Hacked sites far worse than attack sites

تاریخ ایجاد

ID: IRCNE2013061888
Date: 2013-06-26

According to "cnet", web sites you think are safe but have been compromised to distribute malicious software are far more prevalent than sites that are intentionally dangerous, according to a new Transparency Report from Google released on Tuesday.
The new Safe Browsing section of the report reveals some of the security trends that Google has been seeing. While Google reiterated that its Safe Browsing program flags up to 10,000 sites a day, the report showed that hacked sites remain a major problem -- with about 60 percent hosting malware and 40 percent being used for phishing attacks.
Dedicated attack sites numbered in the hundreds until late 2009, when they began to increase. They crested at the end of last year above 6,000, but that number has since dropped. As of June 9, 2013, Google reports the number of these malicious sites at 3,891.
Dramatically worse is the problem of compromised sites, Web sites that are supposed to be legitimately safe but that have been hacked to infect visitors.

برچسب‌ها

South Korean Web sites hit by hackers

تاریخ ایجاد

ID: IRCNE2013061887
Date: 2013-06-26

According to “ComputerWorldUK”, South Korea has suffered its latest cyberattack, and one that marked the 63rd anniversary of the start of the Korean War.
The country's science ministry said that multiple government and private sites were hit in Tuesday's hacking. Included in the attack were the site for the country's presidential Blue House and several media servers.
The South Korean government said that it's investigating further and has urged officials and citizens to secure their computer systems.
No potential suspects were named in the attack. In April, South Korea accused its neighbor to the north of launching a March cyberattack that affected tens of thousands of computers at banks and broadcasting stations.
A spokesman for South Korea's Internet agency told at the time that the attack mimicked past attempts by North Korea to hack into key Web sites.

برچسب‌ها

Source code for Carberp financial malware gets leaked online

تاریخ ایجاد

ID: IRCNE2013061886
Date: 2013-06-26

According to “ComputerWorld”, the source code for the Carberp financial malware has been leaked online, increasing the risk that other cybercriminals will create their own variants based on it, according to researchers from Russian cybercrime investigations firm Group-IB.
Carberp is a Trojan program used primarily to steal online banking credentials and other sensitive financial information from users. The malware originally targeted users from former Soviet Union states, but the cybercriminals behind it expanded their operations to other regions, like Australia.
Last week, a member of the Carberp gang offered to sell the source code for the malware and its other modules for only $5,000. Group-IB researchers said at the time that the sale was likely the result of an internal conflict within the gang.
According to them, the conflict appears to have since escalated and resulted in the source code, or at least a significant part of it, being leaked online.
On Monday, a Georgian security researcher named Ucha Gobejishvili said on Twitter that the source code for Carberp and its bootkit -- boot rootkit -- module have been leaked. Gobejishvili published a screen shot of a forum post announcing the leak and containing a link to a file hosting site where the password-protected source code archive was allegedly stored.
The file has since been removed from that location, but researchers from Group-IB confirmed that the leak is real.
The archive file contained the full source code for Carberp, but only the partial source code for the bootkit module, said Andrey Komarov, Group-IB's head of international projects, Tuesday via email. He expects the archive to be shared without a password on other cybercrime forums in upcoming days.
This will most likely result in the development of new Carberp variants and Carberp-based banking Trojan programs in the future, as happened with the Zeus financial malware, Komarov said.
The source code for Zeus, one of the most popular online banking Trojan programs to date, was leaked in April 2011, a few weeks after it was put up for sale on the underground market. That leak made a previously expensive crimeware toolkit available free to anyone and also enabled the development of Zeus-based Trojan programs like GameOver and Ice IX.

