Además, te contamos todo sobre las restricciones de AirBnb y la internet más veloz del mundo.
from Redes sociales | Digital Trends Español https://ift.tt/2YnWuER
via IFTTT
Además, te contamos todo sobre las restricciones de AirBnb y la internet más veloz del mundo.
from Redes sociales | Digital Trends Español https://ift.tt/2YnWuER
via IFTTT
Paneles traslúcidos de 55 pulgadas fueron instalados en ventanas de los trenes
from Tendencias – Digital Trends Español https://ift.tt/34lsIUQ
via IFTTT
The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) on Thursday issued a joint alert to warn about the growing threat from voice phishing or “vishing” attacks targeting companies. The advisory came less than 24 hours after KrebsOnSecurity published an in-depth look at a crime group offering a service that people can hire to steal VPN credentials and other sensitive data from employees working remotely during the Coronavirus pandemic.
“The COVID-19 pandemic has resulted in a mass shift to working from home, resulting in increased use of corporate virtual private networks (VPNs) and elimination of in-person verification,” the alert reads. “In mid-July 2020, cybercriminals started a vishing campaign—gaining access to employee tools at multiple companies with indiscriminate targeting — with the end goal of monetizing the access.”
As noted in Wednesday’s story, the agencies said the phishing sites set up by the attackers tend to include hyphens, the target company’s name, and certain words — such as “support,” “ticket,” and “employee.” The perpetrators focus on social engineering new hires at the targeted company, and impersonate staff at the target company’s IT helpdesk.
The joint FBI/CISA alert (PDF) says the vishing gang also compiles dossiers on employees at the specific companies using mass scraping of public profiles on social media platforms, recruiter and marketing tools, publicly available background check services, and open-source research. From the alert:
“Actors first began using unattributed Voice over Internet Protocol (VoIP) numbers to call targeted employees on their personal cellphones, and later began incorporating spoofed numbers of other offices and employees in the victim company. The actors used social engineering techniques and, in some cases, posed as members of the victim company’s IT help desk, using their knowledge of the employee’s personally identifiable information—including name, position, duration at company, and home address—to gain the trust of the targeted employee.”
“The actors then convinced the targeted employee that a new VPN link would be sent and required their login, including any 2FA [2-factor authentication] or OTP [one-time passwords]. The actor logged the information provided by the employee and used it in real-time to gain access to corporate tools using the employee’s account.”
The alert notes that in some cases the the unsuspected employees approved the 2FA or OTP prompt, either accidentally or believing it was the result of the earlier access granted to the help desk impersonator. In other cases, the attackers were able to intercept the one-time codes by targeting the employee with SIM swapping, which involves social engineering people at mobile phone companies into to giving them control of the target’s phone number.
The agencies said crooks use the vished VPN credentials to mine the victim company databases for their customers’ personal information to leverage in other attacks.
“The actors then used the employee access to conduct further research on victims, and/or to fraudulently obtain funds using varying methods dependent on the platform being accessed,” the alert reads. “The monetizing method varied depending on the company but was highly aggressive with a tight timeline between the initial breach and the disruptive cashout scheme.”
The advisory includes a number of suggestions that companies can implement to help mitigate the threat from these vishing attacks, including:
• Restrict VPN connections to managed devices only, using mechanisms like hardware checks or installed certificates, so user input alone is not enough to access the corporate VPN.
• Restrict VPN access hours, where applicable, to mitigate access outside of allowed times.
• Employ domain monitoring to track the creation of, or changes to, corporate, brand-name domains.
• Actively scan and monitor web applications for unauthorized access, modification, and anomalous activities.
• Employ the principle of least privilege and implement software restriction policies or other controls; monitor authorized user accesses and usage.
• Consider using a formalized authentication process for employee-to-employee communications made over the public telephone network where a second factor is used to
authenticate the phone call before sensitive information can be discussed.
• Improve 2FA and OTP messaging to reduce confusion about employee authentication attempts.
