Watch out! WhatsApp Calling, the new WhatsApp scam!

whatsapp voice calls

Since WhatsApp announced that they were adding free voice calls to its services, cybercriminals have been trying to take advantage of it, and they have done it!

How are they doing it? Via a WhatsApp message wich invites the users to “try” the voice calls. If you get it, just ignore it!

Congratulations!! You’ve been invited to try Whatsapp Calling! Invite Your 10 Activate WhatsApp Friends to Activate Whatsapp Calling”.

whatsapp calling scam

Our collegues of Softonic have tried it and, obiously,  it turned out to be a scam. By clicking on the link you are redirected to a fraudulent site in wich after inviting ten friends you will be able to make voice calls via WhatsApp.

As you can imagine, by doing so, not only you won’t be able to call anyone, but you will be sending spam to those ten friends you chose!

We know you are eager to make calls via WhatsApp, but don’t be anxious! The safest way for installing this option will be when the own app informs you that you can make voice calls free of charge!

The post Watch out! WhatsApp Calling, the new WhatsApp scam! appeared first on MediaCenter Panda Security.

FREAK: All Windows versions are affected too

We wrote about the new SSL vulnerability called FREAK – Factoring RSA Export Keys – affects around 36% of all sites trusted by browsers and around 10% of the Alexa top one million domains, according to computer scientists at the University of Michigan.

Android, iOS and a lot of embedded devices that make use of the affected SSL clients (including Open) are in danger of having their connections to vulnerable websites intercepted.

The two most used operating systems for smartphones, tablets, laptops and embedded devices  are in good company. Yesterday, Microsoft made known that all its supported Windows versions are also affected due to the presence of the vulnerability in the Windows Secure Channel (SChannel) – the Microsoft own implementation of SSL/TLS:

  • Windows Server 2003
  • Windows Vista
  • Windows Server 2008
  • Windows 7
  • Windows 8 and 8.1
  • Windows Server 2012
  • Windows RT

Microsoft published an TechCenter an advisory where the problem is analyzed and solutions are offered. Also a patch is promised to fix all supported operating systems.

What does it mean for the user?

It means that if you are in Windows and make use of the vulnerable SSL libraries delivered by default, your connection to the affected servers can be intercepted. If you use Internet Explorer to visit www.freakattack.com you will be surprised to see this:

FREAK vulnerability
What should the users do?

We do not recommend messing up with the standard cryptography settings of Windows (or any operating systems) unless you know what you are doing (and there is a just hand full of people that actually do). You should try a browser that is not affected (like Chrome, which was updated in the meanwhile) and apply the patches for operating system and browsers that will come in the next few days.

 

The post FREAK: All Windows versions are affected too appeared first on Avira Blog.

CVE-2015-0598

The RADIUS implementation in Cisco IOS and IOS XE allows remote attackers to cause a denial of service (device reload) via crafted IPv6 Attributes in Access-Accept packets, aka Bug IDs CSCur84322 and CSCur27693.

CVE-2015-0607

The Authentication Proxy feature in Cisco IOS does not properly handle invalid AAA return codes from RADIUS and TACACS+ servers, which allows remote attackers to bypass authentication in opportunistic circumstances via a connection attempt that triggers an invalid code, as demonstrated by a connection attempt with a blank password, aka Bug IDs CSCuo09400 and CSCun16016.

CVE-2015-0659

The Autonomic Networking Infrastructure (ANI) implementation in Cisco IOS allows remote attackers to trigger self-referential adjacencies via a crafted Autonomic Networking (AN) message, aka Bug ID CSCup62157.