Spyware, Viruses, & Security forum

Alert

NEWS - February 17, 2014

by Carol~ Moderator / February 17, 2014 4:21 AM PST
Kickstarter says it's been hacked and urges users to change passwords

On Saturday afternoon, Kickstarter announced that it had become aware of a security breach resulting in the loss of personal customer data like "usernames, email addresses, mailing addresses, phone numbers, and encrypted passwords." The crowdfunding site e-mailed its users later that night, urging them to change their passwords.

Kickstarter admitted it was made aware of the hack by law enforcement officials on Wednesday, upon which the company "immediately closed the security breach and began strengthening security measures throughout the Kickstarter system." According to the company's blog post, no credit card information was stolen, and only two instances of unauthorized access to accounts were discovered.

According to the site, over 5.6 million people have pledged money to projects via Kickstarter since 2009, when the site launched.

Continued : http://arstechnica.com/security/2014/02/kickstarter-says-its-been-hacked-and-e-mails-users-to-change-passwords/

Related:
Kickstarter Compromised, User Data Stolen
Kickstarter suffers data breach
Kickstarter hacked, user names and encrypted passwords accessed
Kickstarter Hacked: Credit Cards Safe, Passwords Stolen
Discussion is locked
You are posting a reply to: NEWS - February 17, 2014
The posting of advertisements, profanity, or personal attacks is prohibited. Please refer to our CNET Forums policies for details. All submitted content is subject to our Terms of Use.
Track this discussion and email me when there are updates

If you're asking for technical help, please be sure to include all your system info, including operating system, model number, and any other specifics related to the problem. Also please exercise your best judgment when posting in the forums--revealing personal information such as your e-mail address, telephone number, and address is not recommended.

You are reporting the following post: NEWS - February 17, 2014
This post has been flagged and will be reviewed by our staff. Thank you for helping us maintain CNET's great community.
Sorry, there was a problem flagging this post. Please try again now or at a later time.
If you believe this post is offensive or violates the CNET Forums' Usage policies, you can report it below (this will not automatically remove the post). Once reported, our moderators will be notified and the post will be reviewed.
Collapse -
Google acquires sound authentication start-up SlickLogin
by Carol~ Moderator / February 17, 2014 4:37 AM PST

Google has acquired SlickLogin, an Israeli security startup.

The company, formed by three graduates from the Israeli Defence Forces, develops alternative means of web-based authentication, focusing on sound waves as a means of verifying a user's identity.

SlickLogin confirmed the deal on its website, though the exact terms remain undisclosed. A statement from the company says:

Today we're announcing that the SlickLogin team is joining Google, a company that shares our core beliefs that logging in should be easy instead of frustrating, and authentication should be effective without getting in the way. Google was the first company to offer 2-step verification to everyone, for free - and they're working on some great ideas that will make the internet safer for everyone. We couldn't be more excited to join their efforts.

Continued : http://nakedsecurity.sophos.com/2014/02/17/google-acquires-sound-wave-authentication-start-up-slicklogin/

Related :
Google buys SlickLogin, a startup out to kill the password with sound
Google Acquires Authentication-by-Sound Startup SlickLogin
Google buys sound authentication firm SlickLogin

Collapse -
There's now an exploit for 'TheMoon' worm targeting Linksys
by Carol~ Moderator / February 17, 2014 4:37 AM PST
.. routers

"The list of affected router models is larger than previously thought"

Technical details about a vulnerability in Linksys routers that's being exploited by a new worm have been released Sunday along with a proof-of-concept exploit and a larger than earlier expected list of potentially vulnerable device models.

Last week, security researchers from the SANS Institute's Internet Storm Center identified a self-replicating malware program that exploits an authentication bypass vulnerability to infect Linksys routers. The worm has been named TheMoon.

The initial report from SANS ISC said the vulnerability is located in a CGI script that's part of the administration interface of multiple Linksys' E-Series router models. However, the SANS researchers didn't name the vulnerable CGI script at the time.

On Sunday, a Reddit user identified four CGI scripts that he believed were likely to be vulnerable. An exploit writer, who uses the online alias Rew, later confirmed that at least two of those scripts are vulnerable and published a proof-of-concept exploit.

Continued: http://www.computerworld.com/s/article/9246392/There_s_now_an_exploit_for_TheMoon_worm_targeting_Linksys_routers

Related to: Bizarre attack infects Linksys routers with self-replicating malware
Collapse -
Bogus Evernote alert leads to exploit kit
by Carol~ Moderator / February 17, 2014 4:37 AM PST

Evernote users are being actively targeted with an email spam campaign that tries to trick them into following a malicious link.

