⚠ Update now! WordPress sites vulnerable to WooCommerce plugin flaw ⚠
📖 Read
via "Naked Security".
Researchers have published details of a dangerous flaw in the way the hugely popular WooCommerce plugin interacts with WordPress that could allow an attacker with access to a single account to take over an entire site.📖 Read
via "Naked Security".
Naked Security
Update now! WordPress sites vulnerable to WooCommerce plugin flaw
Researchers have published details of a dangerous flaw in the way the hugely popular WooCommerce plugin interacts with WordPress that could allow an attacker with access to a single account to take…
⚠ Sent a photo to the wrong person? Facebook Messenger to let you unsend it ⚠
📖 Read
via "Naked Security".
Think fast! You'll only have up to 10 minutes to hit unsend: a lot stingier than the hour afforded by WhatsApp.📖 Read
via "Naked Security".
Naked Security
Sent a photo to the wrong person? Facebook Messenger to let you unsend it
Think fast! You’ll only have up to 10 minutes to hit unsend: a lot stingier than the hour afforded by WhatsApp.
⚠ 258,000 encrypted IronChat phone messages cracked by police ⚠
📖 Read
via "Naked Security".
They expect to cuff hundreds of criminals who used the pricey phones, which were sold with the crypto app preinstalled.📖 Read
via "Naked Security".
Naked Security
258,000 encrypted IronChat phone messages cracked by police
They expect to cuff hundreds of criminals who used the pricey phones, which were sold with the crypto app preinstalled.
🔐 How to install the SIPp testing tool on Ubuntu Server 18.04 🔐
📖 Read
via "Security on TechRepublic".
If you need to stress test your VOIP (or other SIP telephony systems) installation, there's an open source tool for that. Jack Wallen shows you how to install and use SIPp.📖 Read
via "Security on TechRepublic".
TechRepublic
How to install the SIPp testing tool on Ubuntu Server 18.04
If you need to stress test your VOIP (or other SIP telephone systems) installation, there's an open source tool for that—SIPp.
🕴 Vulnerabilities in our Infrastructure: 5 Ways to Mitigate the Risk 🕴
📖 Read
via "Dark Reading: ".
By teaming up to address key technical and organizational issues, information and operational security teams can improve the resiliency and safety of their infrastructure systems.📖 Read
via "Dark Reading: ".
Dark Reading
Vulnerabilities in Our Infrastructure: 5 Ways to Mitigate the Risk
By teaming up to address key technical and organizational issues, information and operational security teams can improve the resiliency and safety of their infr
🕴 The Morris Worm Turns 30 🕴
📖 Read
via "Dark Reading: ".
How the historic Internet worm attack of 1988 has shaped security - or not.📖 Read
via "Dark Reading: ".
Darkreading
The Morris Worm Turns 30
How the historic Internet worm attack of 1988 has shaped security – or not.
❌ Embracing the Cybersecurity ‘Grey Space’ ❌
📖 Read
via "Threatpost | The first stop for security news".
Security teams carefully monitor potential threat activity, but incidents aren’t always black and white.📖 Read
via "Threatpost | The first stop for security news".
Threat Post
Embracing the Cybersecurity ‘Grey Space’
Security teams carefully monitor potential threat activity, but incidents aren’t always black and white.
❌ Threatpost News Wrap Podcast for Nov. 9 ❌
📖 Read
via "Threatpost | The first stop for security news".
The Threatpost editors break down the top news stories from this week.📖 Read
via "Threatpost | The first stop for security news".
Threat Post
Threatpost News Wrap Podcast for Nov. 9
The Threatpost editors break down the top news stories from this week.
❌ ThreatList: Google Play Nine Times Safer Than Third-Party App Stores ❌
📖 Read
via "Threatpost | The first stop for security news".
Out of the 2 billion Android users out there, the rate of potential malware infection is less than 1 percent across the board, Google says.📖 Read
via "Threatpost | The first stop for security news".
