Monday, August 31, 2015
Big hacks, big data add up to blackmailer's dream
from Latest topics for ZDNet in Security http://ift.tt/1KZoGwU
ジェイルブレイクした iOS を狙うトロイの木馬 KeyRaider、無料アプリ詐欺に利用される
Read More
from Symantec Connect - Security - Blog Entries http://ift.tt/1ifC2OD
FBI: Savvy, Crafty Wire Transfer Fraud is Booming
from http://ift.tt/1IBvZJl
KeyRaider Steals iPhone Credentials for App Purchases
from http://ift.tt/1IBvZt0
Pawn Storm Serves Malware Via Fake EFF Site
from http://ift.tt/1UogJX6
Brazil tops cyberattack ranking in LatAm
Security Bulletin: Multiple vulnerabilities in OpenSSL affect IBM Flex System Manager (FSM) (CVE-2014-3508, CVE-2014-3509, CVE-2014-3505, CVE-2014-3506, CVE-2014-3507, CVE-2014-3510, and CVE-2014-3511)
from IBM Product Security Incident Response Team http://ift.tt/1IzQXs3
Bugtraq: [security bulletin] HPSBMU03401 rev.1 - HP Operations Manager for UNIX and Linux, Remote Unauthorized Modification, Disclosure of Information
from SecurityFocus Vulnerabilities http://ift.tt/1X6RBrX
Bugtraq: [security bulletin] HPSBGN03403 rev.1 - HP Virtualization Performance Viewer, Remote Unauthorized Disclosure of Information
from SecurityFocus Vulnerabilities http://ift.tt/1JHmHwk
iPhone malware KeyRaider stole thousands of Apple logins
How Qualcomm plans to make phones and tablets safe from malware
Microsoft's Project Sonar: Malware detonation as a service
USN-2726-1: Expat vulnerability
Ubuntu Security Notice USN-2726-1
31st August, 2015
expat vulnerability
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 15.04
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
Summary
Expat could be made to crash or run programs as your login if it opened a specially crafted file.
Software description
- expat - XML parsing C library
Details
It was discovered that Expat incorrectly handled malformed XML data. If a
user or application linked against Expat were tricked into opening a
crafted XML file, an attacker could cause a denial of service, or possibly
execute arbitrary code.
Update instructions
The problem can be corrected by updating your system to the following package version:
- Ubuntu 15.04:
- libexpat1 2.1.0-6ubuntu1.1
- lib64expat1 2.1.0-6ubuntu1.1
- Ubuntu 14.04 LTS:
- libexpat1 2.1.0-4ubuntu1.1
- lib64expat1 2.1.0-4ubuntu1.1
- Ubuntu 12.04 LTS:
- libexpat1 2.0.1-7.2ubuntu1.2
- lib64expat1 2.0.1-7.2ubuntu1.2
To update your system, please follow these instructions: http://ift.tt/17VXqjU.
After a standard system upgrade you need to restart any applications linked
against Expat to effect the necessary changes.
References
from Ubuntu Security Notices http://ift.tt/1UnAoGL
US plans 'unprecedented' sanctions against China over hacks
Jailbreak iOS Trojan KeyRaider used as part of free apps scam
Read More
from Symantec Connect - Security - Blog Entries http://ift.tt/1KyN0dg
Bugtraq: [SECURITY] [DSA 3346-1] drupal7 security update
from SecurityFocus Vulnerabilities http://ift.tt/1hrchKs
Bugtraq: Re: Re: UAC Bypass Vulnerability on "Windows 7" in Windows Script Host
from SecurityFocus Vulnerabilities http://ift.tt/1N3X3IZ
Bugtraq: [slackware-security] mozilla-firefox (SSA:2015-241-01)
from SecurityFocus Vulnerabilities http://ift.tt/1hrcjlN
Bugtraq: [SECURITY] [DSA 3345-1] iceweasel security update
from SecurityFocus Vulnerabilities http://ift.tt/1N3X3st
The Decline of Email Spam?
As threat defense experts, Trend Micro has been delivering quarterly security roundup reports for several years now. Each quarter we look back on the previous quarter to highlight the key threats found during that time period. We also review the threat data we collect and analyze from the Trend Micro™ Smart Protection Network™ which gives us insights into the trends occurring within the threat landscape. In our Q2’15 report, A Rising Tide: New Hacks Threaten Public Technologies, one of the trends we’ve been seeing for some time now is a lower amount of spam affecting the world. As you can see from the below chart, spam volumes have generally been trending lower since August of 2014.
