Threatpost for B2B

Syndicate content
The First Stop For Security News
Updated: 3 hours 10 min ago

USBDriveby Device Can Install Backdoor, Override DNS Settings in Seconds

Fri, 12/19/2014 - 08:00
Samy Kamkar has a special talent for turning seemingly innocuous things into rather terrifying attack tools. First it was an inexpensive drone that Kamkar turned into a flying hacking platform with his Skyjack research, and now it’s a $20 USB microcontroller that Kamkar has loaded with code that can install a backdoor on a target machine in […]

12 Million Home Routers Vulnerable to Takeover

Thu, 12/18/2014 - 13:23
Check Point has disclosed few details on a cookie vulnerability in the RomPager webserver running inside 12 million embedded devices. The flaw puts home routers at risk to attack.

Critical Remotely Exploitable Bugs Found in Schneider Electric ProClima Software

Thu, 12/18/2014 - 11:58
There are a number of critical, remotely exploitable command injection vulnerabilities in Schneider Electric’s ProClima software, which is used in manufacturing and energy facilities. The ProClima application is a utility that customers use to design control panel enclosures in industrial facilities to help manage the heat from enclosed electrical devices. The bugs affect ProClima versions […]

Ryan Olson on the CoolReaper Backdoor

Thu, 12/18/2014 - 11:01
Dennis Fisher talks with Ryan Olson of Palo Alto Networks about their discovery and analysis of the CoolReaper backdoor on some Coolpad Android devices sold in China.

White House to Blame Sony Hack on North Korea

Thu, 12/18/2014 - 10:57
The White House reportedly will attribute the Sony hack to North Korea, but will hold off on a public announcement until it figures out a response.

Attackers Compromise ICANN, Access Zone Files System

Wed, 12/17/2014 - 20:46
Unknown hackers were able to compromise vital systems belonging to ICANN, the organization that manages the global top-level domain system, and had access to the system that manages the files with data on resolving specific domain names.

Google Releases End-To-End Chrome Extension to Open Source

Wed, 12/17/2014 - 14:57
Google announced that it was making the source code for its End-to-End Chrome Extension available for review on GitHub. End-to-End encrypts and signs Gmail messages.

Manufacturer’s Backdoor Found on Popular Chinese Android Smartphone

Wed, 12/17/2014 - 12:59
Chinese smartphones from Coolpad contain a backdoor, dubbed CoolReaper by Palo Alto researchers, is being used to install apps without user consent.

Google Adds Content Security Policy Support to Gmail

Wed, 12/17/2014 - 11:32
Google has added another layer of security for users of Gmail on the desktop, which now supports content security policy, a standard that's designed to help mitigate cross-site scripting and other common Web-based attacks.

Sony: Employee Health Information May Have Been Compromised

Tue, 12/16/2014 - 12:12
Sony Pictures Entertainment has sent a letter to employees warning them that, along with huge amounts of corporate and employee information, some personal health data belonging to SPE employees may also have been compromised in the attack that hit the company in late November.

Researchers Go Inside Illegal Underground Hacking Markets

Tue, 12/16/2014 - 11:50
Researchers at Dell SecureWorks have looked at services and pricing available inside illegal online marketplaces selling crimeware, stolen identities, credit cards, and hacking services.

Two Cisco Products Vulnerable to POODLE Attack on TLS

Tue, 12/16/2014 - 10:10
Two of Cisco’s products are vulnerable to the POODLE attack via the TLS implementation in those products. The vulnerability affects Cisco’s Adaptive Security Appliance software and its Application Control Engine module. The POODLE attack was disclosed in October by researchers from Google, who discovered that if an attacker can force a vulnerable Web server to fall back from […]

Google Blacklists WordPress Sites Peddling SoakSoak Malware

Mon, 12/15/2014 - 15:08
Up to 100,000 sites hosted on WordPress may be vulnerable to new campaign that's pushing malware and multiple exploit kits to the browser.

Mike Mimoso on the Sony Breach

Mon, 12/15/2014 - 13:25
Dennis Fisher and Mike Mimoso talk about the details of the Sony breach, including the question of attribution, Sony's response to the attack, media outlets publishing the stolen data and the rise of destructive malware attacks.

Google Proposes Marking ‘HTTP’ as Insecure in 2015

Mon, 12/15/2014 - 13:05
Google proposes that browser vendors begin issuing address bar warnings to users that HTTP connections provide no data security protection.

Shellshock Worm Exploiting Unpatched QNAP NAS Devices

Mon, 12/15/2014 - 12:35
A worm exploiting the Bash vulnerability in QNAP network attached storage devices has been discovered. The attack opens a backdoor and for now is carrying out a click-fraud scam against JuiceADV.

Honeywell PoS Software Vulnerable to Stack Buffer Overflows

Mon, 12/15/2014 - 11:13
There are stack buffer overflows in two components of a Honeywell point-of-sale software package that can allow attackers to run arbitrary code on vulnerable systems. The vulnerabilities lie in the HWOPOSScale.ocx and HWOPOSSCANNER.ocx components of Honeywell’s OLE for Retail Point-of-Sale package, which is designed to help integrate PoS hardware with Windows PoS systems. Versions of the Honeywell […]

Android Malware Installs Pirated Assassin’s Creed App

Fri, 12/12/2014 - 11:37
A working, pirated version of the Assassin's Creed application for Android is bundled with malware, targeting users trying to download a free version of that game.

Upatre Downloader Spreading Dyreza Banking Trojan

Fri, 12/12/2014 - 10:52
Microsoft reports it has seen wire transfer spam carrying attachments containing the Upatre downloader which then infects machines with the Dyreza banking Trojan.

Custom Websites Running HD FLV Player Plugin Vulnerable to Attack

Thu, 12/11/2014 - 15:39
CMS providers Joomla and WordPress have patched an arbitrary file download vulnerability in the HD FLV Player plug-in, but custom websites running the plug-in independently remain at risk.