Threatpost for B2B

Syndicate content
The First Stop For Security News
Updated: 3 hours 13 min ago

Citadel Variant Used in Attacks Against Middle Eastern Petrochemical Companies

Tue, 09/16/2014 - 10:10
IBM reports a variant of the Citadel banking Trojan was spotted in APT-style targeted attacks against petrochemical companies in the Middle East.

Apple CEO Defends iMessage Security

Tue, 09/16/2014 - 09:18
Despite research published last year that demonstrated that Apple has the ability to decrypt users iMessages if it so chooses, Apple CEO Tim Cook said that the company does not hold the encryption key for those messages and couldn’t even produce the plaintext in response to a government order. In an interview on The Charlie […]

SNMP DDoS Scans Spoof Google Public DNS Server

Mon, 09/15/2014 - 15:25
SNMP-based DDoS attacks spoofing Google's public recursive DNS server have been spotted by the SANS Internet Storm Center.

With MAMA, U.S. Air Force Aiming to Raise Cyber Awareness on Networks

Mon, 09/15/2014 - 14:35
The United States Air Force is attempting to enhance its cyber situational awareness in order to contend with “increasingly sophisticated” threats to its networks and systems.

Comcast Pushes Back Against Allegations it Will Cut Off Tor Users

Mon, 09/15/2014 - 13:19
Comcast refutes reports that it is telling customers who use Tor that their service will be suspended or terminated.

Flaw in Android Browser Allows Same Origin Policy Bypass

Mon, 09/15/2014 - 12:32
There’s a serious vulnerability in pre-4.4 versions of Android that allows an attacker to read the contents of other tabs in a browser when a user visits a page the attacker controls. The flaw is present in a huge percentage of the Android devices in use right now, and there’s now a Metasploit module available […]

Big Batch of Bugs Fixed in Various Versions of IDA

Mon, 09/15/2014 - 09:46
The makers of the popular IDA disassembly and debugging tool have fixed more than a dozen security vulnerabilities in a variety of versions. Some of the vulnerabilities are a couple of years old, and patches are provided for versions from 6.1 up through 6.6. IDA is a tool used by malware analysts, security researchers and […]

Four Vulnerabilities Patched in IntegraXor SCADA Server

Fri, 09/12/2014 - 12:22
Four different remotely exploitable vulnerabilities were recently discovered and patched in a popular SCADA server.

Hacked Brazilian Newspaper Site Targets Router DNS Settings

Fri, 09/12/2014 - 10:30
A Brazilian political website has been compromised and is injecting iFrames that attempt to change the victim's router DNS settings.

Documents in Long-Running Yahoo FISC Challenge Case Published

Fri, 09/12/2014 - 09:41
During a long-running secret dispute between Yahoo and government officials over the constitutionality of orders from the federal government to turn over data belonging to Yahoo users, the company was facing fines of $250,000 for refusing to comply with the order. The revelation is contained in a cache of 1,500 pages of documents declassified by the […]

Dropbox Reports 80 Percent of Subpoenas Contain Gag Request

Fri, 09/12/2014 - 08:52
Dropbox revealed in its latest Transparency Report that 80 percent of the subpoenas it receives are accompanied by a request not to inform users their data is being requested.

Chinese Hacking Groups Team Up Against Government, Military Systems

Thu, 09/11/2014 - 14:23
Two Chinese cyber espionage campaigns are working in tandem in hopes of sniffing out trade secrets from surrounding nations.

US-CERT Warns of Vulnerability in Cisco Baseboard Controller

Thu, 09/11/2014 - 14:21
US-CERT published an advisory warning of a denial-of-service vulnerability in Cisco's Integrated Management Controller; Cisco has already released an update patching the flaw.

Congress Urged to Update ECPA with Email Privacy Protection

Thu, 09/11/2014 - 12:24
A coalition of groups covering a wide swath of interests and political affiliations is banding together to call on Congress to address email privacy law.

Users in Dark about Permissions Granted to Mobile Apps

Thu, 09/11/2014 - 12:03
A report from the UK's ICO says that permissions given to mobile apps often far exceed what's necessary, and that privacy policies are hardly apparent to users downloading apps.

Key Flaw Enables Recovery of Files Encrypted by TorrentLocker

Thu, 09/11/2014 - 10:03
Crypto ransomware, a relatively unknown phenomenon a couple of years ago, has exploded into one of the nastier malware problems for Internet users. Variants such as CryptoLocker and CryptoWall have been siphoning money from victims for some time, and now researchers have dissected a newer variant known as TorrentLocker and found that the creators made […]

Details Disclosed for Critical Vulnerability Patched in Webmin

Wed, 09/10/2014 - 14:56
The University of Texas information security office disclosed details of a vulnerability in remote management software Webmin that could allow someone to remotely delete files on a host server.

Five Million Email Passwords, Addresses Appear on Russian Bitcoin Forum

Wed, 09/10/2014 - 14:43
Five million email addresses showed up on a Russian Bitcoin security forum last night. Most of the leaked addresses belong to Gmail users.

Apache Warns of Tomcat Remote Code Execution Vulnerability

Wed, 09/10/2014 - 14:31
Some older versions of Apache Tomcat, the company’s open source web server and servlet container, are vulnerable to remote code execution.

Information Sharing on Threats Seen as a Key for Auto Makers

Wed, 09/10/2014 - 09:20
A small segment of the security research community has been spending a lot of time tearing apart the innards of various vehicles and looking at ways that the computers and local networks that reside in modern cars can be hacked. There has been some remarkable success on this front, and while auto makers haven’t paid […]