One cybercrime in every 10 minutes in first six months of 2017: report

One cybercrime in every 10 minutes in first six months of 2017: report.
New Delhi: The rate of cybercrime has increased in 2017, as one case of cybercrime was reported in every 10 minutes in the first six months, said a report in The Economic Times.
According to Indian Computer Emergency Response Team (CERT-In), 27,482 cases of cybercrime were reported from January to June.
This is higher than 2016 when a cybercrime was reported in every 12 minutes, added the report.
Analysis of data from 2013 – 2016 shows that network scanning and probing, which is seen as the first step to detect vulnerabilities in systems so that sensitive data can be stolen, constituted 6.7% of all cases while virus or malware attack accounted for 17.2%, added the report.
The cybercrime includes global ransomware attacks that hit hundreds of systems, to phishing and scanning rackets.
The report said while India has been dealing with crimes such as phishing and defacement, ransomware attacks have come as a surprise.
Other crimes in the cyberspace include phishing, scanning or probing, site intrusions, defacements, virus or malicious code, ransomware and denial-of-service attacks.
India has seen a total of 1.71 lakh cases of cybercrime in the past three-and-a-half years and the CERT claims that the number is likely to cross 50,000 by December.
The RBI has also been issuing regular warnings on bitcoins, added the report.

Scotland witnessing ‘significant’ growth in cyber crime

“Another big problem has always been the lack of reporting.
Under-reporting is a difficulty facing all forces, so we don’t know what cyber is costing us.” The Scottish Government and Police Scotland say they are working on systems to classify cyber crimes – but unlike the rest of the UK, there are no dedicated cyber crime statistics, leading for calls for them to be compiled.
A Johnston Press Investigation showed police forces in England and Wales saw an 87 per cent rise in cyber crime investigated in the past year alone – with around 85 per cent going unsolved.
The JP Investigations Unit sent Freedom of Information requests to every police force in the UK.
Data showed that 39,339 cyber crimes were reported to 30 police forces in England and Wales in the last 12 months, up from 21,037 the year before.
Offences under both acts were deemed by the Scottish Government to be the only ones identifiable as cyber crime.
However, cyber-enabled crimes such as fraud, malicious communication, or the sale of illegal items are all covered by legislation that doesn’t separate online from non-online offences.
Police Scotland said it was unable to provide information on how many cyber crimes it had investigated in the past three financial years.
Paddy Tomkins, chairman of the Scottish Business Resilience Centre said: “The Scottish Government and Police Scotland are working very hard on classifying these crime figures, but it’s fair to say that what’s going on nationally will be proportionately happening in Scotland.
“Cyber crime is a threat that has come about really very quickly and it changes on a daily basis, so we need to be able to keep up with that we can also adapt and change.” A Scottish Government spokesman said: “The Scottish Government is live to the threat of cyber crime, which is growing at an unprecedented rate.

Antivirus for Android Has a Long, Long Way To Go

Taking on the mindset of an attacker, the researchers built a tool called AVPass that works to smuggle malware into a system without being detected by antivirus.
“Antivirus for the mobile platform is really just starting for some companies—a lot of the antivirus for Android may even be their first iteration,” says Max Wolotsky, a PhD student at Georgia Tech who worked on the research.
So in creating AVPass, the researchers started by developing methods for defeating defensive algorithms they could access (like those created for academic research or other open-source projects) and then used these strategies as the basis for working out attacks against proprietary consumer antivirus—products where you can’t see the code powering them.
Free Pass To test the 58 Android antivirus products and figure out what bypasses would work against each of them, the researchers used a service called VirusTotal, which attempts to identify links and malware samples by scanning them through a system that incorporates dozens of tools, and offering results about what each tool found.
By querying VirusTotal with different malware components and seeing which tools flagged which samples, the researchers were able to form a picture of the type of detection features each antivirus has.
Before this reconnaissance, the team developed a feature for AVPass called Imitation Mode, which shields the test samples submitted for antivirus scanning so the snippets themselves wouldn’t be identified and blacklisted.
The team worked with mainstream malware samples from malware libraries like VirusShare.com and DREBIN. “They are just rogue apps in most cases, so they are far easier to detect.”
And Mannan notes that though Android antivirus apps have a lot of leeway in the system, they aren’t as privileged as antivirus apps on PCs, which could potentially cut down on concerns that antivirus can sometimes be exploited as a security vulnerability in itself.
The AVPass team says that Android antivirus developers need to build out their products so the programs are looking for multiple malicious attributes at once.

