End-of-Shift report
Timeframe: Dienstag 17-09-2013 18:00 − Mittwoch 18-09-2013 18:00
Handler: Christian Wojner
Co-Handler: Matthias Fraidl
WordPress Simple Dropbox Upload Plugin Arbitrary File Upload Vulnerability
WordPress Simple Dropbox Upload Plugin Arbitrary File Upload Vulnerability
https://secunia.com/advisories/54856
Microsoft Releases Security Advisory 2887505
Today we released Security Advisory 2887505 regarding an issue that affects Internet Explorer. There are only reports of a limited number of targeted attacks specifically directed at Internet Explorer 8 and 9, although the issue could potentially affect all supported versions. This issue could allow remote code execution if an affected system browses to a website containing malicious content directed towards the specific browser type.
http://blogs.technet.com/b/msrc/archive/2013/09/17/microsoft-releases-security-advisory-2887505.aspx
Securo-boffins link HIRED GUN hackers to Aurora, Bit9 megahacks
Researchers: It was resourceful Hidden Lynx crew wot done it Security researchers have linked the 'Hackers for hire' Hidden Lynx Group with a number of high-profile attacks, including an assault on net security firm Bit9, as well as the notorious Operation Aurora assault against Google and other hi-tech firms back in 2009.
http://www.theregister.co.uk/2013/09/17/chinese_hackers4hire_crew/
Secure on Social Networks
During the past few years, the popularity of social networks has grown tremendously. They have come to form an important part of our communication. Although social networks offer a useful and fun interactive platform for the exchange and provision of information, they also present various security and privacy risks. This factsheet offers you an overview of the risks involved in participation in social networks.
http://www.ncsc.nl/english/services/expertise-advice/knowledge-sharing/factsheets/secure-on-social-networks.html
Study finds fraudsters foist one-third of all Tor traffic
Anonymizing network disproportionately associated with online skullduggery People who access the internet through the anonymizing Tor network are much more likely to be up to no good than are typical internet users, according to a study by online reputation tracking firm Iovation.
http://www.theregister.co.uk/2013/09/18/study_finds_onethird_of_all_tor_traffic_is_fraudulent/
Look at risk before leaping into BYOD, report cautions
Risk management critical to skirting pitfalls of permitting personal devices in the office
http://www.csoonline.com/article/739937/look-at-risk-before-leaping-into-byod-report-cautions?source=rss_application_security
Connecting the Dots: Fake Apps, Russia, and the Mobile Web
The existence of fake mobile apps poses privacy and financial risks to users of the mobile web. As experts figure out the dangers of the consumerization and the lack of security of mobile devices, fake apps continue to grow.
http://blog.trendmicro.com/trendlabs-security-intelligence/connecting-the-dots-fake-apps-russia-and-the-mobile-web
IBM Domino / iNotes Buffer Overflow Vulnerability
IBM Domino / iNotes Buffer Overflow Vulnerability
https://secunia.com/advisories/54895
Betrüger locken Smartphone-Nutzer mit angeblicher Werbung für G Data
Werbung in Android-Applikationen soll Nutzer dazu verleiten, teure Premium-SMS-Abos abzuschließen. G Data wehrt sich rechtlich gegen den Missbrauch des Markennames.
http://www.heise.de/security/meldung/Betrueger-locken-Smartphone-Nutzer-mit-angeblicher-Werbung-fuer-G-Data-1960528.html
Mozilla Firefox / Thunderbird Multiple Vulnerabilities
Some vulnerabilities have been reported in Mozilla Firefox and Thunderbird, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system.
https://secunia.com/advisories/54892
Researchers can slip an undetectable trojan into Intel's Ivy Bridge CPUS
New technique bakes super stealthy hardware trojans into chip silicon.
http://arstechnica.com/security/2013/09/researchers-can-slip-an-undetectable-trojan-into-intels-ivy-bridge-cpus/