Friday, May 31, 2013

ESET Family Security Pack 2013

ESET Family Security Pack 2013 - the effective protection of home computers and mobile devices

The company has released a new version of ESET Family Security Pack the product in 2013, the popular set of protection against Internet threats, aimed at the consumer market. With the proposed tool you will be able to ensure the security of computers and mobile devices running on different operating systems.

Every year in your home there are more devices that can access the Internet and their protection from common threats is an increasingly complex and costly task. ESET Family Security Pack 2013 - a robust single solution that protects your computer, smartphone or tablet from viruses, spyware and phishing attacks, and ensures the safety of personal data stored in the memory.

Google: Disclosure timeline for zero-day vulnerabilities

Google has identified a firm deadline for disclosing zero-day vulnerabilities

Google has introduced rules for the disclosure of information about new vulnerabilities, analyzed by security Google.

 To correct actively exploited "zero-day" vulnerabilities manufacturers now has 7 days, after which all of the available information will be published in the public domain. The changes apply only to "zero-day" problems that are already being used to commit attacks, but fixes are not yet available.

For many producers, seven days is too short a period for preparation and distribution of updates. For example, the elimination of critical security issues that do not fall under the category of "zero-day", recommended to be made within 60 days.

Trojan that captures SMS, making two-factor authentication dangerous

New Trojan for Android mobile operating system does two-factor authentication is practically useless and even dangerous.

The main feature of the malware identified Dr. Web as Android.Pincer.2.origin, is that it intercepts all SMS-message arriving on the infected device and sends them to the attacker.

The specialists of Dr. Web found the Trojans, note that he is disguised as a security certificate. It helps cybercriminals to convince potential victims that it simply must be installed.

Infecting a system, the malware displays the following message: "Certificate installed successfully and your device is protected now." ("The certificate has been successfully installed. Your device is protected"). At that collects all the information about the infected device, in particular, the serial number, IMEI, model, data on the operator and the operating system, the phone number. After completing the data collection, the malware attempts to send them to a remote server.

Thursday, May 30, 2013

Results of a study of the world of information security market

Gartner published a study of the global security market


Last year, the information security market grew by 7.9%.

Research agency Gartner published a study on the global market for information security in 2012. According to a study last year, the IS market grew by 7.9% - to $ 19.135 billion compared with 2011.

The market leader is still the company Symantec, which owns a stake in the market at the rate of 19.6%. In 2012, the company earned $ 3.747 billion. With a big separation Symantec are followed by McAfee from shares of 8,8% and the income of $1,680 billion. Worth noting that its annual revenue has increased by more than a third (37%).

Drupal.org hacked you need to change passwords

The security department Drupal.org discovered unauthorized access to the user database and Drupal.org groups.drupal.org.

Hacking is associated with vulnerability to third-party software that was installed on the server association.drupal.org, rather than the most vulnerable in the content management system Drupal. So in that sense, users need not worry.

The problem is that by the attackers got the information about users, including usernames, emails are, country of residence (specified at registration) and hashed passwords. Who is going to investigate the incident and you may find that this is a partial list of the compromised information.

Tuesday, May 28, 2013

Norton 360 Multi-Device

Symantec has released the program for information security Norton 360 Multi-Device, one box with the product allows you to protect  at the same time up to five devices on the platform of Windows, iOS and Android.

Norton 360 Multi-Device is designed to protect the devices on different platforms: PC running Windows and OS X, smartphones and tablets iOS and Android. A single license of Symantec extends to five devices. Management of complex protection through an account in the "cloud" system management Norton Management.

According to Symantec, the world of every 10 mobile phones purchased three devices are lost or stolen. With this in mind, the new product provides a backup system that allows you to transfer stored data from one gadget to another, thereby restoring their data after the theft or loss.

Monday, May 27, 2013

Hollywood is going to spread spyware

Hollywood intends to distribute spyware along with movies through popular torrent trackers

With the help of Spyware on the Web will be monitored illegal content.

Commission on the Theft of American Intellectual Property submitted a report in which an 84-page proposed track unlicensed content online with a Spyware.

Recently, intellectual property theft by illegal downloading of content acquired a mass character, so Hollywood intends to distribute spyware along with movies through popular torrent trackers. This practice is used law enforcement agencies in many countries, setting the spyware on computers and mobile devices suspects.

Hackers stole data from more than one hundred thousand credit cards

Hackers stole data from more than one hundred thousand credit card customers XCom Global Inc.

