Open post

Russia has been banned from the 2018 Olympics, possibly connected to Olympic hacking

Recently we had a post involving some hacking attempts against those in cooperation with the 2018 Winter Olympics. The hacking attempts involved sending malware-full emails from spoof accounts to those with information on the progression and supervising of the 2018 Winter Olympics in Pyeonchang.

Russia had been banned from the Olympics a little over a month ago due to the conclusion of the International Olympic Committee in response to Russia’s exposure of systematic doping. Now, as of recent, hackers involved with the Russian government has released emails pertaining to stolen information from the International Olympic Committee.

The hackers have claimed the name “Fancy Bears” which is a reference to the games’ mascots. The cybersecurity firm ThreatConnect stated that an earlier hack involving the Olympics, was the work of a Russian military intelligence. The hackers had gone live and published the email on Wednesday the 10th, through the means of a website that was relevant in 2016 in relation to Russia’s doping exposure.

The origins of the emails are still unknown. The emails spanned all the way back to 2016 to spring of 2017 and involved messages between IOC employees and the third parties that discussed the Russian doping conspiracy. Fancy Bear had posted a comment along with the release of the emails, stating “Europeans and Anglo-Saxons are fighting for power and cash in the sports world.”

Despite the public attention to the emails, there has been no confirmation or denial of any of the stated information by IOC members.

Crazy is the things that come about when hackers are involved. The Winter 2018 Olympics will surely be something eventful, if not for the sport achievements alone.

Keep up to date on your technology and it’s vulnerabilities and solutions with RE2Tech. We make I.T. easy!

Have you taken precautions? Is your sensitive information at risk?

Give us a call or send us an email for all your I.T needs! We at Re2tech make I.T. happen!

Phone: 952-223-4422


Open post

McAfee twitter account hacked, cryptocurrencies may be next

Everyone knows of the virus security program McAfee, so that will make this information a little funny, but the cyber security expert John McAfee’s twitter account had been hacked.

This curious turn of events had occurred in order to promote specific alternative cryptocurrencies to invest in. Last week, McAfee’t twitter account had been hacked and abused to recommend cryptocurrencies, in the assumption that the hacker had invested in the same stock and was trying to cause a surge in the stock pricing to make some money.

McAfee  had posted a tweet clarifying that the twitter posts called “Coin of the day” was not made by him, and that his account was hacked. McAfee warns others of the potential danger in new hacking methods that had been used on him to attain his twitter account. The hackers had apparently changed the accounts linked phone number in order to attain the password with the “lost password” function. McAfee stated that this form of hacking has not been seen before, and that everyone else should be weary as well.

The hackers who posted tweets on McAfee’s behalf induced a rise in certain stocks of the cryptocurrency world, probably producing a nice lump sum of money for the hackers. There is speculation that AT&T had someone from the inside causing the problems, and that would explain the new phenomenon involving the phone number change on the account. McAfee regained control of his account three days after the incident and attempted to defend himself from the ridicule that followed.

There is further speculation that another large hack will occur in the cryptocurrency market, and that those who are investing should move their earnings to a private online wallet. Due to cryptocurrencies being a million dollar market, the target is big and red all over and in the cross-hairs of probably every hacker out there.

Keep yourselves safe everyone, and if you are in the crypto game, move that money before you lose it, like those involved in the Nicehash hit.


Open post

Hackers take aim at the Winter Olympics

2017 was a big year for technology and it’s hacking abusers. With the new year already in progress we were all hoping for a nice downtime from the bad news and potential dangers. Sadly that isn’t the case right now. Recently reported were attempts of maleware infection affecting those involved in the Pyeongchang Winter Olympics.

Apparently, emails containing maleware-infected documents were distributed to organizations involved in the organization involving the Winter Olympics. These emails were spoof accounts, which means they were simply made for the purpose of distributing the maleware, and used the false pretense of being someone they were not. The emails were reported to have been sent from South Korea’s National Counter-Terrorism Center, and that the email contained information that would help the process of antiterror drills in the region to prepare for the games.

The security firm McAfee confirmed the attempted malware intrusion upon inspection of the reports. Since December 22nd of 2017 there have been emails such as these circulating , attempting to either gain sensitive information such as passwords and emails or financial information. The emails that were received are reported to have been sent from Singapore but the content in the email was written in Korean. Along with the emails were the documents that held the malware, and those documents read as “Organized by Ministry of Agriculture and Forestry and Pyeonchang Winter Olympics”.

