Thursday, March 31, 2016

Android diversity makes its safer, according to a researcher

The Android ecosystem diversity would be its biggest strength and isn't its weakness, the researcher Dino Dai Zovi has ensured. It's the provocative statement of the day we thought interesting to highlight, as well as the appearance of a ransomware which attacks the Magento e-commerce platform, information robots in large law firms and a new standard to encrypt health and banking data.




This Tuesday started the Black Hat Asia and there gave a speech Dino Dai Zovi, Square security expert, leader on Mobile payments. Zovi says the many existing Android versions, caused by each manufacturer to adapt it to its device, difficulting to cybercriminals making massive attacks, because they have to adapt to a highly diverse ecosystem. It seems proved the fact that, although they exist dangerous holes on Android, few devices are attacked.

Ransomware for Magento

We visit again the ransomware front, which still attacking hospitals but it focus too in other objectives: it has been discovered two ransomwares designed specially to attack Magento e-commerce platforms. It encrypt the web server contents and the only defense is using strong passwords in admin accounts.

Robberies in law firms

Another delicious target for cybercriminals are the large law firms, which usually have valuable information. Two New York firms, Cravath Swaine & Moore LLP and Weil Gotshal & Manges LLP, have denounced robberies made by people who entered in their networks. It isn't clear what they robbed, but both firms are specialized in patents and intellectual property.

NIST new standard

We finish with a good new, a limited luxury in the savage cybersecurity world: the respected National Institute of Standards and Technology (NIST) has published two techniques aimed to encrypt credit card numbers, which can be used too in health data. Both techniques allow to encrypt a credit card number, giving as result a figure with the same numbers in the card, improving enormously its application on produced systems.


0 comments:

Post a Comment