The Notebook Review forums were hosted by TechTarget, who shut down them down on January 31, 2022. This static read-only archive was pulled by NBR forum users between January 20 and January 31, 2022, in an effort to make sure that the valuable technical information that had been posted on the forums is preserved. For current discussions, many NBR forum users moved over to NotebookTalk.net after the shutdown.
Problems? See this thread at archive.org.
← Previous pageNext page →

    All about Security, News, Events and Incidents

    Discussion in 'Security and Anti-Virus Software' started by Dr. AMK, Apr 26, 2018.

  1. 6730b

    6730b Notebook Deity

    Reputations:
    1,295
    Messages:
    803
    Likes Received:
    1,747
    Trophy Points:
    156
    jclausius, Papusan and Dr. AMK like this.
  2. Vaeron

    Vaeron Notebook Evangelist

    Reputations:
    185
    Messages:
    368
    Likes Received:
    204
    Trophy Points:
    56
    I'm not quite sure if this is the place to ask, but... is UnHackMe worth the purchase?

    I'm just running MBAM at the moment, and I don't know where the community stands on that now since, IIRC, there were talks on how it became "bad" after some updates.
     
    jclausius and Dr. AMK like this.
  3. Dr. AMK

    Dr. AMK Living with Hope

    Reputations:
    3,961
    Messages:
    2,182
    Likes Received:
    4,654
    Trophy Points:
    281
    You can find a lot of reviews in the kink below, and it will gives you other alternatives:
    https://www.download3k.com/Antivirus-Spyware-Cleaners/Antivirus/Download-UnHackMe.html
     
    jclausius likes this.
  4. Dr. AMK

    Dr. AMK Living with Hope

    Reputations:
    3,961
    Messages:
    2,182
    Likes Received:
    4,654
    Trophy Points:
    281
    Microsoft Fixed a two year old Security flaw in Windows last Patch Tuesday post August 17th 2020
     
    jclausius and Papusan like this.
  5. jclausius

    jclausius Notebook Virtuoso

    Reputations:
    6,160
    Messages:
    3,265
    Likes Received:
    2,573
    Trophy Points:
    231
    "Microsoft's Control Flow Guard comes to Rust and LLVM compilers"

    - Two popular code compilers have received support this month to natively support Control Flow Guard (CFG), a powerful Windows security feature.

    - CFG is a powerful security feature that ... can secure the execution flow of an application's code to prevent malicious code (such as the result of memory bugs) from hijacking the native "control flow" and make the app take unwanted actions.

    https://www.zdnet.com/article/microsofts-control-flow-guard-comes-to-rust-and-llvm-compilers/

    Time to give credit where credit is due. This would prevent memory overflow bugs from launching other processes. I know we give the Redmonians some flack here at NBR, but Microsoft is actually doing good in regards to this work.
     
    Dr. AMK likes this.
  6. Papusan

    Papusan Jokebook's Sucks! Dont waste your $$$ on Filthy

    Reputations:
    42,712
    Messages:
    29,847
    Likes Received:
    59,649
    Trophy Points:
    931
    Can't be better than this... Cheap - Chinaware doesn't always come for free.

    Click fraud by the Chinese advertising network Mintegral in 1,200 iOS apps
    Posted on August 25, 2020 by Günter Born
    [​IMG]
    Security researchers have found that the Chinese advertising network Mintegral, which is included in 1,200 iOS apps, shows malicious behavior (extract data, perform click fraud). The apps with this advertising network have billions of installations. However, Apple cannot detect any harmful behavior in the SDK used, but has taken measures to prevent the user from collecting data in iOS.


    Malware on cheap China phones steals data and possibly money
    Posted on August 25, 2020 by Günter Born
    [​IMG]
    Pre-installed malware, which is repeatedly found on cheap China phones, is increasingly becoming a risk. Cases are now known where the malware has diverted not only data but also money from the accounts of the owners.
     
    Last edited: Aug 25, 2020
    Dr. AMK, jclausius and cfe like this.
  7. jclausius

    jclausius Notebook Virtuoso

    Reputations:
    6,160
    Messages:
    3,265
    Likes Received:
    2,573
    Trophy Points:
    231
    "Google Drive flaw may let attackers fool you into installing malware"

    - Google Drive may have a way for hackers to trick you into installing rogue code.

    - ... a flaw in Drive’s “manage versions” feature that could let attackers swap a legitimate file with malware.

    - You might get a notification of a document update and grab the file without realizing the threat.

    https://www.engadget.com/google-drive-manage-versions-security-flaw-194323948.html

    Don't ever let anyone else drive you around.
     
    Dr. AMK and Papusan like this.
  8. Papusan

    Papusan Jokebook's Sucks! Dont waste your $$$ on Filthy

    Reputations:
    42,712
    Messages:
    29,847
    Likes Received:
    59,649
    Trophy Points:
    931
    [​IMG]

    SECURITY
    Hackers are backdooring QNAP NAS devices with 3-year old RCE bug bleepingcomputer.com | Today

    Hackers are scanning for vulnerable network-attached storage (NAS) devices running multiple QNAP firmware versions, trying to exploit a remote code execution (RCE) vulnerability addressed by QNAP in a previous release.

    According to a report published today by researchers at Qihoo 360's Network Security Research Lab (360 Netlab), unknown threat actors are currently exploiting a remote command execution vulnerability due to a command injection weakness in QNAP NAS devices' firmware.
     
