Spyware, Viruses, & Security

Alert

NEWS - April 08, 2013

by Carol~ Forum moderator / April 8, 2013 4:04 AM PDT
Serious Vulnerabilities Found in Popular Home Wireless Routers

Hackers love to attack Java. Why? Well, not only because it is full of holes, but because it's everywhere, embedded on endpoints, Web browsers, mobile devices and more. The same goes for attacking wireless routers; they're buggy and they're everywhere.

A handful of vulnerabilities were identified late last week in the Cisco Linksys EA2700 Network Manager N600 Wireless-N routers, which has been on the market a little more than a year, and is a popular choice not only for home users, but for small businesses.

Pen-tester and researcher Phil Purviance, who has presented similar research at security industry events, reported his findings to Cisco on March 5. No patches are available yet. Cisco did not respond to a request for comment.

"I hooked it up and spent maybe 30 minutes testing the security of the embedded website used to manage the device, then never used it again," Purviance wrote on his blog of the EA2700. "What I found was so terrible, awful, and completely inexcusable! It only took 30 minutes to come to the conclusion that any network with an EA2700 router on it is an insecure network!"

Continued : https://threatpost.com/en_us/blogs/serious-vulnerabilities-found-popular-home-wireless-routers-040813

Related : Home Invasion: Home Routers May Be The Next Big Hack
Post a reply
Discussion is locked
You are posting a reply to: NEWS - April 08, 2013
The posting of advertisements, profanity, or personal attacks is prohibited. Please refer to our CNET Forums policies for details. All submitted content is subject to our Terms of Use.
Track this discussion and email me when there are updates

If you're asking for technical help, please be sure to include all your system info, including operating system, model number, and any other specifics related to the problem. Also please exercise your best judgment when posting in the forums--revealing personal information such as your e-mail address, telephone number, and address is not recommended.

You are reporting the following post: NEWS - April 08, 2013
This post has been flagged and will be reviewed by our staff. Thank you for helping us maintain CNET's great community.
Sorry, there was a problem flagging this post. Please try again now or at a later time.
If you believe this post is offensive or violates the CNET Forums' Usage policies, you can report it below (this will not automatically remove the post). Once reported, our moderators will be notified and the post will be reviewed.
Collapse -
Phoenix Exploit Kit Author Arrested In Russia?
by Carol~ Forum moderator / April 8, 2013 4:14 AM PDT
In reply to: NEWS - April 08, 2013

The creator of a popular crimeware package known as the Phoenix Exploit Kit was arrested in his native Russia for distributing malicious software and for illegally possessing multiple firearms, according to underground forum posts from the malware author himself.

The Phoenix Exploit Kit is a commercial crimeware tool that until fairly recently was sold by its maker in the underground for a base price of $2,200. It is designed to booby-trap hacked and malicious Web sites so that they foist drive-by downloads on visitors.

Like other exploit packs, Phoenix probes the visitor's browser for the presence of outdated and insecure versions of browser plugins like Java, and Adobe Flash and Reader. If the visitor is unlucky enough to have fallen behind in applying updates, the exploit kit will silently install malware of the attacker's choosing on the victim's PC (Phoenix targets only Microsoft Windows computers).

The author of Phoenix — a hacker who uses the nickname AlexUdakov on several forums — does not appear to have been overly concerned about covering his tracks or hiding his identity. And as we'll see in a moment, his online persona has been all-too-willing to discuss his current legal situation with former clients and fellow underground denizens. [Screenshot]

Continued : http://krebsonsecurity.com/2013/04/phoenix-exploit-kit-author-arrested-in-russia/

Collapse -
Anonymous and affiliates attack Israeli websites
by Carol~ Forum moderator / April 8, 2013 5:13 AM PDT
In reply to: NEWS - April 08, 2013

As announced, hacker groups affiliated with Anonymous have joined in the attacks on Israeli web properties.

By launching "Operation Israel", the hacktivist collective called on hacker groups and individuals to participate and launch cyber attacks as a means of protest against Israel's occupation of Gaza, their human rights violations, and to show solidarity with newly recognized Palestinian state.

The Hackers Post has a list of participating hackers, and according to reports and claims by the groups, a series of websites have been hacked and defaced, and data from them stolen and leaked online.

The attacks started with hits on government sites, but later turned to hundreds of private and business sites hosted on .il domains (Hacker News Bulletin has a list of them that they keep updating).

Continued : http://www.net-security.org/secworld.php?id=14718

Also:
Israel Says Mass Cyber Attack Ongoing, Damage Negligible
Hacktivists Target over 100,000 Israeli Sites, Officials Say There's No Real Damage
Anonymous blitzes Israel in new attack
Anonymous cyberattack on Israel finds disputed impact

Collapse -
Game of Thrones Torrents are Perfect for Delivering Malware
by Carol~ Forum moderator / April 8, 2013 5:13 AM PDT
In reply to: NEWS - April 08, 2013

Earlier this week, Torrent Freak reported that the season premiere of Game of Thrones third season (that's GoTs03e01 for those hip to the lingo) was the most pirated file of all time. The show has gained an enormous following, but illegal downloads of the show might be used to slip you some malware along with your high fantasy.

The popularity of Game of Thrones makes it an obvious choice to seed malware to unsuspecting BitTorrent users. Torrent Freak's numbers speak for themselves: a million downloads in the less than a day and over 160,000 simultaneous downloading peers reported by OpenBitTorrent. The second episode in the season will air this weekend, and will surely draw just as many downloaders as well as some ne'er-do-wells.

