Content
stringlengths 1
111k
| labels
int64 0
1
|
|---|---|
Malware automatically uploading stolen data to the File sharing sites
Roland Dela Paz, a threat response engineer with Trend Micro have discovered a piece of malicious software that automatically uploads its stolen data cache to the SendSpace file-sharing service for retrieval. File-storage services offer several advantages for cybercriminals.
SendSpace accepts files and then generates a link that can be shared with other people to download the content in the files. The malware has been configured to send files, copy the download link and send it to a command-and-control server along with the password needed to access the archive, Dela Paz wrote.
Here is a screenshot of the Sendspace page leading to the archive of collected documents. Malware utilizing free online services are definitely not unheard of.
Utilizing a public file hosting site is yet another clever way for cybercriminals to store stolen data as they do not need to set up a server that will store large amount of data.
The services are especially useful for so-called Advance Persistent Threat attacks, where cyberspies seek to infiltrate an organization for a long period of time, said Rik Ferguson, director of security research and communication for Trend Micro in Europe.
| 1
|
It's been a terrible new-year-starting for Intel.
Researchers warn of a new attack which can be carried out in less than 30 seconds and potentially affects millions of laptops globally.
As Intel was rushing to roll out patches for Meltdown and Spectre vulnerabilities, security researchers have discovered a new critical security flaw in Intel hardware that could allow hackers to access corporate laptops remotely.
Finnish cyber security firm F-Secure reported unsafe and misleading default behaviour within Intel Active Management Technology (AMT) that could allow an attacker to bypass login processes and take complete control over a user's device in less than 30 seconds.
AMT is a feature that comes with Intel-based chipsets to enhance the ability of IT administrators and managed service providers for better controlling their device fleets, allowing them to remotely manage and repair PCs, workstations, and servers in their organisation.
The bug allows anyone with physical access to the affected laptop to bypass the need to enter login credentialsβincluding user, BIOS and BitLocker passwords and TPM pin codesβenabling remote administration for post-exploitation.
In general, setting a BIOS password prevents an unauthorised user from booting up the device or making changes to the boot-up process. But this is not the case here.
The password doesn't prevent unauthorised access to the AMT BIOS extension, thus allowing attackers access to configure AMT and making remote exploitation possible.
Although researchers have discovered some severe AMT vulnerabilities in the past, the recently discovered issue is of particular concern because it is:
easy to exploit without a single line of code,
affects most Intel corporate laptops, and
could enable attackers to gain remote access to the affected system for later exploitation.
"The attack is almost deceptively simple to enact, but it has incredible destructive potential," said F-Secure senior security researcher Harry Sintonen, who discovered the issue in July last year.
"In practice, it can give a local attacker complete control over an individual's work laptop, despite even the most extensive security measures."
According to the researchers, the newly discovered bug has nothing to do with the Spectre and Meltdown vulnerabilities recently found in the microchips used in almost all PCs, laptops, smartphones and tablets today.
Here's How to Exploit this AMT Issue
To exploit this issue, all an attacker with physical access to a password (login and BIOS) protected machine needs to do is reboot or power-up the targeted PC and press CTRL-P during boot-up, as demonstrated by researchers at F-Secure in the above video.
The attacker then can log into Intel Management Engine BIOS Extension (MEBx) with a default password.
Here, the default password for MEBx is "admin," which most likely remains unchanged on most corporate laptops.
Once logged in, the attacker can then change the default password and enable remote access, and even set AMT's user opt-in to "None."
Now, since the attacker has backdoored the machine efficiently, he/she can access the system remotely by connecting to the same wireless or wired network as the victim.
Although exploiting the issue requires physical access, Sintonen explained that the speed and time at which it can be carried out makes it easily exploitable, adding that even one minute of a distraction of a target from its laptop is enough to do the damage.
"Attackers have identified and located a target they wish to exploit. They approach the target in a public placeβan airport, a cafΓ© or a hotel lobbyβand engage in an 'evil maid' scenario," Sintonen says.
"Essentially, one attacker distracts the mark, while the other briefly gains access to his or her laptop. The attack doesn't require a lot of timeβthe whole operation can take well under a minute to complete."
Along with CERT-Coordination Center in the United States, F-Secure has notified Intel and all relevant device manufacturers about the security issue and urged them to address it urgently.
Meanwhile, users and IT administrators in an organisation are recommended to change the default AMT password of their device to a strong one or disable AMT if this option is available, and never leave their laptop or PC unattended in a public place.
| 1
|
(CNN)The Cumbre Vieja volcano on the Spanish island of La Palma is now erupting even more aggressively after weeks of gushing lava, Spain's Instituto GeogrΓ‘fico Nacional (IGN) said Sunday.The volcano's activity "continues to be intense" and a new crater was discovered Saturday, the Canary Islands government and IGN said in a joint statement."It doesn't look like it's close to ending yet, because of the millions of cubic meters of lava that the volcano is throwing out," said Canary Islands President Γngel VΓctor Torres at a press conference Sunday.More than 1,000 homes have been destroyed since the volcano first erupted, according to the IGN. The volcano's earlier emissions also sent clouds of steam, smoke and toxic gases into the sky, forcing local residents into lock down. In a positive sign, the technical director of the Canary Islands' emergency volcano response committee, Miguel Γngel Morcuende, Saturday that air quality had improved enough to lift local stay-at-home measures. Read MoreTo ensure water for the south of the island, new desalination plants will replace an irrigation link broken by the volcano, Torres said. "We recognize the anguish, but it's teaching us a lesson. Because when you approach somebody who's lost everything, they are always willing to tackle the situation. They're not giving up," Torres said. Β Β La Palma residents told to lock down as volcano lava pours into seaSpain's Prime Minister Pedro Sanchez has pledged more than $238 million (206 million euros) in aid to the island. "Next Tuesday, the cabinet will approve a very powerful series of measures with regard to the reconstruction of infrastructure, responding to the problem of water supply, also employment, agriculture, the tourist sector, and fiscal benefits," Sanchez said Sunday.
| 0
|
Cybersecurity researchers took the wraps off an ongoing surveillance campaign directed against Colombian government institutions and private companies in the energy and metallurgical industries.
In a report published by ESET on Tuesday, the Slovak internet security company said the attacks β dubbed "Operation Spalax" β began in 2020, with the modus operandi sharing some similarities to an APT group targeting the country since at least April 2018, but also different in other ways.
The overlaps come in the form of phishing emails, which have similar topics and pretend to come from some of the same entities that were used in a February 2019 operation disclosed by QiAnXin researchers, and subdomain names used for command-and-control (C2) servers.
However, the two campaigns diverge in the attachments used for phishing emails, the remote access trojans (RATs) deployed, and the C2 infrastructure employed to fetch the malware dropped.
The attack chain begins with the targets receiving phishing emails that lead to the download of malicious files, which are RAR archives hosted on OneDrive or MediaFire containing various droppers responsible for decrypting and running RATs such as Remcos, njRAT, and AsyncRAT on a victimized computer.
The phishing emails cover a wide range of topics, including those about driving infractions, attend court hearings, and take mandatory COVID-19 tests, thus increasing the likelihood that unsuspecting users will open the messages.
In an alternate scenario observed by ESET, the attackers were also found to use heavily obfuscated AutoIt droppers that used shellcode to decrypt the payload and another to inject it into an already running process.
The RATs not only come with capabilities for remote control but also to spy on targets by capturing keystrokes, recording screenshots, stealing clipboard data, exfiltrating sensitive documents, and even downloading and executing other malware.
ESET's analysis also revealed a scalable C2 architecture operated using a Dynamic DNS service that allowed them to dynamically assign a domain name to an IP address from a pool of 70 different domain names and 24 IP addresses in the second half of 2020 alone.
"Targeted malware attacks against Colombian entities have been scaled up since the campaigns that were described last year," the researchers concluded. "The landscape has changed from a campaign that had a handful of C2 servers and domain names to a campaign with very large and fast-changing infrastructure with hundreds of domain names used since 2019."
| 1
|
21 people have been arrested across the UK as part of a nationwide cyber crackdown targeting customers of WeLeakInfo[.]com, a now-defunct online service that had been previously selling access to data hacked from other websites.
The suspects used stolen personal credentials to commit further cyber and fraud offences, the UK National Crime Agency (NCA) said.
Of the 21 arrested β all men aged between 18 and 38 β nine have been detained on suspicion of Computer Misuse Act offences, nine for Fraud offences, and three are under investigation for both. The NCA also seized over Β£41,000 in bitcoin from the arrested individuals.
Earlier this January, the US Federal Bureau of Investigation (FBI), the NCA, the Netherlands National Police Corps, the German Bundeskriminalamt, and the Police Service of Northern Ireland jointly seized the domain of WeLeakInfo.com.
Launched in 2017, the service provided its users a search engine to access the personal information illegally obtained from over 10,000 data breaches and containing over 12 billion indexed stolen credentials, including, for example, names, email addresses, usernames, phone numbers, and passwords for online accounts.
On top of that, WeLeakInfo offered subscription plans, allowing unlimited searches and access to the results of these data breaches during the subscription period that lasted anywhere from one day ($2), one week ($7), one month ($25), or three months ($70).
The cheap subscriptions made the website accessible to even entry-level, apprentice-type hackers, letting them get hold of a huge cache of data for as little as $2 a day, and in turn, use those stolen passwords to mount credential stuffing attacks.
Following the domain's seizure in January, two 22-year-old men, one in the Netherlands and another in Northern Ireland, were arrested in connection with running the site. WeLeakInfo's Twitter handle has since gone quiet.
The NCA said besides being customers of the website, some of the arrested men had also purchased other cybercrime tools such as remote access Trojans (RATs) and crypters, with three other subjects found to be in possession of indecent images of children.
"Cyber criminals rely on the fact that people duplicate passwords on multiple sites and data breaches create the opportunity for fraudsters to exploit that," NCA's Paul Creffield said. "Password hygiene is therefore extremely important."
| 1
|
Story highlightsFormer Barcelona coach Josep Guardiola is wanted by RussiaHe is joined on 13-man wish list by Fabio Capello and Marcello LippiRussians also targeting Marcelo Bielsa, Harry Redknapp and Rafael BenitezDick Advocaat left Russia job after Euro 2012 to return to club coachingThe Russian Football Union has drawn up an ambitious wish list of some of the sport's biggest names to replace departed coach Dick Advocaat.Top of the bill is undoubtedly ex-Barcelona coach Josep Guardiola, who quit the former European and Spanish champions at the end of last season in order to take a break from the game.Former England coach Fabio Capello is also on the 13-man list, posted on the RFU website on Tuesday, along with his fellow Italian Marcello Lippi -- a World Cup winner in 2006, and now with Chinese team Guangzhou Evergrande.Former Argentina and Chile coach Marcelo Bielsa is also being considered, despite insisting that he wants to stay at Athletic Bilbao in the wake of an argument with the Spanish club's board.The RFU is also targeting two men with less international-level experience but a good club pedigree: Rafael Benitez and Harry Redknapp.Former Liverpool and Valencia boss Benitez has not held a coaching position since being sacked by Inter Milan in December 2010, while Redknapp is a more recent addition to the unemployed ranks after being sacked by English club Tottenham in June.JUST WATCHEDGuardiola to end Barcelona reign ReplayMore Videos ...MUST WATCHGuardiola to end Barcelona reign 05:25JUST WATCHEDWhy did Capello quit England? ReplayMore Videos ...MUST WATCHWhy did Capello quit England? 05:12JUST WATCHEDRedknapp cleared of tax evasionReplayMore Videos ...MUST WATCHRedknapp cleared of tax evasion 02:57 Photos: Euro 2012: The best photos Photos: Euro 2012: The best photosEuro 2012: The best photos β Spain's soccer team celebrates with the Euro 2012 trophy on a double-decker bus during the victory parade in Madrid on Monday. Spain defeated Italy 4-0 in the final match on Sunday. Euro 2012, bringing together 16 of Europe's best national soccer teams, began June 8 in Poland and Ukraine. Look back at the action and atmosphere.Hide Caption 1 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Supporters of Spain's national soccer team are hosed down before the team's victory parade in Madrid on Monday.Hide Caption 2 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Spain's team arrives at Cibeles Square on top of a double-decker bus Monday after parading through Madrid.Hide Caption 3 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Juan Mata, left, and Santi Cazorla of Spain hoist the Euro 2012 trophy during Monday's celebrations.Hide Caption 4 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Fans celebrate in Cibeles Square during the victory parade. Organizers had the crowd cooled off with hoses.Hide Caption 5 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Spain fans gather in Madrid to congratulate their team on Monday.Hide Caption 6 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Captain Iker Casillas of Spain lifts the trophy after the team defeated Italy 4-0 in the Euro 2012 final on Sunday, July 1, in Kiev, Ukraine.Hide Caption 7 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Cesc Fabregas of Spain jumps on his teammates as they celebrate after Fernando Torres scored his team's third goal against Italy.Hide Caption 8 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Italy's Mario Balotelli reacts to Spain's fourth and final goal in Sunday's match.Hide Caption 9 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Spain celebrates after defeating Italy on Sunday. It was the team's third successive major international trophy.Hide Caption 10 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Fernando Torres of Spain celebrates scoring his team's third goal against Italy.Hide Caption 11 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Italy goalkeeper Gianluigi Buffon looks on during Sunday's match against Spain.Hide Caption 12 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Spain's Fernando Torres nudges the ball toward the goal past Italy's Gianluigi Buffon.Hide Caption 13 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Gianluigi Buffon of Italy looks back at the ball as Spain's Fernando Torres scores.Hide Caption 14 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Cesc Fabregas of Spain runs with the ball past Leonardo Bonucci of Italy.Hide Caption 15 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Goalkeeper Iker Casillas of Spain celebrates after his team's third goal against Italy.Hide Caption 16 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Fernando Torres of Spain speaks with his daughter, Nora, after Sunday's match against Italy.Hide Caption 17 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Jordi Alba of Spain celebrates after scoring his team's second goal as Leonardo Bonucci of Italy kicks the ball in frustration.Hide Caption 18 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Spain's Sergio Ramos of Spain reacts next to Mario Balotelli of Italy during the match on Sunday.Hide Caption 19 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Daniele De Rossi of Italy falls to the ground Sunday after battling David Silva of Spain for the ball.Hide Caption 20 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Iker Casillas of Spain, center, stretches for the ball in front of teammate Sergio Ramos, right, as Mario Balotelli of Italy attempts a goal on Sunday.Hide Caption 21 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Ignazio Abate of Italy, left, shows his dejection after Spain scored a second goal.Hide Caption 22 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Federico Balzaretti, left, and Leonardo Bonucci of Italy challenge Spain's David Silva during Sunday's final match.Hide Caption 23 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β David Silva of Spain celebrates after scoring the opening goal in the Euro 2012 final match against Italy on Sunday.Hide Caption 24 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Spain's Sergio Ramos slides in to tackle Mario Balotelli of Italy.Hide Caption 25 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Ignazio Abate of Italy, center, grabs the shirt of Spain's Andres Iniesta.Hide Caption 26 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β David Silva of Spain, right, celebrates with teammate Alvaro Arbeloa after scoring the opening goal against Italy.Hide Caption 27 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Antonio Cassano of Italy battles for the ball during the final match against Spain.Hide Caption 28 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Fans enjoy the atmosphere ahead of the Euro 2012 final between Spain and Italy.Hide Caption 29 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Italy's Mario Balotelli of Italy warms up ahead of Sunday's match againt Spain.Hide Caption 30 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Italy fans cheer ahead of the match against Spain.Hide Caption 31 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β A fan rallies before the Italy-Spain final.Hide Caption 32 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β The national flags of the competing nations are carried around the pitch during the closing ceremony before the Euro 2012 final in Kiev.Hide Caption 33 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Spain fans gear up for the match against Italy on Sunday.Hide Caption 34 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β The Italian team celebates their victory over Germany at the end of the Euro 2012 football championships semifinal match on Thursday, June 28, at the National Stadium in Warsaw, Poland.Hide Caption 35 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β German defender Mats Hummels, center, heads the ball by Italian goalkeeper Gianluigi Buffon, in red.Hide Caption 36 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Italian goalkeeper Gianluigi Buffon fails to stop a penalty.Hide Caption 37 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Italian forward Antonio Di Natale vies with German goalkeeper Manuel NeuerHide Caption 38 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β German forward Miroslav Klose lands on the ground while vying with Italian defender Federico Balzaretti.Hide Caption 39 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β German goalkeeper Manuel Neuer grabs the ball.Hide Caption 40 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Italian defender Giorgio Chiellini heads the ball.Hide Caption 41 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Sami Khedira of Germany, in white, battles for the ball with Riccardo Montolivo of Italy. Hide Caption 42 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Mario Balotelli, right, of Italy battles for the ball with Mats Hummels of Germany.Hide Caption 43 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Mario Balotelli of Italy celebrates after scoring his team's second goal.Hide Caption 44 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Italian forward Mario Balotelli shoots to score his second goal of the match.Hide Caption 45 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Italian midfielder Daniele De Rossi and German midfielder Mesut Ozil try to get control of the ball.Hide Caption 46 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β German midfielder Ilkay Guendogan vies with Italian defender Andrea Barzagli.Hide Caption 47 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Claudio Marchisio of Italy and Bastian Schweinsteiger of Germany battle for the ball.Hide Caption 48 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Italian forward Mario Balotelli, in blue, heads the ball into the goal, scoring the first goal in the match.Hide Caption 49 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Italian defender Giorgio Chiellini slides under German midfielder Sami Khedira.Hide Caption 50 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Italian midfielder Daniele De Rossi goes airborne past German forward Lukas Podolski on Thursday.Hide Caption 51 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β The Spanish national team celebrates its win in the Euro 2012 semifinal match against Portugal at Donbass Arena in Donetsk, Ukraine, on Wednesday, June 27. Hide Caption 52 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Cesc Fabregas of Spain scores the winning penalty.Hide Caption 53 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Spanish goalkeeper Iker Casillas jumps for the ball during the semifinal match.Hide Caption 54 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Portuguese forward Cristiano Ronaldo lies on the ground as Spanish defender Alvaro Arbeloa tries to help.Hide Caption 55 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Spanish midfielder Cesc Fabregas is tackled by Portuguese defender Joao Pereira.Hide Caption 56 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Portuguese midfielder Joao Moutinho, right, vies with Spanish midfielder Andres Iniesta.Hide Caption 57 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Portuguese goalkeeper Rui Patricio stops a shot during the penalty shootout.Hide Caption 58 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Portuguese midfielder Joao Moutinho reacts after he fails to score a penalty shot against Spanish goalkeeper Iker Casillas.Hide Caption 59 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Spanish goalkeeper Iker Casillas stops a penalty kicked by Portuguese midfielder Joao Moutinho.Hide Caption 60 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Portuguese coach Paulo Bento talks to his players.Hide Caption 61 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Alvaro Negredo of Spain and Bruno Alves of Portugal slam into each other. Hide Caption 62 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Bruno Alves of Portugal and Alvaro Negredo of Spain challenge for the ball.Hide Caption 63 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Portuguese midfielder Raul Meireles heads the ball.Hide Caption 64 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Cristiano Ronaldo of Portugal jumps for a high ball in front of Jordi Alba of Spain.Hide Caption 65 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β A Portugal fan shows his support.Hide Caption 66 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β A sea of Spain fans show their colors.Hide Caption 67 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Spanish midfielder David Silva, in red, vies with Portuguese defender Fabio Coentrao, left and Portuguese defender Bruno Alves.Hide Caption 68 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Spanish midfielder Andres Iniesta, left, falls while vying with Portuguese defender Joao Pereira.Hide Caption 69 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Andres Iniesta of Spain shoots past Pepe and Joao Pereira of Portugal.Hide Caption 70 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Sergio Ramos of Spain challenges Cristiano Ronaldo of PortugalHide Caption 71 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Italy's national team celebrates after winning the penalty shootout in the quarterfinal match against England on Sunday, June 24, in Kiev, Ukraine. Hide Caption 72 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Joe Hart of England reacts during the match against Italy.Hide Caption 73 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Wayne Rooney of England attempts an overhead kick on Sunday against Italy. Hide Caption 74 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β England's Wayne Rooney maneuvers against Italy.Hide Caption 75 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β The English players line up during the penalty shootout against Italy.Hide Caption 76 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Daniele De Rossi of Italy reacts after a missed goal during the quarterfinal match.Hide Caption 77 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Scott Parker of England and Andrea Pirlo of Italy compete for the ball Sunday.Hide Caption 78 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Joleon Lescott of England and Mario Balotelli of Italy share a moment during a break in the match.Hide Caption 79 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Mario Balotelli of Italy strikes the ball as Joleon Lescott of England looks on.Hide Caption 80 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Riccardo Montolivo of Italy reacts during the match against England.Hide Caption 81 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Italy's Mario Balotelli kicks the ball during the quarterfinal match against England.Hide Caption 82 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Wayne Rooney of England and Ignazio Abate of Italy go after the ball.Hide Caption 83 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β James Milner of England competes with Italy's Leonardo Bonucci.Hide Caption 84 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Danny Welbeck of England and Andrea Barzagli of Italy jump for the ball.Hide Caption 85 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Mario Balotelli of Italy strikes the ball as Glen Johnson of England looks on.Hide Caption 86 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Wayne Rooney of England goes after the ball during the match against Italy.Hide Caption 87 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Daniele De Rossi of Italy and Scott Parker of England compete in Sunday's quarterfinal match.Hide Caption 88 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Italy's Gianluigi Buffon makes a save during Sunday's quarterfinal match against England.Hide Caption 89 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Wayne Rooney of England heads the ball as Ignazio Abate of Italy challenges during the quarterfinal match.Hide Caption 90 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Mario Balotelli of Italy and Ashley Cole of England compete for control of the ball.Hide Caption 91 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Mario Balotelli of Italy challenges Joleon Lescott of England.Hide Caption 92 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Gianluigi Buffon of Italy makes a save as Wayne Rooney of England runs in during the quarterfinal match.Hide Caption 93 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Joleon Lescott of England challenges Mario Balotelli of Italy.Hide Caption 94 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Federico Balzaretti of Italy runs after James Milner of England.Hide Caption 95 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β An Italy fan enjoys the atmosphere ahead of Sunday's quarterfinal match.Hide Caption 96 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Mario Balotelli of Italy gears up for the match against England on Sunday.Hide Caption 97 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Xabi Alonso of Spain scores the second goal from the penalty spot during the quarter final match between Spain and France at Donbass Arena on Saturday, June 23, in Donetsk, Ukraine.Hide Caption 98 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Karim Benzema and Franck Ribery of France look dejected after defeat during the quarter final match between Spain and France.Hide Caption 99 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Xabi Alonso of Spain scores the second goal from the penalty spot during the quarter final match between Spain and France.Hide Caption 100 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Franck Ribery of France and David Silva of Spain challenge for the ball.Hide Caption 101 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Xabi Alonso of Spain challenges Florent Malouda of France during the quarter final match between Spain and France.Hide Caption 102 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Xabi Alonso of Spain celebrates after scoring the first goal with Cesc Fabregas during Spain's quarterfinal match against France.Hide Caption 103 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Franck Ribery of France challenges David Silva of Spain.Hide Caption 104 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Gael Clichy of France and David Silva of Spain contend for the ball.Hide Caption 105 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Anthony Reveillere of France is closed down by Andres Iniesta of Spain.Hide Caption 106 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β At least two fans of Spain and France were able to put aside their differences for Saturday's Euro 2012 quarterfinal game.Hide Caption 107 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β The Spanish team lines up ahead of the quarterfinal match between Spain and France.Hide Caption 108 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Jordi Alba of Spain challenges Yann M'Vila of France during a Euro 2012 quarterfinal match Saturday.Hide Caption 109 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Xavi of Spain challenges Florent Malouda of France.Hide Caption 110 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Cesc Fabregas of Spain reacts during the quarterfinal match between Spain and France.Hide Caption 111 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β A Spanish fan enjoys the atmosphere ahead of the quarterfinal match between Spain and France.Hide Caption 112 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Jordi Alba of Spain in action with Mathieu Debuchy of France.Hide Caption 113 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Xabi Alonso of Spain scores the first goal past Hugo Lloris of France.Hide Caption 114 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Xabi Alonso of Spain celebrates after scoring the first goal during the quarterfinal match between Spain and France.Hide Caption 115 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β A giant German football shirt is seen in the crowd during the quarterfinal match between Germany and Greece at The Municipal Stadium on Friday, June 22, in Gdansk, Poland. Hide Caption 116 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Dimitris Salpigidis of Greece fouls Mats Hummels of Germany during the quarterfinal match between Germany and Greece.Hide Caption 117 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Manuel Neuer of Germany dives the wrong way as Dimitris Salpigidis of Greece (not pictured) scores from the penalty spot during the quarterfinal match between Germany and Greece.Hide Caption 118 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Georgios Samaras of Greece dribbles by Sami Khedira, left, and Jerome Boateng of Germany during the quarterfinal match between Germany and Greece.Hide Caption 119 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Bastian Schweinsteiger of Germany tackles Nikos Liberopoulos of Greece during the quarterfinal match between Germany and Greece.Hide Caption 120 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Miroslav Klose of Germany scores their third goal during the quarterfinal match between Germany and Greece.Hide Caption 121 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Georgios Samaras of Greece scores the team's first goal past Manuel Neuer of Germany.Hide Caption 122 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Sami Khedira of Germany celebrates scoring the team's second goal with Bastian Schweinsteiger of Germany against Greece.Hide Caption 123 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Sami Khedira of Germany scores the team's second goal past Michalis Sifakis of Greece.Hide Caption 124 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Marco Reus of Germany celebrates scoring the team's fourth goal with Mesut Ozil.Hide Caption 125 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Greece's Sokratis Papastathopoulos and Germany's Sami Khedira compete for the ball.Hide Caption 126 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Germany's Miroslav Klose clashes with Greece's Dimitris Salpigidis.Hide Caption 127 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Germany's Marco Reus celebrates scoring the team's fourth goal with Jerome Boateng during the Euro 2012 quarter-final match against Greece at The Municipal Stadium in Gdansk, Poland.Hide Caption 128 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Georgios Samaras and Kostas Katsouranis celebrate scoring a goal that tied their game against Germany, 1-1, during a quarterfinal match at Euro 2012 in Gdansk, Poland.Hide Caption 129 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Sami Khedira celebrates scoring a goal that put Germany ahead 2-1 against Greece on Friday, June 22, during a quarterfinal match in Gdansk, Poland.Hide Caption 130 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Georgios Samaras scores Greece's first goal past German goalkeeper Manuel Neuer.Hide Caption 131 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Philipp Lahm, Marco Reus and Miroslav Klose celebrate a goal that put Germany ahead of Greece 1-0 in Friday's quarterfinal match.Hide Caption 132 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Tens of thousands of fans in the Memorial Stadium watch as the German team celebrates after a goal.Hide Caption 133 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Germany's Holger Badstuber chases down Greece's Georgios Samaras during the Euro 2012 quarterfinal match at the Municipal Stadium in Gdansk, Poland.Hide Caption 134 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Vasilis Torosidis of Greece shadows Marco Reus of Germany during their Euro 2012 quarterfinal match in Gdansk, Poland.Hide Caption 135 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Germany's Bastian Schweinsteiger beats Greece's Georgios Samaras to the ball.Hide Caption 136 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β A Greek fan watches the quarterfinal match against Germany on Friday.Hide Caption 137 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Miroslav Klose of Germany and Sokratis Papastathopoulos of Greece fight for the ball.Hide Caption 138 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Germany's Bastian Schweinsteiger, left, tackles Giannis Maniatis of Greece.Hide Caption 139 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Fans for Germany show their spirit in the Municipal Stadium in Gdansk.Hide Caption 140 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Jan Rezek of Czech Republic and Pepe of Portugal battle for the ball during the quarterfinal match between Czech Republic and Portugal on Thursday, June 21. Hide Caption 141 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Petr Jiracek of the Czech Republic and teammates look dejected after conceding the opening goal to Portugal.Hide Caption 142 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Portugal's Cristiano Ronaldo celebrates scoring the opening goal with his teammates during the quarter final match against the Czech Republic.Hide Caption 143 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Tomas Sivok and David Limbersky of Czech Republic defend the attack of Portugal's Cristiano Ronaldo.Hide Caption 144 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Tom Hubschman of Czech Republic defends against Portugal's Nani during the quarter final between Czech Republic and Portugal at The National Stadium on June 21, 2012 in Warsaw.Hide Caption 145 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Joao Pereira of Portugal and Vaclav Pilar of Czech Republic jump for the ball.Hide Caption 146 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Portgual's Cristiano Ronaldo attempts an overhead kick during the Euro 2012 quarter final match between the Czech Republic and Portugal at the National Stadium on Thursday, June 21, in Warsaw, Poland.Hide Caption 147 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β A Czech Republic fan celebrates during a quarter-final match between the Czech Republic and Portugal on Thursday in Warsaw, Poland.Hide Caption 148 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β A Portugal fan holds up a sign during the quarter-final match between the Czech Republic and Portugal.Hide Caption 149 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Miguel Veloso of Portugal and Vladimir Darida of Czech Republic battle for the ball during the quarter-final match between Czech Republic and Portugal.Hide Caption 150 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Helder Postiga of Portugal tackles Tomas Sivok of Czech Republic during the quarter-final match.Hide Caption 151 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Ziatan Ibrahimovic of Sweden scores the opening goal during the group D match against France on Tuesday, June 19. Hide Caption 152 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Franck Ribery of France goes past Andreas Granqvist of Sweden during the match between Sweden and France.Hide Caption 153 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Zlatan Ibrahimovic of Sweden celebrates his goal during the group D match against France.Hide Caption 154 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Karim Benzema of France is challenged by Jonas Olsson of Sweden during the match between Sweden and France.Hide Caption 155 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Marko Devic of Ukraine reacts during the match between England and Ukraine.Hide Caption 156 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Wayne Rooney of England scores their first goal during the match between England and Ukraine on Tuesday.Hide Caption 157 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Head coach Oleh Blokhin of Ukraine shouts instructions during the match between England and Ukraine.Hide Caption 158 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β John Terry of England clears an effort from Marko Devic of Ukraine off the line during the match between England and Ukraine.Hide Caption 159 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Zlatan Ibrahimovic of Sweden celebrates his goal with Jonas Olsson, left, and Martin Olsson during the match between Sweden and France.Hide Caption 160 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Wayne Rooney of England controls the ball during the match between England and Ukraine.Hide Caption 161 of 370 Photos: Euro 2012: The best photoseuro 2012 tues 06 β Yaroslav Rakytskyy of Ukraine and Danny Welbeck of England compete for the ball during the match between England and Ukraine.Hide Caption 162 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Wayne Rooney of England clashes with Denys Garmash of Ukraine during the match between England and Ukraine.Hide Caption 163 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Franck Ribery of France is tackled by Anders Svensson of Sweden during the match between Sweden and France.Hide Caption 164 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β England fans soak up the atmosphere during the match between England and Ukraine.Hide Caption 165 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Danny Welbeck of England beats Yevhen Khacheridi of Ukraine to the ball during the match between England and Ukraine.Hide Caption 166 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β A young Ukraine fan shows enthusiasm ahead of the match between England and Ukraine on Tuesday, June 19. Hide Caption 167 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β England's fans get ready for the match against Ukraine at Donbass Arena in Donetsk, Ukraine.Hide Caption 168 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Wayne Rooney of England breaks past Denys Harmash of Ukraine during Tuesday's match in Donetsk, Ukraine.Hide Caption 169 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Emir Bajrami of Sweden gets tackled by France's Hatem Ben Arfa, left, and Yann M'Vila during a Group D match Tuesday in Kiev, Ukraine.Hide Caption 170 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Spain's Alvaro Arbeloa and Croatia's Ivan Strinic fight for the ball during the group C match at Municipal Stadium in Gdansk, Poland, on Monday, June 18. Hide Caption 171 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Ireland fans do the Poznan as they enjoy the atmosphere during the match against Italy.Hide Caption 172 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Italy's Antonio Cassano heads in the opening goal against Ireland.Hide Caption 173 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Italy's Andrea Barzagli tackles Ireland's Kevin Doyle on Monday.Hide Caption 174 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Jesus Navas scores Spain's first goal during the group C match against Croatia on Monday.Hide Caption 175 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Croatia's Luka Modric looks on after Spain's Jesus Navas scores a goal.Hide Caption 176 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Italy's Claudio Marchisio jumps to control the ball during the match against Ireland.Hide Caption 177 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Italy's Mario Balotelli smiles at Ireland's Shay Given.Hide Caption 178 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Kevin Doyle of Ireland and Daniele De Rossi of Italy jump for the ball on Monday.Hide Caption 179 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Badges adorn an Ireland fan's scarf ahead of the group C match between Italy and Ireland.Hide Caption 180 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β An Irish fan attempts to catch a snapshot of the action ahead of match between Italy and Ireland.Hide Caption 181 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Kevin Doyle of Ireland tackles Andrea Pirlo of Italy.Hide Caption 182 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β A fan awaits the action before the start of the match between Croatia and Spain.Hide Caption 183 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β A Spanish fan waits for the start of the match between Croatiia and Spain.Hide Caption 184 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Luka Modric of Croatia is closed down by Alvaro Arbeloa and Xavi of Spain.Hide Caption 185 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Danijel Pranjic of Croatia and Alvaro Arbeloa of Spain compete for the ball.Hide Caption 186 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Lars Bender of Germany celebrates with Miroslav Klose after scoring the team's second goal against Denmark in L'viv, Ukraine, on Sunday, June 17. Hide Caption 187 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Cristiano Ronaldo of Portugal celebrates with his teammates as Wesley Sneijder of the Netherlands looks dejected during Sunday's match in Kharkov, Ukraine.Hide Caption 188 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Jores Okore, William Kvist and Lars Jacobsen of Denmark face defeat in the match against Germany on Sunday.Hide Caption 189 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Germany's Lars Bender celebrates during the match against Denmark.Hide Caption 190 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Portugal's Cristiano Ronaldo, bottom left, celebrates with teammates Miguel Veloso and Custodio after scoring the team's second goal against the Netherlands.Hide Caption 191 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Cristiano Ronaldo of Portugal reacts to his goal against the Netherlands.Hide Caption 192 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Philipp Lahm and Manuel Neuer of Germany walk toward the ball after Michael Krohn-Dehli of Denmark scored.Hide Caption 193 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Portugal's Bruno Alves battles Joris Mathijsen of the Netherlands for control of the ball.Hide Caption 194 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β A Dutch fan makes a heart shape with her hands before the start of the team's match against Portugal.Hide Caption 195 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Cristiano Ronaldo of Portugal competes with Ron Vlaar of the Netherlands.Hide Caption 196 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Michael Krohn-Dehli of Denmark reacts after scoring the first goal against Germany.Hide Caption 197 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Miguel Veloso of Portugal challenges Robin van Persie of the Netherlands on Sunday.Hide Caption 198 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Cristiano Ronaldo of Portugal celebrates scoring the first goal against the Netherlands.Hide Caption 199 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Portugal's Cristiano Ronaldo kicks the ball past a Dutch defender during Sunday's match.Hide Caption 200 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Lukas Podolski of Germany celebrates scoring the first goal against Denmark.Hide Caption 201 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Rafael van der Vaart of the Netherlands scores the opening goal past Miguel Veloso of Portugal.Hide Caption 202 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Fans of Portugal rally ahead of the team's match against Netherlands in Metalist Stadium.Hide Caption 203 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Sami Khedira of Germany and Christian Eriksen of Denmark compete for the ball.Hide Caption 204 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Fans of Germany dress up for the match against Denmark.Hide Caption 205 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Cristiano Ronaldo of Portugal looks on before the match against the Netherlands.Hide Caption 206 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β A Danish fan enjoys the atmosphere ahead of the team's match against Germany.Hide Caption 207 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Dutch fans cheer during the match against Portugual on Sunday.Hide Caption 208 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Georgios Samaras, Giannis Maniatis and Giorgos Tzavelas of Greece celebrate victory during the match between Greece and Russia on Saturday, June 16.Hide Caption 209 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Giorgos Tzavelas of Greece celebrates during the match between Greece and Russia.Hide Caption 210 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Damien Perquis of Poland lies on the pitch at the final whistle during the match between Czech Republic and Poland.Hide Caption 211 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Poland fans look on during the match between Czech Republic and Poland.Hide Caption 212 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Giorgos Karagounis of Greece, center, celebrates Greece's victory over Russia and and adnvancement to the quarter finals during the match between Greece and Russia.Hide Caption 213 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Robert Lewandowski of Poland sits dejected at the final whistle during the match between Czech Republic and Poland.Hide Caption 214 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Aleksandr Anyukov of Russia and Georgios Samaras of Greece battle for the ball during the group A match between Greece and Russia.Hide Caption 215 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Sergey Ignashevich, Aleksey Berezutskiy and Igor Denisov of Russia look dejected during the match between Greece and Russia.Hide Caption 216 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Petr Jiracek of Czech Republic celebrates scoring the first goal with Milan Baros of Czech Republic during the group A match between Czech Republic and Poland.Hide Caption 217 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Dariusz Dudka of Poland goes in to win the ball during the match between Czech Republic and Poland.Hide Caption 218 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Giorgos Karagounis of Greece reacts after he receives a yellow card for diving from referee Jonas Eriksson during the match between Greece and Russia.Hide Caption 219 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Giorgos Karagounis of Greece, center, celebrates scoring the opening goal with teammates, left to right, Kostas Katsouranis, Giannis Maniatis and Sotiris Ninis during the match between Greece and Russia.Hide Caption 220 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Giorgos Karagounis of Greece scores the opening goal past Vyacheslav Malafeev of Russia during the match between Greece and Russia.Hide Caption 221 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Eugen Polanski of Poland brings down Vaclav Pilar of Czech Republic during the match between Czech Republic and Poland.Hide Caption 222 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Giorgos Karagounis of Greece scores the opening goal under pressure from Yuriy Zhirkov of Russia during the match between Greece and Russia on Saturday.Hide Caption 223 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Yuriy Zhirkov of Russia jumps over the challenge by Dimitris Salpigidis of Greece during the match between Greece and Russia.Hide Caption 224 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Football fans enjoy the atmopshere during the match between Czech Republic and Poland.Hide Caption 225 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Petr Jiracek of Czech Republic looks on during the match between Czech Republic and Poland.Hide Caption 226 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Robert Lewandowski of Poland tackles Theodor Gebre Selassie of Czech Republic during the group match between Czech Republic and Poland.Hide Caption 227 of 370 Photos: Euro 2012: The best photoseuro 2012 sat 33 β Andrey Arshavin of Russia falls under the challenge by Giorgos Tzavelas of Greece during the the match between Greece and Russia.Hide Caption 228 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β A Greece fan enjoys the atmosphere ahead of the match between Greece and Russia.Hide Caption 229 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Russian fans enjoy the atmosphere ahead of the match between Greece and Russia.Hide Caption 230 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Kostas Katsouranis of Greece and Denis Glushakov of Russia tussle for the ball during the match between Greece and Russia.Hide Caption 231 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Jakub Blaszczykowski of Poland jumps to avoid a challenge from Petr Cech of Czech Republic during the match between Czech Republic and Poland.Hide Caption 232 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Football fans enjoy the atmopshere ahead of the match between Czech Republic and Poland.Hide Caption 233 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β The Greece team celebrate during match between Greece and Russia.Hide Caption 234 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β David Limbersky of Czech Republic is tackled by Dariusz Dudka of Poland during the match between Czech Republic and Poland.Hide Caption 235 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Martin Olsson of Sweden celebrates after Glen Johnson of England fails to stop Olof Mellberg of Sweden's goal during the group D match between Sweden and England on Friday, June 15, in Kiev, Ukraine.Hide Caption 236 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Sweden celebrates after Olof Mellberg of Sweden scored its first goal during the match between Sweden and England.Hide Caption 237 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Olof Mellberg of Sweden scores Sweden's second goal against England in the Sweden-England matchup.Hide Caption 238 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Zlatan Ibrahimovic of Sweden and John Terry of England clash during the match between Sweden and England.Hide Caption 239 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Danny Welbeck of England scores the third goal past Andreas Isaksson of Sweden.Hide Caption 240 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Sweden fans show their support before the group D match between Sweden and England.Hide Caption 241 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β England fans soak up the atmopshere ahead of the Sweden-England matchup.Hide Caption 242 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Andy Carroll, right, of England celebrates the first goal with captain Steven Gerrard during the match between Sweden and England.Hide