Month: December 2017

IndependentSecuriteam

SSD Advisory – Ichano AtHome IP Cameras Multiple Vulnerabilities

Credit to Author: SSD / Maor Schwartz| Date: Tue, 19 Dec 2017 07:31:42 +0000

Vulnerabilities Summary The following advisory describes three (3) vulnerabilities found in Ichano IP Cameras. AtHome Camera is “a remote video surveillance app which turns your personal computer, smart TV/set-top box, smart phone, and tablet into a professional video monitoring system in a minute.” The vulnerabilities found are: Hard-coded username and password – telnet Hard-coded username … Continue reading SSD Advisory – Ichano AtHome IP Cameras Multiple Vulnerabilities

Read More
MalwareBytesSecurity

Lo lo lo Loapi Trojan could break your Android

Credit to Author: Nathan Collier| Date: Tue, 19 Dec 2017 18:43:17 +0000

Loapi Trojan discovered on Android devices—a downloader, dropper, adware app, and SMS Trojan all in one—could literally blow up your phone. Read on to learn how to protect against it.

Categories:

Tags:

(Read more…)

The post Lo lo lo Loapi Trojan could break your Android appeared first on Malwarebytes Labs.

Read More
IndependentKrebs

Buyers Beware of Tampered Gift Cards

Credit to Author: BrianKrebs| Date: Tue, 19 Dec 2017 16:28:57 +0000

Prepaid gift cards make popular presents and no-brainer stocking stuffers, but before you purchase one be on the lookout for signs that someone may have tampered with it. A perennial scam that picks up around the holidays involves thieves who pull back and then replace the decals that obscure the card’s redemption code, allowing them to redeem or transfer the card’s balance online after the card is purchased by an unwitting customer.

Read More
SecuritySophos

Web-based cryptominers are malware

Credit to Author: Bill Brenner| Date: Tue, 19 Dec 2017 16:50:40 +0000

Cryptominers running in a browser without an organization’s consent are parasitic and should be considered malware<img alt=”” border=”0″ src=”https://pixel.wp.com/b.gif?host=news.sophos.com&#038;blog=834173&#038;post=44653&#038;subd=sophos&#038;ref=&#038;feed=1″ width=”1″ height=”1″ /><img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/LspUwUi25_k” height=”1″ width=”1″ alt=””/>

Read More
SecurityTrendMicro

With 1.4 Billion Stolen Log-Ins on the Dark Web, it’s Time to Take Password Management Seriously

Credit to Author: Michael Miley| Date: Tue, 19 Dec 2017 14:58:08 +0000

Today, we'll take a deep dive into passwords, including what vulnerabilities weak passwords can open up and how to improve authentication security.Last week you may have seen some worrying news: researchers probing the darkest corners of the underground web found a secret trove containing 1.4 billion breached usernames and passwords. Yes, that’s right: 1.4 BILLION. Yours might very well be among them, and if you reuse the same password across numerous accounts, they may all now…

Read More
ScadaICSSchneider

3 best practices for arc flash protection in medium voltage equipment

Credit to Author: Juha Rintala| Date: Tue, 19 Dec 2017 14:00:34 +0000

The first post in this series outlined the goals and standards for arc flash protection, while the second described the impact of an arc flash on medium voltage (MV) equipment… Read more »

The post 3 best practices for arc flash protection in medium voltage equipment appeared first on Schneider Electric Blog.

Read More