The company's customers are urged to submit requests to the banks of the blocking cards.

On Monday, May 27, the largest telecommunications company XCom Global Inc. reported that data from more than a hundred thousand credit card customers were stolen by unknown hackers.

The company said that the hackers managed to gain access to sensitive data, such as names of credit card holders, their numbers, as well as information on the period of their validity.

The company Fortinet releases a new version of the operating system FortiWeb 5

The company Fortinet has announced the release of the operating system for the next generation family of devices to protect web applications FortiWeb.

 The new system FortiWeb 5 OS provides enhanced protection from threats and is compatible with all the devices of the family FortiWeb. It is enhanced features including the ability to determine with high accuracy the origin of the traffic and establish permitted or suspicious sources.

With FortiWeb can recognize legitimate and well-known queries to search engines and to distinguish them from scanners, bots, and other threats. This extends the analysis and detection of bots, recently provided by service FortiGuard IP Reputation service, which monitors the compromised IP-address or IP-addresses with abnormal activity.

More than half of the companies do not control programs used by the employees

Most companies do not pay enough attention to what programs and devices are used within their corporate networks.

This is the conclusion reached by experts "Kaspersky Lab" and independent of B2B International in a joint study conducted in late 2012. According to the analysis revealed that 57% of companies do not use special means of control programs, and 56% do not follow the connection of external devices.

Meanwhile, cyber criminals use a variety of tricks to infect systems. For example, malware can be integrated into the popular program, and any employee of the company that runs it in a corporate environment, jeopardize the entire IT-infrastructure company. To prevent such accidents should apply special IT-security policies that control the installation and execution of programs in a corporate network. But, as shown by a joint study B2B International and "Kaspersky Lab", 17% of companies either do not know about the technologies for monitoring the use of the programs, or are not interested in using them.

Sunday, May 26, 2013

PayPal phishing's page on government sites

Fraudsters have placed PayPal phishing's page on government sites


 Unknown fraudsters put Paypal phishing page on a website owned by the PRC government. A fake login page Paypal is hosted at hxxp :/ / www.121.gov.cn at "hxxp :/ / www.121.gov.cn/app/p/index.html".

Once the unsuspecting victim of cybercrime in their credentials on the above page, it redirected to another page where asked to report the name, credit card information, and other sensitive information. After that, the victim is asked to report the three-digit security code, password and security question for password recovery.

Friday, May 24, 2013

BackBox Linux 3.05 has been released

Came BackBox Linux 3.05, the distribution for security testing


Presented release Linux-distribution BackBox Linux 3.05, based on Ubuntu 12.04 and comes with a collection of tools for system safety assessment and identify hidden or lost data in the system. User environment is based on Xfce 4.8. The size of iso-image 1.6 GB.

The new version includes a set of wireless drivers have been ported from the kernel Linux 3.8 (distribution comes with kernel 3.2) with a patch from the project Aircrack-ng. It is possible to install kernels 3.5 and 3.8. Preparations have begun for the version of the distribution platform ARM.

Updated versions of packages automater, inundator, ettercap, wireshark, se-toolkit, metasploit, sqlmap, beef, recon-ng, zaproxy, weevely, thc-ipv6, truecrack, hashcat.

Wednesday, May 22, 2013

A new variant of the Citadel Trojan hunts on Payza users


The new version of financial malware Citadel aimed at users of the payment system Payza, said in an IT company Trusteer. According to experts, the malware starts a local vnutribrauzernuyu attack to steal financial details of users.

Recall that the Citadel - this Trojan is designed mainly to steal details of online banking, but it is also associated with the program-extortionist Reveton, which locks the computer and displays a warning about the need to transfer certain payments to unlock. Like most of the other Trojans, Citadel is embedded in the system processes an Internet browser, and can modify the page that you open on your computer. This technique is referred to as slang experts as MitB or Man in the Browser. It is quite difficult to detect by the user without the use of anti-virus solutions, as in the address bar of the browser issued a legal address of the visited site.

Suppliers of embedded systems pose a threat to cyber security


Moore said that the big problems also exist in the supply chain embedded systems.


Speaking at a conference AusCERT 2013, HD Moore, developer of Metasploit, accused of negligence of suppliers of embedded systems. According to him, they pose a threat to cyber security of computer networks.