    Dr. AMK and jclausius like this.
  9. Papusan

    Papusan Jokebook's Sucks! Dont waste your $$$ on Filthy

    Reputations:
    42,712
    Messages:
    29,847
    Likes Received:
    59,649
    Trophy Points:
    931
    Dr. AMK, Vasudev and jclausius like this.
  10. Vasudev

    Vasudev Notebook Nobel Laureate

    Reputations:
    12,045
    Messages:
    11,278
    Likes Received:
    8,815
    Trophy Points:
    931
    Dr. AMK, jclausius and Papusan like this.
  11. Dr. AMK

    Dr. AMK Living with Hope

    Reputations:
    3,961
    Messages:
    2,182
    Likes Received:
    4,654
    Trophy Points:
    281
  12. Vasudev

    Vasudev Notebook Nobel Laureate

    Reputations:
    12,045
    Messages:
    11,278
    Likes Received:
    8,815
    Trophy Points:
    931
    jclausius, Mr. Fox and Dr. AMK like this.
  13. Papusan

    Papusan Jokebook's Sucks! Dont waste your $$$ on Filthy

    Reputations:
    42,712
    Messages:
    29,847
    Likes Received:
    59,649
    Trophy Points:
    931
    [​IMG]

    MICROSOFT, SECURITY
    Windows 10 themes can be abused to steal Windows accounts bleepingcomputer.com

    Specially crafted Windows 10 themes and theme packs can be used in 'Pass-the-Hash' attacks to steal Windows account credentials from unsuspecting users.

    Windows allows users to create custom themes that contain customized colors, sounds, mouse cursors, and the wallpaper that the operating system will use.

    Custom themes can be used to steal Windows passwords
    This weekend security researcher Jimmy Bayne (@bohops) revealed that specially crafted Windows themes could be used to perform Pass-the-Hash attacks.

    Pass-the-Hash attacks are used to steal Windows login names and password hashes by tricking a user into accessing a remote SMB share that requires authentication.

    When trying to access the remote resource, Windows will automatically try to login to the remote system by sending the Windows user's login name and an NTLM hash of their password.

    In a Pass-the-Hash attack, the sent credentials are harvested by the attackers, who then attempt to dehash the password to access the visitors' login name and password.

    Windows users can then switch between different themes as desired to change the appearance of the operating system.
     
    jclausius, Vasudev and Dr. AMK like this.
  14. Vasudev

    Vasudev Notebook Nobel Laureate

    Reputations:
    12,045
    Messages:
    11,278
    Likes Received:
    8,815
    Trophy Points:
    931
  15. Dr. AMK

    Dr. AMK Living with Hope

    Reputations:
    3,961
    Messages:
    2,182
    Likes Received:
    4,654
    Trophy Points:
    281
    Major Security Patch For Windows 10 That FIXES 129 Security Vulnerabilities
     
    jclausius, Vasudev and Papusan like this.
  16. Dr. AMK

    Dr. AMK Living with Hope

    Reputations:
    3,961
    Messages:
    2,182
    Likes Received:
    4,654
    Trophy Points:
    281
    [​IMG]

    New Linux Malware Steals Call Details from VoIP Softswitch Systems

    Cybersecurity researchers have discovered an entirely new kind of Linux malware dubbed "CDRThief" that targets voice over IP (VoIP) softswitches in an attempt to steal phone call metadata. "The primary goal of the malware is to exfiltrate various private data from a compromised softswitch, ...

    Read More

    [​IMG]
    New Unpatched Bluetooth Flaw Lets Hackers Easily Target Nearby Devices

    Bluetooth SIG—an organization that oversees the development of Bluetooth standards—today issued a statement informing users and vendors of a newly reported unpatched vulnerability that potentially affects hundreds of millions of devices worldwide. Discovered independently by two separate teams of ...

    Read More

    [​IMG]
    Hackers Stole $5.4 Million From Eterbase Cryptocurrency Exchange

    Cybercriminals successfully plundered another digital cryptocurrency exchange. European cryptocurrency exchange Eterbase this week disclosed a massive breach of its network by an unknown group of hackers who stole cryptocurrencies worth 5.4 million dollars. Eterbase, which has now entered ...

    Read More

    [​IMG]
    A Successful Self-Service Password Reset (SSPR) Project Requires User Adoption

    IT help desks everywhere are having to adjust to the 'new normal' of supporting mainly remote workers. This is a major shift away from visiting desks across the office and helping ones with traditional IT support processes. Many reasons end-users may contact the helpdesk. However, password related ...

    Read More

    [​IMG]
    New Raccoon Attack Could Let Attackers Break SSL/TLS Encryption

    A group of researchers has detailed a new timing vulnerability in Transport Layer Security (TLS) protocol that could potentially allow an attacker to break the encryption and read sensitive communication under specific conditions. Dubbed "Raccoon Attack," the server-side attack exploits a ...

    Read More
     
  17. Papusan

    Papusan Jokebook's Sucks! Dont waste your $$$ on Filthy

    Reputations:
    42,712
    Messages:
    29,847
    Likes Received:
    59,649
    Trophy Points:
    931
    SECURITY, GAMING
    Razer data leak exposes personal information of gamers bleepingcomputers.com | September 12, 202
    Gaming hardware manufacturer Razer has suffered a data leak after an unsecured database for their online store was exposed online...

    What should affected Razer customers do?

    If threat actors accessed this data, they could use the information in targeted phishing campaigns to gather more sensitive information such as passwords and credit card details.

    While it is not known if any threat actors accessed the exposed data before it was secured, it is vital for those affected to be diligent against potential spear-phishing campaigns.

    If you have ever purchased anything from Razer's online store, be cautious of any emails that state they are from the gaming company.

    Furthermore, if you receive an email claiming to be from Razer, be sure to only log in at razer.com and not at other sites.
     
