{"id":4308,"date":"2014-11-03T12:30:06","date_gmt":"2014-11-03T17:30:06","guid":{"rendered":"http:\/\/www.kaspersky.co.in\/blog\/?p=4308"},"modified":"2020-02-26T20:28:25","modified_gmt":"2020-02-26T14:58:25","slug":"october-roundup-2014","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.in\/blog\/october-roundup-2014\/4308\/","title":{"rendered":"October Monthly Roundup"},"content":{"rendered":"<p>Kaspersky Lab was busy this October bringing you breaking security news stories, and other relevant reads. From infected ATMs and Android 5.0\u2019s new crypto system, to cyber-mercenaries and cryptoware protection, we covered it all. If you missed any of our October posts, fear not! This quick summation of our most popular posts will get you up to speed!<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Read highlights from our top #security news posts in October.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FF6kP&amp;text=Read+highlights+from+our+top+%23security+news+posts+in+October.\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p><strong><a href=\"https:\/\/www.kaspersky.com\/blog\/full-disk-encryption-android-5\/\" target=\"_blank\" rel=\"noopener nofollow\">Android 5.0 Data Better Protected with New Crypto System<\/a><\/strong><\/p>\n<p>Law enforcement agencies are not exactly happy with Google and Apple these days. User content, stored in the latest iterations of the iOS and Android operating systems, is encrypted in such a way that neither company has the capacity to decrypt the locally stored information. This means that even with a warrant, they\u2019ll have no sure-fire way of compelling users to decrypt locally stored data. However,\u00a0<a href=\"https:\/\/threatpost.com\/experts-laud-changes-to-iphone-android-encryption\/108708\" target=\"_blank\" rel=\"noopener nofollow\">privacy and security advocates are heralding the new disk-encryption schemes<\/a>, which seem to equip consumers with real mobile data-security. Some will see these moves as reckless; others will see them as obvious reactions to an environment where it\u2019s become entirely too easy for the government to collect prosecutorial information with little to no oversight. Google is now touting their new by-default encryption that is part of the new Android Lollipop, also known simply as \u201cAndroid 5.0\u2033 or \u201cAndroid L.\u201d In this new system the password or PIN plus some built-in, possibly hardware-based credential, will derive the decryption key. Thus, brute-forcing a password may still be possible, but it won\u2019t decrypt encrypted disk space.<\/p>\n<p>In other words, the most popular mobile operating system in the world finally becomes more secure.<strong>\u00a0<\/strong><\/p>\n<p><strong><a href=\"https:\/\/www.kaspersky.com\/blog\/remember-strong-passwords\/\" target=\"_blank\" rel=\"noopener nofollow\">How to Remember Strong, Unique Passwords<\/a><\/strong><\/p>\n<p>How is it 2014 and we\u2019re still stuck memorizing ever-longer\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/21st-century-passwords\/\" target=\"_blank\" rel=\"noopener nofollow\">lists of passwords<\/a>\u00a0like it\u2019s 1999? \u00a0If we\u2019re going to rely on an ancient authenticator for future technology, then we might as well come up with a solid way to remember our passwords. This is exactly what our friends at\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/video-2-privacy-and-bad-bargains\/\" target=\"_blank\" rel=\"noopener nofollow\">Carnegie Mellon<\/a>\u00a0University\u2019s computer science department have done. Unfortunately, it turns out that remembering long lists of complicated\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/heartbeat-authentication\/\" target=\"_blank\" rel=\"noopener nofollow\">passwords<\/a>\u00a0requires us to do something that no one likes: study. In this study, participants were prompted with a scene and person pair, and were made to perform a rehearsal routine to recall the action and the object at a set number of spaced intervals over a period of 100 or so days. To learn the results that shocked researchers, read the rest of the article! Ultimately, we learned that it\u2019s easier to remember fewer passwords. Which is probably why nearly everyone uses the same password across multiple accounts, despite knowing that password sharing is a bad idea. But there is also good news \u2014you can improve your passwords using the relatively easy mnemonic technique described here.<\/p>\n<p><strong><a href=\"https:\/\/www.kaspersky.com\/blog\/legal-malware-counteraction\/\" target=\"_blank\" rel=\"noopener nofollow\">Legal malware and cyber-mercenaries<\/a><\/strong><\/p>\n<p>Think about this: the more we entrust our everyday routines to computers, the more attractive they become for those that love digging into others\u2019 secrets\u2014bad guys and good guys alike; hacking and espionage are hardly crimes for the secret service, but instead are a part of their everyday work. A key trend in today\u2019s world of cybercriminal business is the legalization of cybercrime, which is positioned differently in the infosec market. Kaspersky Lab\u2019s experience proves that privately developed legal malware could potentially end up not only in the \u2018good\u2019 hands of secret service, but also in the hands of very pragmatic third parties. \u00a0So is it dangerous? Significantly. Malware like this is created for those with a very generous budget. It is at a very advanced level that has nothing to do with teenage misbehaviors or petty criminals trying to steal a hundred bucks from your credit card. The developers of legal malware use a great deal of advanced technologies in their products that can fool a virus analyst and prevent him from looking under the hood. Despite all this, practices do prove that such technologies do have their limitations: there is no magic allowing one to break stealthily into any system but, rather, it is a sample of a usual malware.