Do you plan for the next databreach?
Databreaches can lead to negative public coverage, and the number of databreaches are rising. The survey shows that 68% (of the respondents) dont know how to deal with the negative public coverage after a databreach, and 67% does not know what to do after an databreach has occured.
They also find that the percentage of respondents that have an databreach response plan in 2014 is 73%, compared to 61% in 2013.
Firefox 34.05 update disables SSL3
New version of Mozillas Firefox is out. SSL3 is now disabled by default along with miscellanous secuirty fixes.
Check your GPG fingerprints
Richard Klafter and Eric Swanson have found collissions for every 32bit keyid in the Web of Trust strong set using GPUs and the tool Scallion.
Find bad crypto on your network
A short, great read on how to utilize nmap to find bad ciphers on your network.
Vulnerabilities scanners lost in translation
The presentation is looking at a couple of opensource and commercial scanners, including Snort as IDS, and how they behave on non-english websites. The results shows that all tested scanners/ids fails to detect i.e mysql vulnerabilities if error messages are in other language than english.
A lesson we can take from this is: "Use error codes" , both for displaying errors, but also when parsing and looking at logs.
OpenVPN DoS vulnerability
The vulnerability allows a tls-authenticated client to crash the server by sending a too-short control channel packet to the server. In other words this vulnerability is denial of service only.
Patched in version 2.3.6 and backported to source-only release 2.2.3.
Datawiping malware released after Sony attack
Its reported that malware was released after last weeks attack on Sony. The malware is capable of overwriting data in the master boot record (MBR).
Unauthenticated remote code execution in IBM Endpoint Manager
RedTeam discovered an unauthenticated remote code execution vulnerability in IBB Endpoint Manager as part of an penetration test.
Affected version is all versions prior to 9.0.60100.
Apple Safari update
Update to Webkit in Safari 8.0.1, Safari 7.1.1, and Safari 6.2.1 for MountainLion, Mavericks and Yosemite fixed three security issues.
Google rolls out new CAPTCHA
The new API, named "No CAPTCHA reCAPTCHA", let you confirm that you are a human by clicking in a box.
The motivation behind this new API is that researchers have discovered that todays AI is able to solve 99.8% of the normal distorted text puzzles.
Hacking PayPal accounts with a single click
In this blogpost the author describes how he bypassed the CSRF protection in PayPal. He also shows an proof of concept attack.
The vulnerability was privately disclosed and has been patched by PayPal.
Week to Weak report
This report shows some interesting conclusion:
It takes 7.5 days for a vulnerability to be exploited.
Java, Adobe Flash and Internet Explorer produced the greatest number of vulnerabilities/exploits.
The difference between opensource and propriarity software is insignicant, contradicting what someone claims is one of the pro opensource arguments (given enough eyeballs, all bugs are shallow).
Apple products are fastest attacked after an vulnerability is announced. The numbers are small, but time to exploitation is fast. In the other end is MS Office which is surprisingly slow (long time to exploitation).
Smartphones delivered with malware preinstalled
It has been reported that smartphones are delivered with the DeathRing malware preinstalled. DeathRing is a Chinese trojan that has been preinstalled on smartphones in Asia and Africa. It is able to download SMS and WAP content from command & control servers which it can use for malicious purposes.
The main countries of concern are Vietnam, Indonesia, India, Nigeria, Taiwan, and China.