Author Archives:

E Hacking News – Latest Hacker News and IT Security News: Most of the Antivirus Android Apps Ineffective and Unreliable



In a report published by AV-Comparatives, an Austrian antivirus testing company, it has been found out that the majority of anti-malware and antivirus applications for Android are untrustworthy and ineffective.

While surveying 250 antivirus applications for Android, the company discovered that only 80 of them detected more than 30% of the 2,000 harmful apps they were tested with. Moreover, a lof of them showed considerably high false alarm rates.

The detailed version of the report showcased that the officials at AV-Comparatives selected 138 companies which are providing anti-malware applications on Google Play. The list included some of the most well-known names like Google Play Protect, Falcon Security Lab, McAfee, Avast, AVG, Symantec, BitDefender, VSAR, DU Master, ESET and various others.

ZDNet noted that the security researchers at AV-Comparatives resorted to manual testing of all the 250 apps chosen for the study instead of employing an emulator. The process of downloading and installing these infectious apps on an Android device was repeated 2,000 times which assisted the researchers in concluding the end result i.e., the majority of those applications are not reliable and effective to detect malware or virus.

However, the study conducted by AV-Comparatives also highlighted that some of the offered antivirus applications can potentially block malicious apps.

As some of the vendors did not bother to add their own package names into the white list, the associated antivirus apps detected themselves as infectious. Meanwhile, some of the antivirus applications were found with wildcards in order to allow packages starting with an extension like "com.adobe" which can easily be exploited by the hackers to breach security.

On a safer side, Google guards by its Play Protect which provides security from viruses on Android by default. Despite that, some users opt for anti-malware apps from third-party app stores or other unknown sources which affect safety on their devices.

The presence of malicious apps on Google Play was also noticed in the past and with the aforementioned study, Android is becoming an unsafe mobile platform.





E Hacking News - Latest Hacker News and IT Security News

OpenDNS Umbrella Blog: Introducing Threat Busters: A Game of Threat Intelligence

We’ve been on a mission to protect the world from internet-based threats since the launch of our enterprise security product, Cisco Umbrella (formerly OpenDNS), in 2012. We talk a lot about what our product can do and the threats it’ll block you from, but we don’t talk enough about the research team that powers our product and how they do it.

Today, we’re changing that. Introducing Threat Busters: A new digital adventure where you can access our team’s latest security research and hunt down threats in a retro, underground cyberworld while you do it. If you’re feeling competitive, find as many “Easter eggs” as you can to boost your score and join our Leaderboard.

The site is live with content on malicious cryptomining, ransomware and phishing and the cyberattacks XBash, DanaBot and Roaming Mantis. We’ll continue to add new threat and attack content monthly, based on what we see happening in the security space.

Here’s a sneak peak of what is live:

Threat Trend Graphs

With 16,000+ enterprise customers in over 160 countries, we have a unique view of corporate internet traffic. For both malicious cryptomining and phishing, we’ll show you traffic by company size, vertical and geography, as well as the overall traffic trend for December 2018 through February 2019. Above is a pie chart showing top phishing traffic by vertical for the period December 2018 through February 2019. Traffic trend graphs for ransomware are coming soon.

How Cisco Umbrella blocks threats

It might be enough for you to know that Umbrella blocks these threats and attacks, but have you ever wondered how it’s actually done? For each threat and attack featured we’ll tell you how our team blocks the threat in question, from using open-source intelligence (OSINT) to algorithms and everything in-between.

We also include a list of Indicators of Compromise (IOCs) on the attack briefing pages. We do this so that any member of the information security community can use them to identify potentially malicious activity on their own system or network and improve early detection of future attack attempts using the intrusion detection systems (IDS) and security information and event management systems (SIEM).

What cyber attacks are roaming the internet?

We’ll handpick current attacks that we see roaming the internet and give you background on the threat, how Umbrella blocks it and illustrate how the attack works.

Cisco Umbrella & Talos Security Intelligence

Cisco Umbrella, also benefits from the Talos Security Intelligence and Research Group. We leverage their threat intelligence to help detect, analyze and protect against both known and emerging threats.