Caption 243 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Andreas Granqvist of Sweden is tackled by Andy Carroll of England during the Sweden-England matchup.Hide Caption 244 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Andy Carroll of England heads the first goal during the match between Sweden and England.Hide Caption 245 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Yohan Cabaye of France scores the second goal past Oleh Husyev of Ukraine during the match between Ukraine and France.Hide Caption 246 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Yevhen Selin of Ukraine and Yevhen Khacheridi put pressure on Jeremy Menez of France during the group D match between Ukraine and France.Hide Caption 247 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Yohan Cabaye of France celebrates a goal with Karim Benzema of France during the Ukraine-France matchup.Hide Caption 248 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β A man looks on after play was suspended due to bad weather during the match between Ukraine and France.Hide Caption 249 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Painted Ukraine fans enjoy themselves before the Euro 2012 group D match between Ukraine and France.Hide Caption 250 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β After minutes of playing, torrential rainfall caused the Ukraine vs. France game to be temporarily suspended on Friday. Hide Caption 251 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Fans endure the rains during the match between Ukraine and France.Hide Caption 252 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Ukraine's Yevhen Konoplyanka, right, battles France's Mathieu Debuchy for control of the ball Friday in a group D match.Hide Caption 253 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Players leave the field Friday after weather caused the Ukraine vs. France game to be suspended.Hide Caption 254 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Shay Given of Republic of Ireland tosses the towel during the group C match between Spain and Ireland in Gdansk, Poland, on Thursday, June 14. Hide Caption 255 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Sean St Ledger, Shay Given and Richard Dunne of Republic of Ireland sit dejected after Fernando Torres of Spain scored Spain's third goal during the Spain-Ireland match.Hide Caption 256 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Shay Given of Republic of Ireland makes a save during the match between Spain and Ireland.Hide Caption 257 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Republic of Ireland fans look on during the Spain-Ireland match.Hide Caption 258 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Jonathan Walters of Republic of Ireland clashes with Xabi Alonso of Spain during the match between Spain and Ireland.Hide Caption 259 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Fernando Torres of Spain celebrates scoring the team's third goal during the match between Spain and Ireland.Hide Caption 260 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Fans make their voices heard during the Group C match between Spain and Ireland.Hide Caption 261 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Fernando Torres of Spain scores the team's first goal against Ireland.Hide Caption 262 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β David Silva of Spain battles for the ball with Damien Duff of Ireland.Hide Caption 263 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Croatia's Mario Mandzukic and his teammate Darijo Sma celebrate the team's game-tying goal against Italy in Poznan, Poland, on Thursday, June 14. Hide Caption 264 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Mario Balotelli of Italy makes his case during Thursday's match against Croatia.Hide Caption 265 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Ognjen Vukojevic and Ivan Perisic of Croatia stand by after a flare was thrown onto the field.Hide Caption 266 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Gianluigi Buffon of Italy gestures during the match against Croatia.Hide Caption 267 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Gordon Schildenfeld of Croatia and Sebastian Giovinco of Italy battle for the ball.Hide Caption 268 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Luka Modric of Croatia is marshalled by Mario Balotelli of Italy.Hide Caption 269 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Emanuele Giaccherini of Italy clashes with Darijo Srna of Croatia.Hide Caption 270 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Stipe Pletikosa of Croatia fails to stop a goal from a free kick by Andrea Pirlo of Italy.Hide Caption 271 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Andrea Pirlo of Italy celebrates scoring the opening goal against Croatia.Hide Caption 272 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β An Italy fan cheers during the team's Group C match against Croatia.Hide Caption 273 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Fans enjoy the atmosphere during the match between Italy and Croatia in Poland on Thursday.Hide Caption 274 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Giorgio Chiellini of Italy and Nikica Jelavic of Croatia compete for the ball.Hide Caption 275 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Fans revel during the Italy-Croatia match on Thursday.Hide Caption 276 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Philipp Lahm of Germany controls the ball during the Group B match between Netherlands and Germany on Wednesday, June 13. Hide Caption 277 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β John Heitinga of the Netherlands and Sami Khedira of Germany compete for the ball during the Group B match between Netherlands and Germany. Hide Caption 278 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Manuel Neuer of Germany celebrates after Mario Gomez scored the opening goal against the Netherlands.Hide Caption 279 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β John Heitinga of the Netherlands and Mario Gomez of Germany fight for the ball.Hide Caption 280 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Cristiano Ronaldo of Portugal clashes with Simon KjΓ¦r of Denmark during the Group B match between Portugal and Denmark.Hide Caption 281 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Pepe of Portugal, left, celebrates scores the team's first goal against Denmark.Hide Caption 282 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Nicklas Bendtner of Denmark beats Pepe of Portugal to head in Denmark's second goal.Hide Caption 283 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Silvestre Varela of Portugal celebrates scoring their third goal against Denmark with Joao Moutinho of Portugal.Hide Caption 284 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Portugal fans rally before the Group B match against Denmark in Lviv, Ukraine. Hide Caption 285 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Cristiano Ronaldo of Portugal gestures during the match against Denmark.Hide Caption 286 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Pepe celebrates after Helder Postiga of Portugal scored the second goal against Denmark.Hide Caption 287 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Dennis Rommedahl of Denmark fights for possession with Fabio Coentrao of Portugal.Hide Caption 288 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Denmark's Simon KjΓ¦r battles for a header against Helder Postiga of Portugal on Wednesday.Hide Caption 289 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Jakub Blaszczykowski of Poland celebrates after scoring Poland's equalizer in the 1-1 draw with Russia in Warsaw, Poland, on Tuesday, June 12. Hide Caption 290 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Poland captain Blaszczykowski scored in the 57th minute as the co-hosts denied Russia the satisfaction of becoming the first team to qualify for the quarterfinals, Tueday. Hide Caption 291 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Polish fans cheer during the group A match between Poland and Russia, Tuesday.Hide Caption 292 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Roman Shirokov of Russia and Dariusz Dudka of Poland vie for control of the ball during their match, Tuesday.Hide Caption 293 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Aleksandr Kerzhakov of Russia and Marcin Wasilewski of Poland jump to avoid colliding with Poland's goalkeeper, Grzegorz Sandomiersk.Hide Caption 294 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β A Poland fan looks thoughtful ahead of the team's match against Russia, Tuesday.Hide Caption 295 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Petr Jiracek of the Czech Republic scores the opening goal against Greece in Wroclaw, Poland, on Tuesday, June 12. Hide Caption 296 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Greece's Dimitris Salpigidis reacts during Tuesday's match. His team went on to lose 2-1 to the Czech Republic.Hide Caption 297 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β The Czech Republic's Vaclav Pilar, right, scores the second goal of the match against Greece.Hide Caption 298 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Fans cheer for Greece during its Group A match against the Czech Republic on Tuesday.Hide Caption 299 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Pilar of the Czech Republic celebrates scoring the team's second goal against Greece.Hide Caption 300 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β A fan cheers during the Greece-Czech Republic match Tuesday at the Municipal Stadium in Wroclaw.Hide Caption 301 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Jiracek scores the Czech Republic's opening goal against Greece and Jose Holebas on Tuesday.Hide Caption 302 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Andriy Shevchenko of Ukraine reacts to scoring the team's second goal during the Group D match against Sweden in Kiev, Ukraine, on Monday, June 11.Hide Caption 303 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Zlatan Ibrahimovic celebrates scoring Sweden's first goal against Ukraine.Hide Caption 304 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Ukraine's Andriy Voronin vies with Swedish defender Andreas Granqvist.Hide Caption 305 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β A Swedish fan soaks up the atmosphere ahead of Monday's match against Ukraine.Hide Caption 306 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Yevhen Selin of Ukraine and Zlatan Ibrahimovic of Sweden battle for the ball.Hide Caption 307 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Ukraine's Anatoliy Tymoshchuk tackles Kim Kallstrom of Sweden.Hide Caption 308 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Goalkeeper Joe Hart of England blocks Samir Nasri of France during the Group D match in Donetsk, Ukraine, Monday, June11.Hide Caption 309 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Players compete for control of the ball during the England-France match on Monday.Hide Caption 310 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Scott Parker of England fights for possession with Franck Ribery and Karim Benzema of France.Hide Caption 311 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Joleon Lescott of England scores during the first half of the match against France.Hide Caption 312 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Steven Gerrard of England celebrates after Joleon Lescott's goal against France.Hide Caption 313 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Samir Nasri of France celebrates his goal against England.Hide Caption 314 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Mathieu Debuchy of France flies through the air as he battles England's Alex Oxlade-Chamberlain.Hide Caption 315 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β A France fan shows her colors during the game against England.Hide Caption 316 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Alex Oxlade-Chamberlain of England and Adil Rami of France fight for possession.Hide Caption 317 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β England fans wearing Queen Elizabeth II masks watch the match against France on Monday.Hide Caption 318 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Kevin Doyle of Ireland and Vedran Corluka of Croatia battle for the ball in Poznan, Poland, on Sunday, June 10. Hide Caption 319 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Mario Mandzukic of Croatia celebrates after scoring the team's third goal against Ireland on Sunday.Hide Caption 320 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Goalkeeper Shay Given of Ireland fails to stop Croatia's Mario Mandzukic from scoring.Hide Caption 321 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Ireland's Jonathan Walters competes with Croatia's Vedran Corluka.Hide Caption 322 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Croatia fans ignite flares during Sunday's match against Ireland.Hide Caption 323 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Mario Mandzukic celebrates after scoring the opening goal for Croatia during the match against Ireland.Hide Caption 324 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Ireland's Sean St Ledger ties up the game against Croatia.Hide Caption 325 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Ireland fans enjoy the atmosphere before Sunday's match against Croatia.Hide Caption 326 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Gordon Schildenfeld of Croatia clashes with Kevin Doyle of Ireland.Hide Caption 327 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Sergio Ramos of Spain and Mario Balotelli of Italy compete for the ball duing their match in Gdansk, Poland, Sunday, June 10.Hide Caption 328 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Italy's Mario Balotelli takes control of the ball in Sunday's match against Spain. Hide Caption 329 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Italy's Gianluigi Buffon gestures duriing the match against Spain.Hide Caption 330 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Italy's Mario Balotelli looks up after a fall during the Spain-Italy match.Hide Caption 331 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Antonio Di Natale celebrates after scoring Italy's first goal against Spain. Spain was held to a 1-1 draw.Hide Caption 332 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Italy's Antonio Di Natale kicks the ball past goalkeeper Iker Casillas of Spain.Hide Caption 333 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Spanish fans get into the mood ahead of Sunday's match against Italy.Hide Caption 334 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β An Italy fan cheers before Sunday's match against Spain.Hide Caption 335 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Daniele De Rossi of Italy tackles Cesc Fabregas of Spain.Hide Caption 336 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Thiago Motta of Italy takes a fall while playing against Spain on Sunday.Hide Caption 337 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Cristiano Ronaldo of Portugal and Sami Khedira of Germany fight for the ball in a match on Saturday, June 9.Hide Caption 338 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Mario Gomez celebrates Germany's first goal during the match against Portugal.Hide Caption 339 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Lukas Podolski of Germany and Raul Meireles of Portugal battle for the ball.Hide Caption 340 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Lukas Podolski of Germany in action during the Germany-Portugal match.Hide Caption 341 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Bastian Schweinsteiger of Germany holds off a challenge from Joao Moutinho of Portugal.Hide Caption 342 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Michael Krohn-Dehli of Denmark scores the team's first goal past Maarten Stekelenburg of the Netherlands during a Group B match Saturday.Hide Caption 343 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β A Danish fan mugs before the match between the Netherlands and Denmark.Hide Caption 344 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Wesley Sneijder of the Netherlands heads the ball during the match against Denmark.Hide Caption 345 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Ibrahim Afellay of the Netherlands goes airborne as Daniel Agger of Denmark defends.Hide Caption 346 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Robin van Persie of the Netherlands misses a chance at goal against Denmark.Hide Caption 347 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Dutch fans look dejected at the final whistle during the Netherlands-Denmark match.Hide Caption 348 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Goalkeeper Stephan Andersen of Denmark celebrates with teammate Lars Jacobsen during the match against the Netherlands.Hide Caption 349 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Arjen Robben lies dejected on the pitch after the Netherlands' loss to Denmark on Saturday.Hide Caption 350 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Alan Dzagoev of Russia scores against Czech Republic on Friday, June 8.Hide Caption 351 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Alan Dzagoev of Russia celebrates scoring the team's third goal against Czech Republic.Hide Caption 352 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Roman Shirokov of Russia scores the team's second goal past Petr Cech of Czech Republic.Hide Caption 353 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Night settles over the Russia-Czech Republic match.Hide Caption 354 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Konstantin Zyryanov of Russia and Jan Rezek of Czech Republic collide.Hide Caption 355 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Wojciech Szczesny of Poland fouls Dimitris Salpigidis of Greece for a penalty.Hide Caption 356 of 370 Photos: Euro 2012: The best photosEuro 2012: The best photos β Dimitris Salpigidis and Georgios Samaras of Greece celebrate their first goal against Poland.Hide Caption 357 of 370 Photos: Euro 2012: The best photosEuro 2012: The Best Photos β Lukasz Piszczek of Poland and Georgios Samaras of Greece battle for the ball during the opening match.Hide Caption 358 of 370 Photos: Euro 2012: The best photosEuro 2012: The Best Photos β Robert Lewandowski of Poland celebrates scoring the opening goal during the match against Greece.Hide Caption 359 of 370 Photos: Euro 2012: The best photosEuro 2012: The Best Photos β Polish fans cheer before the match between Poland and Greece.Hide Caption 360 of 370 Photos: Euro 2012: The best photosEuro 2012: The Best Photos β Players warm up before the match between Poland and Greece.Hide Caption 361 of 370 Photos: Euro 2012: The best photosEuro 2012: The Best Photos β A young woman blows a kiss as she takes part in a parade before the opening match.Hide Caption 362 of 370 Photos: Euro 2012: The best photosEuro 2012: The Best Photos β Police officers stand in front of a poster showing a giant ball.Hide Caption 363 of 370 Photos: Euro 2012: The best photosEuro 2012: The Best Photos β Polish fans hold up banners before the Euro 2012 match between Poland and Greece.Hide Caption 364 of 370 Photos: Euro 2012: The best photosEuro 2012: The Best Photos β Fans of Poland's national soccer team wave from a train window.Hide Caption 365 of 370 Photos: Euro 2012: The best photosEuro 2012: The Best Photos β Greek and Polish fans cheer for their teams before the match.Hide Caption 366 of 370 Photos: Euro 2012: The best photosEuro 2012: The Best Photos β Mascots Slavko, left, and Slavek, right, pose before the match between Poland and Greece.Hide Caption 367 of 370 Photos: Euro 2012: The best photosEuro 2012: The Best Photos β Czech Republic fans cheer a few hours before the opening match.Hide Caption 368 of 370 Photos: Euro 2012: The best photosEuro 2012: The Best Photos β Fans attend the Dutch team's training session.Hide Caption 369 of 370 Photos: Euro 2012: The best photosEuro 2012: The Best Photos β German and Portugese fans show off their nations' flags.Hide Caption 370 of 370Redknapp had been widely favored to replace Capello as England coach, but the 65-year-old missed out as Roy Hodgson was instead appointed ahead of Euro 2012.Valery Nepomnyashchy, who took Cameroon to the quarterfinals of the 1990 World Cup, is one of seven Russians on the list.Former U.S.S.R. international Valery Gazzaev coached the national side from 2002-03, while Anatoliy Byshovets was in charge in 1998 and led the Soviet team to Olympic gold a decade before that. Dynamo Kiev's Yury Syomin had a brief spell as Russia boss in 2005.Of the others, former Dynamo Moscow manager Andrei Kobelev and Yuri Krasnozhan (ex-Anzhi Makhachkala) have had no top-level international experience, while Nikolai Pisarev coaches the Russia Under-21 team.Russia's last two coaches have been Dutchmen, with Advocaat following Guus Hiddink.Hiddink took Russia to the semifinals of Euro 2008, but then failed to qualify for the 2010 World Cup as the team surprisingly lost to unfancied Slovenia in a playoff. He is now coach at Anzhi.Advocaat helped Zenit St. Petersburg become only the second Russian club to win a European title in the second-tier UEFA Cup in 2008, and was named Russia coach after a short spell in charge of both Belgium's national side and Dutch team AZ Alkmaar.He announced before Euro 2012 that he would stand down after the tournament to return to his homeland with PSV Eindhoven, and Russia crashed out in the group stage after failing to follow up the impressive opening 4-1 win over the Czech Republic.
| 0
|
Internet Explorer is dead, but not the mess it left behind.
Microsoft earlier today issued an emergency security advisory warning millions of Windows users of a new zero-day vulnerability in Internet Explorer (IE) browser that attackers are actively exploiting in the wild β and there is no patch yet available for it.
The vulnerability, tracked as CVE-2020-0674 and rated moderated, is a remote code execution issue that exists in the way the scripting engine handles objects in memory of Internet Explorer and triggers through JScript.dll library.
A remote attacker can execute arbitrary code on targeted computers and take full control over them just by convincing victims into opening a maliciously crafted web page on the vulnerable Microsoft browser.
"The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user," the advisory says.
"If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights."
Microsoft is aware of 'limited targeted attacks' in the wild and working on a fix, but until a patch is released, affected users have been provided with workarounds and mitigation to prevent their vulnerable systems from cyberattacks.
The affected web browsing software includes β Internet Explorer 9, Internet Explorer 10, and Internet Explorer 11 running on all versions of Windows 10, Windows 8.1, and the recently-discontinued Windows 7.
Workarounds: Defend Against Attacks Until A Patch Arrives
According to the advisory, preventing the loading of the JScript.dll library can manually block the exploitation of this vulnerability.
To restrict access to JScript.dll, run following commands on your Windows system with administrator privileges.
For 32-bit systems:
takeown / f% windir% \ system32 \ jscript.dll
cacls% windir% \ system32 \ jscript.dll / E / P everyone: N
For 64-bit systems:
takeown / f% windir% \ syswow64 \ jscript.dll
cacls% windir% \ syswow64 \ jscript.dll / E / P everyone: N
takeown / f% windir% \ system32 \ jscript.dll
cacls% windir% \ system32 \ jscript.dll / E / P everyone: N
When a patch update is available, users need to undo the workaround using the following commands:
For 32-bit systems:
cacls %windir%\system32\jscript.dll /E /R everyone
For 64-bit systems:
cacls %windir%\system32\jscript.dll /E /R everyone
cacls %windir%\syswow64\jscript.dll /E /R everyone
To be noted, some websites or features may break after disabling the vulnerable JScript.dll library that relies on this component, therefore, users should install updates as soon as they become available.
| 1
|
The most popular and widely used encryption scheme has been found to be weaker with the disclosure of a new attack that could allow attackers to steal credit card numbers, passwords and other sensitive data from transmissions protected by SSL (secure sockets layer) and TLS (transport layer security) protocols.
The attack leverages a 13-year-old weakness in the less secure Rivest Cipher 4 (RC4) encryption algorithm, which is the most commonly used stream cipher for protecting 30 percent of TLS traffic on the Internet today.
BAR-MITZVAH ATTACK
The attack, dubbed "Bar-Mitzvah", can be carried out even without conducting man-in-the-middle attack (MITM) between the client and the server, as in the case of most of the previous SSL hacks.
Itsik Mantin, a researcher from security firm Imperva, presented his findings in a research titled, "Attacking SSL when using RC4" at the Black Hat Asia security conference Thursday in Singapore.
Bar Mitzvah attack actually exploits the "Invariance Weakness," the weak key pattern used in RC4 keys that can leak plain text data from the encrypted SSL/TLS traffic into the cipher text under certain conditions, potentially exposing account credentials, credit card data, or other sensitive information to hackers.
The Invariance Weakness of RC4 pseudo-random stream allows an attacker to distinguish RC4 streams from randomness and increase the probability to leak sensitive data in plain text.
"The security of RC4 [algorithm] has been questionable for many years, in particular its initialization mechanisms," researchers wrote in a research paper (pdf).
"However, only in recent years has this understanding begun translating into a call to retire RC4. In this research, we follow [researches on 2013 RC4] and show that the impact of the many known vulnerabilities on systems using RC4 is clearly underestimated."
Bar Mitzvah is the first 'practical' attack on SSL that only requires passive sniffing or eavesdropping on SSL/TLS-encrypted connections, rather a man-in-the-middle attack, Mantin says. Though, researcher says MITM attack could be used as well for hijacking a session.
HOW TO PROTECT YOURSELF
While waiting for a "broad-brush retirement of RC4," administrators should consider the following steps to protect themselves from RC4 weaknesses:
Web application admins should disable RC4 in their applications' TLS configurations.
Web users (particularly power users) should disable RC4 in their browser's TLS configuration.
Browser providers should consider removing RC4 from their TLS cipher lists.
Over last many years, several significant vulnerabilities including BEAST, POODLE, and CRIME, have been discovered in the SSL protocol leveraging the RC4's weakness. Though, a large number of websites on the Internet relying on RC4.
| 1
|
Duqu computer virus Detected by Iran civil defense organization
The virus is called W32.Duqu, or just Duqu create fear after the opening Pandora's Box of Stuxnet. The head of Iran's civil defense organization told the official IRNA news agency that computers at all main sites at risk were being checked and that Iran had developed software to combat the virus.
First, Duqu is not deigned to harm industrial automation. The software basically attacks windows systems. Instead of sabotaging industrial control, Duqu has been general remote access capabilities. Duqu has a key logger and can save passwords etc.. The malware uses HTTP and HTTPS to communicate to a command and control (C&C) server at 206.183.111.97, which is hosted in India, the IP is inactive as of October 18th. Duqu infiltrates systems directly it is not a worm like Stuxnet and needs to be placed directly, e.g. through infected mails.Duqu also the certificate of C-Media Electronics Incorporation, a Taiwanese audio chip producer.
"We are in the initial phase of fighting the Duqu virus," Gholamreza Jalali, was quoted as saying. "The final report which says which organizations the virus has spread to and what its impacts are has not been completed yet. All the organizations and centers that could be susceptible to being contaminated are being controlled," he said.
So far Duqu was found on less than 10 computers from European companies, which are developing industrial control software, according to a Symantec-Analyst. The software is programmed to remove itself automatically after 36 days. The complete set up: Invades target (not wormlike), spies out passwords, and removes itself β hopefully without being detected β seems like Duqu actually prepares an attack. This is also assumed by F-secure, "it's possible we'll eventually see a new attack targeting PLC systems, based on the information gathered by Duqu."
| 1
|
A critical vulnerability has been discovered in the widely used Transmission BitTorrent app that could allow hackers to remotely execute malicious code on BitTorrent users' computers and take control of them.
The vulnerability has been uncovered by Google's Project Zero vulnerability reporting team, and one of its researchers Tavis Ormandy has also posted a proof-of-concept attackβjust 40 days after the initial report.
Usually, Project Zero team discloses vulnerabilities either after 90 days of reporting them to the affected vendors or until the vendor has released a patch.
However, in this case, the Project Zero researchers disclosed the vulnerability 50 days prior to the actual time limit because Transmission developers failed to apply a ready-made patch provided by the researchers over a month ago.
"I'm finding it frustrating that the transmission developers are not responding on their private security list, I suggested moving this into the open so that distributions can apply the patch independently. I suspect they won't reply, but let's see," Ormandy said in a public report published Tuesday.
Proof-of-Concept Exploit Made Publicly Available
The PoC attack published by Ormandy exploits a specific Transmission function that lets users control the BitTorrent app with their web browser.
Ormandy confirmed his exploit works on Chrome and Firefox on Windows and Linux (Fedora and Ubuntu) and believes that other browsers and platforms are also vulnerable to the attack.
Transmission BitTorrent app works on server-client architecture, where users have to install a daemon service on their systems in order to access a web-based interface on their browsers locally.
The daemon installed on the user system then interacts with the server for downloading and uploading files through the browser using JSON RPC requests.
Ormandy found that a hacking technique called the "domain name system rebinding" attack could successfully exploit this implementation, allowing any malicious website that user visits to execute malicious code on user's computer remotely with the help of installed daemon service.
Here's How the Attack Works:
The loophole resides in the fact that services installed on localhost can be manipulated to interact with third-party websites.
"I regularly encounter users who do not accept that websites can access services on localhost or their intranet," Ormandy wrote in a separate post, which includes the patch.
"These users understand that services bound to localhost are only accessible to software running on the local machine and that their browser is running on the local machineβbut somehow believe that accessing a website "transfers" execution somewhere else. It does not work like that, but this is a common source of confusion."
Attackers can exploit this loophole by simply creating a DNS name they're authorized to communicate with and then making it resolve to the vulnerable computer's localhost name. Here's how the attack works:
A user visits malicious site (https://attacker.com), which has an iframe to a subdomain controlled by the attacker.
The attacker configures their DNS server to respond alternately with 127.0.0.1 and 123.123.123.123 (an address controlled by the attacker) with a very low TTL.
When the browser resolves to 123.123.123.123, it serves HTML that waits for the DNS entry to expire (or force it to terminate by flooding the cache with lookups), then it has permission to read and set headers.
Ormandy said the vulnerability (CVE-2018-5702) was the "first of a few remote code execution flaws in various popular torrent clients," though he did not name the other torrent apps due to the 90-day disclosure timeline.
A fix is expected to be released as soon as possible, a development official with Transmission told ArsTechnica, without specifying an actual date.
| 1
|
Story highlightsAtletico Madrid's defeat to Vallecano gives Barcelona a 12-point lead in SpainCatalan side thrashed Getafe 6-1 in midday kickoff as six different players scoreMario Balotelli's AC Milan surrender fourth place in Italy to city rivals InternazionaleLyon's defeat gives PSG a six-point lead in the French title raceBarcelona's Sunday celebrations started early with a 6-1 romp over Getafe, and ended late with a slip-up by second-placed Atletico Madrid which has all but ended the Spanish title race.Atletico's 2-1 defeat at Rayo Vallecano gave Barca a commanding 12-point lead with 15 matches to play, as third-placed champions Real Madrid languish another four points adrift. "It was an unusual time to play but we had a party in the stadium," the Catalan side's assistant coach Jordi Roura said after the midday kickoff at the Camp Nou, where more than 85,000 fans turned up."The players were at an extraordinary level. They were intense from the first minute," added Roura, who is running the team while Tito Vilanova is receiving cancer treatment in New YorkAlexis Sanchez opened the scoring in the sixth minute with his first league goal this season before Lionel Messi netted for a record-extending 13th successive La Liga game before quarter of an hour had been played -- his 35th in the competition from 23 appearances.Read: Ronaldo fires warning to Manchester United Photos: Messi and Balotelli spot on Photos: Messi and Balotelli spot onMessi makes point β Barcelona forward Lionel Messi (right) celebrates after scoring from the penalty spot in the 1-1 draw against Valencia.Hide Caption 1 of 3 Photos: Messi and Balotelli spot onSuper Mario β Mario Balotelli marked his return to Italy's Serie A with both goals in AC Milan's 2-1 win over Udinese, the second coming from the penalty spot deep into time added on. Hide Caption 2 of 3 Photos: Messi and Balotelli spot onBalo's back β Balotelli had opened the scoring just 25 minutes into his debut with a left-foot volley at the San Siro.Hide Caption 3 of 3 Photos: El Tigre: Falcao on fire Photos: El Tigre: Falcao on fireThe Tiger β Nicknamed "El Tigre" as a boy by his friends, Radamel Falcao has torn apart defenses all over the world. Atletico paid out $53 million to take him to Spain from Porto in 2011 and he more than repaid that fee, firing 36 goals in his first season and leading the club to the victory in the Europa League.Hide Caption 1 of 5 Photos: El Tigre: Falcao on fireDeadly duo β Falcao's impressive form has seen him mentioned in the same breath as Barcelona magician Lionel Messi. The Colombian scored a wonderful goal at the Camp Nou to open the scoring in December but Messi grabbed two as Barca eased to a 4-1 win.Hide Caption 2 of 5 Photos: El Tigre: Falcao on fireStar man β Atletico is enjoying a successful season with the club second in La Liga, through to the semifinals of the Spanish Cup and also in contention to retain its Europa League title. Falcao has been central to the team's impressive run of form, scoring 18 goals in the league so far this term.Hide Caption 3 of 5 Photos: El Tigre: Falcao on fireWorld Cup dream β Falcao hopes to lead the line for Colombia at the 2014 World Cup in Brazil. His nation has not appeared at the finals since 1998 but holds the third of four automatic qualifying places in the South American group.Hide Caption 4 of 5 Photos: El Tigre: Falcao on fireCelebrity status β Falcao and his singer songwriter wife Lorelei Taron are both in the celebrity spotlight. It's a role to which the player has had to grow accustomed since becoming a worldwide phenomenon.Hide Caption 5 of 5 Photos: Spain dominates football's rich list Photos: Spain dominates football's rich listLeading the way β Hide Caption 1 of 11 Photos: Spain dominates football's rich listReal deal β Real Madrid star Cristiano Ronaldo has become an integral part of the club's success both on and off the pitch with the Spanish giant leading the Football Money League table for the eighth year in a row.Hide Caption 2 of 11 Photos: Spain dominates football's rich listBarca brand β Leo Messi's goals and success has been key to Barcelona's ability to draw in fans and broadcasters at will. It is the fourth year in a row that the club has finished second in the Football Money League table behind arch-rival Real Madrid.Hide Caption 3 of 11 Photos: Spain dominates football's rich listUnited on course β Robin van Persie, a $38 million summer signing, has helped Manchester United reach the top of the Premier League as it looks to wrestle the title back from rival Manchester City. United, which has recently signed a record shirt deal with General Motors, has been tipped to overhaul the top two over the coming years.Hide Caption 4 of 11 Photos: Spain dominates football's rich listHide Caption 5 of 11 Photos: Spain dominates football's rich listBavarian bonus β Bayern Munich, which recently appointed Pep Guardiola as its new manager for the 2013/14 season, remain in fourth position. The German giant reached the Champions League final last season where it was beaten by Chelsea.Hide Caption 6 of 11 Photos: Spain dominates football's rich listSpain dominates football's rich list β Hide Caption 7 of 11 Photos: Spain dominates football's rich listChelsea chasing β European Champions League holder Chelsea is fifth in the money list. The London club has spent big money in recent years including the $80 million purchase of Spain striker Fernando Torres.Hide Caption 8 of 11 Photos: Spain dominates football's rich listLooks who's watching β Hide Caption 9 of 11 Photos: Spain dominates football's rich listArsenal up there β .Arsenal stays sixth in the table despite it's failure to win a single trophy since 2005. The club has also seen big name departures with Cesc Fabregas joining Barcelona and Robin van Persie moving to Manchester UnitedHide Caption 10 of 11 Photos: Spain dominates football's rich listCity slickers β Manchester City's Premier League title win catapulted the club up the Football Money League table and into seventh position. City's revenue grew to $452.6 million, the largest absolute and relative growth of any Money League club.Hide Caption 11 of 11 Photos: David Beckham through the years Photos: David Beckham through the yearsDavid Beckham through the years β David Beckham is a man of many talents. Not only is he one of the most famous names in sports, but he's also one heck of a model. Tommy Hilfiger has now recognized the 38-year-old former soccer player as the No. 1 underwear model of the century. It's just one of several career highs for Beckham, seen here modeling Emporio Armani underwear in a 2009-2010 ad campaign.Hide Caption 1 of 23 Photos: David Beckham through the yearsDavid Beckham through the years β Beckham makes his England debut at a World Cup qualifying match against Moldova in 1996.Hide Caption 2 of 23 Photos: David Beckham through the yearsDavid Beckham through the years β Beckham celebrates his goal against Colombia in the 1998 World Cup.Hide Caption 3 of 23 Photos: David Beckham through the yearsDavid Beckham through the years β As a player on Manchester United, Beckham cools down during the FA Charity Shield match against Arsenal in 1998.Hide Caption 4 of 23 Photos: David Beckham through the yearsDavid Beckham through the years β At the 1998 World Cup, in a second-round match against Argentina, Beckham was sent off for kicking out at Diego Simeone. England lost the match on penalties and was eliminated, with Beckham becoming a hate figure for some fans.Hide Caption 5 of 23 Photos: David Beckham through the yearsDavid Beckham through the years β Beckham poses after a news conference in Awaji-shima Island, Japan, in 2002.Hide Caption 6 of 23 Photos: David Beckham through the yearsDavid Beckham through the years β Beckham poses with Beyonce, left, and Jennifer Lopez in Madrid during a presentation of the new Pepsi "Samourai" in 2004.Hide Caption 7 of 23 Photos: David Beckham through the yearsA name brand β Beckham acts as England's captain during the 2004 European Championships in Portugal.Hide Caption 8 of 23 Photos: David Beckham through the yearsDavid Beckham through the years β Beckham waves after a La Liga match between Real Madrid and Deportivo La Coruna in 2007.Hide Caption 9 of 23 Photos: David Beckham through the yearsDavid Beckham through the years β The midfielder celebrates with his sons in 2007 after Real Madrid won the Spanish League title by beating Mallorca.Hide Caption 10 of 23 Photos: David Beckham through the yearsDavid Beckham through the years β Beckham makes an appearance to promote his fragrance "David Beckham Intimately Night" in Sydney in 2007.Hide Caption 11 of 23 Photos: David Beckham through the yearsDavid Beckham through the years β Beckham reveals his new No. 32 jersey after his loan move to AC Milan in 2008.Hide Caption 12 of 23 Photos: David Beckham through the yearsDavid Beckham through the years β Beckham controls the ball during a 2010 World Cup qualifier.Hide Caption 13 of 23 Photos: David Beckham through the yearsDavid Beckham through the years β Beckham, during his time with the Los Angeles Galaxy, walks toward the line judge to have a chat during Game 1 of the MLS Western Conference semifinals in 2009.Hide Caption 14 of 23 Photos: David Beckham through the yearsDavid Beckham through the years β Beckham arrives at Sydney International Airport in 2010.Hide Caption 15 of 23 Photos: David Beckham through the yearsDavid Beckham through the years β David and his wife, Victoria, arrive at the wedding of Prince William and Kate Middleton at Westminster Abbey in 2011.Hide Caption 16 of 23 Photos: David Beckham through the yearsDavid Beckham through the years β The Beckhams attend the Vanity Fair Oscar Party in West Hollywood, California, in 2012.Hide Caption 17 of 23 Photos: David Beckham through the yearsDavid Beckham through the years β Beckham celebrated his second MLS Cup in December 2012 when he decided to leave with a year left on his contract and seek one final challenge in Europe.Hide Caption 18 of 23 Photos: David Beckham through the yearsDavid Beckham through the years β Beckham passes under London's Tower Bridge in a speedboat carrying the Olympic Torch in 2012.Hide Caption 19 of 23 Photos: David Beckham through the yearsDavid Beckham through the years β Beckham poses with Paris Saint-Germain President Nasser Al-Khelaifi, left, and PSG sports director Leonardo during a news conference announcing his new gig in January 2013.Hide Caption 20 of 23 Photos: David Beckham through the yearsDavid Beckham through the years β Beckham waves after PSG played Brest in his final home match in May. Beckham had signed on with the team just a few months prior to his retirement. Hide Caption 21 of 23 Photos: David Beckham through the yearsDavid Beckham through the years β Beckham and his daughter, Harper, make their way through a crowd in New York in February. Harper, Beckham's fourth child, was born in 2011. Hide Caption 22 of 23 Photos: David Beckham through the yearsDavid Beckham through the years β Since retiring from soccer, Beckham has tried his hand at acting. It was announced in March that he will appear in a special edition of the UK classic sitcom, "Only Fools and Horses," to raise money for a good cause. Hide Caption 23 of 23David Villa and substitute Cristian Tello scored in the second half before Getafe hit back through striker Alvaro Vazquez, but then Andres Iniesta and defender Gerard Pique netted in time added on."We felt great on the pitch, a lot of people were able to make it to the stadium and the atmosphere was fantastic," Pique said."It wouldn't be an inconvenience if we had to play at the same time in the future."Read: Messi signs new Barca contractAtletico striker Radamel Falcao scored his 19th league goal this season, putting him third in the Pichichi standings behind Real's Cristiano Ronaldo -- who took his tally to 24 with a hat-trick in Saturday's 4-1 win over Sevilla.However, it came far too late -- the last kick of the match -- as Vallecano moved up to fifth place on goal difference above Valencia thanks to first-half goals from Guinean striker Alhassane Bangoura and Brazilian forward Leo Baptistao.Real Sociedad moved up to eighth with a 2-1 win at Zaragoza, while Barcelona's city rivals Espanyol eased relegation worries with a 4-0 win at Athletic Bilbao.ItalyMario Balotelli scored his second successive penalty for AC Milan to rescue a 1-1 draw at Cagliari, but his team surrendered fourth place in Serie A to city rivals Internazionale.Balotelli took his tally to three goals in two games since signing for $30 million from English champions Manchester City with an 82nd-minute spot-kick, but the Italy striker also missed a late chance to snatch victory.Inter won 3-1 at home to Chievo to move within a point of third-placed Lazio, as striker Antonio Cassano scored in the second minute then defender Andrea Ranocchia restored the lead with a header after Luca Rigoni's equalizer, and Diego Milito added the third in the second half.GermanyFreiburg moved up to fifth in the Bundesliga following Sunday's 1-0 win at home to lowly Fortuna Dusseldorf.An 87th-minute goal from Czech player Pavel Krmas put Freiburg above Mainz and Hamburg on goal difference.Mainz drew 1-1 at second-bottom Augsburg, while Hamburg crushed second-placed defending champions Borussia Dortmund 4-1 on Saturday.FranceLyon's title hopes suffered a blow in Sunday's 3-1 home defeat by Lille, which meant Paris Saint-Germain ended the weekend with a six-point lead.Third-placed Marseille also dropped points, drawing 1-1 at Evian -- who moved out of the bottom three on goal difference.PSG beat Bastia 3-1 on Friday, with star striker Zlatan Ibrahimovic scoring a penalty for his leading 21st goal this season.
| 0
|
Story highlightsMaria Sharapova through to semifinals of French OpenSharapova defeated Garbine Muguruza 1-6 7-5 6-1Russian will face Eugenie Bouchard in last fourNovak Djokovic to take on Ernests GulbisMaria Sharapova was forced to call on all her resilience to ensure her place in the semifinals of the French Open Tuesday.The World No.8 endured a nightmare opening set, losing it 6-1 to Spain's Garbine Muguruza, before launching an impressive fightback.Sharapova, who was beaten in last year's final, won the second set 7-5 before taking the decider 6-1.The Russian, who won at Roland Garros in 2012, will now face Canada's rising star Eugenie Bouchard.JUST WATCHEDSharapova's love affair with ParisReplayMore Videos ...MUST WATCHSharapova's love affair with Paris 01:53JUST WATCHEDFrench Open outsider's meteoric riseReplayMore Videos ...MUST WATCHFrench Open outsider's meteoric rise 01:10JUST WATCHEDYannick Noah's unforgettable momentReplayMore Videos ...MUST WATCHYannick Noah's unforgettable moment 05:46"I came across a player playing with such confidence and I knew it was going to be a tough match," Sharapova told the WTA website."I had a tough start but luckily I had a good finish."She was playing so aggressive at the start, but also I wasn't really helping myself with my movement or serving."Sharapova, seeded seventh, made a dreadful start to the contest and fell 4-0 behind before finally winning a game.Murguruza, who defeated defending champion Serena Williams 6-2 6-2 earlier in the tournament, played with a verve and quality which belied her age.After conceding the first set, she slowly got to grips with 21-year-old Muguruza, who was playing in her first ever grand slam quarterfinal.There was heartbreak for another Spaniard in the other quarterfinal after Carla Suarez Navarro threw away a 4-1 advantage in the final set.Bouchard, ranked 16th in the world, appeared to be heading out of the tournament but fought back to take the match 7-6 2-6 7-5.It is a second successive grand slam semifinal for Bouchard, who was beaten in straight sets by Li Na at the Australian Open earlier this year."I want to thank everyone here for creating such a great atmosphere," Bouchard said after the match."I didn't expect to play such a tough match. She played really well and is a great clay court player."At the end of the third set I thought I was getting the upper hand began to believe that I could win. "I'm just excited to be in the semifinals and to stay a little longer in Paris. I'm just going to enjoy myself in the semifinals."DjokovicMeanwhile, Novak Djokovic moved into the semifinals of the men's draw with a straight sets win over Canada's Milos Raonic.The World No.2, who has never won at Roland Garros, prevailed 7-5 7-6 6-4 to set up a clash with Latvia's Ernests Gulbis.The Serb will make his 22nd appearance in a grand slam sem-final and his 14th in his last 15 major appearances.Djokovic is now just two wins away from becoming the eighth man in history to complete the career grand slam.But standing in his way is the exciting Gulbis, who will compete in his first ever grand slam semifinal.Gulbis, seeded 18th, overcame Tomas Berdych 6-3 6-2 6-4 to build on his impressive victory over 17- time grand slam winner Roger Federer."It's very special," Gulbis said in an on-court interview. "Today was the best match of the tournament. I did everything well."
| 0
|
Mirage Anti-Bot 2.0 : Protection against ZeuS, SpyEye Malwares
Jean-Pierre aka DarkCoderSc and Fred De Vries Develop and Release the second version of Another great security tool named "Mirage Anti-Bot 2.0". Zeus and SpyEye were the two main families of botnet software. These types of malware are spread mainly through drive-by downloads and phishing schemes.
They are so-called Trojan horses which are designed to steal credentials from various online services like social networks (such as Facebook, Hi5, Yahoo, Netlog), online banking accounts (phising), ftp-accounts, email-accounts and other. They are part of botnets that are estimated to include millions of compromized computers.
Because your antivirus program is not always giving you enough protection against these types of malware, so Experts at https://unremote.org/ create this program for you, that can be used as an extra layer of security. Mirage Anti-Bot will be downloading and installing one or more blocklists from www.abuse.ch, a reputable Swiss-based anti-malware website. This effectively stops your computer from reaching infected sites, thus minimizing the risk to be infected with this extremely dangerous type of malware.
Changelog :
[+] Installer
[+] New GUI, More pro
[+] Start with Windows
[+] Protect you against Palevo, TDL3, Rogues, C&C etc..
[+] Protect you against spyeye botnet
[+] Confirm on quit
[+] Limit exceed bug fixed, now it grabs data locally using SSL
[+] Proxy authentification added
Download Mirage Anti-Bot 2.0
| 1
|
Computer networks at major South Korean banks and top TV broadcasters crashed simultaneously Wednesday, during a Massive cyber attack. South Korean police investigating reports from several major broadcasters and banks.
least three broadcasters KBS, MBC and YTN and the Shinhan and Nonghyu banks reported that their computer networks had been crached. The state-run Korea Information Security Agency said that Screens went blank at 2 p.m. and more than seven hours later some systems were still down.
The take down was apparently not from a distributed denial-of-service (DDOS) attack, but a virus that has apparently infected machines in these organizations and delivered its payload simultaneously.
An official at the Korea Communications Commission said investigators speculate that malicious code was spread from company servers that send automatic updates of security software and virus patches.
The Associated Press says:
"The latest network paralysis took place just days after North Korea accused South Korea and the U.S. of staging a cyber attack that shut down its websites for two days last week. Loxley Pacific, the Thailand-based Internet service provider, confirmed the North Korean outage but did not say what caused it.
"The South Korean shutdown did not affect government agencies or potential targets such as power plants or transportation systems, and there were no immediate reports that bank customers' records were compromised, but the disruption froze part of the country's commerce."
The Korea Internet Security Agency, a state watchdog, said it had recorded 40,000 cases of cyber attacks from foreign and domestic sources in 2012, up sharply from 24,000 in 2008.
Some banking services, such as ATM and online banking, were adversely affected by the shutdowns, though the banks are reporting that those services have been restored.
South Korean President Park Geun Hye has put together a cyber security team to look into whether North Korea is the culprit behind today's attacks.
| 1
|
Cybercriminals successfully plundered another digital cryptocurrency exchange.
European cryptocurrency exchange Eterbase this week disclosed a massive breach of its network by an unknown group of hackers who stole cryptocurrencies worth 5.4 million dollars.
Eterbase, which has now entered maintenance mode until the security issue is resolved, described itself as Europe's Premier Digital Asset Exchange.
Based in Bratislava, Slovakia, and launched in 2019, Eterbase is a small cryptocurrency exchange platform that focuses on crypto to SEPA integration (via individual IBAN accounts), multi-asset support, and regulatory compliance.
On Monday night, malicious threat actors managed to raid six Eterbase's hot wallets for Bitcoin, Ethereum, XRP, Tezos, Algorand, and TRON and transferred the funds into their wallets managed at six rival crypto exchanges, Eterbase reported on its Telegram channel on Tuesday.
According to a tweet posted by the affected exchange, Eterbase tracked a big part of its stolen funds to centralized exchanges, including Binance, HitBTC, and Huobi, and contacted their support teams for further assistance.
The company has already notified law enforcement authorities and affected customers, assuring that they have enough capital to meet all the obligations and take all necessary steps to ensure that the amount of the deposit of their clients does not suffer any damage result of the hack.
