A pair of security researchers have proposed an extension to the Transport Layer Security (TLS) protocol that would allow browsers to detect and block fraudulently-issued SSL certificates.
Lucian Constantin |
24 May |
Read more
Yahoo was forced to release a new version of its Axis extension for Google Chrome after the original one contained a private key that allowed anyone to digitally sign extensions in Yahoo's name.
Lucian Constantin |
24 May |
Read more
The creator of the Bredolab malware received a four-year prison sentence in Armenia on Monday for using his botnet to launch DDoS (distributed denial-of-service) attacks that damaged multiple computer systems owned by private individuals and organizations.
Lucian Constantin |
23 May |
Read more
A new variant of SpyEye malware allows cybercriminals to monitor potential bank fraud victims by hijacking their webcams and microphones, according to security researchers from antivirus vendor Kaspersky Lab.
Lucian Constantin |
23 May |
Read more
Malware writers have used Crossrider, a cross-browser extension development framework, to build a click-fraud worm that spreads on Facebook, security researchers from antivirus firm Kaspersky Lab said on Monday.
Lucian Constantin |
22 May |
Read more
A new variant of the Zeus trojan tricks users into exposing their debit card details by displaying rogue offers when they visit Facebook, Gmail, Yahoo and Hotmail, according to researchers from security firm Trusteer.
Lucian Constantin |
16 May |
Read more
Visitors to Wikipedia who see advertisements on the site have most likely fallen victim to a browser-based malware infection, Wikimedia Foundation, the organization operating the website, said on Monday.
Lucian Constantin |
16 May |
Read more
Bitcoin exchange site Bitcoinica suspended its operations on Friday after hackers managed to steal 18,547 bitcoins -- valued at about US$90,000 -- from its online wallet.
Lucian Constantin |
15 May |
Read more
The U.K. website of Amnesty International, a human rights watchdog organization, was compromised by hackers, who used it to infect visitors with a remote access Trojan horse program known as Gh0st RAT, security firm Websense reported on Friday.
Lucian Constantin |
12 May |
Read more
Booby-trapped RTF documents are one of the most common types of malicious Microsoft Office files that are used to infect computers with advanced persistent threats (APTs), according to security researchers from Trend Micro.
Lucian Constantin |
11 May |
Read more
A ransomware application that locks computers and asks their owners to pay fines for allegedly violating several laws through their online activity is targeting U.S. and Canadian users, malware experts from security firm Trend Micro said on Wednesday.
Lucian Constantin |
10 May |
Read more
The PHP Group has released PHP 5.4.3 and PHP 5.3.13 on Tuesday in order to address two remote code execution vulnerabilities, one of which is being actively exploited by hackers.
Lucian Constantin |
09 May |
Read more
A piece of financial malware called Tatanga attempts to trick online banking users into authorizing rogue money transfers from their accounts as part of the activation procedure for a free credit-card fraud insurance service purportedly provided by their banks, security researchers from Trusteer said Tuesday.Tatanga is an online banking Trojan horse that was first discovered in May 2011. It is able to inject rogue Web pages into browsing sessions and affects nine different browsers, including Internet Explorer, Mozilla Firefox, Google Chrome, Opera and Safari.The malware is known to use social engineering techniques against victims in order to bypass security measures enforced by banks, like one-time passwords (OTPs) or transaction authorization numbers (TANs).A new Tatanga configuration detected recently by Trusteer displays a rogue message inside the browser when the victim authenticates on their bank's website, claiming that their bank is offering free credit-card fraud insurance to all customers.The message claims that the new service is provided in partnership with Visa and MasterCard and covers losses that might result from fraudulent online transactions performed with the victim's credit or debit card. The malware grabs the user's real account balance, rounds it up, and presents the result as the allegedly insured sum.The rogue message includes a bank account number that's supposed to be the victim's new insurance account opened by the bank. However, in reality, this account belongs to a money mule -- an individual paid to receive money from fraudulent activity on behalf of cybercriminals -- said Ayelet Heyman, a security researcher at Trusteer, in a blog post Tuesday.The user is told that to activate the service they need to authorize a transaction from their bank account to their new insurance account. In order to do this, they need to input the transaction authorization code sent by their bank to their mobile phone number.This code allows the malware to finalize the rogue transfer in the background and send the victim's money to the money mule. "In all likelihood, the victim does not expect any funds will be transferred out of their account," Heyman said.The maximum sum that is transferred by the malware in a single transaction is €5,000 or about US$6,500. "We can assume that fraudsters have identified this amount (5,000 Euros) as the upper threshold that triggers the bank to address the transaction as high risk," Heyman said via email.The rogue message displayed by the Tatanga configuration analyzed by Trusteer is written in Spanish, which suggests that it targets users in Spain or other Spanish-speaking countries. The company hasn't seen a version of this attack in a different language yet, but the malware is known to have targeted users in other European countries and the U.S. in the past, Heyman said via email.The Trusteer researcher advises users to call their banks over the phone and check the validity of sudden announcements or requests that appear on banking websites. If an online banking website suddenly starts asking users for sensitive information like card security codes or PIN numbers, it's most likely because of a malware infection, he said via email.Users should also install the security software recommended or supplied by their financial institution and should use some type of browser-based security solution that prevents financial fraud, Heyman said.
Lucian Constantin |
09 May |
Read more
The PHP Group plans to release new versions of the PHP processor on Tuesday in order to patch two publicly known critical remote code execution vulnerabilities, one of which was improperly addressed in a May 3 update.
Lucian Constantin |
07 May |
Read more
Instructions on how to exploit an unpatched Oracle Database Server vulnerability in order to intercept the information exchanged between clients and databases were published by a security researcher who erroneously thought that the company had patched the flaw.
Lucian Constantin |
28 Apr |
Read more