    6730b, Mr. Fox, jclausius and 3 others like this.
  18. Mr. Fox

    Mr. Fox BGA Filth-Hating Elitist

    Reputations:
    37,235
    Messages:
    39,339
    Likes Received:
    70,655
    Trophy Points:
    931
    I am glad to say that has never happened, and probably never will. But, that has nothing whatsoever to do with the data leak.
    upload_2020-9-15_21-8-29.png
    upload_2020-9-15_21-10-5.png
     
    Dr. AMK likes this.
  19. cfe

    cfe Notebook Geek

    Reputations:
    305
    Messages:
    92
    Likes Received:
    201
    Trophy Points:
    41
  20. Papusan

    Papusan Jokebook's Sucks! Dont waste your $$$ on Filthy

    Reputations:
    42,712
    Messages:
    29,847
    Likes Received:
    59,649
    Trophy Points:
    931
    Microsoft don't trust own AV security. Hence they now have removed the download option feature.

    MICROSOFT, SECURITY
    Microsoft removes Windows Defender ability after security concerns bleepingcomputer.com

    Microsoft has removed the ability to download files using Windows Defender after it was demonstrated how it could be used by attackers to download malware onto a computer...
     
    cfe, jclausius, Vasudev and 1 other person like this.
  21. Vasudev

    Vasudev Notebook Nobel Laureate

    Reputations:
    12,045
    Messages:
    11,278
    Likes Received:
    8,815
    Trophy Points:
    931
    Not seeing changelog in defender page https://docs.microsoft.com/en-us/wi...pdates-baselines-microsoft-defender-antivirus
     
    Dr. AMK likes this.
  22. Dr. AMK

    Dr. AMK Living with Hope

    Reputations:
    3,961
    Messages:
    2,182
    Likes Received:
    4,654
    Trophy Points:
    281
    A Patient Dies After Ransomware Attack Paralyzes German Hospital Systems

    German authorities last week disclosed that a ransomware attack on the University Hospital of Düsseldorf (UKD) caused a failure of IT systems, resulting in the death of a woman who had to be sent to another hospital that was 20 miles away. The incident marks the first recorded casualty as a ...

    Read More


    A Bug Could Let Attackers Hijack Firefox for Android via Wi-Fi Network

    Dear Android users, if you use the Firefox web browser on your smartphones, make sure it has been updated to version 80 or the latest available version on the Google Play Store. ESET security researcher Lukas Stefanko yesterday tweeted an alert demonstrating the exploitation of a recently disclosed ...

    Read More


    Researchers Uncover 6-Year Cyber Espionage Campaign Targeting Iranian Dissidents

    Capping off a busy week of charges and sanctions against Iranian hackers, a new research offers insight into what's a six-year-long ongoing surveillance campaign targeting Iranian expats and dissidents with an intention to pilfer sensitive information. The threat actor, suspected to be of Iranian ...

    Read More


    U.S. Treasury Sanctions Hacking Group Backed by Iranian Intelligence

    The U.S. government on Thursday imposed sweeping sanctions against an Iranian threat actor backed by the country's Ministry of Intelligence and Security (MOIS) for carrying out malware campaigns targeting Iranian dissidents, journalists, and international companies in the telecom and travel ...

    Read More


    Android 11 — 5 New Security and Privacy Features You Need to Know

    After a long wait and months of beta testing, Google last week finally released Android 11, the latest version of the Android mobile operating system—with features offering billions of its users more control over their data security and privacy. Android security is always a hot topic and almost ...

    Read More
     
    Last edited: Sep 21, 2020
    jclausius, cfe, Vasudev and 1 other person like this.
  23. Dr. AMK

    Dr. AMK Living with Hope

    Reputations:
    3,961
    Messages:
    2,182
    Likes Received:
    4,654
    Trophy Points:
    281
    Unsecured Microsoft Bing Server Exposed Users' Search Queries and Location

    A back-end server associated with Microsoft Bing exposed sensitive data of the search engine's mobile application users, including search queries, device details, and GPS coordinates, among others. The logging database, however, doesn't include any personal details such as names or addresses. The ...

    Read More


    British Hacker Sentenced to 5 Years for Blackmailing U.S. Companies

    A UK man who threatened to publicly release stolen confidential information unless the victims agreed to fulfill his digital extortion demands has finally pleaded guilty on Monday at U.S. federal district court in St. Louis, Missouri. Nathan Francis Wyatt , 39, who is a key member of the infamous ...

    Read More


    Researchers Uncover 6-Year Cyber Espionage Campaign Targeting Iranian Dissidents

    Capping off a busy week of charges and sanctions against Iranian hackers, a new research offers insight into what's a six-year-long ongoing surveillance campaign targeting Iranian expats and dissidents with an intention to pilfer sensitive information. The threat actor, suspected to be of Iranian ...

    Read More
     
    jclausius, Papusan, 6730b and 2 others like this.
  24. Papusan

    Papusan Jokebook's Sucks! Dont waste your $$$ on Filthy

    Reputations:
    42,712
    Messages:
    29,847
    Likes Received:
    59,649
    Trophy Points:
    931
    Blindside is a new Specter vulnerability: affects Intel and AMD en24news.com | Sept 21, 2020
    [​IMG]

    For the past two years, security flaws in processors have been a common concern in the technology industry. Processor manufacturers, where Intel has been most prevalent, have struggled to implement measures against deficiencies that in most cases are related to speculative executions in the Specter family. After a few months of lull, now the next vulnerability is emerging, affecting both Intel and AMD.