Take the first step to making your organization more secure.

Happy exploring!

The post Introducing Threat Busters: A Game of Threat Intelligence appeared first on OpenDNS Umbrella Blog.



OpenDNS Umbrella Blog

SolarWinds MSP Blog: The Ins and Outs of Security Awareness Training

One of your customers’ employees logs into their computer. They get an email from someone claiming to be their IT service provider, saying they must reset their password immediately (even though there wasn’t any warning beforehand). They click a link without checking the destination URL, go to a phishing site, and enter the credentials for their email. The criminal now has access to their email credentials and starts a spear-phishing campaign. 

Read More

SolarWinds MSP Blog

liquid thoughts: Glossary dialog for Flow

This is the same as the previous post but without all the discussion, only the implementation.


The glossary creation dialog in Liquid | Flow will work as before, with changes to the grey text and layout, as shown below, and with a large change to the way the user indicates a relationship to the previous term:


first part. Hegland, 2019.


Once the user chooses a Glossary Entry, additional request appears below, asking the user to add a further relationship with the same two terms, but the other way around. Also, the little [+] only appears now, in case the user wants to add further relationships.

If possible, this additional relationship will be posted to the other term, (Liquid Information Environment, not Liquid | Flow) appended at the bottom of the term, if this is feasible.


second part. Hegland, 2019.

Dynamic View

This way the dynamic graph view can support showing both Liquid | Flow and Liquid Information in the centre:


flow in the centre. Hegland, 2019.


And once the user clicks on ‘Liquid Information’ it moves to the centre, showing relationships from its perspective:


liquid information in the centre. Hegland, 2019.



liquid thoughts

Bromium: Webinar: Social Media Platforms and the Cybercrime Economy

  • New “Social Media Platforms and the Cybercrime Economy” report explores the role of social media in enabling cybercrime
  • The author of the report, Dr. Mike McGuire, will discuss the key findings and recommendations in a live webinar on Wednesday, March 20 at 15:00 GMT | 11am EDT | 8am PDT
  • Download the report and join us for Wednesday’s webinar

Register Now: Download the report and you’ll automatically be enrolled in the webinar

Join us for a special Q&A webinar with Dr. Michael McGuire, a researcher who specializes in criminality from the University of Surrey, share the key findings of the next chapter in his landmark “Web of Profit” study. The new report, “Social Media Platforms and the Cybercrime Economy”, explores the role of social media in facilitating cybercrime and other criminal activity, including money laundering, extortion, and drug sales.

This report is a result of a 6-months-long academic study that looks deep into the systems that support cybercrime, and specifically zeroes in on the role that social media platforms play in promoting the spread of malware and enabling other criminal operations.

Dr. McGuire found that cybercriminals earn over $3bn per year from social media-enabled activities, and that so far, individuals, organizations, social media companies, and law enforcement agencies have no clear strategies for stopping them or protecting their own private information, data, and assets from being targeted.

Join us on Wednesday, March 20 at 15:00 GMT | 11am EDT | 8am PDT to chat with Dr. McGuire as he discusses the key findings of this groundbreaking research.

Register Now: Download the report and you’ll automatically be enrolled in the webinar

The post Webinar: Social Media Platforms and the Cybercrime Economy appeared first on Bromium.



Bromium

liquid thoughts: Showing relationships based on glossary

To define for the graph view we have the problem of arrows, of direction. If one entry has, for example, that Liquid | Flow was inspired by Doug Engelbart, it should ideally also have in the Doug Engelbart entry that he inspired Liquid | Flow.

When a node is in the centre of the view it should be able to link out to entries which are not listed in it’s WordPress entry, but in the other entries.

There are two ways to tackle this: The other entry could automatically have this new relationship appended but that would require semantic analysis to change ‘inspired’ to ‘inspired by’ or ‘works for’ to ‘is the boss of’ etc. Therefore I think the solution needs to be something where the user enters relationships in one node for both directions and then enters it in reverse for the other node. In this interface the user will enter ‘was developed by’ and then choose ‘Frode Hegland’ from the previous Glossary Entry popup:


glossary term for graph view. Hegland, 2019.