Threat Post
ThreatList: Google Play Nine Times Safer Than Third-Party App Stores
Out of the 2 billion Android users out there, the rate of potential malware infection is less than 1 percent across the board, Google says.
🔐 How to install the SIPp testing tool on Ubuntu Server 18.04 🔐
📖 Read
via "Security on TechRepublic".
If you need to stress test your VOIP (or other SIP telephone systems) installation, there's an open source tool for that—SIPp.📖 Read
via "Security on TechRepublic".
TechRepublic
How to install the SIPp testing tool on Ubuntu Server 18.04
If you need to stress test your VOIP (or other SIP telephone systems) installation, there's an open source tool for that—SIPp.
🕴 Guilty Plea Made in Massive International Cell Phone Fraud Case 🕴
📖 Read
via "Dark Reading: ".
A former West Palm Beach resident is the fifth defendant to plead guilty in a case involving thousands of victims.📖 Read
via "Dark Reading: ".
Dark Reading
Guilty Plea Made in Massive International Cell Phone Fraud Case
A former West Palm Beach resident is the fifth defendant to plead guilty in a case involving thousands of victims.
🕴 What You Should Know About Grayware (and What to Do About It) 🕴
📖 Read
via "Dark Reading: ".
Grayware is a tricky security problem, but there are steps you can take to defend your organization when you recognize the risk.📖 Read
via "Dark Reading: ".
Darkreading
What You Should Know About Grayware (and What to Do About It)
Grayware is a tricky security problem, but there are steps you can take to defend your organization when you recognize the risk.
🕴 Dropbox Teams with Israeli Security Firm Coronet 🕴
📖 Read
via "Dark Reading: ".
The partnership is expected to improve threat detection for Dropbox while growing Coronet's user base.📖 Read
via "Dark Reading: ".
Dark Reading
Dropbox Teams with Israeli Security Firm Coronet
The partnership is expected to improve threat detection for Dropbox while growing Coronet's user base.
<b>⌨ Bug Bounty Hunter Ran ISP Doxing Service ⌨</b>
<code>A Connecticut man who’s earned bug bounty rewards and public recognition from top telecom companies for finding and reporting security holes in their Web sites secretly operated a service that leveraged these same flaws to sell their customers’ personal data, KrebsOnSecurity has learned.</code><code>In May 2018, ZDNet ran a story about the discovery of a glaring vulnerability in the Web site for wireless provider T-Mobile that let anyone look up customer home addresses and account PINs. The story noted that T-Mobile disabled the feature in early April after being alerted by a 22-year-old “security researcher” named Ryan Stevenson, and that the mobile giant had awarded Stevenson $1,000 for reporting the discovery under its bug bounty program.</code><code>Media</code><code>The Twitter account @phobia, a.k.a. Ryan Stevenson. The term “plug” referenced next to his Twitch profile name is hacker slang for employees at mobile phone stores who can be tricked or bribed into helping with SIM swap attacks.</code><code>Likewise, AT&T has recognized Stevenson for reporting security holes in its services. AT&T’s bug bounty site lets contributors share a social media account or Web address where they can be contacted, and in Stevenson’s case he gave the now-defunct Twitter handle “@Phoobia.”</code><code>Stevenson’s Linkedin profile — named “Phobias” — says he specializes in finding exploits in numerous Web sites, including hotmail.com, yahoo.com, aol.com, paypal.com and ebay.com. Under the “contact info” tab of Stevenson’s profile it lists the youtube.com account of “Ryan” and the Facebook account “Phobia” (also now deleted).</code><code>Coincidentally, I came across multiple variations on this Phobia nickname as I was researching a story published this week on the epidemic of fraudulent SIM swaps, a complex form of mobile phone fraud that is being used to steal millions of dollars in cryptocurrencies.</code><code>Unauthorized SIM swaps also are often used to hijack so-called “OG” user accounts — usually short usernames on top social network and gaming Web sites that are highly prized by many hackers because they can make the account holder appear to have been a savvy, early adopter of the service before it became popular and before all of the short usernames were taken. Some OG usernames can be sold for thousands of dollars in underground markets.</code><code>This week’s SIM swapping story quoted one recent victim who lost $100,000 after his mobile phone number was briefly stolen in a fraudulent SIM swap. The victim said he was told by investigators in Santa Clara, Calif. that the perpetrators of his attack were able to access his T-Mobile account information using a specialized piece of software that gave them backdoor access to T-Mobile’s customer database.