The Pointman
3.6K views | +0 today
Follow
 
Scooped by The Destroyer at #OpDejaVu
onto The Pointman
Scoop.it!

Target can't dodge lawsuits from banks after huge data breach

Target can't dodge lawsuits from banks after huge data breach | The Pointman | Scoop.it
When Target was, well, targeted by hackers in search of customer payment information late last year, legal backlash from banks was probably one of the last things the company's brass was worried about.
more...
No comment yet.
The Pointman
The Eyes of PSYOP
Your new post is loading...
Your new post is loading...
Scooped by The Destroyer at #OpDejaVu
Scoop.it!

Regulate Weapons Like We Do in the Military, Says an Army Officer - TheAtlantic.com

Regulate Weapons Like We Do in the Military, Says an Army Officer - TheAtlantic.com | The Pointman | Scoop.it

Readers continue their conversation with James Fallows on firearms in the United States.

The Destroyer at #OpDejaVu's insight:

It's time for something new.

more...
No comment yet.
Scooped by The Destroyer at #OpDejaVu
Scoop.it!

The History of the Word ‘Hack’ - by Wrike Project Management Software - TechPrevue.com

Odds are, the word hack immediately brings to mind either cybercrime and stolen passwords or tech shortcuts and everyday timesavers. But did you know the word’s history stretches far back into the middle ages, centuries before computers and the internet?

more...
No comment yet.
Scooped by The Destroyer at #OpDejaVu
Scoop.it!

One in five sexual assaults in NSW committed by people the victim met on online dating apps Tinder | Daily Mail Online

One in five sexual assaults in NSW committed by people the victim met on online dating apps Tinder | Daily Mail Online | The Pointman | Scoop.it
One in five sexual assaults reported in New South Wales are committed by someone the victim met on Tinder or a similar online dating tool, alarming new findings reveal.
more...
No comment yet.
Scooped by The Destroyer at #OpDejaVu
Scoop.it!

Why humans are an intractable cybersecurity problem - TechRepublic.com

Why humans are an intractable cybersecurity problem - TechRepublic.com | The Pointman | Scoop.it
Nations need to be aware of technological opportunities and the risks of artificial intelligence, social media, and big data, says Neil Walsh, UN Chief of Cybercrime.
more...
No comment yet.
Scooped by The Destroyer at #OpDejaVu
Scoop.it!

Ad Tech Execs and App Marketers Don’t Think Apple Can Sell Ads Without Data Collection – Adweek

Ad Tech Execs and App Marketers Don’t Think Apple Can Sell Ads Without Data Collection – Adweek | The Pointman | Scoop.it
As the tech giant reportedly weighs another ad network bid, some industry figures are skeptical of the company’s chances.
more...
No comment yet.
Scooped by The Destroyer at #OpDejaVu
Scoop.it!

What War Games Tell Us About the Use of Cyber Weapons in a Crisis - CFR.org

What War Games Tell Us About the Use of Cyber Weapons in a Crisis - CFR.org | The Pointman | Scoop.it
In five of the six games, players launched offensive cyber operations only after conventional weapons conducted destructive attacks. Additionally, players were more willing to place systems on nuclear alert than to launch cyberattacks or even cyber-enabled information operations. Over and over players cited concerns about escalation in their cyber restraint, articulating fears that cyberattacks could “lead to nuclear war.” Further, in all of the six games, despite large scale adversary cyberattacks (up to nuclear effects in allied countries), none of the “blue” teams chose to respond to cyberattacks. In one game, a player explained, “this is cyber—it’s different psychologically.” In all of these games, players were told who had attacked them in cyberspace, essentially priming them for retaliation. The lack of support for retaliation in these games is, therefore, especially compelling.
more...
No comment yet.
Scooped by The Destroyer at #OpDejaVu
Scoop.it!

After Santa Fe School Shooting, Texas Launches Mobile App To Help People Report Suspicious Activity – Houston Public Media

After Santa Fe School Shooting, Texas Launches Mobile App To Help People Report Suspicious Activity – Houston Public Media | The Pointman | Scoop.it
Nearly a month after Santa Fe high school shooting, Gov. Greg Abbott has launched a digital technology to make it easier for Texans to report unusual activity in schools and communities within minutes.
more...
No comment yet.
Scooped by The Destroyer at #OpDejaVu
Scoop.it!

