News aggregator

Hackers Planted Backdoor in Webmin, Popular Utility for Linux/Unix Servers

THN - 3 hours 54 min ago
Following the public disclosure of a critical zero-day vulnerability in Webmin last week, the project's maintainers today revealed that the flaw was not actually the result of a coding mistake made by the programmers. Instead, it was secretly planted by an unknown hacker who successfully managed to inject a backdoor at some point in its build infrastructure—that surprisingly persisted into

European Central Bank Shuts Down 'BIRD Portal' After Getting Hacked

THN - Fri, 16/08/2019 - 09:05
The European Central Bank (ECB) confirmed Thursday that it had been hit by a cyberattack that involved attackers injecting malware into one of its websites and potentially stealing contact information of its newsletter subscribers. Headquartered in Germany, the European Central Bank (ECB) is the central bank of the 19 European Union countries which have adopted the euro and is itself

Patches for 2 Severe LibreOffice Flaws Bypassed — Update to Patch Again

THN - Fri, 16/08/2019 - 06:19
If you are using LibreOffice, you need to update it once again. LibreOffice has released the latest version 6.2.6/6.3.0 of its open-source office software to address three new vulnerabilities that could allow attackers to bypass patches for two previously addressed vulnerabilities. LibreOffice is one of the most popular and open source alternatives to Microsoft Office suite and is available

Bluetana App Quickly Detects Hidden Bluetooth Card Skimmers at Gas Pumps

THN - Fri, 16/08/2019 - 04:49
In recent years, gas stations have become one of the favorite targets for thieves who are stealing customers' credit and debit card information by installing a Bluetooth-enabled payment card skimmers at gas stations across the nation. The media has also reported several recent crimes surrounding credit card skimmers, including: Gas pump skimmer found at a 7-Eleven in Pinellas County Credit

Kaspersky Antivirus Flaw Exposed Users to Cross-Site Tracking Online

THN - Thu, 15/08/2019 - 08:08
In this digital era, the success of almost every marketing, advertising, and analytics company drives through tracking users across the Internet to identify them and learn their interests to provide targeted ads. Most of these solutions rely on 3rd-party cookies, a cookie set on a domain other than the one you are browsing, which allows companies including Google and Facebook to fingerprint

New Bluetooth Vulnerability Lets Attackers Spy On Encrypted Connections

THN - Wed, 14/08/2019 - 13:47
Over a billion Bluetooth-enabled devices, including smartphones, laptops, smart IoT devices, and industrial devices, have been found vulnerable to a high severity vulnerability that could allow attackers to spy on data transmitted between the two devices. The vulnerability, assigned as CVE-2019-9506, resides in the way 'encryption key negotiation protocol' lets two Bluetooth BR/EDR devices

8 New HTTP/2 Implementation Flaws Expose Websites to DoS Attacks

THN - Wed, 14/08/2019 - 05:55
Various implementations of HTTP/2, the latest version of the HTTP network protocol, have been found vulnerable to multiple security vulnerabilities affecting the most popular web server software, including Apache, Microsoft's IIS, and NGINX. Launched in May 2015, HTTP/2 has been designed for better security and improved online experience by speeding up page loads. Today, over hundreds of

4 New BlueKeep-like 'Wormable' Windows Remote Desktop Flaws Discovered

THN - Tue, 13/08/2019 - 16:08
If you are using any supported version of the Windows operating system, stop everything and install the latest security updates from Microsoft immediately. Windows operating system contains four new critical wormable, remote code execution vulnerabilities in Remote Desktop Services, similar to the recently patched 'BlueKeep' RDP vulnerability. Discovered by Microsoft's security team itself, all

Google Discloses 20-Year-Old Unpatched Flaw Affecting All Versions of Windows

THN - Tue, 13/08/2019 - 13:37
A Google security researcher has just disclosed details of a 20-year-old unpatched high-severity vulnerability affecting all versions of Microsoft Windows, back from Windows XP to the latest Windows 10. The vulnerability resides in the way MSCTF clients and server communicate with each other, allowing even a low privileged or a sandboxed application to read and write data to a higher

Cerberus: A New Android 'Banking Malware For Rent' Emerges

THN - Tue, 13/08/2019 - 09:19
After a few popular Android Trojans like Anubis, Red Alert 2.0, GM bot, and Exobot, quit their malware-as-a-service businesses, a new player has emerged on the Internet with similar capabilities to fill the gap, offering Android bot rental service to the masses. Dubbed "Cerberus," the new remote access Trojan allows remote attackers to take total control over the infected Android devices and

