| 

Mozilla closes critical security hole in Firefox, Thunderbird and SeaMonkey

  • Post author: Omid Farhang
  • Post published: February 13, 2012
  • Reading Time: 1 min
  • Word Count: 152 words

The H-Online: Mozilla has released Firefox 10.0.1, Firefox ESR 10.0.1, Thunderbird 10.0.1, Thunderbird ESR 10.0.1 and SeaMonkey 2.7.1 to fix a single critical security hole in the browsers and mail clients which appeared in version 10. The security advisory says that versions previous to Firefox 10, Thunderbird 10 and SeaMonkey 2.7 are unaffected by the use after free problem. The problem was discovered by Mozilla developers and causes a “potentially exploitable” crash in nsXBLDocumentInfo::ReadPrototypeBindings. Updates are available through Firefox, Thunderbird and SeaMonkey’s automatic update system and can be made to install by bringing up the “About” dialogue for the relevant application and selecting the “Apply Upgrade” button when it appears. Firefox and Thunderbird 10 were released at the end of January. ...

Continue Reading Mozilla closes critical security hole in Firefox, Thunderbird and SeaMonkey

No further updates for Debian 5.0 Lenny

  • Post author: Omid Farhang
  • Post published: February 10, 2012
  • Reading Time: 1 min
  • Word Count: 128 words

The H-Online: The Debian developers have pointed out, in an announcement on the debian-announce mailing list, that – three years after it was released –Debian GNU/Linux 5.0 (Lenny) has reached its “End of Life”. Debian GNU/Linux 5.0 was originally released in February 2009 and on 6 February 2012, the developers stopped providing security updates for that version of the distribution. Users have now had a year to update their systems to Lenny’s successor, Squeeze, which was released on 6 February 2011. The Debian developers recommend that any installations that are still using Debian 5.0 should be updated to version 6 of the distribution immediately. The Debian community recently released version 6.0.4 of Debian Squeeze which includes all the updates that have been released for Squeeze since its release. ...

Continue Reading No further updates for Debian 5.0 Lenny

Is Digital Pearl Harbor THE most tasteless term in IT security?

  • Post author: Omid Farhang
  • Post published: February 10, 2012
  • Reading Time: 3 min
  • Word Count: 593 words

SophosLabs: Can hackers really cause as much bloodshed as 353 Imperial Japanese Navy fighters, bombers and torpedo planes launched from six aircraft carriers? Can hackers really kill 2,402 U.S. citizens, leave 1,282 wounded, lose 65 of their own attackers in the process, and plunge the United States into a World War? Heaven only knows. Maybe they can. The lack of security around Supervisory Control And Data Acquisition (SCADA) systems is scary. ...

Continue Reading Is Digital Pearl Harbor THE most tasteless term in IT security?

Hackers fail to extort $50,000 from Symantec, as pcAnywhere source code is published

  • Post author: Omid Farhang
  • Post published: February 8, 2012
  • Reading Time: 2 min
  • Word Count: 378 words

SophosLabs: Symantec has confirmed that a file made available on the internet for anyone to download, does contain the source code for an old version of its pcAnywhere product. For a short while last month, before releasing a patch, Symantec advised customers to disable their pcAnywhere installations because of concern that hackers could exploit vulnerabilities. In addition, the firm says that in January someone claiming to be the hacker responsible for the data theft tried to extort $50,000 from the firm in exchange for not releasing Symantec’s stolen source code. ...

Continue Reading Hackers fail to extort $50,000 from Symantec, as pcAnywhere source code is published

Phishers Bank on Tax Season

  • Post author: Omid Farhang
  • Post published: February 8, 2012
  • Reading Time: 2 min
  • Word Count: 364 words

Sunbelt: With the U.S. currently in tax season, online criminals have, once again, sought to take advantage of this. Robert Stetson, one of Sunbelt’s malware researchers, spotted a phishing email posing as Intuit Inc., a company that “develops financial and tax preparation software”. They developed Quicken and TurboTax. Below is a screenshot of the said email: Email details are as follows: Subject: Please verify your tax information ASAP. Message body: Good afternoon, ...