<strong>\u00a0<\/strong><\/p>\n<p><a href=\"https:\/\/www.kaspersky.com\/blog\/tyupkin-atm-malware\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>Infected ATMs gave away millions of dollars<\/strong><\/a><\/p>\n<p>Hackers don\u2019t take money out of the ATM like you and me: they don\u2019t need cards, PIN codes or bank accounts to get money. In reality, all they need is an ATM with some cash in it and a special piece of software. At the request of a financial institution, our colleagues from the Global Research and Analysis Team (GReAT) performed a forensic investigation into a cyber-criminal attack that targeted multiple ATMs in Eastern Europe. They discovered that by using a trojan called Tyupkin, hackers can withdraw an unlimited amount of banknotes simply by entering a special code into the pin pad. Tyupkin infects the PC inside of an ATM and forces it to dispense banknotes when prompted by the special code. Criminals were somehow able to physically access the ATMs so that they could install the malware. The Trojan had a number of advanced abilities making an attackers job quite simple.\u00a0 Thankfully, right now hackers can only infect certain ATM models, but the variety of hackable ATMs will grow unless banks and ATM manufacturers increase the physical, and software, protections of these machines.<strong>\u00a0<\/strong><\/p>\n<p><strong><a href=\"https:\/\/www.kaspersky.com\/blog\/primary-webmail-protection\/\" target=\"_blank\" rel=\"noopener nofollow\">Prioritizing the Protection of Primary Webmail Accounts<\/a><\/strong><\/p>\n<p>Think about this: whenever you set up nearly any online account, you\u2019re prompted to enter a primary webmail account. This primary email account also acts as the place where you can recover online accounts if they become hijacked or if you forget your password. In this way, your primary email account is more sensitive than your PayPal or your banking account, because if the email account is compromised, so too are the financial accounts! A criminal in control of your webmail account can gather some serious intel about what other accounts you use online, and compromise those as well. This is why we constantly and relentlessly remind you to use strong passwords and\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/what_is_two_factor_authentication\/\" target=\"_blank\" rel=\"noopener nofollow\">enable two-factor authentication<\/a>\u00a0and all other available security controls for accounts of importance. As if that wasn\u2019t bad enough, your hacked accounts affect the lives of all of your contacts. When and if your account is hacked, attackers will use it as a tool to attack the accounts of your friends, family and digital acquaintances. Thankfully, <a href=\"https:\/\/www.kaspersky.com\/multi-device-security\" target=\"_blank\" rel=\"noopener nofollow\">a strong antivirus solution<\/a>\u00a0will protect you against email-borne attacks containing malware. Kaspersky security products also contain anti-phishing technologies that will detect\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-avoid-phishing\/\" target=\"_blank\" rel=\"noopener nofollow\">phishing websites<\/a>\u00a0and warn you about them. Long story short: you need to start handling that primary email address in the same way you handle your online banking account, or perhaps\u00a0even more carefully since it is your most\u00a0precious online account.<strong>\u00a0<\/strong><\/p>\n<p><strong><a href=\"https:\/\/www.kaspersky.com\/blog\/tip-of-the-week-cryptoware\/\" target=\"_blank\" rel=\"noopener nofollow\">Tip of the week: How to protect yourself from cryptoware<\/a><\/strong><\/p>\n<p>Cryptoware is one of the fastest growing types of malware that targets end-users. These viruses are created for the mass blackmailing of ordinary people. So how does it work in real life? Kind of like this: \u201cDear Chairman, dear Vice Chairman, dear members of the board, let me present to you the annual report which we have been preparing throughout the past two months\u2026 Oops\u2026 Just a moment, we are having some technical issues\u2026\u201d It would seem as though a cryptovirus has hindered your presentation. A cryptovirus is a malicious program that blocks access to some files on your computer and demands a ransom for their decryption. We recommend that you protect valuable files <em>before<\/em> your computer gets infected. Installing Kaspersky Internet Security and adjusting the settings will help protect you from the latest threats. Learn how to do this by reading the full article!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Read highlights from our top posts in October.<\/p>\n","protected":false},"author":40,"featured_media":4309,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[105,829,282,36,218,187,454,811],"class_list":{"0":"post-4308","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-android","9":"tag-cryptoware","10":"tag-cybersecurity","11":"tag-malware-2","12":"tag-mobile-security","13":"tag-passwords","14":"tag-security-news","15":"tag-webmail"},"hreflang":[{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/october-roundup-2014\/4308\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/october-roundup-2014\/4233\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/october-roundup-2014\/4753\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/october-roundup-2014\/5003\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/october-roundup-2014\/6003\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/october-roundup-2014\/6503\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/october-roundup-2014\/5337\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/october-roundup-2014\/6003\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/october-roundup-2014\/6503\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/october-roundup-2014\/6503\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.in\/blog\/tag\/android\/","name":"Android"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/4308","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/comments?post=4308"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/4308\/revisions"}],"predecessor-version":[{"id":19207,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/4308\/revisions\/19207"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media\/4309"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media?parent=4308"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/categories?post=4308"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/tags?post=4308"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}