| 

Apple releases Java update with Flashback removal tool

  • Post author: Omid Farhang
  • Post published: April 13, 2012
  • Reading Time: 2 min
  • Word Count: 261 words

The H-Online: As expected, Apple has released an updated version of the Java implementation for its Mac OS X operating system that includes a removal tool for the Flashback trojan. According to the company, the update, labelled “Java for OS X 2012-003“, finds and removes the “most common variants” of the malware which had infected approximately 600,000 systems using flaws in the previous version of Java. Additionally, the new Java update for Mac OS X 10.7 Lion prevents Java applets from being automatically executed by disabling the Java web plugin by default. Users can re-enable the automatic execution of Java applets via the Java Preferences application (Applications ➀ Utilities ➀ Java Preferences). However, if the plugin detects that Java applets have not been run for “an extended period of time”, it will automatically disable applet support again. ...

Continue Reading Apple releases Java update with Flashback removal tool

Android malware poses as Angry Birds Space game

  • Post author: Omid Farhang
  • Post published: April 12, 2012
  • Reading Time: 1 min
  • Word Count: 203 words

Android malware authors have seized an opportunity to infect unsuspecting smartphone users with the launch of the latest addition to the immensely popular “Angry Birds” series of games. SophosLabs recently encountered malware-infected editions of the “Angry Birds Space” game which have been placed in unofficial Android app stores. The Trojan horse, which Sophos detects as Andr/KongFu-L, appears to be a fully-functional version of the popular smartphone game, but uses the GingerBreak exploit to gain root access to the device, and install malicious code. ...

Continue Reading Android malware poses as Angry Birds Space game

Security vulnerability in NVIDIA's proprietary Linux drivers fixed

  • Post author: Omid Farhang
  • Post published: April 12, 2012
  • Reading Time: 1 min
  • Word Count: 213 words

The H-Online: A new version of NVIDIA’s proprietary UNIX graphics drivers for Linux, Solaris and FreeBSD fixes a security vulnerability (CVE-2012-0946) that allowed attackers to read and write arbitrary system memory in order to, for example, obtain root privileges. To take advantage of the vulnerability, an attacker must have access permission for some device files – which, for systems with these drivers, is typically the case for users who can launch a graphical interface as 3D acceleration and some other features cannot be used otherwise. ...

Continue Reading Security vulnerability in NVIDIA's proprietary Linux drivers fixed

Microsoft and Adobe to address critical vulnerabilities on Patch Tuesday

  • Post author: Omid Farhang
  • Post published: April 7, 2012
  • Reading Time: 1 min
  • Word Count: 202 words

The H-Online: The Tuesday after the Easter weekend, 10 April, is set to be a busy one for system administrators as Microsoft and Adobe have sent out notifications that they will both be issuing fixes for critical vulnerabilities in their products. Microsoft’s April notification says there will be four critical advisories concerning Microsoft Windows, Internet Explorer, .NET Framework, Office, SQL Server, Microsoft Server and Developer tools, which all lead to remote code execution. A fifth remote code execution vulnerability in Office is marked as important, as is a sixth information disclosure issue in Microsoft’s Forefront United Access Gateway. The critical bulletins will affect all versions of Windows, from Windows XP SP3 to Windows Server 2008R2. One critical bulletin for Internet Explorer covers IE 6, 7, 8 and 9 ...

Continue Reading Microsoft and Adobe to address critical vulnerabilities on Patch Tuesday

Russian AV company claims 600,000 Macs infected by Flashback [Removal Manual]

  • Post author: Omid Farhang
  • Post published: April 6, 2012
  • Reading Time: 2 min
  • Word Count: 407 words

The H-Online: A Russian AV company, Dr. Web, says it has conducted research to determine the spread of the Flashback trojan on systems running Mac OS X and says that 550,000 systems are infected, mostly in the US and Canada. A later update raised that number to 600,000 and claimed 274 infected systems in Cupertino, California. Dr. Web says it employed a sinkhole technique to intercept the bot installed by the newest Flashback trojan, and directed the bots to its own servers where it could analyse the traffic. Each bot includes a unique ID of the machine it has infected in the query string it sends to the command and control server; it is these unique IDs that Dr. Web has used to calculate the infection count. According to its estimates, of the original 550,000 estimate, 56.6% of the systems were in the United States, 19.8% in Canada, 12.8% in the United Kingdom and 6.1% in Australia. ...

