Security Alerts & News
by Tymoteusz A. Góral

History
#62 Facebook Now the Subject of New Malware Attack
Researchers at the Threat Research Lab have identified a phishing campaign targeted at businesses and consumers who use Facebook – most likely designed by the same cyber criminals who developed the WhatsApp malware.
#61 FBI May Have Hacked Innocent TorMail Users
Researchers suspected the agency had also deployed a network investigative technique (NIT)—the FBI's term for a hacking tool—to infect users of the site. Now, confirmation of that hacking campaign has come about buried in a Washington Post report on the FBI's recent NIT usage.
#60 Media devices sold to feds have hidden backdoor with sniffing functions
A company that supplies audio-visual and building control equipment to the US Army, the White House, and other security-conscious organizations built a deliberately concealed backdoor into dozens of its products that could possibly be used to hack or spy on users, security researchers said.
#59 Cisco fixes critical flaws in digital encoder, unified computing manager and security appliance
Cisco Systems has released software updates to fix critical issues that could allow attackers to compromise digital encoders, unified computing system management servers and Firepower 9000 series security appliances.
#58 Oracle Critical Patch Update Advisory - January 2016
A Critical Patch Update (CPU) is a collection of patches for multiple security vulnerabilities.
#57 Operation Emmental Revisited: Malicious Apps Lock Users Out
Imagine getting a notification from your bank, asking for your cooperation in installing an updated version of their mobile app. After downloading the app, it asks for administrator privileges. The notification you received said it would indeed prompt the question and so you allowed it. You try the app out and it works fine. You were even able to do a transaction without a hitch.
#56 Dridex Launches Dyre-Like Attacks in UK, Intensifies Focus on Business Accounts
IBM X-Force researchers have been following new developments in the Dridex Trojan’s attack methodologies. In their latest alert, researchers divulged a new modus operandi launched by Evil Corp, the cybercrime group that owns and operates the Dridex banking Trojan.
History
2017: 01 02 03 04 05
2016: 01 02 03 04 05 06 07 08 09 10 11 12