Attention: The forums will be placed on read only mode this Saturday (Oct. 20, 2018)

During this outage (6:30 AM to 8 PM PDT) the forums will be placed on read only mode. We apologize for this inconvenience. Click here to read details

Spyware, Viruses, & Security forum

Alert

NEWS - August 01, 2014

by Carol~ Moderator / July 31, 2014 11:33 PM PDT
Stealthy new malware snatching credit cards from retailers' POS systems

" "Backoff" scrapes credit card transactions out of memory, sends them back to cyber thieves."

US Computer Emergency Response Team, in cooperation with the Secret Service and researchers at Trustwave's Spiderlabs, have issued an alert about a newly identified variant of malware installed on point-of-sale (POS) systems that was used in a series of recent attacks by cyber criminals. Called "Backoff," the malware shares characteristics with the one used to attack Target's point of sale systems last year: it scrapes credit card data out of the infected computer's memory. Until now, it was undetectable by antivirus software.

POS machines are a big target for hackers, who use malware like Backoff to collect data from credit cards and other transaction information to either create fraudulent credit cards or sell the data. In many ways, the Backoff-based attacks were similar to the attack in 2011 on Subway franchises—hackers used remote desktop software left active on the machines to gain entry, either by brute-force password attacks or by taking advantage of a default password, and then installing the malware on the hacked system.

Continued : http://arstechnica.com/security/2014/07/stealthy-new-malware-snatching-credit-cards-from-retailers-pos-systems/

Related :
New Point-of-Sale Malware "Backoff" Scrapes RAM for Card Data
Hackers Turn Remote Desktop Tools Into Gateways for Point-of-Sale Malware Attacks
Discussion is locked
You are posting a reply to: NEWS - August 01, 2014
The posting of advertisements, profanity, or personal attacks is prohibited. Please refer to our CNET Forums policies for details. All submitted content is subject to our Terms of Use.
Track this discussion and email me when there are updates

If you're asking for technical help, please be sure to include all your system info, including operating system, model number, and any other specifics related to the problem. Also please exercise your best judgment when posting in the forums--revealing personal information such as your e-mail address, telephone number, and address is not recommended.

You are reporting the following post: NEWS - August 01, 2014
This post has been flagged and will be reviewed by our staff. Thank you for helping us maintain CNET's great community.
Sorry, there was a problem flagging this post. Please try again now or at a later time.
If you believe this post is offensive or violates the CNET Forums' Usage policies, you can report it below (this will not automatically remove the post). Once reported, our moderators will be notified and the post will be reviewed.
Collapse -
The Severe Flaw Found in Certain File Locker Apps
by Carol~ Moderator / July 31, 2014 11:53 PM PDT
In reply to: NEWS - August 01, 2014

TrendLabs Security Intelligence Blog:

Protecting data has always been one of the most important aspects of our digital life. Given the amount of activity done on smartphones, this is especially rings true for smartphones. While users may use the built-in privacy and security settings of their devices, others take it a step further and employ security and privacy protection apps.

One of the ways to protect smartphone data is by using "file locker" apps. As the name implies, these apps can be used as storage for sensitive data. The apps store the data away from prying eyes, often using encryption and passwords for additional security.

But how effective are these apps in protecting your data? Is it safe to assume that these apps will live up to their promise and offer the level of security that our data needs? Unfortunately, we analyzed the more popular ones in Google Play and found that these apps fail to deliver what they promise.

The apps we analyzed are the following:

Continued : http://blog.trendmicro.com/trendlabs-security-intelligence/the-severe-flaw-found-in-certain-file-locker-apps/

Collapse -
This thumbdrive hacks computers."BadUSB" exploit makes ..
by Carol~ Moderator / July 31, 2014 11:53 PM PDT
In reply to: NEWS - August 01, 2014
... devices turn "evil"

"Researchers devise stealthy attack that reprograms USB device firmware."

When creators of the state-sponsored Stuxnet worm used a USB stick to infect air-gapped computers inside Iran's heavily fortified Natanz nuclear facility, trust in the ubiquitous storage medium suffered a devastating blow. Now, white-hat hackers have devised a feat even more seminal—an exploit that transforms keyboards, Web cams, and other types of USB-connected devices into highly programmable attack platforms that can't be detected by today's defenses.

Dubbed BadUSB, the hack reprograms embedded firmware to give USB devices new, covert capabilities. In a demonstration scheduled at next week's Black Hat security conference in Las Vegas, a USB drive, for instance, will take on the ability to act as a keyboard that surreptitiously types malicious commands into attached computers. A different drive will similarly be reprogrammed to act as a network card that causes connected computers to connect to malicious sites impersonating Google, Facebook or other trusted destinations. The presenters will demonstrate similar hacks that work against Android phones when attached to targeted computers. They say their technique will work on Web cams, keyboards, and most other types of USB-enabled devices.

Continued : http://arstechnica.com/security/2014/07/this-thumbdrive-hacks-computers-badusb-exploit-makes-devices-turn-evil/

Related:
Malicious USB device firmware the next big infection vector?
BadUSB Malware Stored in USB Firmware Can Take Over the Computer
Collapse -
Facebook "Enter Details Here to Enable Your Account"
by Carol~ Moderator / July 31, 2014 11:54 PM PDT
In reply to: NEWS - August 01, 2014

"Malwarebytes Unpacked" Blog:

We at Malwarebytes do our best to keep you, dear Reader, apprised with the latest threats we encounter that target Facebook users. As you may know, Facebook is one of the few prime targets of online crime, particularly fraud.