Data breach of Australia’s Medicare exposed, EHR safety concerns raised

Investigating the breach and publishing a statement to notify the Privacy Commissioner of the breach and patients, especially if patients are affected, are the steps that the Australian Government would want private health service providers to take.
Since the government has announced a new opt-out online health record in the 2017 Budget, a deeper look into security concerns will also be pushed to maintain the public trust and confidence in the security of online health data.
According to the Australian Government, it is the healthcare providers’ responsibility to protect personal data from attacks by cyber criminals.
Patients’ health information was being sold on a popular auction site and Alan Tudge, the human services minister, has admitted that his department was not aware of this data breach.
The investigation by Guardian Australia revealed all the shocking details in its paper, including the fact that at least 75 patients’ personal details have been sold and that one of its reporters purchased his own Medicare number at AUD $30.
Government agencies are highlighting approaches that can help all healthcare providers to know when there’s a serious data breach.
The Department of Human Services sees this data breach as a traditional criminal activity instead of a hack or a cyber-attack.
Medical officers are concerned on the safety of EHR Doctors are concerned now at how this breach can make patients turn away from the Australian Government’s digital medical file scheme, a AUD 1 billion My Health Record System that is set to be implemented for all residents of Australia in 2018.
Questions are being asked and answers are being demanded from the Government by the Australian Medical Association on this issue specifically on how patient confidentiality should be protected.
“But to do all that both doctors and patients needs absolute confidence in the integrity of personal information.” Speaking on this, a Health Department spokesman said that the Government’s digital medical file scheme has multiple layers of security to protect access to the system and that so far, there have been no security breaches of patient data in the system.

4 seniors: Protecting yourself from identity theft

4 seniors: Protecting yourself from identity theft.
OKLAHOMA CITY – The government is in the process of removing social security numbers from Medicare cards, but with 58 million beneficiaries, it can be a huge task.
The Centers for Medicare and Medicaid Services will start sending the new cards next year, but it will take until December of 2019 for all cards to be replaced.
Officials say scam artists are already hard at work.
Some Medicare recipients report getting calls from scamsters who tell them that they must pay for the new card.
They then ask for their checking account and Medicare card numbers.
Until you receive a new card, the Privacy Rights Clearinghouse recommends that you carry your Medicare card only when you visit a health care provider for the first time.
Otherwise, make a photocopy of your card and cut it down to wallet size.
Then take a black marker and cover the last four digits of your SSN and carry that instead in case of an emergency.
You can also check your Medicare claims online or by calling 800-633-4227.

Dangerous teddy bears? FBI issues privacy warning for high-tech ‘smart’ toys

Dangerous teddy bears?
FBI issues privacy warning for high-tech ‘smart’ toys.
TAMPA, Fla. – That high-tech teddy bear taking to your kids?
You will want to keep a close eye on the cuddly critter.
FBI agents are warning parents to make sure internet-connected toys are safe and secure – and do not lead to child identity fraud or exploitation.
Parents should do their research on toys that access Wifi or Bluetooth, especially when they put a child’s image and information into cyberspace.
“Before we put anything in her room and access it through the Cloud and WiFi, we do research on the product to make sure they have the right security in place,” says Amber Bahlke.
Amber’s young daughter Amber has a few smart toys in her room, include a CloudPets teddy that lets her “talk” to her grandfather one thousand miles away.
Earlier this year, CloudPets customers in Australia were hacked by cyber criminals who held account information and voice messages for ransom.
The FBI also recommends you: Know all of the toy’s features; for instance, whether it has hidden GPS or location services Make sure toys run on updated software; older versions are targets for security breach Read all disclosures about the toy, eliminate surprises Turn the toy OFF when you or your child is done playing with it; that way all microphones/cameras are shut down For the full FBI warning, visit: www.ic3.gov/media/2017/170717.aspx.

