Securityinform.com Blog

0

Record-breaking DDoS attacks fueled by IoT devices hit several companies

The Internet of Things (IoT) is an interconnected network of physical devices (vehicles, buildings, printers, televisions, coffee machines etc) that has an embedded electronics, software and capability of communication via internet. World is moving toward the era of IoT with increasing use of digital objects, from smart home to smart vehicle and smart industry. And increasing usage of IoT significantly increases the number of...

2,765 total views, no views today

0

New Android.Xiny trojan is able to steal banking information or intercept IM

The recent version of the Android.Xiny trojan is now able to steal confidential information (including credit card numbers, logins and passwords), transfer money to cybercriminal-owned bank accounts and intercept or send instant messages (IM) by infecting system processes. Android.Xiny trojan family got famous in January 2016 when ‘Doctor Web Anti-virus’ researchers detected [1] that Android.Xiny.19.origin trojan was incorporated into more than 60 games...

619 total views, no views today

0

Multiple DoS vulnerabilities found in OpenSSL, update needed

If you are using OpenSSL to secure your web servers, then you may have a security issue again. Because multiple vulnerabilities found [1,2]  in popular open-source cryptography library that may lead to crashing of target server remotely. And as a system administrator, you need to know that your servers using OpenSSL may remain vulnerable until you patch them. OpenSSL, which contains an...

1,225 total views, no views today

0

Mamba ransomware encrypts all disk partitions! How to protect your systems?

As you may already know, or experienced, ransomware is a type of dangerous malware that usually restricts access to critical files and documents stored on the computer system it infects. It encrypts the data on all local drives, removable drives, and mapped network drives using a cipher (AES or RSA for example) with the private key stored only on the malware’s control servers and...

1,829 total views, no views today

0

Yahoo confirms 500 million accounts stolen. How to protect your account?

  Yahoo confirmed Thursday that at least 500 million user account information were stolen by hackers back in 2014. The stolen data includes names, email addresses, telephone numbers, dates of birth…. and much more worse is the stolen data also includes hashed passwords (the vast majority with bcrypt) and (in some cases) encrypted or unencrypted security questions and answers. But, according...

452 total views, no views today

0

859.000 Cisco devices affected by critical zero-day vulnerability

If you have one of the Cisco products running Cisco IOS software releases listed below and you are using LAN-to-LAN VPN, Remote access VPN (excluding SSLVPN), Dynamic Multipoint VPN (DMVPN) or Group Domain of Interpretation (GDOI), then you may have a security issue. The VPN types above and the vast majority of IPsec VPNs use IKE for key exchange. Internet key...

628 total views, no views today

0

Security concerns increasing over car hacking, Volkswagen starts an automotive cyber security company

In July 2015, Fiat Chrysler Automobiles (FCA) issued a recall for 1.4 million vehicles (including 2014-2015 Jeep Grand Cherokee and Cherokee SUVs, 2015 Dodge Challenger sports coupes and other models) in order to patch a software vulnerability which allowed security researchers to remotely hack vehicles and take control of significant functions (including brakes) using cellular connection while they were 10 miles away. The hack also shocked...

538 total views, no views today

0

Research revealed that deleted WhatsApp messages aren’t actually deleted!

An iOS security expert discovered that your WhatsApp messages aren’t actually deleted even you try to delete them by selecting ‘Clear All Chats’ option.  The same issue also exists on Apple’s popular instant messaging service called iMessage. Jonathan Zdziarski’s research revealed that the latest version of WhatsApp, the most popular cross-platform instant messaging client with some one billion users, leaves forensic...

688 total views, no views today

0

Windows weakness allows ‘UAC bypass’ attack and malicious DLL loading

Quick Summary: Two security researchers discovered an interesting method for bypassing one of the Windows operating system security features which allows attackers to run malicious DLL files on target system. They found a weakness in one of the Windows default scheduled tasks. Successful exploit of the weakness may lead to malware infection, information disclosure or even remote users gaining full control over...

744 total views, no views today

0

Malicious Pokémon GO application installs backdoor on your device

Remote access tools (RAT) are one of the most dangerous malware types. RAT provides attackers with full control over the victim’s system which allows them to remotely access files, private conversations, accounting data and other type of files on the victim’s device. Wrapping popular applications with remote access trojans/tools is one of the methods used by cyber criminals to infect and control victim’s device....