FBI Urges After Russian Hacking: Reboot Your Routers « WCCO | CBS Minnesota

FBI Urges After Russian Hacking: Reboot Your Routers « WCCO | CBS Minnesota | The Pointman | Scoop.it
“The size and scope of the infrastructure impacted by VPNFilter malware is significant,” the FBI said.
more...
No comment yet.
Scooped by The Destroyer at #OpDejaVu
Scoop.it!

Lack Of Paper Trail A Concern Amid Fears Of Election Hacking « CBS Chicago

Lack Of Paper Trail A Concern Amid Fears Of Election Hacking « CBS Chicago | The Pointman | Scoop.it
Last week, the Senate Intelligence Committee issued a report that recommended replacing machines that don't produce a paper record of the vote.
more...
No comment yet.
Scooped by The Destroyer at #OpDejaVu
Scoop.it!

Social media giant Facebook blasted for soaring abuse against judges - TheSun.co.uk

Social media giant Facebook blasted for soaring abuse against judges - TheSun.co.uk | The Pointman | Scoop.it
Public debate has been 'coarsened' and social media firms are to blame for a rise in abuse against judges, Justice Secretary David Gauke has claimed...
more...
No comment yet.
Scooped by The Destroyer at #OpDejaVu
Scoop.it!

Sports world adapts to growing cybersecurity threats - Sportsnet.ca

Sports world adapts to growing cybersecurity threats - Sportsnet.ca | The Pointman | Scoop.it
Imagine the fallout if the NHL was hacked and its star players -- think Sidney Crosby, Auston Matthews and Connor McDavid -- had their home addresses, phone numbers and other personal information made accessible online.
more...
No comment yet.
Suggested by The Destroyer
Scoop.it!

UK health service boss in the guts of WannaCry outbreak warns of more nasty code infections • The Register

UK health service boss in the guts of WannaCry outbreak warns of more nasty code infections • The Register | The Pointman | Scoop.it

Assume we're going to get hacked next time and plan for it.

more...
No comment yet.
Scooped by The Destroyer at #OpDejaVu
Scoop.it!

This is Spartacus: new ransomware on the block - SecurityBoulevard.com

This is Spartacus: new ransomware on the block - SecurityBoulevard.com | The Pointman | Scoop.it

In this blog post, we'll analyse Spartacus, one of many new ransomware families popping up in 2018.

more...
No comment yet.
Scooped by The Destroyer at #OpDejaVu
Scoop.it!

ThreatList: Biggest Cybercrime Developments in 2018, So Far - ThreatPost.com

ThreatList: Biggest Cybercrime Developments in 2018, So Far - ThreatPost.com | The Pointman | Scoop.it

A look at the underground cybercrime landscape in 2018 shows a dynamic and quick-reacting community in the face of a successful crackdowns by law enforcement.

more...
No comment yet.
Scooped by The Destroyer at #OpDejaVu
Scoop.it!

Banks Suffer an Average of 3.8 Data Leak Incidents Per Week - ThreatBrief.com

Banks Suffer an Average of 3.8 Data Leak Incidents Per Week - ThreatBrief.com | The Pointman | Scoop.it

It’s no secret that financial services organizations are juicy targets for cybercrime, but new data shows how much more the bad guys are stealing from them: in the past year, there’s be…...

more...
No comment yet.
Scooped by The Destroyer at #OpDejaVu
Scoop.it!

Why Nation-State Hacking Should Matter To Everyone

Why Nation-State Hacking Should Matter To Everyone | The Pointman | Scoop.it
Nation-state hacking may leave you or your business vulnerable.
more...
No comment yet.
Scooped by The Destroyer at #OpDejaVu
Scoop.it!

Over 100 Amazon employees, including senior software engineers, signed a letter asking Jeff Bezos to stop selling facial-recognition software to police - Business Insider

Over 100 Amazon employees, including senior software engineers, signed a letter asking Jeff Bezos to stop selling facial-recognition software to police - Business Insider | The Pointman | Scoop.it

A letter asking Amazon CEO Jeff Bezos to stop selling facial-recognition has now been signed by over 100 employees, including some senior engineers, sources told Business Insider. The protest by Amazon employees follows similar revolts at Microsoft and Google.

more...
No comment yet.
Scooped by The Destroyer at #OpDejaVu
Scoop.it!

How are hackers taking advantage of World Cup fever? - SiliconRepublic.com

How are hackers taking advantage of World Cup fever? - SiliconRepublic.com | The Pointman | Scoop.it

The World Cup is generating a lot of buzz, but it also brings a lot of opportunities for wily cyber-criminals.

more...
No comment yet.
Scooped by The Destroyer at #OpDejaVu
Scoop.it!

