Threatpost for B2B

Syndicate content
The First Stop For Security News
Updated: 3 min 45 sec ago

New Banking Trojan Targets Android, Steals SMS

Tue, 02/03/2015 - 14:12
A relatively new Android Trojan that specializes in stealing banking information by intercepting SMS messages has been making the rounds.

New Wave of CTB-Locker/Critroni Ransomware Hitting Victims

Tue, 02/03/2015 - 13:20
There is a new wave of attacks delivering the CTB-Locker or Critroni crypto ransomware, arriving through spam messages with a variety of lures in several different countries. CTB-Locker is one of the newer variants in the crypto ransomware family, a kind of malware that encrypts victims’ hard drives and demands a relatively large payment in order […]

Canary Watch Site Launches to Track Warrant Canaries

Tue, 02/03/2015 - 11:03
In the years since Edward Snowden began putting much of the NSA‘s business in the street, including its reliance on the secret FISA court and National security Letters, warrant canaries have emerged as a key method for ISPs, telecoms and other technology providers to let the public know whether they have received any secret orders. But […]

WebRTC Found Leaking Local IP Addresses

Tue, 02/03/2015 - 10:11
Using a new proof-of-concept, local and public IP addresses can be extracted from candidate messages sent by the API Directory's STUN protocol requests .

Google Adds Research Grants to Bug Bounty Program

Mon, 02/02/2015 - 15:44
Google announced that it will offer research grants to those taking part in its Vulnerability Rewards Program. The program paid out $1.5 million in 2014.

DNS Hijack in D-Link Routers, No Authentication Required

Mon, 02/02/2015 - 12:16
There is a remotely exploitable domain name system hijack vulnerability in D-Link's DSLR2740R router.

Female Skype Avatar Sinks Syria Opposition Fighters

Mon, 02/02/2015 - 11:40
A cyberespionage campaign pulled off by pro-Syrian hackers against Assad opposition fighters used social engineering to steal military planning documents.

Another Flash Zero Day Emerges

Mon, 02/02/2015 - 09:51
For the third time in the last couple of weeks, Adobe is dealing with a zero day vulnerability in Flash. The company is working on a patch for another Flash bug that is being exploited in drive-by download attacks. Adobe officials released an advisory Monday warning users that attackers are exploiting a new vulnerability in […]

Facebook Malware Poses as Flash Update, Infects 110K Users

Fri, 01/30/2015 - 13:34
UPDATE: A new piece of malware is making the rounds on Facebook, infecting users after luring them in with a link to a salacious video.

Threatpost News Wrap, January 30, 2015

Fri, 01/30/2015 - 12:55
Dennis Fisher and Mike Mimoso discuss the Ghost glibc vulnerability and its repercussions, the Apple iOS and OSX patches, the link between the Regin APT platform and the NSA. Plus Super Bowl predictions!

Army Research Lab Releases Dshell Forensics Framework

Fri, 01/30/2015 - 11:59
The U.S. Army has released to open source an internal forensics analysis framework that the Army Research Lab has been using for some time. The framework, known as Dshell, is a Python tool that runs on Linux and its designed to help analysts investigate compromises within their environments. The goal in open sourcing the framework […]

Reddit Publishes its First Transparency Report

Fri, 01/30/2015 - 11:28
Reddit published its first transparency report and said it received a relatively low number of government requests for user information and content takedowns.

PHP Applications, WordPress Subject to Ghost glibc Vulnerability

Thu, 01/29/2015 - 16:02
Researchers at Sucuri revealed that applications such as WordPress that support PHP could also be subject to the Ghost vulnerability in glibc.

ZeroAccess Botnet Returns, Resumes Click-Fraud Activity

Thu, 01/29/2015 - 15:25
Long thought dead, the peer-to-peer (P2P) ZeroAccess botnet has resurfaced and as of just a few weeks ago, has returned to propagating click-fraud scams.

Microsoft Publishes Information Sharing Guidelines

Thu, 01/29/2015 - 14:58
Microsoft publishes a framework and guidelines on how to effectively set up and operate threat information sharing exchanges in hopes that organizations will actually share data.

Schneider Electric Patches Buffer Overflow in ICS Products

Thu, 01/29/2015 - 13:09
There is a remotely exploitable buffer overflow in a handful of software products from Schneider Electric that could allow an attacker to execute arbitrary code on vulnerable machines. The vulnerability lies in a DLL that’s installed with a Device Type Manager that is part of several Schneider products, including the Unity Pro development software, the […]

GitHub Doubles Down on Maximum Bug Bounty Payouts

Thu, 01/29/2015 - 12:21
GitHub announced that it has doubled the maximum payouts possible via its bug bounty program to $10,000.

FCC Warns Businesses WiFi Blocking is Illegal

Thu, 01/29/2015 - 10:52
In the wake of a recent enforcement action against Marriott for blocking guests’ WiFi hotspots in their hotels, the FCC is warning other hotel operators and business owners that such blocking is illegal and the commission’s Enforcement Bureau is taking note. Marriott last year paid a fine of $600,000 to settle an FCC enforcement action […]

Of Ghost glibc Vulnerability Patching and Exploits

Wed, 01/28/2015 - 14:28
Experts urge system administrators to patch the Ghost vulnerability in glibc immediately, but counter that as well that exploiting the bug may be challenging.

FBI: Business Email Compromise Scams Steal $214m in 2014

Wed, 01/28/2015 - 13:47
Business email compromise scams trick corporate executives, employees and clients into transferring business funds to criminal bank accounts in China.