When the user clicks OK the dialog below is presented, asking the user to enter the reverse, which will then be appended to the other term’s WordPress entry:


reverse. Hegland, 2019.


This should then be able to support graph views. However, the problem in the graph view then is which version to choose? Incoming or outgoing? Maybe let the user choose based on the two options, by clicking on the arrow and have it reverse polarity and description?


Hegland, 2019.



liquid thoughts

E Hacking News – Latest Hacker News and IT Security News: Beto O’Rourke Was A Former Hacking Group Member In His Teen Days!




Beto O’Rourke, who’s better known for his candidature for the Democratic Presidential seat, has been revealed to be a part of an eminent hacking group in his teen days.


Recently in an interview for an upcoming book, O’Rourke confirmed that during his days in El Paso, he was a member of a hacking cult of the name, “Cult of the Dead Cow”.

His major tasks while in the group comprised of stealing long-distance phone service, participating stealthily in electronic discussions and related offenses.

While in the group he also took to writing online essays by the pen name of “Psychedelic Warlord”.

The essays ranged from fiction from the perspective of a killer to mocking a neo-Nazi.

According to the article, the ex-congressman was one of the most renowned former hackers of the American Politics.

The book goes by the name of “Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World.”

The book also encompasses the first-time mentions of the members of the aforementioned cult after they finally agreed to be named.

There is neither evidence nor insinuations as to Beto being a part of illegal hacking activities that deal with writing code or so.

The group in 1980s started getting known for hijacking others’ machines. It was all kind of controversial.

O’Rourke being a presidential candidate gets kind of in a shady side of the court with a past like this.

He was born to a high-up family in El Paso, but he also had played in a punk band before he started his small technology business and stepped into local politics.

O’Rourke’s national presence was enhanced when he defeated Texas Republican Sen. Ted Cruz during a Senate campaign.

On the brighter side, Beto’s involvement shows a profound sense of technological comprehension and a powerful will to change what’s not required.



E Hacking News - Latest Hacker News and IT Security News

liquid thoughts: What can you do with it?

Someone I know who is a very positive person but not at all very technical asked me a while ago about my Apple Watch: “What can you do with it?” And my first thought was “well, probably not very much for you because you don’t like to learn how to do things with tools”. I didn’t say this of course, I just mentioned a few of the main features. However, this got me thinking about something fundamental:

The pencil and paper, what does it do? This is a question more about the users skill level and use case. The properties of the pencil and paper medium are not that hard to describe. The power comes from a skilled interaction.

The smart phone, what does it do? This depends very much on the users ability and interest in using the available apps so the answer would be anything from just making calls to running your full digital life.

The point is that the capability = the tool + the user.

Personally I have to try to answer the question of what does a graph view of text do for an author? It’s not a simple question since there are specific ‘affordances’ which need to be be built into the system for certain things to be possible. When making a CGI movie it is often remarked on how everything in the world has to be thought about and designed–there is no background or set they can put the actors into. Similar things with games–in Battlefield I can easily blow up a building but I can’t tie my shoelaces.

I read once (and cannot for the life of me remember where, but I suspect it was in Edge) that a lead developer of the successful Crysis game once remarked that making the AI for the players adversaries work well was a matter of making sure that everything in the game knows what it is and what its characteristics are: A piece of wood needs to know what force is required to shatter it and so on. This matters greatly since a digital environment may look like a flat screen with colours but this is only a two dimensional slice of a multidimensional space of interactions. Even a paint program does not simply add colour to the screen based on the users mouse, trackpad or digital pen–it adds the marks based on the pen and virtual paper’s characteristics.

In the graph view what is being around is text and lines but the text represents specific text, since I have already taken it as a starting point that simply letting the user take any words from their document and move them around is not as useful as having different text have semantically interactive characteristics.