What is Cyberbullying? | Michael Nuccitelli, Psy.D.

What is Cyberbullying? | Michael Nuccitelli, Psy.D. | The Pointman | Scoop.it
Cyberbullying is a pediatric phenomenon including the dynamics of victimization, aggression, control & manipulation. It is the addition of the artificial and abstract electronic universe, known as cyberspace, which the cyberbully, target and bystander are at a much higher risk of carrying these negative interpersonal traits into adulthood.
more...
No comment yet.
Scooped by The Destroyer at #OpDejaVu
Scoop.it!

Financial Giants Adopt Military-Style Defense Tactics to Fight Cybercrime - Lifars.ocm

Financial Giants Adopt Military-Style Defense Tactics to Fight Cybercrime - Lifars.ocm | The Pointman | Scoop.it
One of the world’s most lucrative industries, cybercrime has cost over $445 billion in 2017 alone, up 30% in the last three years alone.Financial giants l...
more...
No comment yet.
Scooped by The Destroyer at #OpDejaVu
Scoop.it!

How To Stop The NRA - trofire.com

How To Stop The NRA - trofire.com | The Pointman | Scoop.it
A police chief in Houston is standing for gun reform! Cenk Uygur and Ana Kasparian, hosts of The Young Turks, break it down.
more...
No comment yet.
Scooped by The Destroyer at #OpDejaVu
Scoop.it!

Russian hackers sent death threats to US army wives posing as ISIS: Report - HackRead.com

Russian hackers sent death threats to US army wives posing as ISIS: Report - HackRead.com | The Pointman | Scoop.it
Apparently, US military wives and families were threatened with death threats by Russians impersonating as IS hackers.
more...
No comment yet.
Scooped by The Destroyer at #OpDejaVu
Scoop.it!

Security Alert: VevoLocker Ransomware Hits Ukrainian Ministry - HeimdalSecurity.com

Security Alert: VevoLocker Ransomware Hits Ukrainian Ministry - HeimdalSecurity.com | The Pointman | Scoop.it
Security researchers observed a new ransomware strain dubbed “VevoLocker” which has already encrypted multiple websites, including the official webpage of the Ukrainian Ministry of Energy and several Danish webpages.
more...
No comment yet.
Scooped by The Destroyer at #OpDejaVu
Scoop.it!

You weren't hacked, Google tells Gmail users who received spam from themselves - TechRepublic.com

You weren't hacked, Google tells Gmail users who received spam from themselves - TechRepublic.com | The Pointman | Scoop.it

The method behind the spam glitch was spotted last year but ignored by Google...

more...
No comment yet.
Scooped by The Destroyer at #OpDejaVu
Scoop.it!