Let Experts Do Their Job – Managed WAF by Indusface

THN - Tue, 13/08/2019 - 05:54
WAF (Web Application Firewall) has been the first line of defence when it comes to application security for a while now. Many organizations have adopted WAF in one form or the other and most cases, compliance has been the driver for adoption. But unfortunately, when it comes to the efficacy of WAF in thwarting attacks, it has not lived up to the expectations. In most organizations, WAF has

Epic Games Hit With Class Action Lawsuit Over Hacked 'Fortnite' Accounts

THN - Tue, 13/08/2019 - 04:57
Epic Games, the creator of the popular 'Fortnite' video game, is facing a class-action lawsuit from gamers over hacked Fortnite accounts, accusing the company of failing to maintain adequate security measures and notify users of the security breach in a timely manner. The lawsuit, filed by 'Franklin D. Azar and Associates' in the United States District Court in North Carolina on behalf of

Android Users Can Now Log in to Google Services Using Fingerprint

THN - Mon, 12/08/2019 - 14:25
If you're using Chrome on Android, you can now sign-in to your Google account and some of the other Google services by simply using your fingerprint, instead of typing in your password every time. Google is rolling out a new feature, called "local user verification," that allows you to log in to both native applications and web services by registering your fingerprint or any other method

Price Dropped: Get Lifetime Access to Cisco Certification Courses 2019

THN - Mon, 12/08/2019 - 09:35
With the migration of governments and enterprises towards controller-based architectures, the role of a core network engineer has become more important than ever. Today, majority of interconnected wide area networks (WANs) and local area networks (LANs) in the world run on Cisco routers and other Cisco networking equipment, and therefore most organizations need network engineers to maintain

Canon DSLR Cameras Can Be Hacked With Ransomware Remotely

THN - Mon, 12/08/2019 - 05:25
The threat of ransomware is becoming more prevalent and severe as attackers' focus has now moved beyond computers to smartphones and other Internet-connected smart devices. In its latest research, security researchers at cybersecurity firm CheckPoint demonstrated how easy it is for hackers to remotely infect a digital DSLR camera with ransomware and hold private photos and videos hostage

Over 40 Drivers Could Let Hackers Install Persistent Backdoor On Windows PCs

THN - Sun, 11/08/2019 - 08:45
If you own a device, or a hardware component, manufactured by ASUS, Toshiba, Intel, NVIDIA, Huawei, or other 15 other vendors listed below, you're probably screwed. A team of security researchers has discovered high-risk security vulnerabilities in more than 40 drivers from at least 20 different vendors that could allow attackers to gain most privileged permission on the system and hide malware

Apple will now pay hackers up to $1 million for reporting vulnerabilities

THN - Fri, 09/08/2019 - 04:54
Apple has just updated the rules of its bug bounty program by announcing a few major changes during a briefing at the annual Black Hat security conference yesterday. One of the most attractive updates is… Apple has enormously increased the maximum reward for its bug bounty program from $200,000 to $1 million—that's by far the biggest bug bounty offered by any major tech company for reporting

Facebook Sues Two Android App Developers for Click Injection Fraud

THN - Thu, 08/08/2019 - 07:27
Facebook has filed a lawsuit against two shady Android app developers accused of making illegal money by hijacking users' smartphones to fraudulently click on Facebook ads. According to Facebook, Hong Kong-based 'LionMobi' and Singapore-based 'JediMobi' app developers were distributing malicious Android apps via the official Google Play Store that exploit a technique known as "click injection

Reverse RDP Attack Also Enables Guest-to-Host Escape in Microsoft Hyper-V

THN - Wed, 07/08/2019 - 20:11
Remember the reverse RDP attack? Earlier this year, researchers disclosed clipboard hijacking and path-traversal issues in Microsoft's Windows built-in RDP client that could allow a malicious RDP server to compromise a client computer, reversely. (You can find details and a video demonstration for this security vulnerability, along with dozens of critical flaws in other third-party RDP

Binance KYC Data Leak — Crypto Exchange Sets $290,000 Bounty On Blackmailer

THN - Wed, 07/08/2019 - 08:14
Malta-based cryptocurrency exchange Binance has become a victim of a ransom demand from a scammer who claimed to have hacked the KYC (Know Your Customer) data of thousands of its customers. The unknown attacker threatened the world's largest cryptocurrency exchange by volume to release KYC information of 10,000 users if the company did not pay 300 Bitcoins—that's equivalent to almost $3.5

Pages

Subscribe to Shiga Tecnologia aggregator