While this is good news for users I’d like to dive into some of the reasons we may be seeing this lowering trend.
Our threat researchers have been analyzing many of the recent spam campaigns whether they are Cryptoransomware spam runs in Australia, Europe, and North America, or general spam looking to infect individual users. What we’re finding is the spammers today are taking a page out of the playbook of targeted attack (or Advanced Persistent Threats – APTs) campaigns. The threat actors behind targeted attacks will identify who they want to target and limit the number of individuals they will attack. Spammers today have access to the cybercriminal underground markets (Cyber Arms Bazaar) where they can buy email lists to be used in their campaigns. The difference today than before is these lists are much more refined and accurate. In the past, spammers would send their emails to a huge list of email addresses and did not care if they were legitimate addresses or not. Today these lists contain confirmed live email addresses for actual users, versus say email addresses of many honeypots used in the defense of spam. This means they can take a more targeted approach in their spam campaigns and ensure they are hitting real people.
Other trends we’re seeing with spammers looking to outwit defenses against them are:
|
|
While we cannot predict that spam will continue to drop, we do know that many of the threat actors today are being more and more targeted in their approach to cybercrime and in many cases even though they may not be pushing more threats out, this tactic has allowed them to keep their infection rates just as high as ever. So while spam volume has diminished which on the surface is good, it does not mean that less people are infected as the spammers have been able to be more efficient in their process.
Combatting this trend has required a shift in how messaging-based threats are dealt with. Traditional antispam solutions have struggled to deal with phishing and spearphishing threats and as spam morphs more towards these more effecting infection methods, the addition of advanced threat messaging technologies must be added to these solutions. Trend Micro has been developing and integrating a number of these advanced technologies into our messaging solutions including:
|
|
The threat defense experts within Trend Micro will continue to analyze the cyber-threats affecting our world and will use their expertise to continually innovate new technologies and solutions to protect our customers as the threat landscape changes. Feel free to leave a message if you have your own opinions on this phenomenon we’re seeing.
from Trend Micro Simply Security http://ift.tt/1hrGRUs
via IFTTT
Weaponized Drones For Police Now Legal In North Dakota
from The Hacker News http://ift.tt/1NIPEPm
IBM Security Bulletin: Potential Information Disclosure vulnerability could expose user personal data in WebSphere Commerce (CVE-2015-4980)
from IBM Product Security Incident Response Team http://ift.tt/1FbR8d4
IBM Security Bulletin: Java CVE-2015-2590
from IBM Product Security Incident Response Team http://ift.tt/1MXt57U
IBM Security Bulletin: Vulnerabilities in OpenSSL affect Sterling Connect:Direct for HP NonStop (CVE-2015-1792, CVE-2015-1789, CVE-2015-1790)
from IBM Product Security Incident Response Team http://ift.tt/1MXt6ZB
IBM Security Bulletin: Apache Tomcat Vulnerability in Algo Audit and Compliance (CVE-2014-0230 )
from IBM Product Security Incident Response Team http://ift.tt/1MXt4RE
IBM Security Bulletin: Apache Tomcat vulnerability affects IBM Storwize V7000 Unified (CVE-2014-0230)
from IBM Product Security Incident Response Team http://ift.tt/1FbR7WA
IBM Security Bulletin: Vulnerability in Rational DOORS Next Generation and Rational Requirements Composer with potential for Cross Site Scripting attack (CVE-2015-1917)
from IBM Product Security Incident Response Team http://ift.tt/1FbR50U
IBM Security Bulletin: GNU C library (glibc) vulnerability affects IBM Storwize V7000 Unified (CVE-2013-7423)
from IBM Product Security Incident Response Team http://ift.tt/1MXt6Jb
Security Bulletin: Multiple vulnerabilities in libxml2 affect IBM Flex System Manger (FSM) (CVE-2013-2877, CVE-2014-0191, CVE-2014-3660)
from IBM Product Security Incident Response Team http://ift.tt/1MXt6IZ
Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect IBM Flex System Manager (FSM) (Multiple CVEs)
from IBM Product Security Incident Response Team http://ift.tt/1FbR50E
Here's How Iranian Hackers Can Hack Your Gmail Accounts
from The Hacker News http://ift.tt/1NRKL5U
Photos Leaked! Here's Top Features Expected in Next iPhone Release
from The Hacker News http://ift.tt/1JvQA5L