    The security researchers conclude their report by stating that the progress made in recent years on measures against speculative execution is not as stable and comprehensive as the industry might have suggested. With Blindside, they show that speculative execution can still be exploited with easily accessible software methods. The report does not mention whether modern Intel architectures, such as Comet Lake and Ice Lake, are also vulnerable. It remains to be seen if AMD’s upcoming Zen 3 is as vulnerable as its predecessor.

    ...........................................................................................................................

    Was first time mentioned by Zdnet.com last week... https://www.zdnet.com/article/new-blindside-attack-uses-speculative-execution-to-bypass-aslr/

    Academics have developed a new technique for attacking secure computer systems by abusing speculative execution, a CPU mechanism that's normally used for performance optimizations.

    The technique, named BlindSide, was detailed in a paper [PDF] published last week by a team of academics from the Stevens Institute of Technology in New Jersey, ETH Zurich, and the Vrije University in Amsterdam.

    BlindSide attacks also work regardless of architecture, being tested on both Intel and AMD CPUs alike.

    In addition, BlindSide attacks also work despite the recent mitigations that CPU vendors have added against speculative execution attacks like Spectre, Meltdown, and others.

    The team's research paper proposes several mitigations that OS makers could deploy to counter BlindSide attacks.

     
    jclausius, Vasudev and Dr. AMK like this.
  25. Dr. AMK

    Dr. AMK Living with Hope

    Reputations:
    3,961
    Messages:
    2,182
    Likes Received:
    4,654
    Trophy Points:
    281
    Researchers Uncover Cyber Espionage Operation Aimed At Indian Army

    Cybersecurity researchers uncovered fresh evidence of an ongoing cyberespionage campaign against Indian defense units and armed forces personnel at least since 2019 with an aim to steal sensitive information. Dubbed "Operation SideCopy" by Indian cybersecurity firm Quick Heal, the attacks have been ...

    Read More


    Red Team — Automation or Simulation?

    What is the difference between a penetration test and a red team exercise? The common understanding is that a red team exercise is a pen-test on steroids, but what does that mean? While both programs are performed by ethical hackers, whether they are in-house residents or contracted externally, the ...

    Read More


    FinSpy Spyware for Mac and Linux OS Targets Egyptian Organisations

    Amnesty International today exposed details of a new surveillance campaign that targeted Egyptian civil society organizations with previously undisclosed versions of FinSpy spyware designed to target Linux and macOS systems. Developed by a German company, FinSpy is extremely powerful spying ...

    Read More


    Microsoft Windows XP Source Code Reportedly Leaked Online

    Microsoft's long-lived operating system Windows XP—that still powers over 1% of all laptops and desktop computers worldwide—has had its source code leaked online, allegedly, along with Windows Server 2003. Yes, you heard that right. The source code for Microsoft's 19-year-old operating system was ...

    Read More


    Fortinet VPN with Default Settings Leave 200,000 Businesses Open to Hackers

    As the pandemic continues to accelerate the shift towards working from home, a slew of digital threats have capitalized on the health concern to exploit weaknesses in the remote work infrastructure and carry out malicious attacks. Now according to network security platform provider SAM Seamless ...

    Read More
     
    Vasudev, jclausius and Papusan like this.
  26. Papusan

    Papusan Jokebook's Sucks! Dont waste your $$$ on Filthy

    Reputations:
    42,712
    Messages:
    29,847
    Likes Received:
    59,649
    Trophy Points:
    931
    A security hole in the Apple T2 chip endangers Mac users, a patch is not possible notebookcheck.com
    [​IMG]
    The T2 chip is responsible for the security of Macs - it is all the more annoying that it is now precisely this chip that offers a target for attack. (Image: Apple).

    Security researchers have released new information about a vulnerability in Apple's T2 chip, according to which two different exploits can be used to manipulate the behavior of the chip and to smuggle in malware - the problem cannot be fixed with a software update.

    The bad news: The ROM of the T2 chip cannot be changed by software updates, so Apple cannot do anything about this exploit - ironically, this is a security precaution. However, it can be assumed that future hardware revisions will improve this. Yeah, that will certainly help the users who won't upgrade each year :)
     
    Vasudev, jclausius and Dr. AMK like this.
  27. Vasudev

    Vasudev Notebook Nobel Laureate

    Reputations:
    12,045
    Messages:
    11,278
    Likes Received:
    8,815
    Trophy Points:
    931
    Even Pre-iphone 8 models are affected by security exploit in secure enclave.
    Maybe donations from users after buying new Macs can fix T2 chip exploit with newer T3 chips which doesn't have this exploitable security hole when a Mac is nearby a hacker.
     
    Dr. AMK and Papusan like this.
  28. Papusan

    Papusan Jokebook's Sucks! Dont waste your $$$ on Filthy

    Reputations:
    42,712
    Messages:
    29,847
    Likes Received:
    59,649
    Trophy Points:
    931
    AMD Graphics Drivers Have a CreateAllocation Security Vulnerability techpowerup.com Yesterday, 09:29

    Discovering vulnerabilities in software is not an easy thing to do. There are many use cases and states that need to be tested to see a possible vulnerability. Still, security researchers know how to find those and they usually report it to the company that made the software. Today, AMD has disclosed that there is a vulnerability present in the company graphics driver powering the GPUs and making them work on systems. Called CreateAllocation (CVE-2020-12911), the vulnerability is marked with a score of 7.1 in the CVSSv3 test results, meaning that it is not a top priority, however, it still represents a big problem.

