Security Researcher Finds Critical Flaws in Sophos Anti-Virus Engine

[b]Multiple vulnerabilities uncovered by security researcher Tavis Ormandy could have permitted attackers to remotely execute code or cause other problems for Sophos Anti-Virus.

[/b]

Security vendor Sophos has plugged a series of security holes in its antivirus product that were uncovered by a security researcher. In some cases, these security holes could have been exploited to cause crashes or to remotely execute code, according to the researcher.

Sophos says it has already patched most of flaws discovered by Ormandy and will release patches for additional issues Nov. 28.

“The paper includes a working pre-authentication remote root exploit that requires zero-iteration, and could be wormed within the next few days,” he explained. “I would suggest administrators deploying Sophos products study my results urgently, and implement the recommendations.”

“A working exploit for Sophos 8.0.6 on Mac is available; however, the techniques used in the exploit easily transfer to Windows and Linux, due to multiple critical implementation flaws described in the paper,” he added.

Read more at :
http://www.eweek.com/security/security-researcher-finds-critical-flaws-in-sophos-anti-virus-engine/



Anonymous Hackers Claim Protest Attacks Hit Zynga, Facebook, Others

Hackers with the group Anonymous have apparently chosen computer gaming vendor Zynga and social networking powerhouse Facebook as the latest targets of a campaign that aims to reel in the power and wealth of the companies.

In a Nov. 5 post on the AnonNews Website, the group says it is taking the actions because of recent developments at Zynga, including the reported layoffs of some workers.

Read more at :
http://www.eweek.com/security/anonymous-hackers-claim-protest-attacks-hit-zynga-facebook-others.html



100K Google Android Apps Pose Potential Security Risk: Bit9 Report

A mobile security report from security vendor Bit9 said that 100,000 applications it examined on Google Play were questionable or suspicious due to the types of permissions they requested, the reputation of the application’s publisher and other factors.

Bit9's criteria for defining an application as "questionable" or "suspicious" included permissions requested by the application, categorization of the application, user rating, number of downloads and the reputation of the application's publisher.

In its examination of more than 400,000 Android apps, Bit9 found 72 percent use at least one high-risk permission. In addition, 42 percent of the apps access GPS location data, including wallpapers, games and utilities; 31 percent access phone calls or phone numbers; 26 percent access personal data, such as contacts and email; and 9 percent use permissions that can cost the user money.

“Most consumers are willing to click “allow” for mobile apps in situations they probably would never have allowed on a Windows computer,” he said. “This is because people do not yet consider their smartphones as vulnerable or as sensitive as they do their desktops and laptops; even those smartphones are essentially just smaller computers, and debatably store even more personal information than the average laptop.”

“Another problem is that there are dozens of different permissions on an Android device,” he added. “The disclosure dialog box cannot list or properly explain them all. Even if it could, some are simply too esoteric or technical for an ordinary consumer to understand. If the warning described the possibly risks, not just the permission requested, that might help, but then you would be talking about a dialog box as large as a license agreement—how many people actually read license agreements in full?”

Read more at :
http://www.eweek.com/security/100k-google-android-apps-pose-potential-security-risk-bit9-report/



Hackers claim attacks against ImageShack, Symantec, other websites

Different hacker groups claim to have breached servers belonging to ImageShack, Symantec, and other organizations.

Update, November 7: This story initially reported that HTP had targeted Paypal. Paypal has since issued a statement that it has not suffered a security breach and the Cyberwarnews.info story that reported the payment processing company had been the victim of an 0 day exploit has been updated to state that ZPanel had been targeted by hackers, not Paypal.

On Sunday, a hacker group called HTP claimed to have compromised Web servers, MySQL databases, routers and management servers used by the ImageShack and yfrog image hosting services.

ImageShack did not immediately return a request for comment.

In the same post, HTP claims to have hacked servers belonging to Symantec. The leaked data includes information the hackers claim to have copied from a Symantec database, including the names, email addresses and hashed passwords of hundreds of users. Many of the email addresses are on the @symantec.com domain.

Read more at :
http://www.computerworld.com.au/article/441022/hackers_claim_attacks_against_imageshack_symantec_other_websites/



Hackers Love Android Gingerbread

Running outdated software on your smartphone can make you an easy target for malware and viruses. The latest report by Russian security firm Kaspersky Lab reveals that 28% af all Android phones infected by malware are running Gingerbread, the operating system’s 2.3.6 version, released in September 2011.

That high number has something to do with the fact that more than half of Android devices in the market run that version of the software. Ice Cream Sandwich, ranked second, with 23% of the attacks, despite having a market considerably lower than Gingerbread — only one in four Android phones is running this version.

Read more at :
http://mashable.com/2012/11/08/hackers-love-android-gingerbread/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Mashable+(Mashable)



Zero-day PDF exploit reportedly defeats Adobe Reader sandbox protection

Cyber criminals are using a new PDF exploit that bypasses the sandbox security features in Adobe Reader X and XI, in order to install banking malware on computers, according to researchers from Russian security firm Group-IB.

The zero-day exploit – an exploit for a previously unknown and unpatched vulnerability – has been integrated into a privately modified version of Blackhole, a commercial Web-based attack toolkit, the Group-IB researchers announced Wednesday.