Through time, the emails had altered the way which they spread the malware, from a document to a hidden text, or picture, which is a tactic known as steganography. McAfee reports the implants in the emails lead to an established link between the victim and the attacker’s server, to enable the attacker to gain access to executable commands and install additional problems. McAfee expects there to be more attacks such as these to continue up until the event, and to be weary of the recent past examples that involved this form of attack.

Well, it looks like this year may be another trial that we all must pull together to overcome. In the meantime, give us a call at Re2tech to enhance your online defenses and become more understanding of your network and systems!


Keep up to date on your technology and it’s vulnerabilities and solutions with RE2Tech. We make I.T. easy!

Have you taken precautions? Is your sensitive information at risk?

Give us a call or send us an email for all your I.T needs! We at Re2tech make I.T. happen!

Phone: 952-223-4422



Open post

Googles discovered CPU vulnerabilities, and how it can affect you

Google is a forerunner in the online world for many aspects, but one of the main focuses of Google is security. Google has a “Project Zero” team dedicated to researching vulnerabilities their customers may be facing while also doing their best to provide solutions to the problems.

Last year the Project Zero team had come across a security flaw due to something called “speculative execution”, which is described as a technique used by most modern processors (CPUs) to optimize performance.

This security flaw is seen as a more serious flaw, due to it’s capabilities for leaking vulnerable information to an unknown party. Malicious persons may take advantage of the said vulnerability in the speculative execution process to read system memory that should otherwise be inaccessible. This may lead to the exposure of information such as passwords, encryption keys, or even sensitive information that is present in open applications. It was also noted that a virtual machine attacked through the vulnerabilities of speculative execution could also lead to access of physical memory in the host machine, further enhancing the dangers.

The affected CPUs are rather wide, but include AMD, ARM and Intel, as well as devices and OS running on those CPUs. Google has stated that the research team has updated their systems to defend against the speculative execution attacks, and cooperated with hardware and software manufacturers across the industry to protect a more broad range of technology and people. This cooperation has lead to mitigation of the affected from this form of attack.

Google has released a list of products and machines that have the mitigation and protection in place, the following are secured from the speculative execution attacks.

  • Android- Those with the latest security update are secure. Nexus and Pixel devices are also secure with the latest security update.
  • Google apps/ G Suite- no action needed
  • Google Chrome- There may be some necessary actions required on the users end. A link to the page is here
  • Google Cloud Platform- Google App engine is secure.
    Google Compute Engine: additional action required here
    Google Kubernetes Engine: additional action required here
    Google Cloud Dataflow: additional action required here
    Google Cloud Dataproc: additional action required here
  • All other Google Cloud products have been cleared and are secured.
  • Google Home/Chromecast -no action needed
  • Google Wifi/OnHub – no action needed

Google has stated that in order to take advantage of this new method of attack that uses speculative execution, the attacker must first run malicious code on the system they targeted.

Google has stated that there are three variants of the attack, which cant be mitigated with one method, but needs a specific method for all three attack variant. Some vendors have patches for one or two of the attack variants, and Google is working with them to ensure all three get mitigated over time.

It is good to know Google is helping to spread the necessary information for others to protect themselves against such a potentially dangerous attack! As for other means of protection, why not give us a call at Re2tech! We will ensure a strong security for your network and help teach you about your own system along the way! We make I.T. happen!

Keep up to date on your technology and it’s vulnerabilities and solutions with RE2Tech. We make I.T. easy!

Have you taken precautions? Is your sensitive information at risk?

Give us a call or send us an email for all your I.T needs! We at Re2tech make I.T. happen!

Phone: 952-223-4422



Open post

Smartphones with breach options, new option discovered

Smartphones are the present and the future, there is no doubt about that. They offer an immense control in a life and helps people stay up to date on what people are eating and how close WW3 is. It’s no surprise this is also the same device that is the target of hackers and the like, who want to steal information and jump start their own lives off of someone else’s.

Recently a study from NTU (Nanyang Technoloical University, Singapore) discovered a new method to which hackers may abuse in order to gain access to our little rectangular life box’s. The new access method actually involves your phones pin code.