    "A denial-of-service vulnerability exists in the D3DKMTCreateAllocation handler functionality of AMD ATIKMDAG.SYS 26.20.15029.27017. A specially crafted D3DKMTCreateAllocation API request can cause an out-of-bounds read and denial of service (BSOD). This vulnerability can be triggered from a guest account, " says the report about the vulnerability. AMD states that a temporary fix is implemented by simply restarting your computer if a BSOD happens. The company also declares that "confidential information and long-term system functionality are not impacted". AMD plans to release a fix for this software problem sometime in 2021 with the new driver release. You can read more about it here.
     
    cfe, jclausius, Vasudev and 1 other person like this.
  29. Dr. AMK

    Dr. AMK Living with Hope

    Reputations:
    3,961
    Messages:
    2,182
    Likes Received:
    4,654
    Trophy Points:
    281
    55 New Security Flaws Reported in Apple Software and Services
    A team of five security researchers analyzed several Apple online services for three months and found as many as 55 vulnerabilities, 11 of which are critical in severity. The flaws — including 29 high severity, 13 medium severity, and 2 low severity vulnerabilities — could have allowed an attacker ...

    Read More


    Researchers Find Vulnerabilities in Microsoft Azure Cloud Service
    As businesses are increasingly migrating to the cloud, securing the infrastructure has never been more important. Now according to the latest research, two security flaws in Microsoft's Azure App Services could have enabled a bad actor to carry out server-side request forgery (SSRF) attacks or ...

    Read More


    A Handy Guide for Choosing a Managed Detection & Response (MDR) Service
    Every company needs help with cybersecurity. No CISO ever said, "I have everything I need and am fully confident that our organization is fully protected against breaches." This is especially true for small and mid-sized enterprises that don't have the luxury of enormous cybersecurity budgets and a ...

    Read More


    ALERT! Hackers targeting IoT devices with a new P2P botnet malware
    Cybersecurity researchers have taken the wraps off a new botnet hijacking Internet-connected smart devices in the wild to perform nefarious tasks, mostly DDoS attacks, and illicit cryptocurrency coin mining. Discovered by Qihoo 360's Netlab security team, the HEH Botnet — written in Go language and ...

    Read More


    New 'MosaicRegressor' UEFI Bootkit Malware Found Active in the Wild
    Cybersecurity researchers have spotted a rare kind of potentially dangerous malware that targets a machine's booting process to drop persistent malware. The campaign involved the use of a compromised UEFI (or Unified Extensible Firmware Interface) containing a malicious implant, making it ...

    Read More
     
    Vasudev and jclausius like this.
  30. Papusan

    Papusan Jokebook's Sucks! Dont waste your $$$ on Filthy

    Reputations:
    42,712
    Messages:
    29,847
    Likes Received:
    59,649
    Trophy Points:
    931
    Vasudev, jclausius and Dr. AMK like this.
  31. Papusan

    Papusan Jokebook's Sucks! Dont waste your $$$ on Filthy

    Reputations:
    42,712
    Messages:
    29,847
    Likes Received:
    59,649
    Trophy Points:
    931
    [​IMG]
    Researchers Demonstrate Apple T2 Security Chip Root Access Vulnerability Via USB-C Port
    hothardware.com | Oct 13, 2020

    Last week, a security researcher team claimed Apple’s T2 security chip onboard many Macs was vulnerable to an exploit that could not be patched. This exploit would give an attacker full root access and kernel execution privileges. Now, another group has showcased a real-world method of this attack over USB-C...


    While this issue can be a concern for the average user, you can avoid problems by not leaving your devices accessible by unsavory individuals. It will be interesting to see if Apple has a response to these revelations
     
    Vasudev, jclausius, cfe and 1 other person like this.
  32. Vasudev

    Vasudev Notebook Nobel Laureate

    Reputations:
    12,045
    Messages:
    11,278
    Likes Received:
    8,815
    Trophy Points:
    931
    Nice but Macbooks always shipped with Thunderbolt 3 first then fallback to USB C based ports which we see today on most Intel gaming books. So, I think TB3 could be the attack vector nowadays.
     
    Papusan and Dr. AMK like this.
  33. Papusan

    Papusan Jokebook's Sucks! Dont waste your $$$ on Filthy

    Reputations:
    42,712
    Messages:
    29,847
    Likes Received:
    59,649
    Trophy Points:
    931
    Security Flaw In 800,000 SonicWall VPNs Can Be Exploited By Unskilled Hackers, Patch Now hothardware.com | Today

    A security firm warns that an "unskilled attacker" could leverage a security flaw in SonicWall VPN (virtual private network) appliances to run arbitrary code remotely, causing a persistent denial of service (DoS) condition. Or put more plainly, the SonicWall VPN has a serious security hole that makes it easy for even armchair hackers to wreak havoc.
     
    jclausius, Vasudev and Dr. AMK like this.
  34. Papusan

    Papusan Jokebook's Sucks! Dont waste your $$$ on Filthy

    Reputations:
    42,712
    Messages:
    29,847
    Likes Received:
    59,649
    Trophy Points:
    931
    SECURITY
    NVIDIA patches high severity GeForce Experience vulnerabilities blepingcomputer.com | Today

    NVIDIA released a security update for the Windows NVIDIA GeForce Experience (GFE) app to address vulnerabilities that could enable attackers to execute arbitrary code, escalate privileges, gain access to sensitive info, or trigger a denial of service (DoS) state on systems running unpatched software.
     
    Vasudev, jclausius, cfe and 1 other person like this.
  35. cfe

    cfe Notebook Geek

    Reputations:
    305
    Messages:
    92
    Likes Received:
    201
    Trophy Points:
    41
    Google reports another twofer chrome&windows zero-day

    Windows patch expected Nov 11:

    "The Google Project Zero team notified Microsoft last week and gave the company seven days to patch the bug. Details were published today, as Microsoft did not release a patch in the allotted time."

    at least there's no suspicion of nation-state threat actor using to target imminent US election.
     
