Security Alerts & News
by Tymoteusz A. Góral

#576 Google developers create API for direct USB access via web pages
Two Google developers, Reilly Grant and Ken Rockot, have uploaded an unofficial (for now) draft to the World Wide Web Consortium's Web Incubator Community Group (W3C WICG) that describes a method of interconnecting USB-capable devices to Web pages.

The WebUSB API draft, published on March 21, describes an API (Application Program Interface) that will provide a safe way to expose USB-capable devices to Web services.

This API doesn't address USB thumb drives as some of you might think, but all devices that connect to PCs through USB ports, and can vary from USB keyboards to complex Internet of Things (IoT) equipment.
#575 Surveillance cameras sold on Amazon infected with malware
Security researcher Mike Olsen has warned that some products sold through the Amazon marketplace are habouring a dark secret -- malware.

Olsen said in a blog post that while scouring Amazon for a decent set of outdoor surveillance cameras for a friend, he came across a deal for 6 PoE cameras and recording equipment.

The seller, Urban Security Group, had generally good reviews and was offering a particular Sony setup on sale.
#574 More big-name sites hit by rash of malicious ads that attack end users
Some of the Netherland' most popular websites have fallen victim to a malvertising campaign that managed to compromise a widely used ad platform, security researchers reported on Monday.

The malicious ads were served over at least 11 sites including, the Netherlands equivalent to eBay and the country's seventh most visited website, according to a blog post published by security firm Fox IT. Other affected sites included news site (which is ranked No. 14), weather site (54), and (67). Other widely visited sites were operated by commercial TV stations and magazines.
#573 Sweden military servers hacked, used in 2013 attack on US banks
The attack knocked out the web pages of as many as 20 major US banks and financial institutions, sometimes for several days.

Speaking to AFP, military spokesman Mikael Abramsson said that a server in the Swedish defense system had a flaw which was exploited by hackers to carry out the attacks, confirming a report in the Swedish daily DN.
#572 Petya ransomware encryption system cracked
An unidentified programmer has produced a tool that exploits shortfalls in the way the malware encrypts a file that allows Windows to start up.

In notes put on code-sharing site Github, he said he had produced the key generator to help his father-in-law unlock his Petya-encrypted computer.

The malware, which started circulating in large numbers in March, demands a ransom of 0.9 bitcoins (£265).

It hid itself in documents attached to emails purporting to come from people looking for work.
#571 Syrian government hacked, 43 GB of data spilled online by hacktivists
Analysts from Risk Based Security (RBS) examined the data dump, which they say contained 38,768 folders with 274,477 files from 55 different website domains, belonging to both national agencies and private companies. The data contained database dumps, and even server passwords.
#570 Academics claim Google Android two-factor authentication is breakable
If attackers have control over the browser on the PC of a user using Google services (like Gmail, Google+, etc.), they can push any app with any permission on any of the user's Android devices, and activate it - allowing one to bypass 2-factor authentication via the phone. Moreover, the installation can be stealthy (without any icon appearing on the screen). For short, we refer to the vulnerability as the BAndroid (Browser-to-Android) vulnerability and to attacks that abuse it as BAndroid attacks.
#569 A look into Adobe Flash player CVE-2016-1019 0-day attack
CVE-2016-1019 affects all versions of Adobe Flash Player but is only currently exploitable to versions and earlier. It is a type confusion vulnerability which exists in Action script 2 FileReference class’s type checking mechanism.
#568 Mumblehard takedown ends army of Linux servers from spamming
One year after the release of the technical analysis of the Mumblehard Linux botnet, we are pleased to report that it is no longer active. ESET, in cooperation with the Cyber Police of Ukraine and CyS Centrum LLC, have taken down the Mumblehard botnet, stopping all its spamming activities since February 29th, 2016.
#567 Big data's biggest problem: It's too hard to get the data in
While big data has been turned into more of a marketing term than a technology, it still has enormous untapped potential. But, one big issue has to get solved first.
2017: 01 02 03 04 05
2016: 01 02 03 04 05 06 07 08 09 10 11 12