Spyware, Viruses, & Security forum


NEWS - October 25, 2013

by Carol~ Forum moderator / October 25, 2013 2:59 AM PDT
Mozilla's Lightbeam for Firefox add-on lets users visualize how sites are tracking them and why

Mozilla, makers of the Firefox browser, has released an add-on called Lightbeam for Firefox which presents a visualization of your browsing history and analyzes which applications are tracking or monitoring you online and how they are connected.

The company had previously released an experimental add-on for Firefox called Collusion in a bid to better understand how first-party website tools shape a visitor's experience and how their data is tracked.

Following on from its work with Collusion, this second phase of the project now aims to allow users to see exactly who is getting access to their data, and how, with a view to changing Web behaviour of individuals and businesses alike. Lofty, and worthwhile, ambitions.

With a new name and new features, Lightbeam will now show how third-party tools - whether that's social sharing options, advertising, personalization features or anything else - as well as first-party ones, track and share data as you move around the Web.

Continued: http://thenextweb.com/apps/2013/10/25/mozillas-lightbeam-firefox-add-lets-users-visualize-sites-tracking/#article

Mozilla releases add-on to reveal online data tracking
Lightbeam: Mozilla releases add-on that reveals online data tracking
Mozilla's Lightbeam tool will expose who is looking over your shoulder on the web
Post a reply
Discussion is locked
You are posting a reply to: NEWS - October 25, 2013
The posting of advertisements, profanity, or personal attacks is prohibited. Please refer to our CNET Forums policies for details. All submitted content is subject to our Terms of Use.
Track this discussion and email me when there are updates

If you're asking for technical help, please be sure to include all your system info, including operating system, model number, and any other specifics related to the problem. Also please exercise your best judgment when posting in the forums--revealing personal information such as your e-mail address, telephone number, and address is not recommended.

You are reporting the following post: NEWS - October 25, 2013
This post has been flagged and will be reviewed by our staff. Thank you for helping us maintain CNET's great community.
Sorry, there was a problem flagging this post. Please try again now or at a later time.
If you believe this post is offensive or violates the CNET Forums' Usage policies, you can report it below (this will not automatically remove the post). Once reported, our moderators will be notified and the post will be reviewed.
Collapse -
(Updated) Hackers compromise official PHP website,
by Carol~ Forum moderator / October 25, 2013 3:33 AM PDT
.. infect visitors with malware

"Php.net goes on lockdown after malicious code is found hosted on site servers."

Maintainers of the open-source PHP programming language have locked down the php.net website after discovering two of its servers were hacked to host malicious code designed to surreptitiously install malware on visitors' computers.

The compromise was discovered Thursday morning by Google's safe browsing service, which helps the Chrome, Firefox, and Safari browsers automatically block sites that serve drive-by exploits. Traces of the malicious JavaScript code served to some php.net visitors were captured and posted to Hacker News here and, in the form of a pcap file, to a Barracuda Networks blog post here. The attacks started Tuesday and lasted through Thursday morning, PHP officials wrote in a statement posted late that evening.

Eventually, the site was moved to a new set of servers, PHP officials wrote in an earlier statement. There's no evidence that any of the code they maintain has been altered, they added. Encrypted HTTPS access to php.net websites is temporarily unavailable until a new secure sockets layer certificate is issued and installed. The old certificate was revoked out of concern the intruders may have accessed the private encryption key. User passwords will be reset in the coming days. At time of writing, there was no indication of any further compromise.

Continued : http://arstechnica.com/security/2013/10/hackers-compromise-official-php-website-infect-visitors-with-malware/

PHP.net compromised and used to attack visitors
Official PHP website hacked, spreads malware infection
Php.net compromised to serve malware
Collapse -
Senator Demands More Info From Experian
by Carol~ Forum moderator / October 25, 2013 3:33 AM PDT

In the wake of revelations that credit bureau Experian sold consumer data to the proprietors of an underground identity theft service, a powerful U.S. senator is calling on the company to divulge more information on the extent of the potential damage to consumers.