برچسب‌ها

Mobile malware grows by 614 percent in last year

تاریخ ایجاد

ID: IRCNE2013061885
Date: 2013-06-26

According to "cnet", mobile malware creators and smartphone makers seem to be in a neck-and-neck software race, but new data shows that the malware creators could be taking the lead.
Juniper Networks released its third annual Mobile Threat Report on Tuesday and the findings aren't pretty. Mobile malware grew at a rate of 614 percent from March 2012 to March 2013 -- that's equal to 276,259 malicious apps floating around out there. Last year, the increase was a mere 155 percent.
The report is based on an analysis of more than 1.85 million mobile apps and vulnerabilities across major mobile operating systems.
As operating systems are exploited at a growing rate, Juniper says it's clear that cybercriminals are becoming more entrepreneurial, savvy, and calculated. Rather than trying to crack into every system, they tend to go after the most popular: Android.
Worldwide, Android dominates nearly 60 percent of the smartphone market share, according to analyst firm Canalys; for comparison Apple has slightly more than 19 percent and Microsoft has 18 percent. According to Juniper, 92 percent of all detected mobile malware is targeted specifically at Android.
The majority of Android users haven't updated their devices to the newest version, which is another reason why cybercriminals prefer the operating system. As of this month, only 4 percent of Android users were running the latest OS, according to Juniper.
This isn't to say that other operating systems aren't vulnerable, however. Juniper warns that all operating systems can be exploited, including Apple's iOS.
The majority of malware attacks come to users via SMS Trojans, which trick users into sending text messages to numbers set up by cybercriminals. Forty-eight percent of the attacks are from these SMS Trojans, 29 percent are via fake installs, and 19 percent come from Trojan Spy malware.
To lower the risk of mobile malware infection, users should avoid buying apps from third-party app stores, update mobile operating systems to the most current version, and don't allow apps to access to private and personal information stored on devices.

برچسب‌ها

سه چهارم كاربران نگران حريم خصوصی آنلاين خود هستند

تاریخ ایجاد

شماره: IRCNE2013061884
تاريخ: 04/04/92

تحقيقات جديد كه توسط گروه Big Brother Watch انجام شده است نشان مي‌دهد كه بيش از سه چهارم كاربران، نگران حريم خصوصي آنلاين خود هستند.
در مطالعه‌اي بر روي 10354 نفر از 9 كشور نشان داده شد كه 79 درصد از كاربران اظهار كردند كه در مورد حريم خصوصي آنلاين خود نگران هستند. اين ميزان در هند 94% و در برزيل و اسپانيا 90% است.
اين نگراني در بريتانيا 68% و در آلمان كه يكي از قوي‌ترين قوانين محافظت از داده‌ها را در دنيا به خود اختصاص داده است، 56% ثبت شده است.
در مجموع 41% از كاربران احساس مي‌كنند كه مشتريان با جمع‌آوري حجم زيادي از داده‌ها توسط شركت‌هاي بزرگ آزار مي‌بينند. پاسخ‌گويان در كره جنوبي، بريتانيا، استراليا و فرانسه بيش از ديگران در اين مورد منتقد بودند در حالي‌كه كاربران برزيلي، هندي و اسپانيايي بيشتر با اين كار كنار مي‌آيند.