Malware is Out There
Malware has always been a part of file sharing, long before BitTorrent. "I remember Napster, eDonkey, Limewire," said Sophos senior threat researcher Beth Jones. "Almost 60 percent of it was malware. The torrents aren't really that different."

Continued: http://securitywatch.pcmag.com/malware/310063-game-of-thrones-torrents-are-perfect-for-delivering-malware

Related:
'Game of Thrones' torrent malware found
Cybercriminals Might Be Distributing Malware via Game of Thrones Torrents

Collapse -
Android AirDroid Flaw Can Lead to XSS, DoS Attacks
by Carol~ Forum moderator / April 8, 2013 5:13 AM PDT
In reply to: NEWS - April 08, 2013

A cross-site scripting (XSS) vulnerability exists in the browser version of AirDroid, a cloud management application for Google's Android phones. According to an alert from the US-Computer Emergency Readiness Team (US-CERT), at the current time, there is no patch planned and there is no logical workaround.

According to a warning on the US-CERT's Vulnerability Notes Database this morning, if an attacker was able to get access to a phone with AirDroid installed, they'd be able to send a malicious text message to the browser associated with the account. Once that message is brought up on the browser, the attacker could execute an XSS attack which in turn could lead to a slew of problems, including information leakage, privilege escalation and denial of service on the compromised machine.

Apparently the problem is that AirDroid's web interface, web.airdroid.com, doesn't properly sanitize the code it's sent via text messages. The app can be used in tandem with popular browsers such as Internet Explorer, Google Chrome, Mozilla Firefox and Apple's Safari, to access files on Android devices from the web.

Continued : https://threatpost.com/en_us/blogs/android-airdroid-flaw-can-lead-xss-dos-attacks-040813

Collapse -
Work and Home Profiles: Will They Actually Work?
by Carol~ Forum moderator / April 8, 2013 5:13 AM PDT
In reply to: NEWS - April 08, 2013

From the Trendlabs Security Intelligence Blog:

In response to the growing threat of mobile malware, one intriguing concept has emerged as a potential solution to help enterprises secure mobile devices: dual-identity devices.

The idea is actually fairly simple. On the phone there will be two distinct profiles: one for personal usage, another for work usage. The apps and data of each profile would be kept distinct from each other. The "personal" profile would be managed by the user, and the "work" profile would be kept locked down (the way most IT people would prefer it). In theory, everybody is happy: the user gets to use their phone as they see fit, the user's company has their data safe and sound. It's a win-win situation, right?

The concept is appealing enough that both Blackberry and Samsung have announced that they are both using this very concept in their newest products. However, the devil is in the details - and that is where we discover there are a few problems.

Continued : http://blog.trendmicro.com/trendlabs-security-intelligence/work-and-home-profiles-will-they-actually-work/

Collapse -
Windows XP death watch: 365 days remaining
by Carol~ Forum moderator / April 8, 2013 5:13 AM PDT
In reply to: NEWS - April 08, 2013

On April 8th, 2014 - exactly one year from today - Microsoft will terminate Extended Support for Windows XP.

That means no more security updates.

And that could mean very big problems for a significant percentage of PC users.

According to data from Net Applications, Windows XP still maintains a nearly 39% hold on the desktop operating system market, second only to Windows 7 which has just under 45%.

Every other individual desktop operating system (including Windows Vista, Windows 8, and Mac OS X v10.8 Mountain Lion) has 5% or less of the desktop operating system market. [Screenshot: Operating system marketshare]

Imagine, if you will, what could happen should bad guys decide to hold onto exploits, plotting to use them only after Microsoft stops releasing patches for Windows XP.

Continued : http://nakedsecurity.sophos.com/2013/04/08/windows-xp-death-watch-365/

Collapse -
User Privacy Plunges as Android Aggressive Adware and ..
by Carol~ Forum moderator / April 8, 2013 6:34 AM PDT
In reply to: NEWS - April 08, 2013
.. Malware Rise

With adware gleaning more user data from people devices than they would normally need too and developers bundle more than one adware framework into their apps, user privacy is increasingly taking a backseat to profit for developers and advertisers. More and more unknown third parties now have access to user browsing history, phone numbers, email address and everything they need to compile comprehensive and personalized user profiles.

User privacy is taking a serious blow as adware targeting Android devices jumped 61 percent worldwide in the five months through January, while malware expanded 27 percent and adware in the US expanded 35 percent, according to a study by Bitdefender Labs. The number of Trojan reports spiked 37 percent in December 2012.

Android malware and adware are not uncommon to both third party marketplaces and the official Google Play store. While Android adoption increased steadily in the past five months, so has the number of malware and adware detections. [Screenshot]

Continued: http://www.hotforsecurity.com/blog/user-privacy-plunges-as-android-aggressive-aware-and-malware-rise-5878.html
Popular Forums
icon
Computer Help 47,885 discussions
icon
Computer Newbies 10,322 discussions
icon
iPhones, iPods, & iPads 3,188 discussions
icon
Security 30,333 discussions
icon
TVs & Home Theaters 20,177 discussions
icon
HDTV Picture Setting 1,932 discussions
icon
Phones 15,713 discussions
icon
Windows 7 6,210 discussions
icon
Networking & Wireless 14,510 discussions

Tech Tip

Know how to save a wet phone?

It's not with a dryer and it's not with rice. CNET shows you the secret to saving your phone.