"We want to inform our users that we have enough capital to meet all our obligations, and at the same time, we want to reassure everyone that this event won't stop our journey!," the exchange said.
Since the investigation is ongoing, the exchange refused to share more details of the security breach incident.
"After the security audit of renowned global companies, our operations will continue. We will announce the date of the re-opening of the ETERBASE Exchange platform as soon as possible,' the company said.
| 1
|
Blizzard's Mobile Server Database Exposed by Warv0x (AKA Kaihoe)
Warv0x (AKA Kaihoe) Hacker today expose the Database structure of one of the biggest Company "Blizzard Mobile". The exposed data can be seen on a pastebin link.
DATABASES EXPOSED LIST :
[*] admin
[*] egw
[*] glpi
[*] information_schema
[*] lost+found
[*] mboost_forum
[*] multivea
[*] mysql
[*] openads
[*] phpcollab
[*] phpmyadmin
[*] pixcatcher
Blizzard's Mobile is Ringtone,Logo,Game, Java,Video,Theme,Mobile,Wallpaper,Screensaver etc. etc. Download Site with Alexa World Rank 3800.
| 1
|
Washington (CNN)The US Air Force wants to add more bombers, fighters, tankers and other front-line units by 2030 to confront rising threats from China and Russia, senior officials said Monday, outlining a proposal for what the service will need to fight and win future conflicts. Specifically, officials called for a nearly 25% increase in operational squadrons over the next 12 years, which would bring the Air Force to a size not seen since the Cold War, when there were 401 squadrons. CIA official: China wants to replace US as world superpower"The Air Force is too small for what the nation is asking us to do. We have 312 operational squadrons today. The Air Force we need has 386 operational squadrons by 2030," Air Force Secretary Heather Wilson said during a speech at the Air Force Association's annual Air, Space & Cyber Conference in Maryland. The call for more than 70 additional squadrons is based on estimates of the expected threat facing the US between 2025 and 2030 and represents an honest assessment of what the Air Force needs to fight and win a potential conflict with China or Russia in the future, according to Wilson. Defense bill offers harsh words for Russia and China"It's not just larger; the way we fight will be different," she said, noting that this assessment is in line with priorities outlined in Defense Secretary James Mattis' National Defense Strategy, which calls China and Russia "the central challenge" facing the US military. Read More"Inter-state strategic competition, not terrorism, is now the primary concern in US national security," according to the document, released earlier this year, which added that "long-term strategic competitions with China and Russia are the principal priorities for the Department.""Today, we are the best Air Force in the world," Air Force Chief of Staff Gen. David L. Goldfein said. "Our adversaries know it. They have been studying our way of war and investing in ways to take away those advantages. This is about how we stay in front."While the proposed increases have not yet been worked into the Pentagon's budget plans, Goldfein stressed the idea that the changes are essential to ensuring the US can maintain its military dominance going forward. "We usually have the dialogue about the Air Force we can afford," he added. "This is different. This is about the Air Force we need to present credible options to compete, deter and, if deterrence fails, win."China 'likely' training pilots to target US, Pentagon report says"These observations are not new or novel. Defense leaders have understood these factors for a long time. What is different about Secretary Wilson's outlined approach is her willingness to put the Air Force's challenges on the table so that Congress and others can understand the risk and prioritize necessary solutions," retired Air Force Lt. Gen. David Deptula, dean of the Mitchell Institute for Aerospace Studies, wrote in an op-ed for Defense News. The largest proposed percentage increase would be to the Air Force's bomber squadrons, which would grow from nine to 14, according to Wilson, who noted that an increased bomber presence is particularly important in the Pacific, where China's first aircraft carrier has been conducting flight operations after being declared combat ready this year. "China has militarized islands in the South China Sea, and now all of Southeast Asia is within reach of its long-rang bombers," she said. "Part of President Xi's plan is for China to be a top-ranked military by 2050, and President Xi is no longer bound by term limits on his presidency." Speaking at the Aspen Security Forum earlier this summer, Michael Collins, the deputy assistant director of the CIA's East Asia Mission Center, said Chinese President Xi Jinping and his regime are waging a "cold war" against the US.By looking at the writings of Xi, whose "thought" or worldview was recently enshrined in China's Constitution, it's clear, Collins said, that the threat China presents is the greatest global challenge the US currently faces."It sets up a competition with us and what we stand behind far more significantly by any extreme than what the Russians could put forward," Collins said.According to Deptula, the US bomber force has been significantly under-resourced since the end of the Cold War. Trump's Space Force could cost nearly $13 billion over 5 years"The modern threat environment demands that the Air Force build a force with range, responsiveness, payload, survivability, and versatile combat power as keystone attributes. This force must be able to address concurrent large-scale conflicts and persistent steady-state demands," Deptula argues in his own analysis of the Air Force's bomber fleet, obtained by CNN prior to its expected release this week. The Air Force's proposal also calls for the following additions to fighter squadrons, attack and special operations, space, cyber, tanker, airlift and other front-line units: Seven space squadrons14 tanker squadrons Seven special operations squadronsNine combat search and rescue squadrons 22 Command and Control, Intelligence, Surveillance, and Reconnaissance squadronsSeven fighter squadrons Two Remotely Piloted Aircraft squadronsOne airlift squadronWhile the plan does not include an increase in the number of missile squadrons, Wilson said the US "should modernize our nuclear deterrent.""Cyber would also not see an increase in squadrons, though we will develop new tools for the squadrons we have," she said. Wilson said she understands that it will take time to build the support and budget needed to implement the proposed changes but emphasized that there is an urgent need to address the issues at hand. "We aren't naΓ―ve," she said. "But we have an obligation to be honest with our countrymen and tell them, as those who came before us have done in their time, what should be done. ... What we must do."CNN's Ryan Browne contributed to this report.
| 0
|
Un-Patched PHP-CGI remote code execution bug can expose Source Codes
A serious remote code execution vulnerability in PHP-CGI disclosed. PHP-CGI-based setups contain a vulnerability when parsing query string parameters from php files. The developers were still in the process of building the patch for the flaw when it was disclosed Wednesday, But the vulnerability can only be exploited if the HTTP server follows a fairly obscure part of the CGI spec.
According to advisory (CVE-2012-1823) , PHP-CGI installations are vulnerable to remote code execution. You can pass command-line arguments like the "-s" switch "show source" to PHP via the query string. For example, You could see the source via "https://localhost/test.php?-s" . A remote unauthenticated attacker could obtain sensitive information, cause a denial of service condition or may be able to execute arbitrary code with the privileges of the web server.
The team that found the bug, known as Eindbazen. They said that it had been waiting for several months for the PHP Group to release a patch for the vulnerability in order to publish information about the bug.
What this vulnerability can do ? It can help attacker to find out database passwords, file locations etc and Execute any file on the server's local disk. Most important , using some trick if you have the possibility to upload a file to the server, execute any code.
So, When PHP is used in a CGI-based setup the php-cgi receives a processed query string parameter as command line arguments which allows command-line switches, such as -s, -d or -c to be passed to the php-cgi binary, which can be exploited to disclose source code and obtain arbitrary code execution.
| 1
|
XSS Vulnerability in MSN.com
XSS Vulnerability (Cross Site Scripting) in MSN discovered by TeamDX . Vulnerable Link is also shown in image.
Last week One of the Security Researcher "Juan Sacco (runlvl)" - Insecurity Research Labs expose the Cross Site vulnerability (XSS) in Bing.com Search Engine.
| 1
|
A 23-year-old hacker from Utah pleaded guilty this week to launching a series of denial-of-service (DoS) attacks against multiple online services, websites, and online gaming companies between 2013 and 2014.
According to a Justice Department (DoJ) press release, Austin Thompson, a.k.a. "DerpTroll," took down servers of several major gaming platforms including Electronic Arts' Origin service, the Sony PlayStation network, and Valve Software's Steam, between December 2013 and January 2014, by flooding them with enough internet traffic.
Thompson then typically used the Twitter account the @DerpTrolling handle to announce his attacks, subsequently posting screenshots or other photos of the server being unavailable after launching DDoS attacks.
The attacks usually took down game servers and related computers of the victim companies for at least a few hours at a time, causing at least $95,000 in damages to the gaming companies around the world.
"Denial-of-service attacks cost businesses millions of dollars annually," said U.S. Attorney Adam Braverman while announcing the plea. "We are committed to finding and prosecuting those who disrupt businesses, often for nothing more than ego."
Thompson pleaded guilty in federal court in San Diego on Thursday and was charged with causing damages to a protected computer, which carries a maximum penalty of 10 years prison, a fine of $250,000, as well as three years supervised release.
Active since 2011, the DerpTrolling hacking group is believed to be operated by Thompson, who write malware used to launch the DDoS attacks against online services around the world.
However, the hacking group made headlines in late 2013 and early 2014 after disrupting online gaming servers owned by Sony, Riot Games, Microsoft, Nintendo, Valve, and Electronic Arts.
Thompson's sentencing is scheduled for March 1, 2019, before United States District Judge Jeffrey Miller.
It wasn't just DerpTrolling that created chaos in 2014. The infamous Lizard Squad hacking group also made headlines in 2014 by launching DDoS attacks against Microsoft Xbox Live and Sony PlayStation Network and knocking them offline during the Christmas holidays.
Several teenagers last year from around the world were charged with participating in the Lizard Squad 2014 DDoS attacks.
| 1
|
Story highlightsMasters champion Patrick Reed addresses negative headlinesAmerican tells CNN: "It doesn't really concern me, I am who I am."Reed revels in first major win, saying "I'm on cloud nine"Augusta National, Georgia (CNN)Patrick Reed knows he's probably not the Masters champion every golf fan would have wanted.But the controversial American won't let that take the shine off his first major triumph, secured Sunday after the challenges of Rory McIlroy, Jordan Spieth and Rickie Fowler all fell away.Follow @cnnsport
"Honestly, it doesn't really concern me," the 27-year-old, who finished 15-under par for the tournament, told CNN Sport's Don Riddell. "I am who I am." "You know that once you're successful, there's going to be good things and bad things that people say and, honestly, to me it doesn't really matter." A large amount of the patrons who lined the course at Augusta National arrived in hope of seeing McIlroy complete a career grand slam of golf's four major tournaments.Read MoreREAD: Patrick Reed keeps his nerve to claim the Green JacketThe support he received was more than that afforded to Reed, who has been accused of arrogance and misdemeanors during his college and professional careers.Reed is a fierce competitor who has always split opinion, earning the nickname "Captain America" for his bullish displays at the 2014 Ryder Cup.And over the four days of the Masters, he used the agnosticism from parts of the crowd to fuel his challenge for the right to wear the tournament's green jacket.JUST WATCHEDSpain and The Masters: A love affairReplayMore Videos ...MUST WATCHSpain and The Masters: A love affair 22:34"I walked up to the first tee and had a really welcoming cheer from the fans, but then when Rory walked up to the tee, you know, his cheer was a little louder," he said."But that's another thing that just kind of played into my hands. Not only did it fuel my fire a little bit, but also it just takes the pressure off of me and adds it back to him."No regretsReed's breakthrough success is likely to put his controversial past under greater scrutiny -- thanks in part to an article published Sunday by Golf.com. It detailed Reed's estrangement from his parents and younger sister, while also resurfacing allegations of cheating made by college teammates in Shane Ryan's book Slaying the Tiger.Reed denies that he cheated.There's also the underage drinking and possession of a fake ID in Reed's first year at the University of Georgia, for which the freshman was fined and sentenced to 60 hours of community service. Reed also drew the ire of the golf world when he claimed he was "a top five player" after winning just his third PGA Tour title back in 2014.Patrick Reed is awarded the Green Jacket by 2017 winner Sergio Garcia of Spain after winning the Masters at Augusta.The new Masters champion stressed that he's very comfortable about his past and current career -- and his past and current life."Honestly, I don't ever regret anything I say," Reed told reporters. "I stand by my comments." "I've evolved into childhood; childhood into high school; high school into college; college into professional golf," he elaborated when talking to CNN. "They're just chapters in my life."Asked by a reporter why some fans root against him, Reed replied: "I don't know. "Why don't you ask them? I mean, I have no idea, and honestly I don't really care what people say on Twitter, or if they are cheering for me or not cheering for me. I'm out here to do my job, and that's to play golf."HungerThose who know the six-time PGA Tour winner best talk of his unwavering devotion to the game from the day he received his first set of plastic clubs as a boy. Every young golfer dreams of one day winning the Masters and Reed was no different, taking to the putting green in his youth, saying "this putt's to win the green jacket" or "I've got to get up and down to win the green jacket."No wonder he described Sunday's result as "a dream come true."JUST WATCHEDJavier Ballesteros on his father SeveReplayMore Videos ...MUST WATCHJavier Ballesteros on his father Seve 05:46"I really haven't come off cloud nine yet," said Reed. "To actually finally be sitting down and have my first major be the green jacket, and to be able to sit here wearing it, it's a surreal moment for me and it's something that I'll never forget. "It kind of makes me hungry to get back out there and try to win some more..."There's certainly no glass ceiling to the American's ambitions. "I feel like I played the golf that I need to play in order to get to where I want to be, and that's to be the best golfer in the world," he said after moving up to No. 11 in the world rankings."The way you're going to do that is perform in these big events and to win these big events."Reed gestures to the crowd while holding the Ryder Cup in 2016.It took Reed until the 2017 PGA Championship to even secure a top-10 finish at a major -- something he put down to putting "too much pressure" on himself. This week was different. Gone was the fixation with hitting "the perfect shots." Instead, Reed just went out there and played. "I had my caddy remind me of that the entire week," he reflected. "Just be you. Play golf. If you get riled up, show it. If you aren't happy about something, it's all right. Just play golf."He certainly did that.
| 0
|
London (CNN)The diplomatic immunity of the wife of an American diplomat who is the suspect in a fatal traffic collision that killed a British teenager "is no longer pertinent," the UK Foreign Secretary said Sunday. Anne Sacoolas, the wife of a US diplomat in Britain, allegedly struck and killed 19-year-old Harry Dunn, in August while driving on the wrong side of the road. Sacoolas was originally cooperating in the case, police have said, but she left the country despite assuring them she would remain in the UK."The US have now informed us that they too consider that immunity is no longer pertinent," UK Foreign Secretary Dominic Raab said in a letter written to Dunn's family.Donald Trump's take on a death in the UK is breathtaking"We have pressed strongly for a waiver of immunity, so that justice can be done ... Whilst the US government has steadfastly declined to give that waiver, that is not the end of the matter," Raab said in the letter seen by CNN.Read MoreThe Foreign Secretary continued that "the UK government's position is that immunity, and therefore any question of waiver, is no longer relevant in Mrs. Sacoolas' case, because she has returned home," he wrote.This could provide an opportunity for UK authorities to commence legal action with a view to extraditing Sacoolas back to the UK to face prosecution.A Foreign Office spokesman told the PA news agency that the office would not comment further on the content of the letter.UK Home Secretary Priti Patel, appearing on the BBC's "The Andrew Marr Show" twice avoided directly answering the question of whether she thought Sacoolas should be extradited to the UK. "The Foreign Secretary has been working with his American counterparts and has been in touch with the US administration on this. It very much seems that the lady in question wants to start cooperating with the discussions and the investigations and we should support that," Patel said."We need to ensure that justice is done but obviously that cooperation with this investigation takes place. That is absolutely right. We owe that to the family and obviously this is a terribly tragic case," Patel said when asked if she thought Sacoolas should be extradited to the UK.Parents of teen killed in car crash will travel to US to call for suspected driver's return to UKThe development comes as Harry Dunn's parents have appealed to US President Donald Trump to intervene, and called on authorities to waive Sacoolas' diplomatic immunity. Sacoolas' lawyer has reached out to Radd Seiger, the victim's family spokesman, to discuss setting up an "initial" meeting between lawyers in the coming weeks, Seiger told CNN.Seiger, also a lawyer, told CNN correspondent Anna Stewart that he is currently in the US capital where he is trying to meet US politicians. Separately, Sacoolas's lawyer has said that Anne Sacoolas "would like to meet with Mr Dunn's parents so that she can express her deepest sympathies and apologies for this tragic accident," PA Media has reported.CNN's Schams Elwazer, Jonny Hallam, Angela Dewan, Anna Stewart, Tara John, Arnaud Siad and Samantha Tapfumaneyi contributed to this report.
| 0
|
A huge data-stealing cyber espionage campaign that targeted Banks, Corporations and Governments in Germany, Switzerland, and Austria for 12 years, has finally come for probably the longest-lived online malware operation in history.
The campaign is dubbed as 'Harkonnen Operation' and involved more than 800 registered front companies in the UK β all using the same IP address β that helped intruder installs malware on victims' servers and network equipments from different organizations, mainly banks, large corporations and government agencies in Germany, Switzerland and Austria.
In total, the cyber criminals made approximately 300 corporations and organisations victims of this well-organised and executed cyber-espionage campaign.
CyberTinel, an Israel-based developer of a signature-less endpoint security platform, uncovered this international cyber-espionage campaign hitting Government institutions, Research Laboratories and critical infrastructure facilities throughout the DACH (Germany, Austria, Switzerland) region.
From the analysis and research work done by CyberTinel, it is believed that the hackers had first penetrated computer networks as far back as 2002 and, according to Elite Cyber Solutions chief executive Jonathan Gad, the damage done to companies since then was "immeasurable".
"The network exploited the UK's relatively tolerant requirements for purchasing SSL security certificates, and established British front companies so they could emulate legitimate web services," said Jonathan Gad, chief executive of distributor Elite Cyber Solutions, Cybertinel's UK partner.
"The German attackers behind the network then had total control over the targeted computers and were able to carry out their espionage undisturbed for many years." He added, "At this point, we are aware of the extent of the network, but the damage to the organisations who have been victims in terms of loss of valuable data, income or the exposure of information related to employees and customers is immeasurable."
The Harkonnen Operation attack was detailed in a special report [pdf] titled, "HARKONNEN OPERATION CYBER-ESPIONAGE," in which the researchers analysed and discovered companies that were compromised by seemingly generic trojans foisted through spear-phishing attacks.
The fact that the malware was installed via spear-phishing attacks from companies that appear legitimate β with the appropriate digital security certificates β gave the cyber criminals even more anonymity, enabling them to hit very secure servers and steal all types of top-secret documents.
The trojans detected in the attacks were GFILTERSVC.exe from the generic trojan family Trojan.win7.generic!.bt and wmdmps32.exe.
It is still unclear that who or what is behind the hack, but researchers believe that the malware campaign seems to be more like an organised crime operation than something a government intelligence agencies would do.
The scammers invested over $150,000 β a kingly sum for hackers β on hundreds of domain names, IP addresses and wildcard certificates to make its UK businesses appear legitimate. and in keeping the operation going.
| 1
|
A Russian computer hacker arrested over the weekend in Barcelona was apparently detained for his role in a massive computer botnet, and not for last year's US presidential election hack as reported by the Russian media.
Peter Yuryevich Levashov, 32-years-old Russian computer programmer, suspected of operating the Kelihos botnet β a global network of over 100,000 infected computers that was used to deliver spam, steal login passwords, and infect computers with ransomware and other types of malware since approximately 2010, the U.S. Justice Department announced Monday.
As suspected earlier, Levashov, also known as Peter Severa, is the same man who has also been listed in the World's Top 10 Worst Spammers maintained by anti-spam group Spamhaus, which has given him the 7th position in the list.
The arrest was made possible after the FBI learned just last month that Levashov was traveling with his family to Spain from his home in Russia, a country without any extradition treaty to the United States.
Initially, it was believed that Levashov was detained on suspicion of 2016 US election hack, after his wife told Russian publication RT that authorities said her husband's apprehension was in part due to his involvement in the U.S. election hacking, including the notorious breach of the Democratic National Committee (DNC).
However, the DoJ press release indicates no link between Levashov and US election hack at all.
Instead, Levashov was linked to the Kelihos botnet by the FBI because he used the same IP address to operate the botnet that he used to access his email and other online accounts in his name, including Apple iCloud and Google Gmail accounts.
According to the indictment unsealed Monday, Levashov operated the botnet since 2010, targeting Microsoft Windows machines for infection. He allegedly used Kelihos to distribute hundreds of millions of spam emails per year, and pump-and-dump stock scams.
Besides conducting spamming operations, prosecutors also alleged Levashov also used the Kelihos botnet to infect end-user computers with malware and harvest passwords to online and bank accounts belonging to thousands of Americans.
"The ability of botnets like Kelihos to be weaponized quickly for vast and varied types of harms is a dangerous and deep threat to all Americans, driving at the core of how we communicate, network, earn a living, and live our everyday lives," said Acting Assistant Attorney General Blanco.
"Our success in disrupting the Kelihos botnet was the result of strong cooperation between private industry experts and law enforcement, and the use of innovative legal and technical tactics."
The FBI officials obtained court orders (Rule 41 of the Federal Rules of Criminal Procedure) to redirect Kelihos-infected PCs to servers operated by authorities β a process known as "Sinkhole attack" β and to block any attempts by the botnet to regain control of those sinkholed computers.
The FBI said it worked with security firm CrowdStrike and Shadowserver Foundation, a volunteer group of information security experts, to deploy the sinkhole attack to disconnect communications between criminals and infected computers.
Levashov has been charged with wire fraud and unauthorized interception of electronic communications. The government is now seeking his extradition to the United States.
| 1
|
Story highlightsAmy Bass: Questions over fairness of figure skating judging at Sochi likely unfoundedBass: Controversy surrounds the event due to odd scoring and a history of shenanigansThe judging lineup this time also is questionable, Bass saysBass: If skating wants a credible scoring system, it should use credible judgesOh, figure skating. Not again. Didn't anyone tell you? The Cold War is over. You are supposed to be reformed.At the Winter Olympics in Sochi, Russia, on Thursday, South Korea's Yuna Kim, a 2010 Olympic gold medalist, skated an ethereally beautiful and outwardly perfect long program in the ladies free skating competition. She then lost gold to Russia's Adelina Sotnikova. Few saw that coming. On paper, Sotnikova had one more triple jump than Kim, including the triple loop, which Kim does not do. Although Sotnikova had an awkward moment on her own double loop, her spins were faster, her jumps higher, and unlike Kim, who looked exhausted at the end of her gorgeous skate, Sotnikova flew across the ice with great speed and then looked like she could do it all again. Amy BassIt should have been a great moment in Olympic sports: champion dethroned by a rising star, an upset, a shocker. Instead, it was controversial water cooler fodder the next day because the results raised so many questions: Did the youngster, a bit rough around the edges, deserve such high marks? Was she really better in just about every element, including her components mark, which was an astonishing 4.81 points higher than at the European championships last month?Setting aside her extreme margin of victory, there are reasons to think the judges got the podium right. Three-time world champion Elvis Stojko, for example, who had always accentuated an aggressive style over artistry, praised the marks, pleased that the judges rewarded Sotnikova's athleticism and degrees of difficulty over Kim's elegance. Figure skating is, after all, a sport.JUST WATCHEDSurprising skating win spurs controversy ReplayMore Videos ...MUST WATCHSurprising skating win spurs controversy 01:13JUST WATCHED2002: Infamous Olympics scoring scandalReplayMore Videos ...MUST WATCH2002: Infamous Olympics scoring scandal 02:13JUST WATCHEDBoitano: Wagner's scores were fairReplayMore Videos ...MUST WATCHBoitano: Wagner's scores were fair 03:04But if it wants to be treated like one, it has to act like one. There is a long history of controversy and scandal that continues to hang over the International Skating Federation, particularly as Russia's first individual female gold medalist (and on home ice, no less) brings familiar echoes of the Cold War. And during the team competition, there were murmurs, to be sure, over Evgeni Plushenko's high marks. It appeared to some that the judges bolstered his score based on his dynamic presence and the sentimental drama of the legendary champion's return to the ice to lead the home team to gold, rather than the difficulty of his program and his execution of it.Further, the sport had changed its scoring system to avoid this very situation. After the controversy that went down in Salt Lake in 2002 over the pairs competition, in which French judge Marie-Reine Le Gougne tearfully confessed she had voted for the Russian pair in order to gain an advantage for the French ice dancers, the ISU revamped its scoring system. Gone were the days of the perfect six. With the new system, too, judges are now anonymous, in hopes of relieving the sport of its former biases. Back in 1994, for example, when Oksana Baiul took gold over Nancy Kerrigan, the scores broke down along familiar lines: Judges from Ukraine, China, eastern Germany, Poland and the Czech Republic went for Baiul. Canada, Japan, the United States and Great Britain put Kerrigan first. Although she skated cleanly, Kerrigan had doubled a triple jump; Baiul, considered the superior artist, did a two-footed landing, and performed no triple-triple combination. Four years later, while an East-West split wasn't apparent in the battle between Tara Lipinski's triple loop-triple loop combination and Michelle Kwan's ability to make judges weep, it remained unclear who favored technique and who performed artistry.While few can say they actually comprehend today's scoring system, it was designed to yield more balanced results supported by more intricate math. But the ISU needs to back these efforts with ethical and responsible judges. For the ladies free program, the panel included Russian Alla Shekhovtseva, who is married to the general director of the Russian skating federation, and Ukrainian Yuri Balkov, who had been suspended for attempting to fix the ice dancing competition in Nagano in 1998. And this after rumors had dogged the ice dancing competition, with accusations that the Russians and the Americans (maybe the Cold War is over!) had colluded to shut out Canada.There is likely little truth to the ice dancing gossip, but the ISU has done nothing to make us think otherwise. If the governing body wants us to talk about figure skating as a sport, it needs to ensure that it behaves like one, with credibility and transparency. Because while the ladies podium may have been right, with scoring this complex and judges this questionable, why on earth would we believe it?Follow us on Twitter @CNNOpinion.Join us on Facebook/CNNOpinion.
| 0
|
Note: We have published a follow-up article with more technical details about this vulnerability which resides in Broadcom WiFi SoC equipped not only in Apple devices, but also in Android devices from various manufacturers.
Less than a week after Apple released iOS 10.3 with over 100 bug fixes and security enhancements; the company has just pushed an emergency patch update β iOS 10.3.1 β to addresses a few critical vulnerabilities, one of which could allow hackers to "execute arbitrary code on the Wi-Fi chip."
The vulnerability, identified as CVE-2017-6975, was discovered by Google's Project Zero staffer Gal Beniamini, who noted on Twitter that more information about the flaw would be provided tomorrow.
Apple also did not provide any technical details on the flaw, but urged Apple iPhone, iPad and iPod Touch users to update their devices as soon a possible.
In the security note accompanying iOS 10.3.1, Apple describes the issue as a stack buffer overflow vulnerability, which the company addressed by improving the input validation.
A stack buffer overflow flaw occurs when the execution stack grows beyond the memory that is reserved for it, allowing hackers to execute malicious code remotely.
The flaw allows an attacker, within range, to execute malicious code on the phone's Wi-Fi chip.
The vulnerability appears to affect iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation, and later devices running the iOS 10.3 operating system.
It's worth mentioning that iPhone 5 and iPhone 5C were Apple's last iPhone handsets to have a 32-bit processor with Apple A6 system on a chip. Since iPhone 5S has a 64-bit processor, it is not affected by the issue.
To know more technical details about the flaw, you are required to wait until tomorrow when Beniamini will release a detailed blog post describing the bug and its impact on Apple users.
With iOS 10.3 release, an over-the-air download for 32-bit Apple devices wasn't available. This has also being changed with iOS 10.3.1 update, which brings back support for iPhone 5 and 5C as well as the fourth-generation iPad -- the only remaining 32-bit Apple devices.
The iOS 10.3.1 update can be downloaded over-the-air via Settings β General β Software Update on your iOS device.
Apple users running iOS 10.3 should be able to see the iOS 10.3.1 update, so press on the "Download and Install" button to install the update.
| 1
|
Guess what's more expensive than counterfeit United States passports, stolen credit cards and even guns on the dark web?
It's digital code signing certificates.
A recent study conducted by the Cyber Security Research Institute (CSRI) this week revealed that stolen digital code-signing certificates are readily available for anyone to purchase on the dark web for up to $1,200.
As you may know, digital certificates issued by a trusted certificate authority (CA) are used to cryptographically sign computer applications and software, and are trusted by your computer for execution of those programs without any warning messages.
However, malware author and hackers who are always in search of advanced techniques to bypass security solutions have been abusing trusted digital certificates during recent years.
Hackers use compromised code signing certificates associated with trusted software vendors in order to sign their malicious code, reducing the possibility of their malware being detected on targeted enterprise networks and consumer devices.
The infamous Stuxnet worm that targeted Iranian nuclear processing facilities in 2003 also used legitimate digital certificates. Also, the recent CCleaner-tainted downloads infection was made possible due to digitally-signed software update.
Stealthy Digitally-Signed Malware Is Increasingly Prevalent
However, separate research conducted by a team of security researchers have found that digitally signed malware has become much more common than previously thought.
The trio researchersβDoowon Kim, BumJun Kwon and Tudor Dumitras from the University of Maryland, College Parkβsaid they found a total of 325 signed malware samples, of which 189 (58.2%) carried valid digital signatures while 136 carry malformed digital signatures.
"Such malformed signatures are useful for an adversary: we find that simply copying an Authenticode signature from a legitimate sample to an unsigned malware sample may help the malware bypass AV detection," the researchers said.
Those 189 malware samples signed correctly were generated using 111 compromised unique certificates issued by recognized CAs and used to sign legitimate software.
At the time of writing, 27 of these compromised certificates had been revoked, although malware signed by one of the remaining 84 certificates that were not revoked would still be trusted as long as carry a trusted timestamp.
"A large fraction (88.8%) of malware families rely on a single certificate, which suggests that the abusive certificates are mostly controlled by the malware authors rather than by third parties," the trio said.
The researchers have released a list of the abusive certificates at signedmalware.org.
Revoking Stolen Certificate Doesn't Stop Malware Immediately
Even when a signature is not valid, the researchers found that at least 34 anti-virus products failed to check the certificate's validity, eventually allowing malicious code to run on the targeted system.
The researchers also conducted an experiment to determine if malformed signatures can affect the anti-virus detections. To demonstrate this, they downloaded 5 random unsigned ransomware samples that almost all anti-virus programs detected as malicious.
The trio then took two expired certificates that previously had been used to sign both legitimate software and in-the-wild malware and used them to sign each of the five ransomware samples.
Top Antivirus Fail to Detect Malware Signed With Stolen Certificates
When analysing the resulting ten new samples, the researchers found that many anti-virus products failed to detect the malware as malicious.
The top three anti-virus productsβnProtect, Tencent, and Paloaltoβdetected unsigned ransomware samples as malware, but considered eight of out ten crafted samples as benign.
Even popular anti-virus engines from Kaspersky Labs, Microsoft, TrendMicro, Symantec, and Commodo, failed to detect some of the known malicious samples.
Other affected anti-virus packages included CrowdStrike, Fortinet, Avira, Malwarebytes, SentinelOne, Sophos, TrendMicro and Qihoo, among others.
"We believe that this [inability in detecting malware samples] is due to the fact that AVs take digital signatures into account when filter and prioritize the list of files to scan, in order to reduce the overhead imposed on the user's host," the researchers said.
"However, the incorrect implementation of Authenticode signature checks in many AVs gives malware authors the opportunity to evade detection with a simple and inexpensive method."
The researchers said they reported this issue to the affected antivirus companies, and one of them had confirmed that their product fails to check the signatures correctly and they had planned to fix the issue.
The researchers presented their findings at the Computer and Communications Security (CCS) conference in Dallas on Wednesday.
For more detailed information on the research, you can head on to their research paper [PDF] titled "Certified Malware: Measuring Breaches of Trust in the Windows Code-Signing PKI."
| 1
|
(CNN)Pro Football Hall of Famer and former Washington and New York Giants linebacker Sam Huff died Saturday, Washington Football Team owner Daniel Snyder said in a statement. Huff was 87."Anyone who knew Sam knew what an amazing person he was," Washington owners Daniel and Tanya Snyder said in a statement on the team's Twitter account. "He was an iconic player and broadcaster for the franchise for over 40 years and was a great friend to our family."Huff made five Pro Bowls over a 13-year career, won an NFL title with the New York Giants in 1956 and was elected to the Pro Football Hall of Fame in 1982."He represented the franchise with honor and respect on the field and in the booth and was beloved by our fans. Tanya and I would like to extend our deepest condolences to all of Sam's family and friends during this time," the owners' statement added.Read MoreNew York Giants team president John Mara also paid tribute to the former player, calling Huff "one of the greatest Giants of all time.""He was the heart and soul of our defense in his era," Mara wrote in a statement posted on Twitter. "He almost single-handedly influenced the first chants of 'Defense, Defense' in Yankee Stadium."
| 0
|
A number of Israel's government offices have fallen victim to a cyber attack over the past week, one apparently aimed at slipping a "Trojan horse" into the computer servers at these ministries.
Israeli police immediately pulled the national computer network from the civilian Internet after this cyber threat . A Trojan horse has been sent as files attached to emails bearing the name of the IDF Chief of Staff Benny Gantz in the subject line.
According to the reports from haaretz,A senior government clerk stressed that the threat facing the police was being investigated by experts. It is also not clear that either breach involved a wide-scale cyber-attack, or a virus infecting only a few computers.
Government employees were advised not to open their emails or Facebook messages if such strange activity was noticed. Dozens of identical emails were sent Wednesday to Israel embassies abroad and to Foreign Ministry employees in Israel.
The intelligence tip did not indicate the culprit behind the attack, but it appeared to be an external organization. The police are still trying to identify the source.
| 1
|
Story highlightsCaroline Wozniacki beats Ana Ivanovic 6-3 7-5 in Dubai Open quarterfinalsBoth players have been former world number one ranked Agnieszka Radwanska thrashes Sabine Lisicki in their quarterfinal Jelena Jankovic beats Sam Stosur to reach the semifinalsCaroline Wozniacki beat Ana Ivanovic in a battle of former world number one ranked players to reach the semifinals of the $2 million WTA tournament in Dubai Thursday.The Dane, who lost the top spot during the Australian Open earlier this year, won an entertaining encounter 6-3 7-5 in one hour 33 minutes.Former French Open champion Ivanovic threatened a comeback when she twice retrieved deficits in a thrilling second set, but Wozniacki achieved her sixth break of service to lead 6-5 and serve for the match.Ivanovic saved one match point but hit a return long on the second to leave defending champion Wozniacki on course to defend her title.Her semifinal will be against Julia Goerges, the improving German, who beat Slovakian star Daniela Hantuchova 4-6 6-3 6-4 in their last eight matchThe unseeded Goerges has beaten Wozniacki the last two times they have met, both on clay.Wozniacki is the highest ranked player left in the tournament after the withdrawals of Victoria Azarenka and Petra Kvitova through injury.Earlier, Agnieszka Radwanska of Poland reached her second semifinal in two weeks by thrashing German Sabine Lisicki 6-2 6-1.The fifth seed will play in-form Jelena Jankovic in their last four clash Friday.Jankovic, also a former world number one, upset fourth seed and reigning U.S. Open champion Samantha Stosur 6-4 6-2 to reach her fifth Dubai semifinal since 2005.
| 0
|
Web infrastructure and website security company Cloudflare on Thursday disclosed that it mitigated the largest ever volumetric distributed denial of service (DDoS) attack recorded to date.
The attack, launched via a Mirai botnet, is said to have targeted an unnamed customer in the financial industry last month. "Within seconds, the botnet bombarded the Cloudflare edge with over 330 million attack requests," the company noted, at one point reaching a record high of 17.2 million requests-per-second (rps), making it three times bigger than previously reported HTTP DDoS attacks.
Volumetric DDoS attacks are designed to target a specific network with an intention to overwhelm its bandwidth capacity and often utilize reflective amplification techniques to scale their attack and cause as much operational disruption as possible.
They also typically originate from a network of malware-infected systems β consisting of computers, servers, and IoT devices β enabling threat actors to seize control and co-opt the machines into a botnet capable of generating an influx of junk traffic directed against the victim.
In this specific incident, the traffic originated from more than 20,000 bots in 125 countries worldwide, with almost 15% of the attack originating from Indonesia, followed by India, Brazil, Vietnam, and Ukraine. What's more, the 17.2 million rps alone accounted for 68% of the average rps rate of legitimate HTTP traffic processed by Cloudflare in Q2 2021, which is at 25 million HTTP rps.
This is far from the first time similar attacks have been detected in recent weeks. Cloudflare noted that the same Mirai botnet was used to strike a hosting provider with an HTTP DDoS attack that peaked a little below 8 million rps.
Separately, a Mirai-variant botnet was observed launching over a dozen UDP and TCP-based DDoS attacks that peaked multiple times above 1 Tbps. The company said the unsuccessful attacks were aimed at a gaming company and a major Asia Pacific-based internet services, telecommunications, and hosting provider.
"While the majority of attacks are small and short, we continue to see these types of volumetric attacks emerging more often," Cloudflare said. "It's important to note that these volumetric short burst attacks can be especially dangerous for legacy DDoS protection systems or organizations without active, always-on cloud-based protection."
| 1
|
Kaspersky Lab has identified another Chinese APT campaign, dubbed 'Icefog', who targeted Governmental institutions, Military contractors, maritime / shipbuilding groups, telecom operators, industrial and high technology companies and mass media.
The Hacking group behind the attack who carry out surgical hit and run operations, is an advanced persistent threat (APT) group, used a backdoor dubbed Icefog that worked across Windows and Mac OS X to gain access to systems.
"The Mac OS X backdoor currently remains largely undetected by security solutions and has managed to infect several hundred victims worldwide," the report (PDF) said.
This China-based campaign is almost two years old and follows the pattern of similar APT-style attacks where victims are compromised via a malicious attachment in a spear-phishing email, or are lured to a compromised website and infected with malware.
The attackers embed exploits for several known vulnerabilities (CVE-2012-1856 and CVE-2012-0158) into Microsoft Word and Excel documents.
Once a computer has been compromised, the hackers upload malicious tools and backdoors. They look for email account credentials, sensitive documents and passwords to other systems.
"We observed many victims in several other countries, including Taiwan, Hong Kong, China, USA, Australia, Canada, UK, Italy, Germany, Austria, Singapore, Belarus and Malaysia," the research team said.
There is no concrete evidence to confirm this was a nation-state sponsored operation, but based on where the stolen data were transferred to, Kaspersky wrote the attackers are assumed to be in China, South Korea and Japan.
In total, Kaspersky Lab observed more than 4,000 uniquely infected IPs and several hundred victims. They are now in contact with the targeted organizations as well as government entities in order to help them identify and eradicate the infections.
| 1
|
Another day, another significant data breach.
This time the victim is Reddit... seems someone is really pissed off with Reddit's account ban policy or bias moderators.
Reddit social media network today announced that it suffered a security breach in June that exposed some of its users' data, including their current email addresses and an old 2007 database backup containing usernames and hashed passwords.
According to Reddit, the unknown hacker(s) managed to gain read-only access to some of its systems that contained its users' backup data, source code, internal logs, and other files.
In a post published to the platform Wednesday, Reddit Chief Technology Officer Christopher Slowe admitted that the hack was a serious one, but assured its users that the hackers did not gain access to Reddit systems.
"[The attackers] were not able to alter Reddit information, and we have taken steps since the event to further lock down and rotate all production secrets and API keys, and to enhance our logging and monitoring systems," Slowe wrote.
According to Slowe, the most significant data contained in the backup was account credentials (usernames and their corresponding salted and hashed passwords), email addresses and all content including private messages.
Attacker Bypassed SMS-based Two-Factor Authentication
Reddit learned about the data breach on June 19 and said that the attacker compromised a few of the Reddit employees' accounts with its cloud and source code hosting providers between June 14 and June 18.
The hack was accomplished by intercepting SMS messages that were meant to reach Reddit employees with one-time passcodes, eventually circumventing the two-factor authentication (2FA) Reddit had in place attacks.
The security breach should be a wake-up call to those who still rely on SMS-based authentication and believes it is secure. It's time for you to move on from this method and switch to other non-SMS-based two-factor authentication.
Reddit is also encouraging users to move to token-based two-factor authentication, which involves your mobile phone generating a unique one-time passcode over an app.
Reddit said that users can follow a few steps mentioned on the breach announcement page to check if their accounts were involved.
Moreover, Reddit will reset passwords for users who may have had their login credentials stolen in the breach, and also directly notify all affected users with tips on how they can protect themselves.
| 1
|
(CNN)Formula One world champion Lewis Hamilton secured his first victory of the season as he capitalized on Ferrari driver Charles Leclerc's loss of power in the closing stages of the Bahrain Grand Prix."Oh my God," exclaimed Leclerc, who had led for most of the race, as he realized his engine problems would cost him the chance of claiming his maiden grand prix success.Hamilton claimed the win under the safety car ahead of Mercedes teammate Valterri Bottas, who won the season-opener in Australia, with Leclerc taking third.Bottas leads the drivers' standing with 44 points, one point ahead of Hamilton, with Verstappen in third on 27 points.Leclerc had led for most of the race."I had a plastic bag stuck on my front wing at some point, which was costing performance," the championship leader revealed after the race.Read More"So not the perfect race but in the end, luck was on our side and we'll definitely take it -- especially me, after all the bad luck last year. "Obviously hard luck for Charles, he was very strong -- but it will come for him. I had to wait for more than 80 races for my first win, so I'm sure it's going to be okay."READ: Leclerc's brother to test drive with Formula EHamilton praises LeclercLeclerc, who started the race in pole, was hit by engine problems when his car's hybrid system failed. He'd been eight seconds ahead of Hamilton at one stage, but the Briton quickly closed as Leclerc's Ferrari faltered before sweeping past the 21-year-old Monegasque's Ferrari.It was a sign of the youngster's maturity to acknowledge the team being "lucky in a very unlucky situation," recognizing that he would have finished even lower down the grid had the race not ended under the safety car for just the eighth time in F1 history."It happens," Leclerc told reporters after the race. "It's part of motor sport. It's a very hard one to take, but I am sure we will come back stronger."Unfortunately today it was not our day, but I am confident. The team has done an amazing job to recover the lack of pace we had in Australia."What to say? Of course I'm extremely disappointed, like the whole team, but it happens in the seasons."The good news for Leclerc is that he took his first podium finish in F1, while also scoring a point for recording the fastest lap. At the moment he's also looking the more effective Ferrari driver. READ: Jackie Stewart's wife has dementia and he's racing to find a cureFour-time champion Sebastian Vettel damaged the front wing of his Ferrari as he went wheel-to-wheel with Hamilton."You drove brilliantly, really great, this weekend -- you have a long future ahead," Hamilton told Leclerc. "This weekend the Ferraris have been incredible and I just had to see Charles because he did such a great job. "I'm sure this is a devastating result for him as he had done the job to win the race. We were definitely lucky today but you have to take it as it comes. "This guy here [Leclerc] has lots more wins coming in the future so congratulations to him.""As a team, we got lucky today," added Bottas.
| 0
|
500 million accounts β that's half a Billion users!
