Threatpost for B2B

Syndicate content
The First Stop For Security News
Updated: 6 hours 6 min ago

Microsoft Warns Fraudulent Certificate Could Lead to MiTM Attacks

Tue, 03/17/2015 - 10:09
Microsoft has blacklisted a phony SSL certificate and is warning the certificate could be leveraged to stage man-in-the-middle attacks.

Stealthy, Persistent DLL Hijacking Works Against OS X

Tue, 03/17/2015 - 06:53
Researcher Patrick Wardle of Synack is expected this week at CanSecWest to unveil malicious dylib attacks against Apple’s Mac OS X.

D-Link Patches Two Remotely Exploitable Bugs in Firmware

Mon, 03/16/2015 - 16:13
Router company D-Link has patched two separate vulnerabilities in its firmware that could be exploited remotely and lead to takeover and arbitrary code execution. Devices under the DCS-93xl umbrella, including the following IP cameras with a custom Linux distribution models: DCS-930L, DCS-931L, DCS-932L, and DCS-933L, contain a hole that enabled remote authenticated attackers to upload their […]

Google Aware of Memory Leakage Issue in Android 5.1, Fix Forthcoming

Mon, 03/16/2015 - 13:27
Google is prepping a fix for Android users to address a meddlesome memory leakage issue that’s plagued some device users since the beginning of the year.

Facebook Transparency Report: US Data Requests Dip Slightly

Mon, 03/16/2015 - 12:59
Facebook's Transparency Report for the latter half of 2014 shows slightly fewer U.S. government requests for user data; the company also updates its Community Standards.

Yahoo Previews End-To-End Email Encryption Extension

Mon, 03/16/2015 - 09:37
Yahoo CISO Alex Stamos said a preview of the company’s end to end encryption extension has been released to GitHub for review.

Threatpost News Wrap, March 13, 2015

Fri, 03/13/2015 - 14:20
Dennis Fisher and Mike Mimoso discuss the new patch for the fiver-year-old LNK vulnerability used by Stuxnet, the new iOS patches and the other news of the week.

Mozilla Releases Open Source Masche Forensics Tool

Fri, 03/13/2015 - 11:11
Mozilla has released an open source memory forensics tool that some college students designed and built during the company’s recent Winter of Security event. The new tool, known as Masche, is designed specifically for investigating server memory and has the advantage of being able to scan running processes without causing any problems with the machine. […]

Google Apps ‘Defect’ Leaks Private WHOIS Data Of 280,000

Fri, 03/13/2015 - 09:54
A Google Apps bug leaked hidden WHOIS registrant information in the clear, putting close to 300,000 domain owners at risk for identity theft, phishing scams and more.

Adobe Patches 11 Critical Vulnerabilities in Flash Player

Thu, 03/12/2015 - 19:45
Adobe released an updated Flash Player with patches for 11 critical vulnerabilities, most of which lead to remote code execution.

After Delays, Samsung Patches Social Media Vulnerability in Millions of Devices

Thu, 03/12/2015 - 16:21
Samsung patched a vulnerability last month in SNS Provider that if exploited could have given attackers the ability to access to any personal information users stored on Facebook, LinkedIn and Twitter.

CryptoLocker Variant Coming After Gamers

Thu, 03/12/2015 - 15:57
A variant of CryptoLocker ransomware is targeting gamers, encrypting files associated with more than 20 popular titles in exchange for a Bitcoin payment.

BlackBerry Warns Many Products Vulnerable to FREAK Attack

Thu, 03/12/2015 - 14:28
BlackBerry is warning customers that a large portion of the company’s product portfolio is vulnerable to the FREAK SSL attack. Many versions of the BlackBerry OS and BlackBerry Enterprise Server are vulnerable to FREAK, as are a number of versions of BlackBerry Messenger. The advisory from BlackBerry says that there are no workarounds for the […]

SQL Injection Bug Fixed in Popular WordPress SEO Plug-In

Thu, 03/12/2015 - 13:28
Popular search engine optimization plugin, SEO by Yoast fixed a blind SQL injection vulnerability yesterday that could be exploited to take control of affected sites.

Obama Administration Seeks More Legal Power to Disrupt Botnets

Thu, 03/12/2015 - 10:31
The federal government is seeking more legal power to step in and shut down botnets through an amendment to the existing criminal law, which would allow the Department of Justice to obtain injunctions to disrupt these malicious networks. The Obama administration has proposed an amendment to existing United Stated federal law that would give it […]

Microsoft SHA-2 Advisory Causing ‘Infinite Loop’ Issues

Thu, 03/12/2015 - 10:16
Windows users are having issues with a security update issued this week meant to add SHA-2 code-signing and verification support to Windows 7 and Windows Server 2008 R2 machines.

Dropbox Patches Remotely Exploitable Vulnerability in SDK

Wed, 03/11/2015 - 14:56
Developers at Dropbox recently fixed a remotely exploitable vulnerability in the Android SDK version of the app that enabled attackers to connect applications on some devices to a Dropbox account without the user's consent.

Details Surface on Stuxnet Patch Bypass

Wed, 03/11/2015 - 13:01
HP's Zero Day Initiative published details of a bypass for a five-year-old Windows patch for the .LNK vulnerability exploited by Stuxnet.

Facebook Issues Present Possible Threat to Users

Wed, 03/11/2015 - 11:39
UPDATE–A security researcher has identified a pair of security issues in Facebook, one of which can be used to to upload an arbitrary file to the site, and the other of which can allow an attacker to gain control of a victim’s machine under some limited circumstances with user interaction. The more serious of the vulnerabilities, which […]

Equation APT Group Attack Platform A Study in Stealth

Wed, 03/11/2015 - 07:00
The EquationDrug cyberespionage platform is a complicated system that is used selectively against only certain target machines, one that can be extended via a collection of 116 malware plug-ins, researchers at Kaspersky Lab said.