Tag Archive for: stealing

Report: Hacker group FIN4 stealing insider info to exploit significant changes in stock prices

For more than a year attackers dubbed FIN4 have been stealing insider information that could affect stock prices by hacking email accounts of key corporate executives and others privy to sensitive deals, according to a report by security vendor FireEye.

FIN4 has been in operation since mid-2013, targeting mainly healthcare and pharmaceutical companies and their advisers, such as law firms, investor-relations consultancies and investment banks, the report says.

+ Also on Network World: Cyberespionage group launches sophisticated phishing attacks against Outlook Web App users |Hack the halls: Watch out for Cyber Monday scamathon +

To read this article in full or to leave a comment, please click here

Network World Tim Greene

Mobile Threat Monday: Legitimate Android Apps Hide Text Message Stealing … – PC Magazine

Mobile Threat Monday: Legitimate Android Apps Hide Text Message Stealing
PC Magazine
Lastly, we recommend installing security software on your Android to protect against threats like this. We've reviewed lots of Android security apps and recommend Editors Choice winners Bitdefender Mobile Security and Antivirus and avast! Mobile

“android security” – read more

Stealing encryption keys through the power of touch

Daniel Genkin et al.

Researchers from Tel Aviv University have demonstrated an attack against the GnuPG encryption software that enables them to retrieve decryption keys by touching exposed metal parts of laptop computers.

There are several ways of attacking encryption systems. At one end of the spectrum, there are flaws and weaknesses in the algorithms themselves that make it easier than it should be to figure out the key to decrypt something. At the other end, there are flaws and weaknesses in human flesh and bones that make it easier than it should be to force someone to offer up the key to decrypt something.

In the middle are a range of attacks that don’t depend on flaws on the encryption algorithms but rather in the way they’ve been implemented. Encryption systems, both software and hardware, can leak information about the keys being used in all sorts of indirect ways, such as the performance of the system’s cache, or the time taken to perform encryption and decryption operations. Attacks using these indirect information leaks are known collectively as side channel attacks.

Read 9 remaining paragraphs | Comments


Ars Technica » Technology Lab

17-year-old arrested for hacking into phones, stealing and distributing explicit images of children

A US teenager is charged with distributing child pornography after allegedly hacking minors’ cellphones through an SMS ad that installed malware, giving him access to the phones’ content.
Naked Security – Sophos