Spyware, Viruses, & Security forum


NEWS - May 01, 2013

by Carol~ Forum moderator / May 1, 2013 3:10 AM PDT
US seeks to pressure Google, Facebook et al. into installing wiretapping backdoors

In the US, the Federal Bureau of Investigations (FBI) has what it calls a Going Dark problem.

As the FBI has been telling it for the past few years, the agency is unable to tap the latest generation of Internet communications venues - at least, not always easily or quickly - as it seeks to eavesdrop on terrorists, child pornographers, human traffickers, arms traffickers, drug dealers or other criminals.

A government task force is now preparing legislation that would fix all that by putting the screws on companies such as Facebook and Google, forcing them to enable law enforcement to intercept communications in real time, according to The Washington Post.

The proposal is designed to expand the reach of CALEA, the 1994 Communications Assistance for Law Enforcement Act.

CALEA is a wiretapping law passed under President Bill Clinton that requires telecom service providers and equipment providers to design or modify their products, facilities and services to have surveillance capabilities built in from the ground up so that Feds can monitor all telephone, broadband Internet, and VoIP traffic in real time.

Continued : http://nakedsecurity.sophos.com/2013/05/01/us-google-facebook-bacldoors/
Post a reply
Discussion is locked
You are posting a reply to: NEWS - May 01, 2013
The posting of advertisements, profanity, or personal attacks is prohibited. Please refer to our CNET Forums policies for details. All submitted content is subject to our Terms of Use.
Track this discussion and email me when there are updates

If you're asking for technical help, please be sure to include all your system info, including operating system, model number, and any other specifics related to the problem. Also please exercise your best judgment when posting in the forums--revealing personal information such as your e-mail address, telephone number, and address is not recommended.

You are reporting the following post: NEWS - May 01, 2013
This post has been flagged and will be reviewed by our staff. Thank you for helping us maintain CNET's great community.
Sorry, there was a problem flagging this post. Please try again now or at a later time.
If you believe this post is offensive or violates the CNET Forums' Usage policies, you can report it below (this will not automatically remove the post). Once reported, our moderators will be notified and the post will be reviewed.
Collapse -
The Importance of Backups
by Carol~ Forum moderator / May 1, 2013 3:17 AM PDT
In reply to: NEWS - May 01, 2013

From Bruce Schneier @ his Schneier on Security Blog:

I've already written about the guy who got a new trial because a virus ate his court records. Here's someone who will have to redo his thesis research because someone stole his only copy of the data. Remember the rule: no one ever wants backups, but everyone always wants restores.

I have no idea if that image is real or not, but I've been hearing such stories for at least two decades.


Collapse -
Mozilla sends cease and desist to spyware maker
by Carol~ Forum moderator / May 1, 2013 3:41 AM PDT
In reply to: NEWS - May 01, 2013
Mozilla has confirmed that it has sent a cease and desist letter to Gamma International, makers of the FinFisher spyware. A report by the University of Toronto Citizen Lab on the global spread of Gamma's FinFisher spyware revealed that the FinSpy component deployed on victims' systems masquerades as Mozilla Firefox. Binaries report themselves as "Firefox.exe" and carry properties that are associated with Firefox including version numbers and copyright and trademark claims that refer to "Firefox and Mozilla developers". Mozilla also notes that an expert user examining the code of Gamma's spyware would find a verbatim copy of the assembly manifest from Firefox software.

Gamma's use of the "brand and trademarks to lie and mislead" does not affect Firefox itself; the use of the Firefox branding and properties is "entirely separate" from the Firefox code and is just one of the methods that FinFisher uses to avoid detection. Mozilla's Alex Fowler, who leads on privacy and public policy for the organisation, says that this deception is specifically trading on Mozilla's reputation of being trustworthy - in 2012, for example, Mozilla was named "Most Trusted Internet Company for Privacy" in a Ponemon Institute study (PDF).

Continued : http://www.h-online.com/security/news/item/Mozilla-sends-cease-and-desist-to-spyware-maker-1854088.html

Mozilla moves to stop spyware company from spoofing Firefox
Mozilla accuses Gamma of dressing up dictators' spyware as Firefox
Collapse -
US Labor Dept website serving malware to innocent visitors
by Carol~ Forum moderator / May 1, 2013 3:42 AM PDT
In reply to: NEWS - May 01, 2013

The US Department of Labor's website has been hacked and malicious code stuck behind the scenes, security tools firm AlienVault says.

Since yesterday, the DoL site has been serving out malicious code that installs malware on unsuspecting users' computers, AlienVault's labs director Jaime Blasco told The Register.

The DoL said that it was working on the problem, but had no other comment on the hack.

Browsers execute a script from a malicious server when folks visit the affected site, the DoL's Site Exposure Matrices microsite. The infected script collects information including Flash versions, PDF plugins and MS Office versions from users' systems. Captured data is then uploaded to the hackers' server, AlienVault discovered.

The malware also checks if the target's system is running antivirus programs like McAfee, AVG or Sophos. If it detects the popular Bitdefender free anti-virus program, the malware will try to deactivate the AV suite.

"Some of the techniques used in this attack are very similar to the ones we identified a few months ago in an attack against a Thailand NGO website," Blasco said in a blog post.

