Security Alerts & News
by Tymoteusz A. Góral

History
#944 MIT graphene breakthrough could make chips one million times faster
US Army-funded researchers at MIT believe an optical equivalent of a "sonic boom" created using graphene could make chips a million times faster than they are today.

Researchers at MIT and several other universities have discovered that graphene can be used to slow light down below the speed of electrons to create an intense beam of light.

The researchers call the effect an "optic boom", since it is similar to the sonic boom caused by shock waves when a jet breaks the speed of sound.

In graphene, an electron "spews out plasmons" when it moves faster than the speed of the trapped light. The researchers believe this new way of converting electricity into light could pave the way for light-based circuits in ultra-compact computing devices.

MIT highlights that the research was supported by US Army Research Laboratory and the US Army Research Office, through MIT's Institute for Soldier Nanotechnologies.

MIT postdoc Ido Kaminer explains that using light instead of flowing electrons to move and store and data could push operating speeds up to vastly higher levels than those achieved by today's chips.
#943 Hackers in your network? Why kicking them out straight away is not always the best approach
It's time to face the facts: no matter how secure you might believe your corporate network to be, sooner or later, cybercriminals will find their way in.

They could enter using stolen credentials, they could find their way in using malware, or they could be in the system for some time before you realise something is wrong.

You understandably panic when hackers have infiltrated your network and look to shutdown the infected PCs, because that's the correct thing to do, right? Wrong. The FBI has warned that while this might be an understandable impulse, it's not always the right decision.

"When we come into an incident, most people want to immediately fix it, they want it to go away as fast as possible," said Kurt Pipal, assistant legal attaché at the Office of the Legal Attaché for the FBI in the UK, speaking during panel on law enforcement and cybercrime at Infosecurity Europe 16 in London.

"I get that, it's a driver from a business perspective. However, not understanding the true intrusion events could mean you don't clear it out -- they're called 'advanced persistent threats' for a reason."
#942 Huge spam and malware network goes offline
One of the biggest networks of spam-sending computers in the world has gone quiet, puzzling experts, internet security firms have said.

For years the Necurs botnet has distributed junk mail and malware for many different groups of cyber-thieves.

But the amount of malicious traffic emerging from Necurs has now dwindled to almost nothing.

It is not clear what has caused the slowdown and whether traffic will return to previously high levels.

One of the first signs of the disruption was seen earlier this month when email messages spreading the Dridex banking trojan and Locky ransomware caught by security firms dried up.
#941 Connected cars: The open road for hackers (PDF)
Today, most vehicle functions – steering, acceleration, braking, remote start, and even unlocking the doors – are controlled by software that accepts commands from a diverse array of digital systems operating both inside and outside the vehicle. However, this software contains millions of lines of code, and in these lines of code there may be vulnerabilities that can be exploited by individuals with malicious intent.

FireEye iSIGHT Intelligence analysts and Mandiant consultants reviewed the key threats to interior and exterior vehicle systems and assessed the top five threats created by vehicle software vulnerabilities.
#940 Communications of the Bolek Trojan
A few weeks ago CERT Poland released a short blog post introducing a new malware family now known as Bolek. PhishMe and Dr.Web have since added some additional insight into the family. Browsing through a memory dump of the malware, a Webinjects section sticks out. Webinjects usually imply banking malware, so it seems Bolek picks up where its predecessor, Carberp, leaves off. This post takes a closer look at its command and control (C2) mechanism and what it takes to elicit a configuration file from its C2 servers.
#939 Hacker puts 51 million file sharing accounts for sale on dark web
Users accounts for iMesh, a now defunct file sharing service, are for sale on the dark web.

The New York-based music and video sharing company was a peer-to-peer service, which rose to fame in the file sharing era of the early-2000s, riding the waves of the aftermath of the "dotcom" boom. After the Recording Industry Association of America (RIAA) sued the company in 2003 for encouraging copyright infringement, the company was given status as the first "approved" peer-to-peer service.

At its peak in 2009, the service became the third-largest service in the US. But last month, iMesh unexpectedly shut down after more than a decade in business.

LeakedSource, a breach notification site that allows users to see if their details have been leaked, has obtained the database.
#938 Google Chrome bug enabled crooks to send malicious code to your browser as PDF files
Google has recently patched a high severity security bug in the Chrome browser that allowed crooks to send malicious code to your browser and take over your entire system.

The issue, tracked by the CVE-2016-1681 identifier, affects the browser's built-in PDF reader called PDFium.

Google patched the issue with the release of Chrome 51.0.2704.63, released on May 25. In the meantime, Chrome released another wave of security updates at the start of June.

Cisco's Aleksandar Nikolic was the researcher that discovered and reported the issue to Google, who even awarded him $3,000 for his efforts.

According to the researcher's account, the issue was discovered six days earlier, on May 19, and Google's team fixed it right away.
History
2017: 01 02 03 04 05
2016: 01 02 03 04 05 06 07 08 09 10 11 12