  36. Dr. AMK

    Dr. AMK Living with Hope

    Reputations:
    3,961
    Messages:
    2,182
    Likes Received:
    4,654
    Trophy Points:
    281
    Big Windows Security vulnerability discovered by Google October 31st 2020
     
    Vasudev, jclausius, cfe and 1 other person like this.
  37. Papusan

    Papusan Jokebook's Sucks! Dont waste your $$$ on Filthy

    Reputations:
    42,712
    Messages:
    29,847
    Likes Received:
    59,649
    Trophy Points:
    931
    [​IMG]
    Windows 10, iOS, Chrome, and many others fall at China's top hacking contest zdnet.com | today

    Winning hacker team pockets $744,500 at the Tianfu Cup, China's top hacking contest.

    Many of today's top software programs have been hacked using new and never-before-seen exploits at this year's edition of the Tianfu Cup — China's largest and most prestigious hacking competition.

    All exploits were reported to the software providers, per contest regulations, modeled after the rules of the more established Pwn2Own hacking competition that has been taking place in the west since the late 2000s.

    Patches for all the bugs demonstrated over the weekend will be provided in the coming days and weeks, as it usually happens after every TianfuCup and Pwn2Own contest.
     
    Vasudev, jclausius, cfe and 1 other person like this.
  38. Papusan

    Papusan Jokebook's Sucks! Dont waste your $$$ on Filthy

    Reputations:
    42,712
    Messages:
    29,847
    Likes Received:
    59,649
    Trophy Points:
    931
    A host of anti-virus engines are flagging recent Dell printer drivers as unsafe neowin.com
    [​IMG]

    Recent releases of Dell printer drivers for various versions of Windows are being flagged by a number of anti-virus programs as malware, as spotted and reported by journalist Brian Krebs on Twitter (via WindowsCentral). A few examples of such reports can be viewed on Virus Total that provides logs of malware detection by various anti-virus programs.
    -----------------------------------------------------------------------------
    While AMD and Apple throw out new processors.... Microsoft continue helping Intel to patch their never ending CPU security bugs.

    Windows 10 Intel microcode released to fix new CPU security bugs bleepingcomputers.com

    Microsoft has released a new batch of Intel microcode updates for Windows 10 20H2, 2004, 1909, and older versions to fix new hardware vulnerabilities discovered in Intel CPUs.

    When Intel finds bugs in their CPUs, they release microcode updates that allow operating systems to patch the behavior of the CPU to fix, or at least mitigate, the bug.

    ------------------------------------------------------------------

    Europeans don't trust US tech giants with their data betanews.com
    [​IMG]
    A new study reveals that 82 percent of Europeans don't trust US tech giants with their personal files, despite increasing reliance on cloud services due to COVID-19.

    The survey of 4,500 people across the UK, France and Germany, conducted by pCloud, one of Europe's fastest-growing file-sharing and cloud storage providers, finds the biggest concerns are personal data being used for commercial gain (51 percent) and the possibility of hacks (43 percent)....

    The location of data servers is important to users, with 82 percent saying they would rather have their data stored in Europe than the United States, while 74 percent say they check the security features offered before choosing a cloud services provider. 68 percent of users say they would feel more confident putting files in the cloud if the provider was not able to see what was being stored there.

    --------------------------------------------------------------


    [​IMG]
    SecurityBitdefender is struggling with serious security problems heise.de

    The manufacturer needed up to four attempts to eliminate a total of ten critical security gaps.

    Computer science student David L. analyzed Bitdefender's code for unpacking UPX-compressed files and found critical errors in almost every step . All of the bugs are not really hard to find gaps, but rather bread & butter gaps for security researchers, as can be easily found with fuzzing. Almost half caused the lack of the important length check in memory operations. Tavis Ormandy, who has identified several such loopholes in AV software himself, promptly comments that it is "irresponsible to deliver code like this".

    Antivirus software as a security risk
    The findings once again confirm the fact that heise Security documented as a gateway in antivirus software as early as 2007 , that whenever a security researcher "knocks on antivirus software", critical security gaps tumble out below. Researchers illustrated this again in 2014 and it does not seem to have fundamentally changed. Antivirus software is a potential security problem.
     
    Last edited: Nov 11, 2020
  39. Papusan

    Papusan Jokebook's Sucks! Dont waste your $$$ on Filthy

    Reputations:
    42,712
    Messages:
    29,847
    Likes Received:
    59,649
    Trophy Points:
    931
    SECURITY
    Intel fixes 95 vulnerabilities in November 2020 Platform Update bleepingcomputers.com
    Intel addressed 95 vulnerabilities as part of the November 2020 Patch Tuesday, including critical ones affecting Intel Wireless Bluetooth products and Intel Active Management Technology (AMT).


    "At this time, we are not aware of any of these issues being used in actual attacks," Bryant added.

    As expected, people should be more worried about running into malware and attacks other ways than through the disclosed Intel vulnerabilities. The web is a dangerous place regardless if you patch your machines with latest Intel MC or not. If you want the latest bios updates from your OEM/Win Update to fix a "not widespread" security problem today, then expext have to deal with 100C and random Boost clocks due Plundervolt patch. The choice is yours.

    [​IMG]

    SECURITY
    New tool lets attackers easily create reply-chain phishing emails bleepingcomputers.com

    A new email tool advertised on a cybercriminal forum provides a stealthier method for carrying out fraud or malware attacks by allowing messages to be injected directly into the victim's inbox.

    By slipping content in the normal email flow, the utility can help bypass protections that verify messages traveling to their destination mail server.
    upload_2020-11-12_21-24-9.png

    Ransomware gang hacks Facebook account to run extortion ads bleepingcomputer.com

    A ransomware group has now started to run Facebook advertisements to pressure victims to pay a ransom.