West Virginia Senator Jay Rockefeller, a Democrat who chairs the Senate Committee on Commerce, Science and Transportation, on Wednesday sent a letter (PDF) to Experian demanding additional details about the security breach. Specifically, Rockefeller asked for responses to questions about Experian's vetting process for its customers and current practices for sharing consumer data. The senator also urged Experian to fully respond to his related previous inquiries regarding Experian's customers, its oversight of its disclosure to third parties, and Experian's data sources.

Continued: http://krebsonsecurity.com/2013/10/senator-demands-more-info-from-experian/

Related: Experian Sold Consumer Data to ID Theft Service

Collapse -
Is your smartphone broadcasting your movements when you shop
by Carol~ Forum moderator / October 25, 2013 3:33 AM PDT

Next time you're in a public place, have a good look around you and see if you're being followed.

You (probably) won't see anyone actually tailing you, but if you have your smartphone with you it's possible that your movements are being keenly observed.

A couple of months ago we reported on the sinister and faintly Dr Whoish tale of London's spying rubbish bins. These uncannily observant, space-age trash cans were part of a trial by advertisers that monitored peoples' movements by tracking the unique IDs of their mobile phones.

All WiFi-capable devices broadcast a unique ID, a Media Access Control (MAC) address, when they're looking for networks (and so long as WiFi is enabled they are always looking for networks).

Continued: http://nakedsecurity.sophos.com/2013/10/25/is-your-smartphone-broadcasting-your-movements-when-you-shop/

Collapse -
Beheading videos are *still* being spread on Facebook
by Carol~ Forum moderator / October 25, 2013 3:34 AM PDT

You would have hoped that Facebook were being more proactive in removing horrific videos being spread on its social network, after the furore earlier this week.

Sadly, there are still grisly beheading videos being shared on Facebook, without any warning of their horrific content. [Screenshot]

(Unlike Facebook, I have censored out the most gruesome part in my screenshot above)

Facebook user E. Hairrell contacted me, after finding the gruesome and shocking video of a woman's head being decapitated in her newsfeed. [...]

Ms Hairrell - a recent college graduate, who lives in the Chicago area - says that she reported the video to Facebook, and made it clear that she intended to permanently delete the account if they don't quickly and permanently resolve the issue.

Continued : http://grahamcluley.com/2013/10/beheading-video-facebook/

Facebook backtracks again on decision to allow controversial beheading video
Facebook playing with fire by policing beheading videos
Facebook re-allows the posting of decapitation videos with 'WARNING'

Collapse -
Skype Smileys, Browser Extensions and You
by Carol~ Forum moderator / October 25, 2013 5:15 AM PDT

ThreatTrack Security Labs Blog:

An emoticons program for Skype recently caught our eye located at skypemoticonsb(dot)asia. [Screenshot]

Interestingly, they have a standalone uninstaller because the main executable has no such functionality. Programs missing a built-in uninstaller aren't that common these days, and causes all sorts of potential issues and messing around to remove from a system. What if the website / server goes down hosting the uninstaller? Why should I be dependent on a chain of downloads to remove one program?

It isn't the most reassuring thing in the World to see the uninstall download page telling me that "If the uninstaller in the first link didn't work for you, please try the below" [Screenshot]

Why wouldn't it work? Why do I already have three programs to juggle before I've even installed something? Is one of the uninstallers more reliable than the other?

The first screen of the installer gives us functional T&C pages, so that's good. [Screenshot]

Continued: http://www.threattracksecurity.com/it-blog/skype-smileys-browser-extensions/

Collapse -
LinkedIn Intro? No thanks. My email security is too importan
by Carol~ Forum moderator / October 25, 2013 5:15 AM PDT

LinkedIn wants iPhone users to sign-up for a new service called Intro. My advice? Don't.

LinkedIn Intro extends the standard iOS Mail app in ways that Apple never intended to be possible, injecting HTML code into the top of the emails you receive so you can view someone's LinkedIn profile alongside their message.

In a fairly self-congratulatory blog post entitled "LinkedIn Intro: Doing the Impossible on iOS", LinkedIn engineers explain just how clever they have been.