Why Are Millennials Avoiding Credit Cards?

Why Are Millennials Avoiding Credit Cards?.
That compares to only 45% of Americans between the ages of 30 and 49, and 38% of those aged 50-64 without credit cards.
The 2009 Credit Card Accountability Responsibility and Disclosure (CARD) Act probably played some part in the decrease by making credit cards difficult to obtain for those under age 21.
Unemployment may be keeping some millennials from qualifying for credit, but others appear to be avoiding credit cards as a matter of principle.
Debt/Interest Rate – Credit card debt is usually the highest interest rate debt you will incur and if you charge more than you can pay off each month, debt can spiral to unmanageable levels.
Ease of Overspending – The flipside of the convenience advantages listed above.
Poor Credit Scores – Just as you can build your credit history with responsible credit card use, you can damage it with irresponsible use.
Having no credit history makes it difficult to qualify for loans and mortgages, but having a poor credit history increases those difficulties.
The most responsible path is to use cards sparingly, pay them off in full each month, and stay at a small fraction of your credit limit (10% or less if possible).
Avoiding credit cards is advisable if you cannot use them responsibly.

Lawmakers Hold Hearing On Bathroom Privacy Bills Friday

AUSTIN (CBSDFW.COM) – Hundreds of people are expected to testify Friday morning at the Texas Capitol during a hearing about two newly proposed bathroom privacy bills.
“I’m angry about the legislation.” On Thursday, he packed his bags for the drive down to Austin.
“I’m happy to go down to testify for my basic human rights, but I don’t think I should have to do that in the first place.” If SB 3 or SB 91 is approved, people would have to use the multi-occupancy bathrooms and locker rooms in local government buildings and public schools that match their birth gender.
Cathie Adams, a grandmother and national board member of the conservative group, Eagle Forum praises the legislation.
The grassroots are very enlivened and want this bill finished, passed.” Adams and other supporters say this isn’t about transgender people, but about keeping sexual predators out of women’s and girls’ bathrooms and locker-rooms.
“If a pervert were to go into a restroom, it wouldn’t matter about gender identity.
People would be able to tell that there’s a difference between trans people and perverts.” Adams disagrees, “There are others who are dressing as transgender, even if they’re not, and they are predators, and so this is just part of a law that has got to distinguish right from wrong.” Other proposed bathroom privacy bills, HB 46 and HB 50, proposed by Rep. Ron Simmons, R-Carrollton, would also negate all local ordinances and written school district policies relating to multi-occupancy bathrooms and locker rooms.
A similar bill has been filed in the Senate, SB 23, but a hearing isn’t scheduled on this legislation.
Adams though says, “I think the schools are trying to push the envelope.” Pettigrew says he’s been allowed to use the men’s room at his Garland high school without hearing any complaints.
Straus, moderate Republicans and Democrats say they don’t like the bathroom privacy bills because they’ll hurt Texas’ reputation as a pro-business state that welcomes everyone.

Largest dark web market closed in massive government takedown

The Department of Justice and Europol announced Thursday that they have shut down AlphaBay and Hansa, two massive marketplaces on the dark web that served hundreds of thousands of customers trying to get their hands on illegal goods online.
While you or I can easily buy groceries, electronics and clothes online, when it comes to finding drugs, weapons and stolen identities, things can get a little more complicated.
Merchants of contraband hide out on the dark web, a hidden part of the internet that you can only access through special browsers like Tor.
AlphaBay alone had 200,000 customers and more than 40,000 sellers peddling illegal goods, making it the largest takedown for a dark web marketplace ever.
The website had 100,000 listings for sale when the governments took it down.
In comparison, Silk Road, one of the most notorious dark web markets, had 14,000 listings when the FBI shut down the site four years ago.
Hansa was the third largest dark web market when it shut down.
The website made $1 billion in sales before it was shut down in a joint operation of the FBI, the Drug Enforcement Agency, Dutch police and Europol.
Terbium Labs had been following the dark web for months, specifically in marketplaces like AlphaBay.
After AlphaBay’s shutdown, its users flocked to Hansa, increasing the dark market’s traffic in eightfold, Wainwright said.