on BBC News on Tuesday, 02 February 2016
Browse Internet

Some of The Fine Brothers' most successful series include Kids React, Teens React and YouTubers React.

In reaction videos, people - from children to celebrities - are shown an object or video clip and their response is filmed.

For example: a child in 2015 marvelling at the size of an old style printed encyclopaedia.

That is the genre for one of the biggest channels? Watching people react to everyday stuff?

Using IPv6 with Linux? You’ve likely been visited by Shodan and other scanners

Found on Ars Technica on Monday, 01 February 2016
Browse Internet

By setting up an IPv6-based network time protocol service most Internet-connected devices rely on to keep their internal clocks accurate, the operators can harvest huge numbers of IPv6 addresses that would otherwise remain unknown. The server operators can then scan hundreds or thousands of ports attached to each address to identify publicly available surveillance cameras, unpatched servers, and similar vulnerabilities.

Within seconds of one of the Shodan's NTP servers receiving a query from an IPv6 device, Shodan's main scanning engine would scan more than 100 ports belonging to the device. The Shodan scanner would then revisit the device roughly once a day.

If you connect a device to the Internet, you should not rely on something like "it won't be seen".

NSA’s top hacking boss explains how to protect your network from his attack squads

Found on The Register on Sunday, 31 January 2016
Browse Internet

“If you really want to protect your network you have to know your network, including all the devices and technology in it,” he said. “In many cases we know networks better than the people who designed and run them.”

To protect against this admins need to lock things down as far as possible; whitelisting apps, locking down permissions, and patching as soon as possible, and use reputation management. If a seemingly legitimate user is displaying abnormal behavior, like accessing network data for the first time, chances are they have been compromised, he said.

That's an ideal world. In reality, most of the users and bosses will complain nonstop if you put them on a NSA-proof network.

Hackers try to con the wrong mom. Knitting circle not the same

Found on CNet on Saturday, 30 January 2016
Browse Internet

Char, noticed the padlock icon -- the way your computer tells you your connection is private -- was missing from the top left corner of a shopping website she was visiting. Worried, she got in touch her son.

He took a look at the code behind the suspicious website and it turned out hackers behind a Russian website were receiving a copy of everything his mom typed into the checkout form. That included her credit card information, which Char immediately canceled.

The article is quite misleading, making it sound like SSL magically makes the code secure. If the site got hacked, the code itself can be altered and of course this will run via SSL too.

Android Ransomware Threatens to Share Your Browsing History With Your Friends

Found on Softpedia on Wednesday, 27 January 2016
Browse Internet

When everything has finished, the ransomware uses its administrative permissions to push a permanent message to the user's screen, asking the user to pay a ransom to recover his encrypted files.

To make the threat more convincing, the Lockdroid ransomware also threatens the user to pay the ransom or it will send all his browsing history to all his contacts.

There already is a malware which shares your most private information with your contacts. It's called Facebook.