Tag Archives: countries

New defense method enables telecoms, ISPs to protect consumer IoT devices

Instead of relying on customers to protect their vulnerable smart home devices from being used in cyberattacks, Ben-Gurion University of the Negev (BGU) and National University of Singapore (NUS) researchers have developed a new method that enables telecommunications and internet service providers to monitor these devices. An overview of the key steps in the proposed method According to their new study, the ability to launch massive DDoS attacks via a botnet of compromised devices is … More ? The post New defense method enables telecoms, ISPs to protect consumer IoT devices appeared first on Help Net Security .

Visit site:
New defense method enables telecoms, ISPs to protect consumer IoT devices

How do cybercriminals secure cybercrime?

Trend Micro unveiled new insights analyzing the market for underground hosting services and detailing how and where cybercriminals rent the infrastructure that hosts their business. Over the past five years, increased use and abuse of compromised assets has formed a whole new market. There are varied types of underground hosting and associated services used by cybercriminals to operate their businesses, including bulletproof hosting, VPNs, anonymizers, and DDoS protection. Such services could variously be used to … More ? The post How do cybercriminals secure cybercrime? appeared first on Help Net Security .

More:
How do cybercriminals secure cybercrime?

Week in review: Counterfeit Cisco switches, hijacked Twitter accounts, vulnerable SAP applications

Here’s an overview of some of last week’s most interesting news and articles: New wave of attacks aiming to rope home routers into IoT botnets A Trend Micro research is warning consumers of a major new wave of attacks attempting to compromise their home routers for use in IoT botnets. High-profile Twitter accounts hijacked to push Bitcoin scam. How did it happen? The Twittersphere went into overdrive as a bunch of prominent, verified Twitter accounts … More ? The post Week in review: Counterfeit Cisco switches, hijacked Twitter accounts, vulnerable SAP applications appeared first on Help Net Security .

Continue Reading:
Week in review: Counterfeit Cisco switches, hijacked Twitter accounts, vulnerable SAP applications

New wave of attacks aiming to rope home routers into IoT botnets

A Trend Micro research is warning consumers of a major new wave of attacks attempting to compromise their home routers for use in IoT botnets. The report urges users to take action to stop their devices from enabling this criminal activity. The importance of home routers for IoT botnets There has been a recent spike in attacks targeting and leveraging routers, particularly around Q4 2019. This research indicates increased abuse of these devices will continue … More ? The post New wave of attacks aiming to rope home routers into IoT botnets appeared first on Help Net Security .

Read the original:
New wave of attacks aiming to rope home routers into IoT botnets

DDoS traffic capitalizes on remote working connectivity reliance to disrupt service provider targets

In the first quarter of 2020, DDoS attacks rose more than 278% compared to Q1 2019 and more than 542% compared to the last quarter, according to Nexusguard. Working from home as the new norm Researchers attribute the sharp rise in incidents to malicious efforts during the COVID-19 pandemic, causing DDoS attacks to interrupt service for large companies and individuals alike. ISPs face increasing challenges to curb undetectable and abnormal traffic before they turn into … More ? The post DDoS traffic capitalizes on remote working connectivity reliance to disrupt service provider targets appeared first on Help Net Security .

Read the original:
DDoS traffic capitalizes on remote working connectivity reliance to disrupt service provider targets

Week in review: DDoS attack trends, WannaCry lessons, new issue of (IN)SECURE

Here’s an overview of some of last week’s most interesting news and articles: Zero-day flaws in widespread TCP/IP library open millions of IoT devices to remote attack 19 vulnerabilities – some of them allowing remote code execution – have been discovered in a TCP/IP stack/library used in hundreds of millions of IoT and OT devices deployed by organizations in a wide variety of industries and sectors. Data Protection Officer independence: Ethical and practical considerations In … More ? The post Week in review: DDoS attack trends, WannaCry lessons, new issue of (IN)SECURE appeared first on Help Net Security .

Read More:
Week in review: DDoS attack trends, WannaCry lessons, new issue of (IN)SECURE

What’s trending on the underground market?

Trust has eroded among criminal interactions, causing a switch to e-commerce platforms and communication using Discord, which both increase user anonymization, Trend Micro reveals. Popular underground goods and services The report reveals that determined efforts by law enforcement appear to be having an impact on the cybercrime underground. Several forums have been taken down by global police entities, and remaining forums experience persistent DDoS attacks and log-in problems impacting their usefulness. Loss of trust led … More ? The post What’s trending on the underground market? appeared first on Help Net Security .

Read More:
What’s trending on the underground market?

Across-the-board increase in DDoS attacks of all sizes

There has been a 168% increase in DDoS attacks in Q4 2019, compared with Q4 2018, and a 180% increase overall in 2019 vs. 2018, according to Neustar. The company saw DDoS attacks across all size categories increase in 2019, with attacks sized 5 Gbps and below seeing the largest growth. These small-scale attacks made up more than three quarters of all attacks the company mitigated on behalf of its customers in 2019. DDoS attacks … More ? The post Across-the-board increase in DDoS attacks of all sizes appeared first on Help Net Security .

Original post:
Across-the-board increase in DDoS attacks of all sizes

Zyxel NAS, firewalls and LILIN DVRs and IP cameras conscripted into IoT botnets

A wide variety of Zyxel and LILIN IoT devices are being conscripted into several botnets, researchers have warned. Users are advised to implement the provided firmware updates to plug the security holes exploited by the botmasters or, if they can’t, to stop using the devices altogether or to put them behind network firewalls. Zyxel devices affected According to Palo Alto Networks’ Unit 42, botmasters using a new Mirai strain dubbed Mukashi are exploiting CVE-2020-9054, a … More ? The post Zyxel NAS, firewalls and LILIN DVRs and IP cameras conscripted into IoT botnets appeared first on Help Net Security .

Continue Reading:
Zyxel NAS, firewalls and LILIN DVRs and IP cameras conscripted into IoT botnets

DDoS attacks could affect next generation 911 call systems

Despite a previous warning by Ben-Gurion University of the Negev (BGU) researchers, who exposed vulnerabilities in 911 systems due to DDoS attacks, the next generation of 911 systems that now accommodate text, images and video still have the same or more severe issues. In the study the researchers evaluated the impact of DDoS attacks on the current (E911) and next generation 911 (NG911) infrastructures in North Carolina. The research was conducted by Dr. Mordechai Guri, … More ? The post DDoS attacks could affect next generation 911 call systems appeared first on Help Net Security .

View original post here:
DDoS attacks could affect next generation 911 call systems