Spyware, Viruses, & Security forum

Alert

NEWS - November 07, 2014

by Carol~ Moderator / November 7, 2014 12:58 AM PST
Home Depot: Hackers Stole 53M Email Addreses

As if the credit card breach at Home Depot didn't already look enough like the Target breach: Home Depot said yesterday that the hackers who stole 56 million customer credit and debit card accounts also made off with 53 million customer email addresses.

In an update (PDF) released to its site on Thursday, Home Depot warned customers about the potential for thieves to use the email addresses in phishing attacks (think a Home Depot "survey" that offers a gift card for the first 10,000 people who open the booby-trapped attachment, for example). Home Depot stressed that the files containing the stolen email addresses did not contain passwords, payment card information or other sensitive personal information.

Continued: http://krebsonsecurity.com/2014/11/home-depot-hackers-stole-53m-email-addreses/

Related:
Home Depot confirms 53 million email addresses stolen in massive hack
Home Depot Breached Via Vendor Credentials; 53 Million Email Addresses Also Stolen
Home Depot says hackers got access via vendor, also stole 53 million customer email addresses
Discussion is locked
You are posting a reply to: NEWS - November 07, 2014
The posting of advertisements, profanity, or personal attacks is prohibited. Please refer to our CNET Forums policies for details. All submitted content is subject to our Terms of Use.
Track this discussion and email me when there are updates

If you're asking for technical help, please be sure to include all your system info, including operating system, model number, and any other specifics related to the problem. Also please exercise your best judgment when posting in the forums--revealing personal information such as your e-mail address, telephone number, and address is not recommended.

You are reporting the following post: NEWS - November 07, 2014
This post has been flagged and will be reviewed by our staff. Thank you for helping us maintain CNET's great community.
Sorry, there was a problem flagging this post. Please try again now or at a later time.
If you believe this post is offensive or violates the CNET Forums' Usage policies, you can report it below (this will not automatically remove the post). Once reported, our moderators will be notified and the post will be reviewed.
Collapse -
The iPhone WireLurker malware: What you need to know
by Carol~ Moderator / November 7, 2014 2:44 AM PST

There's a scary new piece of malware that collects call logs, phonebook contacts and other sensitive information from Apple iPhones and iPads. Should you be worried?

The malware was first discovered by researchers at Palo Alto Networks who dubbed it WireLurker and said it exhibited behavior that had never been seen before in malicious software targeting Apple's platforms.

Once infected, the malware appears to collect data from the user but, to date, no other malicious activity has been discovered, said Palo Alto Networks.

For hundreds of millions of Apple iOS users, malware is a scary prospect. The platform has seen so few attacks that many users don't run antivirus software.

Continued : http://www.computerworld.com/article/2844700/the-iphone-wirelurker-malware-what-you-need-to-know.html

Collapse -
Staying Safe from Wirelurker: the Combined Mac/iOS Threat
by Carol~ Moderator / November 7, 2014 3:11 AM PST

TrendLabs Security Intelligence Blog:

The newly discovered Wirelurker malware affecting both OS X and iOS devices has been covered extensively in the media. While this is a significant incident, some of the coverage appears to have been exaggerated, and might lead users to unnecessary panic. Several points would be useful in helping calm down the worst fears of users and distilling what we need to learn from all this.

First of all, Wirelurker is currently not an active threat. Known variants have already been blocked by OS X, and the command-and-control servers are offline as well. This significantly reduces the threat that this malware poses to users. The stolen certificate that enabled this attack has also been revoked by Apple, mitigating the most novel aspect of this threat (pushing apps onto non-jailbroken devices).

Continued : http://blog.trendmicro.com/trendlabs-security-intelligence/staying-safe-from-wirelurker-the-combined-macios-threat/

Collapse -
Belkin flings out patch after Metasploit module turns ..
by Carol~ Moderator / November 7, 2014 2:56 AM PST
... guests to admins

"Open guest networks turned on by default"

Belkin has patched a vulnerability in a dual band router that allowed attackers on guest networks to gain root access using an automated tool.

The flaw reported overnight targeted the Belkin N750 dual-band router - which was launched in 2011 and is still sold by the company and other commerce sites.

IntegrityPT consultant Marco Vaz published a Metasploit module allowing guests to attack vulnerable routers.

"A vulnerability in the guest network web interface of the [router] allows an unauthenticated remote attacker to gain root access to the operating system of the affected device," Vaz said.

