Prilock Security Training Blog

Securing Digital Lives

Geo Locations in Photos Catch Criminals

Two Harvard students have unmasked around 229 drug and weapon dealers with the help of pictures taken by criminals and used in advertisements placed on dark web markets.

Do you know each image contains a range of additional hidden data stored within it that can be a treasure to the investigators fighting criminals?
Yeah it’s true — “A picture is worth a thousand words.”
0Shares

Apple Takes Backwards Step with iOS 10 Roll Out

After the iPhone encryption battle between Apple and the FBI, Apple was inspired to work toward making an unhackable future iPhones by implementing stronger security measures even the company can’t hack.

Even at that point the company hired one of the key developers of Signal — one of the world’s most secure, encrypted messaging apps — its core security team to achieve this goal.

But it seems like Apple has taken something of a backward step.

0Shares

Tick, tock, tick, tock: New Malware Hits Your Network Every Four Seconds

An exponential rise in malware means employees are at their highest-ever risk of accidentally installing malicious software onto an enterprise network — an event that happens every four seconds within the average company, a new report has warned.

Security researchers at Check Point analyzed information on over 30,000 security incidents discovered by the company’s ThreatCloud prevention software at more than 1,000 companies across the globe.

Continue Reading…

0Shares

MoDaCo Data Breach: 880,000 Users Exposed

Subscribers of UK-based MoDaCo, a forum specialising in smartphone news and reviews, have been unpleasantly surprised by notifications that the site and their account have been compromised.

But not all subscribers have been notified, and that’s because the alert didn’t come from the site admins, but from the Have I Been Pwnd? service. The service allows users to submit their email address and notifies them when it’s found in data batches stolen in breaches.Continue Reading…

0Shares

Data Breach: Patient Data for 14,000 taken in University Gastroenterology

University Gastroenterology and its 19 offices were victims of a data hacking scam, where an individual gained access to the network, copied information for 14,000 patients and then encrypted it, NBC reports.

Here’s what you need to know.

1. Patient names, addresses, dates of birth, Social Security numbers and medical billing information were all taken by a hacker. The data was then encrypted and returned. The hacker is asking for a cash sum to unencrypted the data.

2. UGI notified the affected patients through a letter.

3. There is no evidence the data has been misused.

4. The person had gained access to patient files from a practice UGI acquired in 2014.

5. UGI has made security enhancements to ensure their systems are safe.

6. The center has also established a call center to answer patients questions and concerns about the hack at 844-575-7459. The center is also offering credit monitoring protection through Equifax to the impacted patients.

 

 

Find the Original Article Here

0Shares

Clixsense Leaks 6.6.Million Plan-Text Passwords, And More

The data breach has exposed plaintext passwords, usernames, email addresses, and a large trove of other personal information of more than 6.6 Million ClixSense users.

ClixSense, a website that claims to pay users for viewing advertisements and completing online surveys, is the latest victim to join the list of “Mega-Breaches” revealed in recent months, including LinkedIn,MySpace, VK.com, Tumblr, and Dropbox.

Hackers are Selling Plaintext Passwords and Complete Website Source Code

More than 2.2 Million people have already had their personal and sensitive data posted to PasteBin over the weekend. The hackers who dumped the data has put another 4.4 Million accounts up for sale.

In addition to un-hashed passwords and email addresses, the dump database includes first and last names, dates of birth, sex, home addresses, IP addresses, payment histories, and other banking details of Millions of users.

Troy Hunt, operator of Have I Been Pwned? breach notification service, verified the authenticity of the data taken from ClixSense.

Besides giving away 4.4 Million accounts to the highest bidder, the hackers are also offering social security numbers of compromised users, along with the complete source code of the ClixSense website and “70,000 emails” from the company’s internal email server, according to a Pastebin message advertising the stolen database.

PasteBin has since removed the post as well as the sample of the compromised database that contained user account information.

Here’s How Hackers Hacked ClixSence:

ClixSense admitted the data breach and said some unknown hackers were able to get access to its main database through an old server which the firm was no longer using, but at the time, still networked to its main database server.

After gaining access, the hacker was able “to copy most, if not all” of the ClixSense users table, ran SQL code to change account names to “hacked account,” deleted several forum posts, as well as set account balances of users to $0.00.

While talking to Ars Technica, ClixSense owner Jim Grago admitted that the database contained entries for roughly 6.6 Million accounts and that the company became aware of the breach on September 4 and managed to regain control of their DNS over the weekend.

“This all started last Sunday, September 4th about 5 am EST when my lead developer called me and said ClixSense was redirecting to a gay porn site. The hackers were able to take over our DNS and setup the redirection,” Grago wrote.
“On Monday (Labor day) they were able to hack into our hosting provider and turned off all of our servers, hacked into our Microsoft Exchange server and changed the passwords on all of our email accounts. On Tuesday they were able to gain access to a server that was directly connected to our database server and get a copy of our users table.”

Change Your Passwords and Security Questions Now

Users are strongly advised to change their passwords for ClixSence account immediately, and it would also be a good idea to reset passwords for all of your other online services, especially those using the same passwords.

Since ClixSense uses a large trove of personal information on its users, make sure you change your security questions, if it uses any of the information you provided to ClixSense, such as your address, date of birth, or other identifying information.

Moreover, I recommend you to use a good password manager to create strong and complex passwords for your different online accounts, and it will remember all of them on your behalf.

I have listed some of the best password managers that could help you understand the importance of password manager and choose one according to your requirement.

Find the Original Article Here
0Shares