There has been many vulnerabilities with smartphones since they have been released, involving things like the accelerometer, gyroscope, and proximity sensors. However through each vulnerability we have always come up with a means of patching said vulnerability. Well now we have another to patch involving the pin code. This was discovered through the experimentation with six different smartphone sensors and state-of-the-art machine learning, and deep learning algorithms. Through this experimentation the researchers from NTU has had a 99.5% accuracy within a three attempt confines, and the type of smartphones involved were using the Android operating system. The researchers used the 50 most common PIN numbers to experiment in this process.

Before this method came to be, the dominant phone hacking technique only had a 74% chance of success, while that is still very large, this new method is much more alarming. NTU’s technique can be used to guess all 10,000 possible combinations in a four-digit PIN.

The means by which the researchers came across this method is quit astounding actually. What was studied was the orientation, the light variation across the screen, and which thumb pressed the pin numbers. This led to the realization of variables that the phone is exposed to while someone enters specific numbers, allowing the deep thinking algorithm to narrow the possibility in pin combination and have a much easier time at assessing the correct possible combination. It is also worth mentioning that the technology used has a means of increasing it’s success rate with more exposure to possible pins and means of them being entered.

While this discovery may be frightening, it also means we have a way to understand it’s method and develop some manner to combat it, preventing hackers to use and abuse this information. Researchers at the University think that access to phones sensors and sensor information is too large of a risk and should be on lock-down in devices to prevent this method of access from ever becoming an issue.

Technology sure can be daunting, but with every virus there is a cure, with every method there is an equally effective anti-method. Let’s be sure to continue our cautiousness with our sensitive information and stay up to date on their strengths and weaknesses! That’s all for today, be sure to call for e-mail use for any questions or installations! Here at Re2tech, we make I.T. happen!

Open post

Forever 21…for the hackers with new credit card information

Hello all! We hope everyone had a nice relaxing holiday before the new year was rang in! Unfortunately during the holiday rest, someone got a little too relaxed. The known clothing company “Forever 21” was a victim of another security breach for the 2017 year.

The popular clothing store had apparently been hit with malware at some of their store locations, causing customers who paid with credit card in store, to have their information exposed to those hackers who installed the malware.

The company has made a statement addressing the issue, and reminding customers to constantly keep track of their card purchases and report any suspicious charges as soon as they see something to mitigate chances of their accounts being drained.

From the investigations findings, it was reported that the malware was installed and activated somewhere between April 3rd and Nov. 18th of 2017. There has been no number confirmation as of yet on the amount of people affected by this breach. It was noted that those who paid with card over Forever 21’s website are not affected, for the malware did not have any grasp on those lines of payment.

Forever 21 has a phone number to call that will answer questions about the breach.

Forever 21’s security breach hotline:

1-855-560-4992 Monday through Friday  between 8a.m. to 6p.m. P.S.T.

There we have it, another last security breach for 2017 before the new year could ring in. Hopefully this will be the last attack that will be revealed involving the 2017 year, for there have already been far too many!

Stay vigilant and informed, and as always if you need any IT help whether it be questions or installations, be sure to contact us and we will see that your network becomes secure and your insecurities are no more!

Open post

Cloud security going into 2018

The cloud is becoming more and more preferred as times goes by. Data and applications are streaming to it at a faster rate every hour, and more people are deciding to turn to cloud services on a daily. There is no question as to why this is happening, the cloud services are extremely convenient and offer functionality that you cant find anywhere else! In saying that, this also means cloud services are under a watchful eye by everyone, even the nefarious types.

Threats to the cloud

Generally when we have something good, people like to mess it up. The cloud is no different, there are people who have already interfered with the cloud and it’s services to steal data for very selfish and rather rude reasons. 2018 will be no exception to this, for there are quit a few issues with the newly born service that can easily be manipulated. Despite popular belief, cloud services and their security are not in the hands of the service provider, rather the customer. Knowing that, we should evaluate the potential risks with cloud technology and understand the vulnerabilities of the information stored on the cloud.

  • Data breaches– This can occur in multiple ways, ranging from intent to steal information on the cloud, human error, vulnerabilities in applications relating to the cloud, or just poor security understanding and practices.
  • Insufficient identity, credentials, and access management– Persons with ill intent may gain access to cloud stored information and cause all sorts of trouble due to a lack of credential security, which would enable unauthorized access to your data.
  • Insecure interfaces and application programming interfaces– Cloud technology providers expose UI’s and API’s that customers may use to manage their cloud experience. This is both great and bad, for this means the protection you could have is in your hands, and were you to become accessed by some unwanted party, they now have full access to your cloud security, and the providers of that cloud will have little to no feasible way to rescue you. There is a lacking of accidental and malicious attempts of policy circumventing.
  • System vulnerabilities– This is the big contender that has gained spotlight this last year for cloud tech. These are exploitable bugs in the program that allow malicious actions to gain access to a system and steal data, taking control of the system, or disrupting service operations.  Vulnerabilities within the components of the operating system put security of all the services and data at significant risk. Because the cloud has systems from various organizations placed close to each other, if the cloud is breached, that means those other systems are now vulnerable as well.

