Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Submission + - APT Espinonage Campaign Hit 3 US Oil Companies (threatpost.com) 1

msm1267 writes: The Icefog cyberespionage malware campaign uncovered last September was originally thought to be limited to the military supply chain, primarily in Japan and South Korea. But new details emerged today that a Java-based version of the malware exists and infected three US-based oil and gas companies. All three have been notified; two have removed the infections so far.

Submission + - Mobile Banking Apps for iOS Woefully Insecure (threatpost.com)

msm1267 writes: Mobile banking applications fall short on their use of encryption, validation of digital certificates and two-factor authentication, putting financial transactions at risk worldwide. An examination of 40 iOS mobile banking apps from 60 leading banks worldwide revealed a slew of security shortcomings that also included hard-coded development credentials discovered during a static analysis of app binaries. It's a mess, and to date, most of the banks have been informed and none of provided feedback indicating the vulnerabilities were patched.

Submission + - We Will See Malware Attacks on Internet-Connected Cars, Expert Warns (ibtimes.co.uk)

An anonymous reader writes: The threat to internet-connected cars is no different to that of web browsers — only with much more serious consequences, warns API and data security expert.

Never had the worlds of motoring and technology been closer than when car manufacturers used the Consumer Electronics Show to announce a whole range of smart car features tapping into the Internet of Things, but rampant development could see major security concerns overlooked.

Speaking to IBTimes UK, Mark O'Neill, vice president of innovation at software company Axway, said: "I think we are going to see more malicious attacks [on connected vehicles]. If someone finds a vulnerability in an internet-enabled car you could have the same situation that you have now for browsers."

Submission + - Target Ups Breach Victim Total To 70 Million (networkworld.com)

netbuzz writes: Target this morning issued an update regarding its recent catastrophic data breach that increases the number of customers victimized from 40 million to 70 million. The company also reported that even more information had been stolen than previously believed. In addition, and not surprisingly, Target told the investment world that sales are down this quarter.

Submission + - Scammers Intercept E-Mail in Targeted Attacks (sans.edu)

UnderAttack writes: In the old days, financial fraud usually relied on banking malware like Zeus. But as organizations become more aware of these threats, scammers bypass all the fancy anti-malware tools by going straight to the person with the money. In this case document by the Internet Storm Center, a scammer was able to view/intercept an e-mail exchange about a payment, and slipped in a note requesting the account number for the payment to be updated. These scams become more common as miscreants look for new ways to a get to a companies money

Submission + - The 47 dumbest moments of 2013 (time.com)

harrymcc writes: Over at TIME.com, I rounded up the year's dumbest moments in technology. Yes, the launch of Healthcare.gov is included, as are Edward Snowden's revelations. But so are a bunch of people embarrassing themselves on Twitter, both BlackBerry and Lenovo hiring celebrities to (supposedly) design products, the release of glitchy products ranging from OS X 10.9 Mavericks to the new Yahoo Mail, and much more.

Submission + - Windows Crash Reports Unecrypted and Unencumbered (threatpost.com)

msm1267 writes: The NSA uses its XKeyscore spying tool to find Windows Error Reporting crash reports, which are sent in the clear to Microsoft. The information is used to fingerprint machines for compromise, and is a treasure trove of system and application data for not only the spy agency, but for hackers as well who may have compromised an upstream proxy or ISP.
The best countermeasure, since the feature is on by default post-Windows XP, is a change to a Group Policy setting that forces that initial transmission to be encrypted. However, 80 percent of the billion-plus Windows machines on the plant, participate in the program and send this sensitive data in the clear.

Submission + - The Shadowy Darknet will be the Only Truly World-wide Web (ibtimes.co.uk)

DavidGilbert99 writes: “The shadowy Darknet then will be the only truly world-wide web” — this is the view of Alexander Gostev, chief security expert at Kaspersky Lab who believes the fallout from Edward Snowden's leaks may lead at some point to the "collapse of the current Internet, which will break into dozens of national networks."

Submission + - EBay Vulnerable to Account Hijacking via XSRF (threatpost.com)

msm1267 writes: eBay users remain vulnerable to account hijacking nearly five months after it was initially informed of a cross-site request forgery flaw by a U.K. security researcher. Ebay has three times communicated to the researcher that the code causing the XSRF situation has been fixed, but it still remains vulnerable to his exploit.

The attack allows a hacker who lures a victim to a website hosting the exploit to change the user's contact information necessary to perform a password reset. The hacker eventually is able to log in as the victim and make purchases on their behalf.

Submission + - The Infamous Zeus Banking Trojan has Gone 64-Bit (threatpost.com)

Gunkerty Jeb writes: Researchers at Kaspersky Lab’s Global Research and Analysis Team spotted a new, 64-bit version of the Zeus trojan that behaves much like its 32-bit contemporaries: it too uses Web injects to steal banking credentials to drain online accounts, steal digital certificates and even log keystrokes. Unlike its contemporaries, this new variety of Zeus is — of course — 64-bit compatible, but also communicates with its command and control server over the Tor anonymity network.

Submission + - New Groklaw site being developed (freeforums.net)

ShawnX writes: A new Groklaw site is being formulated and several of the original people from Groklaw are building this community again. Just as Slashdot helped spawn the first Groklaw with word-of-mouth, we can do it again with the 2nd reincarnation.

Submission + - IE Cross-Site Scripting Bypass Discovered (threatpost.com)

msm1267 writes: A weakness has been discovered in the reflective cross-site scripting filter present in Internet Explorer since IE 8 that could enable an attacker to trick the browser into executing malicious code as trusted. The problem going forward is twofold: everything occurring in the bypass method is accepted as part of the official HTML standard going back at least 15 years; and Microsoft said it will not work on a fix for the flaw.

Submission + - A Developer's View Inside Google Glass

rjmarvin writes: As Google Glass inches closer to consumer release and more Glassware development opportunities emerge, Google Glass Senior Developer Advocate Timothy Jordan delves http://sdt.bz/66447 into the differences between the GDK and Mirror API and how developers can best utilize them to build Glassware apps. Jordan also lays out tips and lessons for developers from years of working with Glass, and talks about what makes the platform unique and his vision for what it could mean for the future of effortless technology.

Submission + - Forensics Finds CryptoLocker-Encrypted Files (threatpost.com)

msm1267 writes: CryptoLocker infections are up, and that makes security analysts nervous. One Boston-area forensics expert, however, may have found a way to shave down some recovery time after a recent infection at his company. Using a couple of available tools, he found clues in the NTFS Master File Table that led him to the specific files encrypted by CryptoLocker, meaning he had to restore only gigabytes of data versus terabytes.

Submission + - Route-Injection Attacks Detouring Internet Traffic (threatpost.com) 1

msm1267 writes: Attackers are using route injection attacks against BGP-speaking routers to insert additional hops in the traffic stream, redirecting traffic to third-party locations where it can be inspected before it’s sent to its destination.
Internet intelligence company Renesys has detected close to 1,500 IP address blocks that have been hijacked on more than 60 days this year, a disturbing trend that indicates attackers could finally have an increased interest in weaknesses inherent in core Internet infrastructure.

Slashdot Top Deals

Truly simple systems... require infinite testing. -- Norman Augustine

Working...