Open post

Follow up information on the Uber data breach

Earlier today, it was made public the specifics that were stolen during the Uber data breach. Uber gives a more in-depth idea of the information accessed by the hackers, giving customers and drivers a stronger understanding of their vulnerability.

Some U.S. senators have been hounding Uber for more information on their security breach and what it meant for the customers who’s information was involved. Uber had hired an outside cybersecurity firm after the massive data breach, to get some more detailed information on the event. The cybersecurity firm has stated that they found no evidence of any riders’ credit card information, bank account information or social security numbers being downloaded by the two hackers. Uber has however disclosed that in some cases, the hackers had retrieved the location information from the place where people signed up for Uber, as well has some heavily encoded versions of the user passwords.

The company has stated that they have not seen any evidence of account fraud or misuse of data from the breach. As a response to the data breach concealment, there has been two employees who were fired for not “informing the appropriate parties”. The two employees were anonymously contacted by the hackers, being told they had just been breached and demanded payment. Through the tracking of the breach using private cloud data stored on Amazon’s web services, Uber was able to shut down access from the hackers.

The two employee’s agreed to pay the hackers $100,000 so that they would delete the data. Later on, the hackers real identities were identified, and they signed documents saying that all breached data was deleted, ensuring that the information could not be abused. It was disocvered that the hackers first gained access to Uber’s network on Oct. 13th, 2016 and the last use point of contact was on Nov. 15th. 2016.

It is still unclear if a criminal investigation has been started. Uber has since installed a stronger online defense to prevent the same issue from arising again. 

Open post

HP laptops pre-installed with keyloggers

Recently made public by a security researcher by the name of ZwClose, is the unfortunate mishap affecting some of the HP laptops.

Supposedly in the past there have been complaints about HP leaving key loggers installed on laptops, posing a potential danger to those whose laptops are involved. Key loggers that could allow hackers to record every keystroke on the laptop and steal sensitive data from the users which can include everything from usernames and passwords to credit card information.

Unfortunately the mistake has once again risen is head. The key loggers have been found to be in an estimated 460 HP laptops, supposedly “accidentally left behind” from the manufacturing and testing stages of the laptops. The key loggers are turned off, which may seem like its not be deal then, however, there is the potential for hackers to alter the registry value associated with the key logger that would turn it on, and give the hackers access to the device.

HP claimed it was also a “debug trace” and has since been removed when made aware of the problem. A list of the affected models for HP laptops can be found at this link here. If your model is listed, it is important to update your drivers as soon as possible to prevent any possible key logging travesties.

It’s important to keep up to date on your devices and their security, so keep checking back for more insight on what may prove a threat to your home, life and online presence!

Open post

Breaking news! Everything keeps breaking! Here we go again…

Another day another security breach! But where at this time you may ask? A cryptocurrency company known as NiceHash.

Early Wednesday, it was discovered that hackers had breached the bank of NiceHash and stolen potentially millions of dollars in bitcoins. It was made known that most of the funds stolen belonged to the customers of NiceHash. The customers of NiceHash use their computer processing power to earn cryptocurrency.

The hack affected the payment system of NiceHash and got away with the entirety of NiceHash’s wallet, an estimated 63 million in bitcoins. NiceHash has stated that they are working on resolving the urgent matter as fast as possible, and have contacted the necessary law enforcement authorities, while also conducting their own investigation.

NiceHash is a mining service for cryptocurrencies. NiceHash lets people offer their extra computer processing power for high-energy calculations and in the process are rewarded with altcoins, a differrent form of cryptocurrency, that can be exchanged for bitcoins. Generally people move their earnings to their personal cyber wallets and exchange the bitcoins for currency in some manner, however some people chose to leave their earnings in NiceHash’s cyber wallet…the one that was hacked.

Cryptocurrency companies often boast about the safe and trustworthy technology that secures the currency from hackers and the like, but NiceHash isn’t the first company that’s in the cryptocurrency business to be hacked. Just last month, a company called Parity had their digital wallet frozen by a novice hacker, making around $162 million in cryptocurrency unusable.

Word of advice: Don’t leave your money in someone else’s pockets, it may not be there later.