Continue Reading Russian AV company claims 600,000 Macs infected by Flashback [Removal Manual]

Google Chrome fixes seven high-risk vulnerabilities

  • Post author: Omid Farhang
  • Post published: April 6, 2012
  • Reading Time: 2 min
  • Word Count: 254 words

The H-Online: Google has announced updates to the Stable and Beta channels of their Chrome browser, fixing several bugs and twelve security vulnerabilities. Seven of the twelve security fixes were classed as high-risk problems and Google paid a total of $6000 to the researchers who discovered the bugs. The update also includes a new version of the bundled Flash Player. Adobe have revised the Flash Player advisory from the end of March to include fixes for a Chrome/Flash only pair of memory corruption issues listed as CVE-2012-0724 and CVE-2012-0725. Given that these issues only affect Chrome and Chrome manages its own update, it is unlikely that Adobe will be reissuing or updating the advisory or patches for other browsers and platforms. ...

Continue Reading Google Chrome fixes seven high-risk vulnerabilities

MasterCard and Visa payment processor compromised, up to 10 million cards stolen

  • Post author: Omid Farhang
  • Post published: March 31, 2012
  • Reading Time: 2 min
  • Word Count: 359 words

SophosLabs: Brian Krebs is reporting that MasterCard and Visa are warning member-banks of a payment processor breach that may impact more than 10,000,000 credit cards. It is important to note that MasterCard and Visa’s own networks were not involved in the attack, it appears to be related to payment processor Global Payments. Reuters is reporting that Global Payments stock was suspended for trading after falling more than 9% on the Nasdaq stock exchange. ...

Continue Reading MasterCard and Visa payment processor compromised, up to 10 million cards stolen

Google updates OAuth 2.0 Playground

  • Post author: Omid Farhang
  • Post published: March 31, 2012
  • Reading Time: 2 min
  • Word Count: 220 words

The H-Security: Google has added new features to its OAuth 2.0 Playground, which it launched last November. Developers can now switch to using client-side flow, and the system has added support for APIs that use OAuth 2.0 drafts 10 to 25. Google has also added a feature that makes it easy to see all available API operations supported by the user’s current access token. To make it easier to use the Playground for an extended amount of time, developers now have the ability to refresh their access tokens automatically, and clicking HTTP response links will now populate the request URI field. ...

Continue Reading Google updates OAuth 2.0 Playground

Sex Appeal Meter Scam and Execution Hoax Abound on Facebook

  • Post author: Omid Farhang
  • Post published: March 29, 2012
  • Reading Time: 2 min
  • Word Count: 409 words

Cross posted from GFI, Sunbelt Blog: There’s not a day when we don’t see a new scam or hoax—yes, even the old ones—being proliferated on Facebook. I’ve seen both today. Let’s take a quick look at each one, shall we? First off, the scam: The screenshot above is a post generated by the “Sexappeal Meter” app that have spread within the social network. Clicking the “How much Sexappeal you have” link, or sometimes a bit.ly shortened URL, leads users to a page where it requests for permission just like any normal app. Allowing the app access to user profile, however, leads to two succeeding survey scam pages and, eventually, to a page where one can download a browser toolbar. ...

Continue Reading Sex Appeal Meter Scam and Execution Hoax Abound on Facebook

Free Stuff on Social Networks Not Free

  • Post author: Omid Farhang
  • Post published: March 29, 2012
  • Reading Time: 4 min
  • Word Count: 717 words

Symantec Connect: In recent years, scammers have flocked towards social networking sites as they have grown and made it easier to access a large number of potential eyeballs to convert into dollars. Brands have found value in leveraging social media to know what their customers are talking about, so, naturally, scammers are doing the exact same thing. Free iPads and iPhones Every time Apple unveils a new iPad or iPhone, you can bet there are scammers out there trying to leverage the announcement for financial gain. In the days leading up to and after the announcement of the new third-generation iPad, Twitter users who tweet about the new tablet most likely will receive some targeted Twitter replies from scammers offering the new device for free: ...

Continue Reading Free Stuff on Social Networks Not Free