Continued : http://www.theregister.co.uk/2013/05/01/dol_website_hack_malware/

U.S. Department Of Labor Website Discovered Hacked, Spreading PoisonIvy
Sub-site of US Department of Labour hacked
US Department of Labor Site Hacked, Directs Visitors to Malware

Collapse -
More Malware Showing Up on Fake SourceForge Web Sites
by Carol~ Forum moderator / May 1, 2013 3:42 AM PDT
In reply to: NEWS - May 01, 2013

Malware developers continue to clone SourceForge Web sites that appear to offer the source code for popular gaming software but are actually peddling malicious code tied to the ZeroAccess Trojan.

Julien Sobrier, a security researcher for San Jose-based cloud security provider Zscaler, on Tuesday outlined several more malicious versions of the popular file-sharing sites, some of which appeared to offer modification code for Minecraft (http: //sourceforgeestonia.net/minecraft_xray_texture_pack.exe) and source code for Airport Firefighter Simulator (http: //sourceforgeecuador.net/airport_firefighter_simulator.exe ) before they were taken offline.

Sobrier earlier this month discovered similar malware on a fake version of sourceforgechile.net. This past week, in addition to the bogus sites appearing to come from Estonia and Ecuador, fake Web sites were registered in the United States for sourceforgegrenada.net,sourceforgepalau.net, sourceforgeindiana.net, sourceforgemorocco.net, sourceforgemyanmar.net and sourceforgeyemen.net.

Continued : http://threatpost.com/more-malware-showing-up-on-fake-sourceforge-web-sites/

Collapse -
After a Wave of Attacks, Twitter Warns Media About Security
by Carol~ Forum moderator / May 1, 2013 3:42 AM PDT
In reply to: NEWS - May 01, 2013

After a series of attacks against accounts maintained by media companies, Twitter has issued a memo on security best practices and encouraged them to remain vigilant. The warning comes after several high-profile accounts were targeted by a Pro-Syria activist group, including one attack that impacted Wall Street.

Syrian Electronic Army (SEA) has claimed responsibility for last month's attacks, including those that targeted three CBS News accounts. The (SEA) claimed responsibility for the messages posted on the feeds for 60 Minutes, 48 Hours and CBS Denver, which included comments that President Obama was "shamelessly in bed with Al-Qaeda" and that the CIA was arming Al-Qaeda terrorists in Syria.

Shortly after those hacks, the SEA targeted the Twitter account used by the Associated Press, reporting that there were explosions at the White House, and that President Obama was injured. As the fake news alert gained traction online, Wall Street suffered when the DOW took a 130 dip and the S&P dropped 12 points.

Continued : http://www.securityweek.com/after-wave-attacks-twitter-warns-media-about-security

Related : How to Protect Your Group Twitter Account

Collapse -
Who has your back?
by Carol~ Forum moderator / May 1, 2013 5:19 AM PDT
In reply to: NEWS - May 01, 2013

"What do Apple, AT&T, Myspace, Verizon and Yahoo! have in common? Little regard for protecting their customers from governmental abuse of power."

With great storage comes great responsibility The Electronic Frontier Foundation published their 3rd annual report (pdf) on online privacy and transparency on government access to your data. The EFF looked at 18 online companies and their policies across 6 criteria:

• Require a warrant for content of communications.
• Tell users about government data requests.
• Publish transparency reports.
• Publish law enforcement guidelines.
• Fight for users' privacy rights in courts.
• Fight for users' privacy in Congress.

Not everyone has to defend a user before a judge, but the EFF wanted to acknowledge those that do. Requiring a warrant is a new category, but warrants aren't a legal requirement in much of America.

Let's go the EFF's summary graphic: [Screenshot: EFF Summary Graphic]

Continued : http://www.zdnet.com/who-has-your-back-7000014773/

Also from ZDNet: Don't trust Apple, Verizon with your data, says EFF's privacy

Collapse -
Scammy Profile Viewer app is now "offered" by Facebook
by Carol~ Forum moderator / May 1, 2013 5:19 AM PDT
In reply to: NEWS - May 01, 2013

Once users become too familiar with a type of scam and stop falling for it, scammers tend to move on to new ones. But every now and then they go back to using old ones for a while in the hopes that new users haven't been told about them, and that old users forgot about them.

Hoax-Slayer has spotted an ongoing Facebook campaign that combines a well-known (but obviously still effective) lure and a trick that has been around for a good while, but not very lately.

The lure is a fake Facebook Profile Viewer app, and the scammers are impersonating the social network and are trying to convince users that they are now required to show them who has been viewing their profile: [Screenshot]

But in order to be allowed to install the app, the users are told they must generate an "age verification code." Unfortunately, the instructions lead to them sharing their Facebook authentication token with the scammers, who then misuse it to gain temporary access to the victims' accounts and use it to spread more of the same scam messages on Facebook.

Continued : http://www.net-security.org/secworld.php?id=14843

Popular Forums
Computer Help 49,613 discussions
Computer Newbies 10,349 discussions
Laptops 19,436 discussions
Security 30,426 discussions
TVs & Home Theaters 20,308 discussions
Windows 10 360 discussions
Phones 15,802 discussions
Windows 7 7,351 discussions
Networking & Wireless 14,641 discussions

Coming soon

Get behind the wheel with Roadshow

Love cars? Climb into the driver's seat for the latest videos, reviews, shopping advice and picks by our editors delivered to your inbox every week.