Be careful on the web folks and as always, if you need some reinforcement of your networks and want to learn about your security options, as well as the technology your using, give us a call at Re2tech! 

Open post

PayPal acquires TIO networks but with a cost

Just hours ago, it was made public that PayPal has had a security breach due to their newly acquired networks company TIO.

Back in February, Paypal had acquired TIO Networks in hopes of introducing the TIO customers to PayPal’s services. This attempt at bolstering their user numbers has actually backfired.

Thus far it is estimated that 1.6 million customers’ personal information has been breached. PayPal has suspended TIO networks last month after discovering the evidence of a security breach. PayPal stated that TIO’s network had discovered the vulnerability in security and that the forms of information that was taken could be customer names, addresses, SSN, and login credentials.

It is important to note that the PayPal systems and TIO systems are separate networks and PayPal customers were unaffected. Thus far, TIO will remain in suspension until TIO’s platform issues with data security and information security standards are up to PayPal’s standards.

It’s quit lucky that PayPal had chosen not to fully merge the systems otherwise this could have become an even bigger issue and also involving customers with PayPal accounts.

Be careful where you put your sensitive information on the web, and ensure the businesses your using has strong network defenses. 

Open post

Morrisons supermarket data breach

Just hours ago, it was made public that Morrisons, a super market, is being held liable for the breach of information involving their workers.

Workers of Morrisons recently made a claim against the company after another employee named Andrew Skelton, stole data from the company that includes working salary, bank details, names and addresses of nearly 100,000 employees.

Morrisons believes it should not be held accountable for the actions of Skelton and is appealing against the decision.

This security breach occurred in 2014, that was when Skelton, a senior internal auditor leaked the information of employees to the internet and newspapers.

Supposedly this was a grudge retaliation over an incident that had recently occurred. Skelton was jailed for eight years in 2015, guilty for fraud,  securing unauthorized access to computer material and disclosing personal data.

Lawyers claim the company is at fault for lacking security means and the vulnerability of 5,518 former and current employees. The Judge has ruled in favor of holding Morrisons accountable for the incident. 

Open post

Reddit user discloses some major issues with Mac OS root login

Recently, a user on Reddit gave information on a huge Mac OS High Sierra vulnerability. Access to “root” permissions is as easy as an empty password, potentially leaving users extremely vulnerable. If someone has physical access to a Mac OS High Sierra system, they can access personal files and change anything without any admin credentials.

This is a huge vulnerability for Mac users. Developer Lemi Orhan Ergin contacted apple to inform them of the vulnerability. Apple at the time had no update ready for such an issue, however informed of users a way to mitigate the possibility of someone gaining root access.

Disable guest users 

Opening up the system preferences and finding the “Users & Groups” section you can select guest users and uncheck “Allow guests to log into this computer.”

By doing this, no one can log into a guest user account and give them direct access to the root permissions option.

Change root password on Mac OS High Sierra

Another means of mitigating this issue, is by actually assigning a password to the root permissions, so if someone did attempt to enter with an empty password, they would be outright blocked.

  1. Launch systems and preferences
  2. Select users and groups
  3. Login options
  4. Join which is next to the “Network Account Server”
  5. Open Directory Utility
  6. Click the lock icon, and enter your password to gain access
  7. Once inside, in the menu bar of directory utility, select “Change Root Password”

That’s it! Make your own password for the Root access and ensure it is strong to keep it worth this effort!

Apple has informed that they are working on a quick patch, so the problem shouldn’t be relevant for too long, however it is always good to become familiar with this side of your system and learn of it’s layout, in case something in the future pops-up involving the same issue.

Stay safe and hacker free! Give us a call at re2tech and we can beef up your security and help explain your system and it’s workings to you in the process! 

Open post

Imgur suffers a data breach, millions of accounts compromised

Recently reported, Imgur,  the image-sharing website has been victim to a data breach. Millions of accounts are suspected to have been compromised.

A security researcher recently discovered back in 2014 Imgur had suffered a massive data breach, putting millions of accounts in a state of vulnerability. The affected information consisted of emails and passwords for the accounts, however there are no reasons to believe any real names or other personal data was breached.