That's how many Yahoo accounts were compromised in a massive data breach dating back to 2014 by what was believed to be a "state sponsored" hacking group.
Over a month ago, a hacker was found to be selling login information related to 200 million Yahoo accounts on the Dark Web, although Yahoo acknowledged that the breach was much worse than initially expected.
"A recent investigation by Yahoo! Inc. has confirmed that a copy of certain user account information was stolen from the company's network in late 2014 by what it believes is a state-sponsored actor," reads the statement.
Yahoo is investigating the breach with law enforcement agency and currently believes that users' names, email addresses, dates of birth, phone numbers, passwords, and in some cases, encrypted and unencrypted security questions-answers were stolen from millions of Yahoo users.
However, the company does not believe the stolen information includes credit card information or any bank details of the affected users.
Yahoo has been criticized for its slow response to the data breach, but it is now in the process of notifying affected customers via emails and asking them to change their passwords, as well as security questions.
At this moment Yahoo did not provide any evidence on why it believed the breach was work of state-sponsored hackers.
Despite millions of people affected by the breach, the biggest victim here seems to be Yahoo itself.
The data breach reports come just as the company is trying to negotiate a deal to sell itself to Verizon for $4.8 Billion. So, if the breach reports negatively impact its share price, even for the time being, it could cost the company and its shareholders a slice of its buyout value.
Over past few months, a large number of data breaches have been reported to plague companies like LinkedIn, MySpace, Tumblr, and VK.com as hackers put up for sale massive data dumps of user credentials stolen earlier in the decade.
Change your Password and Use Password Manager
Needless to say, users should immediately change their Yahoo account password. The company will also be prompting anyone who hasn't changed their password since 2014 to do so now.
"Additionally, Yahoo asks users to consider using Yahoo Account Key, a simple authentication tool that eliminates the need to use a password altogether," Yahoo suggests.
Also make sure that you also change your passwords on other online accounts if they use the same password, and enable two-factor authentication for online accounts immediately.
And once again, a strong recommendation: Don't reuse passwords.
If you are unable to remember different passwords for each site, you can adopt a good password manager that allows you to create complex passwords for various sites as well as remember them for you.
We have recently listed some best password managers that could help you understand the importance of password managers and help you choose a suitable one, according to your requirement.
| 1
|
(CNN)Real Madrid moved eight points clear at the top of La Liga after a 2-0 victory against Real Sociedad on Saturday. Vinicius Jr. opened the scoring in the second half when he interchanged passes with Luka Jovic, before Jovic got the second 10 minutes later with a header from a corner. It was Real Madrid's 12th win in the league so far this season, opening up a commanding lead at the top of La Liga, and the team's eighth in a row at the Reale Arena. "This is a tough place to come to and they're a strong side," said manager Carlo Ancelotti. "We played well and deserved the win after what was a strong all-round performance. "We've got that lead at the top because we're playing well, are showing ourselves to be a solid side and are getting that consistency in our results."Read MoreAfter a flying start to the season, Real Sociedad has now won once in its past five games and is fifth in the table. The only disappointment for Real Madrid was seeing striker Karim Benzema forced off with an injury in the first half. Ancelotti later said that Benzema is unlikely to be available for the Champions League game against Inter Milan on Tuesday, but could be able to play next weekend. Vinicius Jr (center) celebrates his goal against Real Sociedad. Elsewhere in La Liga, Real Madrid's rival AtlΓ©tico was beaten 2-1 by Mallorca, which came from behind to win with two goals in the last 10 minutes. Matheus Cunha bundled in the game's opening goal in the second half, but Mallorca hit back through a header from Franco Russo and a calm finish from Take Kubo.Meanwhile, Xavi's unbeaten start as Barcelona coach came to an end with a 1-0 loss against Real Betis. Barcelona had won two league games since Xavi's arrival, but Juanmi's goal late in the second half means Real Betis moves up to third in the table and Barcelona remains seventh. Controversial Der KlassikerIn the Bundesliga, Bayern Munich beat Borussia Dortmund 3-2 in an eventful and controversial Der Klassiker to move four points ahead at the top of the table. Julian Brandt gave Dortmund an early lead, but his opener was quickly canceled out by Robert Lewandowski following pressure from Thomas MΓΌller. An entertaining first half then drew to a close with Kingsley Coman giving Bayern the lead after Dortmund failed to clear the ball from the box. However, the lead was short-lived as Erling Haaland equalized at the start of the second half with a brilliant, curling shot, and soon after Dortmund had an appeal for a penalty turned down when Marco Reus was brought down by a challenge from Lucas HernΓ‘ndez.Then 20 minutes later, Bayern was awarded a penalty -- which Lewandowski converted -- after a handball decision against Mats Hummels. Lewandowski scored twice for Bayern Munich. ''We saw a great game, a real top game," said Dortmund manager Marco Rose, who was red carded after venting his anger when the decisive penalty was given against his side. "I think that the Mats Hummels handball, where he doesn't even see the ball, is a debatable penalty. It's a shame that the game was decided like that. It deserved a different outcome."Dortmund's Emre Can was also frustrated by refereeing decisions, saying: "In the end, a penalty decides the game. That's a pity because we should have had a penalty as well. In our situation, he doesn't look at the scene again. I can't understand that."Visit CNN.com/sport for more news, videos and featuresWhile Bayern and Real Madrid both extended their top-of-the-table leads, Chelsea's 3-2 defeat against West Ham saw Thomas Tuchel's side leapfrogged by Manchester City and Liverpool in the Premier League.City moved top after a 3-1 victory against Watford, and Liverpool moved up to second after a late Divock Origi goal secured a 1-0 win against Wolves. It was a similar story in Serie A as Napoli's 3-2 defeat against Atalanta allowed AC Milan to go first in the league with a 2-0 victory over Salernitana, while Inter Milan moved second with a 3-0 win against Roma.
| 0
|
Smart Devices are growing at an exponential rate and so are the threats to them.
After your Computers, Servers, Routers, Mobiles and Tablets, now hackers are targeting your Smart TVs, warns Eugene Kaspersky the co-founder and chief executive of Kaspersky Lab.
As the increase in the manufactures of Smart TVs by different companies, it could be estimated that by 2016, over 100 million TVs are expected to be connected to the Internet and in the time it may rise as a profitable fruit for the malware authors and cyber criminals to exploit these devices.
The 48 year-old Eugene Kaspersky, one of the world's top technology security experts, has thrown light on the future of Computer Security and warned that Internet of Things (IoT) such as TVs, Refrigerators, Microwave or dishwashers will necessarily bring undesirable cyber threats to your home environment, because any device connected to the Internet is vulnerable and can be infected.
"The threats will diversify to mobile phones and to the home environment, such as through televisions, which are now connected to the Internet," he said in an interview with the Telegraph.
The Internet of Things is said to be the next evolutionary step in our connected world that has been already become a major target for cyber criminals.
We have reported before that how 100,000 Refrigerators and other smart household appliances were compromised by hackers to send out 750,000 malicious spam emails; A Linux worm 'Linux.Darlloz' is hijacking Home Routers, Set-top boxes, Security Cameras, printers to mine Crypto Currencies like Bitcoin.
So, the malicious software that already caused damages to your desktops, laptops and targeted your mobile devices till now, is ready to cause harm to your Smart TVs and other Internet connected smart devices.
Kaspersky said his company's global research and development headquarters in Moscow is receiving around 315,000 suspicious activity reports on daily basis, that has doubled over the past year. The threats might crawl to the new sectors other than mobile phones and computer systems.
"There are millions of attacks a year on Microsoft Windows, thousands on mobile phones, mostly on Android, and dozens on Apple's iOS. But more and more engineers are developing software for Android," he said.
But according to him "technically it is possible to infect millions of devices" because all devices are vulnerable and it is very much possible to see cyber criminals developing viruses for iOS devices.
The fact that I really like what he says, "What's the difference been a TV and a computer? A bigger screen and a remote control. It has Android inside and memory chips and Internet connections. That's all." Well said!
He also warned users that as the Internet of Things (IoTs) increases, users need to have top security packages installed on their devices.
"It's just a question of time. We already have a product for mobile and we have a prototype for TV so we are ready to address this issue when new malware for television is released by criminals."
In the last few years, this emerging domain for the Internet of Things has been attracting the significant interest, and will continue for the years to come. It would be a $20 Trillion Market over the next several years, but Security and privacy are the key issues for such applications, and still face some enormous challenges.
| 1
|
Besides collecting metadata and inserting backdoor to the devices and softwares, the US National Security Agency (NSA) has an eye on each post, picture, message you have ever sent on Facebook. I know you won't be feeling free considering your privacy, but, this is what the NSA is doing to you.
The new revelation from the Glenn Greenwald's desk remove the mask from one more secret surveillance operation carried out by the US intelligence agency NSA, the extensive program dubbed as 'TURBINE', according to the classified files provided previously by NSA whistleblower Edward Snowden.
Yes, the NSA, who has been working with its dedicated hacking unit, Tailored Access Operations (TAO) from the past several years on enlarging its caliber to infect devices with spyware and creating its own command-and-control servers to manage millions of infected systems at a time.
The secret documents presented by The Intercept website shows that the NSA with its British counterpart GCHQ are spreading a surveillance malware on computers and networking devices, "implants" that is capable to spam out millions of pieces of sophisticated malware at a time, that has been successively deployed over 50,000 Computer Network Exploitation (CNE) around the world and their number was expected to reach 85,000 by the end of 2013.
CHALLENGE FOR NSA - One presentation from 2009, marked top secret explained that the agency was dealing with a great challenge for an active SIGINT/attack is 'scale', and infecting a huge number of machines and casting a wide net for data collection, the Human drivers limit the ability for large-scale exploitation, because humans tend to operate within their own environment, not taking into account the bigger picture.
PROJECT TURBINE, THE NSA's SOLUTION - "Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process," wrote the journalist.
So, Rather than limit such actions to human operatives, an automated system that was capable of managing malware implants is codenamed TURBINE in the revealed document, which was designed to allow the current implant network to scale to large size, i.e., millions of implants, this would be possible by creating a system that does automated control implants by groups instead of individual.
NSA TARGETED FACEBOOK - The NSA allegedly used a 'man-on-the-side' attack to target and infect millions of computers. The NSA also used "man-in-the-middle" attack to spread the malware, rather than relying on old tactics like Spamming links via emails.
The agency disguises itself as a fake Facebook server and trick unsuspecting users to log in thinking they were connecting to real Facebook's server. So that the NSA could hack into users' systems and covertly stole out data from its hard drive.
"In some cases the NSA has masqueraded as a fake Facebook server, using the social media site as a launching pad to infect a target's computer and exfiltrate files from a hard drive. In others, it has sent out spam emails laced with the malware, which can be tailored to covertly record audio from a computer's microphone and take snapshots with its webcam. The hacking systems have also enabled the NSA to launch cyber attacks by corrupting and disrupting file downloads, or denying access to websites."
MALWARE PLUGIN: NSA has also developed multiple plug-ins or add-ons for their malware:
UNITEDRAKE - capable to gain complete control of an infected computer.
CAPTIVATEDAUDIENCE- can hack computer's microphone to record conversations taking place near the device.
GUMFISH - can covertly take over a computer's web cam and snap photographs.
FOGGYBOTTOM - records logs of Internet browsing histories and collects login details and passwords used to access websites and email accounts.
GROK - a Keylogger Trojan, that logs keystrokes.
SALVAGERABBIT - to access data on removable flash drives that connect to an infected computer.
"It is unclear how many of the implants are being deployed on an annual basis or which variants of them are currently active in computer systems across the world." Glenn Greenwald said.
I HUNT SYS ADMINS, NOT TERRORISTS: According to the documents, an internal post titled as "I hunt sys admins", makes it very clear that, terrorists are not the primary target of the NSA and this could be in the context of the attacks such as - Belgacom hacks, where GCHQ (Government Communications Headquarters) duped those Belgian based telecoms workers with bogus LinkedIn pages that infected their computers.
For much more technical detail, check out Greenwald's full report at First Look's The Intercept.
| 1
|
The views expressed in this commentary are solely those of the writers. CNN is showcasing the work of The Conversation, a collaboration between journalists and academics to provide news analysis and commentary. The content is produced solely by The Conversation. (The Conversation)An Asian water dragon hatched from an egg at the Smithsonian National Zoo, and her keepers were shocked. Why? Her mother had never been with a male water dragon. Through genetic testing, zoo scientists discovered the newly hatched female, born on Aug. 24, 2016, had been produced through a reproductive mode called parthenogenesis.Parthenogenesis is a Greek word meaning "virgin creation," but specifically refers to female asexual reproduction. While many people may assume this behavior is the domain of science fiction or religious texts, parthenogenesis is surprisingly common throughout the tree of life and is found in a variety of organisms, including plants, insects, fish, reptiles and even birds. Because mammals, including human beings, require certain genes to come from sperm, mammals are incapable of parthenogenesis.READ MORE: The link between fertility and longevity -- new researchCreating offspring without spermSexual reproduction involves a female and a male, each contributing genetic material in the form of eggs or sperm, to create a unique offspring. The vast majority of animal species reproduce sexually, but females of some species are able to produce eggs containing all the genetic material required for reproduction.Read MoreFemales of these species, which include some wasps, crustaceans and lizards, reproduce only through parthenogenesis and are called obligate parthenogens.A larger number of species experience spontaneous parthenogenesis, best documented in animals kept in zoo settings, like the Asian water dragon at the National Zoo or a blacktip shark at the Virginia Aquarium. Spontaneous parthenogens typically reproduce sexually, but may have occasional cycles that produce developmentally ready eggs.READ MORE: Scientist at work: Endangered ocelots and their genetic diversity may benefit from artificial inseminationScientists have learned spontaneous parthenogenesis may be a heritable trait, meaning females that suddenly experience parthenogenesis might be more likely to have daughters that can do the same.How can females fertilize their own eggs?For parthenogenesis to happen, a chain of cellular events must successfully unfold. First, females must be able to create egg cells (oogenesis) without stimulation from sperm or mating. Second, the eggs produced by females need to begin to develop on their own, forming an early stage embryo. Finally, the eggs must successfully hatch.Each step of this process can easily fail, particularly step two, which requires the chromosomes of DNA inside the egg to double, ensuring a full complement of genes for the developing offspring. Alternatively, the egg can be "faux fertilized" by leftover cells from the egg production process known as polar bodies. Whichever method kicks off the development of the embryo will ultimately determine the level of genetic similarity between the mother and her offspring.The events that trigger parthenogenesis are not fully understood, but appear to include environmental change. In species that are capable of both sexual reproduction and parthenogenesis, such as aphids, stressors like crowding and predation may cause females to switch from parthenogenesis to sexual reproduction, but not the other way around. In at least one type of freshwater plankton, high salinity appears to cause the switch.Advantages of self-reproductionThough spontaneous parthenogenesis appears to be rare, it does provide some benefits to the female who can achieve it. In some cases, it can allow females to generate their own mating partners.The sex of parthenogenetic offspring is determined by the same method sex is determined in the species itself. For organisms where sex is determined by chromosomes, like the XX female and XY male chromosomes in some insects, fish and reptiles, a parthenogenetic female can produce offspring only with the sex chromosomes she has at hand -- which means she will always produce XX female offspring. But for organisms where females have ZW sex chromosomes (such as in snakes and birds), all living offspring produced will either be ZZ, and therefore male, or much more rarely, WW, and female.READ MORE: We discovered why giant pandas are black and white: here's howBetween 1997 and 1999, a checkered gartersnake kept at the Phoenix Zoo gave birth to two male offspring that ultimately survived to adulthood. If a female mated with her parthenogenetically produced son, it would constitute inbreeding. While inbreeding can result in a host of genetic problems, from an evolutionary perspective it's better than having no offspring at all. The ability of females to produce male offspring through parthenogenesis also suggests that asexual reproduction in nature may be more common than scientists ever realized before.Biologists have observed, over long periods of time, that species that are obligate parthenogens frequently die out from disease, parasitism or changes in habitat. The inbreeding inherent in parthenogenetic species appears to contribute to their short evolutionary timelines.
Current research on parthenogenesis seeks to understand why some species are capable of both sex and parthenogenesis, and whether occasional sexual reproduction might be enough for a species to survive.Mercedes Burns is an assistant professor of biological sciences at the University of Maryland in Baltimore County. Burns has previously received funding from the National Science Foundation.Republished under a Creative Commons license from The Conversation.
| 0
|
Apple has just released a pair of software updates for its Safari web browser addressing multiple Webkit vulnerabilities in Mac OS X, providing its users with 21 security patches.
The critical bug resides in the Safari 7.0.4 for Mac OS X Mavericks 10.9.3 and Safari 6.1.4 for OS X Lion 10.7.5, OS X Lion Server 10.7.5 and Mountain Lion 10.8.5.
According to Apple's security advisory, All of the 21 security flaws address the iOS browser vulnerabilities proliferating through the Safari's open-source Webkit rendering engine. This webkit vulnerability allows a malicious website to execute an arbitrary code on the host computer or unexpected termination of an application in an effort to compromise users' confidential information.
"Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution," Apple warned in the advisory.
Security updates tackle a number of flaws including:
CVE-2013-2875
CVE-2013-2927
CVE-2014-1323
CVE-2014-1324
CVE-2014-1326
CVE-2014-1327
CVE-2014-1329
CVE-2014-1330
CVE-2014-1331
CVE-2014-1333
CVE-2014-1334
CVE-2014-1335
CVE-2014-1336
CVE-2014-1337
CVE-2014-1338
CVE-2014-1339
CVE-2014-1341
CVE-2014-1342
CVE-2014-1343
CVE-2014-1344
CVE-2014-1731
Most of the vulnerabilities are found by the Apple together with a lot of help from Google Chrome Team of researchers.
This security issues have been attributed to various forms of memory corruption-related issues within the Safari's Webkit rendering engine and has been patched in the current Safari updates through improved memory handling.
Yet another security issue with Safari's WebKit is the handling of unicode characters in URLs. The issue has been addressed through improved encoding and decoding. If the critical security vulnerabilities remain unaddressable, it could allow a maliciously crafted URL to send out false postMessage anonymously to the recipient, thus controlling the receiver's origin check.
"A malicious site [could] send messages to a connected frame or window in a way that might circumvent the receiver's origin check," the site stated.
Apple is more concerned about the security of its users and protects its users' privacy, so it didn't disclosed or confirmed any of the security flaws until it thoroughly investigated and identified the vulnerabilities along with the release of necessary patches.
"For the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. To learn more about Apple Product Security, see the Apple Product Security website," reads the advisory.
The released patches are important to update and if not, could leave your system exposed to arbitrary code execution attacks, whereby giving the remote access of the system to an unauthorised third party. So, the users are advised to install the new updates via Mac OS X Software Update feature or manually download the installer from Apple Support website.
| 1
|
(CNN)Football stars from around the world continue to unite in the fight against the coronavirus, with Portugal's national team the latest to give up a portion of its earnings.The players have given up half of their bonuses for qualifying for Euro 2020 and will reportedly put the money towards helping non-professional teams across the country avoid going bust during the Covid-19 lockdown.Speaking to B/R Football on Instagram live, midfielder Bernardo Silva revealed that it was Cristiano Ronaldo who urged the rest of the squad via the team WhatsApp group to make the donation."He was the one two or three days ago that gave us the idea to donate our bonus," Silva told B/R Football."We qualified to the 2020 Euros, which now is in 2021, and he gave us the idea: 'Guys, let's donate part of our bonus,' so our national team players donated 50% of our qualifying bonus."Read MoreRonaldo has reportedly already given β¬1 million ($1.1 million) to help fight coronavirus in his home country, dividing the money between two hospitals in Lisbon and Porto.READ: Cristiano Ronaldo and Juventus squad give up $100 million in wages amid coronavirus outbreakREAD: Cristiano Ronaldo and Lionel Messi donate to hospitals in fight against coronavirusJUST WATCHEDIn Belarus, sport goes on as normalReplayMore Videos ...MUST WATCHIn Belarus, sport goes on as normal 01:35The money will fund two intensive care units for Lisbon's Hospital de Santa Maria, which can cater for up to 20 patients at one time and will be named after Ronaldo and his agent Jorge Mendes.In Porto, the Santo Antonio hospital will have one ward with 15 intensive care beds, fully equipped with fans, monitors and other equipment.Portugal has more than 17,400 confirmed cases of Covid-19 and has recorded 567 deaths.Ronaldo and his Juventus teammates, along with first team coach Maurizio Sarri, agreed last month to give up four months' wages to help the club manage the economic impact of the coronavirus pandemic.Juventus said the agreement -- equal to the monthly payments for March, April, May and June -- will save the club a total of β¬90 million ($100.5 million).
| 0
|
A security researcher has discovered yet another cryptocurrency-stealing malware on the official Google Play Store that was designed to secretly steal bitcoin and cryptocurrency from unwitting users.
The malware, described as a "Clipper," masqueraded as a legitimate cryptocurrency app and worked by replacing cryptocurrency wallet addresses copied into the Android clipboard with one belonging to attackers, ESET researcher Lukas Stefanko explained in a blog post.
Since cryptocurrency wallet addresses are made up of long strings of characters for security reasons, users usually prefer copying and pasting the wallet addresses using the clipboard over typing them out.
The newly discovered clipper malware, dubbed Android/Clipper.C by ESET, took advantage of this behavior to steal users cryptocurrency.
To do this, attackers first tricked users into installing the malicious app that impersonated a legitimate cryptocurrency service called MetaMask, claiming to let users run Ethereum decentralized apps in their web browsers without having to run a full Ethereum node.
Officially, the legitimate version of MetaMask is only available as a web browser extension for Chrome, Firefox, Opera, or Brave, and is not yet launched on any mobile app stores.
However, Stefanko spotted the malicious MetaMask app on Play Store targeting users who want to use the mobile version of the service by changing their legitimate cryptocurrency wallet address to the hacker's own address via the clipboard.
As a result, users who intended to transfer funds into a cryptocurrency wallet of their choice would instead make a deposit into the attacker's wallet address pasted by the malicious app.
"Several malicious apps have been caught previously on Google Play impersonating MetaMask. However, they merely phished for sensitive information with the goal of accessing the victims' cryptocurrency funds," Stefanko said.
"Android Clipper targeted Bitcoin and Ethereum cryptocurrency addresses when being copied in to clipboard and replaced them with the attacker's wallet address. Once this transaction is sent, it can not be canceled."
Stefanko spotted the malicious MetaMask app, which he believes was the first Android Trojan Clipper to be discovered on Play Store, shortly after its introduction to the app store on February 1.
Google took down the malicious app almost immediately after being notified by the researcher.
While the bitcoin price has been dropped steadily since hitting its all-time high in December 2017, there is no reduction (in fact rise) in the cryptocurrency scandals, thefts, and scams that continue to plague the industry.
Just last week, The Hacker News reported how customers of the largest Canadian bitcoin exchange QuadrigaCX lost $145 million in cryptocurrency after the sudden death of its owner who was the only one with access to the company's cold (offline) storage wallets. However, some users and researchers are suggesting the incident could be an exit scam.
| 1
|
A critical vulnerability discovered in the Chrome and Firefox browser extension of the grammar-checking software Grammarly inadvertently left all 22 million users' accounts, including their personal documents and records, vulnerable to remote hackers.
According to Google Project Zero researcher Tavis Ormandy, who discovered the vulnerability on February 2, the Chrome and Firefox extension of Grammarly exposed authentication tokens to all websites that could be grabbed by remote attackers with just 4 lines of JavaScript code.
In other words, any website a Grammarly user visits could steal his/her authentication tokens, which is enough to login into the user's account and access every "documents, history, logs, and all other data" without permission.
"I'm calling this a high severity bug, because it seems like a pretty severe violation of user expectations," Ormandy said in a vulnerability report. "Users would not expect that visiting a website gives it permission to access documents or data they've typed into other websites."
Ormandy has also provided a proof-of-concept (PoC) exploit, which explains how one can easily trigger this serious bug to steal Grammarly user's access token with just four lines of code.
This high-severity flaw was discovered on Friday and fixed early Monday morning by the Grammarly team, which, according to the researcher, is "a really impressive response time" for addressing such bugs.
Security updates are now available for both Chrome and Firefox browser extensions, which should get automatically updated without requiring any action by Grammarly users.
A Grammarly spokesperson also told in an email that the company has no evidence of users being compromised by this vulnerability.
"Grammarly resolved a security bug reported by Google's Project Zero security researcher, Tavis Ormandy, within hours of its discovery. At this time, Grammarly has no evidence that any user information was compromised by this issue," the spokesperson said.
"We're continuing to monitor actively for any unusual activity. The security issue potentially affected text saved in the Grammarly Editor. This bug did not affect the Grammarly Keyboard, the Grammarly Microsoft Office add-in, or any text typed on websites while using the Grammarly browser extension. The bug is fixed, and there is no action required by Grammarly users."
Stay tuned for more updates.
| 1
|
Story highlightsMartin Kaymer posts his first victory of 2012 in his final event of the seasonGerman wins $1.25 million first prize at Nedbank Challenge in South AfricaFellow Ryder Cup winner Graeme McDowell wins $1.2 million at World ChallengeMcDowell upstages host Tiger Woods to claim his first win since 2010Martin Kaymer and Graeme McDowell tasted team success at September's Ryder Cup, but the former major winners have had to wait a long time for individual glory this year.That ended on Sunday as former world No. 1 Kaymer clinched his first tournament win since November 2011 and McDowell posted his first victory since 2010 in another exhibition tournament."I'm very happy to finally win this year, that was the most important thing for me because I was practicing very hard," Kaymer said after landing the $1.25 million first prize at the Nedbank Challenge in Sun City, South Africa. "I played very well the last few weeks and months, but it just did not happen for me on the golf course."The German finished two shots clear of South Africa's 2011 Masters winner Charl Schwartzel in a 12-man field that also included 2010 British Open champion Louis Oosthuizen and former world No. 1 Lee Westwood. Photos: McIlroy on top of the world Photos: McIlroy on top of the worldIcing on the cake β Rory McIlroy capped a sensational year with victory at the Dubai World Championship on Sunday. The Northern Irishman won five tournaments in 2012, including his second major, topped the money list on both the PGA and European Tours and ended the season as the world's No. 1 player.Hide Caption 1 of 8 Photos: McIlroy on top of the worldStreets ahead β After a solid start to the season McIlroy's year took off with victory at the Honda Classic in March. By holding off a chasing pack that included Tiger Woods and Keegan Bradley, the 23-year-old became world No. 1 for the first time in his career.Hide Caption 2 of 8 Photos: McIlroy on top of the worldMajor success β After a mid-season slump, McIlroy roared back to form with an eight-shot victory at the PGA Championship to seal his second major triumph. It was the biggest winning margin in majors history, as he took the record from Jack Nicklaus -- the game's greatest ever player.Hide Caption 3 of 8 Photos: McIlroy on top of the worldThe real deal β McIlroy was almost unstoppable now as he secured victory at the Deutsche Bank Championship to take the lead in the PGA Tour's Fed Ex Cup -- the finale to their regular season.Hide Caption 4 of 8 Photos: McIlroy on top of the worldCooking on gas β The following week the 23-year-old was in the winner's circle again, this time taking top honors at the BMW Championship. He became the first player to record back to back victories on the PGA Tour since Tiger Woods in 2009.Hide Caption 5 of 8 Photos: McIlroy on top of the worldTaming Tiger β McIlroy's friendship with Tiger Woods blossomed during the 2012 season. The two even took each other on at an exhibition tournament in China in front of a huge crowd. McIlroy won by one shot. Both players reportedly shared $3 million for taking part.Hide Caption 6 of 8 Photos: McIlroy on top of the worldMiracle of Medinah β If McIlroy was on song in the individual stakes, he more than played his part in Europe's stunning comeback to win the Ryder Cup at Medinah in Chicago. McIlroy nearly forfeited his singles match by missing the start due to confusion over time zones, but earned a vital point for his side by beating Keegan Bradley as Europe eventually came back from 10-6 down to win 14 1/2 to 13 1/2.Hide Caption 7 of 8 Photos: McIlroy on top of the worldLucky charm β McIlroy was watched every step of the way in Dubai by his girlfriend -- tennis star Caroline Wozniacki.Hide Caption 8 of 8 Photos: Charlie Beljan's Cinderella story Photos: Charlie Beljan's Cinderella story Cinderella story β American rookie Charlie Beljan wins the Children's Miracle Network Hospitals Classic just two days after being taking to hospital with an elevated heart rate and numbness in his arm.Hide Caption 1 of 5 Photos: Charlie Beljan's Cinderella story Panic attack? β Beljan speaks with emergency medical services staff during his second round at the Magnolia course on Friday.Hide Caption 2 of 5 Photos: Charlie Beljan's Cinderella story Time out β Beljan, who was fighting to keep his PGA Tour playing rights for next season, told his caddy that he thought he was "going to die" after suffering elevated blood pressure and numbness in his arms.Hide Caption 3 of 5 Photos: Charlie Beljan's Cinderella story Hospital treatment β The 28-year-old was taken to hospital following Friday's round, having shot a remarkable eight-under-par 64 to lead the $4.7 million tournament by three shots. Hide Caption 4 of 5 Photos: Charlie Beljan's Cinderella story Playing on β The Arizona native confirmed that he would play in Saturday's third round in Florida despite being advised to rest by doctors.Hide Caption 5 of 5 Photos: Photos: Best of Ryder Cup Photos: Photos: Best of Ryder CupBest of Ryder Cup β Peter Hanson, center, and Francesco Molinari of Europe celebrate their team winning the 39th Ryder Cup on Sunday, September 30, in Medinah, Illinois. Europe produced the greatest comeback in Ryder Cup history to defeat the United States and retain the trophy. See more of the best of CNN's photography.Hide Caption 1 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Nicolas Colsaerts, left, celebrates with fans after Europe beat the United States on Sunday. The biennial competition pits the best pro golfers from the United States against their European counterparts.Hide Caption 2 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β European team captain Jose Maria Olazabal holds the Ryder Cup at the closing ceremonies on Sunday.Hide Caption 3 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Martin Kaymer is mobbed by the European team after he made the winning putt on the 18th green on Sunday to cinch the Ryder Cup.Hide Caption 4 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Martin Kaymer of Europe celebrates making the decisive putt.Hide Caption 5 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Martin Kaymer sets up the final putt on the 18th green.Hide Caption 6 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Rory McIlroy of Europe celebrates after Martin Kaymer sinks his putt on the 18th green Sunday.Hide Caption 7 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Martin Kaymer putts on the final hole Sunday to secure Europe's win.Hide Caption 8 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β A U.S. fan high-fives Team Europe's fans after their Ryder Cup victory on Sunday.Hide Caption 9 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Rory McIlroy of Europe greets Tiger Woods on the 18th green after Europe defeated the United States 14.5 to 13.5 to retain the Ryder Cup.Hide Caption 10 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Europe's Sergio Garcia, left, and Ian Poulter celebrate Sunday.Hide Caption 11 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β A European supporter watches the play during the singles matches on Sunday.Hide Caption 12 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Justin Rose of Europe celebrates a birdie putt on the 18th green to defeat Phil Mickelson on Sunday.Hide Caption 13 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Jason Dufner of the United States, left, shakes hands with Peter Hanson on the 18th green after Dufner defeated Hanson.Hide Caption 14 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Davis Love III waits with some of his team on Sunday at the end of the singles matches.Hide Caption 15 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Ian Poulter of Europe hits a shot from the rough on the 18th hole Sunday.Hide Caption 16 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Europe's Francesco Molinari celebrates with his caddie, Jason Hempleman, on the 18th green Sunday after his match with Tiger Woods.Hide Caption 17 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Tiger Woods waits on a hole during Sunday's singles matches.Hide Caption 18 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Fans reach for a golf ball Sunday on the 17th green.Hide Caption 19 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Steve Stricker of the United States reacts to a missed putt on the 17th green as Martin Kaymer of Europe looks on during Sunday's competition.Hide Caption 20 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Jim Furyk of the United States lines up a putt with his caddie, Mike Cowan, on the 17th green.Hide Caption 21 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Lee Westwood of Europe, left, shakes hands with Matt Kuchar on the 16th green after defeating him Sunday.Hide Caption 22 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Steve Stricker of the United States lines up a putt on the 16th green during a match Sunday against Martin Kaymer of Germany.Hide Caption 23 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Keegan Bradley of the United States plays a bunker shot on the 14th hole on Sunday.Hide Caption 24 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Luke Donald of Europe hits from the drop zone Sunday on the 13th hole.Hide Caption 25 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β A message of support for Team Europe is written in the sky during the Sunday's single matches. The United States started the day with a seemingly insurmountable 10-6 lead.Hide Caption 26 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Graeme McDowell of Europe crosses a bridge during the singles matches on Sunday.Hide Caption 27 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β A U.S. fan watches the matches on Sunday.Hide Caption 28 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Webb Simpson of the United States hits his tee shot on the 13th hole Sunday.Hide Caption 29 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Luke Donald of Europe celebrates after saving bogey Sunday on the 13th green.Hide Caption 30 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Martin Kaymer of Europe plays a bunker shot on the ninth hole Sunday.Hide Caption 31 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Zach Johnson of the United States reacts to a shot on the ninth hole Sunday as Graeme McDowell, right, and his caddie, Ken Comboy, of Europe look on.Hide Caption 32 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β A U.S. team caddie wears patriotic shoes on Sunday.Hide Caption 33 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Ian Poulter of Europe plays a bunker shot Sunday on the fourth hole.Hide Caption 34 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Luke Donald of Europe watches his tee shot on the third hole Sunday.Hide Caption 35 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Fans watch the play on the first tee during the singles matches of the Ryder Cup on Sunday.Hide Caption 36 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Bubba Watson of the United States, left, greets Luke Donald of Europe on the first tee Sunday in Medinah.Hide Caption 37 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Bubba Watson of the United States watches his tee shot on the first hole Sunday.Hide Caption 38 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β A sea of fans crowds around the first tee near the clubhouse Sunday.Hide Caption 39 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Luke Donald of Europe plays a bunker shot on the fifth hole on Sunday.Hide Caption 40 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Tiger Woods of the United States watches from the fairway on the first hole Sunday.Hide Caption 41 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Tim Finchem, from left, Jack Nicklaus and Jeff Sluman watch the action on the first tee Sunday.Hide Caption 42 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Keegan Bradley of the United States hits his tee shot on the first hole Sunday.Hide Caption 43 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Rory McIlroy of Europe lines up a shot with his caddie J.P. Fitzgerald on the third tee on Sunday.Hide Caption 44 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Team USA Assistant Captain Fred Couples stirs up the crowd during play Sunday.Hide Caption 45 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Team Europe's Luke Donald tees off from the first hole Sunday.Hide Caption 46 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Ian Poulter of Europe celebrates after making a birdie on the first hole Sunday.Hide Caption 47 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β European fans cheer at the start of the final day of play at the 39th Ryder Cup on Sunday.Hide Caption 48 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Keegan Bradley rallies U.S. fans on the first tee at the start of the day Sunday.Hide Caption 49 of 144 Photos: Photos: Best of Ryder Cup05 ryder cup 0930 β Team USA fans cheer from the stands Sunday.Hide Caption 50 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Former U.S. President George W. Bush shakes hands with Fred Couples, assistant captain of Team USA on Saturday, September 29.Hide Caption 51 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Bush reaches to shake the hands of spectators at the tournament Saturday.Hide Caption 52 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Tiger Woods of the United States scopes out a putt on the 17th hole during four-ball play Saturday.Hide Caption 53 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Team Europe's Rory McIlroy laments a missed putt on the seventh hole during foursomes on Saturday.Hide Caption 54 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Dustin Johnson of Team USA contemplates his next play on Saturday.Hide Caption 55 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Webb Simpson of the United States waits in the fifth fairway with his caddie Paul Tesori on Saturday.Hide Caption 56 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Team USA's Phil Mickelson, left, and Team Europe's Lee Westwood of England study the fifth green during a morning foursomes match on Saturday.Hide Caption 57 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Ian Poulter of Europe lines up a putt on the 16th green on Saturday.Hide Caption 58 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Tiger Woods of the U.S. hits his tee shot on the first hole Saturday afternoon.Hide Caption 59 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Zach Johnson of American team reacts to a putt on the 12th hole on Saturday.Hide Caption 60 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Webb Simpson of the United States plays a bunker shot on Saturday.Hide Caption 61 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β A crowd gathers at the 17th green on day two of the competition.Hide Caption 62 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Sergio Garcia of Europe hits the second shot on the third hole on Saturday.Hide Caption 63 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β European fans watch the play from a golf cart during day two.Hide Caption 64 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Keegan Bradley of the United States stares down a putt on Saturday.Hide Caption 65 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β A fan of the U.S. golfers watches the action.Hide Caption 66 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Team Europe's Rory McIlroy of Northern Ireland hits out of the eighth hole's tee box on Saturday.Hide Caption 67 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Phil Mickelson of the United States drives with his wife Amy Mickelson on the 16th green.Hide Caption 68 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Ian Poulter of Europe celebrates after holing a putt on the 12th hole Saturday.Hide Caption 69 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Poulter and Justin Rose of Team Europe embrace after winning their match on Saturday.Hide Caption 70 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Two U.S. fans watch the competition on Saturday.Hide Caption 71 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Webb Simpson of the USA waits in the fifth fairway with his caddie Paul Tesori.Hide Caption 72 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β USA fans cheer on the first tee on Saturday.Hide Caption 73 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Golfer Justin Rose of Europe lines up a putt on the first green.Hide Caption 74 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β A fan looks at a map on Saturday.Hide Caption 75 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β American Phil Mickelson watches his tee shot on the fourth hole as Lee Westwood of Europe looks on.Hide Caption 76 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Graeme McDowell of Europe hits his tee shot on the first hole on Saturday.Hide Caption 77 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Bubba Watson of the USA watches his tee shot on the second hole.Hide Caption 78 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Keegan Bradley of the USA reacts after putting on the fifth green on Saturday.Hide Caption 79 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β A message is written in the sky in remembrance of Spanish golf legend Seve Ballesteros, who died of brain cancer last year, during day two of the competition.Hide Caption 80 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Keegan Bradley of the USA hits out of the bunker on the 16th green after defeating Rory McIlroy and Graeme McDowell on Friday, September 28. Hide Caption 81 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Keegan Bradley of the USA urges a putt to drop on the 15th green during the afternoon four-ball matches.Hide Caption 82 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Rory McIlroy of Northern Ireland, right, jumps in the air while speaking with teammate Sergio Garcia of Spain, ssecond left, on the 10th fairway on Friday.Hide Caption 83 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Americans Matt Kuchar and Dustin Johnson were paired in the afternoon four-ball matches on Friday.Hide Caption 84 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Phil Mickelson and Keegan Bradley celebrate on the 17th green with Amy Mickelson and Jillian Stacey after defeating Rory McIlroy and Graeme McDowell 2 and 1 during the afternoon four-ball matches on Friday.Hide Caption 85 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β McIlroy and McDowell, both of Northern Ireland, wait on the first tee on Friday afternoon.Hide Caption 86 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β McIlroy and McDowell walk across a bridge ahead of the gallery on Friday.Hide Caption 87 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β McIlroy reacts with dismay to his shot from the 10th fairway on Friday.Hide Caption 88 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Fans watch the play on the 17th hole on Friday.Hide Caption 89 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Tiger Woods makes birdie on the 16th hole in Friday's afternoon matches.Hide Caption 90 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Peter Hanson of Europe plays a bunker shot on the second hole during the afternoon four-ball matches on Friday.Hide Caption 91 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Tiger Woods of the USA reacts to a poor tee shot on the 15th hole on Friday.Hide Caption 92 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β European fans watch the actiion in flamboyant outfits on Friday.Hide Caption 93 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Phil Mickelson and Keegan Bradley celebrate on the 15th green after defeating Luke Donald and Sergio Garcia during the morning foursome matches on Friday.Hide Caption 94 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Martin Kaymer plays a bunker shot on the third hole during the afternoon four-ball matches on Friday.Hide Caption 95 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β European fans get into the spirit during the afternoon four-ball matches on Friday.Hide Caption 96 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Tiger Woods and Steve Stricker line up a putt during the morning foursome matches on Friday.Hide Caption 97 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Rory McIlroy and Graeme McDowell of Europe get a ruling on their ball on the 18th hole Friday.Hide Caption 98 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Team Europe's Graeme McDowell chips onto the second hole's green Friday.Hide Caption 99 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Fans watch during the morning foursome matches Friday at the Medinah Country Club.Hide Caption 100 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Keegan Bradley of the United States reacts after putting on the 14th green Friday.Hide Caption 101 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Team Europe's Graeme McDowell drives off the 15th tee Friday.Hide Caption 102 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Luke Donald of England, left, and Sergio Garcia of Spain look over their putt on the sixth hole Friday.Hide Caption 103 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Tiger Woods signs his glove for a fan who was struck in the head during his drive off the seveth tee on Friday.Hide Caption 104 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Phil Mickelson plays a bunker shot on 10th tenth hole on Friday.Hide Caption 105 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Luke Donald and Sergio Garcia of Europe line up a putt on the seventh hole on Friday.Hide Caption 106 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Graeme McDowell of Europe watches a shot during the Morning Foursome matches of the Ryder Cup on Friday.Hide Caption 107 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Phil Mickelson hits a shot on the fifth hole on Friday.Hide Caption 108 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Keegan Bradley celebrates on the 15th green after he made birdie to defeat the team of Donald and Garcia during the Morning Foursome matches on Friday.Hide Caption 109 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Rory McIlroy of Europe hits a shot onto the green on Friday.Hide Caption 110 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Justin Rose of Europe celebrates on the fourth hole after a long putt at the 39th Ryder Cup Friday at Medinah Country Club in Medinah, Illinois.Hide Caption 111 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Lee Westwood of Europe watches his tee shot on the first hole Friday.Hide Caption 112 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Phil Mickelson of the United States kisses his wife Amy on the first tee Friday.Hide Caption 113 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Basketball legend Michael Jordan waits on the first tee during the matches.Hide Caption 114 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β A fan of the European team watches the play.Hide Caption 115 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β USA fans cheer the players on the first tee Friday.Hide Caption 116 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β American golfer Tiger Woods chips on the first hole.Hide Caption 117 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Steve Stricker of the United States hits a shot from the rough on the first hole.Hide Caption 118 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Luke Donald of Europe hits his tee shot on the first hole.Hide Caption 119 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Luke Donald and Sergio Garcia of Europe celebrate on the fifth green on Friday. Hide Caption 120 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Phil Mickelson of the United States plays a bunker shot during the fourth and final preview day of the 39th Ryder Cup at Medinah Country Club on Thursday, September 27.Hide Caption 121 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β A Team Europe supporter watches the action Thursday.Hide Caption 122 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Dustin Johnson, left, and Tiger Woods of the United States laugh during a practice round Thursday.Hide Caption 123 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Phil Mickelson, left, was paired with Keegan Bradley on Thursday.Hide Caption 124 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Fans wait for autographs during Thursday's practice round.Hide Caption 125 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Rory McIlroy of Europe kicks a PGA ball in between play of the practice round Thursday.Hide Caption 126 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β McIlroy takes a bow Thursday.Hide Caption 127 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Miguel Angel Jimenez of Europe watches the play Thursday.Hide Caption 128 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Ian Poulter of Europe stands over a ball in the fairway Thursday.Hide Caption 129 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β 2012 Masters champion Bubba Watson, center, walks with U.S. teammate and U.S. Open winner Webb Simpson during a practice round Thursday.Hide Caption 130 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β McIlroy talks with vice captain Darren Clarke during the final preview day Thursday.Hide Caption 131 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Zach Johnson, right, and Jason Dufner of the United States pratice putting on the 17th green Thursday.Hide Caption 132 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Zach Johnson signs autographs for fans after finishing the 18th hole on Thursday.Hide Caption 133 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Members of Team Europe practice Thursday.Hide Caption 134 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Matt Kuchar chats with U.S. teammate Webb Simpson on the practice ground on Thursday.Hide Caption 135 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Team U.S.'s Tiger Woods reaches for a golf ball on the practice ground on Thursday.Hide Caption 136 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β U.S. players Matt Kuchar and Bubba Watson hit shots on the practice ground Thursday.Hide Caption 137 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β British fans wear their loyalties on their sleeves Wednesday, September 26.Hide Caption 138 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Ian Poulter of Europe practices near his teammates' golf bags Wednesday.Hide Caption 139 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β U.S.'s Jim Furyk plays his approach shot to the 12th green on Wednesday.Hide Caption 140 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β A U.S. fan takes photos Wednesday.Hide Caption 141 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Members of the U.S. team practice Wednesday on the 13th green at Medinah, outside Chicago.Hide Caption 142 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Patriotism is on display across the course Wednesday.Hide Caption 143 of 144 Photos: Photos: Best of Ryder CupBest of Ryder Cup β Jose Maria Olazabal serves as captain of the European team for this year's Cup.Hide Caption 144 of 144Kaymer followed up compatriot Bernhard Langer's victory in the seniors event in Sun City on Saturday."Bernhard has been a massive help for me. We talked at the Ryder Cup on the Saturday in the players' lounge when I didn't play at all, and we talked about the spirit and the attitude of the Ryder Cup, and you can use that for regular tournaments as well," Kaymer said."So he has been a huge influence for me. There was a bit more pressure today because everyone was talking about the German double. But I'm very fortunate that everything worked out for me, and it's obviously very nice from Bernhard that he called me straight away." McDowell, meanwhile, upstaged Tiger Woods by winning the 14-time major champion's Chevron World Challenge event in California.The Northern Irishman, whose last victory came at the same tournament in 2010 after he also won the U.S. Open, finished three shots clear of last year's PGA Championship victor Keegan Bradley to claim the $1.2 million first prize.He was congratulated by compatriot Rory McIlroy, who last weekend ended his season as world No. 1 and leader of both the U.S. and European money lists."Great win @Graeme_McDowell!! They should rename that event the Gmac Challenge! Enjoy the well deserved break!" McIlroy wrote on Twitter.Woods, who ended his own long victory drought as host 12 months ago, finished tied for fourth with fellow Americans Jim Furyk and Rickie Fowler.
| 0
|
The US State Department and the Federal Bureau of Investigation are willing to pay a total $4.2 Million for information leading to the arrest and/or conviction of top 5 most wanted cyber criminals accused of conducting frauds of hundreds of millions of dollars.
