Visit our other websites:    Consumer IT    On CE    Mobile Channels    ECI news    rAVe Europe    Digital Signage News    iChannels

 

eSP - IT Solution Providers in Europe

  • Full Screen
  • Wide Screen
  • Narrow Screen
  • Increase font size
  • Default font size
  • Decrease font size

Security

Check Point: HummingBad Infections Total 10 Million

E-mail Print PDF
Check Point: HummingBad Infections Total 10 Million

There is no such thing as a completely secure mobile device, Check Point insists-- according to the security company devices infected with the HummingBad malware already total 10 million globally.

HummingBad is allegedly developed by Yingmob, the highly organised Chinese group behind the Yispector iOS malware. It infects devices through the search of that most basic of needs, pornography, requires very little in terms of technical effort to run and generates revenues worth over $300000 monthly in fraudulent ad clicks.

CheckPoint adds HummingBad represents a disturbing first step for its creators-- emboldened by its success, Yingmob can potentially take mobile malware to entirely new directions, creating powerful botnets to conduct highly-targeted attacks or sell access to devices to the highest bidder.

Read more...

Lenovo ThinkPads Hit by Critical Security Flaw

E-mail Print PDF
Lenovo ThinkPads Hit by Critical Security Flaw

Lenovo ThinkPads suffer from an exploit allowing the disabling of write protection of critical firmware areas, security researcher Dymtro "Cr4sh" Oleksiuk warns.

Dubbed "ThinkPwn," the exploit targets a privilege escalation flaw in a Unified Extensible Firmware Interface (UEFI) driver. It allows attackers to remove the flash write protection and execute rogue flaw in the System Management Mode (SMM), a privileged CPU operation mode.

Oleksiuk says the result can disable SecureBoot (prevents boot-level rootkits) and the Windows 10 Credential Guard feature (prevents theft of enterprise domain credentials). And if matters weren't bad enough, the flaw probably comes from a CPU reference specification used by a number of independent BIOS vendors (IBVs), meaning it might also affect laptops from OEMs other than Lenovo.

Read more...

Symantec Endpoint Protection Poses Vulnerability Risks

E-mail Print PDF
Symantec Endpoint Protection Poses Vulnerability Risks

Google researchers warn the core engine behind Symantec security products, including Endpoint Protection, features multiple critical vulnerabilities, putting "millions of computers" at risk.

"These vulnerabilities are as bad as it gets. They don’t require any user interaction, they affect the default configuration, and the software runs at the highest privilege levels possible," a Project Zero blog post reads. "In certain cases on Windows, vulnerable code is even loaded into the kernel, resulting in remote kernel memory corruption."

All Symantec and Norton branded antivirus products across all platforms pose the same security risks. Some of the flawed code is found in "unpackers," compression tools used to reduce executable sizes. Symantec runs unpackers in the kernel, leading to risks of clean heap overflow on Linux, Mac and other UNIX platforms, or kernel memory corruption in Windows.

Read more...

Cisco SMB Routers, Firewalls Open to Hacking

E-mail Print PDF
Cisco SMB Routers, Firewalls Open to Hacking

Customers using three Cisco VPN firewalls and routers from the SMB RV series should be warned the devices carry a critical vulnerability hackers can exploit to remotely take control of devices, if not entire systems.

The vulnerability involves the web-based management interface of the Cisco RV110W Wireless-N VPN Firewall, RV130W Wireless-N Multifunction VPN Router and RV215W Wireless-N VPN Router. If the devices are configured for remote management attackers can send an unauthenticated HTTP request with custom user data, leading to remote code execution with root-level priviledges on the affected system.

"A successful exploit could allow the attacker to execute arbitrary script in the context of the web-based management interface for the device or allow the attacker to access sensitive browser-based information," a Cisco security advisory reads.

Read more...

Apple Bolsters Security With Jon Callas Rehire

E-mail Print PDF
Apple Bolsters Security With Jon Callas Rehire

Following its butting heads with US law enforcement against the unlocking of iPhone encryption, Reuters reports Apple is boosting its security capabilities with the hiring of cryptography expert Jon Callas.

Callas worked at Apple during 1995-1997, and again on 2009-2011 period. During the second period he designed the full-disk encryption Apple uses in iPhones, iPads and Macs. In his non-Apple time Callas worked at PGP (where he developed the OpenPGP standard) and co-founded Silent Circle, the company behind the security-minded Blackphone.

Reuters does not reveal the position Callas has at Apple, but the whys behind his hiring should be more than obvious-- the company has a firm stance in favour of strong encryption, taking the fight against the FBI's wanting to bypass iOS security to the courts.

Read more...

Page 7 of 47