Security Alerts & News
by Tymoteusz A. Góral

History
#445 FTC warns app developers over use of audio tracking code
The Federal Trade Commission is warning a dozen developers about some code they’ve included in their apps that can surreptitiously listen to unique audio signals from TVs in the background and build detailed profiles of what consumers are watching. The technology, produced by a company called SilverPush, is used to track users across devices and the FTC warned the developers that if they don’t disclose the use of the code to consumers, they could be violating the FTC Act.
#444 UK: Bank of England to work with National Cyber Security Centre
The first task of Britain's new cybersecurity centre will be to work with the Bank of England, the government has announced.

The work will involve setting standards for the financial sector in terms of resilience to the type of cyber threats which could undermine the UK economy.

The new body - now renamed the National Cyber Security Centre (NCSC) - was unveiled last year by the Chancellor.
#443 Online banking threats in 2015: the curious case of DRIDEX’s prevalence
DRIDEX’s continued prevalence could be attributed to two main factors: the botnet’s efficient delivery mechanism, which leads to more affected users; and its resilient peer-to-peer infrastructure that allows it to continue its operation. We also surmise that DRIDEX is being peddled in cybercriminal underground markets, allowing other cybercriminals and attackers to use botnet for their malicious activities.
#442 TeslaCrypt 3.0.1 - Tales From The Crypt(o)!
Ransomware is malicious software that is designed to hold users' files (such as photos, documents, and music) for ransom by encrypting their contents and demanding the user pay a fee to decrypt their files. Typically, users are exposed to ransomware via email phishing campaigns and exploit kits. TeslaCrypt is one well-known ransomware variant, infecting many victims worldwide. It is in the top 5 of ransomware we see most often in our analysis systems. The core functionality of TeslaCrypt 3 remains the same as it continues to encrypt users’ files and then presents a message demanding the user to pay a ransom.
#441 An iCloud scam that may be worse than ransomware
A hacker had somehow gotten access to iCloud account. Using this, he was able to remotely lock a computer using iCloud’s Find My Mac feature, with a ransom message displayed on the screen.
#440 Spammers abusing trust in US .gov domains
Spammers are abusing ill-configured U.S. dot-gov domains and link shorteners to promote spammy sites that are hidden behind short links ending in”usa.gov”.
#439 Once thought safe, DDR4 memory shown to be vulnerable to “Rowhammer”
Physical weaknesses in memory chips that make computers and servers susceptible to hack attacks dubbed "Rowhammer" are more exploitable than previously thought and extend to DDR4 modules, not just DDR3, according to a recently published research paper.

The tests showed many of the DIMMs were vulnerable to a phenomenon known as "bitflipping," in which 0s were converted to 1s and vice versa. The report was published by Third I/O, an Austin, Texas-based provider of high-speed bandwidth and super computing technologies. The findings were presented over the weekend at the Semicon China conference.
History
2017: 01 02 03 04 05
2016: 01 02 03 04 05 06 07 08 09 10 11 12