Continued : http://www.theregister.co.uk/2014/11/07/belkin_flings_patch_after_metasploit_module_turns_guests_to_admins/
Collapse -
Linksys Patches (Most) Routers Running SMART Wi-Fi Firmware
by Carol~ Moderator / November 7, 2014 2:56 AM PST

Two versions of popular consumer and small office Linksys routers remain vulnerable to a pair of vulnerabilities recently patched in other models of the Belkin-owned networking gear.

Linksys EA2700 and EA3500 routers running Linksys SMART Wi-Fi firmware have yet to be patched against vulnerabilities that put user credentials at risk, thus allowing outside access to the router.

Researcher Kyle Lovett reported the vulnerabilities in July; Linksys patched the bugs on Oct. 23 in E4200v2, EA4500, EA6200, EA6300, EA6400, EA6500, EA6700, and EA6900 models. Public exploits for the vulnerabilities in the EA3500 and EA6500 models were available on a Turkish hacker site in mid-September.

Continued: http://threatpost.com/linksys-patches-most-routers-running-smart-wi-fi-firmware/109146

Related: Linksys SOHO router owners urged to patch multiple vulnerabilities

Collapse -
Android Browser: Metasploit Module Released for New UXSS
by Carol~ Moderator / November 7, 2014 2:57 AM PST
.. Vulnerability

A universal cross-site scripting (UXSS) vulnerability has been identified in the Android browser that's installed by default on many Android smartphones, researchers reported on Thursday.

The flaw was identified and reported to Google by Pakistani security researcher Rafay Baloch. The expert coordinated the disclosure of the bug with the security firm Rapid7, which released a Metasploit module for it.

The vulnerability, which affects the WebView component, occurs "when replacing the 'data' attribute of a given HTML object with a JavaScript URL scheme," explained Tod Beardsley, technical lead for the Metasploit framework.

Continued: http://www.securityweek.com/metasploit-module-released-new-uxss-vulnerability-android-browser
Collapse -
One in three Americans don't use basic malware protection
by Carol~ Moderator / November 7, 2014 2:57 AM PST

One in three US-based computer users don't use an antivirus solution, according to a survey carried by Bitdefender in September. Only 67.3 percent of respondents are protected by an antivirus solution.

The study also finds that young females (aged 18 to 29) are the least interested in securing their computers or smart devices. In contrast, adult male computer users (aged 30 to 44) are extremely concerned about their online security and complement their antivirus solution with extra technologies such as a VPN or data backup.

The number of malware incidents reported by the interviewed subjects reflects the poor state of security on their devices - 46.9 percent said their home devices have been infected with malware, while 7 percent encountered malware infections at work. 19.2 percent of the study respondents don't know if their devices have ever been infected.

Continued: http://www.net-security.org/malware_news.php?id=2910

Collapse -
Not Just Silk Road 2: Feds Seize Two Other Drug Markets ..
by Carol~ Moderator / November 7, 2014 5:53 AM PST
.. and Counting

A full-blown dark web drug crackdown is in the works, and it's not stopping with the Silk Road.

On Thursday the FBI along with other law enforcement agencies including the Department of Homeland Security and Europol announced that it had seized the Silk Road 2, perhaps the most well-known drug market to appear on the Dark Web since the takedown of the original Silk Road last year.

What it didn't announce is that at least two other drug market sites have also been busted, and more takedowns are likely coming. The drug markets Hydra and Cloud 9 now both display the same "This Hidden Site Has Been Seized" notices as the Silk Road 2, emblazoned with the logos of the FBI and Europol. Several other popular dark net markets were down Thursday morning, as well, though they didn't display that banner. An FBI spokesperson tells WIRED that there will be more than three market seizures in total, with the full extent of the operation set to be revealed by Friday.

Continued : http://www.wired.com/2014/11/dark-web-seizures/
Popular Forums
icon
Computer Newbies 10,686 discussions
icon
Computer Help 54,365 discussions
icon
Laptops 21,181 discussions
icon
Networking & Wireless 16,313 discussions
icon
Phones 17,137 discussions
icon
Security 31,287 discussions
icon
TVs & Home Theaters 22,101 discussions
icon
Windows 7 8,164 discussions
icon
Windows 10 2,657 discussions

FALL TV PREMIERES

Your favorite shows are back!

Don’t miss your dramas, sitcoms and reality shows. Find out when and where they’re airing!