Continue Reading Phishers Bank on Tax Season

Satellite phone encryption cracked

  • Post author: Omid Farhang
  • Post published: February 8, 2012
  • Reading Time: 1 min
  • Word Count: 174 words

H-Online: Researchers at Ruhr-UniversitÀt Bochum in Germany have announced that they have cracked the A5-GMR-1 and A5-GMR-2 encryption algorithms used in satellite phones. Satellite phones are mainly used in areas with insufficient mobile network coverage and in the maritime sector. The researchers obtained the proprietary, and previously undocumented, algorithms by reverse engineering phone firmware updates. Ideally this, in itself, should not compromise the security of the transmitted data. Data security should not depend on the secrecy of the encryption methods, it should only depend on the non-disclosure of the secret key that is being used. ...

Continue Reading Satellite phone encryption cracked

Attackers taking aim at retail and food chains

  • Post author: Omid Farhang
  • Post published: February 7, 2012
  • Reading Time: 2 min
  • Word Count: 376 words

v3.co.uk: The uniform infrastructure and predictable behaviors are making corporate retail and restaurant chains the choice targets for cybercriminals. A report from security firm Trustwave found that attackers favor companies with chains of outlets, such as those commonly found in the food and retail industries, when launching targeted attacks. The attackers like the uniform IT infrastructure that large chains deploy at individual sites, Nicholas Percoco, head of the Trustwave’s SpiderLabs team, told V3. ...

Continue Reading Attackers taking aim at retail and food chains

Adobe releases beta version of sandboxed Flash for Firefox

  • Post author: Omid Farhang
  • Post published: February 7, 2012
  • Reading Time: 2 min
  • Word Count: 256 words

The H-Online: Adobe has released a public beta of a sandboxed version of its Flash plugin for Firefox in an effort to improve its security. The new “Protected Mode” for Flash, which has been in development for at least a year according to Adobe engineer Peleus Uhley, runs with restricted privileges and, to further limit its access to the system, can only access system resources through a broker. This should help intercept attackers trying to gain access to a system through malicious Flash files. ...

Continue Reading Adobe releases beta version of sandboxed Flash for Firefox

RealPlayer update closes critical holes

  • Post author: Omid Farhang
  • Post published: February 7, 2012
  • Reading Time: 1 min
  • Word Count: 195 words

The H-Online: RealNetworks has released an update to RealPlayer to close a number of holes in its media player application. Version 15.02.71 of RealPlayer addresses a total of seven remote code execution vulnerabilities, rated as highly critical by Secunia, which could be exploited by an attacker to compromise a victim’s system. These include errors when processing RMFF Flags, VIDOBJ_START_CODE and RealAudio coded_frame_size, as well as RV10 Encoded Height/Width, RV20 Frame Size Array and RV40 content. A remote code execution problem in Atrac Sample Decoding has also been fixed but is not found in the 15.x.x branch of the media player; this issue affects Mac RealPlayer 12.0.0.1701 but is reportedly not found in version 12.0.0.1703. ...

Continue Reading RealPlayer update closes critical holes

Joomla! updates close information disclosure holes

  • Post author: Omid Farhang
  • Post published: February 6, 2012
  • Reading Time: 1 min
  • Word Count: 191 words

The H-Online: Versions 1.7.5 and 2.5.1 of the open source Joomla! content management system (CMS) have been released to address two information disclosure vulnerabilities. These include one medium severity problem in Joomla! 1.7.x that could allow an unauthorized user to gain access to the error log stored on a victim’s server, and, in both versions, an inadequate validation problem that could be exploited to gain access to private data. The update to Joomla! 2.5, which arrived last month, also fixes 30 bugs, including one that caused batch processing to break. ...

Continue Reading Joomla! updates close information disclosure holes