Independent

ComputerWorldIndependent

Turn Automatic Update off, temporarily, in anticipation of another round of pernicious patches

Credit to Author: Woody Leonhard| Date: Mon, 12 Mar 2018 15:14:00 -0700

Read More
ComputerWorldIndependent

IT beware: University finds new 4G security holes

Credit to Author: Evan Schuman| Date: Mon, 12 Mar 2018 10:25:00 -0700

IT has enough to worry about with traditional data breach issues, but now researchers from Purdue University and the University of Iowa have found quite a few new security holes in the popular 4G mobile networks.

The potentially worst hole detailed in the study is an authentication synchronization failure attack. The danger? It allows bad guys to read incoming and outgoing messages from an employee, permits “stealthy denial” of selected services and “location of history poisoning,” which simply means it can manipulate location ready to give false information to systems using location for identity authentication.

To read this article in full, please click here

Read More
ComputerWorldIndependent

Warning as Mac malware exploits climb 270%

Credit to Author: Jonny Evans| Date: Mon, 12 Mar 2018 05:56:00 -0700

Reputable anti-malware security vendor, Malwarebytes, is warning Mac users that malware attacks against the platform climbed 270 percent last year.

Be careful out there

The security experts also warn that four new malware exploits targeting Macs have been identified in the first two months of 2018, noting that many of these exploits were identified by users, rather than security firms.

In one instance, a Mac user discovered that their DNS settings had been changed and found themselves unable to change them back.

This particular item of malware (OSX.MaMi) also installed a trusted root certificate on their Mac. The threat left the user vulnerable to fraudulent phishing websites posing as the real deal and man-in-the-middle attacks.

To read this article in full, please click here

Read More
IndependentSecuriteam

VK Messenger (VKontakte) vk:// URI Handler Commands Execution

Credit to Author: SSD / Noam Rathaus| Date: Sun, 11 Mar 2018 10:51:34 +0000

Vulnerability Summary The following describes a vulnerability in VK Messenger that is triggered via the exploitation of improperly handled URI. VK (VKontakte; [..], meaning InContact) is “an online social media and social networking service. It is available in several languages. VK allows users to message each other publicly or privately, to create groups, public pages … Continue reading VK Messenger (VKontakte) vk:// URI Handler Commands Execution

Read More
IndependentKrebs

Checked Your Credit Since the Equifax Hack?

Credit to Author: BrianKrebs| Date: Sun, 11 Mar 2018 18:51:08 +0000

A recent consumer survey suggests that half of all Americans still haven’t checked their credit report since the Equifax breach last year exposed the Social Security numbers, dates of birth, addresses and other personal information on nearly 150 million people. If you’re in that fifty percent, please make an effort to remedy that soon. Credit reports from the three major bureaus — Equifax, Experian and Trans Union — can be obtained online for free at annualcreditreport.com — the only Web site mandated by Congress to serve each American a free credit report every year.

Read More
ComputerWorldIndependent

Android P in depth: An up-close look at what's new with security

Credit to Author: JR Raphael| Date: Thu, 08 Mar 2018 08:58:00 -0800

Google is slowly pulling back the curtains on its next-gen Android P release. Yesterday, we got our first glimpse at a work-in-progress, developer-focused preview of the software — and today, we’re getting a closer look at what exactly is new when it comes to Android P and the ever-evolving subject of Android security.

I had the chance to chat with Xiaowen Xin, Google’s Android platform security product manager, about some of the significant changes on the way with Android P. Here’s the inside scoop on what you can expect:

To read this article in full, please click here

Read More
IndependentKrebs

Look-Alike Domains and Visual Confusion

Credit to Author: BrianKrebs| Date: Thu, 08 Mar 2018 16:55:13 +0000

How good are you at telling the difference between domain names you know and trust and imposter or look-alike domains? The answer may depend on how familiar you are with the nuances of internationalized domain names (IDNs), as well as which browser or Web application you’re using. For example, how does your browser interpret the following domain? I’ll give you a hint: Despite appearances, it is most certainly not the actual domain for software firm CA Technologies (formerly Computer Associates Intl Inc.), which owns the original ca.com domain name: https://www.са.com/ Go ahead and click on the link above or cut-and-paste it into a browser address bar. If you’re using Google Chrome, Apple’s Safari, or some recent version of Microsoft’s Internet Explorer or Edge browsers, you should notice that the address converts to “xn--80a7a.com.” This is called “punycode,” and it allows browsers to render domains with non-Latin alphabets like Cyrillic and Ukrainian. Below is what it looks like in Edge on Windows 10; Google Chrome renders it much the same way. Notice what’s in the address bar (ignore the “fake site” and “Welcome to…” text, which was added as a courtesy by the person who registered this domain):

Read More
ComputerWorldIndependent

Study: FinTech, other industries should open blockchain sandboxes and work with regulators

Credit to Author: Lucas Mearian| Date: Wed, 07 Mar 2018 14:11:00 -0800

For regulators to understand blockchain’s cybersecurity benefits and risks, they must first have a deeper understanding of the technology – and businesses hold the key to that, according to new research.

Governments around the world are beginning to increase regulatory oversight of cryptocurrencies, such as bitcoin, which are underpinned by blockchain’s distributed ledger technology. In turn, businesses that use private or “permissioned” blockchain networks are likely to also see more oversight, according to experts.

To read this article in full, please click here

Read More