    This new tactic of promoting attacks through Facebook shows the continuing evolution of ransomware extortion. With ransom demands and payments in the tens of millions, we can expect to see further escalations in the future.

    ---------------------------------------------------------------------------

    Microsoft urges users to stop using phone-based multi-factor authentication zdnet.de

    Microsoft recommends using app-based authenticators and security keys instead.
     
    Last edited: Nov 12, 2020
    Vasudev and jclausius like this.
  40. Papusan

    Papusan Jokebook's Sucks! Dont waste your $$$ on Filthy

    Reputations:
    42,712
    Messages:
    29,847
    Likes Received:
    59,649
    Trophy Points:
    931
    Serious Intel Boot Guard Exploit Leaves Unpatched PCs
    http://forum.notebookreview.com/thr...atches-and-more.812424/page-133#post-11058854

    --------------------------------------------------------------------------------

    TCL Android smart TVs may have 'Chinese backdoor' — protect yourself now tomsguide.com By Paul Wagenseil 2 days ago

    Security researchers say they found some very serious issues...

    TCL smart TVs running Android seem to have huge security holes and could even be designed to spy on users around the world, two security researchers say. The issues do not affect TCL sets running Roku software.

    "I can wholeheartedly say that there were multiple moments that I, and another security researcher that I met along the way, couldn't believe what was happening," wrote a researcher calling himself " Sick Codes" in a blog post earlier this week. "On multiple occasions I found myself feeling as though, 'you couldn't even make this up.'"
     
    Vasudev and jclausius like this.
  41. Papusan

    Papusan Jokebook's Sucks! Dont waste your $$$ on Filthy

    Reputations:
    42,712
    Messages:
    29,847
    Likes Received:
    59,649
    Trophy Points:
    931
    Backdoor in Chinese routers (Jetstream, Wavelink, Ematic)
    Posted on November 24, 2020 by Günter Born
    [​IMG]
    A security researcher has come across a hidden back door that is built into Chinese routers from various companies (Wavlink, Jetstream). Not only can the router be controlled via the backdoor, it can also penetrate the network of the device owner behind it. The devices are sold on Amazon, eBay and other platforms as well as at the US retailer Walmart. I don't know how much the routers are being sold in Germany. A quick search on Amazon for Ematic routers (or other device names) brought me hits.

    300,000+ Spotify accounts hacked
    Posted on November 24, 2020 by Günter Born
    [​IMG]
    Customers of the music streaming service Spotify may have a problem. Hackers have used a database of 380 million records of credentials and personal information from various sources to crack Spotify accounts and have arguably succeeded with more than 300,000 users.
     
  42. jclausius

    jclausius Notebook Virtuoso

    Reputations:
    6,160
    Messages:
    3,265
    Likes Received:
    2,573
    Trophy Points:
    231
    "Your Computer Isn't Yours"

    - On modern versions of macOS, you simply can’t power on your computer, launch a text editor or eBook reader, and write or read, without a log of your activity being transmitted and stored.

    - in the current version of the macOS, the OS sends to Apple a hash (unique identifier) of each and every program you run, when you run it. Lots of people didn’t realize this, because it’s silent and invisible and it fails instantly and gracefully when you’re offline, but today the server got really slow and it didn’t hit the fail-fast code path, and everyone’s apps failed to open if they were connected to the internet.

    - This data amounts to a tremendous trove of data about your life and habits, and allows someone possessing all of it to identify your movement and activity patterns.

    This was first mentioned by @kojack here - http://forum.notebookreview.com/thr...indows-10-should-read-this-macos-nope.834626/ and @Papusan here - http://forum.notebookreview.com/thr...eaves-os-x-behind.833383/page-4#post-11059344 , so Kudos to then.

    I didn't realize how much data Apple is collecting on users with their invasive operating system!

    https://sneak.berlin/20201112/your-computer-isnt-yours/
     
    etern4l, Vasudev, kojack and 2 others like this.
  43. cfe

    cfe Notebook Geek

    Reputations:
    305
    Messages:
    92
    Likes Received:
    201
    Trophy Points:
    41
    may as well embrace it and adjust now, while there's still time to do so--while it still feels like a "choice" to accept these things. the day is not far off when there will quite literally be no question of this being not only the norm, but in fact, the precedent to be expected.

    sorry to say it, and i know it sounds cynical and pessimistic, but singularity is no theoretical possibility anymore. the great wheel of progress grinds on, and the dusty road is paved with crushed souls and broken dreams. remember when digital currency was a fringe joke, microchip implantation was laughable? as tech buffs, sci-fi fans, nerds, gamers, you know better than any where the road of the future leads. just as we look at jules verne now and are entirely unfazed (not merely "hmm this is reality now!", but actually "yeah...and..? so what?"), soon we will be looking at huxley without blinking either.

    the best way forward is make it as bright as we can, even in the face of a society where your number, your credit, and your online presence are inseparable from your humanity
     
    Last edited: Nov 25, 2020
    jclausius, Lopt and Vasudev like this.
  44. Papusan

    Papusan Jokebook's Sucks! Dont waste your $$$ on Filthy

    Reputations:
    42,712
    Messages:
    29,847
    Likes Received:
    59,649
    Trophy Points:
    931
    Microsoft & Google are abused for phishing
    Posted on 2020-12-04 by guenni
    [​IMG]Check Point security researchers are currently seeing a sharp increase in phishing emails that use well-known brands to disguise the fraud. Here’s some information I’ve received from Check Point warning against fake emails on behalf of Microsoft and Google.