The cloud is a fantastic service that will no doubt lead to other great systems and functionality in the world, however right now while it is still young, it has quit a few quirks to work out before it can be considered a fully safe and developed system. Now that doesn’t mean don’t use the cloud, it means be mindful of what you put on there, and the risks that are present in the technology your using.

Open post

2018 predictions: Healthcare security breach

As we all have become aware, 2017 was a free for all when it comes to security breaches.  There were countless phishing scams, ransomware, state-sponsored attacks and new forms of attacks that all made headlines and shook us to our boots. However 2018 means a new year and a new us! Right? Well we hope so, but thus far the the outlook isn’t in our favor.

Recently a VP at Tripwire gave his predictions for 2018 and our security in the online world. The prediction does not bring bright bearings, in fact it seems 2018 may be quit ill.

The Tripwire VP predicts that healthcare security will be breached, due to the ever growing vulnerability in medical devices and electronic healthcare records. 2018 is expected to have hospitals, insurers and healthcare manufacturers in the sights of hackers  and cybercriminals.

It is expected that the healthcare industry is not prepared for the kinds of attacks that may come, with things like the WannaCry incident and the UK NHS.  Not all ransomware is noisy and boisterous which is where the real danger may lie for the healthcare industry.

In relation to the healthcare being a target for 2018, there is also a lot of talk about the cloud, and it’s  potential security abuse over the horizon in 2018. It should come to no surprise that since cloud technology is still pretty new, that defending the cloud is still a process in the works. We should not be taken by surprise when there is another cloud data management leak, and should be cautious until they have developed a stronger, more prominent protection for cloud storage. There is talk of security becoming up to date near the end of 2018 for this form of technology, but until then we may see leaks of credentials and misconfigurations, as well as other exploited vulnerabilities.

Let’s all learn from the mistakes of not only ourselves, but each others, and make 2018 predictions like this nothing but a false alarm! If you need help with your online presence, give us at Re2tech a call and lets discuss your security options and optimizations! 

Open post

2018 security expenses expected to rise in response to 2017

2017 was full of news on companies and corporations that had security breaches, and the effects on the masses that would follow because of them. Because of this hard pressed security year, it is expected that in 2018, the total expenses on security spending will rise, by about an estimated 8%.

A research firm known as Gartner took data from 2017’s data breaches and calculated in the response from similar companies and corporations, to derive an expected shift in security spending, as well as the changing views on cyber security.

In 2017 it was estimated that the total spending on security measures summed up to about $89.1 billion. The $89 billion expense resulted from the events of the previous year that spurred people to take cyber security more serious and treat it as an actual threat. The same reasoning is behind the estimated spending for 2018, which is at $96.3 billion. This increase comes at no surprise in response to the overwhelming coverage of security breaches all over the world, and these breaches are estimated to affect the three years following the event. So moving into 2019 we can already estimate a larger security spending sum.

Gartner uses multiple factors under the umbrella of cyber security to make these estimations more accurate. The several sub sections of cyber security involve the following:

-Identity Access Management

-Infrastructure Protection

-Network Security Equipment

-Security Services

-Consumer Security Software

It was made clear by Gartner that out of all these sub sections, the section that would be most invested in this coming year would be Security Services, priced at $57.7 billion which is an increase from last this years $53 billion. The other sub sections of security spending is also estimated to increase this coming year, just not as largely as Security Services.

Gartner also says that the spending will continue to go up from here in the next few years, with more than 60% investing in data loss prevention, protection and encryption tools. Currently spending is at about 35% for protection tools, so there is an obvious large spike in response to recent events around the world with enterprises and their security.

Let’s buckle up and get ready for an interesting new year! Before the new year rolls in, why not be the first to pave the path of a more secure cyber presence and let us at Re2tech work to hatch down your vulnerable information and close any back doors in your network!

Posts navigation

1 2 3 4 5 6
Scroll to top