News, sports websites vulnerable to cyber attacks: study

June 11, 2017

London, Jun 11: News and sports websites have some of the lowest levels of security adoption, making them vulnerable to cyber attacks, a new study has found.newsweb

Researchers looked at the security protocols used by the top 500 sites in various industries and online sectors. They found that fewer than 10 per cent of news and sports websites used basic security protocols such as Transport Layer Security (TLS).

Even those that do are not always using the "latest or strongest protocols", researchers said.

"It is like news and sport content providers do not value the security of their content," said Professor Alan Woodward, a cyber-security expert at the University of Surrey in the UK. "They are leaving themselves vulnerable to attacks like cross-site scripting, where an attacker can pretend something has come from a website when it has not," said Woodward.

The study shows that some sectors seem much more security-conscious than others, 'BBC News' reported.

The websites of computer and technology companies and financial organisations showed a much higher level of adoption than shopping and gaming sites, for example.

A quarter of the shopping sites studied were using TLS, which offers tools including digital certificates, remote passwords, and a choice of ciphers to encrypt traffic between a website and its visitors. The study was published in the Journal of Cyber Security Technology.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 18,2020

New Delhi, Jul 18: India's national cybersecurity agency CERT-in, has warned people of credit card skimming spreading across the world through e-commerce platforms.

Attackers are typically targeting e-commerce sites because of their wide presence, popularity and the environment LAMP (Linux, Apache, MySQL, and PHP), the Computer Emergency Response Team (CERT-In) said in a notice on Thursday.

Recently, attackers targeted sites which were hosted on Microsoft's IIS server running with the ASP.NET web application framework, it said.

Some of the sites affected by the attack were found to be running ASP.NET version 4.0.30319, which is no longer officially supported by Microsoft and may contain multiple vulnerabilities, CERT-In said.

The notice also included a list of best practices for website developers including the use of the latest version of ASP.NET web framework, IIS web server and database server.

The advisory is based on research by Malwarebytes which found that this skimming campaign likely began sometime in April this year.

Credit card skimming has become a popular activity for cybercriminals over the past few years, and the increase in online shopping during the pandemic means additional business for them, too, Malwarebytes said in a blog post, adding that attackers do not need to limit themselves to the most popular e-commerce platforms.

Researchers from global cybersecurity and anti-virus brand Kaspersky had warned in December last year that more cybercriminal groups will target online payment processing systems in 2020. 

It said that over the past couple of years, so-called JS-skimming (the method of stealing of payment card data from online stores), has gained immense popularity among attackers. 

Kaspersky researchers in their report said they are currently aware of at least 10 different actors involved in these type of attacks.

Their number will continue to grow during the next year, the report said, adding that the most dangerous attacks will be on companies that provide services such as e-commerce as-a-service, which will lead to the compromise of thousands of companies.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
March 15,2020

Cybercriminals continue to exploit public fear of rising coronavirus cases through malware and phishing emails in the guise of content coming from the Centers for Disease Control and Prevention (CDC) in the US and World Health Organisation (WHO), says cybersecurity firm Kaspersky.

In the APAC region, Kaspersky has detected 93 coronavirus-related malware in Bangladesh, 53 in the Philippines, 40 in China, 23 in Vietnam, 22 in India and 20 in Malaysia. 

Single-digit detections were monitored in Singapore, Japan, Indonesia, Hong Kong, Myanmar, and Thailand. 

Along with the consistent increase of 2019 coronavirus cases comes the incessant techniques cybercriminals are using to prey on public panic amidst the global epidemic, the company said in a statement. 

Kaspersky also detected emails offering products such as masks, and then the topic became more commonly used in Nigerian spam emails. Researchers also found scam emails with phishing links and malicious attachments.

One of the latest spam campaigns mimics the World Health Organisation (WHO), showing how cybercriminals recognise and are capitalising on the important role WHO has in providing trustworthy information about the coronavirus.

"We would encourage companies to be particularly vigilant at this time, and ensure employees who are working at home exercise caution. 

"Businesses should communicate clearly with workers to ensure they are aware of the risks, and do everything they can to secure remote access for those self-isolating or working from home," commented David Emm, principal security researcher.

Some malicious files are spread via email. 

For example, an Excel file distributed via email under the guise of a list of coronavirus victims allegedly sent from the World Health Organisation (WHO) was, in fact, a Trojan-Downloader, which secretly downloads and installs another malicious file. 

This second file was a Trojan-Spy designed to gather various data, including passwords, from the infected device and send it to the attacker.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
June 29,2020

New Delhi, Jun 29: Witnessing azure skies and breathable air for the last three months, Delhi on Monday recorded deterioration in its air quality, with particulate matter with diameter of 2.5 and 10 microns -- too small to be filtered out of the human body -- standing at 52 and 297 micrograms per cubic respectively.

Gufran Beig, Project Director of System of Air Quality Weather Forecasting and Research (SAFAR), said that the sudden spike in air pollution is due to a mild dust storm blowing from Rajasthan.

"Since the wind direction is changing and moist air is coming in, the air quality in Delhi will become better by tomorrow," Beig told IANS.

Central Pollution Control Board (CPCB) data showed that the overall air quality near Delhi Technical University (DTU) area stood at 326 micrograms per cubic, followed by 308 at Narela and 307 at Mundka.

Out of 36 stations, the AQI in as many as 30 stations was above 200 micrograms per cubic till 1 pm on Monday.

The System of Air Quality Weather Forecasting and Research categorises air quality in the 0-50 range as good, 51-100 as satisfactory, 101-200 as moderate, 201-300 as poor, 301-400 as very poor, and above 400 as severe.

According to SAFAR's website, "PM 10 (coarser dust particle) is the lead pollutant. AQI is likely to improve to moderate category by tomorrow, and further improvement is expected by July 1."

Researchers indicated that PM 10 and PM 2.5 will be 170 and 47 micrograms per cubic on Tuesday.

With no vehicles plying on the roads or industries shut due to the lockdown since March 25, Delhi's air quality had improved drastically.

According to a study conducted by the Indian Institute of Technology (IIT), Delhi, if the low levels of air pollution reached during the lockdown period are maintained, India's annual death toll could reduce by 6.5 lakh.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.