Posts Tagged ‘security’

Worm spreading on Skype IM installs ransomware

October 9, 2012

A malicious worm spreading through Skype instant messages threatens to take control of a victim’s machine and hold its contents for ransom.

The issue, which was first brought to light Friday by GFI, tricks users into downloading a ZIP file by displaying the socially-engineered message, “lol is this your new profile pic?” along with a link that also spreads the message to other Skype users. The ZIP filed contains an executable file that installs a variant of the Dorkbot worm and creating a backdoor via “Blackhole,” an exploit kit used by criminals to infect computers through security holes.

Read more via Worm spreading on Skype IM installs ransomware | Security & Privacy – CNET News.

AT&T to Market Business Mobile Security to Consumers

September 25, 2012

AT&T Inc. (T), the second largest U.S. wireless carrier, is expanding its mobile-security service for businesses and will announce a similar push targeting consumers next year.

AT&T said today it now has a range of security services for businesses such as Toggle, a so-called partition software for companies that lets users switch between secure applications for work and non-work features like Facebook and games for personal use on one phone.

With industry wireless-subscriber growth slowing now that nearly every adult has a mobile phone, Dallas-based AT&T is trying to expand into new markets like home security, mobile- device management and mobile-wallet services to drum up sales growth. AT&T’s mobile-security effort comes as employers move away from issuing workers devices like Research In Motion Ltd. (RIMM) BlackBerry smartphones and try to adapt policies for handsets and tablets that employees bring to work.

Read more via AT&T to Market Business Mobile Security to Consumers – Businessweek.

Java Still Not Safe, Security Experts Say

September 7, 2012

Last week, Oracle released emergency updates to fix zero-day vulnerabilities in Java 7 and Java 6. But in the case of the Java 7 fix, the new version allows an existing flaw–spotted by security researchers and disclosed to Oracle earlier this year–to be exploited to bypass the Java sandbox. In other words, while fixing some flaws, Oracle opened the door to another one.

In light of that situation, multiple security experts said that businesses should continue to temporarily disable all Java use, whenever possible. “There are still not-yet-addressed, serious security issues that affect the most recent version of Java 7,” said Adam Gowdiak, CEO and founder of Poland-based Security Explorations, which initially disclosed the exploited vulnerabilities to Oracle in April. “In that context, disabling Java until proper patches are available seems to be an adequate solution,” he said via email.

Read more via Java Still Not Safe, Security Experts Say – Security – Attacks/breaches – Informationweek.

How Secure Are You Online: The Checklist

September 5, 2012

How Secure Are You Online: The Checklist

Think you do enough to secure your passwords, browsing, and networking? Prove it.

Not all computer security is about tin foil hats and anonymous browsing. Everyone who uses a computer has a horse in the security race. For the purpose of this post, were breaking down online security into four essential parts: passwords, browsers, at-home Wi-Fi and networking, and browsing on public Wi-Fi. Within those categories well give you a checklist of everything you should do, from the bare minimum to the tin-foil-hat best.

Read more via How Secure Are You Online: The Checklist.

‘Crisis’ malware targets VMware virtual machines

August 22, 2012

Security researchers have discovered a single piece of malware that is capable of spreading to four different platform environments, including Windows, Mac OSX, VMware virtual machines, and Windows Mobile devices.

First uncovered last month by security company Integro, Crisis was originally described as a Mac Trojan capable of intercepting e-mails and instant messages and tracking Web sites visited. Additional scrutiny by Symantec has found that the malware targets both OSX and Windows users with executable files for both operating systems.

Read more via ‘Crisis’ malware targets VMware virtual machines | Security & Privacy – CNET News.

Network Intrusion: Hackers Use Stolen Passwords to Jimmy Into Dropbox

August 1, 2012

The habit of using the same username and password combination for multiple sites has come around to bite Dropbox and its users. Network intruders who came into the possession of name/password combos from other sites, tried them out on Dropbox and were able to break into many users’ accounts — including the account of a Dropbox employee, which led to a deluge of spam.

Dropbox says reused passwords are to blame for a wave of spam that’s hitting subscribers to the service.

The company found that usernames and passwords recently stolen from other websites were used to sign in to some Dropbox accounts. One of these accounts belonged to a Dropbox employee, and it contained a project document with some users’ email addresses.

This improper access led to the spamming of many users, Dropbox said.

The company has taken various steps to improve security, including the coming introduction of two-factor authentication.

“The downside of not having more rigorous access controls in place around sensitive data is that they can be compromised,” Todd Thiemann, senior director of product marketing at Vormetric, told TechNewsWorld. “Dropbox appears to have learned that the hard way.”

Read More via Technology News: Network Intrusion: Hackers Use Stolen Passwords to Jimmy Into Dropbox.

LinkedIn confirms passwords were ‘compromised’

June 6, 2012

LinkedIn said today that some passwords on a list of allegedly stolen hashed passwords belong to its members, but did not say how its site was compromised.

“We can confirm that some of the passwords that were compromised correspond to LinkedIn accounts,” Vicente Silveira, a director at the professional social networking site, wrote in a blog post. It is unknown how many passwords have been verified by LinkedIn.

LinkedIn has disabled the passwords on those accounts, it said. Account holders will receive an e-mail from LinkedIn with instructions for resetting their passwords. The e-mails will not include any links. Phishing attacks often rely on links in e-mails that lead to fake sites designed to trick people into providing information, so the company says it will not send links in e-mails.

via LinkedIn confirms passwords were ‘compromised’ | Security & Privacy – CNET News.

Flame virus spread through rogue Microsoft security certificates

June 4, 2012

Microsoft revealed yesterday that the infamous Flame virus gained a foothold by spoofing one of its own security certificates.

Specifically, the virus tapped into rogue certificates for Microsofts Terminal Server that appeared to be signed by the company and were therefore seen as legitimate. In response, Microsoft has taken several measures, including the release of a Windows patch to fix the security hole in Terminal Server, a feature that allows for remote desktop connections. The company detailed the discovery in a blog posted yesterday.

Read more via Flame virus spread through rogue Microsoft security certificates | Microsoft – CNET News.

Kaspersky: Mac security is ’10 years behind Microsoft’

April 25, 2012

Forrester’s CEO isn’t the only one spouting doom and gloom for Apple today.Now Eugene Kaspersky, the CEO of security firm Kaspersky Lab, says Apple is headed for a rough patch. However, this one’s in the world of computer security, and he says Apple is already getting into the thick of it.

Speaking to Computer Business Review at Info Security 2012 show in London this week, Kaspersky said that when it comes to computer security, Apple’s Mac platform was a decade behind Microsoft’s, and that it’s got some things to learn from its rival.

Read more via Kaspersky: Mac security is ’10 years behind Microsoft’ | Apple – CNET News.

Experts sound worm alarm for critical Windows bug

March 13, 2012

Microsoft today released six security updates that patched seven vulnerabilities, including a critical Windows bug that hackers will certainly try to exploit with a network worm, according to researchers.

“This is a pre-authentication, remote code bug,” said Andrew Storms, director of security operations at nCircle Security, referring to MS12-020, the one critical bulletin today and the update that he, other researchers and even Microsoft urged users to patch as soon as possible.

“It will allow network execution without any authentication, and has all the ingredients for a class worm,” said Storms.

“Im particular spooked by this one,” said Jason Miller, manager of research and development at VMware. “Hackers want [vulnerabilities] that dont require authentication and are in a part of Windows thats widely used. I guarantee that attackers are going to look at this closely.”

Read More via Experts sound worm alarm for critical Windows bug – Computerworld.


Follow

Get every new post delivered to your Inbox.

Join 38 other followers