743 total views, no views today

0

Netgear D6000 and D3600 routers contain hard-coded cryptographic keys and are vulnerable to authentication bypass

If you have Netgear D6000 or D3600 router devices with 1.0.0.49 and prior firmware versions installed in your network environment, you should update your device to firmware version 1.0.0.59 which released by Netgear on Friday to patch two critical vulnerabilities. Successful exploitation of vulnerabilities by remote unauthenticated attacker may allow gaining administrator access to affected device, performing man-in-the-middle attack on victims network or...

1,590 total views, no views today

0

Critical XSS vulnerability found in popular WordPress forum plugin bbPress, update available

Imagine for a second that WordPress is a castle which you have to protect from attacks. At this point, every plugin you installed becomes a gate to your castle and you need to ensure the safety of these gates. A recently found vulnerability in popular WordPress forum plugin bbPress is an example of this situation which may affected some 300.000 websites, including wordpress.org support forum....

1,518 total views, no views today

0

Open redirect vulnerability in Cisco WebEx Meetings Server allows phishing attacks, update needed

Cisco WebEx Meetings Server is a virtualized conferencing solution which combines audio, video and web conferencing in a single solution. Cisco has released a security advisory describing an open redirect vulnerability in the Cisco WebEx Meetings Server (CWMS) web interface that allows an unauthenticated, remote attacker to redirect a user to a malicious web page and conduct phishing attacks. Improper input validation of the...

872 total views, no views today

0

Critical vulnerabilities allow remote disclosure of information in HP Data Protector, update needed

Sometimes companies use the same password or certificate private key in their software developments which usually makes the software (or the platform it runs on) vulnerable to critical attacks like man-in-the-middle (MITM). A recent vulnerability discovered in HP’s popular automated server backup and recovery software is the latest example of this situation. Hp Data Protector is automated backup & recovery software for single-server...

1,405 total views, no views today

0

Cisco fixed a critical vulnerability in UCS central software

Cisco Unified Computing System (UCS) is a data center server platform that consist of hardware, virtualization support, switching fabric and management software. And Cisco UCS Central software is a software for managing multiple Cisco UCS instances or domains and supports up to 10.000 Cisco UCS servers. Cisco has recently fixed a critical vulnerability in web framework of Cisco UCS Central Software which...

915 total views, no views today

0

11.5 million HTTPS servers are vulnerable to highly critical DROWN Attack

Security researchers have discovered a highly critical vulnerability which allows attackers to break the encryption on SSLv2 allowed servers such as websites or mail servers and steal sensitive information including passwords, credit card numbers, e-mails and instant messages. The critical vulnerability which affects HTTPS protocol and other services that rely on SSL and TLS, dubbed as “DROWN” (Decrypting RSA with Obsolete and Weakened eNcryption)...

1,891 total views, no views today

0

Patch your Cisco Firewall: Critical ASA vulnerability may allow attackers to obtain full control of the affected system

If you have one of the Cisco ASA firewall devices listed at the end of this page and you configured your firewall device to terminate IKEv1 or IKEv2 VPN connections such as LAN-to-LAN IPsec VPN, Remote access VPN using the IPsec VPN client, Layer 2 Tunneling Protocol (L2TP)-over-IPsec VPN connections or IKEv2 AnyConnect, it means that  your device is most likely...

932 total views, no views today

0

Critical OpenSSL flaw allows attackers to decrypt secure HTTPS traffic

OpenSSL is the widely used open-source library that provides cryptographic functionality (implementation of SSL, TLS) to applications. It is used in applications that need secure connections such as secure web servers. The OpenSSL project team has released an update to patch a critical vulnerability that allows an attacker to obtain the private encryption key and decrypt the secure traffic (HTTPS). A...

815 total views, no views today

0

Multiple critical vulnerabilities allow hackers to compromise Belkin N150 routers

Multiple critical vulnerabilities found in Belkin’s N150 home routers, including session hijacking, cross site request forgery, HTML/script injection and telnet default credential vulnerabilities. Details as follows; Built-in telnet server running on port 23 with default username and password allows an attacker to gain remote access to the router with root privileges. Which means an attacker can perform administrative functions, including viewing the...

889 total views, no views today

0

Chimera ransomware encrypts files and publishes sensitive data on the internet

The message states in German: “You are victim of the Chimera malware. Your private files are encrypted and can not be restored without a special key file. Some applications may not function properly.  Please transfer Bitcoins to the following address to get your unique key file…”   A new type of ransomware named “Chimera” has been discovered which is targeting companies...

1,937 total views, no views today