Archive for the ‘IT Security News’ Category

ESET LogoESET Company has recently published a 69 page report containing the detailed analysis of an ongoing large-scale attack on servers running on Linux, FreeBSD and other Unix-like systems since 2011.

During the attack (the codename ‘Operation Windigo’) a group of cyber criminals has obtained control of more than 25,000 of servers in three years, 10,000 of which were brought down by tones of malware. (more…)

Threat Intelligence Exchange
McAfee stopS advanced threats within milLiseconds

New McAfee Threat Intelligence Exchange adds Real-Time Orchestration to the Security Connected Platform

Today McAfee announces McAfee Threat Intelligence Exchange, the first in the industry to orchestrate local and global threat intelligence information and enterprise-wide security products into one cohesive integrated security system.

What has traditionally taken days, weeks or months now only takes milliseconds. McAfee Threat Intelligence Exchange eliminates the gap between encounter to containment of advanced targeted attacks. Its unique approach allows immediate protection against the threats posed by advanced targeted attacks across both network and endpoint controls. (more…)

Careto VirusThe viruses black business is raging again: keep your eyes open as two sophisticated threats paralyze computers worldwide.

Kaspersky Lab specialists reported a range of unique Careto virus capabilities has been discovered – the neoteric spawn of evil infects computers regardless of an operating system installed. A Trojan by its very nature, Careto carries myriads of modules in its malicious code, which enables it to be modified effortlessly. Careto nourishes a special interest to credentials, passwords, encryption keys, the network connection data and lots of other stuff. The virus was given such name because of the presence of Careto word in its code that means a ‘mug’ in Spanish. At the moment it is known about the infection cases of both Windows and Mac OS devices. (more…)

Kaspersky LabAccording to Kaspersky Lab’s analysis report, in 2013, the number of malware for Android has reached its absolute peak.

In late January 2014 in the Google Play experts found 200 thousand unique samples of malicious software for mobile platforms.

For the Android platform, there are over 10 million malicious applications, noted Kaspersky Lab experts, in its latest report. According to them, the end of January 2014 in Google Play and other resources they have found 200 thousand unique samples of malware for mobile platforms, which was masked as normal applications. It is worth noting that in November last year, the figure was less than 34% – 148 thousand samples. (more…)

LinuxIn the implementation of the Linux kernel x32 ABI found serious vulnerability

The critical vulnerability (CVE-2014 – 0038) has been detected in the Linux kernel.

The vulnerability allows local users to elevate their privileges in the system and execute code with kernel privileges. The problem occurs only when compiling the kernel with support for x32 ABI, allowing the use of 64 -bit systems, 32-bit memory addressing model. The vulnerability manifests itself only on 64- discharge of the Linux kernel since release 3.4, compiled with the option CONFIG_X86_X32 (not to be confused with CONFIG_X86_32, the problem is not subject to the configuration in which the 32- bit applications run on a system with 64- bit kernel and 32-bit kernel build without support x32 ABI). (more…)


GalileoHacking Team Remote Control System: Spy Software “Galileo” can hack any mobile devices

Hackers from Italy said that they could hack any smartphone.

There is a tool in the software market, that can spy the owners of devices running iOS, Android, Windows Phone, BlackBerry, as well as Mac and PC. Italian hackers from Hacking Team reported about the release of Galileo.

Hackers from Italy, known as Hacking Team, announced the release of the program, which is capable to hack any smartphone running iOS, Android, Windows Phone and BlackBerry. In addition, the developers claim that the tool is able to hack computers running Windows and OS X. (more…)

McAfee logoMcAfee Labs today published its quarterly report on the latest threat tendencies – review the details to get a generous portion of statistics and nutty facts.

Traditionally, a ‘cold’ summer period, characterized by a relatively poor cybercriminal activity, is nine times out of ten followed by a fall’s wave of devastation that brings new forms of sophisticated threats. With nearly 20 million of new quarantine zone malware exemplars, the third quarter of 2013 is no exception. Apart from nasty PC menaces, a surge of Andriod malware is also observed with 700k new species approximately and a total of almost 2.8ml.

There are 4 threat tendencies to point out, proving that protection technologies desperately need constant improvements and updates without any reference to the user’s status (enterprise or private individual). (more…)

McAfee logoDRAFT: Embargo until 11/20/13, 12:01 a.m. ET

Contacts:
Chris Palm
McAfee
408-346-3089
chris_palm@mcafee.com

Stephanie Chaney
Zeno Group
312-222-1758
stephanie.chaney@zenogroup.com

MCAFEE LABS SEES NEW THREATS SUBVERTING DIGITAL SIGNATURE VALIDATION

Third Quarter Threats Report Identifies Android Malware That Bypasses App Validation as Signed PC Malware Continues to Surge; Bitcoin Popular in Illicit Trade and Cybercrime

SANTA CLARA, Calif. – Nov. 20, 2013 – McAfee Labs today released the McAfee Labs Threats Report: Third Quarter 2013, which found new efforts to circumvent digital signature app validation on Android-based devices. The McAfee Labs team identified a new family of mobile malware that allows an attacker to bypass the digital signature validation of apps on Android devices, which contributed to a 30 percent increase in Android-based malware. At the same time, traditional malware signed with digital signatures grew by 50 percent to more than 1.5 million samples. Less surprising but no less daunting was a 125 percent increase in spam. (more…)

Google ChromeThe flaws allowed malicious user to bypass certain security restrictions and compromise a vulnerable system.

Google has released the stable version of Chrome 30 browser for Windows, Mac, Linux and Chrome Frame. The new version of the browser contains some fixes for vulnerabilities allowing malicious people to bypass certain security restrictions and compromise a vulnerable system.

The main new feature in Chrome 30 is the built-in browser beta version of QuickOffice for editing Word and Excel. In addition, the new version also supports multiple accounts for the popular web-platforms, including platforms for Google.

The developers have improved the sensory functions of the browser for a more comfortable user experience tablets. From now on will work better and sandbox for Native Client. (more…)

Spam and phishingThere were at least 72,758 unique phishing attacks worldwide (APWG: Global Phishing Survey, published 18 September 2013)

In January – June 2013 Anti-Phishing Working Group (APWG) has registered just over 72.7 million phishing web sites, whereas in the previous six months was found 123.5 thousands of such resources. Fake sites were found in 53.7 million unique domains – against 89.7 million  in 2012’s second half. Experts attribute this decline declining popularity of virtual hosting phishing community.

During the reporting period, the phishers prefer to place their traps in legal areas, compromised by mass hacking (27% of phishing sites). Have not lost their popularity and trust of registration: from 53.7 million related to the phishing domains over 12,000 phishers are registered legally. It is twice more than in July – December 2012. This increase was caused by the activation of phishing in China: according to the APWG, 68% of registered domain names used for phishing attacks on Chinese targets. In this country, there is an intensive growth of medium-income segments of the population who are willing to use e-commerce services. In this case, the Chinese phishers, according to experts, prefer to place their traps, buying domains – mostly from local or U.S. registrars. (more…)