• Verify web links do not have misspellings or contain the wrong domain.
• Bookmark the correct corporate VPN URL and do not visit alternative URLs on the sole basis of an inbound phone call.
• Be suspicious of unsolicited phone calls, visits, or email messages from unknown individuals claiming to be from a legitimate organization. Do not provide personal information or information about your organization, including its structure or networks, unless you are certain of a person’s authority to have the information. If possible, try to verify the caller’s identity directly with the company.
• If you receive a vishing call, document the phone number of the caller as well as the domain that the actor tried to send you to and relay this information to law enforcement.
• Limit the amount of personal information you post on social networking sites. The internet is a public resource; only post information you are comfortable with anyone seeing.
• Evaluate your settings: sites may change their options periodically, so review your security and privacy settings regularly to make sure that your choices are still appropriate.
from Krebs on Security https://ift.tt/3l8RJZd
via IFTTT
La carga inalámbrica se ha convertido en uno de los grandes avances de los últimos años. El hecho de poder carga nuestros dispositivos electrónicos sin necesidad de introducir ningún cable es bastante cómodo por lo que es normal que haya ganado tanta popularidad.
Así que hoy os traemos algo que os encantará. Unas alfombrillas para ratón que además permiten cargar de manera inalámbrica nuestros smartphones. 2 x 1 , ¿qué más podemos pedir?
Esta alfombrilla de calidad proporciona una carga máxima de alta velocidad de 10W. Tan solo hay que poner el smartphone encima y como por arte de magia empezará a cargar. Además cuenta con un tamaño bastante grande por lo permite colocar el teclado y el ratón. Perfecto para disfrutar de nuestros videojuegos favoritos.
Esta alfombrilla con carga inalámbrica Qi soporta 10W para los smartphones más populares del momento. Con su tamaño protege el teclado y el ratón aunque lo que más llama la atención es que tiene hasta 14 modos diferentes de retroiluminación.
Si eres un enamorado de los juegos más exigentes y necesitas tener además tu smartphone o cualquier otro producto electrónico siempre a tope de energía, no hay opción mejor que esta en el mercado. Su área de superficie es bastante grande y cuenta con una base de goma antideslizante.
Esta innovadora alfombrilla que además permite cargar nuestros smartphones, garantiza que no habrá retardos ni desconexiones inalámbricas mientras jugamos con un ratón. Además también dispone de RGB personalizable y diferentes tipos de alfombrillas intercambiables.
Entra en Andro4all para leer el artículo completo
Puedes unirte a nosotros en Twitter, Facebook o en Google+
¡Suscríbete a nuestro canal de YouTube!
Publicado recientemente en Andro4all
La entrada Las mejores alfombrillas de carga inalámbrica compatibles con tu móvil y tu ratón se publicó primero en Andro4all.
from Andro4all https://ift.tt/3j3GGPc
via IFTTT
PAHO asks countries to ensure prenatal checks due to increased risk of severe COVID-19 in pregnant women
mitchelc
21 Aug 2020
from PAHO/WHO | Pan American Health Organization https://ift.tt/2EjO1Lz
via IFTTT
Ccon su increíble selección de películas infantiles, Netflix te ayuda a mantener a tus niños entretenidos.
from Tendencias – Digital Trends Español https://ift.tt/2Pi8dOX
via IFTTT
El extinto marsupial australiano habría sido víctima de “cuentos fantásticos”
from Tendencias – Digital Trends Español https://ift.tt/3aKbUYO
via IFTTT
With pandemic measures continuing and political divisions deepening, security experts express concern about the security and integrity of the November election.
from Dark Reading: https://ift.tt/3l9VZHU
via IFTTT
Seowon SlC 130 Router – Remote Code Execution
from Exploit-DB.com RSS Feed https://ift.tt/2Qdfy4b
via IFTTT
Complaint Management System 1.0 – ‘cid’ SQL Injection
from Exploit-DB.com RSS Feed https://ift.tt/34kHnzw
via IFTTT