Skip to main content

Security

Stealthy ModPOS Is 'Most Sophisticated PoS Malware' Ever

posted onNovember 25, 2015
by l33tdawg

Just in time for the holidays, researchers at iSIGHT Partners are warning retailers about ModPOS -- malware in their point-of-sale systems that is nearly impossible to detect, can do a whole lot more than just scrape customers' credit card data, and has already successfully breached U.S. retailers.

"This is by far the most sophisticated PoS malware I've ever seen," says Maria Noboa, senior threat analyst at iSight.

RSA Warns Of Zero Detection Trojan

posted onNovember 25, 2015
by l33tdawg

GlassRAT has remained undetected for more than three years while stealthily targeting victims, security firm says.

It’s apparently not just zero-day vulnerabilities that organizations need to worry about these days, but also zero detection malware threats. For the second time in recent weeks, a security vendor has issued a warning about a malware tool that appears to have evaded detection for multiple years while stealthily going about targeting victims.

Teenage Hackers Return With New List of Government Employees

posted onNovember 17, 2015
by l33tdawg

The hacktivist group that breached the personal email account of CIA Director John Brennan isn’t done yet.

The group, which calls itself “Crackas With Attitude” or CWA, published a list of almost 1,500 names, emails and phone numbers of government employees on Monday. Some of the names and other details appear to be legitimate, although Motherboard wasn’t able to verify them all.

Wireless jammers cast a dark shadow on IoT security

posted onNovember 6, 2015
by l33tdawg

Autumn DePoe-Hughes captured on video a rather bizarre scene at Manchester Fort Shopping Park this past summer. If car doors were locked, they could not be unlocked. The reverse was true as well. And, annoying car alarms defied any attempt to silence them. DePoe-Hughes told John Leyden of The Register, "Someone else had complete control over our cars for well over half an hour."

How a mobile app firm found the XcodeGhost in the machine

posted onNovember 6, 2015
by l33tdawg

Nick Arnott couldn't figure out recently why Apple kept rejecting an update to a mobile app his company developed.

It turned out the problem was a ghost in the machine.

His company, Possible Mobile, is well versed in the App Store submission rules and has built apps for JetBlue, Better Homes & Gardens and the Major Soccer League. The rejection came after it was discovered in mid-September that thousands of apps in the App Store had been built with a counterfeit version of an Apple development tool, Xcode.

ProtonMail hit by mystery DDoS attack, preventing customers from accessing their secure email

posted onNovember 6, 2015
by l33tdawg

End-to-end encrypted email service ProtonMail is suffering from an “extremely powerful” distributed denial-of-service attack, that has knocked it offline, and stopped users from accessing their inboxes.

Switzerland-based ProtonMail has its fair share of fans amongst those who wish to keep their communications secret and secure, as its architecture is designed to never give ProtonMail any method of decrypting your messages, even if they were to receive demands from law enforcement agencies – but clearly the DDoS attack shows that not everyone is a fan.

New type of auto-rooting Android adware is nearly impossible to remove

posted onNovember 5, 2015
by l33tdawg

Researchers have uncovered a new type of Android adware that's virtually impossible to uninstall, exposes phones to potentially dangerous root exploits, and masquerades as one of thousands of different apps from providers such as Twitter, Facebook, and even Okta, a two-factor authentication service.

Vulnerability in Baidu's Android SDK exposes 100 million Android devices

posted onNovember 5, 2015
by l33tdawg

Security researchers from Trend Micro have discovered that a software development kit used by thousands of applications is leaving Android users at risk.

The Moplus SDK was created by Chinese firm Baidu and is susceptible to backdoor functionalities. It is believed that approximately 100 million Android devices users are affected.

5 Ways to Stay Safe Online, According to a Facebook Security Expert

posted onNovember 4, 2015
by l33tdawg

Facebook has over 1.49 billion monthly active users, with people in the U.S. spending a staggering 27 hours on the social networking site every month.

The company thinks that that kind of sky-high usage and engagement gives it certain responsibilities.

“Because people interact with Facebook so often, we’re spending a lot of time thinking about how we can play a role in helping increase security literacy overall across the internet,” Facebook security product manager Melissa Luu-Van tells Business Insider.