John Leyden

Contact Mail Follow Twitter RSS feed

Grab a cuppa: Time to sort out that Oracle patch batch

Oracle has released its latest quarterly Critical Patch Update on Tuesday, releasing updates to Fusion Middleware, Peoplesoft, E-Business Suite, MySQL, and several other products. Java SE also got patched. This set of patches addresses 136 vulnerabilities in several product families, according to business application security …
John Leyden, 20 Apr 2016

Cybercrooks turn away from banks. Your health records are far juicier

Cybercrooks are switching up targets moving away from retail and financial services onto healthcare and government last year, according to figures from IBM’s security business. Retail drops out of top five most attacked sector while financial targets dropped from #1 to #3 in IBM X-Force’s 2016 Cyber Security Intelligence Index …
John Leyden, 20 Apr 2016
cable

Viber rolls out e-2-e crypto

Messaging app Viber has announced plans to roll out full end-to-end encryption. The feature will become available “over the coming weeks” to all users who have the latest version of Viber across Android, iOS, Windows PCs and Macs. As part of this update, Viber also launches "hidden chats" allowing users to hide specific chats …
John Leyden, 19 Apr 2016
Flash Gordon

Exploit kit writers turn away from Java, go all-in on Adobe Flash

Exploit kit writers are no longer fussed about Java vulnerabilities, focusing their attention almost entirely on Adobe Flash. All of the top 10 vulnerabilities targeted by exploit kits during 2015 are related to Adobe Flash, according to a new study [PDF] from NTT Group. In 2013, by contrast, the top 10 vulnerabilities …
John Leyden, 19 Apr 2016
Monty Python sketch: Nobody expects the Spanish Inquisition

All-Python malware nasty bites Windows victims in Poland

Malware authors have put together a strain of malicious code written entirely in Python, in what may turn out to be an experiment in creating a new type of cross-platform nasty. PWOBot is written entirely in Python, and compiled via PyInstaller to generate a Microsoft Windows executable. The malware has already infected a …
John Leyden, 19 Apr 2016
Couple laying in tent with laptop

Top infosec students square off in inter-uni hackathon contest

Update The University of Cambridge is due to host a cybersecurity hacking competition between the top UK universities next Saturday (23 April). The hackathon (pdf), which is expected to involve students from 10 UK universities, follows a similar exercise between the University of Cambridge and MIT last month. The latter exercise was …
John Leyden, 19 Apr 2016

Idiot millennials are saving credit card PINs on their mobile phones

More than one in five 18-24 year olds (21 per cent) store PINs for credit or debit cards on their smartphones, tablets or laptops, according to research conducted by Equifax in conjunction with Gorkana. In the same survey of 500 people across all ages more than a third of young adults (38 per cent) said they also use their …
John Leyden, 18 Apr 2016

Swedish air controllers debunk cyber attack disruption theory

Sweden's civil aviation administration (LFV) has concluded that radar disruptions that affected services in Stockholm and Malmö last November were down to the effects of a solar flare, scotching rumors reported by El Reg and others earlier this week that a hacker group linked to Russian intelligence might be to blame. Radar …
John Leyden, 15 Apr 2016
LIZARD WEARING A TOP HAT SITS ON A BRANCH.  Brett Weinstein pic - ALTERED BY JUDE KARABUS - licensed under  CC 3.0

Lizard Squad back to blast Blizzard’s gaming hub

Lizard Squad has hit gaming firm Blizzard’s servers with a massive DDoS attack. Blizzard's Battle.net services were left intermittently unavailable as a result of the assault, the latest in a long line of hacking attacks against gaming firms by the notorious black hat hacking crew. Blizzard confirmed an attack in the earlier …
John Leyden, 15 Apr 2016

Malware in email surges

One in six (17 per cent) of all incoming email messages are blocked due to a suspected virus, according to email security firm Retarus. March's rate marks a fivefold rise in comparison with February and can be explained primarily by the large increase in ransomware, according to the enterprise-focused email filtering service …
John Leyden, 15 Apr 2016

Halfbreed trojan targets US banks

A new piece of malware has been linked to thefts of $4m from more than 24 American and Canadian banks in just a few days. Researchers at IBM reckon that hackers combined code from two malware types, known as Nymaim and Gozi, to create GozNym, a persistent and powerful trojan. Customers of numerous credit unions and popular e- …
John Leyden, 15 Apr 2016
Man on bicycle talks on mobile on busy Brussels street. Photo by Alredo Cerra via Shutterstock

Europe's new privacy safeguards are finally approved, must invade EU nations by 2018

Analysis The General Data Protection Regulation (GDPR) has been ratified by the European Parliament. The final seal of approval follows successful passage through the EU Parliament's Committee on Civil Liberties, Justice and Home Affairs. Following four years of discussions and amendments, the GDPR is now officially EU law and will …
John Leyden, 14 Apr 2016
Piranha fish pattern illustration

