Feed aggregator

Infighting, Politics Hampering Cybersecurity Progress in Washington

Threatpost for B2B - Tue, 10/28/2014 - 09:03
WASHINGTON–The United States government and private sector are unprepared for a major cyber attack on the country’s critical infrastructure, a former Congressman said, thanks to a divided, risk-averse Congress and an inability for agencies and other organizations to share information effectively. Tom Davis, a former longtime representative from Virginia, said Tuesday that there are a number of challenges that […]

Cyberattacks Most Imminent Threat to U.S., Economy

Threatpost for B2B - Tue, 10/28/2014 - 06:38
A round-table consisting of military, government and former NSA officials in Alexandria, Va., on Monday agreed that cyberattacks targeting U.S. critical infrastructure and private industry are an eminent threat.

Shellshock Exploits Targeting SMTP Servers at Webhosts

Threatpost for B2B - Mon, 10/27/2014 - 15:18
SANS Internet Storm Center reports attacks against SMTP servers using Shellshock exploits to create a DDoS botnet.

New Koler Variant Spreading Through SMS

Threatpost for B2B - Mon, 10/27/2014 - 14:09
A new iteration of the Android ransomware Koler has surfaced that’s propagating through SMS messages.

Samsung Rebuffs Criticism of Knox Crypto, Password Management

Threatpost for B2B - Mon, 10/27/2014 - 12:20
Samsung has answered a researcher's critique of alleged encryption and password weaknesses in early version of its Knox technology on Galaxy and Note devices.

NSA-Approved Samsung Knox Stores PIN in Cleartext

Threatpost for B2B - Fri, 10/24/2014 - 12:21
A research report claims that Samsung's Knox containers store PIN data in clear text. The report comes shortly after the NSA endorsed Galaxy devices for agency use.

Researcher Finds Tor Exit Node Adding Malware to Binaries

Threatpost for B2B - Fri, 10/24/2014 - 11:07
A security researcher has identified a Tor exit node that was actively patching binaries users download, adding malware to the files dynamically. The discovery, experts say, highlights the danger of trusting files downloaded from unknown sources and the potential for attackers to abuse the trust users have in Tor and similar services. Josh Pitts of Leviathan […]

Facebook, Yahoo Curb Identity Theft with New Email Ownership Header

Threatpost for B2B - Fri, 10/24/2014 - 09:39
A new SMTP header developed by Facebook and Yahoo confirms ownership of Yahoo email accounts.

NAT-PMP Protocol Vulnerability Puts 1.2 Million SOHO Routers At Risk

Threatpost for B2B - Thu, 10/23/2014 - 15:23
More than 1 million SOHO routers and embedded devices are vulnerable to a serious vulnerability in the NAT-PMP protocol that enables traffic hijacking and denial of service attacks.

Malvertising Campaign on Yahoo, AOL, Triggers CryptoWall Infections

Threatpost for B2B - Thu, 10/23/2014 - 11:54
Attackers have been leveraging the FlashPack Exploit Kit to peddle CryptoWall 2.0 ransomware on unsuspecting visitors to sites like Yahoo, The Atlantic and AOL.

Cybersecurity Legislation Forecast is Grim

Threatpost for B2B - Thu, 10/23/2014 - 09:38
A D.C. insider is pessimistic that we'll see cybersecurity legislation before 2016, pointing toward a number on contributing political and national security factors.

A false choice: the Ebola virus or malware?

Secure List feed for B2B - Thu, 10/23/2014 - 08:31

In September we came across mentions of people in Africa suffering from the Ebola virus and unusual invitations to a conference of the World Health Organisation (WHO) in the subject line of so-called "Nigerian" emails.  The aim of the conmen was, as usual, to swindle money from trusting recipients who entered into conversation with the authors of the letters.

In October it was the turn of the cybercriminals, who used the tumult around the Ebola virus to send letters containing malware. Once again the WHO was indicated as the sender of the letters, which is unsurprising as this is the organisation that deals with various diseases and epidemics on a worldwide level.

In the text of the letters we detected the evildoers tried to convince recipients that the WHO has prepared a file with general information and security measures that will help protect users and those around them from the deadly virus and other diseases. Furthermore the recipient was also asked to distribute this information to help the WHO.

To mask the real link a link abbreviation service was used, which finally redirected users to a popular cloud data storage service. There the criminals had stored the malware program Backdoor.Win32.DarkKomet.dtzn disguised as a document from the WHO. This malware is designed to steal personal data. We note that access to the file was blocked quite quickly by the service administrators and, probably for that reason, the evildoers decided to change their letter. The very next day our traps caught a similar communication supposedly from the WHO, only this time the archive with the same malware program was inserted into the letter itself.

Cybercriminals rarely miss a chance to use current events and the names of famous organisations to trick the recipients of their spam. And so, having fallen for the convincing header and failed to pay attention for even a moment, users risk compromising their personal data and surrendering control of their computer to criminals. It is worth remembering that modern anti-virus solutions provide protection but it is only the considered actions of users that can keep their personal data safe.

Cisco Patches Three-Year-Old Telnet Remote Code Execution Bug in Security Appliances

Threatpost for B2B - Thu, 10/23/2014 - 08:08
There is a severe remote code execution vulnerability in a number of Cisco's security appliances, a bug that was first disclosed nearly three years ago.
Syndicate content