</code><code>Both the Santa Clara investigators and T-Mobile declined to confirm or deny the existence of this software. But their non-denials prompted me to start looking for it on my own. So naturally I began searching at ogusers-dot-com, a forum dedicated to the hacking, trading and sale of OG accounts. Unsurprisingly, ogusers-dot-net also has traditionally been the main stomping grounds for many individuals involved in SIM swapping attacks.</code><code>It didn’t take long to discover an account on ogusers-dot-com named “Ryan,” who for much of 2018 has advertised a number of different “doxing” services — specifically those aimed at finding the personal information of customers at major broadband and telecom companies.</code><code>In some of Ryan’s sales threads, fellow forum members refer to him as “Phob” or “Phobs.” In a post on May 27, Ryan says he’s willing to pay or trade for OG accounts under the name “Ryan,” “Ryans”, “RS,” “RMS” or “Stevenson” on any decent sized popular Web site. “hmu [hit me up] in a pm [private message] to talk,” Ryan urged fellow forum members.</code><code>Media</code><code>The OG User forum…
<code>A Connecticut man who’s earned bug bounty rewards and public recognition from top telecom companies for finding and reporting security holes in their Web sites secretly operated a service that leveraged these same flaws to sell their customers’ personal data, KrebsOnSecurity has learned.</code><code>In May 2018, ZDNet ran a story about the discovery of a glaring vulnerability in the Web site for wireless provider T-Mobile that let anyone look up customer home addresses and account PINs. The story noted that T-Mobile disabled the feature in early April after being alerted by a 22-year-old “security researcher” named Ryan Stevenson, and that the mobile giant had awarded Stevenson $1,000 for reporting the discovery under its bug bounty program.</code><code>Media</code><code>The Twitter account @phobia, a.k.a. Ryan Stevenson. The term “plug” referenced next to his Twitch profile name is hacker slang for employees at mobile phone stores who can be tricked or bribed into helping with SIM swap attacks.</code><code>Likewise, AT&T has recognized Stevenson for reporting security holes in its services. AT&T’s bug bounty site lets contributors share a social media account or Web address where they can be contacted, and in Stevenson’s case he gave the now-defunct Twitter handle “@Phoobia.”</code><code>Stevenson’s Linkedin profile — named “Phobias” — says he specializes in finding exploits in numerous Web sites, including hotmail.com, yahoo.com, aol.com, paypal.com and ebay.com. Under the “contact info” tab of Stevenson’s profile it lists the youtube.com account of “Ryan” and the Facebook account “Phobia” (also now deleted).</code><code>Coincidentally, I came across multiple variations on this Phobia nickname as I was researching a story published this week on the epidemic of fraudulent SIM swaps, a complex form of mobile phone fraud that is being used to steal millions of dollars in cryptocurrencies.</code><code>Unauthorized SIM swaps also are often used to hijack so-called “OG” user accounts — usually short usernames on top social network and gaming Web sites that are highly prized by many hackers because they can make the account holder appear to have been a savvy, early adopter of the service before it became popular and before all of the short usernames were taken. Some OG usernames can be sold for thousands of dollars in underground markets.</code><code>This week’s SIM swapping story quoted one recent victim who lost $100,000 after his mobile phone number was briefly stolen in a fraudulent SIM swap. The victim said he was told by investigators in Santa Clara, Calif. that the perpetrators of his attack were able to access his T-Mobile account information using a specialized piece of software that gave them backdoor access to T-Mobile’s customer database.</code><code>Both the Santa Clara investigators and T-Mobile declined to confirm or deny the existence of this software. But their non-denials prompted me to start looking for it on my own. So naturally I began searching at ogusers-dot-com, a forum dedicated to the hacking, trading and sale of OG accounts. Unsurprisingly, ogusers-dot-net also has traditionally been the main stomping grounds for many individuals involved in SIM swapping attacks.</code><code>It didn’t take long to discover an account on ogusers-dot-com named “Ryan,” who for much of 2018 has advertised a number of different “doxing” services — specifically those aimed at finding the personal information of customers at major broadband and telecom companies.</code><code>In some of Ryan’s sales threads, fellow forum members refer to him as “Phob” or “Phobs.” In a post on May 27, Ryan says he’s willing to pay or trade for OG accounts under the name “Ryan,” “Ryans”, “RS,” “RMS” or “Stevenson” on any decent sized popular Web site. “hmu [hit me up] in a pm [private message] to talk,” Ryan urged fellow forum members.</code><code>Media</code><code>The OG User forum…
🕴 Inside CSAW, a Massive Student-Led Cybersecurity Competition 🕴
📖 Read
via "Dark Reading: ".