Read more at :
http://www.infoworld.com/d/security/zero-day-pdf-exploit-reportedly-defeats-adobe-reader-sandbox-protection-206657?source=rss_


Hi CharleyO,

Did you see this? Re: http://forum.avast.com/index.php?topic=52252.msg860586#msg860586
Well one should always be warned twice in the case of a zero day, I think, ;D

polonus


Sorry about that, Polonus, as I should have read farther back. But, as you said, being warned twice is not too many times in this case. :wink:


Future Flash security updates will be synchronized with Microsoft’s monthly patch schedule

Adobe on Tuesday announced it will pair future security updates for its popular Flash Player with Microsoft's Patch Tuesday schedule.

At the same time, Adobe issued an update that patched seven critical Flash vulnerabilities, and Microsoft shipped fixes for Internet Explorer 10 (IE10), which includes an embedded copy of Flash.

Even though the Flash updates will add more Patch Tuesday work for users, security professionals praised Adobe’s change. “Concentrating updates on a single day is a benefit for any organization that manages patch roll-outs,” said Wolfgang Kandek, CTO of Qualys, in an email. “That way the update can be handled by the same decision process, which should streamline roll-outs and get Flash updates [installed] more widely.”

Read more at :
https://www.infoworld.com/d/security/adobe-now-married-microsoft-moves-flash-updates-patch-tuesday-206571?source=rss_



In this thread, what is usually posted is closer to “doom & gloom” than anything else. But, below is a little ray of sunshine.

New online game trains kids against cyber attacks

The National Science Center, or NSC, is now training kids to stay safe from cyber attack malware when they’re surfing the web or using email and cell phones. A new online game called Cyber Swarm Defenders is targeted to 6th-8th grade students and is also appropriate for younger students.

The game is part of the NSC’s newest Cyber Ops education outreach program. The NSC is a public-private partnership between the U.S. Army and NSC, Inc., that uses its resources to stimulate and increase science, technology, engineering, and mathematics, known as STEM, proficiency in U.S. students, especially those in grades 4-9.

“Anything we can do to make the young students of our country understand the cyber threat and get them excited about STEM technologies has a big payoff,” said Ron Ross, chairman of the NSC.

Read more at :
http://www.defencetalk.com/new-online-game-trains-kids-against-cyber-attacks-45388/


Security issue discovered in TOR client
http://www.h-online.com/security/news/item/Security-issue-discovered-in-TOR-client-1746884.html

Microsoft Security Bulletin Advance Notification for November 2012
http://technet.microsoft.com/en-us/security/bulletin/ms12-nov

Exclusive: John McAfee Wanted for Murder (Updated
http://gizmodo.com/5959812/john-mcafee-wanted-for-murder

http://www.dailymail.co.uk/news/article-2149904/John-McAfee-arrested-Belize-police-claim-running-meth-lab.html

update on the above…

3 detained in killing of Internet pioneer’s neighbor in Belize
http://edition.cnn.com/2012/11/13/world/americas/belize-mcafee-killing/index.html?iref=allsearch

Adobe confirms customer data breach
http://www.h-online.com/security/news/item/Adobe-confirms-customer-data-breach-1750344.html

XSS hole on ebay dot com stiil open: http://blog.aegislab.com/index.php?op=ViewArticle&articleId=228&blogId=1

polonus

Malware Targeting Windows 8 Uses Google Docs
http://www.symantec.com/connect/blogs/malware-targeting-windows-8-uses-google-docs


Judge approves FTC’s $22.5M fine of Google

A federal judge has approved a $22.5 million fine to penalize Google for an alleged privacy breach, rejecting a consumer-rights group's plea for tougher punishment.

The blessing from U.S. District Judge Susan Illston came late Friday. She made her ruling a few hours after a hearing in San Francisco for final arguments about a fine that’s the cornerstone a settlement reached three months ago between the Federal Trade Commission and Google Inc.

The rebuke resolves around allegations that Google duped millions of Web surfers using the Safari browser into believing their online activities couldn’t be tracked by the company as long as they didn’t change the browser’s privacy settings. That assurance was posted on Google’s website earlier this year, even as the Internet search leader was inserting computer coding that bypassed Safari’s automatic settings and enabled the company to peer into the online lives of the browser’s users.

The FTC concluded that the contradiction between Google’s stealth tracking and its privacy assurances to Safari users violated a vow the company made in another settlement with the agency last year. Google had promised not to mislead people about its privacy practices.

Read more at :
http://my.earthlink.net/article/tec?guid=20121116/490a38cf-45a5-426e-ab6f-62aca8797276



Anonymous hack hundreds of Israeli websites, delete Foreign Ministry database in support of Gaza

Hacker group Anonymous has launched a massive attack named #OpIsrael on almost 700 Israeli websites, protesting against Operation Pillar of Defense in Gaza. Israeli media confirmed the group’s move.

The hackers reportedly took down websites ranging from high-profile governmental structures such as the Foreign Ministry to local tourism companies’ pages.

The biggest attack as of now has been the Israeli Foreign Ministry’s international development program, titled Mashav. Anonymous announced on Twitter they’ve hacked into the program’s database, with the website remaining inaccessible at the moment.

Read more at :
http://rt.com/news/anonymous-gaza-israel-website-938/


PASSTEAL Sneaks into Users Systems via File Sharing Sites
http://blog.trendmicro.com/trendlabs-security-intelligence/passteal-sneaks-into-users-systems-via-file-sharing-sites/

Securebrowserupdate is malvertising fraudulous malcode: http://stopmalvertising.com/malvertisements/securebrowserupdate.com-wants-to-update-your-browser-with-malware.html

polonus