برچسب‌ها

جايزه مايكروسافت برای محققان امنيتی

تاریخ ایجاد

شماره: IRCNE2013061883
تاريخ: 04/04/92

مايكروسافت نيز بالاخره به جمع شركت‌هايي پيوست كه براي كشف حفره‌هاي امنيتي نرم‌افزارهاي خود، جايزه تعيين مي‌كنند.
برنامه جايزه كشف حفره‌هاي امنيتي IE11 از روز 26 ژوئن كه اين مرورگر به همراه ويندوز 8.1 در كنفرانس توسعه دهندگان BUILD عرضه خواهد شد، آغاز شده و تا 26 جولاي ادامه خواهد داشت. در اين 30 روز، مايكروسافت حداكثر 11 هزار دلار به ازاي هر آسيب‌پذيري به محققاني كه آسيب‌پذيري‌ها را كشف و گزارش كنند، خواهد پرداخت.
مايكروسافت بارها و بارها از پيوستن به برنامه جايزه در ازاي كشف آسيب‌پذيري كه گوگل و موزيلا مدت‌ها است آن را اجرا مي‌كنند، خودداري كرده است. اين شركت در سال 2011 تأكيد كرد كه يك مسابقه براي ارائه راه حل‌هاي امنيتي براي حل انواع مشكلات، روش بهتري خواهد بود.
همچنين اين شركت اين مسابقه را كه سال 2011 برگزار شده بود و نام BueHat Prize را به خود اختصاص داده بود، توسعه داده و به يك برنامه هميشگي BluHat Bonus for Defense تبديل كرده است كه حداكثر 50 هزار دلار به محققان براي راه حل‌هاي امنيتي دفاعي جديد خواهد پرداخت.
همچنين هزينه ديگري نيز براي برنامه جديد ديگري به نام Mitigation Bypass Bounty كنار گذاشته شده است كه حداكثر 100 هزار دلار به ازاي هر تكنيك سوء استفاده جديدي كه قادر باشد دفاع‌هاي متعدد ويندوز 8.1 را گير بيندازد، پرداخت خواهد كرد.

برچسب‌ها

كشف يک بدافزار گروگان‌گير اندرويد توسط سيمانتک

تاریخ ایجاد

شماره: IRCNE2013061882
تاريخ:04/03/92

اولين برنامه آنتي ويروس تقلبي كه كاربران اندرويد را مورد هدف قرار داده است توسط شركت سيمانتك كشف شد. اين برنامه آنتي ويروس تقلبي مي تواند مانند يك بدافزار گروگان گير عمل كند و كنترل دستگاه اندرويد قرباني را به عنوان گروگان در اختيار بگيرد.
هرزنامه هاي آنتي ويروس تقلبي براي مدت طولاني كامپيوترهاي شخصي مبتني بر ويندوز را مورد هدف قرار داده بودند و تلاش مي كردند تا قرباني را متقاعد كنند كه ويروسي بر روي كامپيوتر است كه اين آنتي ويروس تقلبي مي تواند آن را پاك كند. شركت سيمانتك اظهار داشت كه در حال حاضر اين هرزنامه ها دستگاه هاي اندرويد را مورد هدف قرار داده است و از طريق آنتي ويروس تقلبي با عنوان Android Defender كاربران اندرويد را فريب مي دهد.
متاسفانه برنامه آنتي ويروس تقلبي Android Defender برنامه اي است كه قربانيان به اشتباه آن را نصب مي كنند.
شركت سيمانتك در وبلاگ خود آورده است كه پس از آن كه برنامه مخرب بر روي دستگاه نصب شود، كاربران مسائل مختلفي را تجربه خواهند كرد. با اين وجود، بسياري از كاربران قادر نخواهند بود تا برنامه مخربي را كه به عنوان يك بدافزار تلاش مي كند تا مانع راه اندازي برنامه هاي ديگر شود، از روي دستگاه خود حذف نمايند. هم چنين اين تهديد مي تواند تنظيمات سيستم عامل را تغيير دهد. در برخي موارد، حتي كاربران نمي توانند دستگاه خود را دوباره راه اندازي نمايند و به تنظيمات اوليه كارخانه برگردانند.
با توجه به گزارش منتشر شده توسط شركت سيمانتك، برخي از كاربران خوش شانس مي توانند اين برنامه را از روي دستگاه خود حذف نمايند زيرا اين برنامه ممكن است به دليل مسائل سازگاري با دستگاه، به خوبي بر روي آن اجرا نشود.
اين بدافزار بر روي وب سايت هاي متفرقه پيدا شده است. اين بدافزار ممكن است در قالب يك نسخه از برنامه اسكايپ كه به شما امكان تماس رايگان را مي دهد ظاهر شود و پس از نصب خود را بر روي دستگاه نصب و اجرا نمايد.
رشد و گسترش بدافزارهاي اندرويد باعث مي شود تا توليدكنندگان ضد بدافزار سنتي ماند سيمانتك، بازارهاي جديدي را براي حفاظت ضد بدافزاري از دستگاه هاي تلفن همراه فراهم نمايند.

