Wenatchee Valley College - CTS Discussion Board

You are not logged in. Would you like to login or register?



10/14/2019 8:11 am  #11


Re: Security Class Article #2 - Due Monday October 14th --REPLY HERE

This article is about how a hacker named Jmaxxz started out buying a remote starter for his girlfriend's car because she was complaining it was to cold to go outside and start the thing manually. Jmaxxz is a security software engineer and he was worried that he would expose this starter to hackers online. When he really looking into it, there turned out to be a number of exploits like locating cars, identifying them, unlocking them, and starting them. The software in question is called Mycar, it operates via radio based start devices that use GPS and cellular connection to extend their range to pretty much anywhere with an internet connection. Jmaxxz scanned the MyCar data base and estimated 60,000 cars were at risk. He also found that he could use hard coded admin rights to go into the company's backend data and that he could use SQL injection bugs and direct object reference vulnerabilities to gain sensitive information as well. He reported this to the company and they fixed it over the course of a few months, and they even came out as saying no incidents had been detected or reported concerning security violations. He scanned the data that MyCar had on his girlfriend's car and found out that it had tracked 2,000 of her locations since he had installed it, which he was not happy about. Case in point: he got rid of MyCar and built his own code to do the same thing for his girlfriend, he said he would link it on Github. - Ethan O'Donnell

https://www.wired.com/story/mycar-remote-start-vulnerabilities/

 

10/14/2019 9:53 am  #12


Re: Security Class Article #2 - Due Monday October 14th --REPLY HERE

Google announces new USB-C Titan Security Key

Today Google announced they are releasing a new version of the Titan Security key. It is a USB-C second-factor security key that is part of Google's Advanced Protection program. It is manufactured by Yubico, and based on FIDO open standards that Google helped develop with Yubico. The devices are built with a hardware secure element chip that includes firmware to verify the key's integrity. Google says this device is one of the best ways to protect Google accounts from hacking and fishing, especially high-value accounts that are frequently attacked.

https://www.zdnet.com/article/google-announces-new-usb-c-titan-security-key/

-Kayla R.
 

 

10/14/2019 10:15 am  #13


Re: Security Class Article #2 - Due Monday October 14th --REPLY HERE

The article I found about a company in Japan called Huawei that experiences 1 million Cyber attacks a day. Huawei’s 5G innovation is a possible reason for these attacks. Huawei alleged that the US government targeted the firm through various hostile means, including cyber attacks. After doing some research more on Huawei, I've came to see that Huawei 5G network is very valuable and there security brand new and high tech that rarely does the cyber attacker ever succeed.
https://latesthackingnews.com/2019/10/14/huawei-claims-to-endure-over-1-million-cyber-attacks-each-day/
Devin Fry

 

10/14/2019 10:18 am  #14


Re: Security Class Article #2 - Due Monday October 14th --REPLY HERE

hackers got into a prostitution website and stole a bunch of people's info... passwords, names, IPs, etc (lol)
https://www.infosecurity-magazine.com/news/dutch-sex-forum-data-breach/

 

10/14/2019 10:22 am  #15


Re: Security Class Article #2 - Due Monday October 14th --REPLY HERE

https://www.forbes.com/sites/thomasbrewster/2019/10/10/dutch-prostitution-site-hookersnl-hacked--250000-users-data-leaked/One must be very careful when purchasing online "services", even in places where it is legal
 

 

10/14/2019 10:43 am  #16


Re: Security Class Article #2 - Due Monday October 14th --REPLY HERE

In late November 2014 Sony was hacked by a group calling them self's  Guardians of peace. The hacker group was working with North Korea and the reason they hacked Sony was because of the movie "The interview." The Hackers took terabytes of data and threatened Sony with demands, but Sony denied the request and got their servers back up within days.Here is the article I found. https://www.vox.com/2015/1/20/18089084/sony-hack-north-korea
-Tony Leon 

 

10/14/2019 11:35 am  #17


Re: Security Class Article #2 - Due Monday October 14th --REPLY HERE

The article I found has to do with Apple's new update for Mac computers, this update is called MacOS Catalina. The overall update has to do with the improved security features, such as improved data protection, weak password warnings, sender block in mail, better screen time limits, enhanced gatekeeper technology, view-only notes sharing, find my smarts, secure activation lock, apple Id access and secure home video. Personally my favorite part of the update would have to be the improved data protection because MacOS Catalina makes apps go through more steps for accessing the users information, it makes apps ask the user for permission if they want to access parts of your computer where there is documents and personal files. They also changed the MacOS so it now is store on a separate disk volume which isolates it from all other data and programs so that no apps can mess with important files.
https://www.wired.com/story/macos-catalina-privacy-security-features/

Jorge Calderilla
 


Jorge Calderilla
 

10/14/2019 3:20 pm  #18


Re: Security Class Article #2 - Due Monday October 14th --REPLY HERE

This article covers DDoS attacks, different types of attacks and the corresponding layers affected. It explains that most hackers utilize IoT botnets which consist of computers and other internet-connected devices that have been hacked and are co-opted to assist with further hacking. In 2018, GitHub suffered a DDoS attack reaching 1.35 Tbps from these bots. An interesting statistic I noticed was UDP floods account for 20% of all DDoS attacks. Different types of defenses are also covered including proactive, reactive, and hybrid methods. Some companies can even use the cloud to redirect legitimate traffic while the DDoS is being dealt with.

Derek Dewitt
https://www.a10networks.com/blog/how-defend-against-ddos-attacks-six-steps/

 

10/14/2019 11:05 pm  #19


Re: Security Class Article #2 - Due Monday October 14th --REPLY HERE

Im a big fan of gaming on computer ever since my friends convince me to get a gaming pc, and reading this part of laptop gaming computer with rapid firing keys sounds so cool and wish I have the money to be able to carry one and play where ever.
https://techlapse.com/computer-hardware/first-laptop-razer-blade-15-advanced-with-optical-keyboard/

 

Board footera

 

Powered by Boardhost. Create a Free Forum