Sent from accounts@pcfa.co.in and titled "Image has been sent", the email pretends to be a notification from Evernote that alerts the user to an image he or she needs to check out, and which is apparently hosted on Evernote.

Unfortunately, that's not true. It leads the user to a malicious site that is believed to host the Angler exploit kit and which, upon a successful vulnerability exploitation, saddles him or her with malware.

Dynamoo's Blog's Conrad Longmore believes that the spam campaign in question has been mounted by the so-called RU:8080 gang, which has a history of similar spam runs impersonating legitimate Internet services such as Pinterest, Dropbox, etc.

http://www.net-security.org/malware_news.php?id=2710

Collapse -
Dear Asus router user: You've been pwned, thanks to ..
by Carol~ Moderator / February 17, 2014 5:54 AM PST
.. easily exploited flaw

"Hackers expose eight-month-old Asus weakness by leaving note on victims' drives." - [Screenshot]

An Ars reader by the name of Jerry got a nasty surprise as he was browsing the contents of his external hard drive over the weekend—a mysterious text file warning him that he had been hacked thanks to a critical vulnerability in the Asus router he used to access the drive from various locations on his local network.

"This is an automated message being sent out to everyone effected [sic]," the message, uploaded to his device without any login credentials, read. "Your Asus router (and your documents) can be accessed by anyone in the world with an Internet connection. You need to protect yourself and learn more by reading the following news article: http: //nullfluid.com/asusgate.txt."

It's likely that Jerry wasn't the only person to find the alarming message had been uploaded to a hard drive presumed to be off-limits to outsiders. Two weeks ago, a group posted almost 13,000 IP addresses its members said hosted similarly vulnerable Asus routers. They also published a torrent link containing more than 10,000 complete or partial lists of files stored on the Asus-connected hard drives.

Continued : http://arstechnica.com/security/2014/02/dear-asus-router-user-youve-been-pwned-thanks-to-easily-exploited-flaw/
Collapse -
Hiding in plain sight: a story about a sneaky banking Trojan
by Carol~ Moderator / February 17, 2014 5:54 AM PST

"Malwarebytes Unpacked" Blog:

The Zeus/Zbot Trojan is one the most notorious banking Trojans ever created; it's so popular it gave birth to many offshoots and copycats.

The particularity of Zeus is that it acts as a "man-in-the-browser" allowing cyber-crooks to collect personal information from its victims as well as to surreptitiously perform online transactions.

A new variant of this trojan, dubbed ZeusVM, is using images as a decoy to retrieve its configuration file, a vital piece for its proper operation.

French security researcher Xylitol noted something strange in one of the malvertising campaigns I reported a couple weeks ago.

Continued : http://blog.malwarebytes.org/security-threat/2014/02/hiding-in-plain-sight-a-story-about-a-sneaky-banking-trojan/

Collapse -
Mozilla's top exec defends in-Firefox ads, revenue search
by Carol~ Moderator / February 17, 2014 5:54 AM PST

The chairwoman of Mozilla Foundation, the non-profit that funds the development of Firefox, last week defended the decision to pursue in-browser ads, saying that it's important to generate revenue.

"To explicitly address the question of whether we care about generating revenue and sustaining Mozilla's work, the answer is yes," Mitchell Baker, former CEO of Mozilla Corp., the subsidiary responsible for Firefox, and now the chair of the parent foundation, wrote on a blog Thursday. "In fact, many of us feel responsible to do exactly this."

Baker was responding to questions and concerns raised earlier in the week after Mozilla announced "Directory Tiles," an under-development Firefox feature that would display sponsored thumbnails -- advertisements -- in the New Tabs page of new users of the browser.

Continued: http://www.computerworld.com/s/article/9246389/Mozilla_s_top_exec_defends_in_Firefox_ads_revenue_search

Popular Forums
icon
Computer Newbies 10,686 discussions
icon
Computer Help 54,365 discussions
icon
Laptops 21,181 discussions
icon
Networking & Wireless 16,313 discussions
icon
Phones 17,137 discussions
icon
Security 31,287 discussions
icon
TVs & Home Theaters 22,101 discussions
icon
Windows 7 8,164 discussions
icon
Windows 10 2,657 discussions

CNET FORUMS TOP DISCUSSION

Help, my PC with Windows 10 won't shut down properly

Since upgrading to Windows 10 my computer won't shut down properly. I use the menu button shutdown and the screen goes blank, but the system does not fully shut down. The only way to get it to shut down is to hold the physical power button down till it shuts down. Any suggestions?