Evgeniy Bogachev,30; Nicolae Popescu, 34; Alexsey Belan, 28; Peteris Sahurovs, 26; and Shailesh Kumar Jain, 45; are in the list of FBI's Top 5 most-wanted hackers.
1. Evgeniy Mikhailovich Bogachev | Reward - $3 MILLION
Evgeniy Mikhailovich Bogachev, also known under the aliases "lucky12345," "Slavik," and "Pollingsoon," is the mastermind behind the GameOver Zeus botnet, which was allegedly used by criminals to infect more than 1 Million computers, resulting in up to $100 Million in losses since 2009.
Besides GameOver Zeus botnet, Bogachev is also accused of developing CryptoLocker Ransomware, which was designed to extort money from computer victims by holding their system's files hostage until the victim pays a ransom fee to get them back.
Bogachev tops the FBI target's list with $3 Million in reward for anyone giving the information leading to his direct arrest and/or conviction.
2. Nicolae Popescu | Reward - $1 Million
Nicolae Popescu, who also used the aliases Niculae Popescu, Nae Popescu, Nicolae Petrache, "Nae", and "Stoichitoiu", second topped the FBI's 5 Most-Wanted Cyber Criminals list.
This 34-year-old Romanian is accused of fooling innocent Americans with fake auction posts on several websites, including eBay, Cars.com, and AutoTrader.com, claiming to sell cars that just didn't exist.
Popescu and other criminal hackers affiliated with the scheme made more than $3 Million off the auctions, victimizing almost 800 users who handed over money for imaginary cars, Rolex watches, yachts, private airplanes, and other luxury goods.
Authorities tracked down and arrested six members of the cyber gang in late 2012, but Popescu and a partner slipped away.
3. Alexsey Belan | Reward - $100,000
Alexsey Belan, a Russian national, is wanted for allegedly stealing consumer data by compromising the cyber security systems of three unnamed major US-based e-commerce sites in Nevada and California between 2012 and 2013.
After stealing and exporting user databases with passwords to his server, Belan is accused of allegedly negotiating the sales of the databases.
4. Peteris Sahurovs | Reward - $50,000
Peteris Sahurovs is accused of developing and selling a computer virus through advertisements on news website pages. He allegedly carried out the scheme from February 2010 to September 2010.
Under the malicious scheme, the fake ads displayed on the web pages forced users to purchase fraudulent antivirus software.
In case, a user refuse to buy the software, the victim's desktop would be flooded with pop-ups and fake security alerts.
Sahurovs, a native of Latvia, made more than $2 Million by selling his "antivirus" software.
5. Shailesh Kumar Jain | Reward - $50,000
Shailesh Kumar Jain is the only American citizen on the FBI's Most Wanted Hackers list.
Jain made $100 Million between December 2006 and October 2008, according to the FBI. He used a flood of pop-up ads and email scamming to convince users that their computers were infected with a virus and then selling them the bogus AV software packages for between $30 and $70.
| 1
|
Story highlightsRadovan Stankovic was convicted in Bosnia in November 2006 He escapes from a Bosnian prison in May 2007Stankovic is captured in Foca, the same town he escaped from jail Bosnian police have recaptured a former member of Serb paramilitary forces who escaped from prison nearly five years ago, authorities said.Radovan Stankovic was convicted in Bosnia in November 2006 for crimes against humanity, including rape, sexual assault and enslavement of women and young girls during Bosnia's 1992-1995 war.He escaped from a Bosnian prison in May 2007. "Today's apprehension of Stankovic significant for the victims of the grave crimes he has been convicted for," the International Criminal Tribunal for the former Yugoslavia said in a statement Saturday. "I hope that this arrest reflects an increased commitment of the authorities of Bosnia and Herzegovina to support the process of bringing to justice those responsible for the grave crimes committed on their territory in the early 1990s." Stankovic was captured in Foca, the same town he escaped from jail.
| 0
|
Who else didn't see this coming?
It was so obvious as I stressed earlier that the Let's Encrypt free HTTPS certificates would not just help legitimate website operators to encrypt its users' traffic, but also help criminals to bother innocent users with malware through secure sites.
Let's Encrypt allows anyone to obtain free SSL/TLS (Secure Socket Layer/Transport Layer Security) certificates for their web servers that encrypt all the Internet traffic passed between a server and users.
Let's Encrypt is recognized by all major browsers, including Google's Chrome, Mozilla's Firefox and Microsoft's Internet Explorer.
The organization started offering Free HTTPS certs to everyone from last month, and it is very easy for anyone to set up an HTTPS website in a few simple steps (How to Install Free SSL Cert).
However, the most bothersome part is that Let's Encrypt free SSL certs are not only used by website owners to secure its users connection but also abused by cyber criminals to spread malware onto computers.
How Criminals are Abusing Let's Encrypt Certificates?
Researchers from Trend Micro spotted a Malvertising Campaign on Dec. 21 that was installing banking malware on computers and using free SSL certificates issued by the Let's Encrypt to hide its malicious traffic.
Malvertising is a technique of using Web ads to spread malware. By stealthy inserting malicious advertisements on legitimate websites, malware authors can redirect users to malicious sites to deliver malware payload with the help of an exploit kit.
For a long time, malware authors purchased stolen SSL certificates from the underground market and deployed them in their malvertising campaigns. Fortunately, these certificates are eventually caught up and invalidate by their legitimate owners.
However, with the launch of Let's Encrypt free SSL certificates, malware authors don't even have to pay for SSL certificates anymore, and can request one for free instead.
Criminals Delivering Vawtrack Banking Trojan
The malvertising campaign discovered by Trend Micro researchers lasted until December 31 and affected users located mainly in Japan.
People in Japan were delivered malicious ads that redirect them to a malicious website serving up malware over encrypted HTTPS using a Let's Encrypt-issued certificate.
The malicious website used the Angler Exploit Kit in order to infect victims' computers with the nasty Vawtrack banking trojan, which is specially designed to raid their online bank accounts.
Before installing the Let's Encrypt certificate, the attackers behind this campaign compromised an unnamed legitimate web server and set up their own subdomain for the server's website, said Joseph Chen, Fraud Researcher at Trend Micro.
The cyber crooks then installed the Let's Encrypt cert on the compromised server and hosted a malicious advertisement (also contained anti-antivirus code) from that subdomain.
The Actual Cause behind the Abuse of Let's Encrypt Certs
The issue is Let's Encrypt only checks the main domain against the Google's Safe Browsing API to see if a domain for which an SSL certificate is requested has been flagged for malware or phishing.
However, Let's Encrypt never check for shadow domains like in this case in which authors of the malvertising campaign easily requested and got approved for a Let's Encrypt certificate.
Moreover, Let's Encrypt has a policy not to revoke certificates. The organization explained in October that certification authorities are not equipped to police content and certificates issued by them 'say nothing else about a site's content or who runs it'.
"Domain Validation (DV) certificates do not include any information about a website's reputation, real-world identity, or safety."
However Trend Micro disagrees with this approach, saying, certificate authorities (CAs) "should be willing to cancel certificates issued to illicit parties that have been abused by various threat actors."
In other words, there should be some mechanisms to prevent unauthorized certificates registrations for domains as well as their subdomains.
How can You Prevent Yourself From Such Attacks?
Trend Micro has reached out to both the Let's Encrypt project, and the legitimate domain's owner to notify them about the malvertising campaign.
And Here's your take:
Users should be aware that a 'secure' website is not always or necessarily a safe website, and the best defense against exploit kits is still an easy go, i.e.:
Always keep your software up-to-date to minimize the number of vulnerabilities that may be exploited by cyber criminals.
For online advertisement brokers, an approach would be to implement internal controls to stop malicious advertisements.
| 1
|
Story highlights First passenger flight leaves Brussels Airport since the March 22 bombings Airport has partially reopened with heightened new security measures140 people arrested for breaching ban on demonstrations in the city Saturday (CNN)The first passenger jet has departed Brussels Airport since the terror attacks that struck 12 days ago -- a symbolic step toward normalcy in the Belgian capital.A moment of silence was observed Sunday at the airport shortly before a Brussels Airlines flight departed at 1:40 p.m. (7.40 a.m. ET) for Faro, Portugal.Two other Brussels Airlines passenger flights -- to Turin, Italy, and Athens, Greece -- were scheduled to depart Sunday as the airport slowly begins resuming regular operations in the wake of the March 22 bombings. The suicide bombing attacks on the airport and a Brussels subway station killed 32 people; the terror group ISIS claimed responsibility.JUST WATCHEDWhy Belgium is Europe's frontline in war on terrorReplayMore Videos ...MUST WATCHWhy Belgium is Europe's frontline in war on terror 02:50"These flights are the first hopeful sign from an airport that is standing up straight after a cowardly attack," airport CEO Arnaud Feist said Saturday.Further flights will be added in coming days, Feist said. Cargo flights resumed at the airport more than a week ago.Read MoreThe move comes after days of negotiations between airport and police officials on new security arrangements at the airport, which is operating a temporary departure hall in place of the facility damaged in the attacks. For the first few days of its opening, the airport will be accessible only by car -- not public transport buses or trains, Feist said.Because of the enhanced security measures -- which include screening of passengers and their vehicles on the access road approaching the airport -- travelers are being advised to arrive at least three hours before their scheduled departure.Protesters arrestedThe facility's reopening comes a day after police arrested 140 people over attending illegal demonstrations and gatherings in the city.City officials prohibited demonstrations in Brussels this weekend after a far-right group announced plans for an anti-Islam rally Saturday in Molenbeek, a heavily immigrant Brussels neighborhood with links to a number of attackers in recent terror plots.In response, an anti-racism group called for a counterdemonstration in the same area.The far-right protest was called off, but anti-racism protesters gathered Saturday in Molenbeek and began marching toward the city center, where police in riot gear pushed them back.JUST WATCHEDNazi salutes at Brussels attack memorialReplayMore Videos ...MUST WATCHNazi salutes at Brussels attack memorial 01:31Police said arrests were also made at a gathering in Place de la Bourse in central Brussels, which has become home to an unofficial memorial commemorating the victims of the terror attacks.Police have been anxious to avoid a repeat of the chaotic scenes that unfolded March 27 when hundreds of far-right demonstrators gathered in the Place de la Bourse, shouting anti-immigrant slogans. Authorities used water cannons to clear the protesters, some of whom were filmed giving Nazi salutes.Police said those arrested Saturday face charges for failing to follow orders to disperse and other administrative offenses.Arrest linked to a French plotAlso Saturday, Belgian officials announced an arrest in one of the terror investigations connecting their nation and France. The Belgian federal prosecutor's office said investigators have detained and charged a 33-year-old man with being part of a terror group.It's not clear what the allegations are against the man or even his identity. He's identified only as a Belgian national with the initials Y.A. in the prosecutor's statement.His case is connected with that of Reda Kriket, 32, a French citizen indicted on charges of criminal conspiracy to commit a terrorism act, possession of false documents, weapons possession and manufacturing of explosives.JUST WATCHEDParis police identify terror suspectReplayMore Videos ...MUST WATCHParis police identify terror suspect 01:26French police arrested Kriket on March 24 in Boulogne-Billancourt, just west of Paris, then raided an apartment not far away in Argenteuil. They found a large weapons cache and bomb-making materials there, French prosecutor Francois Molins said.A Belgian court already had found Kriket guilty in absentia and sentenced him to 10 years in prison for being part of a jihadist network, according to Belgian court documents.Authorities haven't given any indication that Y.A. or Kriket had any direct involvement in the Brussels bombings.Nor is any connection publicly known between the two men and the November terror attacks that left 130 dead and hundreds more wounded.The Paris attackers had close ties to Belgium, with many having lived in the capital.CNN's Jason Hanna, Margot Haddad, Jon Jensen and Alexandra Field contributed to this report.
| 0
|
New York (CNN Business)Ukraine's official Twitter account wants @Russia to be removed from the platform. YouTube is facing scrutiny for allowing a Russian broadcaster who is widely viewed as part of the country's propaganda machine to continue making money from ads on the video site. And TikTok, a service that didn't even exist during the 2014 crisis in Ukraine over Russia's annexation of Crimea, is now offering an unprecedented close-up of the front lines through videos β some authentic, others not.Social media companies have in recent years grappled with how to handle misinformation and conspiracy theories about a pandemic, a fraught US presidential election and an insurrection, often while facing intense criticism from lawmakers for doing too little or too much. Now, the platforms are scrambling to confront a growing list of challenges, some of which appear to be almost unheard of in their histories, as war unfolds in Europe. On Thursday, Twitter faced a new kind of moderation decision when the verified account for the country of Ukraine posted: "hey people, let's demand @Twitter to remove @Russia from here ... they should not be allowed to use these platforms to promote their image while brutally killing the Ukrainian people @TwitterSupport." Twitter spokesperson Trenton Kennedy declined to comment on whether Twitter might remove the official Russian account referenced in the tweet, or the Kremlin's verified account, from the platform. "That question of should we let state actors that prevent their own citizens from seeing the free expression on these [Western social media] platforms have the right to use those platforms as mouthpieces for their own propaganda is a really nuanced and complex topic," Renee DiResta, technical research manager at the Stanford Internet Observatory, told CNN BusinessTips for navigating social media 'fog of war' as Russia invades Ukraine Other challenges from the conflict are familiar to the major platforms, such as how to prevent the rapid spread of misinformation. But given the life-or-death circumstances and Russia's history of deploying propaganda and covert online manipulation, the stakes are heightened.Read MoreAfter Russia's invasion of Ukraine officially began, social media was flooded with photos of bombed out buildings, first-person accounts from Ukrainian civilians fleeing their homes, and even videos purporting to be from soldiers engaged in the fighting. Users were left to sort through what might be real or old, fake or manipulated content meant to sow confusion and discord in a conflict that is being waged in part through the use of propaganda. In one instance, a video appearing to show a soldier parachuting into the conflict went viral on TikTok Thursday morning, racking up millions of views. But the video had originally been posted to Instagram about seven years ago, NBC disinformation reporter Ben Collins noted on Twitter. In some other cases, clips from video games or videos from old conflicts recirculated on the platform, purporting to show what was happening in Ukraine. The social media companies should be "making sure there's no overt manipulation on their platforms, and then trying to surface accurate information, particularly within trends, to help the public understand what's going on," DiResta said. "In these moments, there is always going to be something that gets through unfortunately, so I think ... the platforms being as transparent as they can be is very important."Twitter (TWTR) and Facebook parent company Meta (FB) both told CNN Business that they have teams monitoring for misinformation, coordinated inauthentic behavior and other potential issues related to the conflict. TikTok did not respond to requests for comment about its response to the war on their platforms. Even with those preparations, there have already been some missteps. Twitter faced backlash in the days leading up to the invasion for having briefly removed the accounts of open source researchers who had been sharing information on the platform about the movement of Russian troops and equipment. Twitter's head of site integrity, Yoel Roth, said on Twitter Wednesday that the removals were due to a "small number of human errors" made as part of an effort to enforce the company's policies against manipulated media. Twitter said the accounts were quickly restored. "Twitter's top priority is keeping people safe," Twitter spokesperson Trenton Kennedy said in a statement. "As we do around major global events, our safety and integrity teams are monitoring for potential risks associated with the conflict to protect the health of the service, including identifying and disrupting attempts to amplify false and misleading information and to advance the speed and scale of our enforcement." Twitter on Thursday and Friday had its executives promoting live audio discussions on Twitter Spaces about the conflict being held by reporters at major news outlets. The company also shared a series of safety tips for users on the ground in Ukraine or Russia, and curated a Twitter "moment" where it is compiling the latest updates from reliable sources. Twitter also launched a feature allowing users to affix a sensitive content warning to photos and videos they tweet, and on Friday paused advertisements in Russia and Ukraine "to ensure critical public safety information is elevated." Russia moves to 'partially restrict' Facebook access over censorship allegationsOn Facebook, the war in Ukraine has yet to be added to the platform's "crisis response" page as an event where users can mark themselves safe. But the company did spin up a new feature that allows users in Ukraine to lock their profiles for "an extra layer of privacy and security protection." On Instagram, the platform is showing users in the country alerts on how to protect their accounts. "We have established a Special Operations Center to respond to activity across our platform in real time," Meta spokesperson Dani Lever told CNN Business Thursday. "It is staffed by experts from across the company, including native speakers, to allow us to closely monitor the situation so we can remove content that violates our Community Standards faster," Lever said. On YouTube, videos from Russian state-funded television network RT continued to run advertisements as of Friday morning. That means the media company whose American arm was forced by the US Justice Department in 2017 to register as a "foreign agent" and that intelligence researchers have said "conducts strategic messaging for [the] Russian government" continues to be able to monetize its presence on the video-sharing platform. YouTube labels RT's videos with a disclaimer that it is funded by the Russian government.YouTube spokesperson Ivy Choi declined to comment about RT directly, but said Google is evaluating what new US sanctions and export controls may mean for YouTube and its other platforms. Google Europe said on Twitter it was enhancing security controls for users in Ukraine, and that its intel teams were working to address disinformation campaigns, hacking and "financially motivated abuse." "On YouTube, we're prominently surfacing videos from trusted news sources and working hard to remove content that violates our policies," Google said. "Over the last few days, we've removed hundreds of channels & thousands of videos."Taking action on Russian accounts carries its own risks for the platforms, however.On Friday, the Russian government moved to "partially restrict" Facebook access in the country after accusing the platform of unlawful censorship. Russia's ministry of communications claimed Facebook had "violated the rights and freedoms of Russian citizens" when the social network on Thursday allegedly clamped down on several Russian media outlets on its platform.In response to the allegations, Meta global affairs president Nick Clegg said Russia had ordered the company to "stop the independent fact-checking and labelling" of four Russian outlets."We refused," Clegg said in a statement. "Ordinary Russians are using our apps to express themselves and organize for action. We want them to continue to make their voices heard, share what's happening, and organize."
| 0
|
Hackers and malware are everywhere, waiting for you around every corner of the Internet. The International Atomic Energy Agency (IAEA), which holds highly sensitive information and plays a key role in global efforts to prevent the spread of nuclear weapons, said on Tuesday that some of its computers were infected by malicious software, during the past several months.
Malware can typically be used by cyber-attackers to gain remote access to systems, or to steal data, however spokesman Serge Gas said. "No data from the IAEA network has been affected."
The computers were located in common areas of the agency's Vienna headquarters, known as the Vienna International Centre (VIC).
A third-party technician or visitor with the USB-drive infected with crimeware can be used to infect the system. "The (IAEA) secretariat does not believe that the USB devices themselves were infected or that they could spread the malware further" he said.
Last November, the IAEA revealed that Iranian hackers had accessed one of its former computer servers and posted the contact details of some of the watchdog's experts online.
"Protecting information is vital to the IAEA's work. The agency continuously endeavours to achieve the highest possible level of protection of information," Gas said.
The authority did not go into explicit details regarding the malware itself, but did stress that the use of removable media had to be reviewed and tightened.
| 1
|
Users should be aware that Cyber criminals are finding new ways to install malicious software on devices. The latest threat to Android phone users, according to the FBI, is a "work-at-home opportunity that promises a profitable payday just for sending out email."
The IC3 has been made aware of various malware attacking Android operating systems for mobile devices. Some of the latest known versions of this type of malware are Loozfon and FinFisher.
Loozfon is an information-stealing piece of malware. Criminals use different variants to lure the victims. One version is a work-at-home opportunity that promises a profitable payday just for sending out email. A link within these advertisements leads to a website that is designed to push Loozfon on the user's device. The malicious application steals contact details from the user's address book and the infected device's phone number.
FinFisher is a spyware capable of taking over the components of a mobile device. When installed the mobile device can be remotely controlled and monitored no matter where the Target is located. FinFisher can be easily transmitted to a Smartphone when the user visits a specific web link or opens a text message masquerading as a system update.
Last week, security experts at McAfee announced that more than 60% of Android malware uses fake premium SMS messages. In their post on this subject, McAfee said, "Malware authors appear to make lots of money with this type of fraud, so they are determined to continue improving their infrastructure, code, and techniques to try to avoid antivirus software. It's an ongoing struggle, but we are constantly working to keep up with their advances."
Safety tips from FBI to protect your mobile device:
When purchasing a Smartphone, know the features of the device, including the default settings. Turn off features of the device not needed to minimize the attack surface of the device.
Depending on the type of phone, the operating system may have encryption available. This can be used to protect the user's personal data in the case of loss or theft.
With the growth of the application market for mobile devices, users should look at the reviews of the developer/company who published the application.
Review and understand the permissions you are giving when you download applications.
Passcode protect your mobile device. This is the first layer of physical security to protect the contents of the device. In conjunction with the passcode, enable the screen lock feature after a few minutes of inactivity.
Obtain malware protection for your mobile device. Look for applications that specialize in antivirus or file integrity that helps protect your device from rogue applications and malware.
Be aware of applications that enable Geo-location. The application will track the user's location anywhere. This application can be used for marketing, but can be used by malicious actors raising concerns of assisting a possible stalker and/or burglaries.
Jailbreak or rooting is used to remove certain restrictions imposed by the device manufacturer or cell phone carrier. This allows the user nearly unregulated control over what programs can be installed and how the device can be used. However, this procedure often involves exploiting significant security vulnerabilities and increases the attack surface of the device. Anytime a user, application or service runs in "unrestricted" or "system" level within an operation system, it allows any compromise to take full control of the device.
Do not allow your device to connect to unknown wireless networks. These networks could be rogue access points that capture information passed between your device and a legitimate server.
If you decide to sell your device or trade it in, make sure you wipe the device (reset it to factory default) to avoid leaving personal data on the device.
Smartphones require updates to run applications and firmware. If users neglect this it increases the risk of having their device hacked or compromised.
Avoid clicking on or otherwise downloading software or links from unknown sources.
Use the same precautions on your mobile phone as you would on your computer when using the Internet.
Subscribe to our Daily Newsletter via email - Be First to know about Security and Hackers. or Join our Huge Hackers Community on Facebook, Google+ and Twitter.
| 1
|
(CNN)A senior British diplomat in the US has quit with a blast at the UK government over Brexit, saying she could no longer "peddle half-truths" on behalf of political leaders she did not "trust."In a searing resignation letter delivered just over a week before the UK general election, Alexandra Hall Hall, the lead envoy for Brexit in the British Embassy in Washington, said that she had become increasingly dismayed by the demands placed on the British civil service to deliver messages on Brexit which were not "fully honest."The reluctance of Britain's leaders to play straight with the public on Brexit, Hall Hall said, had undermined the credibility of UK diplomats abroad. Her position had become "unbearable personally" and "untenable professionally," she wrote in the letter, which has been obtained by CNN.Diplomat Alexandra Hall Hall has left the UK diplomatic service over Brexit.Hall Hall's decision to quit, and her no-holds-barred resignation letter, comes at a moment of deep political sensitivity for UK Prime Minister Boris Johnson, who is seeking re-election on the promise that he can "get Brexit done." Johnson has been ahead in opinion polls, but, as his lead has narrowed in recent days, officials are nervous about anything that could undermine his chances of winning a parliamentary majority for his Conservative party in the election next Thursday.An official at the Foreign Office, who was not authorized to brief the press, confirmed that Hall Hall had resigned but had not seen her letter. A Foreign Office spokesperson said: "We won't comment on the detail of an individual's resignation." Downing Street referred CNN to the Foreign Office.Read MoreIn her resignation letter, addressed to deputy ambassador Michael Tatham and which Hall Hall shared widely with colleagues in the diplomatic service, she said that her departure had nothing to do with being "for or against Brexit, per se," but instead was an expression of frustration about how the policy was being carried out.The two biggest pieces of disinformation in the UK election have come from the governmentHall Hall, a 33-year veteran of the UK foreign service, and a former ambassador to Georgia, said UK institutions had been undermined and the reputation of British democracy abroad had been imperiled."I have been increasingly dismayed by the way in which our political leaders have tried to deliver Brexit, with reluctance to address honestly, even with our own citizens, the challenges and trade-offs which Brexit involves; the use of misleading or disingenuous arguments about the implications of the various options before us; and some behaviour towards our institutions, which, were it happening in another country, we would almost certainly as diplomats have received instructions to register our concern," she wrote in her letter, dated December 3."It makes our job to promote democracy and the rule of law that much harder, if we are not seen to be upholding these core values at home."Hall Hall said she could no longer reconcile her commitment to the job with the demands made of her. "I am also at a stage in life where I would prefer to do something more rewarding with my time, than peddle half-truths on behalf of a government I do not trust," she wrote in the letter. Delivering Brexit has been impossible. Stopping it will be even harderThough Hall Hall did not refer to Johnson or any other UK leader by name in her letter, she expressed concern about the divisive rhetoric that has characterized British politics since the Brexit referendum. Johnson's comments have hardened in recent months. He has attacked attempts to prevent a no-deal Brexit as "surrendering" to Brussels and dismissed fears that his language encourages supporters to abuse his opponents. Johnson has defended his rhetoric, telling the BBC after a particularly rancorous parliamentary debate in September that avoiding such terms risked "impoverishing the language and diminishing parliamentary debate".Much of the blame for the strategy has been pinned on Johnson's lead adviser, Dominic Cummings, who ran the Vote Leave campaign in the Brexit referendum of 2016 and is credited with creating the "Take Back Control" slogan. Cummings has been unrepentant over his tactics. But Hall Hall made clear in her letter that she was not motivated to step down by any personal convictions over the outcome of Brexit, and that she had enthusiastically accepted the position as Brexit Counsellor at the Washington embassy in 2018. "I took this position with a sincere commitment, indeed passion, to do my part, to the very best of my abilities, to help achieve a successful outcome on Brexit," she wrote in her resignation letter.Her complaints have echoes of the discontent of some diplomats in the US foreign service under US President Donald Trump. Since he was elected, scores of diplomats have left the State Department and senior roles have been left unfilled. Hall Hall's resignation is a sign that under Johnson, there is similar unease.Meet the real brains behind Boris Johnson's Brexit planAs UK Brexit Counsellor, Hall Hall was tasked with explaining Britain's approach to leaving the European Union to US lawmakers and policy makers on Capitol Hill and in the White House. She suggested that her diplomatic role -- intended to be politically neutral -- was co-opted to deliver messages that were "neither fully honest nor politically impartial." Hall Hall said that she had filed a formal complaint about being asked to convey overtly partisan language on Brexit in Washington.Hall Hall said she was resigning now, rather than after the election, so that her decision could not be portrayed as a reaction to the result. She is expected to leave the embassy next week, and is quitting the diplomatic service completely."Each person has to find their own level of comfort with this situation," she wrote in her letter. "Since I have no other element to my job except Brexit, I find my position has become unbearable personally, and untenable professionally."Attempts by CNN to reach Hall Hall for further comment were unsuccessful.Eliza Mackintosh wrote from London. CNN's Luke McGee contributed reporting.
| 0
|
Story highlightsThe 2015 Rugby World Cup begins at Twickenham Stadium in LondonEngland beats Fiji 35-11 in the tournament's opening matchTwickenham (CNN)It's not every day you see Canadian Mounties patrolling the streets of London.But it's not every day that a billion dollar festival of rugby kicks off in the English capital, attracting fans from across the globe and royals from a little closer to home.The Rugby World Cup got under way Friday in a blaze of fireworks and fierce tackles, with a cameo appearance from Prince Harry giving the spectacle the royal seal of approval.During a blockbuster opening ceremony, the 106-year-old Twickenham Stadium reverberated with deafening noise before host nation England delighted the 80,000-strong crowd with a hard-fought 35-11 win over Fiji in the tournament's opening match.JUST WATCHED5 things you should know about the Rugby World CupReplayMore Videos ...MUST WATCH5 things you should know about the Rugby World Cup 02:20An avid rugby fan, Prince Harry is serving as England 2015's honorary president and he addressed the crowd ahead of the match -- with the Duke and Duchess of Cambridge watching on from the stands.Read MoreIn an impassioned speech, he heralded the values of the sport as well as recalling arguably its most iconic moment -- when Nelson Mandela handed South Africa captain Francois Pienaar the Webb Ellis Cup in 1995.Amid a cacophony of noise, His Royal Highness concluded: "We're ready, game on."JUST WATCHEDThe history behind the sport of rugbyReplayMore Videos ...MUST WATCHThe history behind the sport of rugby 02:19After a hard-fought 80 minutes, England eventually prevailed thanks, in the main, to two tries from full back Mike Brown. Substitute Billy Vunipola added another with the final act of the match.Fiji's only try came with half an hour played courtesy of Nemani Nadolo.Though England never looked like losing the match, Stuart Lancaster's team will have to improve before more testing encounters with neighbors Wales and two-time world champions Australia.The action will be aired in 209 territories by 109 TV broadcasters, meaning as many as 772 million people across the globe can watch the tournament. Photos: Rugby World Cup 2015: Who will shine on the big stage? Photos: Rugby World Cup 2015: Who will shine on the big stage?Richie McCaw is "Mr. Rugby." The New Zealand captain is a three-time IRB world player of the year and an inspiration to his teammates. He will lead the All Blacks' title defense in England after his heroic efforts on home soil four years ago. The 34-year-old is the most capped international player of all time.Hide Caption 1 of 20 Photos: Rugby World Cup 2015: Who will shine on the big stage?If Wales is to enjoy success at the World Cup then you can bet George North will be one of the main factors behind it. The winger was the first teenager in the history of international rugby to score 10 tries before his 20th birthday. Now 23, he is lethal when given space and difficult to stop once he gets his groove on, though he has been hampered by multiple concussions in the past year.Hide Caption 2 of 20 Photos: Rugby World Cup 2015: Who will shine on the big stage?Kieran Read is widely regarded as one of the best forwards in the game and an integral part of the New Zealand side. The 29-year-old was named international rugby player of the year in 2013 and cites Barcelona soccer star Lionel Messi as one of his inspirations. The No. 8 is expected to succeed McCaw as All Blacks skipper.Hide Caption 3 of 20 Photos: Rugby World Cup 2015: Who will shine on the big stage?He might be the new kid on the block but 22-year-old George Ford has earned rave reviews for host England. The fly-half starred in his country's Six Nations campaign and scored 25 points against France last March, giving him the edge for the No. 10 shirt ahead of rival Owen Farrell.Hide Caption 4 of 20 Photos: Rugby World Cup 2015: Who will shine on the big stage?Nobody has scored more points in international rugby than Dan Carter. The two-time world player of the year has graced the sport with his wide array of skills since making his All Blacks debut back in 2003. However, the goal-kicking fly-half has suffered injuries and disappointment on the game's biggest stage, being sidelined during the group stage in 2011. Like McCaw, this is expected to be his international farewell.Hide Caption 5 of 20 Photos: Rugby World Cup 2015: Who will shine on the big stage?Mamuka Gorgodze will lead the charge for rugby minnow Georgia, which qualified for the tournament with nine victories and one defeat. Georgia has only managed two World Cup wins, including 2007's 30-0 thrashing of Namibia. Gorgodze, who plays for French and European champion Toulon, is nicknamed "Gorgodzilla" due to the forward's sheer size.Hide Caption 6 of 20 Photos: Rugby World Cup 2015: Who will shine on the big stage?He's the star of the U.S. Eagles and Samu Manoa is ready to prove it on the biggest stage after missing the 2011 event due to his contract with English club Northampton. The 30-year-old forward, born in California, is well known for his fierce tackles and physical prowess. He recently signed for Toulon.Hide Caption 7 of 20 Photos: Rugby World Cup 2015: Who will shine on the big stage?Juan Martin Fernandez Lobbe, one of Argentina's greatest players, made his international debut in 2004. The 33-year-old back-row forward, who also plays for Toulon, was part of the team which reached the semifinals of the 2007 World Cup and the last eight in 2011 -- when he was ruled out ahead of the final group match with a serious knee injury.Hide Caption 8 of 20 Photos: Rugby World Cup 2015: Who will shine on the big stage?Sam Warburton led Wales to the 2011 semifinals but was sent off early in the match against France. The 26-year-old forward will again be captain of a team missing injured key players such as Leigh Halfpenny and Rhys Webb.Hide Caption 9 of 20 Photos: Rugby World Cup 2015: Who will shine on the big stage?Tevita Kuridrani has the potential to be one of the stars of the tournament for Australia. The Fiji-born center is the cousin of former Wallabies winger Lote Tuqiri. Since making his debut against New Zealand in 2013, the Brumbies back has established himself following a five-week ban for a dangerous tackle against Ireland that year.Hide Caption 10 of 20 Photos: Rugby World Cup 2015: Who will shine on the big stage?Johnny Sexton is arguably the best fly-half in world rugby at the moment. The 30-year-old helped inspire Ireland to successive Six Nations titles in 2014-15 and his performances will be key as his country seeks to get past the World Cup quarterfinals for the first time.Hide Caption 11 of 20 Photos: Rugby World Cup 2015: Who will shine on the big stage?South Africa will have Duane Vermeulen back after neck surgery to spearhead its challenge in his first World Cup. The No. 8 was the team's player of the year in 2014 and is crucial to its success. Vermeulen, known for his powerful approach, will join Toulon after the tournament.Hide Caption 12 of 20 Photos: Rugby World Cup 2015: Who will shine on the big stage?There are few more exciting players in the world of rugby than Israel Folau. The Australia fullback, who has spoken of his desire to move to the NFL in the future, has pace to burn. At 26, he's at the peak of his powers, and has also represented his country in rugby league.Hide Caption 13 of 20 Photos: Rugby World Cup 2015: Who will shine on the big stage?South Africa is not short on star quality but this could be Willie le Roux's time to shine upon the big stage. The 26-year-old, who made his debut in 2013, can play at wing, fullback and fly-half, and has the ability to change a game.Hide Caption 14 of 20 Photos: Rugby World Cup 2015: Who will shine on the big stage?Namibia might be the weakest team in the tournament but it does have inspirational loose forward Jacques Burger as captain. The tough-tackling 32-year-old, who plays for top English club Saracens, will feature at his third World Cup. The African side will need all his experience for its first game against New Zealand.Hide Caption 15 of 20 Photos: Rugby World Cup 2015: Who will shine on the big stage?Vice-captain Vereniki Goneva is one of Fiji's main men. The 31-year-old, who can play on the wing and at center, made his international debut back in 2007 and scored four tries against Namibia at the 2011 World Cup. His experience playing for Leicester could be key in Fiji's opening game against host England at Twickenham.Hide Caption 16 of 20 Photos: Rugby World Cup 2015: Who will shine on the big stage?Wesley Fofana will be a key man as France looks to go one better than its World Cup final defeat by New Zealand four years ago. The Clermont center, who is of Malian descent and is nicknamed "The Cheetah," has the potential to thrill and excite at every twist and turn.Hide Caption 17 of 20 Photos: Rugby World Cup 2015: Who will shine on the big stage?Veteran forward Sergio Parisse will help lead Italy's challenge at the World Cup. The back-rower was born in Argentina to Italian parents before moving back to Europe. Also captain of French club Stade Francais, his power and experience will be key to Italy's chances of progressing from the group stage for the first time.Hide Caption 18 of 20 Photos: Rugby World Cup 2015: Who will shine on the big stage?Tonga winger Fetu'u Vainikolo knows all about playing rugby in England after spending two years with Exeter Chiefs. He started his career in New Zealand before moving to Ireland, and will next play for French club Oyonnax. At 30, this might be his final chance to shine at a World Cup, having played in 2011 as the Pacific Islanders once again exited in the group stage.Hide Caption 19 of 20 Photos: Rugby World Cup 2015: Who will shine on the big stage?George Pisi is one of three brothers set to feature for Samoa at the 2015 World Cup. George, who plays at center, is one of the nation's most talented players. He plays with younger sibling Ken at English club Northampton, while Japan-based Tusi -- at 33 the oldest of the trio -- is also among the backs in the squad. Consistently inconsistent, Samoa could be brilliant ... or awful. It last reached the quarterfinals when the tournament was held in South Africa in 1995.Hide Caption 20 of 20One region where rugby has yet to grip the masses is North America, but the continent is well represented both on and off the field. The U.S. has appeared in all but one of the eight World Cups staged to date, while Canada has been at every tournament.And the Canadians can count on enthusiastic support. Neil and Shelley Cameron have traveled over 4,000 miles from Calgary to London as part of a 30-strong party.Bedecked in their local club's jerseys and imitation Mountie hats, they're embarking a rugby-lover's tour of England. Just off the train at #twickenham and greeted by Neil and Shannon Cameron from Calgary, Canada. I'm sure you'd agree, they look ace. #rwc2015 #rugby A photo posted by @tompmcgowan on Sep 18, 2015 at 6:58am PDT
"We've got five games to go see, we want to cheer on Canada against Ireland and you can't miss England playing Fiji," said Neil, 35. "We're in Cardiff, Leeds and, of course, London."We've got a whole group of Canadian rugby players with us, all dressed in jerseys and outfits. It's not an event to be missed."Neil admits rugby isn't huge in hockey-loving Canada but, as he puts it, "you need something to do in the summer.""Our women's team came in second in the world, so that spurred on a lot of interest in the sport in Canada," added Shannon, referring to last year's Women's World Cup in France, which was won by England.If England's men are to replicate their female counterparts they will first need to navigate an intriguing pool which also includes powerhouses Australia and Wales as well as Fiji and minnows Uruguay.Similar to England, Wales will also benefit from home advantage when it begins its campaign against Uruguay at Cardiff's Millenium Stadium on Saturday.A giant rugby ball inflated on the walls of Cardiff Castle in the Welsh capital captured the public imagination on Friday.It remains to be seen whether the rugby-mad Welsh will be left deflated at the end of this World Cup.
| 0
|
(CNN)Thousands of fans have congregated in Stockholm to watch two of Europe's most recognizable clubs -- Manchester United and Ajax -- contest Wednesday's Europa League final.Games like this are normally a cause for celebration, a chance for a club's supporters to travel to a different city and see their team lift a prestigious trophy.Follow @cnnsport
But Monday's terror attack in Manchester has changed everything."Words don't really do justice for how we all feel," said United's executive vice chairman Ed Woodward. "We're numb. The events were sickening and all our thoughts at the moment are with the victims and the families affected by it."#WeStandTogether pic.twitter.com/Ro0ohU9PI6β Manchester United (@ManUtd) May 23, 2017
United manager Jose Mourinho added that the players can't get the victims and their families "out of our minds and hearts."Read MoreThough, as the world remains defiant in the face of terror, United chairman Ed Woodward said the club has still "got a job to do, no question about that, and that hasn't been changed."While United in recent years have strayed somewhat from promoting youth players into the first team, instead opting for marquee signings, Ajax have stuck to their roots and academy players now form the crux of a youthful starting XI.Few players, then, are better placed to talk about the Dutch giants' famed academy than Edgar Davids.Still sporting his thick, dreadlocked hair and trademark glasses, Davids looks barely a day older than the athletic midfielder who became a footballing icon in the 1990s.READ: UEFA plays down security fears ahead of Europa League finalREAD: Pep Guardiola's wife and daughters escape terror attackDuring the middle part of that decade, Davids -- nicknamed "The Pitbull" by then manager Louis Van Gaal -- was part of unquestionably the best team in Europe.ROAD TO THE FINAL: 1992 | Deel 7 van de serie over het bereiken van 10 Europese finales β‘οΈ https://t.co/2gPKx0Vxqg #UELfinal pic.twitter.com/jPFxh7zItyβ AFC Ajax (@AFCAjax) May 21, 2017
His Ajax team reached two consecutive Champions League finals -- in 1995 and 1996 -- winning the first against AC Milan and losing the second against Juventus en route to becoming one of history's most iconic teams.The starting XI in both finals reads like a who's who of footballing legends, though that side wouldn't remain together for much longer.Wednesday's final marks the first time Ajax have reached a European final since Davids and Co. suffered shootout heartbreak against Juve in Rome.The ties with that golden generation still run deep today. Eighteen-year-old sensation Justin Kluivert is the son of former striker Patrick, scorer of the winning goal in that famous victory over AC Milan.The goalkeeper in both finals, Edwin Van der Sar, recently returned to the club as chief executive, while Marc Overmars is also back at the Amsterdam Arena as director of football.Ajax's assistant coach is Dennis Bergkamp, another product of the club's famed youth academy, and the current young squad -- the average of the the starting XI in the semifinal second leg was 22.81 -- provide the perfect blank canvas for the former players to implement the club ideology.Shall we do it the Kluivert way? π«#UELfinal #ajaman #WeAreBack pic.twitter.com/L603QvSCQ3β AFC Ajax (@AFCAjax) May 24, 2017
"What a lot of clubs lack is the ability to instill the club culture (in players) -- to teach somebody that is hard and it takes time," Davids told CNN at London's Hackey Marshes."But if you already have players that understand the culture of the club, and have been part of the culture, it's easier for them to have that motivation and they can motivate other people to move in the right direction."As is so often the case in modern football, Ajax's team was ripped apart after the final in 1996 and its star players departed for Europe's biggest clubs.Within three years of that second final in Rome, none of the players in the starting XI were still at the club.In fact, after the defeat against Juventus, Davids would become one of Europe's first high-profile players to benefit from the Bosman ruling, moving from Ajax to AC Milan. That Davids sees Wednesday's final against Manchester United as the perfect springboard for the current crop of young stars to reach a bigger club is perhaps reflective of his own experience in an Ajax shirt.Met de sfeer zit het wel goed in de fanzone in Stockholm! π#UELfinal #ajaman pic.twitter.com/PiDAhKmWwIβ AFC Ajax (@AFCAjax) May 24, 2017
"It's always an opportunity if you're so young and you're already playing a final -- you know that the chances of getting an opportunity abroad is very high," he says."So the next step is to evaluate if you're ready or not and which team it's going to be. They (the team) have done very well, but I think that a couple of players still need time to develop."The weight of expectation in Wednesday's final is firmly on the shoulders of Jose Mourinho and his Manchester United players.Having conceded, somewhat bizarrely, several months ago that finishing in the Premier League's top four was out of reach, winning the Europa League final now provides the only route for Mourinho into next season's Champions League.But while the Portuguese has more than 15 years experience managing in European competition, 2016-17 has provided Ajax coach Peter Bosz with his first foray into Europe.Having taken over at the start of the season, Bosz initially struggled to implement his philosophy onto this young team, but a resurgence in the second half of the season saw Ajax run Feyernoord close to the Eredivisie title and qualify for a first European final in more than 20 years.JUST WATCHEDFootball star discusses Europa League finalReplayMore Videos ...MUST WATCHFootball star discusses Europa League final 02:36While Davids believes Ajax should still be wary of United's star players, he is convinced they have nothing to be afraid of."It's definitely going to be very hard, but I've seen United play so far this season and I was definitely not impressed -- absolutely not impressed," he says."Even last week when I saw the game (against Southampton), they didn't look like Man United. So that definitely gives Ajax a big chance to win, as does Ajax's style of play."But on the other hand, they still have two or three players than can decide a game in a second."This Ajax team may not boast the same star names as their predecessors, but a win will go a long way to finally placing the club back on the European map.
| 0
|
If your Facebook wall offers you any horror videos that claim to be of a real ghost spotted, don't dare to click on them, as it may be hoaxes, malwares or scams contained within which are the real horror for the online users.
