Tag Archive for: Signs

In Cyberattacks, Iran Shows Signs of Improved Hacking Capabilities


Iranian hackers are waging a sophisticated espionage campaign targeting the country’s rivals across the Middle East and attacking key defense and intelligence agencies, according to a leading Israeli-American cybersecurity company, a sign of how Iran’s quickly improving cyberattacks have become a new, important prong in a shadow war.

Over the past year, the hackers struck at countries including Israel, Saudi Arabia and Jordan in a monthslong campaign linked to Iran’s Ministry of Intelligence and Security, according to a new report by the company, Check Point.

The Iranian hackers appeared to gain access to emails from an array of targets, including government staff members, militaries, telecommunications companies and financial organizations, the report said.

The malware used to infiltrate the computers also appeared to map out the networks the hackers had broken into, providing Iran with a blueprint of foreign cyberinfrastructure that could prove helpful for planning and executing future attacks.

“The primary purpose of this operation is espionage,” security experts at Check Point wrote in the report, adding that the approach was “notably more sophisticated compared to previous activities” that Check Point had linked to Iran.

Iran’s mission to the United Nations did not respond to an inquiry on Monday about the hack. But Iran’s minister of defense, Brig. Gen. Mohammad Reza Ashtiani, said last week in a speech to his country’s defense officials that given the current complex security situation in the Middle East, Iran had to redefine its national defenses beyond its geographic borders.

He said that meant utilizing new warfare strategies to defend Iran, including the use of space, cyberspace and other ways. “Our enemies know that if they make one mistake, the Islamic Republic of Iran will respond with force,” General Ashtiani said, according to Iranian media.

Although the report did not specify what, if any, data Iran had taken, Check Point said the hacking campaign successfully broke into computers associated with the Saudi Arabian ministry of defense, and agencies, banks and telecom firms in several other Middle Eastern countries including Jordan, Kuwait and…

Source…

Meta says it locked pro-Palestinian accounts after signs of security compromise


Palestinians take part in a protest in support of the people of Gaza, as the conflict between Israel and Palestinian Islamist group Hamas continues, in Hebron, in the Israeli-occupied West Bank, October 25, 2023.

Mussa Issa Qawasma | Reuters

Meta, the owner of Instagram and Facebook, said Wednesday that its security staff had detected a possible hacking attempt on pro-Palestinian accounts with millions of followers and locked the accounts while it tries to reach the account owners. 

The account @eye.on.palestine had more than 6 million followers on Instagram before it suddenly went dark Wednesday, according to an archived description on Google’s search engine. A backup account, @eye.on.palestine2, was also unavailable Wednesday, as were a related Facebook account and a Threads account. 

The accounts focused on posting media from Gaza, including videos and images of injured people. The material was generally unverified by international journalists. It’s not clear who or how many people posted to the pages. 

When they were visited Wednesday, the Instagram pages returned the message: “Sorry, this page isn’t available.” 

The disruption to the accounts has sparked anger among followers. In posts on X, some followers interpreted the disappearance of the pages as an example of anti-Palestinian censorship. 

But Meta said late Wednesday that it had disabled the accounts because of security concerns. 

“These accounts were initially locked for security reasons after signs of compromise, and we’re working to make contact with the account owners to ensure they have access,” Meta spokesperson Andy Stone said in a statement. 

“We did not disable these accounts because of any content they were sharing,” he said. 

Stone didn’t provide any other details about Meta’s investigation into the signs of compromise. He said the investigation was continuing. 

The account owners couldn’t be reached by NBC News for comment Wednesday, including by email.

In an update Thursday morning, Stone said the company had been able to reach the accounts’ administrators and that the accounts would be able to reactivate.

“These accounts were initially locked for security reasons after signs of compromise,” Stone said in a…

Source…

How to Protect Your iPhone from Malware: Signs and Solutions


While iPhones are generally considered safe from malware, it’s still possible for these devices to be attackeddangerous software createdcybercriminals. Cybersecurity giant McAfee has outlined seven common signs that indicate your iPhone may be infected with malware. These signs include a slower device, faster battery drain, being redirected to unintended websitesyour web browser, constant app crashes or unfamiliar apps appearing on your device, a sudden increase in data usage or unknown calls on your phone bill, infection warnings prompting you to purchase or subscribe to something, difficulty shutting down or restarting your device, and an influx of pop-up ads in your web browser.

Keep in mind that these signs aren’t concrete proof of malware, but they are worth investigating to ensure your iPhone isn’t compromised. McAfee recommends updating your iPhone regularly as a preventive measure and to close security holes that malware may exploit. Apple regularly releases software updates that include new security patches and features. Additionally, clearing your website data and browsing history can help eliminate any potential malware. You can do thisgoing into your device’s settings, selecting Safari, and then choosing the option to clear history and website data.

If necessary, you can also restore a previous backup of your iPhone from iCloud. However, if all else fails, a factory reset may be the best solution to return your device to a brand-new state. By following these steps and staying vigilant for any red flags, you can protect your iPhone from malware and enjoy a safe digital experience.

Sources:
McAfee

Source…

Billions of Android and iPhone owners urged to check signs a criminal is hiding in your device – don’t lose everything


SECURITY experts have warned smartphone users about major signs that criminals are hoping to hack their device.

Androids and iPhones are pretty safe gadgets but no device is fully hackproof, according to cybersecurity experts at Trend Micro.

Hackers have several techniques when it comes to infiltrating smartphonesCredit: Getty

They wrote in a recent blog post: “Unfortunately, no device can ever be 100% hackproof, and the iPhone is no exception.”

The blog lists three potential ways that a hacker can infiltrate your phone.

They’re all pretty common and you may have some of the red flags on your device right now.

EVIL APPS

The first hacking route the experts pointed out was “malicious apps.”

It’s normal to download apps onto your smartphone, but cybercriminals rely on you not checking what you’re downloading.

You have to be wary of all apps you download onto your device and make sure you’ve double checked the permissions that they want to access.

Try reading the apps reviews and only downloading from the Google Play Store or Apple App Store.

DANGEROUS WI-FI

The Trend Micro experts also warned against using insecure Wi-Fi networks, especially public Wi-Fi.

Most read in Phones & Gadgets

Cybercriminals can take advantage of your need to be online and steal data from your device.

Even the FBI has warned to be wary of public Wi-Fi.

“Preventing internet-enabled crimes and cyber intrusions requires each of us to be aware and on guard,” the FBI wrote in a recent announcement.

“Be careful when connecting to a public Wi-Fi network and do not conduct any sensitive transactions, including purchases, when on a public network.”

PHISHING MESSAGES

The third threat on the list could be lurking in your email app or text message inbox.

Phishing emails and texts sit waiting on devices, often containing dangerous links, and attachments.

Delete any suspicious messages without clicking on links or revealing any private information.

Source…