And yes, to give them credit, from the engineering point of view it is pretty nifty. But from the security and privacy point of view it sends a shiver down my spine.

Rather than your iPhone connecting directly to your email provider's servers (Gmail, Yahoo, etc), it will be connecting via LinkedIn's proxy server instead - which will act as a middle-man in your email communications.

Continued : http://grahamcluley.com/2013/10/linkedin-intro-email-security/

Don't trust a company on its word, trust it on its tech
LinkedIn's Intro Feature Is Very Cool And A Spectacularly Bad Idea
LinkedIn Intro embeds professional profiles into Mail for iOS

Collapse -
Fake Social Empires Cheat Exposes over 135K Facebook Users..
by Carol~ Forum moderator / October 25, 2013 5:16 AM PDT
.. to Fraud

More than 135,000 Facebook users were exposed to fraud and identity theft, after they clicked the 'like' button on a fake Social Empires cheat website. The application is one of the most popular strategy games on Facebook, with more than 6 million monthly active users who are now vulnerable to the scam. [Screenshot]

Fake Social Empires Cheat Exposes over 135,000 Facebook Users to FraudThe page recently created on a Blogspot domain spreads massively on the social network from one user to another. Passionate gamers have already `liked' the web site, also exposing their friends and other users to the scam. The mechanism of the fake cheat is simple and similar to that of other scams, where users become unwilling promoters. After being asked to `like' the page, Social Empires players are told to copy and post the message on five different fan pages focused on hacking and cheating techniques. Screenshot]

"Awesome! Social Empires Cheat GOT 9999999 GOLD,FOOD,WOOD,STONE and 10000 Cash 100% Working try now! here http:/// (y) (y) (y)," the scam message reads.

Continued : http://www.hotforsecurity.com/blog/fake-social-empires-cheat-exposes-over-135000-facebook-users-to-fraud-7224.html
Collapse -
Security Spotlight: Dangerous Social Networking
by Carol~ Forum moderator / October 25, 2013 5:16 AM PDT

'As you may already know, October is National Cyber Security Awareness Month. And although we're already on the second half of the month, the Stop. Think. Connect campaign of the National Cyber Security Alliance (NCSA) and Department of Homeland Security (DHS) is very much in effect.

In support of this campaign, we at ThreatTrack Labs will be putting out a series of posts that discuss certain types of threats and/or security concerns are Internet users—at home, in their small office/home office (SOHO), in a corporate environment, at school or even on the go—are reminded of potential dangers they might encounter while online and how they can better protect their devices from getting infected or their personal information from getting swiped.

In the UK, it's Get Safe Online Week, a campaign spearheaded by a non-profit organization in partnership with the UK government and other private sectors, that aims to educate the public regarding online safety. This usually happens every 22nd to the 26th of October. For this year's campaign, they published an Online Code of Conduct that you may want to check out.

In "How to Have a Healthy (and Secure) Online Social Life", we highlighted how our interconnectivity online, although good, can also bring about unwanted attention and bad things to Internet users—if they're not careful enough, first and foremost. In several cases, however, no matter how much care and effort we put on securing our devices and information online, we still fall short.

Continued: http://www.threattracksecurity.com/it-blog/security-spotlight-dangerous-social-networking/

Collapse -
Dear AV provider: Do you enable NSA spying? Yours, EFF
by Carol~ Forum moderator / October 25, 2013 10:38 AM PDT

The Electronic Frontier Foundation, security expert Bruce Schneier, and 23 others have called on antivirus providers around the world to protect their users against malware spawned by the National Security Agency and other groups that carry out government surveillance.

The move comes amid revelations that the NSA has a wide-ranging menu of software exploits at its disposal that have been used to identify users of the Tor anonymity service, track iPhone users, and monitor the communications of surveillance targets. Schneier has said that the NSA only relies on these methods when analysts have a high degree of confidence that the malware won't be noticed. That means detection by AV programs could make the difference between such attacks succeeding, failing, or being used at all.