Tracing ransomware end-to-end - SecurityNewspaper.com

Tracing ransomware end-to-end - SecurityNewspaper.com | The Pointman | Scoop.it

This article, it’s an insight into the ransomware business and how it operates, with data gathered over a period of two years. Moreover, since ransomware largely transacts using Bitcoin, the methods used by the information security research team to uncover and trace ransomware activity are also of interest in their own right. In this paper, we create a measurement framework that we use to perform a large-scale two-year, end-to-end measurement of ransomware payments, victims, and operators. In total we are able to track over $16 million in likely ransom payments made by 19,750 potential victims during a two-year period. In a brief explain, ransomware is a type of malware that encrypts a victim’s files and then demands a ransom in order to decrypt them. Bitcoin is the payment medium of choice for ransomware: it’s decentralized, largely unregulated, and parties in transactions are hidden behind pseudo-anonymous identities. It’s also widely available for victims to purchase, and transactions are irreversible. However, Bitcoin has a property that is undesirable to cybercriminals: all transactions are public by design. This enables information security researchers, through transaction clustering and tracing, to glean the financial inner workings of entire cybercriminal operations. Ransomware basics First malware is delivered to a victim’s machine using any of the available methods. When it executes, the ransomware silently encrypts files on the victim’s machine, and then displays a ransom note informing the user that their files have been encrypted and the contents will be lost forever unless they pay a ransom. The ransom note either includes a ransom address to which payment much be made, or a link to a payment website displaying this address. For the convenience of the victim, the note also often includes information on how to purchase the required Bitcoins from exchanges. When payment is confirmed, the ransomware either automatically decrypts the files, or instructs the user on how to download and execute a decryption binary. The operator doesn’t need to decrypt the user’s files at all of course, but in general I guess it’s bad for business if word gets out on the Internet that even if you pay the ransom you still won’t regain access to your files. Finding ransomware addresses To discern transactions attributable to ransom campaigns, we design a methodology to trace known-victim payments, cluster them with previously unknown victims, estimate potentially missing payments, and filter transactions to discard the ones that are likely not attributable to ransom payments. Real victim ransom addresses can be found by scraping reports of ransomware infection from public forums, and from proprietary sources such as ID Ransomware which maintain a record of ransomware victims and associated addresses. The number of deposit addresses that can be recovered this way is still fairly minimal though. In total, the authors gathered 25 seed random addresses from actual victims, across eight ransomware families: CoinVault, CryptXXX, CryptoDefense, CryptoLocker, CryptoWall, Dharma, Spora, and WannaCry. Using the sandbox environments, a further 32 ransom addresses are obtained for Cerber, and 28 for Locky. Following the money Starting with the seed addresses above, we can look for addresses that co-spent with them, and hence are highly likely to also be under the control of the ransomware operator. This is a refinement of the techniques described in ‘A fistful of Bitcoins’: …this method is now prone to incorrectly linking flows that use anonymization techniques, such as CoinJoin and CoinSwap. Moser and Bohme developed methods of detecting likely anonymized transactions. The information security experts use Chainalysis’s platform, which uses all these methods and additional proprietary techniques to detect and remove anonymized transactions, to trace flows of Bitcoins. The technique only works if the ransomware operator actually spends the Bitcoins. For the ransom addresses obtained via self-infection, that’s not going to happen unless the ransom is paid! Instead of paying the full ransom, the authors make micropayments of 0.001 Bitcoins to these addresses. All 28 micropayments made to Locky addresses were later co-spent by the operator in conjunction with other wallet addresses, “presumably in an attempt to aggregate ransom payments.” These lead to the discovery of a cluster of 7,093 addresses. All 32 micropayments made to Cerber addresses were moved into a unique aggregation address. This address is then used to move the funds on, co-spending with other addresses. This ultimately leads to the discovery of a cluster of 8,526 addresses. As a cross-check to see if there are potentially missed clusters, the information security analysts compare the timing of bitcoin inflow to the ransom addresses, Google Trends for ransomware family search terms, and the number of ransomware binaries on VirusTotal. How much money are ransomware operators collecting? Payments are checked to see if it’s likely they come from real victims. Two filters are applied. The first filter checks to see if the payment amounts match known ransom amounts. The second filter checks that the movement of bitcoin in the transaction graph matches the expected pattern for the ransomware in question. Based on this analysis, it’s possible to estimate each ransomware family’s revenue. In total the researchers are able to trace $16,322,006 US Dollars in 19,750 likely victim ransom payments for 5 ransomware families over 22 months. For Cerber and Locky, which generate unique addresses for each victim, it’s possible to estimate the number of paying victims over time. Looking at the outflows from ransomware addresses, we can trace movement to bitcoin exchanges. The Chainalysis API is used to obtain real-world identities of destination clusters. The top entities are BTC-e, CoinOne, and LocalBitcoins, along with BitMixer and Bitcoin Fog. …BTC-e is the biggest known exchange responsible for the outflows of Locky and CryptoDefense; $3,223,015 of Locky’s outflows entered BTC-e’s cluster. The paper also includes the result of reverse engineering the Cerber protocol and monitoring its UDP packets in the wild. Prevention, detection, and intervention Sometimes possible to trace ransomware payments to the point where ransomware operators cash out. It is also possible to disrupt the process by which victims pay the ransom, thus depriving operators of their profits. This introduces a unique ethical issue. We must consider the impact on victims before taking down ransomware infrastructure. Whereas disrupting conventional malware reduces the damage to victims, the effect could be the opposite for ransomware, information security professionals said. If every victim did not pay or was prevented from paying, the scale of the problem would likely decrease; however this would mean that some individuals would incur additional harm by not being able to recover their files. 

more...
No comment yet.
Scooped by The Destroyer at #OpDejaVu
Scoop.it!

Ransomware Attacks On The Rise As Hackers Prey On Consumer Information « CBS Baltimore

Ransomware Attacks On The Rise As Hackers Prey On Consumer Information « CBS Baltimore | The Pointman | Scoop.it

When it comes to spreading disruption, hackers who use ransomware are a growth industry.

more...
No comment yet.