Here's one in-the-wild phishing campaign that we spotted homing in on users.

Unfortunately, we couldn't trace back the origin of this campaign; however, it's highly likely that it started off as an email pretending to be a notification. As such, be wary of any received emails containing URL(s) that may lead you to us-facebook[dot]com. Successful access to the said site immediately forwards to us-services-facebook[dot]com, as pictured below: [Screenshot]

Apart from asking for email address and password—credentials used to access a Facebook account—from the user, it also wants to get his/her webmail and corresponding password, date of birth, security question and answer, and country of origin—information that are irrelevant at best when enabling disabled accounts in general.

Continued : http://blog.malwarebytes.org/fraud-scam/2014/07/enter-details-here-to-enable-your-account/

Related: Facebook Phishing Scam Asks for More Than Social Network Credentials

Collapse -
7 Out of Top 10 Internet of Things Devices Riddled With
by Carol~ Moderator / July 31, 2014 11:55 PM PDT
In reply to: NEWS - August 01, 2014
... Vulnerabilities

Graham Cluley @ the Lumension Optimal Security blog:

It has become the trendy thing to connect more and more household and office devices to the internet. It is becoming increasingly common to find yourself typing a WiFI password not just into your smartphone, but also your smoke alarm, your fridge, your printer, your baby monitor and maybe even your car.

However, are the manufacturers of these internet-enabled devices paying proper care and attention to security and privacy?

Sadly, it seems they are often falling at the first hurdle.

New research published by HP claims "70 percent of the most commonly used Internet of Things (IoT) devices contain serious vulnerabilities."

On average, 25 vulnerabilities were found by researchers in HP's study of the top ten most popular IoT devices - with a grand total of 250 security concerns discovered.

Continued : http://blog.lumension.com/9127/7-out-of-top-10-internet-of-things-devices-riddled-with-vulnerabilities/
Collapse -
23 Data Records Exposed Each Second in Q2 2014 Breach ..
by Carol~ Moderator / July 31, 2014 11:55 PM PDT
In reply to: NEWS - August 01, 2014
... Incidents

A report highlighting the top data breach incidents in the world and the number of records stolen from the targeted organizations shows that, on average, about 23 data records were lost or stolen every second in Q2 2014.

The report (pdf) comes from data protection company SafeNet and relies on publicly available information gathered through their Breach Level Index tool.

According to this information, in Q2 2014, at least 1,355 records were exposed every minute, and simple math shows a daily figure of 1,951,724 records.

As for the top five most significant computer system breaches, three of them occurred in the United States, the eBay incident being by far the one impacting the largest number of individuals, with details on 145 million stolen. It is worth noting that the total amount of data exposed reaches 175,655,228 million.

Continued : http://news.softpedia.com/news/23-Data-Records-Exposed-Each-Second-in-Q2-2014-Breach-Incidents-453093.shtml
Collapse -
Microsoft EMET 5.0 security tool puts a leash on plug-ins
by Carol~ Moderator / August 1, 2014 3:37 AM PDT
In reply to: NEWS - August 01, 2014

The latest release of a Microsoft security tool that's designed to stop exploits lets administrators control when third-party plugins are launched, a long favored route for attackers.

Microsoft has been steadily improving and adding more capabilities to the Enhanced Mitigation Experience Toolkit (EMET), a free tool that strengthens the security of non-Microsoft applications by using defenses built within Windows, such as ASLR (Address Space Layout Randomization) and DEP (Data Execution Prevention).

The latest 5.0 iteration, released Thursday, includes something called "Attack Surface Reduction," which can block some of an application's modules or plugins that might be abused, wrote Chris Betz, senior director of the Microsoft Security Response Center.

He wrote that Microsoft Word, for example, can be prevented from loading an Adobe Flash Player plugin or allow Java plugins to only run from intranet-zone sites rather than outside ones.

Continued : http://www.infoworld.com/d/security/microsoft-emet-50-security-tool-puts-leash-plug-ins-247503

Related: Microsoft releases EMET 5.0

Collapse -
PC gamers increasingly under attack
by Carol~ Moderator / August 1, 2014 3:37 AM PDT
In reply to: NEWS - August 01, 2014

Many gamers either disable their security or remove it altogether, thereby sacrificing protection to maximize system performance and leaving themselves vulnerable to gaming-focused malware and cyber-attacks, according to a new study by Webroot. [Screenshot]

Key findings include:
• Nearly half of gamers have experienced an online attack, with 55 percent of the attacks resulting in slow-down in system performance and impacted browser behavior.
• 35 percent of PC gamers have either no security or just rely on free diagnostics or clean up tools.
• Trojans, phishing and rootkits ranked top attacks against PC gamers.
[Key findings continued]

The new report is based on survey responses gathered from more than 1,200 gamers during the E3 2014 Conference. It concluded that while a third of gamers do not use a security program - citing gameplay, slowdown and too many alerts and interruptions as key factors - 47 percent have experienced a malware attack.

Continued: http://www.net-security.org/secworld.php?id=17187

Popular Forums

icon
Computer Newbies 10,686 discussions
icon
Computer Help 54,365 discussions
icon
Laptops 21,181 discussions
icon
Networking & Wireless 16,313 discussions
icon
Phones 17,137 discussions
icon
Security 31,287 discussions
icon
TVs & Home Theaters 22,101 discussions
icon
Windows 7 8,164 discussions
icon
Windows 10 2,657 discussions

FALL TV PREMIERES

Your favorite shows are back!

Don’t miss your dramas, sitcoms and reality shows. Find out when and where they’re airing!