HD Moore said that while system administrators do their job adequately to protect the system, they can not cope with the threats that pose the modems, routers, telephones, etc., because the manufacturers of embedded systems, "in general, do not care about cyber security. "

At the conference, Moore presented the results of a large-scale scanning of address space IPv4, TCP, and given the UDP-based services, which allowed him to discover a large number of vulnerabilities.

The hacker managed to hack the CNN website


An attacker claims that he published online 4 fake article.

Hacker using the alias on the network Reckz0r, said that he was able to hack a site news agency CNN. The attacker said that he had published a fake article 4, and 9 stolen credentials portal administrators.

Message with information about the burglary was published on Pastebin. Hacker accused the news agency of spreading "false information" deception of millions of people and "pandering to Israel."

According to Reckz0r, CNN intentionally distorts the situation in the Middle East, in particular, about what is happening in Palestine, trying to justify Israel.

Monday, May 20, 2013

Check Point has reported a new phishing attacks


Check Point announced the discovery of the unfolding of phishing attacks, bots, and programs.

In an attacks used the new options of vulnerability (CVE-2012-0158) aimed at workstations and a number of large corporations in the world.

The attacks began with phishing e-mails purporting to be from Citibank and Bank of America. In the very letters in which the subject was given «Merchant Statement» or anything like that, recipients are invited to open an infected attachment in a format Microsoft Word.

Saturday, May 18, 2013

Hackers attack European companies, using the Trojan Shadesrat


Attackers are beginning attack of a phone call to one of the company's employees.

Symantec Experts warned the European institutions about the new wave of hacker attacks. It is known that during the attack to apply advanced techniques of social engineering. According to available information, the victims of cyber criminals have become, at least 14 French companies. In addition, similar attacks were recorded in Romania and Luxembourg.

Experts from Symantec claim that attacks begin with a phone call to one of the company's employees. In conversation, he is informed of the invoice to be sent to him by e-mail.

Actually sent the file is a modification of a Trojan RAT-Shadesrat. Once on the victim's computer, the virus allows attackers to access sensitive data that will allow them to connect to the bank accounts of the company.

New honeypot detects hackers attacking SCADA-systems


Conpot allows cybercriminals to calculate that scan the IP-addresses of SCADA-systems, and then keep track of their activities.

IT-specialist Lukas Rist designed to lure hackers who have attacked the system critical infrastructure.

Conpot allows cybercriminals to calculate that scan the IP-addresses of SCADA-systems, and then keep track of their activities. The lure mimics the system Siemens SIMATIC S7-200, which connects to the Internet via an I / O CP 443-1. Conpot supports two network protocols Modbus and SNMP, which are commonly used SCADA-systems.

According to the developers, Conpot is also compatible with the man-machine interface and graphical user interfaces that are used to control management systems.

Thursday, May 16, 2013

Kaspersky going to become a supplier of the U.S. government


Head of "Kaspersky Lab" Evgeny Kaspersky announced plans to open an office in Washington, DC, where U.S. experts will design protective software for the protection of local infrastructure.

The Russian company "Kaspersky Lab", one of the world's largest developers of anti-virus, plans to open an office in Washington DC, capital of the United States, in order to sell its products to the U.S. government.

U.S. authorities are trying not to use the solutions in the field of information security, developed by companies from other countries, because they believe that it may be hidden security function.

Tuesday, May 7, 2013

Bitcoin again at gunpoint cyberhawks


Attackers has encrypted malicious code into the register link that leads to sites with content "for adults".

According to the office of CNN, in the register of the electronic payment system Bitcoin, where all transactions are carried out successfully, you can encrypt any message. Including the malicious link.

The fact that the attackers encrypted malicious code into the register link that leads to sites with content "for adults", it was revealed last week. Their peculiarity is that the links were hidden in hexadecimal code. Thus, their detection is possible only with a targeted time searching.

Saturday, May 4, 2013

Printers and IP-cameras - an instrument of DDoS-attacks


The old network protocols make printers and IP-cameras into an instrument of DDoS-attacks

According to the experts of Prolexic,  in the distributed attacks directed on refusal in service, old network protocols even more often are used.

They are still supported by almost all connected devices to the Internet. But the peculiarities of these protocols can "trick" the device and get it to send data to the target system.

For example, the protocol NTP of clock synchronization in response to one of the possible queries can be sent to a list of recently connected clients. If you forge the sender's address in the request, the data will be sent to the target system.