This is a lucky break for imgur, seeing as how many a businesses have been coming out informing their customers of a breach that occurred and customers very private information was stolen, like real names/addresses and credit card numbers.

Imgur has been praised for their swift action and transparency on the matter. Imgur’s chief operator put out a statement saying “We apologize that this breach occurred and the inconvenience it has caused you.”

The data researcher who discovered the breach thinks the encryption method Imgur used in 2014, A hashing algorithm, was broken through with brute force, and that because Imgur updated their encryption method in 2016, there shouldn’t be worries of it occurring again anytime soon.

Great job Imgur for addressing the issue in a time sensitive manner and with consideration for your customers. This is a great contrast in comparison to the Uber mishap that was recently made public.

Keep your information up to date and your usernames and passwords strong and changing between applications/websites. Don’t let data breaches like this affect your daily life! 

Open post

Data breach at the Department of Social Services

This just in, the department of Social Services credit card system has been breached, as of yesterday. This isn’t something to be thankful for that’s for sure.

8,500 people have received warnings that their personal data held by a contractor has been breached. Past and current employees alike are vulnerable. The breach included employee names, user names, work phone numbers, work email, credit card information, Australian government  service number, public service classification, organisation unit and system passwords. In early November, the department alerted it’s employees to the system breach prior to 2016.

There was not a communication of how long the data was exposed for, however a DSS spokesman said the contractor, business information services, said the data was open from June 2016 until October 2017. The data related to the period 2004-2015.

So far the DSS is putting blame on the third-party providers actions, stating that the breach is in no way a fault of the DSS. Recently stated, the DSS said the data has now been secured, and that there was no evidence of improper use of the departments credit cards. It was stated that the type of information that was stolen can be a strong factor to identity theft, fraud and masquerading, where the attacker is pretending to be an authorized user.


Open post

Uber made a Uber mistake

Recently disclosed by Uber was a mishap that affects millions of customers and drivers, but it was swept under the rug, potentially putting millions at a higher risk.

Apparently late 2016, Uber had been hacked, and millions of customers and drivers’ sensitive information had become known to the malicious online hackers. Instead of disclosing this information to the proper channels, Uber instead chose to pay hackers 100,000$ to destroy data on millions of customers and drivers, to hide the incident from victims and authorities.

Attorney generals in at least four U.S. states have launched investigations into the incident. Due to Ubers decision to go against regulations and report the incident, they are now in hot water with their customers and drivers, as well as local governments.

The FTC, which looks into companies who handle sensitive personal information, is now looking into Uber to assess the damage and serious issues that are prevalent in response to the breach.

This issue does not only affect the US, but the UK as well. The UK criticized Uber for it’s lack of communication, preventing UK government to look into the problem and asses the damage for those affected. The UK has a 500,000 pound penalty delivering to Uber for their inability to follow regulations.

The information that was stolen includes email, phone numbers, names, as well as license numbers. An estimated 600,000 drivers license numbers were stolen.

Uber has been tight-lipped with reporters looking for more inquiry about the problem that arose and how it was handled.  Uber executives have been fleeing one by one for one reason or another, involving sexual harassment, data privacy, and business practice. London has pulled Uber’s operating license because of their failure to deal with public safety and security isssues. 

Open post

One Plus, potential for additional disasters

Recently, OnePlus, the phone brand, has been under scrutiny due to a newly discovered security flaw with one of their apps. Their app, also known as OnePlus, leaves the consumer open to attacks because the application was revealed to carry root access for the device.

So what does this mean? It means that your device may be accessed even when locked, using this vulnerability. This access to the root for the device is called “Engineer mode” and was originally made for the purpose of checking the phones functionality before leaving the factory. The issue is, that the application OnePlus also has a backdoor that leads to the root and this functionality. Which means if someone so desired, they could gain access to your phone, despite their being a password lock on it.

A developer who discovered the vulnerability, plans to release an app which exploits this vulnerability and gives OnePlus users an easy root access method.

This exploit still requires ADB, but nonetheless still poses a threat to users. Thus far there has been no action taken, but the CEO of OnePlus said they are “looking into it.” 


Posts navigation

1 2 3 4 5 6
Scroll to top