Facebook video scam

A new Facebook scam campaign has been discovered that spreads a malicious browser plugin via social engineering techniques. The attack starts by luring a Facebook user into playing a video, most often titled “My first video”, “My video” or “Private video”. After clicking on the link, the victim is directed to a fake YouTube …
John Leyden, 14 Apr 2016
retro cartoon featuring two men fighting against cloud backdrop

SAP denial-of-service flaw combo poses remote hijack risk

Two denial of service vulnerabilities in SAP’s latest monthly patch batch can allow full system compromise, ERP security specialists warn. SAP released 19 security notes on Tuesday that collectively fixed 26 vulnerabilities. The updates included patches designed to close two critical DoS issues. Hackers might have been able …
John Leyden, 14 Apr 2016
Snow White waves goodbye. Photo copyright Disney

Ad slinger Phorm ceases trading

Controversial ad targeting firm Phorm has ceased trading. Phorm’s decision follows a failure to secure enough funding to run its business, as explained in a statement to the London Stock Exchange here. Phorm an advertising-technology company and first party data platform provider, announces that, further to its announcement …
John Leyden, 14 Apr 2016
Kinder egg on a bed of Kinder chocs. Photo by Radu Bercan/Shutterstock/Editorial use only

Magic Kinder app developer: Surprise! No security holes

Developers have responded to warnings about massive privacy problems with the Magic Kinder App for children by casting off insecure code, dropping poorly implemented functionality in the process. A lack of encryption within the Magic Kinder smartphone app and other security shortcomings created a severe security risk, as …
John Leyden, 14 Apr 2016

Lauri Love backdoor forced-decryption case goes to court in UK

Alleged hacktivist Lauri Love appeared in a London court on Tuesday in a case that could establish new powers for UK police to compel criminal suspects into handing over encryption keys. Love, 31, faces potential extradition to the US over his alleged involvement in #OpLastResort – the online protests that followed the …
John Leyden, 13 Apr 2016
Man with head in the cloud

Symantec.cloud portal limps back online after day-long TITSUP

Symantec.cloud’s portal is back online following a day-long outage. However, sysadmins report a continuing inability to perform basic functions such as adding new email accounts for new starters at the corporate firms they manage. Problems with the system followed a database crash on Monday morning that dragged on until …
John Leyden, 13 Apr 2016
Newspapers

PowerShell attacks up

Cybercriminals are increasingly using Microsoft PowerShell (a scripting language built-into Microsoft operating systems) as a means to launch stealthier hack attacks, according to a study by Carbon Black Security Partner Program. It found hackers used PowerShell to launch their attacks in 38 per cent of over 1,000 security …
John Leyden, 13 Apr 2016
Air traffic control at NATS

Sweden 'secretly blames' hackers – not solar flares – for taking out air traffic control

Sweden suspects a hacker group linked to Russian intelligence was responsible for an attack on its air traffic control systems last November, it is claimed. Air traffic control systems across much of Sweden were unavailable on November 4. Computer problems meant air traffic controllers were unable to use their displays, an …
John Leyden, 12 Apr 2016
Exhausted looking business man on phone in from of laptop. Photo by Shutterstock

Symantec cloud portal goes titsup after database crash

Symantec.cloud is in the middle of rebuilding its portal this lunchtime following a prolonged outage spanning more than 24 hours. The snafu stemmed from a database crash. Problems first surfaced at 1000 UTC (1100 BST) on Monday and dragged on until lunchtime on Tuesday, as detailed in a series of updates to Symantec.cloud’s …
John Leyden, 12 Apr 2016
Headshot of Trojan horse

New strain of data thieving malware Qbot unleashed

Researchers have uncovered a new strain of data-stealing trojan Qbot. The malware has infected more than 54,000 PCs in thousands of organisations across the world. Incident response experts at BAE Systems came across the malware variant during an engagement at an unnamed public sector organisation. The Qbot-related attack …
John Leyden, 12 Apr 2016
London - Iconic Red telephone box with Big Ben at the background and blue sky - UK, England. Photo by Shutterstock

Spear phishers target gullible Brits more than anyone else – survey

There’s been a sharp (35 per cent) increase in crypto ransomware attacks, with the UK ranked as the nation third most targeted with ransomware. The UK is also ranked as the most targeted nation for spear phishing attacks and the second most hit-upon country with social media scams, according to other findings from Symantec's …
John Leyden, 12 Apr 2016
money_currencies_648

Baddies' brilliant plan to get mobile malware whitelisted: Bribery

Criminals have resorted to bribes in order to smuggle malware into the source code of mobile gaming apps. The scam, in which malware authors bribed the employees of a legitimate mobile games company in China to embed malware into mobile apps, was uncovered by security researchers from Check Point. The bribe ensured that …
John Leyden, 11 Apr 2016
fail_parking_meter_648

SQL injection vuln found at Panama Papers firm Mossack Fonseca

Grey hat security researchers have discovered new flaws in the systems of Panama leak firm Mossack Fonseca. A self-styled “underground researcher” claims to have found a SQL injection flaw on one of the corporate systems of the Panamanian lawyers. “They updated the new payment CMS, but forgot to lock the directory /onion/,” …
John Leyden, 11 Apr 2016