"As a manufacturer of antivirus software, your company has a vital position in providing security and maintaining the trust of internet users as they engage in sensitive activities such as electronic banking," the 25 signatories wrote in an open letter sent on Thursday to AV companies. "Consequently, there should be no doubt that your company's software provides the security needed to maintain this trust."

Continued : http://arstechnica.com/security/2013/10/dear-av-provider-do-you-enable-nsa-spying-yours-eff/

Collapse -
Chrome's Solution to the Unsavvy Poses A Potential Risk
by Carol~ Forum moderator / October 25, 2013 10:38 AM PDT

From "Malwarebytes Unpacked" Blog:

Don't get me wrong, I love Chrome, I think it's a fantastic browser and has a great track record of protecting users from exploits and malicious sites. However, their attempts at making it "easier" for users to find where they want to go, makes me think that their security purview isn't focused enough on the internal threats.

So, if you use Chrome, you might have noticed that anytime you open up a window or a new tab, you get something like this: [Screenshot]

A nice search bar, which I have no problem with, and then a listing of your most visited sites. Now, to the casual observer I am sure there is nothing wrong here. Users visit certain sites more frequently and therefore it should be easy for them to get there quickly, Chrome makes this possible.

The Downside

Continued : http://blog.malwarebytes.org/privacy-2/2013/10/chromes-solution-to-the-unsavvy-poses-a-potential-risk/#

Collapse -
reCAPTCHAs are finally readable by normal humans
by Carol~ Forum moderator / October 25, 2013 10:39 AM PDT

Google today announced that reCAPTCHAs served up to humans are finally readable without the need to squint your eyes or bang your keyboard in frustration after typing the wrong sequence of letters five times in a row. Who can even read those things, amirite?

Google has figured out how to tell if you're a human or a bot, and if you're human you get an easy CAPTCHA. We've asked Google why a CAPTCHA would be necessary at all if the company already knows you're human, but we haven't received an answer yet. Anyway, Google reCAPTCHA Product Manager Vinay Shet writes in a blog post:

The updated system uses advanced risk analysis techniques, actively considering the user's entire engagement with the CAPTCHA—before, during and after they interact with it. That means that today the distorted letters serve less as a test of humanity and more as a medium of engagement to elicit a broad range of cues that characterize humans and bots.

As part of this, we've recently released an update that creates different classes of CAPTCHAs for different kinds of users. This multi-faceted approach allows us to determine whether a potential user is actually a human or not, and serve our legitimate users CAPTCHAs that most of them will find easy to solve. Bots, on the other hand, will see CAPTCHAs that are considerably more difficult and designed to stop them from getting through.

Continued : http://arstechnica.com/information-technology/2013/10/recaptchas-are-finally-readable-by-normal-humans/

Collapse -
Trojan looks to "Wrob" Android users
by Carol~ Forum moderator / October 25, 2013 10:39 AM PDT

Android bank Trojans having been making their way around file sharing sites and alternative markets in the last few months. [Screenshot]

Targeting Korean users, these Trojans look to replace legitimate banking apps and capture user data.

This particular one disguises itself as the Google Play Store app and will run as a service in the background to monitor events. This enables it to capture incoming SMS, monitor installed apps and communicate with a remote server. [Screenshot]

The Trojan does a look up of installed apps against a list of targeted apps (BK_ARRAY_LIST in screenshots), if found it will remove and download a malicious version to replace.

The malicious version will contain the exact Package Name and look very similar to the legitimate app, but contains malicious code with no banking functionality.

This second Trojan will also capture the infected users banking information and other useful data that will generate revenue for them.

Continued: http://blog.malwarebytes.org/mobile-2/2013/10/trojan-looks-to-wrob-android-users/

Popular Forums
Computer Help 49,613 discussions
Computer Newbies 10,349 discussions
Laptops 19,436 discussions
Security 30,426 discussions
TVs & Home Theaters 20,308 discussions
Windows 10 360 discussions
Phones 15,802 discussions
Windows 7 7,351 discussions
Networking & Wireless 14,641 discussions

CNET Holiday Gift Guide

Looking for great gifts under $100?

Trendy tech gifts don't require a hefty price tag. Choose from these CNET-recommended useful and high-quality gadgets.