We have seen a lot of Facebook scams spreading through the Facebook timeline in wild that encourages users to click on it and fall victim, and this time some new horror scam campaign is going viral on Facebook.
Christopher Boyd from the security firm Malwarebytes has discovered an epidemic of hoaxes making their way around Facebook with paranormal themes, including:
Alleged footage of an "actual" ghost attack
a video featuring the Aswang that is described as "a mythical shape-shifting were-dog/vampire/terrifying thing from the Philippines"
a video of Mermaids claiming they are back!
Video of a huge great white shark tearing apart a sea captain.
Facebook has become one of the most popular social networking website with more than one billion active users this year and daily hundreds of people join the networking website to connect with new friends and reconnect with their old friends.
But, with the increase in various scams on Facebook to target users, it became very clear that not only does the social networking platform provide special opportunities for people to connect and share information; it also serves as a great and useful platform for scammers to spread malware or virus infections or redirect users to the sites of their own choice.
Once again scammers have targeted Facebook users and encouraging them to open the scammed video and once clicked, Facebook users are either asked to download or install updates to the video players, but actually these installations will lead to successful malware installation to the users system.
According to Malwarebytes, the ghost attack scam video will led users to the install PUP.Optional.InstallBrain.A, the Aswang prompted unsuspecting Facebook users to download "scan your PC" malware, the mermaids led to an iLivid install that was actually PUP.Optional.Bandoo, whereas the shark brought users to pages filled with spammy surveys and downloads.
"That concludes our spooky train ride through a mid-May haunted house of doom. Please keep your hands inside the cart until the gates have opened, and avoid clicking on fake Facebook videos at the gift counter," Christopher Boyd of Malwarebytes wrote.
We have seen various suspicious posts on Facebook, like the recent "Facebook Security Warning!!! Do this before your account gets deactivated!" scam that threatens users with account deactivation if they don't register it again, and "See your Friend's naked video", an app offering you a chance to see who has viewed your Facebook profile, and many more. Sometimes these scams are very obvious and easily avoidable, but many times they are irresistible and easy to fall for.
So, if you are served with any such suspicious post or any other suspicious link, do not click on it, no matter it's from your closest friend.
| 1
|
London (CNN)A 9-year-old girl who died after an asthma attack is thought to be the first person in the world to have air pollution listed as a cause of death in a landmark coroner's ruling.Ella Kissi-Debrah lived in Lewisham, southeast London, near one of the UK capital's busiest roads, the South Circular. She died in hospital in February 2013 after suffering a cardiac arrest from which she could not be resuscitated, the coroner reported on Wednesday.The girl suffered from severe asthma that caused episodes of cardiac and respiratory arrest, and frequent emergency hospital admissions over three years.Her medical cause of death was listed as acute respiratory failure, severe asthma and air pollution exposure. The coroner's conclusion was that Ella "died of asthma contributed to by exposure to excessive air pollution."Ella, who died in February 2013, is thought to be the first person in the world to have air pollution listed as a cause of death.The charities Asthma UK and the British Lung Foundation said Ella was the first person in world history to have air pollution listed as a cause of death on her death certificate.Read MoreAssistant coroner Philip Barlow said that Ella's mother had not been given information about air pollution and asthma that could have led to her take steps which "might" have prevented her daughter's death, according to PA Media."Air pollution was a significant contributory factor to both the induction and exacerbation of her asthma," said Barlow as he gave his conclusions at Southwark Coroner's Court after a two-week inquest.New EPA rule could make it more difficult to limit air pollution"During the course of her illness between 2010 and 2013 she was exposed to levels of nitrogen dioxide and particulate matter in excess of World Health Organization (WHO) guidelines.""The principal source of her exposure was traffic emissions," he said, according to PA.Barlow said there was a failure in this period to reduce the level of nitrogen dioxide to within the limits set by EU and domestic law."We've got the justice for her which she so deserved," Ella's mother, Rosamund Kissi-Debrah, said after the ruling.But she added: "Also it's about other children still as we walk around our city of high levels of air pollution.""Her legacy would be to bring in a new Clean Air Act and for governments -- I'm not just talking about the UK government -- governments around the world to take this matter seriously," said Kissi-Debrah, reported PA."I still think there's a lack of understanding about the damage it does to young lungs, especially that are not truly formed."Ella's mother, Rosamund Kissi-Debrah, said her daughter got the justice she deserved.Kissi-Debrah said she would prefer to see a public awareness campaign about the damage air pollution can do "rather than a blame game."A previous inquest ruling from 2014, which concluded Ella died of acute respiratory failure, was quashed by the High Court following new evidence about the dangerous levels of air pollution close to her home, PA reported.London Mayor Sadiq Khan called it a "landmark moment" and praised Ella's mother for her "extraordinary" courage and years of campaigning."Toxic air pollution is a public health crisis, especially for our children," he said in a statement. "Today must be a turning point so that other families do not have to suffer the same heartbreak as Ella's family."Activists are fighting for a renewable future in Sub-Saharan Africa. Chinese coal projects threaten to dirty those plansA 2018 report by Stephen Holgate, a professor at the University of Southampton, found air pollution levels at the Catford monitoring station a mile from where Ella lived "consistently" exceeded lawful EU limits over the three years before her death, according to PA. "If we want a healthy generation to come into the world, we are going to have to clean up our environment," Holgate told a news briefing after the inquest.He said the health and medical profession must start "taking ownership of some of these problems" as they had with smoking."Our hearts go out to Ella's family who have fought tirelessly for today's landmark outcome," said Sarah Woolnough, chief executive of Asthma UK and the British Lung Foundation."Ella's legacy has firmly put the spotlight on the invisible dangers of breathing dirty air," particularly for those with asthma or lung diseases, she said, criticizing "inadequate air quality laws and policies.""Today's verdict sets the precedent for a seismic shift in the pace and extent to which the government, local authorities and clinicians must now work together to tackle the country's air pollution health crisis," she added.A UK government spokesperson said: "Our thoughts remain with Ella's family and friends."The spokesperson said the government was delivering a Β£3.8 billion plan to clean up transport, tackle NO2 (nitrogen dioxide) pollution and go further in protecting communities from air pollution, as well as setting "ambitious new air quality targets."
| 0
|
Story highlightsSuspect Darren Deon Vann, 43, was convicted of aggravated rape in 2009Indiana authorities have found seven women's bodies since Friday; Vann is in custodyThe suspect's confession led to six of the possible homicide victims, police sayVann has been charged with in the death of 19-year-old Afrikka Hardy (CNN)The investigation of a man suspected in the deaths of at least seven women in northwest Indiana could expand to other states and stretch back decades, authorities said.The Indiana-born Darren Deon Vann is a convicted sex offender from Austin, Texas, police said. Vann attacked a 25-year-old Hispanic female at an Austin apartment in December 2007, according to Jason Clark, Texas Department of Criminal Justice Public Information Office.He struck the victim several times, strangled and raped her, Clark said.Vann was convicted of aggravated rape in 2009 and after serving five years in jail, he left for Indiana in July 2013, police said.Read MoreBefore his release from prison, Vann was registered as a sex offender in the state of Texas, but informed prison officials that he would be moving to Gary, Indiana, according to Clark. Texas officials alerted Lake County, Indiana, that Vann would be moving there and to their knowledge, he did register as a sex offender in Indiana, Clark said. Darren Vann led authorities to several bodies in Indiana, police say.Afrikka Hardy, 19, was the first woman found, on Friday, according to authorities.Anith Jones, 35, of Merrillville, was one of the victims, a mayor's spokeswoman says.Up to this point, Darren Deon Vann has only been charged in the death of 19-year-old Afrikka Hardy, whose body was found in a Motel 6 in Hammond over the weekend, Hammond Police Chief John Doughty said.But officials in the neighboring city of Gary say there's much more to this case."The initial murder investigation led to the confession of six other murders committed by Vann with those bodies being recovered in the city of Gary in abandoned structures," a statement said.All of the bodies in Gary were found within 5 miles of each other.Vann cooperated, gave police descriptions and accompanied officers to certain locations, the chief said.Asked why Vann chose to cooperate, Doughty said he wanted to cut a deal with prosecutors but didn't provide further details."It was just something he wanted to do. That's all I can say," he said.Gary Mayor Karen Freeman-Wilson echoed the notion that Vann had helped with the investigation."He certainly was cooperative. He led (police) to the locations of these bodies," she said. "Whether he was eager or not, I'm not in a position to say that."Doughty stopped short of calling Vann a suspected serial killer, but left open the possibility if police are able to connect the convicted sex offender to any of the six women found in Gary over the weekend."If we directly attach him to it, we can make that assumption," he said, adding that Vann's statements lead authorities to believe there are "possible other victims." Some cases may date back 20 years, based on what Vann has told police, said Doughty.Gary Police Chief Larry McKinley said news of the killings and a possible serial killer has left the community scared."It's put the community of Gary on heightened alert," he said. "Any time you have this type of crime that happens in the city, in any city, there is some fear."Vann has a recordRecords show Vann was arrested on unspecified charges while living in Cherry Point, North Carolina, in 1993.JUST WATCHEDMan confesses to murdering 7 womenReplayMore Videos ...MUST WATCHMan confesses to murdering 7 women 02:35He was convicted of aggravated rape in 2009 from a 2007 case, the Austin Police Department said in a statement. After serving five years in jail, he left for Indiana in June 2013, police said.Vann is not a registered sex offender in Austin.The police department there said detectives would be conducting a review of potentially related cases, asking anyone with information to contact its missing person and homicide cold case units.Vann also had a conviction in Lake County, Indiana, that was "not in the sex offender category," Freeman-Wilson said.Court records show Vann was accused of breaking and entering and intimidation in 2004.Vann had registered his sex offender status in Indiana and authorities made one of their regular checks with him in September.Text messagesIt was a string of text messages that lead police to Vann, Doughty said.Vann, 43, hired a prostitute through the backpage.com site serving Chicago and arranged a Friday meeting at a Motel 6 in Hammond with Hardy, the chief said. The person who arranged the meeting, whom Doughty described only as "a facilitator," later texted Hardy and received "suspicious texts" she believed were from Vann, the chief said. She and another person went to the motel to check on Hardy, according to a probable cause affidavit. They found her body in a bathtub and signs of a struggle in the motel room.Using a phone number provided by the facilitator, police electronically tracked Vann down, the chief said. Vann told police he "messed up" and expressed surprise that he was found so quickly, Doughty said."He admitted his involvement in the Hammond incident" and began leading police to other bodies in Gary, Doughty said.Seven women totalPolice found three of the bodies at three abandoned houses in Gary early Sunday morning. Later that night, they found three more bodies -- one at a new location and two at one of the places where bodies were found earlier Sunday, Doughty said. Hardy and three other women have been identified. Doughty and the Lake County Coroner's Office identified two of the women as Teaira Batey, 28, and Christine Williams, 36. Chelsea Whittington, a spokeswoman for Gary Mayor Karen Freeman-Wilson, identified the other two as Hardy and Anith Jones, 35, of Merrillville, who had been missing since October 8. Hardy had recently moved back to Indiana from Colorado, after graduating from high school and living in Aurora, Colorado, for 5 years with her mother Lori Townsend."I can't tell her I love her anymore. I can't give her hugs. I can't give her kisses," she told CNN affiliate WLS. "She was supposed to come home for Thanksgiving." In an interview with affiliate KDVR, Townsend called Hardy her "rock.""She was my best friend. She was my everything, Townsend said. "When I didn't have anything, she was all I had."Batey's boyfriend, Marvin Clinton, said her death leaves a big hole. The couple have a 2-year-old son."That's going to be the hardest part about it," he told WLS. "Because he loved his mama, and she loved him. It's devastating."The coroner's office said Williams and Hardy were strangled to death. The coroner listed two of the Jane Does as homicides but didn't elaborate on the cause of death. Doughty declined to say how the other five women died.As for a motive, Doughty told reporters, "I don't have a specific reason he does this."CNN's Poppy Harlow, Chad Weaver, Miguel Marquez, Marina Carver, Chuck Johnston, Ronni Berke and Joe Sutton contributed to this report.
| 0
|
During a CBS Interview show "60 Minutes", The National Security Agency (NSA) officials claimed that China has developed a BIOS based malware that can remotely destroy any computer.
Obviously NSA is struggling to repair its image and in an effort to justify their extensive Surveillance programs, The NSA Director General Keith Alexander and Information Assurance Director Debora Plunkett made a number of claims.
During that interview NSA officials said that they had foiled a malware attack that could have taken down the U.S. economy.
"One of our analysts actually saw that the nation state had the intention to develop and to deliver, to actually use this capability to destroy computers," Plunkett said.
They have mentioned that this malware was distributed via social engineering and targeted emails, although the NSA director mentioned that their researchers worked with computer manufacturers and able to close the respective vulnerability.
"This is the BIOS system which starts most computers. The attack would have been disguised as a request for a software update. If the user agreed, the virus would've infected the computer." he added.
"Think about the impact of that across the entire globe. It could literally take down the U.S. economy." (BULLSHIT)
If this Malware was intentionally born to threat U.S Economy, then what about DNS Changer malware or Zeus banking Trojan or infomous CryptoLocker ransomware that extensively spread across USA? So, Why NSA's Surveillance programs are failed to defend us from similar known threats ?
Complete Interview Video:
The BIOS malware is not new in the cyber world, and really not a big threat, but if NSA seriously justifying their Surveillance program by saying that this so called BIOS malware was one of the biggest threat they has taken down, then LET ME LAUGH. (Score Card = Snowden : 3, NSA: 0)
| 1
|
(CNN)Inspired by a CNN investigation that revealed law enforcement agencies nationwide improperly destroyed rape kits, a Georgia lawmaker introduced legislation Wednesday aimed at preventing that from happening in his state. "We have an obligation, if and when we find the perpetrator of a sex crime, that we bring cases. And we do that with all the evidence possible to win," said Rep. Scott Holcomb, a former prosecutor. CNN's investigation, "Destroyed," surveyed more than 200 police departments and sheriff's offices around the country and found that 25 agencies in 14 states trashed rape kits in unsolved reported sex crimes while the statutes of limitations were still running. The destruction followed flawed and incomplete investigations and most kits were never tested for DNA. The practice of destroying kits was routine and occurred with little to no oversight, CNN found. While Georgia and other states have grappled with backlogs of untested kits, the destruction of that evidence is a more fundamental crisis. The kits are gone and can never be used to lock up a rapist or exonerate the wrongfully convicted. Holcomb's bill requires that any investigating agency maintain evidence containing biological material for 50 years or the length of the statute of limitations, whichever is greater. Read MoreThat mirrors the federal government's guidance. The National Institute of Justice recommends maintaining rape kits in "uncharged or unsolved reported cases" for at least 50 years or the length of the statute of limitations. In Georgia, there is no statute of limitations for rape, aggravated sodomy and aggravated sexual battery as long as the suspect remains unknown. If the suspect is known, the statute of limitations is 15 years. DeKalb County District Attorney Sherry Boston applauded Holcomb's legislation. The challenge of investigating sexual assault cases, she said, is that law enforcement may have an offender's DNA and know that the same profile has turned up at other crime scenes "but it may take decades for that person to actually be identified." Many rapists are serial offenders, so when kits are destroyed, the chance to use the evidence to identify suspects and link them to multiple attacks is lost. Prosecutions are also put at risk when defendants cannot exercise their right to test original evidence used against them in court. Trashing rape kits, dozens of experts told CNN, endangers public safety. An example illustrating the power of preserving rape kits -- even beyond the statute of limitations -- is the case of the Golden State Killer who terrorized California in the 1970s and '80s. Police used DNA from rape kits to help identify Joseph James DeAngelo, who was arrested last April. He has been charged with multiple counts of murder, some involving other offenses related to rape, robbery and burglary.In Georgia, rape kit destruction is unknownIn CNN's investigation, reporters concluded that since 2010, at least 400 rape kits have been destroyed in unsolved cases while prosecutions were still viable. The number is likely higher. That's because there are an estimated 17,000 law enforcement agencies in the United States; CNN surveyed 207. In Georgia, CNN surveyed three police departments: Atlanta Police Department, Hapeville and Lake City Police. Each said they had not destroyed rape kits. (See how CNN chose each department it surveyed) There are 450 law enforcement agencies in Georgia with full-time employees, according to the FBI. The heads of Georgia's sheriffs and police organizations told CNN this week that they don't know whether agencies have destroyed or currently destroy rape kits. Frank Rotondo, executive director of the Georgia Association of Chiefs of Police, and Terry Norris, who heads the Georgia Sheriffs' Association, said they support keeping rape kits for the length of the statutes of limitations. They warned, however, that some agencies may complain they don't have enough space in their evidence rooms to store rape kits for 50 years. The kits are smaller than shoeboxes, they acknowledged, and smaller agencies would likely have few kits.Despite the perceived challenges, both were optimistic about working with Holcomb to do what is best for the safety of all Georgians."My initial response is to support [the bill] if it will help prosecute a case. It's a good idea and we ought to do it," said Norris. Police chief: 'No question' kits should be keptGeorgia would not be the first state to enact legislation requiring the maintenance of rape kits in unsolved cases. Missouri passed a law last year requiring that they be kept for 30 years in cases that have not been adjudicated. Idaho requires that rape kits tied to felony cases be preserved for 55 years. Idaho state Rep. Melissa Wintrow fought hard a couple years ago to pass that bill. "I'm happy to talk to anyone in Georgia about this issue because, in my experience, this is about educating folks," she said. "Rape kits don't take up a lot of space. The pushback I saw is when the counties feel like the state is making these laws without consulting them or giving them funding to help them carry out the law."Norris and Rotondo said that any bill that is passed must come with mandated funding. Holcomb said he supports state funding."I understand that many agencies are under-resourced and that has to be addressed, they have to be helped," Holcomb said. "We all have to come together on this."LaGrange, Georgia, Police Chief Louis Dekmar told CNN that the solution may lie in removing the responsibility of maintaining kits from some of the smaller agencies. Dekmar is the recent past president of the International Association of Chiefs of Police, which for two decades has issued best practices in sex crimes investigations.He'd like to see regional storage centers established across the state that meet the standards necessary to preserve, track and secure DNA evidence. And no matter what happens with the legislation, he said, it's got to have teeth. The law should detail some mechanism for oversight, entice agencies with incentives to follow through and spell out punitive measures if they don't."There should be no question about storing these kits, and I'm not sure we shouldn't be keeping them past the statute of limitations," Dekmar said. "What is the resistance? Tell me what that really is?"Dekmar noted that there is no time limit to prosecute murder in Georgia and there's been no opposition to maintaining evidence in those cases.
| 0
|
Over a billion Bluetooth-enabled devices, including smartphones, laptops, smart IoT devices, and industrial devices, have been found vulnerable to a high severity vulnerability that could allow attackers to spy on data transmitted between the two devices.
The vulnerability, assigned as CVE-2019-9506, resides in the way 'encryption key negotiation protocol' lets two Bluetooth BR/EDR devices choose an entropy value for encryption keys while pairing to secure their connection.
Referred to as the Key Negotiation of Bluetooth (KNOB) attack, the vulnerability could allow remote attackers in close proximity to targeted devices to intercept, monitor, or manipulate encrypted Bluetooth traffic between two paired devices.
The Bluetooth BR/EDR (Basic Rate/Enhanced Data Rate, also known as "Bluetooth Classic") is a wireless technology standard that has typically been designed for relatively short-range, continuous wireless connection such as streaming audio to headsets or portable speakers.
From the security point of view, the core specification of Bluetooth BR/EDR protocol supports encryption keys with entropy between 1 and 16 bytes/octets, where the higher value means more security.
However, researchers find that the entropy negotiation, which devices perform over the Link Manager Protocol (LMP), is neither encrypted nor authenticated, and can be hijacked or manipulated over-the-air.
How Does Bluetooth BR/EDR Key Negotiation Vulnerability Work?
The newly discovered Bluetooth vulnerability could allow a remote attacker to trick two targeted devices into agreeing on an encryption key with only 1 byte (8 bits) of entropy, eventually making it easy to brute-force the negotiated encryption keys.
"For example, assume that there are two controllers attempting to establish a connection: Alice and Bob. After authenticating the link key, Alice proposes that she and Bob use 16 bytes of entropy. This number, N, could be between 1 and 16 bytes. Bob can either accept this, reject this and abort the negotiation, or propose a smaller value," explains an advisory published by the CERT Coordination Center.
"Bob may wish to propose a smaller N value because he (the controller) does not support the larger amount of bytes proposed by Alice. After proposing a smaller amount, Alice can accept it and request to activate link-layer encryption with Bob, which Bob can accept."
However, by exploiting the reported vulnerability "an attacker, Charlie, could force Alice and Bob to use a smaller N by intercepting Alice's proposal request to Bob and changing N."
Once decrypted, the attacker can passively capture encrypted messages being transmitted over the Bluetooth traffic, decrypt the ciphertext and inject valid valid ciphertext, all in real-time and stealthy.
Besides this, it is also important to note that, for an attack to be successful:
both Bluetooth devices must be establishing a BR/EDR connection,
both Bluetooth devices must be vulnerable to this flaw,
the attacker should be able to block direct transmissions between devices while pairing, and
the attack must be performed during negotiation or renegotiation of a paired device connection; existing sessions cannot be attacked.
Moreover, the official advisory released by Bluetooth.com also says, "Since not all Bluetooth specifications mandate a minimum encryption key length, it is possible that some vendors may have developed Bluetooth products where the length of the encryption key used on a BR/EDR connection could be set by an attacking device down to a single octet."
Affected Vendors/Software/OS and Patch Updates
This vulnerability was discovered by a team of researchers including Daniele Antonioli from SUTD, Dr. Nils Ole Tippenhauer from CISPA and Prof. Kasper Rasmussen from the University of Oxford.
"We evaluate the KNOB attack on more than 14 Bluetooth chips from different vendors such as Intel, Broadcom, Apple, and Qualcomm. All the chips accept 1 byte of entropy except the Apple W1 chip that accepts (at least) 7 bytes of entropy," the researchers said in a detailed paper [PDF] released yesterday.
To mitigate KNOB attack, the maintainers of the Bluetooth specifications have strongly recommended device manufacturers and software vendors to enforce a minimum encryption key length of 7 octets for BR/EDR connections.
To patch this vulnerability, various affected vendors have already started releasing security updates for their operating systems, firmware, and software, including:
Microsoft for Windows
Cisco for IP Phones and Webex
Google for Android
Apple for macOS, iOS, and watchOS
BlackBerry
| 1
|
In October, we had reported that the creator of the infamous Blackhole exploit kit was arrested in Russia and now the Russian Ministry of Internal Affairs has also confirmed that 'Paunch', the mastermind behind infamous BlackHole exploit kit, along with Gang of 12 other criminals were arrested on October 4, 2013 in Russia.
Russian security firm Group-IB has disclosed that it has assisted the police in the investigation of Paunch, who was residing in the city of Togliatti.
27-years old 'Paunch' is the author of the notorious BlackHole and Cool exploit kits that are today popular among cybercriminals and costs $500 to $700 a month in for buyers.
Cool and Blackhole exploit kits are the ready-made hacking tools for easily serving malware from compromised sites, in result to install malware on users' computers using exploits of zero-day vulnerabilities in latest web browsers. The general damage caused by the criminal gang is estimated around US $2.13 million.
'At present, there are reports that BlackHole kingpin, 'Paunch' , has more than a thousand customers. It is known that 'Paunch' was earning $50,000 per month from his illegal activity and had a white Porsche Cayenne as his personal car.' Group-IB said in a press release.
He also created Crypt.Am β an anonymous anti-virus simulator, which provided services for protection of malware against detection by antivirus programs.
| 1
|
"Ashley Madison was not hacked!"
This is what declared by John McAfee, former founder of antivirus software company McAfee.
So far everyone must be aware of Ashley Madison massive data breach. Last week, the hackers, who called themselves Impact Team, posted 10GB of personal data for tens of Millions of its customers, including their names and email addresses.
Frequently followed by another leak, where hackers released another 20GB of company's internal data, including personal emails from the CEO of Ashley Madison parent company Avid Life, Noel Biderman, along with the source code for its website and mobile apps.
John McAfee: Ashley Madison is an Inside Job by a Woman
However, in a post published in the International Business Times, McAfee made a controversial statement saying, "Ashley Madison was not hacked," and claiming that the alleged data breach was "an inside job."
McAfee says Ashley Madison data was plundered by an ex-employee. A female ex-employee who worked for Toronto-based Avid Life Media, the parent company of the adultery website Ashley Madison.
The reason, no doubt, sounds good enough, but I wonder where he get this idea from. Snowden?
Conclusions by McAfee
McAfee claims that he discovered this by pouring over the 40-gigabytes of hacked database leaked so far by the alleged hacking group, which calls itself the Impact Team.
Data analysis has led him to draw three conclusions:
The hack was a solo affair
The breach was perpetrated by an insider
A woman is behind it
Evidences by McAfee to Prove his Conclusions
To prove his first claim that the hack was a solo affair, McAfee provided the details in his July post on IBTimes. He wrote, "I cannot tell you how I know, but the simple published data should help point to this fact."
Here's what he says for his conclusion that the hack was perpetrated by an insider:
How did I discover that it was an inside job?
From the [leaked data], it was clear that the perpetrator had intimate knowledge of the technology stack of the company...The data contains actual MySQL database dumps. [It] is not just someone copying a table and making into a .csv file. Hackers rarely have full knowledge of the technology stack of a target.
Now at last, Why a Woman?
McAfee says the attacker used the words like "scumbags" and "cheating dirtbags" when referring to men, and her mentioning of someone who "spitefully" joined Ashley Madison the day after Valentine's Day, as decidedly feminine.
"If this does not convince you then you need to get out of the house more often," McAfee says.
Wait what? Is he saying me to get out?
Okay, that is an understatement.
Well, we know McAfee is a bit of a character in the cyber security world. He always remains in controversies, like for murdering his neighbor, for claiming to be the target of assassins or for being arrested for driving while under the influence.
However, on the other side, McAfee is a well-established name in cyber security, an innovator who made Millions through an anti-virus software company named after him.
For the hacker(s) part, Avid Life Media is offering a cash reward of up to $500,000 for information leading to the arrest of the hackers who breached the data of Ashley Madison.
Well, The Hacker News lets you draw your own conclusions. So let us know your thoughts about the reasons given by John McAfee. Hit the comments below.
| 1
|
Story highlightsRussia plans to take custody of Ukraine's combat dolphins, news agency reportsDolphins are a crucial part of open-water securityFrom a military perspective, they're effective at highlighting dangers on the sea floorJust when you thought this divorce couldn't get any messier.Weeks after Russia annexed Ukraine's Crimea region, it plans to take custody of dolphins in the nation as well.Not just any dolphins. These highly trained military mammals detect risks such as sea mines or enemy scuba divers trying to slip through. Sea mines are sophisticated weapons that can sink ships and other watercraft."The combat dolphin program in the Crimean city of Sevastopol will be preserved and redirected toward the interests of the Russian navy," state-run Russian news agency RIA Novosti reported Thursday.Dolphins are a crucial part of open-water security. They detect sounds and objects in murky waters that human beings can't, making them uniquely effective at highlighting dangers on the sea floor.JUST WATCHEDUkraine's right sector leader killedReplayMore Videos ...MUST WATCHUkraine's right sector leader killed 03:09JUST WATCHEDObama: Russia stands aloneReplayMore Videos ...MUST WATCHObama: Russia stands alone 01:57Harnessing the military power of animal intelligenceUkraine was using outdated military equipment for the dolphin program and planned to disband it next month, RIA Novosti said.The Ukraine Defense Ministry told CNN that the nation has an ocean dolphin facility, but declined to provide details, saying they're classified.The dolphin program dates to the 1960s, when Russia and Ukraine were part of the Soviet Union, but was handed over to Kiev after independence.The U.S. Navy in San Diego also trains dolphins and sea lions to help protect its assets and find dangerous objects underwater.Tensions between Moscow and Kiev have escalated since Russia reclaimed the Crimea region after a referendum this month that overwhelmingly supported the annexation. The United States and its allies have pledged to isolate Russia for its actions.Ukraine also has combat sea lions that operate under the same base. It's unclear whether they'll be barking allegiances to Moscow or Kiev.READ: Funeral for 'Robin Hood' draws Ukraine nationalists -- paramilitary to pensionerREAD: Can Obama save the day?
| 0
|
Story highlightsSamuel Eto'o insists he moved to Anzhi in Russia for footballing reasons not moneyEto'o was criticized for his shock summer transfer from Inter Milan to the unknown Dagestan side Eto'o wants to make Anzhi and the Russian League a major force in world footballHis side on the cusp of the Russian League playoffs with two games to go in regular season Cameroon star Samuel Eto'o has rejected suggestions he moved to Anzhi Makhachkala purely for the money and instead sees himself as a trailblazer to promote football in Russia.Eto'o's summer transfer from Italian giants Inter Milan to the little-known side from the Russian province of Dagestan made headlines, with many believing a lucrative three-year contract, reportedly to make him the highest paid footballer in the world, was the motivation.Eto'o told CNN that such speculation did not bother him and was wide of the mark."I don't care what people think," he said. "I think all of us want to work and get paid what we are worth. Anzhi made an offer, which was at the same level as my talent, and they are paying me what they think I am worth."At 30, Eto's is still at the peak of his game, with three Champions League titles, two with Barcelona and the latest with Inter, but he was persuaded by Anzhi's billionaire oil tycoon owner Suleiman Kerimov that he could replicate that success in Russia."He (Kerimov) told me he wanted to build a big team and he had thought about me as someone who could lead that project. "It touched me because I had only seen myself as a professional player, not a project leader, and this new challenge was important to me. I was offered a great deal and we reached an arrangement quite quickly," he admitted.Reports of an annual salary of nearly $30 million have not been confirmed, but with big money coming into the league and the World Cup set to be staged there in 2018, Eto'o said that other star players were being attracted to Russia."I have to tell you that practically every day I get a (text) message or a phone call from a high-profile player who wonders whether there are opportunities to come here," he revealed.Blog: Has tinkerman Ferguson tinkered too far?Anzhi's other high-profile player is 38-year-old Brazilian star Roberto Carlos, who is the club captain.Eto'o joined the club at the back end of the Russian season and has scored four goals, including the opener at the weekend against CSKA Moscow in a 5-3 defeat.That left his side in eighth place with just two games in the 2011 regular season remaining. For Eto'o and his team they will be crucial as they need to ensure they retain that spot to qualify for the crucial playoffs which begin next March and which decide European qualification for the 2012/13 season.He will be certainly hoping that some of the "Mourinho magic", he played under the Portuguese at Inter, can rub off on his teammates."Mourinho is one of the best managers with whom I have worked. "I had a chance not only to have him as a coach but as a colleague, a friend, a big brother. I had a chance to learn from him and he was open to receiving advice from me as well even though I think he knew it all !" said Eto'o.
| 0
|
A security researcher responsibly disclosed vulnerabilities in the poorly secured web domains of a Florida county elections, but he ended up in handcuffs on criminal hacking charges and jailed for six hours Wednesday.
Security researcher David Michael Levin, 31, of Estero, Florida was charged with three counts of gaining unauthorized access to a computer, network, or electronic instrument.
On 19 December last year, Levin tested the security of Lee County website and found a critical SQL injection vulnerability in it, which allowed him to access site's database, including username and password.
Levin was reportedly using a free SQL testing software called Havij for testing SQL vulnerabilities on the state elections website.
According to Levin, he responsibly reported vulnerabilities to the respective authorities and helped them to patch all loopholes in the elections website.
Video Demonstration of the Elections Website Hack
Meanwhile, Levin demonstrates his finding via an interview, but he published that video interview on YouTube in late January when authorities had already patched the reported flaws.
Levin recorded the video together with Dan Sinclair, detailing how a simple SQL injection launched against the election website led to the theft of data from the Elections' database that had no encryption at all.
As proof of concept, Levin showed him entering the username and password of Sharon Harrington, the county's Supervisor of Elections, that allowed him to gain control of a content management system (CMS) used to control the official website of Florida's Office of Elections.
However, this video was misunderstood and used as an evidence by the Florida Department of Law Enforcement officials to backfire Levin.
Almost two weeks after the video was posted on YouTube, Florida police raided Levin's house and seized his computers.
Levin was arrested and charged with allegedly breaking into a couple of elections websites in Florida. He spent six hours in jail last Wednesday before being released on a $15,000 bond, the Florida Department of Law Enforcement officials said.
Though Florida Police claimed Levin never asked for permission prior to performing his penetration testing on any state-owned server, Sinclair said that Levin was the one who helped the authority fix the security holes in the website.
"He took usernames and passwords from the Lee County website and gained further access to areas that were password-protected," FDLE Special Agent Larry Long told the Herald Times. "The state statute is pretty clear. You need to have authorization before you can do that."
However, Sinclair reached out to The Hacker News, revealing that Mr. Levin contacted the authorities while performing his research.
"The FDLE came to Dave, and then to me about the case," Sinclair said. "We believed they were investigating the holes in the servers and the Gross Negligence. We both gave them the only information they have now that is accurate. While interviewing me, and Agent Chris Tissot kept cutting me off when I answered his questions."
"I quickly realized Tissot was not investigating any of the claims. His sole goal was to find an obscure law they could hit Dave with, to discredit the information Dave went public with (after he helped them fix the holes)."
At this point it seems that federal agents are not adequately investigating the matter, rather they are trying to prove Levin culprit in this whole event.
| 1
|
The UK's National Crime Agency has given out an urgent national alert that a mass spamming event targeting 10 million UK based email users with a piece of malware called CryptoLocker that encrypts your files and then demands a ransom money to restore access.
The agency has said that the people who are majorly receiving targeted spam emails that appear to be from banks and other financial institutions.
Each email comes with attachments that look like files such as a voicemail, fax, an invoice or details of a suspicious transaction, but is in fact Cryptolocker Ransomware malware that encrypts the user's computer. The public should be aware not to click on any such attachment.
On Infected system, The Cryptolocker Malware screen will then display a countdown timer that demands the payment of 2 Bitcoins in ransom, worth around Β£536, for the decryption key.
The NCCU is trying to trace that who is sending the emails. "We are working in cooperation with industry and international partners to identify and bring to justice those responsible and reduce the risk to the public." Lee Miles, Deputy Head of the NCCU says.
Bitdefender Labs, an anti-virus company found that in the week beginning Oct. 27, more than 12,000 computers were infected and before the criminal group seemed to be exclusively targeting computers in the U.S.
The UK crime agency said it advised users not to pay the ransom and warned that even if it were paid, there was no guarantee the encryption key would be turned over. Anyone whose computer is infected should report it to www.actionfraud.police.uk.
NCA has put out a few recommendations to avoid infection including, files should be backed up routinely and preserved off the network.
Read more detailed articles on Cryptolocker Ransomware:
Cryptolocker Ransomware makes different Bitcoin wallet for each victim
CryptoLocker Ransomware demands $300 or Two Bitcoins to decrypt your files
CryptoLocker developer launches Decryption Service website; 10 Bitcoins for Decryption Keys
| 1
|
(CNN)Eddie Howe has been named Newcastle United's new Head Coach on a two-and-a-half-year deal until the summer of 2024, the English Premier League club announced in a statement on Monday.Howe is the first manager to be appointed by the club's new owners following last month's Saudi Arabia-backed takeover of the Geordie team.The Englishman replaces Steve Bruce who was sacked by mutual consent in October having failed to win a game this season."It is a great honour to become head coach of a club with the stature and history of Newcastle United," Howe said in the statement. "It is a very proud day for me and my family."This is a wonderful opportunity, but there is also a lot of work ahead of us and I am eager to get onto the training ground to start working with the players.Read More"I would like to thank the club's owners for this opportunity and thank the club's supporters for the incredible welcome they have already given me. I am very excited to begin our journey together," Howe added.Howe's first game in charge will be on November 20 when Newcastle host newly-promoted Brentford at St. James' Park.It's the 43-year-old's first managerial job since August 2020 when he left Bournemouth following the club's relegation from the English Premier League.Howe spent 11 years as a player at Bournemouth before taking over the managerial reins of the club.He managed Bournemouth across two spells guiding the club from the fourth tier of English football all the way to the Premier League, where they remained for five seasons.Howe is only one of a handful of managers ever to lead their team through all three divisions to Premier League promotion.'He is a great fit for what we are trying to build here'Newcastle United co-owner Amanda Stavely said: "We have been incredibly impressed by Eddie through what has been a rigorous recruitment process."As well as his obvious achievements with AFC Bournemouth, where he had a transformational impact, he is a passionate and dynamic coach who has clear ideas about taking this team and club forward."He is a great fit for what we are trying to build here. We are delighted to welcome Eddie and his staff to St. James' Park and very much look forward to working together towards our collective ambitions."The Englishman is familiar with Newcastle players Callum Wilson, Ryan Fraser and Matt Ritchie having worked with them during his time at Bournemouth.Howe takes over a Newcastle side who find themselves in the relegation zone and are the only team not to win a Premier League game this season.The club sit 19th in the table on five points -- six off of safety.
| 0
|
Microsoft has become the latest victim of to Cyber attack and confirm that small number of its computers, including some in its Mac software business unit, were infected with malware.
Microsoft added, malicious software used in a cyber attack is very similar to those experienced by Facebook and Apple recently. Microsoft gave few other details about the break-in, "We have no evidence of customer data being affected and our investigation is ongoing."
"During our investigation, we found a small number of computers, including some in our Mac business unit that were infected by malicious software using techniques similar to those documented by other organizations. We have no evidence of customer data being affected and our investigation is ongoing," Microsoft said.
"This type of cyber attack is no surprise to Microsoft and other companies that must grapple with determined and persistent adversaries," the company said.
Last week, Apple said its computers were attacked by the same hackers who targeted Facebook a week earlier and Facebook said it had traced a cyber attack back to China which had infiltrated employees' laptops.
| 1
|
In a coordinated International cyber operation, Europol with the help of international law enforcement agencies has taken down what it called "one of the longest-running malware families in existence" known as Andromeda.
Andromeda, also known as Win32/Gamarue, is an infamous HTTP-based modular botnet that has been around for several years now, and infecting computers with it's malicious intentions ever since.
The primary goal of Andromeda bot is to distribute other malware families for mass global malware attacks.
The botnet has been associated with at least 80 malware families, and in the last six months, it was detected (or blocked) on an average of more than 1 million machines per month.
Last year, law enforcement agencies took down the criminal infrastructure of the infamous Avalanche botnet in a similar massive international cyber operation. Avalanche botnet was used as a delivery platform to spread other malware families, including Andromeda.
While investigating into the Avalanche botnet, information obtained by the German authorities was shared with the Federal Bureau of Investigation (FBI) via Europol, which eventually helped the international agencies to tear down Andromeda just last week.