Nearly 400 high school, undergraduate, and graduate students advance to the final round of New York University's CSAW games.📖 Read
via "Dark Reading: ".
Dark Reading
Inside CSAW, a Massive Student-Led Cybersecurity Competition
Nearly 400 high school, undergraduate, and graduate students advance to the final round of New York University's CSAW games.
❌ Recently-Patched Adobe ColdFusion Flaw Exploited By APT ❌
📖 Read
via "Threatpost | The first stop for security news".
The critical vulnerability, which was patched earlier in September, has put ColdFusion servers at risk.📖 Read
via "Threatpost | The first stop for security news".
Threat Post
Recently-Patched Adobe ColdFusion Flaw Exploited By APT
The critical vulnerability, which was patched earlier in September, has put ColdFusion servers at risk.
❌ Lawsuits Aim Billions in Fines at Equifax and Ad-Targeting Companies ❌
📖 Read
via "Threatpost | The first stop for security news".
The results could start a wave of major damages for companies that collect and sell consumer information.📖 Read
via "Threatpost | The first stop for security news".
Threat Post
Lawsuits Aim Billions in Fines at Equifax and Ad-Targeting Companies
The results could start a wave of major damages for companies that collect and sell consumer information.
ATENTION‼ New - CVE-2017-17550
📖 Read
via "National Vulnerability Database".
ZyXEL ZyWALL USG 2.12 AQQ.2 and 3.30 AQQ.7 devices are affected by a CSRF vulnerability via a cgi-bin/zysh-cgi cmd action to add a user account. This account's access could, for example, subsequently be used for stored XSS.📖 Read
via "National Vulnerability Database".
🔐 Eight reasons more CEOs will be fired over cybersecurity breaches 🔐
📖 Read
via "Security on TechRepublic".
Security is everyone's problem, but CEOs should make sure their organisation doesn't block its success. Gartner offers eight situations for CEOs to avoid if a breach occurs within their organisation.📖 Read
via "Security on TechRepublic".
TechRepublic
Eight reasons more CEOs will be fired over cybersecurity breaches
Security is everyone's problem, but CEOs should make sure their organisation doesn't block its success. Gartner offers eight situations for CEOs to avoid if a breach occurs within their organisation.
⚠ Monday review – the hot 21 stories of the week ⚠
📖 Read
via "Naked Security".
From the 'Martinelli' WhatsApp hoax to Facebook wanting to give your name to the weirdo next to you, and everything in between. Catch up with this and everything we wrote in the last seven days - it's weekly roundup time!📖 Read
via "Naked Security".
Naked Security
Monday review – the hot 21 stories of the week
From the ‘Martinelli’ WhatsApp hoax to Facebook wanting to give your name to the weirdo next to you, and everything in between. Catch up with this and everything we wrote in the last se…
⚠ Microsoft mistake leaves Windows 10 users fuming ⚠
📖 Read
via "Naked Security".
Microsoft Windows 10 users were livid late last week after Microsoft mistakenly told them that their licenses were invalid.📖 Read
via "Naked Security".