Feed aggregator

New POS Malware Uses Mailslots to Avoid Detection

Threatpost for B2B - Tue, 03/03/2015 - 16:57
A new type of POS malware, LogPOS, is using technology that evades detection by letting the malware inject code while it shuttles stolen credit card numbers to its C+C server.

New FREAK Attack Threatens Many SSL Clients

Threatpost for B2B - Tue, 03/03/2015 - 15:30
For the nth time in the last couple of years, security experts are warning about a new Internet-scale vulnerability, this time in some popular SSL clients. The flaw allows an attacker to force clients to downgrade to weakened ciphers and break their supposedly encrypted communications through a man-in-the-middle attack. Researchers recently discovered that some SSL […]

Change to Lollipop Encryption Policy May Not Have Much Effect, Experts Say

Threatpost for B2B - Tue, 03/03/2015 - 12:05
Google has made a subtle, but important, shift in the requirements for Android handset makers, saying now that OEMs manufacturing phones that will run Lollipop do not have to enable disk encryption by default. This is a major change from the company’s stated position from just a few months ago, but it may not have […]

Government Report Critical of FAA Security Controls

Threatpost for B2B - Tue, 03/03/2015 - 11:10
A GAO report takes the Federal Aviation Administration to the woodshed over its sub-par information security controls and policies.

Signal 2.0 Brings Encrypted Messaging to iPhone

Threatpost for B2B - Mon, 03/02/2015 - 16:22
Signal 2.0 is available from Open WhisperSystems, and brings encrypted messaging to the iPhone.

D-Link Routers Haunted by Remote Command Injection Bug

Threatpost for B2B - Mon, 03/02/2015 - 15:02
Some D-Link routers contain a vulnerability that leaves them open to remote attacks that can give an attacker root access, allow DNS hijacking and other attacks. The vulnerability affects affects a number of D-Link’s home routers and the key details of the flaw have been made public by one of the researchers who discovered it. […]

Older Keen Team Use-After-Free IE Exploit Added to Angler Exploit Kit

Threatpost for B2B - Mon, 03/02/2015 - 14:58
Attackers behind one of the more popular exploit kits, Angler, have added a tweaked version of an exploit from last fall, a use after free vulnerability in Microsoft's Internet Explorer browser.

Mozilla Pushes Hot Fix to Remove Superfish Cert From Firefox

Threatpost for B2B - Mon, 03/02/2015 - 10:53
Mozilla has issued a hot fix for Firefox that removes the Superfish root certificate from the browser’s trusted root store. The patch only removes the certificate if the Superfish software has been removed from the machine already, however. The Superfish adware performs SSL interception–essentially running man-in-the-middle attacks on connections to secure sites–in the name of […]

Seagate Business NAS Firmware Vulnerabilities Disclosed

Threatpost for B2B - Mon, 03/02/2015 - 10:43
Remote code execution vulnerabilities in Seagate Business NAS firmware were disclosed after a 100-plus day deadline passed without a fix from the vendor.

Uber Announces Breach of ‘Partner’ Information

Threatpost for B2B - Mon, 03/02/2015 - 10:32
Uber announced that attackers had compromised databases containing current and former driver partner names and license numbers.

Pharming Attack Targets Home Router DNS Settings

Threatpost for B2B - Fri, 02/27/2015 - 15:07
A pharming attack has been detected targeting home routers distributed from Brazil's largest telco, a rare instance of a web-based attack changing DNS settings in order to redirect traffic.
Syndicate content