HolidayBuyer's Guide

Spyware, Viruses, & Security forum

Alert

NEWS - March 13, 2015

by Carol~ Forum moderator / March 13, 2015 2:14 AM PDT
Epic Google snafu leaks hidden whois data for 280,000 domains

Google Apps has leaked hidden names, phone numbers, and more since mid-2013. - [Screenshot]

Google leaked the complete hidden whois data attached to more than 282,000 domains registered through the company's Google Apps for Work service, a breach that could bite good and bad guys alike.

The 282,867 domains counted by Cisco Systems' researchers account for 94 percent of the addresses Google Apps has registered through a partnership with registrar eNom. Among the services is one that charges an additional $6 per year to shield from public view all personal information included in domain name whois records. Rather than being published publicly, the information is promised to remain in the hands of eNom except when it receives a court order to turn it over.

Continued : http://arstechnica.com/security/2015/03/epic-google-snafu-leaks-hidden-whois-data-for-280000-domains/

Related:
Google Apps Bug Exposed Registration Data for 280,000 Domains
Google Apps 'Defect' Leaks Private WHOIS Data Of 280,000
Google Leaks Whois Data for Over 282,000 Protected Domains
Discussion is locked
You are posting a reply to: NEWS - March 13, 2015
The posting of advertisements, profanity, or personal attacks is prohibited. Please refer to our CNET Forums policies for details. All submitted content is subject to our Terms of Use.
Track this discussion and email me when there are updates

If you're asking for technical help, please be sure to include all your system info, including operating system, model number, and any other specifics related to the problem. Also please exercise your best judgment when posting in the forums--revealing personal information such as your e-mail address, telephone number, and address is not recommended.

You are reporting the following post: NEWS - March 13, 2015
This post has been flagged and will be reviewed by our staff. Thank you for helping us maintain CNET's great community.
Sorry, there was a problem flagging this post. Please try again now or at a later time.
If you believe this post is offensive or violates the CNET Forums' Usage policies, you can report it below (this will not automatically remove the post). Once reported, our moderators will be notified and the post will be reviewed.
Collapse -
Achievement Locked: New Crypto-Ransomware Pwns Video Gamers
by Carol~ Forum moderator / March 13, 2015 3:00 AM PDT
In reply to: NEWS - March 13, 2015

The Bromium Labs blog:

Gamers may be used to paying to unlock downloadable content in their favorite games, but a new crypto-ransomware variant aims to make gamers pay to unlock what they already own. Data files for more than 20 games can be affected by the threat, increasing what is already a large target for cybercriminals. Another file type that hasn't been targeted before is iTunes related. But first, let's have a look at the initial infection.

This crypto-ransomware variant has been getting distributed from a compromised web site that was redirecting the visitors to the Angler exploit kit by using a Flash clip. Bromium Labs notified the owner of the web site, but they haven't responded. At the time of writing this blog, the website was still serving malware. The web site is based on WordPress and could have been compromised by any one of the numerous WP exploits. Additionally, the URL where the malicious Flash file is hosted keeps changing.

Continued : http://labs.bromium.com/2015/03/12/achievement-locked-new-crypto-ransomware-pwns-video-gamers/

Related:
New crypto-ransomware encrypts video games files
CryptoLocker look-alike searches for and encrypts PC game files
CryptoLocker Variant Coming After Gamers

Collapse -
Facebook worm spreads by leveraging cloud services
by Carol~ Forum moderator / March 13, 2015 3:00 AM PDT
In reply to: NEWS - March 13, 2015

Facebook users are in danger of having their computers turned in a bot by a worm that spreads via the social network.

The worm, identified as belonging to the Kilim malware family, ends on the victims' computer after a series of links and redirection. According to Malwarebytes researcher Jerome Segura, it all starts with a message on Facebook linking to scandalous sex photos of teenagers.

The shortened ow. ly link leads to another one, which leads to an Amazon Web Services (AWS) page, which leads to a malicious site (videomasars.healthcare), which checks whether the victim is using a computer or mobile phone. If it's the latter, they are redirected to affiliate pages for various offers.

Continued : http://www.net-security.org/malware_news.php?id=2990

Related : Facebook Worm Lures with Promise of Smut Content, Delivered via Box Cloud Storage

Collapse -
SQL Injection Bug Fixed in Popular WordPress SEO Plug-In
by Carol~ Forum moderator / March 13, 2015 4:28 AM PDT
In reply to: NEWS - March 13, 2015

SEO by Yoast, a popular search engine optimization plug-in for WordPress, has fixed a pair of blind SQL injection vulnerabilities that could have allowed an attacker to take complete control of affected sites.

It's not clear how many WordPress sites have SEO by Yoast installed, but the maker of the popular plugin claims it has been downloaded more than 14 million times.

Vulnerable versions of the service are susceptible to arbitrarily executed SQL queries, in part because it lacks proper cross-site request forgery protections. If the attacker were able to trick an authenticated administrator, editor or author into following a link to a malicious page, the attacker could then create an admin role for himself and totally compromise affected sites.

Continued: https://threatpost.com/sql-injection-bug-fixed-in-popular-wordpress-seo-plug-in/111601

Related: Critical hole in popular WordPress SEO plugin allows SQLi, site hijacking

Collapse -
Adobe Flash Update Plugs 11 Security Holes
by Carol~ Forum moderator / March 13, 2015 4:28 AM PDT
In reply to: NEWS - March 13, 2015
Adobe has released an update for its Flash Player software that fixes at least 11 separate, critical security vulnerabilities in the program. If you have Flash installed, please take a moment to ensure your systems are updated.

Not sure whether your browser has Flash installed or what version it may be running? Browse to this link. The newest, patched version is 17.0.0.134 for Windows and Mac users. Adobe Flash Player installed with Google Chrome, as well as Internet Explorer on Windows 8.x, should automatically update to version 17.0.0.134.

The most recent versions of Flash should be available from the Flash home page, but beware potentially unwanted add-ons, like McAfee Security Scan. To avoid this, uncheck the pre-checked box before downloading, or grab your OS-specific Flash download from here. Windows users who browse the Web with anything other than Internet Explorer may need to apply this patch twice, once with IE and again using the alternative browser (Firefox, Opera, e.g.).

Continued : http://krebsonsecurity.com/2015/03/adobe-flash-update-plugs-11-security-holes/

See : Security Updates for Adobe Flash Player (APSB15-05)
Popular Forums
icon
Computer Newbies 10,686 discussions
icon
Computer Help 54,365 discussions
icon
Laptops 21,181 discussions
icon
Networking & Wireless 16,313 discussions
icon
Phones 17,137 discussions
icon
Security 31,287 discussions
icon
TVs & Home Theaters 22,101 discussions
icon
Windows 7 8,164 discussions
icon
Windows 10 2,657 discussions

The Samsung RF23M8090SG

One of the best French door fridges we've tested

A good-looking fridge with useful features like an auto-filling water pitcher and a temperature-adjustable "FlexZone" drawer. It was a near-flawless performer in our cooling tests.