برچسب‌ها

Three quarters of consumers concerned about privacy online

تاریخ ایجاد

ID: IRCNE2013061884
Date: 2013-06-25

According to “TechWorld”, new research commissioned by civil liberties campaign group Big Brother Watch has revealed that over three quarters of consumers globally are concerned about their privacy online.
In a survey of 10,354 people across nine countries, undertaken by market research agency ComRes, 79 percent said they were concerned about their personal privacy, with India (94 percent), Brazil (90 percent) and Spain (90 percent) showing the highest level of concern.
The UK figure was actually below average at 68 percent, while Germany, which has one of the strongest data protection laws in the world, was the only country where a majority (56 percent) said they are unconcerned about their privacy online.
Globally, 41 percent of people feel consumers are being harmed by big companies gathering large amounts of data. Respondents in South Korea, UK, Australia and France were the most critical of this practice, while those in Brazil, India and Spain were the most sympathetic to them doing so.

برچسب‌ها

Microsoft tacks up first wanted poster

تاریخ ایجاد

ID: IRCNE2013061883
Date: 2013-06-05

According to “ComputerWorldUK”, Microsoft on Wednesday backpedaled from a long-standing refusal to pay bug bounties when it announced a temporary program for the beta of Internet Explorer 11 (IE11).
The Internet Explorer 11 Preview Bug Bounty will start June 26, the day the browser launches alongside Windows 8.1 at the BUILD developer conference, and will run until July 26. During the 30 days, Microsoft will pay researchers up to $11,000 for each vulnerability they find and report to the company.
Microsoft has repeatedly rejected the idea of joining rivals, such as Google and Mozilla, in paying for bugs. In 2011, the company insisted a just-announced contest was a better use of its money than paying for bugs one by one.
Also Microsoft expanded that 2011 contest -- then labeled the "BlueHat Prize" -- into an ongoing "BlueHat Bonus for Defense" initiative that will pay researchers up to $50,000 for fresh defensive security solutions.
The big money was reserved for another new program, dubbed "Mitigation Bypass Bounty," that will award up to $100,000 for any novel exploitation technique able to circumvent Windows 8.1's many defenses.

برچسب‌ها

First ransomware app targeting Android devices spotted in the wild, Symantec says

تاریخ ایجاد

ID: IRCNE2013061882
Date: 2013-06-25

According to "techworld", the first fake antivirus app targetting Android users has been spotted by Symantec, which says this fake A/V app can also act like ransomware to hold the victim's Android device hostage.
Fake antivirus scams have long been a plague hitting Windows-based PCs to try to fool victims into thinking that there's a virus on the PC that the fake A/V can fix -- typically with some money, of course. Symantec says it's now spotted what it believes to be the first known similar type of ruse aimed at Android users through a fake A/V calling itself Android Defender.
Unfortunately, the Android Defender fake antivirus app is a program that the victim would have mistakenly installed.
"Once the malicious app has been installed, user experience varies as the app has compatibility issues with various devices," Symantec said on its official blog today. "However, many users will not have the capability to uninstall the malicious app as the malware will attempt to prevent other apps from being launched. The threat will also change the settings of the operating system. In some cases, users may not even be able to perform a factory data reset on the device."
If they are "lucky," some users may be able to perform a simple uninstall because the app may crash when executed because of compatibility issues, Symantec says.
Symantec adds: "The apps were found on third-party websites. Some came disguised as a version of Skype that would allow you to make free phone calls, and when you installed it took you to the fake antivirus."
The growing Android malware problem is also providing traditional anti-malware vendors, such as Symantec, with a new market for mobile-device anti-malware protections.

برچسب‌ها