The basic way to do this is to have some sort of a list of what words are ’special’ and a way for the user to visually state which other text is also special. By assigning text as a heading you are saying it has a special role–and I am referring to roles within the work of authoring a document, particularly an academic document–that of indicating a high-level view of the organisation of the document. Headings have been referred to as structural links since they do not have a semantic meaning but they do have a semantic meaning, there is a reason why one chapter or section comes before another in the flow of a linearised argument. This is the very essence of headings: Showing sections of a linear flow. To me, at this point that should be respected and therefore headings shown by themselves, collapsed into a table of contents or outline should be editable in sequence through a drag and drop function but not be in a graph view since that defeats the function of headings. This can be disputed but there it is for me for now. They can have value in as markers in other views, but not for themselves.

Other text in a list. This refers to what I am working on with what was originally called the hyperGlossary and then Liquid Glossary but which I think I will just call it a glossary though Chris might not agree. Anyway, it’s a list but a list where each item has attributes (as in Crysis) to create an environment for useful interactions. Each ‘glossary’ term can easily be linked to other terms to create an explicit connections allowing for construction: wordpress.liquid.info/using-flow-to-post-glossary-term/

And there we have it. I wrote the above sentence using the word ‘structure’ instead of the final ‘construction’ since I thought that structure seemed a bit too final so I used Liquid Flow to look up construction in wikipedia–not useful, then the etymology and then it became clear that what I wanted to do was to say this allows for construction, it is not a structure and this is the key.

The glossary as I am designing it now for Liquid Author’s dynamic view has these types:

  • Document for anything the user cites
  • Authors/people in general
  • Institutions of people
  • Concepts for anything else

This is for the use-case of a student of course, the last item ‘concepts’ is quite general but users will be able to type in anything they choose. Likely ‘document’ will be auto-assigned when the user downloads an academic document with the Liquid Browser: wordpress.liquid.info/persistent-conceptual-objects-across-multiple-systems-views-an-rfc/

There is probably room for improving this list, particularly outside of the initial use case but categorising is useful for filtering views, for doing basic citation analysis for example. Naming things is a big issue. Confucius is said to have said: “If I was the ruler, the first thing I would do would be to make sure everything is named correctly”: “If names be not correct, language is not in accordance with the truth of things.”

[break]

Walking in the early, dark morning of Singapore to find a toilet, this Starbucks does not have one and it’s the only 24 hour one. Lots of police cars outside Orchard Towers. I hope they are only there for the unruly. Anyway, to ION and back and with a new perspective.

[break]

Human language does not allow for one correct label for one thing. For the case of this work though, I will remove ‘institutions’ from the basic list and have buttons for ‘Document’ and ‘Person’ and freeform for anything else, which will automatically be put under the meta-tag of ‘Concept’. This should serve literature reviews well since documents are a core unit and are addressable items and persons are out-of system but the reason for the documents. Anything else can be labeled should the user want to, from idea to building, but they willl… Stop, this does not really make sense. Let’s start again:

Buttons for Documents (they have citation information) and Person. Anything else will be text entered but recent items will stay available for clicking on, to use recollection to encourage the use of same tags. Here it is mocked up:


basic types. Hegland, 2019.


This means that we can support nice citation flows through documents, their authors and any associated concepts as well as let the user add any terms they know.

So what can you do with it? Anything you like in terms of visualisation we hope, over time. Initially though, we are focused on supporting citation views and concept views to help the student ‘map out’ their understanding of a knowledge space and communicate this understanding to other readers, particularly examiners of their thesis.

Conclusion

Headings are for linearising. Glossary terms are for enabling constructions of relationships. And this is how we will focus the development of the Liquid Views.



liquid thoughts

liquid thoughts: Conversations with Edgar

I started recording answers to function/expected questions from Edgar in the far, distant future. I worked on an app idea for this a few years ago and there are all kinds of wrinkles but I think I should just record some answer videos and then just see if I actually do enough and if they seem useful. They are on a public but unlisted playlist on YouTube:

https://www.youtube.com/watch?v=k3LKbC-0ZYU&list=PLYx4DnFWaXV9f41XUztRwuky3CqHvg6fX 

What prompted this is that I am in Singapore without Edgar or Emily revisiting pasts and thinking about futures. Right now we only have FaceTime video so why not let him have the potential to have ‘facetime’ chats with the dad who loves him so much in the future?