    Here, the main type of fraud is that fake messages ask users to reset or enter their access data for Microsoft accounts, which allows hackers to gain possession of them.
    [​IMG]
    Phishing e-mail for account verification of ‘Microsoft Accounts Team’.

    In a video in the series called How to secure your remote workforce, Maya Horowitz, Check Point’s Director of Threat Research and Intelligence, explains the threat. Using a real-life case – the hacker group called Florentine Banker – reported on Check Point in April, she shows what a fake email can actually do. Read all about the investigation of brand abuse in the context of phishing in this blog post.
     
    jclausius, Vasudev and etern4l like this.
  45. Papusan

    Papusan Jokebook's Sucks! Dont waste your $$$ on Filthy

    Reputations:
    42,712
    Messages:
    29,847
    Likes Received:
    59,649
    Trophy Points:
    931
    SECURITY, MICROSOFT
    Microsoft: New malware can infect over 30K Windows PCs a day bleepingcomputer.com | Today

    Microsoft has warned of an ongoing campaign pushing a new browser hijacking and credential-stealing malware dubbed Adrozek which, at its peak, was able to take over more than 30,000 devices every day.
    upload_2020-12-11_19-35-12.png

    -----------------------------------------------------------

    Steam gaming platform with serious security gaps
    Posted on December 11, 2020 by Günter Born
    [​IMG]The Steam gaming platform has serious weaknesses. Check Point security researchers have found that attackers can exploit the bugs they find to repeatedly crash a player's session. But it is also possible to take over a victim's computer or to infect all other computers connected to a third-party server.

    -----------------------------------------------------------

    FireEye hacked, Red Team tools stolen
    Posted on 2020-12-09 by guenni
    [​IMG][ German]It is the absolute disaster for the partly CIA-owned security company FireEye. Suspected state hackers have penetrated their internal networks to search for customer data, but have also stolen their Red Team tools.

    FireEye: Sorry, we are hacked
    In a statement titled Unauthorized Access of FireEye Red Team Tools, FireEye admitted a hack on December 8, 2020. The message reads:

    A sophisticated, state-sponsored adversary stole FireEye Red Team tools. Since we believe that an opponent possesses these tools, and we don’t know if the attacker intends to use the stolen tools himself or to make them public, FireEye is publishing hundreds of countermeasures in this blog post to enable the broader security community to protect themselves against these tools.
     
    Last edited: Dec 11, 2020
  46. Dr. AMK

    Dr. AMK Living with Hope

    Reputations:
    3,961
    Messages:
    2,182
    Likes Received:
    4,654
    Trophy Points:
    281
    US cybersecurity agency warns suspected Russian hacking campaign broader than previously believed - CNNPolitics
    US government agencies breached by Russian-linked hackers

    US government agencies breached by Russian-linked hackers 01:30

    An alarming new alert issued by the Department of Homeland Security's cyber arm Thursday revealed that Russian hackers suspected of a massive, ongoing intrusion campaign into government agencies, private companies and critical infrastructure entities used a variety of unidentified tactics and not just a single compromised software program.


    US cybersecurity agency warns of 'grave risk' from massive hack


    U.S. Agencies Hit in Brazen Cyber -Attack by Suspected Russian Hackers
     
    Last edited: Dec 17, 2020
    Vasudev, etern4l and Papusan like this.
  47. Dr. AMK

    Dr. AMK Living with Hope

    Reputations:
    3,961
    Messages:
    2,182
    Likes Received:
    4,654
    Trophy Points:
    281
    Microsoft Was Exposed to SolarWinds as Hack Widens
     
    Papusan and etern4l like this.
  48. etern4l

    etern4l Notebook Virtuoso

    Reputations:
    2,931
    Messages:
    3,533
    Likes Received:
    3,499
    Trophy Points:
    331
    SovietWinds?
     
    Papusan, jclausius and Vasudev like this.
  49. Dr. AMK

    Dr. AMK Living with Hope

    Reputations:
    3,961
    Messages:
    2,182
    Likes Received:
    4,654
    Trophy Points:
    281
  50. Papusan

    Papusan Jokebook's Sucks! Dont waste your $$$ on Filthy

    Reputations:
    42,712
    Messages:
    29,847
    Likes Received:
    59,649
    Trophy Points:
    931
    [​IMG]

    SECURITY
    Critical bugs in Dell Wyse ThinOS allow thin client take over bleepingcomputer.com | Dec 21, 2020

    Almost a dozen Dell Wyse thin client models are vulnerable to critical issues that could be exploited by a remote attacker to run malicious code and gain access to arbitrary files...


    Thin clients are small form-factor computers used for remote desktop connections to a more powerful system. They are popular with organizations that don't need computers with high processing, storage, and memory on the network.

    It is estimated that more than 6,000 organizations, most of them from the healthcare sector, have deployed Dell Wyse thin clients on their networks...

    Dell has released ThinOS 9.x to address these issues. However, some of the affected models can no longer be upgraded:



      • Wyse 3020
      • Wyse 3030 LT
      • Wyse 5010
      • Wyse 5040 AIO
      • Wyse 5060
      • Wyse 7010
    CyberMDX recommends that organizations with the models above deployed on their networks disabled the use of FTP for the update procedure and rely on an alternative method for the task.

    -------------------------------------------------------------------

    2nd backdoor found on infected SolarWinds systems borncity.de posted on 2020-12-22 by guenni

    [​IMG]Security researchers and forensic experts have found two other malware variants, Supernova and CosmicGale, in systems infected with the SunBurst Trojan via SolarWinds Orion software. Security researchers suspect that there is a second hacking group at work.
     
    Last edited: Dec 21, 2020
← Previous pageNext page →