Cyber Security & Privacy Foundation certifies Security Products


Cyber Security and Privacy Foundation(CSPF) has certified a few security products after extensive testing.

CSPF has selected Avast Antivirus and ESET Nod32 as best anti virus products which is suitable for Indian environment.

"DiskCryptor" in disk encryption category, "React OS" in operating system category, 'Zemana' and 'Keyscrambler' in Anti keylogger category, "IronWASP" in Web Application pentesting tool category have all been certified by the CSPF.

We asked the founder of CSPF  Mr. J. Prasanna if CSPF will certify any other products in the future and on what basis these tools were chosen for testing? He said "We will only certify tools after they have been extensively tested for the Indian market, we do not take any funding or sponsorships from companies that own these products."

"We were recently approached by some other companies to test their products, but we discovered that many of them do not even pass the eligibility criteria."
 
We at EHN hope that CSPF will test many such products in the future and thus enable the public make better decisions about the softwares they run in their computers.

CSPF introduces Free online Ethical Hacking Course

Cyber Security and Privacy Foundation is happy to announce the first free online Ethical Hacking & Cyber Defence Course.

Within first 10 days after the course is launched, we have seen alreay 240 students registered for the online course.  The students registered range from Age group of 20 to 60.

Mr. Gemini Ramamurthy, chairman of CSPF, says we are very happy with overwhelming response from across the Globe for this course.  CSPF will continue to offer more such courses to the Online academy.


White Hat Hacking Course:
https://www.udemy.com/certified-whitehat-hacker-level-1/

Cyber Defence Course:
https://www.udemy.com/cyber-defence-course-cdc/

Security Vulnerability in Android allows any app to make phone calls

An application normally needs permission and should alert user that it needs permission to make phone call, when it is being installed.

Researchers at Security firm CureSec has discovered a security flaw in the Android system that allows malicious applications to initiate unauthorized phone calls. 

By exploiting this vulnerability, malicious apps can make phone calls to premium-rated numbers and terminate any outgoing calls.  It is also capable of sending Unstructured Supplementary Service Data (USSD) codes that can be used for enabling call forwarding, blocking your sim cards and so on.

The security bug appears to be introduced in Android Jelly bean 4.1.1  and it exits in all latest versions through Android Kitkat 4.4.2.

CureSec has also released a source code and proof-of-concept application to demonstrate the existence of vulnerability.

The bug has been fixed in the latest version of android (v4.4.4).

Schools Kids hacked BMO ATM using Operators manual found online

A couple of school kids from Winnipeg has managed to hack into a Bank of Montreal's (BMO) ATM operating system during their lunch break.

Matthew Hewlett and Caleb Turon, the grade 9 students, used an ATM operators manual they found online to get into the machine's operator mode, according to Toronto Sun.

The operator mode asked them to enter password.  However, the kids were successfully able to guess the six-digit password on the first try.   The machine has used a common default password.

The kids reported about the issue to a nearby BMO Branch.  However, Bank staff didn't believe them.  So, the kids asked the staff "Is it alright for us to get proof".

They headed back to the ATM to get a proof and come back with the printout of how much money the ATM is currently having.  They even changed the ATM's Greeting Message to "Go away. This ATM has been hacked."

This time, staff took them seriously and the Branch Manager to contacted Head security to take steps to fix the issue.


Ralph Marranca, Spokesperson for BMO said no customer information and accounts and the contents of the ATM were never at risk and are secure.

"Using TrueCrypt is not secure" , End of TrueCrypt Development

Today, security enthusiasts woke up with a shocking news that TrueCrypt has ended its development and warns users that the tool used for encrypting drive is not safe to use.

Users who try to access the official TrueCrypt website are being redirected to the official sourceforge page of Truecrypt(truecrypt.sourceforge.net/).  The page displays the following message:

"WARNING: Using TrueCrypt is not secure as it may contain unfixed security issues"

The message continued "The development of TrueCrypt was ended in 5/2014 after Microsoft terminated support of Windows XP. Windows 8/7/Vista and later offer integrated support for encrypted disks and virtual disk images. Such integrated support is also available on other platforms (click here for more information)."

The page suggests users to migrate any data encrypted by TrueCrypt to encrypted disks supported on their platform.  It also has provided steps for migrating to an encrypted BitLocker drive.

Many, including me, are not able to believe our own eyes.  It is uncertain whether it is official announcement from the development team or some one has hacked the Truecrypt website.

Matthew Green, who teaches cryptography at Johns Hopkins, researcher involved with the TrueCrypt audit, tweeted that he thinks the news is legitimate.

A new binary (Truecrypt v7.2) has been uploaded to sourceforge page in the last 24 hours.  Upon opening this binary, the following error message is being displayed:


The binary is not allowing users to "create new volume".  It only allows you to mount the volumes.  Users are advised not to download this latest version, as it may contain malicious code.

E-Bytes for this week

Google Refunds buyers scammed by fake android antivirus app:
Google has offered Refunds and $5 promotional credit to thousands of users who were scammed by fake Android app "Virus Shield".

Facebook Servers can be used by attackers to DDOS any websites:
Researcher found a bug in facebook Notes that allows anyone to launch Denial of service attack against any websites using the power of Facebook Servers. 

BJP blocks access to its website in Pakistan:
Hackers from Pakistan defaced the several websites related to Bharatiya Janata Party(BJP) including website of Senior BJP Leader LK Advani.  Following the repeated hacking attacks, BJP has blocked its website for visitors from Pakistan.

Bitcoin Malware in Google Play store:
LookOut spotted five android applications on Google Play Store that turns the infected android devices into a distributed Bitcoin mining rig. 

Nullcrew claimed to have breached servers of nine organizations including Teleco Systems, Klas Telecom, Science and Technology center, National credit union, Spokeo and leaked databases.