 



liquid thoughts

liquid thoughts: the dream. update

(Semi-personal diary note/update, written to a friend)

As you know, my dream is to build a thinking and presentation space which really starts to set the written word from the constraints of the past, free for rich interaction and deep visualisation. I really believe that this has serious potential to augment our ability to interact with knowledge in powerful ways.

I have just spent another $10,000 on Author though, and that is of course not sustainable. Most of this went to support import and export of Word, of which we are only partly done; we can’t export links or headings or images. Ugh, Microsoft has made this very hard…

The Dynamic View

I am looking at adding a major feature to Author, which would also be part of my PhD (yes, I’m hanging in there, barely): We already have the ability to pinch in to collapse the document into an outline and now it will be possible to pinch out to ‘explode’ it into a ‘dynamic’ view.

This is the view we have been thinking about, discussing and testing to an extent tested in collaboration with Chris as the Webleau/Liquid Space: soton.ac.uk/~totl/webleau/ and which I made video demo tests for way back when: youtube.com/watch?v=Z7zBW0ADecM&t=206s and today, to show an early transition from word processing view into the dynamic view. This is live software BTW, not a mockup: youtu.be/eZlJQM1UbLg

I have written a list of basic capabilities here: wordpress.liquid.info/initial-dynamic-view-behaviours

Glossary Terms

The crucial difference between the initial dynamic view tests and what I am looking at now is that it is not the headings which become the nodes, but terms which the user has defined in their personal glossary, as either a concept, a person, an institution or a document. These terms have been defined using Liquid | Flow which makes it easy to create a structured entry which then have relationships in them. I put up a few screenshots here for you: wordpress.liquid.info/using-flow-to-post-glossary-term/ and I have of course blogged about the process on the same blog in general: wordpress.liquid.info

Promoting Author

I am not standing completely still with promoting Author, though I desperately need support:

In order to promote Author I am adding the Rich PDF export, so that a full, original copy of the Author document is embedded into the PDF. This means of course that anyone with only a PDF reader can read it but if opened into Author you get all the interactions of a full Author document. I hope this will make Author documents more ‘viral’ since they will make it clear opening the document into Author gives the reader a better experience.

I also think it would be a great way to send the proposal document to Apple, with a top sentence in the ‘PDF’, saying ‘Please open this document in Author’

I am also sponsoring (only £1,000) a JATS conference 20th of May. JATS is the up and coming academic document format we are working on supporting: https://www.eventsforce.net/wgcconferencecentre/frontend/reg/thome.csp?pageID=5088&eventID=17&CSPCHD=000001000000M08K9Ve1kxFqgAdlrHpviYcGH3Sk$x7oUDJUT4

Question

So what to do now? The goal is to get Apple to consistently feature Author on the App Store, that should generate enough revenue to make it self-sustaining. I need $5,000 for the next few months to add JATS, rich PDF, smaller myriads of issues like making import and export work with all attributes, and most importantly add the Dynamic View feature.

Dynamic Views

I hope to have something more impressive and real to share with you for the Dynamic Views over the next few days…



liquid thoughts

Blog | Avast EN: Gearbest Data Breach Puts Millions at Risk | Avast

White hat hackers scanning the web for system holes and data leaks stumbled upon an unsecured ElasticSearch server containing millions of Gearbest customer records. Gearbest is an Amazon-style e-commerce site with a focus on tech and Chinese brands. It ships to over 250 countries and publishes 18 subdomains in different languages. Under parent company Globalegrow, Gearbest is a billion-dollar business, but while its privacy policy states that the company encrypts any and all customer info it retains, the unsecured server found online proves that this is not true. Hundreds of thousands of customers are putting themselves at risk daily, adding their info to the growing repository of customer data accumulating for anyone to access.



Blog | Avast EN