Security Alerts & News
by Tymoteusz A. Góral

#1265 BlackHat2016: badWPAD – The doubtful legacy of the WPAD protocol
WPAD is a protocol that allows computers to automatically discover Web proxy configurations and is primarily used in networks where clients are only allowed to communicate to the outside world through a proxy – which is the case in most enterprises. To easily configure proxy settings for different types of applications which require an internet connection, WPAD, also known as “autoproxy”, was first implemented and promoted by Netscape® 2.0 in 19961 for Netscape Navigator® 2.0. The tool can apply to any system that supports proxy auto-discovery, like most browsers, operating systems and some applications not working from operating systems.

Warnings of security issues have been around for many years. These risks have been recognized in the security community for years, but for some reason been left largely ignored. In fact it is relatively easy to exploit WPAD. In basic terms, the security issue with the WPAD protocol revolves around the idea that whenever the protocol makes a request to a proxy, anyone else can create a service that answers that request and can practically impersonate the real web proxy (Man-in-the-Middle attack).
Read more
#1270 Can you trust that invoice? Nigerian 419 scammers ply new wire-wire trade via compromised email
#1269 Italian malware is spying on Chinese Android users: But why?
#1268 Microsoft cranks up encryption in .Net framework
#1267 Fake Prisma apps found on Google Play
#1266 This ATM hack could allow thieves to make off with thousands
#1265 BlackHat2016: badWPAD – The doubtful legacy of the WPAD protocol
#1264 HEIST: HTTP encrypted Information can be stolen through TCP-windows (PDF)
#1263 Lack of encryption leads to large scale cookie exposure
#1262 Are smart city transport systems vulnerable to hackers?
#1261 Pokemon GO DDoS attacks postponed as PoodleCorp botnet suffers security breach
2017: 01 02 03 04 05
2016: 01 02 03 04 05 06 07 08 09 10 11 12