In a joint operation, the international partners took down servers and more than 1,500 web domains which were being used to distribute and control Andromeda malware.
"This is another example of international law enforcement working together with industry partners to tackle the most significant cybercriminals and the dedicated infrastructure they use to distribute malware on a global scale," Steven Wilson, the Head of Europol's European Cybercrime Centre (EC3), said.
"The clear message is that public-private partnerships can impact these criminals and make the internet safer for all of us."
Using sinkholing the now-seized domains, tactic researchers use to redirect traffic from the infected machines to a self-controlled system; authorities found over 2 million unique IP addresses from at least 223 countries associated with Andromeda victims with just 48 hours.
Further investigation also helped law enforcement authorities arrest a suspect in Belarus, who was allegedly involved in the Andromeda cybercrime gang.
Just last week, Europol seized more than 20,000 web domains for illegally selling counterfeit products, including luxury products, sportswear, electronics, pharmaceuticals and online piracy on e-commerce platforms and social networks in its fight against the online trade of counterfeit goods.
| 1
|
South Korea's state-run Korea Atomic Energy Research Institute (KAERI) on Friday disclosed that its internal network was infiltrated by suspected attackers operating out of its northern counterpart.
The intrusion is said to have taken place on May 14 through a vulnerability in an unnamed virtual private network (VPN) vendor and involved a total of 13 IP addresses, one of which β "27.102.114[.]89" β has been previously linked to a state-sponsored threat actor dubbed Kimsuky.
KAERI, established in 1959 and situated in the city of Daejeon, is a government-funded research institute that designs and develops nuclear technologies related to reactors, fuel rods, radiation fusion, and nuclear safety.
Following the intrusion, the think tank said it took steps to block the attacker's IP addresses in question and applied necessary security patches to the vulnerable VPN solution. "Currently, the Atomic Energy Research Institute is investigating the subject of the hacking and the amount of damage," the entity said in a statement.
The development comes following a report from SISA Journal, which disclosed the breach, alleging that the agency was attempting to cover up the hack by denying such an incident took place. KAERI attributed it to a "mistake in the response of the working-level staff."
Active since 2012, Kimsuky (aka Velvet Chollima, Black Banshee, or Thallium) is a North Korean threat actor known for its cyber espionage campaigns targeting think tanks and nuclear power operators in South Korea.
Earlier this month, cybersecurity firm Malwarebytes disclosed a wave of attacks undertaken by the adversary to strike high-profile government officials in the country by installing an Android and Windows backdoor called AppleSeed for amassing valuable information.
The targeted entities involved the Ministry of Foreign Affairs, Ambassador of the Embassy of Sri Lanka to the State, International Atomic Energy Agency (IAEA) Nuclear Security Officer, and the Deputy Consul General at Korean Consulate General in Hong Kong, with the aforementioned IP address used for command-and-control (C2) communications.
It is not immediately clear what VPN vulnerability was exploited to breach the network. But it's worth noting that unpatched VPN systems from Pulse Secure, SonicWall, Fortinet FortiOS, and Citrix have been subjected to attacks by multiple threat actors in recent years.
| 1
|
Adobe has missed dozens of vulnerabilities in Reader in this week's Patch Tuesday run according to Google engineers who reported the flaws. Sixteen vulnerabilities still affected the Windows and Mac OS X versions, while 31 critical and "trivially exploitable" bugs were found in the Linux application.
Of particular concern to Google's Mateusz Jurczyk and Gynvael Coldwind are bugs in Reader for Linux, although other issues affect versions for Windows and OS X. For the Linux version, which went completely unpatched, Adobe and Google have been working together to counter 14 "new unique crashes" and nine "test-cases" that were potentially exploitable for remote code execution.
When Adobe released a new version of Reader for Windows and Mac OS X earlier this week, it patched 12 vulnerabilities, but another 16 remained unpatched. Jurczyk and Coldwind decided to come forward with information on those flaws in the interest of user safety, as Adobe has no plans to issue additional out of band updates before 27 August.
"Considering that fixing the first twenty four crashes took twelve unique code fixes, it is expected that the remaining crashes might represent around eight more unique problems. Adobe plans to fix these remaining bugs and issue an update for the Linux version of Reader in an upcoming release," the Google researchers said.
Adobe released new versions of Adobe Acrobat, Reader, Shockwave, and Flash to patch security holes in those products as well.
Check out the details of the Microsoft and Adobe security bulletins to figure out which ones apply to you, and prioritize the patches that are most critical or have the greatest potential to impact your PCs.
| 1
|
Script kiddies and online criminals around the world have reportedly started exploiting NSA hacking tools leaked last weekend to compromise hundreds of thousands of vulnerable Windows computers exposed on the Internet.
Last week, the mysterious hacking group known as Shadow Brokers leaked a set of Windows hacking tools targeting Windows XP, Windows Server 2003, Windows 7 and 8, and Windows 2012, allegedly belonged to the NSA's Equation Group.
What's Worse? Microsoft quickly downplayed the security risks by releasing patches for all exploited vulnerabilities, but there are still risks in the wild with unsupported systems as well as with those who haven't yet installed the patches.
Multiple security researchers have performed mass Internet scans over the past few days and found tens of thousands of Windows computers worldwide infected with DoublePulsar, a suspected NSA spying implant, as a result of a free tool released on GitHub for anyone to use.
Security researchers from Switzerland-based security firm Binary Edge performed an Internet scan and detected more than 107,000 Windows computers infected with DoublePulsar.
A separate scan done by Errata Security CEO Rob Graham detected roughly 41,000 infected machines, while another by researchers from Below0day detected more than 30,000 infected machines, a majority of which were located in the United States.
The impact? DoublePulsar is a backdoor used to inject and run malicious code on already infected systems, and is installed using the EternalBlue exploit that targets SMB file-sharing services on Microsoft's Windows XP to Server 2008 R2.
Therefore, to compromise a machine, it must be running a vulnerable version of Windows OS with an SMB service expose to the attacker.
Both DoublePulsar and EternalBlue are suspected as Equation Group tools and are now available for any script kiddie to download and use against vulnerable computers.
Once installed, DoublePulsar used hijacked computers to sling malware, spam online users, and launch further cyber attacks on other victims. To remain stealthy, the backdoor doesn't write any files to the PCs it infects, preventing it from persisting after an infected PC is rebooted.
While Microsoft has already patched majority of the exploited flaws in affected Windows operating systems, those who have not patched are vulnerable to exploits such as EternalBlue, EternalChampion, EternalSynergy, EternalRomance, EmeraldThread, and EducatedScholar.
Moreover, systems that are still using end-of-life platforms like Windows XP, Windows Server 2003, and IIS 6.0, which no longer received security updates, are also vulnerable to the in-the-wild exploits.
Since it takes hackers roughly a few hours to download the Shadow Brokers dump, scan the Internet with the tool released on Monday, and deliver hacking exploits, researchers are expecting more vulnerable and unpatched computers to fall victims to DoublePulsar.
After this news had broken, Microsoft officials released a statement saying: "We doubt the accuracy of the reports and are investigating."
Meanwhile, Windows users who haven't applied MS17-010 by now are strongly advised to download and deploy the patches as soon as possible.
| 1
|
(CNN)The special election race in Ohio's 12th Congressional District between Republican Troy Balderson and Democrat Danny O'Connor appears to be going right down to the wire.A Monmouth University poll released Wednesday shows Balderson receiving 44% support and O'Connor pulling 43% with 11% of respondents saying they are undecided. That's a shift from a little over a month ago, when Monmouth found Balderson leading O'Connor by 10 points.Add CNN's 2018 elections calendarStay up to date on key election dates and other events, such as town halls and debates, as they get added throughout the year. Subscribe on your Google or Apple calendar. Tuesday's election in central Ohio is the final test for the parties to gauge where they are in advance of the November midterm elections.The poll comes just days before President Donald Trump heads to central Ohio on Saturday to stump for Balderson. The trip appears to be an attempt to fire up the Republican base, but Democrats close to O'Connor's campaign hope it will also spur Democratic excitement and turn off Republicans wary of Trump. The President's approval in the district stands at 46% with 49% saying they disapprove of his job performance.Independent voters look to be boosting O'Connor's prospects, backing the Democrat over Balderson by a 48% to 32% margin -- with 17% undecided. That's a swing from the 33% to 30% split in favor of Balderson in June, when 33% were undecided.Read MoreDemocrats also appear to hold an enthusiasm edge in the district, with 66% saying they have a high level of interest, up 22 points since June. That compares with 55% of Republicans who express a lot of interest, a 15-point gain.Overperformance by Democrats has been a key trend in special election contests since Trump's 2016 win. But the party has only scored one House special election victory in that time -- Conor Lamb's March win in western Pennsylvania.Democrat in Ohio special puts call for 'new leadership' at center of closing argumentDemocrats have compared the O'Connor race to Lamb and the Democratic candidate has told CNN that he sees similarities between what Lamb did and what he is trying to accomplish.For Republicans, it is all hands on deck, with the party sending in Trump to campaign for Balderson following a recent visit to the Buckeye State by Vice President Mike Pence.The suburban Columbus district has been held by Republicans, including current Ohio Gov. John Kasich, for more than three decades. In 2016, President Trump carried the district by 11 points.The Monmouth University Poll was conducted July 26 to July 31 among 512 voters in Ohio's 12th Congressional District for the August 7 special election. The results have a margin of error of +/- 4.3% points for the full sample.
| 0
|
A massive malicious email campaign that stems from the Necurs botnet is spreading a new ransomware at the rate of 5 million emails per hour and hitting computers across the globe.
Dubbed "Jaff," the new file-encrypting ransomware is very similar to the infamous Locky ransomware in many ways, but it is demanding 1.79 Bitcoins (approx $3,150), which much higher than Locky, to unlock the encrypted files on an infected computer.
According to security researchers at Forcepoint Security Lab, Jaff ransomware, written in C programming language, is being distributed with the help of Necurs botnet that currently controls over 6 million infected computers worldwide.
Necurs botnet is sending emails to millions of users with an attached PDF document, which if clicked, opens up an embedded Word document with a malicious macro script to downloads and execute the Jaff ransomware, Malwarebytes says.
Jaff is Spreading at the Rate of 5 Million per Hour
The malicious email campaign started on Thursday morning at 9 am and had peaked by 1 pm, and its system recorded and blocked more than 13 million emails during that period β that's 5 Million emails per an hour.
"Jaff targets 423 file extensions. It is capable of offline encryption without dependency on a command and control server. Once a file is encrypted, the '.jaff' file extension is appended," Forcepoint says.
The ransomware then drops a ransom note in every affected folder while the desktop background of the infected computer is also replaced.
The ransom note tells victims that their files are encrypted, but doesn't ask them for any payments; instead, it urges victims to visit a payment portal located on a Tor site, which is accessible via Tor Browser, in order to get decrypt their important files.
Once victims install Tor Browser and visit the secret site, there they are then asked for an astounding 1.79 BTC (about $3,150).
Separate research conducted by Proofpoint researchers indicated that the Jaff ransomware could be the work of the same cybercriminal gang behind Locky, Dridex, and Bart.
The security company said that the Raff ransomware campaign had affected users globally with primarily victim organizations in the United Kingdom and the United States, as well as Ireland, Belgium, Italy, Germany, the Netherlands, France, Mexico and Australia.
Massive Ransomware Attack Uses NSA's Windows Exploit
In separate news, another massive fast-spreading ransomware campaign is targeting computers at Hospitals, Banks, Telecom and Organisations across the globe today.
The ransomware, known as WanaCypt0r or WannaCry, is using NSA's Windows exploit, EternalBlue, which was leaked by Shadow Brokers hacking group over a month ago.
Within just hours this cyber attack has infected more than 60,000 computers in 74 countries.
How can you Protect yourself from the Jaff Ransomware?
To safeguard against such ransomware infection, you should always be suspicious of uninvited documents sent an email and should never click on links inside those documents unless verifying the source.
Check if macros are disabled in your Microsoft Office applications. If not, block macros from running in Office files from the Internet. In enterprises, your system admin can set the default setting for macros.
To always have a tight grip on all your important files and documents, keep a good backup routine in place that makes their copies to an external storage device that is not always connected to your PC.
Moreover, make sure that you run an active anti-virus security suite of tools on your system, and most importantly, always browse the Internet safely.
| 1
|
Story highlights The memorial is by turns emotional and humorous Dan Wheldon's teammates recall practical jokes He is remembered as a devoted family manThe two-time Indy 500 winner died October 16 after a crash in Las Vegas The racing sanctioning body IndyCar held a public memorial service, punctuated by laughter and tears, Sunday to celebrate the life of two-time Indianapolis 500 champ Dan Wheldon. Those at the memorial, held at Conseco Fieldhouse in Indianapolis, recalled Wheldon not only as a successful driver, but remembered his winning charm, his sense of humor, and his devotion to his family and his fans. Wheldon, 33, was near the back of a 34-car field at the Las Vegas Indy 300 on October 16 when he got mixed up in a crash that saw several cars spin out of control and burst into flames, spewing smoke and debris. He died of head injuries. "The victories and the accolades, they didn't define him," said IndyCar CEO Randy Bernard. "His strong character, his enthusiastic approach to life, and the love of family, friends and fans did. "There was a reason he was a fan favorite," Bernard said. "I'd see him go out of his way to shake a serviceman's hand, or sign a young man's autograph, or do that extra interview, or just joke around with the drivers. Dan loved life and it always showed."Featured on stage beside the speakers Sunday was a car Bernard said Wheldon had been testing. It had "cutting-edge enhancements that promised to move the sport of racing and automotive engineering forward." It also had additional safety features, testament to Wheldon's commitment to improving the sport and increasing safety for drivers, he said."He would want the drivers and the teams and the series to unite and to work together," Bernard said. "He'd want us to strive to make our sport safer."The memorial featured music from country artists Reba McEntire and The Band Perry. Wheldon's family was in attendance."It was a privilege for us to witness a young, carefree racer blossom into a true champion and a devoted family man," said one of Wheldon's managers, Mickey Ryan.JUST WATCHEDWheldon, wife got tattoos before crashReplayMore Videos ...MUST WATCHWheldon, wife got tattoos before crash 00:51JUST WATCHEDMax Mosley talks IndyCar safetyReplayMore Videos ...MUST WATCHMax Mosley talks IndyCar safety 03:53He recalled Wheldon partying all night after his first Indianapolis 500 win in 2005, then falling asleep while on hold waiting for an early morning radio interview. After his second win in 2011, he pledged to take his children to a Disney park, and dedicated the win to his mother, who was battling Alzheimer's disease, Ryan and manager Adrian Sussman said. The two issued a message of gratitude from Wheldon's family."They'd like you to know how much they appreciate the amazing outpouring of sympathy, flowers, gifts and notes of condolences," Sussman said. "It's been a great comfort for them to know that there are so many others that share in their grief."Despite the somber event, speakers recalled many humorous moments, recalling Wheldon's penchant for practical jokes, his compulsive neatness and his liking for tight racing suits.Drivers Brian Herta, Tony Kanaan and Dario Franchitti -- Wheldon's former teammates -- recalled messing Wheldon's locker up on purpose once and then waiting for him before a run, as he could not come out and drive unless the locker was straightened."He made us look like pigs," Herta said. They also recalled entering Wheldon's hotel room in Japan once, stealing one of each of his shoes and sending them back to America, along with taking his television and some of his hair products. Herta said he was not saying goodbye to Wheldon. "Goodbye is final," he said. "Our friendship won't end."On Saturday, hundreds gathered in St. Petersburg, Florida, for Wheldon's funeral. Born in Emberton, England, Wheldon had settled in the west Florida city with his wife and two young sons. Susie Wheldon spoke to her late husband through a letter read aloud by family friend Michael Johnson at the First Presbyterian Church. Audio from that message, and other parts of Saturday's otherwise private ceremony, were recorded and released by CNN affiliate WTSP."I am so scared. Scared I'm going to forget things as time goes by: the way you smell, the sound of your voice, the touch of your hand," she wrote.Country singer Wynonna Judd -- whose half-sister, actress Ashley Judd, is married to Franchitti, one of Wheldon's pallbearers -- sang at the funeral. Besides those inside, dozens of people stood nearby the church to pay their respects. NASCAR said it will provide teams at the Talladega Superspeedway this weekend with a decal in honor of Wheldon.The decal features an image of a knight and the word "Lionheart." Wheldon likened himself to Richard the Lionheart, the 12th-century British warrior king, and often wore the image on the back of his helmets."When I first started racing, a lot of the guys said that I raced with a lot of heart, occasionally not my head, but always with a lot of heart, like the way that Richard the Lionheart fought in battle," Wheldon wrote on a sponsor's blog in 2010.
| 0
|
Story highlightsMatt Eich photographed the Sellers family for 10 yearsHe hopes his photos will shed a new light on Appalachia (CNN)In February 2006, Matt Eich met Jessie Sellers at a car wash in rural Chauncey, Ohio. Sellers was washing dirt bikes, the tires thick with mud. He had coarse, dark hair and the shadow of a beard. He beckoned Eich over. After a few minutes of conversation, Sellers told the young man to hop in the back of his truck and come visit his family at home. It was the invitation Eich had been waiting for. At the time, he was just 19, a sophomore studying photojournalism at Ohio University in nearby Athens. He was on an assignment for class, to document a community through photos. While his classmates searched elsewhere for stories, Eich landed in Chauncey, a small town of about 1,000 people about 15 minutes from campus. "I was really interested in the town," Eich said. Chauncey rests at the foothills of the Appalachian Mountains, not far from West Virginia. Like other places in the region, Chauncey's once-booming coal-mining corporations have fled, leaving the community impoverished and "brokenhearted," according to Eich. Photographer Matt Eich and his daughter MadelynBut when Eich visited the town, and especially when he met the Sellers family, he saw a different picture. The community showed tenacity, intimacy and love, even in the depths of loss and poverty. Read MoreAfter hitching a ride in Jessie's truck, Eich was introduced to Jessie's wife, Tracy, and their four children: Jessie Jr.; William; and Kacey and Lacey, twin sisters who were born deaf. The Sellers "accepted me as part of the family," Eich said. With the family's permission, Eich became witness to the Sellers' daily routines. Jessie worked as a welder while Tracy stayed home with the twins, who were 4 at the time. "The house was chaotic," said Eich, who is the oldest of four kids himself. Eich captured the family cramped on their sofa, watching TV. He followed them outside, photographing the children playing on their father's shoulders and sledding in the snow, their mother watching from the window. 'Wild and free': No TV, no computers, no smartphonesOne early picture particularly stood out to Eich. It's a shot of Lacey, standing in the middle of the road in their neighborhood, glancing over her shoulder. Beneath her feet is a tire mark left by her father. "You shoot hundreds of photos every day, and this was just one of the moments you wait for," Eich said. At the time, Eich said, he couldn't put his finger on what struck him about the photo. The realization came later, when the photographer had children of his own. "In the photo, there's some uncertainty to the road; you can't really see where it leads. It makes me think of the opportunities my daughters have, compared to those that the twins have." After Eich's assignment ended, he continued to photograph the Sellers for the next 10 years, using the images for part of his recently published book, "Carry Me Ohio." In 2010, the family moved near Columbus, Ohio, where the twins could attend a school for deaf children. Eich saw the sisters, who are now 15, grow up along with their brothers. Jessie Jr. is now graduating high school and joining the military, while William is in high school.Join the conversationSee the latest news and share your comments with CNN Health on Facebook and Twitter.The biggest challenge of his 10-year project was "keeping up with people," Eich said. The Sellers family attended Eich's wedding in 2007, when he was a college junior and his wife a sophomore. The twins were flower girls in the ceremony. He graduated college in 2009 and now lives with his wife and two children in Charlottesville, Virginia, but he makes sure to visit the Sellers when he can. "We catch up, and then we're right back where we were before," he said. As a photographer, Eich said, "I can disappear, and their life continues." Through the years, the Sellers have watched Eich's work evolve. "I think they enjoy looking back," he said. Though it's sometimes hard to gauge a reaction from the family, Eich says it's "nice to have attention paid (to them)."Eich hopes his photos will shed a new light on Appalachia. "People from this part of America, they don't have a lot," Eich said. "We still need to be able to hear them."Matt Eich is a photographer based in Charlottesville, Virginia. His book "Carry Me Ohio" is available from Sturm & Drang. The project was made possible in part by funding from The Getty Images Grant for Editorial Photography and The Economic Hardship Reporting Project. You can follow Eich on Facebook, Instagram and Twitter.
| 0
|
Cyber jihadists could use Stuxnet worm to attack the west !
ACCORDING TO Mikko Hypponen, F-Secure's chief security researcher, there has been a revolution in malware with Stuxnet. "The worst case scenario is that Al-Qaeda or another organisation could gain access to this type of knowledge and information, and make use of it to launch attacks on critical infrastructure β like blow up nuclear power plants or do something to our food chain."
| 1
|
(CNN)The Berlin Wall was torn down 30 years ago. The seismic event sent shock waves across Europe, and sparked hopes for millions of East Germans.Jubilant crowds stormed the concrete blockade dividing the East and the West on November 9, 1989, just minutes after the Communist German Democratic Republic (GDR) announced that travel restrictions would be lifted for East Germans. The propaganda and fear were replaced with a sense of freedom and unity.But three decades later, an invisible barrier still stretches across Germany. It is slowly disintegrating, but it's still there. The two countries, the GDR and the western Federal Republic of Germany (FDR), reunited less than a year after the Berlin Wall collapsed. According to Steffen Mau, a sociology professor at Berlin's Humboldt University, many gaps, particularly the economic ones, have narrowed. "But you still have strong differences in attitudes and mentality," he told CNN. "How people see the former GDR differs quite a lot between the East and the West, how [people] trust democratic institutions, their view of the elites or the media, (and) relations to Russia," he said.Read MoreEven the way people see themselves and their country varies."Most west Germans would say there is no difference anymore, it was all washed out in the transformation, while most east Germans would say there is still striking difference between East and West," Mau explained.This chant brought down the Berlin Wall. Now the far right has stolen itAccording to some surveys, he added, as many as half of east Germans still feel like "second-class citizens."In terms of wealth, the six eastern states had a lot of catching up to do since the Wall came down. Decades of Communism decimated the economy and impoverished its population.Translated into current prices, the East's GDP stood at just β¬9,701 ($10,717) per person in 1991, compared to β¬22,687 ($25,062) in the West. And while a big chunk of that gap has closed over the past three decades, the East is still lagging behind, in terms of both GDP and incomes. Berenberg Bank's chief economist Holger Schmieding said the remaining difference boils down to one particular issue: most of Germany's richest people live in the West. Schmieding said that while east German cities are approaching those of the West in terms of living standards, "the big exception to that is that the top, the big companies, the high income, is missing in the East." According to the Halle Institute for Economic Research, only 36 of Germany's 500 biggest companies have headquarters in the East.Schmieding added that as the gap between the East and the West narrowed, another one -- between Germany's rural and urban regions -- have emerged. Because the East is generally more rural, the new economic division mirror the old ones. "The East has more of these left-behind areas," he said.Those in the country's most elite positions are also still predominantly from the West. "Three quarters of the lead positions in east Germany are occupied by people with a west German background," Mau said.West Berliners crowded in front of the Berlin Wall on November 11 1989, watching East German border guards demolishing a section of the barrier.The East is smaller in terms of area and, even more prominently, population. Excluding Berlin, 12.5 million people live in the former East, while more than 66 million reside in the West.This discrepancy shows up in specific statistics -- for example, out of the 18 teams playing in the country's top soccer league, the Bundesliga, only two are in the former East. The West has by far more Olympic medalists. When recalculated per person, the East leads comfortably.Overall, the Eastern population is older, poorer, and more male. This is due to the huge exodus of east Germans from the territory following the collapse of the Wall. An estimated 2 million people have left the East for the West since the two states were reunited. Strikingly, two thirds of them were women. Mau said this is due to the strong status that women enjoyed in the former GDR."Women and men married quite early, but they also divorced early, there was very high divorce rate [in the East]," Mau said. "So women were extremely independent and not just part of a man's career, they had their own careers, they were very self-confident," he added.Women from the East were also much better at integrating into the Western society, Mau said. While many male migrants returned to the East, the women stayed -- and made good lives for themselves. Eastern men didn't adjust as well. Today, two thirds of East-West relationships are between a woman from the East and a man from the West."East German women are successful," Mau said. One example is that there are around 200 people sitting on the boards of Germany's 30 biggest publicly listed companies and just four of them are east Germans. "Three of them are women," Mau said. Female employment is still higher in the East than the West and the gender pay gap is significantly lower. "The two [states] had very different official culture, [with] the East very much encouraging women to work," Schmieding said. The push for women to return to employment early meant access to free childcare has always been much better in the East."You might not like the teachers because they were ideologues ... but at least there was somebody to take care of your very, very young kid," Schmieding said. Despite three decades of unity, there are still differences in education across Germany. Schoolkids in the East score higher in reading and math tests. When it comes to high-school leaving exams, students in the East outperform their peers in the West.The Organization for Economic Cooperation and Development (OECD), the leading global authority when it comes to comparing education systems, said schools were "a justifiable source of pride for the East Germans."Germany has a far-right enemy withinThe group said that while the education system in the former West focused on dividing children into different ability groups early on, the Eastern system was more equitable. But when the Wall came down, the East was eager do everything in the Western way, even education. Bastian BetthΓ€user, a research fellow at the University of Oxford, said this led to the education system in the East becoming more unequal. Those at the top would still do well, but more kids are at risk of being left behind. "Prior to unification, nobody [in the East] could leave school before having completed grade 10, now it's grade nine and so there is a bigger share, particularly of kids who are of working-class backgrounds, who drop out before having completed grade 10, so they are worse off," he said."In west Germany, people always look back at East Germany in a very negative sense, but it's important to remember, I think, that there were certain things ... that kind of worked there, for example more equality in access to education," BetthΓ€user said."Now, did that come as a great political and personal cost of liberty? Yes, for sure. But I think it's important to have a differentiated view on this."This photo, taken in 2013 from the International Space Station, shows the former division in Berlin is still visible.Politically, Germany is still very divided. Voters in the former Communist states are much more likely to vote for the far-right AfD. Mau said this is partly down to past trauma. Life was tough for many east Germans after the reunification, as the society around them transformed at a lightning speed."Many people experienced unemployment, very long periods of insecurity or even existential crisis and the result of that is that they developed a habit of 'keeping and defending' and are not willing to accept more social change," he said."Populism falls on fertile ground, people are very much willing to say 'they defend what we have, they defend our culture, they defend our borders,'" he added. Other differences remain. Official statistics show many more children are born to unmarried couples in the East, compared to the more conservative and religious West. More women remain childless in the West.People in the West own more cars. And, according to the market research company GfK, east Germans shop less frequently and prefer hypermarkets, while west Germans would rather pop into smaller grocery stores more often.Even tastes differ. East Germans remain loyal to some of their old brands -- such as Vita Cola, the beloved GDR version of Coca-Cola.Those in the East eat a lot more meat, according to the Ministry for Food and Agriculture. West Germans have a sweeter tooth. And, according to GfK data, east Germans like bubble baths a lot more often.
| 0
|
A critical vulnerability has been fixed in Samba β Open Source standard Windows interoperability suite of programs for Linux and Unix, that could have allowed hackers to remotely execute an arbitrary code in the Samba daemon (smbd).
Samba is an open source implementation of the SMB/CIFS network file sharing protocol that works on the majority of operating systems available today, which allows a non-Windows server to communicate with the same networking protocol as the Windows products. Samba is supported by many operating systems including Windows 95/98/NT, OS/2, and Linux.
smbd is the server daemon of Samba which provides file sharing and printing services to clients using the SMB/CIFS protocol. Samba is also sometimes installed as a component of *BSD and OS X systems.
The vulnerability, designated as CVE-2015-0240, actually resides in this smbd file server daemon. The bug can be exploited by hackers to potentially execute code remotely with root privileges, the Samba development team warned.
The team discovered that the vulnerability allowed a malicious client to send some packets that could free memory in a consecutive anonymous netlogon packet, leading to unexpected execution of random code. In case, root privileges are required which is automatic and no login or authentication is necessary.
The security vulnerability affects all versions of the Samba software, from the oldest supported stable release, Samba versions 3.5.0, to the current development version, 4.2.0 Release Candidate (RC) 4, the Samba Project said in a security alert.
Red Hat product team published a detailed analysis of this vulnerability on its blog post. According to the researchers, Red Hat Enterprise Linux versions 5 through 7 are affected, as are Red Hat Storage Server versions 2.1 and 3. Except RHEL7, the vulnerability is marked critical for all of the affected products. Other Linux distributions have also posted security alerts about the vulnerability.
A large number of users might potentially be at risk because Samba ships with a wide range of Linux distributions. However, users affected by the critical vulnerability also depends on which operating system they run on their machines.
The Samba development team has fixed the flaw in the new Samba version, Samba 4.1.17, which is available to download. The credit for discovering and reporting the flaw in Samba goes to the Microsoft Vulnerability Researcher, Richard van Eeden, who also provided the patch.
Meanwhile, other major Linux distributions, including Ubuntu, Debian and Suse, have also released updated packages in their repositories, with others to follow soon.
| 1
|
Story highlightsThe creators of a limited-edition Prince "Opus" recall their memories of the late singerThe book includes photos, poetry and lyrics written by Prince and an iPod with his music (CNN)Karl Fowler and Zenon Texeira can clearly remember an evening years ago when they were dining with superstar Prince and one of his assistants in Los Angeles.It was the middle of the night, and after dessert the singer asked if they would indulge him a bit."He said that he never had the opportunity to have conversations with people anymore, and that's why he was enjoying this particular dinner," Texeira said.As Fowler tells it, Prince excused himself before returning with four, small leather books that turned out to be Jehovah's Witness Bibles. "For the next hour, we had Bible study with Prince," said Fowler, who along with Texeira received the holy books as gifts from the singer. "We saw a very kind, funny man in that first meeting with Prince."Read MoreIt is those types of memories the pair now cherish following the music legend's death in April. Prince died of accidental overdose of opioid fentanyl, medical examiner saysFowler is chief executive of the publishing company Opus, and Texeira is its creative director. The pair worked closely with the late singer to produce "The Official Prince Opus," a limited-edition book tied to his 2007 concert series in which he played 21 nights at London's O2 arena.The project includes photos, poetry and lyrics written by Prince and an iPod that contains his music.Fowler said the star approached his company after admiring a book they had done about the NFL. Fowler said he and Texeira, being massive Prince fans, were thrilled when the singer invited them to come to Los Angeles to meet with him."He called us to put the project together and in short we jumped at the chance," Fowler said. "We then spent the next few months discussing and working with him."Prince was involved in all aspects, Texeira said, from conception of the idea to art directing. Prince loved the scale of the past projects the company had done, he said. "He used the word 'panoramic,' " Texeira said. "He was thinking on a very cinematic scale."Social mediaFollow @CNNPhotos on Twitter to join the conversation about photography.Prince provided them with a 45-minute behind-the-scenes video and brought to them an idea he had for the photo essay.The pictures, which were shot by famed photographer Randee St. Nicholas, told the fantasy story of the singer living at the Dorchester Hotel in central London and floating between his residency there and his concerts at the O2.As Prince leaves the room, he passes an attractive maid who enjoys herself in his hotel room while he is away in Prague, Czech Republic. The story ends as Prince returns to his hotel and finds the maid, leaving the reader wondering what happens next. "He wanted it to be, as he explained to us, a story within a story," Fowler said. "We thought it was quite endearing and creative."What followed their first meeting was more meetings -- always held after midnight -- which could include everything from pancakes and ice cream to jam sessions, they said. Prince once played all of his hits for more than two hours because he knew they were fans. The three men developed a friendship, so much so that Fowler said they did not want the project to end.Fowler said that in the spring of 2015, they had a conversation with Prince in which he reminded them that he was interested in doing another Opus more focused on his career. "He wanted to do a retrospective," Fowler said. "He said it was all about timing, and there were still some things he wanted to do first. When the news came (of his death), it was just so sad."The knowledge that Prince wanted to work with them again and also took positive memories away from the experience has comforted them, they said."We know that and cherish that," Texeira said.
| 0
|
Researchers have unearthed a dangerous backdoor in Microsoft's Outlook Web Application (OWA) that has allowed hackers to steal e-mail authentication credentials from major organizations.
The Microsoft Outlook Web Application or OWA is an Internet-facing webmail server that is being deployed in private companies and organisations to provide internal emailing capabilities.
Researchers from security vendor Cybereason discovered a suspicious DLL file loaded into the company's OWA server that siphoned decrypted HTTPS server requests.
Although the file had the same name as another benign DLL file, the suspicious DLL file was unsigned and loaded from another directory.
Hackers Placed Malicious DLL on OWA Server
According to the security firm, the attacker replaced the OWAAUTH.dll file (used by OWA as part of the authentication mechanism) with one that contained a dangerous backdoor.
Since it ran on the OWA server, the backdoored DLL file allowed hackers to collect all HTTPS-protected server requests, including login information after they had been decrypted, i.e., in clear text.
"OWA was configured in [such] a way that [it] allowed Internet-facing access to the server," Cybereason wrote in a post published Monday. "This enabled the hackers to establish persistent control over the entire organization's environment without being detected for several months."
Hackers Stole 11,000 Credentials
Every user accessing the hacked server had their username & password compromised and stored by the attackers.
Researchers discovered more than 11,000 usernames and passwords combinations in a log.txt file in the server's "C:\" partition. Log.txt file is believed to be used by attackers to store all logged data.
The unnamed company that detected "behavioural abnormalities" across its network before reaching out to security firm Cybereason had more than 19,000 endpoints.
To prevent their backdoor from being removed, the attackers also created an IIS (Microsoft's Web server) filter through which they loaded the malicious OWAAUTH.dll file every time the server was restarted.
To add icing to the cake β the advanced persistent attackers utilized a .NET assembly cache in order to avoid auditing and security inspection.
The security firm did not say how widespread this attack is beyond it targeting one organisation, but there are chances that the attack is or could be hitting other large organizations as well.
| 1
|
Android Malware as Chinese game "The Roar of the Pharaoh"
Security researchers have spotted a bogus Chinese game, that's actually a trojan horse gathering sensitive information from infected devices, next to sending premium-rate SMS messages. It is Chinese game that is original with its rights but on Android it is a fake application that inherits malware Trojan to steal important information from your cell phone.
The malware works after an unknowing Android handset owner installs the app, allowing the malware to collect data, such as phone number, IMEI number, phone model, screen size and platform, and recording the OS version and platform used for sending via SMS to the Trojan's authors.
But it also noted the new Trojan is unusual as it does not ask for any specific permissions during installation, which is often an indicator an application is up to no good.It added the malware masquerades as a service called "GameUpdateService" a very plausible name for a legitimate app if one were to check the processes running on his or her device.
The malicious application is currently detected as Andr/Stiniter-A. It said the mobile phone companies provide the payment processing and the bad guys have their money and are long gone before the victim ever receives the phone bill with the fraudulent charges.
Michael Sutton, vice president of security research at cloud-based security provider Zscaler, said the fake "The Roar of the Pharaoh" app for Android reflects the shift of malware authors to target the Android platform, whether smartphones or tablets. Fake game apps that are really Trojans are increasing and "this is a typical scam for Android now," he says.
Other Android News:
DKFBootKit - First Android BootKit Malware
Mercury v1.0 - Framework for bug hunters to find Android vulnerabilities
| 1
|
Google on Monday disclosed details about an ongoing campaign carried out by a government-backed threat actor from North Korea that has targeted security researchers working on vulnerability research and development.
The internet giant's Threat Analysis Group (TAG) said the adversary created a research blog and multiple profiles on various social media platforms such as Twitter, LinkedIn, Telegram, Discord, and Keybase in a bid to communicate with the researchers and build trust.
The goal, it appears, is to steal exploits developed by the researchers for possibly undisclosed vulnerabilities, thereby allowing them to stage further attacks on vulnerable targets of their choice.
"Their blog contains write-ups and analysis of vulnerabilities that have been publicly disclosed, including 'guest' posts from unwitting legitimate security researchers, likely in an attempt to build additional credibility with other security researchers," said TAG researcher Adam Weidemann.
The attackers created as many as 10 fake Twitter personas and five LinkedIn profiles, which they used to engage with the researchers, share videos of exploits, retweet other attacker-controlled accounts, and share links to their purported research blog.
In one instance, the actor used Twitter to share a YouTube video of what it claimed to be an exploit for a recently patched Windows Defender flaw (CVE-2021-1647), when in reality, the exploit turned out to be fake.
The North Korean hackers are also said to have used a "novel social engineering method" to hit security researchers by asking them if they would like to collaborate on vulnerability research together and then provide the targeted individual with a Visual Studio Project.
This Visual Studio Project, besides containing the source code for exploiting the vulnerability, included a custom malware that establishes communication with a remote command-and-control (C2) server to execute arbitrary commands on the compromised system.
Kaspersky researcher Costin Raiu, in a tweet, noted the malware delivered via the project shared code-level similarities with Manuscrypt (aka FAILCHILL or Volgmer), a previously known Windows backdoor deployed by the Lazarus Group.
What's more, TAG said it observed several cases where researchers were infected after visiting the research blog, following which a malicious service was installed on the machine, and an in-memory backdoor would begin beaconing to a C2 server.
With the victim systems running fully patched and up-to-date versions of Windows 10 and Chrome web browser, the exact mechanism of compromise remains unknown. But it's suspected that the threat actor likely leveraged zero-day vulnerabilities in Windows 10 and Chrome to deploy the malware.
"If you are concerned that you are being targeted, we recommend that you compartmentalize your research activities using separate physical or virtual machines for general web browsing, interacting with others in the research community, accepting files from third parties and your own security research," Weidemann said.
UPDATE (28 Jan, 2021): Microsoft releases more information on this campaign
In a separate analysis, Microsoft corroborated the findings, attributing the attacks to a threat actor it calls ZINC, also known as Lazarus Group or Hidden Cobra.
The Windows maker said the campaign took roots in mid-2020 when the adversary "started building a reputation in the security research community on Twitter by retweeting high quality security content and posting about exploit research from an actor-controlled blog."
Microsoft's analysis of the malicious DLL (dubbed "Comebacker") has also revealed the group's attempts to evade detection via static indicators of compromise (IoCs) by frequently changing file names, file paths, and exported functions. "We were first alerted to the attack when Microsoft Defender for Endpoint detected the Comebacker DLL attempting to perform process privilege escalation," the company said.
That's not all. With some researchers infected simply by visiting the website on fully patched systems running Windows 10 and Chrome browser, the company suspects a Chrome exploit chain leveraging zero-day or patch gap exploits was hosted on the blog, leading to the compromise.
"A blog post titled DOS2RCE: A New Technique To Exploit V8 NULL Pointer Dereference Bug, was shared by the actor on October 14, 2020 from Twitter," the researchers said. "From October 19-21, 2020, some researchers, who hadn't been contacted or sent any files by ZINC profiles, clicked the links while using the Chrome browser, resulting in known ZINC malware on their machines soon after."
| 1
|
A new ransomware strain called "Qlocker" is targeting QNAP network attached storage (NAS) devices as part of an ongoing campaign and encrypting files in password-protected 7zip archives.
First reports of the infections emerged on April 20, with the adversaries behind the operations demanding a bitcoin payment (0.01 bitcoins or about $500.57) to receive the decryption key.
In response to the ongoing attacks, the Taiwanese company has released an advisory prompting users to apply updates to QNAP NAS running Multimedia Console, Media Streaming Add-on, and HBS 3 Hybrid Backup Sync to secure the devices from any attacks.
"QNAP strongly urges that all users immediately install the latest Malware Remover version and run a malware scan on QNAP NAS," the company said. "The Multimedia Console, Media Streaming Add-on, and Hybrid Backup Sync apps need to be updated to the latest available version as well to further secure QNAP NAS from ransomware attacks."
Patches for the three apps were released by QNAP over the last week. CVE-2020-36195 concerns an SQL injection vulnerability in QNAP NAS running Multimedia Console or Media Streaming Add-on, successful exploitation of which could result in information disclosure. On the other hand, CVE-2021-28799 relates to an improper authorization vulnerability affecting QNAP NAS running HBS 3 Hybrid Backup Sync that could be exploited by an attacker to log in to a device.
But it appears that Qlocker is not the only strain that's being used to encrypt NAS devices, what with threat actors deploying another ransomware named "eCh0raix" to lock sensitive data. Since its debut in July 2019, the eCh0raix gang is known for going after QNAP storage appliances by leveraging known vulnerabilities or carrying out brute-force attacks.
QNAP is also urging users to the latest version of Malware Remover to perform a scan as a safety measure while it's actively working on a solution to remove malware from infected devices.
"Users are advised to modify the default network port 8080 for accessing the NAS operating interface," the company recommended, adding "the data stored on NAS should be backed up or backed up again utilizing the 3-2-1 backup rule, to further ensure data integrity and security."
| 1
|
Newark, New Jersey (CNN)There was no way Rachel Hodge could do it all. The single mother of two daughters is very driven: She works full time at a hospital and is studying for a bachelor's in social work to further her career. With no family close by, she cares for her two girls, ages 5 and 11, alone, paying the bills, cooking the meals, doing the laundry. And she's fine with that. "You have to push yourself ... if you want to be able to get where you want to be," she said. But when her children's schools in Newark, New Jersey, announced the near inevitable -- that learning for fall would be online to counter the coronavirus pandemic -- something had to give.Her older daughter Gianna would have the maturity and ability to focus on virtual classes, but that was going to be impossible for Vanessa, a kindergartener. Her daycare would not have the support and quiet that a young child would need.Read MoreRachel Hodge and her daughter Vanessa now both have evening classes.Hodge told CNN she was direct with the teachers at Vanessa's KIPP charter school: There would be days when she would not be in class. She did what she could to try to catch Vanessa up in the evening, but the little girl could only attend the critical first year of school on Hodge's days off."I really didn't know how I was going to do this," Hodge said. "I was upset with myself that I had to sacrifice her education so I could be able to work."Vanessa was not alone is missing school. Teacher Meredith Eger told CNN that there were students at the KIPP school who were absent from the first day in September all the way through the month and into October. That set off alarm bells in the school administration. Meredith Eger has seen her evening students begin to thrive."They realized that they needed something to help those kids," Eger said. "It's not just assuming that the child ... is absent because they don't want to be online, or the parent doesn't want them to log on, or we just don't feel like it."The schools ended up offering evening classes from 6 p.m. to 8 p.m. And Hodge jumped at the opportunity. "The school was a big stressor for me, for myself and the kids," she said. Night school "alleviated a lot of the stress and anxiety and also my worries of 'Is she getting the adequate quality education that a kindergartener should be able to get?' "Eger was at first hesitant to take on the night classes but then volunteered for the extra hours. During the day, she has 28 students online. Then 11 more at the evening classes. The results were immediate. And long lasting.Hodge says Vanessa is now able to work mostly independently in the new routine."We have a few scholars that were absent the majority of September and almost all of October, but then the second we started the evening learning program, they have not missed one day," she said. "Now, getting into end of week nine, I'm seeing a big difference. I'm seeing most of the kids sitting down, staying seated, their eyes are on the screen, they're doing the work."Even beloved public schools may lose students foreverIt's not the in-person classroom learning that teachers, children and parents yearn for, but both Hodge and Eger say they see the students forming relationships as well as learning their numbers and ABCs -- all critical parts of kindergarten. Night classes for both Vanessa and herself means more scheduling and prioritizing for Hodge but she is happy that her younger daughter understands you're supposed to go to school every day. "It's been really hard doing this on my own and working in the hospital, trying to make ends meet and being able to go to school to further my education," Hodge said. "I'm very fortunate that she's able to have a school that puts parents at top notch of priorities."She looks forward to Vanessa and Gianna getting back to being in school full time, mostly because that's what they need. But it will also give Hodge a little break on her days off -- perhaps for some time to herself or at least the chance to do the laundry in peace.
| 0
|
Mystery of Duqu Programming Language Solved
An appeal for help from the programming community has allowed antivirus analysts to classify the unknown language used to develop key components of the Duqu Trojan. The sections responsible for downloading and executing additional modules in the Duqu Trojan, referred to by some as Stuxnet 2.0, were written in standard C++.
Kaspersky Lab experts now say with a high degree of certainty that the Duqu framework was written using a custom object-oriented extension to C, generally called "OO C" and compiled with Microsoft Visual Studio Compiler 2008 (MSVC 2008) with special options for optimizing code size and inline expansion.
Kaspersky's Igor Soumenkov wrote, "No matter which of these two variants is true, the implications are impressive. The Payload DLL contains 95 Kbytes of event-driven code written with OO C, a language that has no automatic memory management or safe pointers,".
Kaspersky's analysis now concludes:
The Duqu Framework consists of "C" code compiled with MSVC 2008 using the special options "/O1β³ and "/Ob1β³
The code was most likely written with a custom extension to C, generally called "OO C"
The event-driven architecture was developed as a part of the Duqu Framework or its OO C extension
The C&C code could have been reused from an already existing software project and integrated into the Duqu Trojan
The Duqu Framework may have been created by a different programming team, since it is unique to Duqu, unlike many parts of Duqu that seem to be directly borrowed from Stuxnet. It's believed that the developers are old school that don't trust C++ and that's probably why they relied on C. Another reason for using OO C is because back in the good old days it was more portable than C++.
Knowing the techniques used to develop the malware allows Kaspersky's researchers to make better guesses about who might be behind the code. Creating Duqu was a major project, so it's possible that an entirely different team was responsible for creating the Duqu Framework, while others worked on creating drivers and system infection exploits. In this scenario it's even possible that those who created the Duqu framework were ignorant of the real purpose of their work.
Duqu was first detected in September 2011, but Kaspersky Lab believes it has seen the first pieces of Duqu-related malware dating back to August 2007. The Russian security firm also notes Duqu, like Stuxnet before it, is highly targeted and related to Iran's nuclear program.
| 1
|
Security researchers have discovered a new, massive cyber espionage campaign that mainly targets people working in government, defence and academic organisations in various countries.
The campaign is being conducted by an Iran-linked threat group, whose activities, attack methods, and targets have been released in a joint, detailed report published by researchers at Trend Micro and Israeli firm ClearSky.
Dubbed by researchers CopyKittens (aka Rocket Kittens), the cyber espionage group has been active since at least 2013 and has targeted organisations and individuals, including diplomats and researchers, in Israel, Saudi Arabia, Turkey, the United States, Jordan and Germany.
The targeted organisations include government institutions like Ministry of Foreign Affairs, defence companies, large IT companies, academic institutions, subcontractors of the Ministry of Defense, and municipal authorities, along with employees of the United Nations.
The latest report [PDF], dubbed "Operation Wilted Tulip," details an active espionage campaign conducted by the CopyKittens hackers, a vast range of tools and tactics they used, its command and control infrastructure, and the group's modus operandi.
How CopyKittens Infects Its Targets
The group used different tactics to infiltrate their targets, which includes watering hole attacks β wherein JavaScript code is inserted into compromised websites to distribute malicious exploits.
The news media and organisations whose websites were abused as watering hole attacks include The Jerusalem Post, for which even German Federal Office for Information Security (BSI) issued an alert, Maariv news and IDF Disabled Veterans Organization.
Besides water hole attacks, CopyKittens also used other methods to deliver malware, including:
Emailed links to malicious websites controlled by attackers.
Weaponized Office documents exploiting recently discovered flaw (CVE-2017-0199).
Web servers exploitation using vulnerability scanner and SQLi tools like Havij, sqlmap, and Acunetix.
Fake social media entities to build trust with targets and potentially spread malicious links.
"The group uses a combination of these methods to persistently target the same victim over multiple platforms until they succeed in establishing an initial beachhead of infection β before pivoting to higher value targets on the network," Trend Micro writes in a blog post.
In order to infect its targets, CopyKittens makes use of its own custom malware tools in combination with existing, commercial tools, like Red Team software Cobalt Strike, Metasploit, post-exploitation agent Empire, TDTESS backdoor, and credential dumping tool Mimikatz.
Dubbed Matryoshka, the remote access trojan is the group's self-developed malware which uses DNS for command and control (C&C) communication and has the ability to steal passwords, capture screenshots, record keystrokes, collect and upload files, and give the attackers Meterpreter shell access.
"Matryoshka is spread through spear phishing with a document attached to it. The document has either a malicious macro that the victim is asked to enable or an embedded executable the victim is asked to open," Clear Sky says in a blog post.
The initial version of the malware was analysed in 2015 and seen in the wild from July 2016 until January 2017, though the group also developed and used Matryoshka version 2.
Users are recommended to enable two-factor authentication in order to protect their webmail accounts from being compromised, which is a treasure trove of information for hackers, and an "extremely strong initial beachhead" for pivoting into other targets.
| 1
|
USB Immunizer : Anti-Malware Tool Against Autorun Viruses
The USB immunizer is BitDefender's response to this growing issue.
Autorun-based malware has been atop of the worldwide e-threat landscape, with notorious representatives such as Trojan.AutorunInf, the Conficker worm (Win32.Worm.Downadup) or Worm.Autorun.VHD. Have to agree on that, many of us get infected buy some silly malware simply by plugin in our friends or neighbours USB , DVD etcβ¦
Introduced back in the Windows XP era to facilitate software installations from CD-ROM media for non-technical computer users, the Autorun feature has rapidly become the infection vector of choice for cyber-criminals.
The Immunize option allows you to immunize your USB storage device or SD card against infections with autorun-based malware. Even if your storage device has been plugged into an infected computer, the piece of malware will be unable to create its autorun.inf file, thus annihilating any chance of auto-launching itself.
The Immunize Computer slider allows you to toggle the autorun feature On or Off for any removable media (except for CD/DVD-ROM devices). If you accidentally plug in an infected USB drive that has not been immunized, the computer will not auto-execute the piece of malware located on the USB storage device.
Download USB Immunizer
| 1
|
The US Justice Department (DOJ) is seeking a transition in the criminal rules that would make the authorities to have more leeway to secretly hack into the suspected criminals' computer during criminal investigations at any times in bunches.
The proposed [PDF] change in the rules would make FBI to easily obtain warrants to secretly access suspects' computers for the evidence when the physical location of the computer is not known to them. The problem FBI and government agents increasingly face as more and more crime carried out is online, and with the help of online tools, it is easy to conceal identity of the criminal.
"This proposal ensures that courts can be asked to review warrant applications in situations where it is currently unclear what judge has that authority," Justice Department spokesman Peter Carr told Bloomberg. "The proposal makes explicit that it does not change the traditional rules governing probable cause and notice."
This new U.S. proposal to expand the ability of authorities has again held a debate over how to secure and balance the privacy and digital rights of individuals with the need to keep the nation safe. This new plan would leverage the authorities to use "zero-day exploits" on software vulnerabilities during criminal investigations and according to critics the change to the law could violate the privacy rights and could weaken overall Internet security.
"I don't think many Americans would be comfortable with the government sending code onto their computers without their knowledge or consent," Nathan Freed Wessler, a lawyer with the American Civil Liberties Union, said in a telephone interview to Bloomberg "The power they're seeking is certainly a broad one."
The New proposal would also allow the authorities to use a single warrant to hack into thousands of botnet victim's computers in order to collect evidence and technical details of the criminals. This means to find out a single culprit who could be even a foreigner, the authorities would legally authorize themselves for spying on thousands of machines legally.
DOJ highlighted that the proposed change would allow law enforcement agencies to "use remote access" to search and monitor computers even when "the district where the media or information is located has been concealed through technological means." A single warrant could be used to search computer systems located in five or more judicial districts, of which there are 94 in the United States and currently, the judges may issue a warrant in most cases only if the property to be examined is located in their district.
"The proposed amendment would enable investigators to conduct a search and seize electronically stored information by remotely installing software on a large number of affected victim computers pursuant to one warrant issued by a single judge," committee said. "The current rule, in contrast, requires obtaining multiple warrants to do so, in each of the many districts in which an affected computer may be located."
It is clearly known to all of us that both the National Security Agencies (NSA) and the Federal Bureau of Investigation have exploited several vulnerabilities to spy across the world for their own purposes and this new proposed change will definitely give them another legal authorization to carry out their spying projects secretly, and if get caught, IT'S ALL LEGAL MY FRIEND.
| 1
|
Story highlightsDramatic video footage showed a bus swerving to avoid the woman Police say the man jogged past the victim 15 minutes after the incidentLondon (CNN)Police in London arrested a man on suspicion of pushing a woman into the path of an oncoming bus while jogging.The 41-year-old was arrested Thursday morning on suspicion of causing grievous bodily harm at an address in the affluent Chelsea area, a Metropolitan Police statement said. Police have released the man after questioning him, though he remains under investigation.Video footage of the May 5 incident showed a male jogger knocking the 33-year-old woman onto the road as she walked across Putney Bridge, on the River Thames.The bus is seen swerving and narrowly missing the woman.Police said the victim received minor injuries and that passengers on the bus came to her aid.Read MoreThe jogger returned 15 minutes later as he made his way back across the bridge but did not acknowledge the victim when she attempted to speak with him, according to police. Officers received "a good response" from the public after releasing the footage, police said."The victim was put in extreme danger when she was knocked into the road. It was only due to the superb quick reactions of the bus driver that she was not hit by the vehicle," said Sergeant Mat Knowles, the investigating officer from Putney Safer Neighbourhood Team, in an earlier statement. This story has been updated to reflect the latest information from police about the suspect's age.
| 0
|
There are many unpatched loopholes or flaws in Facebook website, that allow hackers to inject external links or images to a wall, hijacking any facebook account or bypassing your social privacy. Today we are going to report about another unfixed facebook app vulnerability that allow a hacker to spoof the content of any Facebook app easily.
Nir Goldshlager from Break Security today exposed another major flaw that allows hacker to wall post spoofed messages from trusted applications like Saavn, Candy Crush, Spotify, Pinterest, or really any other application on Facebook.
In 2012 Facebook's method of publishing called stream.publish and the Stream Publish Dialog looks like the following:
https://www.facebook.com/dialog/stream.publish?app_id=xxxx&redirect_uri=https://www.facebook.com/&action_links=&attachment=%7B%27media%27:%20[%7B%27type%27:%20%27flash%27,%27swfsrc%27:%27https://files.nirgoldshlager.com/goldshlager2.swf%27,%27imgsrc%27:%27https://www.vectorstock.com/i/composite/41,30/hacked-pc-vector-194130.jpg%27,%27width%27:%27130%27,%27height%27:%27%20130%27,%27expanded_width%27:%27500%27,%27expanded_%20height%27:%27500%27%7D],%27name%27:%27xxxx%27,%27caption%27:%27xxxx%20Application%27,%27properties%27:%7B%27xxx%27:%7B%27text%27:%27Download%20xxx%27,%27href%27:%27https://nirgoldshlager.com%27%7D%7D%7D
Where app_id and attachment (swfsr,imgsrc,href) parameters can be targeted by hackers i.e using app_id value as application ID of any application you want to spoof (Saavn, Spotify, etc.) and an attacker must produce attachment parameters like swfrsc and imgsrc.
If the "Stream post URL security" option is disabled by the developer of that application, hacker can use any remotely uploaded swf file as attachment parameter.
"every time a victim visits my wall post, they will see content spoofing from a Facebook application that they generally trust. Clicking the link on the post makes an swf file from the external website execute on his client machine." Nir said.
But in 2013, Facebook changed the mechanism of stream.publish posting and introduced new parameters as explained below:
Link parameter: With this parameter, we will include our malicious external link (virus exe file, 0days, Phishing site, or any other malicious link.
Picture Parameter: This parameter is only usable if we want to spoof the content with an image. The content of the image will only display correctly on our Wall post. It will not display correctly in the newsfeed, making it relevant only to wall post app spoofing.
Caption Parameter: This parameter will allow to an attacker choose from which website the content came from, For Example: Facebook.com Zynga.com Ownerappdomain.com
Name Parameter: This parameter produces the title we desire. Whenever the victim clicks on that title, he will be taken to our malicious website.
Few examples as given below:
Diamond Dash:
https://www.facebook.com/dialog/feed?app_id=127995567256931&link=https://nmap.org/dist/nmap-6.20BETA1-setup.exe&picture=https://www.topandroidapplication.com/wp-content/uploads/2013/04/diamond-dash.png&name=Diamond%20Dash%20For%20Windows&%20caption=https://facebook.com&description=&%20redirect_uri=https://facebook.com
SoundCloud:
https://www.facebook.com/dialog/feed?app_id=19507961798&link=https://nmap.org/dist/nmap-6.20BETA1-setup.exe&picture=https://www.atpfestival.com/assets/img/soundcloud.png&name=Download%20SoundCloud%20For%20Windows&%20caption=https://soundcloud.com&description=&%20redirect_uri=https://facebook.com
Skype:
https://www.facebook.com/dialog/feed?app_id=260273468396&link= https://touch.facebook.com/apps/sdfsdsdsgs &picture=https://he.downloadastro.com/static/files/24/3b/29/243b29a6163cc99e359f4c354422f238.jpg&name=Download%20Skype%20New%20Version&%20caption=https://skype.com&description=&%20redirect_uri=https://facebook.com
Slidshare
https://www.facebook.com/dialog/feed?app_id=2490221586&link=%20https://touch.facebook.com/apps/sdfsdsdsgs/&picture=https://www.samsamia.com/wp-content/uploads/2012/11/slideshare-logo-300Γ300-e1353118471460.png&name=SlideShare%20For%20Windows&%20caption=slidshare.com&description=&%20redirect_uri=https://facebook.com
Spoofing the parameters again allowing one to spoof the content of any Facebook app and flaw is still unpatched. This techniques can be widely used by cyber crooks to social engineer facebook users or to install malwares on their systems.
| 1
|
Are you a proud owner of a Smartwatch, a Smart TV, a Smart fridge, a Smart lock, an Internet-enabled car, or live in a smart city?
Caution!
Recently, it has been reported that the growth of the Internet of Things would eventually lead to cyber criminals in making lots of money, as they started attacking the Internet of Things for Ransom.
Yes, the latest Interest of the cyber criminals in the field of Internet of Things is 'Ransomware'.
Internet of Things (IoT) such as Android and iOS-based wearable Smartwatches and the concept of connected homes has now given a treat to the current generation Ransomware.
With the advancements in Technology, cyber criminals are simultaneously promoting themselves from the threat known for restricting computers or encrypting files and asking users for money in return for gaining back access to their systems.
From computers to mobile phones, now criminals are targeting the IoT and the wearables devices.
Security researchers at Symantec demonstrated how an Android Wear device might be impacted by typical Android ransomware.
In order to conduct this test, the researchers simply repackaged a current Android ransomware app (.apk file) β dubbed "Android.Simplocker", inside a new Android Wear project.
Next, they took a Moto 360 Smartwatch and paired it with an Android phone. When they installed the new .apk file on the phone, they found that the phone became infected with the ransomware.
As the Smartwatch and an Android phone are required to be paired via Bluetooth for wireless connectivity, the ransomware also got pushed onto the smartwatch once the pairing of both the devices were done.
Once installed on the smartwatch, the malware could be easily activated by the user if they were tricked into running it, by clicking on a malicious app.
After installation, the ransomware will cause the smartwatch to become unresponsive and unusable!
Simplocker Android ransomware then checks for the display of the ransom message every second, and if it is not shown, will push it onto the screen again.
In addition, Simplocker encrypts a range of different files stored on the smartwatch's SD card.
Now, you must be thinking of escaping from the situation?
You can recover from this situation, but unfortunately, it involves a factory reset of your smartwatch.
But there also stands a condition where the rebooting of the device through hardware buttons is possible, then quickly navigating to the factory reset setting (within 20-30 seconds) before the ransomware is rebooted.
According to Symantec, while this would erase all files on the smartwatch, those files would have been encrypted by the malware in the first place.
For this one needs to keep an updated backup.
No such ransomware has been seen yet, but the day is not far when this becomes a reality.
As, in the past it was evident how smart Televisions got attacked with the ransomware also IoT devices being remotely controlled by the attacker.
Therefore, the crux is that the users need to be more vigilant and even smarter than the technology they are dependent on.
| 1
|
(CNN)Nearly 40 million people remain under weather watches and warnings in the Northeast, down from 85 million Friday morning, as a winter storm makes its way eastward.Snow fell across much of New York state, New Hampshire, Vermont and Maine, with freezing rain and ice causing treacherous travel to the south in Massachusetts, Connecticut, Rhode Island, New Jersey and Pennsylvania. The precipitation is expected to end Friday evening.When and how the winter storm will hit major US citiesIn the wake of the storm, more than 3,800 flights were canceled Friday, with several hundred canceled for Saturday, according to the tracking website FlightAware. About 260,000 customers are without power, stretching from Tennessee to Maine, according to PowerOutage.us.At least seven people are dead across the country, including two in New Mexico, with others reported in Oklahoma, Missouri, Tennessee, Massachusetts, and in Alabama during what forecasters determined was a likely tornado. More than 3 feet of snow piled up in one part of New Mexico. In the Midwest, more than a foot of snow fell across several states, with some areas in the Chicago metro area experiencing as many as 11 inches, forecasters said. Read MoreThe expansive weather system -- which spanned about 2,000 miles from the Rockies to New England -- also created an ice storm that brought dangerous conditions from Arkansas through Ohio. Photos: Winter storm threatens millions across USCrews from the New Hampshire Department of Transportation remove debris from a fallen tree near Chesterfield on Friday, February 4.Hide Caption 1 of 24 Photos: Winter storm threatens millions across USA pedestrian walks through steam on a rainy day in New York City on February 4.Hide Caption 2 of 24 Photos: Winter storm threatens millions across USThree men work to push a car up a driveway in Columbus, Ohio.Hide Caption 3 of 24 Photos: Winter storm threatens millions across USPlows clear snow and ice from Interstate 93 in Hooksett, New Hampshire, on February 4.Hide Caption 4 of 24 Photos: Winter storm threatens millions across USEdward Caldwell works to clear a downed tree at his mother's house in Memphis, Tennessee, on Thursday, February 3.Hide Caption 5 of 24 Photos: Winter storm threatens millions across USA snow plow travels down Interstate 64 in Louisville, Kentucky, on February 3.Hide Caption 6 of 24 Photos: Winter storm threatens millions across USSt. Louis police officers Eric Moran, left, and Scott Christian help a motorist who was stuck in snow at a highway exit on February 3.Hide Caption 7 of 24 Photos: Winter storm threatens millions across USThe Texas Capitol is enshrouded by steam on February 3.Hide Caption 8 of 24 Photos: Winter storm threatens millions across USParents and their children walk together after school in Erie, Pennsylvania, on February 3.Hide Caption 9 of 24 Photos: Winter storm threatens millions across USJacquayla Fields and her mother, Tiffany Thomas, stand beneath the damaged front porch of a house belonging to Thomas' uncle after a tornado struck Hale County, Alabama, on February 3. No one in the house was hurt. Hide Caption 10 of 24 Photos: Winter storm threatens millions across USIce accumulates on a cactus in Austin, Texas, on February 3.Hide Caption 11 of 24 Photos: Winter storm threatens millions across USSnow covers a limestone statue of Jesus Christ at the summit of Mount Cristo Rey in Sunland Park, New Mexico.Hide Caption 12 of 24 Photos: Winter storm threatens millions across USA police officer assists a truck driver on Interstate 20 in Abilene, Texas.Hide Caption 13 of 24 Photos: Winter storm threatens millions across USA person walks by a statue of the Rev. Martin Luther King Jr. and the Rev. Theodore Hesburgh in South Bend, Indiana, on Wednesday, February 2.Hide Caption 14 of 24 Photos: Winter storm threatens millions across USSalvation Army Maj. Luis Melendez inspects beds at the Mabee Red Shield Lodge in Odessa, Texas, as the shelter prepared to open as an emergency shelter on February 2.Hide Caption 15 of 24 Photos: Winter storm threatens millions across USA pickup truck needs to be pulled out after sliding into the median of Interstate 70 near Columbia, Missouri.Hide Caption 16 of 24 Photos: Winter storm threatens millions across USCory Pacheco uses a snow blower to clear out his driveway in Flint, Michigan.Hide Caption 17 of 24 Photos: Winter storm threatens millions across USA snow plow clears a road in Columbus, Ohio.Hide Caption 18 of 24 Photos: Winter storm threatens millions across USIce begins to form on a Texas flag in San Antonio.Hide Caption 19 of 24 Photos: Winter storm threatens millions across USMotorists navigate Interstate 90 in Chicago on February 2.Hide Caption 20 of 24 Photos: Winter storm threatens millions across USA pedestrian crosses a nearly empty road in Detroit.Hide Caption 21 of 24 Photos: Winter storm threatens millions across USSalt is spread on the sidewalks in downtown Indianapolis.Hide Caption 22 of 24 Photos: Winter storm threatens millions across USA man clears snow at his home in Overland Park, Kansas.Hide Caption 23 of 24 Photos: Winter storm threatens millions across USPeople try to help a motorist who was stuck in the snow in Oklahoma City.Hide Caption 24 of 24Tennessee is still dealing with more than 100,000 power outages after ice storms and threats of flooding.In Texas, more than 10,000 homes and businesses were in the dark as of Friday afternoon. The state's power grid is under scrutiny following last year's disastrous ice and snow storms that left thousands freezing due to power outages. This time, state leaders asserted the grid was prepared to handle the storm. Gov. Greg Abbott said in a Thursday briefing the grid has "plenty of power available at this time," calling the weather "one of the most significant icing events that we've had in the state of Texas in at least several decades."
The storm's path as it heads NortheastNew York Gov. Kathy Hochul urged residents to stay home because of ice on the roads."This storm is throwing everything at us -- we have snow, we have freezing rain, we have sleet, we have icy roads," Hochul said. "Our best advice is just to stay off the roads. They're absolutely hazardous."The governor said most of the severe weather activity is expected to abate by Friday evening. "But, until then, it's going to be literally a day full of freezing rain coming down," she said.New York City and Boston are under a winter weather advisory through Friday evening for freezing rain and sleet, respectively. Both cities, hit hard by heavy snow during last week's powerful nor'easter, could experience ice piling up to a tenth of an inch. Parts of northeastern New Jersey are expected to see similar conditions. The dangerous road conditions are expected to make travel difficult Friday, the NWS said, as it warned that power outages are also possible.Ice projections are higher in Providence, Rhode Island, and sleet may pile up to a tenth of an inch. "The interior parts of New England will mainly see snowfall, with northeast New York, northern Vermont, northern New Hampshire, and much of Maine will see over a foot of additional snowfall," CNN meteorologist Robert Shackelford said. Rochester, New York, had already experienced 10 inches of snowfall, with the possibility of another 4 to 8 inches. A man works to clear a downed tree on February 3 in Memphis, Tennessee.Rain and snowfall records broken "Widespread wind chills in Texas should be as low as -5, but some reports are coming in of wind chills as low as -15," Shackelford said. Gov. Abbott ensured Texans once again on Friday that the power supply will not run out. The grid hit its peak demand at 69,000 megawatts Friday morning; however, the system now has an excess of 17,000 megawatts -- enough power to supply 3 million homes across the state, he said during a briefing. This is expected to last at least through Friday and Saturday."The Texas electric grid is more reliable and more resilient than it has ever been," Abbott said.State officials at the news conference asked motorists to stay off the road because the ice is "stubborn" in many areas and black ice still remains an issue.Since the icing began, state troopers have responded to more than 416 crashes that resulted in 49 serious injuries and three deaths, officials said.The treacherous ice conditions in Texas have turned a stretch of I-10 near the city of Kerrville, which is northwest of San Antonio, into a parking lot, with a miles-long line of vehicles waiting for hours for two crashes to be cleared up.Overnight, two separate 18-wheelers jackknifed on I-10, one near mile marker 501 eastbound and another near mile marker 513 westbound, due to ice on the road, William B. Thomas, Emergency Coordinator for Kerr County told CNN.There were notable records set on Thursday:Dallas broke its daily record of snowfall, with a total of 1.5 inches -- surpassing the previous record of .2 set in 1956 and 2011 North Little Rock, Arkansas, got 3.2 inches of snow -- a daily record, blowing past the previous one of .1 inch set in 1980Indianapolis saw a record snowfall of 7.3 inches, breaking the 6.5 inches that fell in 1982Louisville, Kentucky, got rainfall of 1.51 inches, beating 1.29 inches set in 1887Pittsburgh, Pennsylvania, tied its rainfall record of 1.02 inches that was set in 1939Flags fly over car dealerships as light traffic moves through snow and ice on Route 183 in Irving, Texas, on February 3.Storm brings heavy rain, ice, tornado concerns and travel havoc The steady rainfall led to flash flood warnings or flood watches in parts of Alabama, Georgia, South Carolina and Tennessee.In Alabama, there were tornado watches in 14 counties, and the National Weather Service said it observed a tornado in Elmore County in east-central Alabama.What to pack in your car to stay safe during severe winter weather One person died in what the weather service called a "likely tornado" in Hale County, Alabama, county Emergency Management Director Russell Weeden told CNN affiliate WVTM. Several other people were also injured in that incident, he said.The other two reported storm-related deaths were in New Mexico. One person died when a vehicle slid off a snow-covered road and flipped over 100 feet down a mountain in Bernalillo County, while a man was killed in a chain-reaction crash on Interstate 40 in Guadalupe County, officials said.CNN's Artemis Moshtaghian, Raja Razek, Andy Rose, Judson Jones, Steve Almasy, Holly Yan, Joe Sutton, Dave Hennen, Greg Wallace, Pete Muntean and Amanda Watts contributed to this report.
| 0
|
Story highlightsWorld No.1 Novak Djokovic wins Australian Open men's singles titleDjokovic beats Rafael Nadal of Spain in marathon five-setterDjokovic has won four of the last five grand slam titlesLongest grand slam final in history at five hours 52 minutesWorld No.1 Novak Djokovic beat Rafael Nadal in the longest final in grand slam history to retain the Australian Open title in Melbourne. Djokovic has now won four out of the last five grand slams, beating Nadal in three successive finals, to underline his domination of men's tennis, but it took him seven minutes short of six hours to see off the Spaniard in an epic final.After hitting the winning shot for a 5-7 6-4 6-2 6-7 7-5 victory, Djokovic lay on his back in triumph before ripping off his shirt, pumping his chest in triumph as he walked to the players' box to embrace his coach.The match ended at 1.40 a.m. local time Monday and was 59 minutes longer than the previous record, the 1988 U.S. Open final between Mats Wilander and Ivan Lendl.Can anyone stop champion Djokovic?It also broke the record for the longest match at the Australian Open, the five hours 14 minutes set by Nadal and Fernando Verdasco in 2009.JUST WATCHEDPat Cash reflects on epic Aussie finalReplayMore Videos ...MUST WATCHPat Cash reflects on epic Aussie final 03:26JUST WATCHEDDjokovic friend salutes Aussie winReplayMore Videos ...MUST WATCHDjokovic friend salutes Aussie win 01:27JUST WATCHEDDjokovic wins 'Marathon in Melbourne'ReplayMore Videos ...MUST WATCHDjokovic wins 'Marathon in Melbourne' 02:50"Rafa, you're one of the best players ever," Djokovic said at the trophy presentation."We made history tonight, and unfortunately there couldn't be two winners. But I wish you all the best for this season and I hope that we will have many more matches like this and many more finals."World No. 2 Nadal told the crowd: "I will never forget this match. Even though I lost, it was something really special for me." The Serbian was also involved in a near five-hour long battle to beat Britain's Andy Murray in the semifinals and when he fell behind after an opening set lasting 80 minutes, all the omens pointed to a Nadal victory.But the 24-year-old from Belgrade was not to be denied even after a stirring recovery which saw his opponent take the fourth set on a tiebreak to force a decider on the Rod Laver Arena at Melbourne Park.It was a bitter disappointment for Nadal who, having beaten arch-rival Roger Federer in Thursday's semifinal, was bidding for his 11th grand slam title.He had only lost once after winning the first set of a grand slam match since 2007, but in the end he succumbed to Djokovic's sheer persistence. Two breaks of service to one saw the Mallorcan claim the opener, but Djokovic broke in the fourth game of the second set to recover his composure.However, serving to level the match, Djokovic played a sloppy game and Nadal closed to 5-4.But Nadal showed his first sign of fallibility in the next game as he fell behind and facing set point contrived to double fault.With the impetus now in his favor, Djokovic dominated the third set, running Nadal from side to side and taking it 6-2 with two breaks of service.Djokovic forced three break points on Nadal's service, leading 4-3 in the fourth, but the World No.2 showed his famous fighting qualities by retrieving them and holding for 4-4.As the game was completed, a heavy rain shower caused a break in play as the roof on the arena was closed.When play resumed it was Nadal who came out the sharper and in the tiebreak which followed he upped his game to prevail seven points to five, pumping the air in trademark style as he leveled at two sets all.He looked set to complete the turnaround when he broke Djokovic to lead 4-2 in the decider.But it was not be be as the break was retrieved with Djokovic then looking the stronger.He finally broke through to serve for the match at 6-5.Still he was forced to save a break point, but he closed out the match on the first championship point to claim the winner's check for $2.4 million.
| 0
|
The Internet-connected devices are growing at an exponential rate, and so are threats to them.
Due to the insecure implementation, a majority of Internet-connected embedded devices, including Smart TVs, Refrigerators, Microwaves, Security Cameras, and printers, are routinely being hacked and used as weapons in cyber attacks.
We have seen IoT botnets like Mirai β possibly the biggest IoT-based malware threat that emerged late last year and caused vast internet outage by launching massive DDoS attacks against DynDNS provider β which proves how easy it is to hack these connected devices.
Now, a security researcher is warning of another IoT threat involving Smart TVs that could allow hackers to take complete control of a wide range of Smart TVs at once without having any physical access to any of them.
Researcher Shows Live Hacking Demonstration
The proof-of-concept exploit for the attack, developed by Rafael Scheel of cyber security firm Oneconsult, uses a low-cost transmitter for embedding malicious commands into a rogue DVB-T (Digital Video Broadcasting β Terrestrial) signals.
Those rogue signals are then broadcast to nearby devices, allowing attackers to gain root access on the Smart TVs, and using those devices for nasty actions, such as launching DDoS attacks and spying on end users.
Scheel provided a live hacking demonstration of the attack during a presentation at the European Broadcasting Union (EBU) Media Cyber Security Seminar, saying about 90 percent of the Smart TVs sold in the last years are potential victims of similar attacks.
Scheel's exploit relies on a transmitter based on DVB-T β a transmission standard that's built into TVs that are connected to the Internet.
The attack exploits two known privilege escalation vulnerabilities in the web browsers running in the background and once compromised, attackers could remotely connect to the TV over the Internet using interfaces, allowing them to take complete control of the device.
Once compromised, the TV would be infected in a way that neither device reboots nor factory resets would help the victims get rid of the infection.
Scheel's exploit is unique and much more dangerous than any smart TV hack we have seen so far.
Previous Smart TV hacks, including Weeping Angel (described in the CIA leaked documents), required physical access to the targeted device or relied on social engineering, which exposes hackers to the risk of being caught as well as limits the number of devices that can be hacked.
However, Scheel's exploit eliminates the need for hackers to gain physical control of the device and can work against a vast majority of TV sets at once.
The hack once again underlines the risks of "Internet of Things" devices. Since the IoT devices are rapidly growing and changing the way we use technology, it drastically expands the attack surface, and when viewed from the vantage point of information security, IoT can be frightening.
| 1
|
(CNN)Belgium obliterated Armenia 19-0 on Thursday night in their Women's World Cup qualifying clash. Captain Tessa Wullaert scored five times, while Amber Tysiak and Tine De Caigny both netted hat-tricks. Janice Cayman, Hannah Eurlings and Jarne Teulings scored twice each and goals for Justine Vanhaevermaet and Sarah Wijnants completed the rout in Leuven.The 19-goal margin smashed the team's previous goals record of 12-0 set against Moldova in September 2017.The official Twitter account of the Red Flames celebrated the emphatic victory with a simple tweet: "Job done." Read MoreBelgium's heavy winning margin was not a record though; there are four occasions where a team has won by a 21-goal margin. In 1997, in its first international match, Guam lost 21-0 to Japan. In 1998, Canada beat Puerto Rico 21-0 in Toronto in the 1998 CONCACAF Women's Championship. And in Oceania's Women's Championship tournament in 1998, New Zealand beat Samoa -- its first international -- and Australia smashed American Samoa, both with a score of 21-0. Extraordinarily, Belgium had raced into a 10-goal lead after just 34 minutes against Armenia. By halftime, the lead was 11-0, a lead the official team website described as "solid."Belgium's Wullaert and Armenia's Karine Yeghyan pictured in action.It took the team just five minutes after halftime to equal the team's previous record, with Wullaert finishing between four defenders. The scoring rate slowed down somewhat afterwards, with Wullaert -- Belgium's all-time top scorer -- scoring her fifth in the 92nd minute only for Teulings to wrap up the victory two minutes later. "A true monster score," the Belgium team website called the win, which bolsters the team's hopes of qualifying after a disappointing 4-0 defeat to Norway in their last match. Visit CNN.com/sport for more news, features, and videosBelgium now sits in third, three points behind Norway, and will face Poland -- who sit second, one point ahead of Belgium -- next time out. It wasn't the only game that was packed with goals, as Spain beat the Faroe Islands 12-0 and Northern Ireland won 11-0 away at North Macedonia.
| 0
|
Story highlightsLindsay McCormick says NFL Network asked in an interview: "Do you plan on getting knocked up?"She does not name the employee who asked the question (CNN)A female television sports reporter and host has shared her story following the news of NFL Network and ESPN suspending five former football players who are accused of sexual harassment while they worked for NFL Network."I've been quiet about this for too long," Lindsay McCormick wrote in an Instagram post. "In my last interview with NFL Network a few years ago, the head of hiring talent said to me, 'If we hire you, do you plan on getting knocked up immediately like the rest of them?'"'Them' as in badass working women who deserve to have a family life as well? 'Them' as the women who work their tails off to be taken seriously in a man's world? Or 'them' who bring you a new audience and a tremendous amount of viewership?"Because while I don't plan on 'getting knocked up,' I do plan on being like the rest of those brilliant women that our future daughters will one day look up to and see you can have it all."McCormick said later in the post: "Kudos to NFL Network for eventually removing this man from his position and for the actions they've taken this week."Read More A post shared by Lindsay McCormick (@lindsaymccormicksports) on Dec 12, 2017 at 9:39pm PST On Monday, a former wardrobe stylist for NFL Network filed a suit alleging sexual harassment and wrongful termination. The suit involves current and past on-air talent for the network.The ex-employee, Jami Cantor, has some explosive allegations in her lawsuit, claiming instances of groping, lewd comments and that she was sent explicit photos, videos and texts by co-workers.In a statement to CNN, NFL Network says three former NFL players have been suspended with pay while there is an investigation. Those three are Pro Football Hall-of-Famer Marshall Faulk, Ike Taylor and Heath Evans, all on-air talent for the network.Donovan McNabb and Eric Davis, who now work for ESPN, were also named in the suit. ESPN said in a statement to CNNMoney that the network is investigating, adding that the two former players will not appear on its networks as that investigation proceeds.Merriam-Webster's word of the year for 2017 is 'feminism'Also named in the suit is Hall-of-Famer Warren Sapp, who was fired by the NFL Network in 2015 after he was arrested in Phoenix on allegations of propositioning a prostitute after covering the Super Bowl.One non-athlete named in the suit was a former executive producer at the network, Eric Weinberger, who is now president of The Ringer, a sports and popular culture website.The Ringer has placed Weinberger on indefinite leave "until we have a better understanding of what transpired during his time at the NFL, and we will conduct our own internal investigation," the site said in a statement.None of the men accused in the suit responded to CNNMoney's requests for comment on Tuesday.The NFL Network, which is owned by the National Football League, has yet to respond to CNN's request for comment on McCormick's post.Correction: An earlier version of this story incorrectly said that The Ringer is owned by Vox Media. It has a business relationship with Vox, but is not owned by it.CNN's Chris Isidore contributed to this report.
| 0
|
(CNN)There were eight gold medals up for grabs on Wednesday at the 2022 Beijing Winter Olympics.Here's a breakdown of who is taking home gold for their delegations on Day 12 of the Games.Alpine SkiingMen's slalom: Clement Noel, France BiathlonRead MoreWomen's 4x6km Relay: SwedenCross-Country SkiingWomen's team sprint classic: Germany Men's team sprint classic: Norway Freestyle SkiingMen's freeski slopestyle: Alexander Hall, USAMen's aerials: Qi Guangpu, ChinaShort Track Speed SkatingMen's 5000m relay: CanadaWomen's 1500m: Choi Min-jeong, South KoreaThe full medal table can be found here.
| 0
|
If you own an Android smartphone, Beware! A new Android malware that has already breached more than 1 Million Google accounts is infecting around 13,000 devices every day.
Dubbed Gooligan, the malware roots vulnerable Android devices to steal email addresses and authentication tokens stored on them.
With this information in hands, the attackers are able to hijack your Google account and access your sensitive information from Google apps including Gmail, Google Photos, Google Docs, Google Play, Google Drive, and G Suite.
Researchers found traces of Gooligan code in dozens of legitimate-looking Android apps on 3rd-party app stores, which if downloaded and installed by an Android user, malware starts sending your device's information and stolen data to its Command and Control (C&C) server.
"Gooligan then downloads a rootkit from the C&C server that takes advantage of multiple Android 4 and 5 exploits including the well-known VROOT (CVE-2013-6282) and Towelroot (CVE-2014-3153)," researchers said in a blog post.
"If rooting is successful, the attacker has full control of the device and can execute privileged commands remotely."
According to CheckPoint security researchers, who uncovered the malware, anyone running an older version of the Android operating system, including Android 4.x (Jelly Bean, KitKat) and 5.x, (Lollipop) is most at risk, which represents nearly 74% of Android devices in use today.
"These exploits still plague many devices today because security patches that fix them may not be available for some versions of Android, or the patches were never installed by the user," researchers added.
Once hack into any Android device, Gooligan also generates revenues for the cyber criminals by fraudulently buying and installing apps from Google Play Store and rating them and writing reviews on behalf of the phone's owner. The malware also installs adware to generate revenue.
How to check if your Google account has been compromised with this malware?
Check Point has published an online tool to check if your Android device has been infected with the Gooligan malware. Just open 'Gooligan Checker' and enter your Google email address to find out if you've been hacked.
If you found yourself infected, Adrian Ludwig, Google's director of Android security, has recommended you to run a clean installation of the operating system on your Android device.
This process is called 'Flashing,' which is quite a complicated process. So, the company recommends you to power off your device and approach a certified technician or your mobile service provider in order to re-flash your device.
| 1
|
London (CNN)Archeologists working in central England have found a shackled skeleton which, they say, provides physical evidence that slavery was practiced in Roman Britain.The adult male was buried in a ditch with iron fetters locked around his ankles, Museum of London Archaeology (MOLA) said Monday.The remains were found by builders working on a home extension in Great Casterton, in the central English county of Rutland, archaeologists from MOLA said, adding that this is the first time this kind of restraint has been found on a skeleton from Roman Britain. Radiocarbon dating has revealed that the remains date from between 226 and 427 AD, according to the press release. The Romans occupied large parts of Great Britain between 43 BCE and around 410 AD."We do know that the Roman Empire relied quite heavily on slave labor. It underpinned much of the empire throughout history. And it was true of Roman Britain as well. We have lots of literary evidence from wood, writing tablets and stone carvings," said Chris Chinnock, a human osteologist, or bone specialist, at MOLA. Read More"What we haven't found before is the physical remains of a person we think, we strongly suspect, could have been a slave."The man was buried in an awkward position outside a Roman cemetery.Chinnock said that it was impossible to definitively say that the man was enslaved but he represented the best candidate found in the UK. In addition to fetters, which are of a particular type associated with slavery elsewhere in the Roman Empire, the man was buried slightly on his right side, with his left side and arm slightly higher up a slope, which suggests he was disposed of in a ditch rather than buried in a proper grave, said MOLA. The individual was also buried just 200 feet from a Roman cemetery, which was "perhaps a conscious effort to separate or distinguish them from the people buried within the cemetery," according to the press release.'Exceptionally high' number of decapitated bodies found at Roman burial siteGiven that the shackles were a complex piece of iron work and would have been an expensive object to manufacture or purchase, Chinnock said that it was unlikely it would have been easily discarded. "For living wearers, shackles were both a form of imprisonment and a method of punishment, a source of discomfort, pain and stigma which may have left scars even after they had been removed," said Michael Marshall, finds specialist at MOLA, in the statement. "However, the discovery of shackles in a burial suggests that they may have been used to exert power over dead bodies as well as the living, hinting that some of the symbolic consequences of imprisonment and slavery could extend even beyond death."A small number of burials dating from Roman Britain have heavy iron rings around the limbs, but they may have been forged onto the bodies and probably wouldn't have been able to be worn during an individual's life, added the team.According to the statement, some written sources from the time mention that the dead were restrained to stop them "from rising and influencing the living."Radiocarbon dating revealed the burial took place between 226 and 427 AD.Detailed examination of the skeleton showed the man led a "physically demanding life," the archeologists said. "A bony spur on one of the upper leg bones may have been caused by a traumatic event, perhaps a fall or blow to the hip, or else a life filled with excessive or repetitive physical activity," the statement said. "However, this injury had healed by the time he had died, and the cause of his death remains unknown."
| 0
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.