PayPal’s Marketing web service suffered from a remote code execution vulnerability due to running a JDWP server.
Monthly Archives: April 2015
SonicWall SonicOS 7.5.0.12 / 6.x Cross Site Scripting
SonicWall SonicOS versions 7.5.0.12 and 6.x suffer from a client-side cross site scripting vulnerability.
Surgical robots and the remote surgery hacking threat
This sounds horrible but it could never happen in real life anyway, right? Wrong! Telesurgery is something that is already happening today, and while it is not all that common yet it’s likely that it will become more and more popular in the near future. The tech allows a doctor to perform surgery on a patient even though they are not physically in the same location. All in all a great thing, considering how many lives can be saved that way.
But how secure are those lifesaving robots when it comes to cyber threats? The answer to this question, presented in a recent research paper called „To Make a Robot Secure: An Experimental Analysis of Cyber Security Threats Against Teleoperated Surgical Robots”, is shocking. A team from the University of Washington identified a slew of possible cyber security threats. They were also able to “maliciously control a wide range of robots functions, and even to completely ignore or override command inputs from the surgeon.” Just imagine a denial of service attack which is launched during a crucial point during surgery! It could be fatal to the patient.
Luckily a scenario like this has not happened yet – but would you feel comfortable being under the knife knowing some hacker could end your life just because he feels like starting a DDoS attack?
Read the rest of the article over here to find out what the team concluded and gain a deeper insight into the research paper.
The post Surgical robots and the remote surgery hacking threat appeared first on Avira Blog.
PayPal Inc Bug Bounty #114 – JDWP Remote Code Execution Vulnerability
Posted by Vulnerability Lab on Apr 28
Document Title:
===============
PayPal Inc Bug Bounty #114 – JDWP Remote Code Execution Vulnerability
References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=1474
Video: http://www.vulnerability-lab.com/get_content.php?id=1474
Vulnerability Magazine:
http://magazine.vulnerability-db.com/?q=articles/2015/04/28/paypal-inc-bug-bounty-jdwp-remote-code-execution-vulnerability
Release Date:
=============…
Kaspersky Lab Presents a New Version of Kaspersky Small Office Security to Reflect Modern Needs of Small Business
SonicWall SonicOS 7.5.0.12 & 6.x – Client Side Cross Site Scripting Vulnerability
Posted by Vulnerability Lab on Apr 28
Document Title:
===============
SonicWall SonicOS 7.5.0.12 & 6.x – Client Side Cross Site Scripting Vulnerability
References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=1359
Release Date:
=============
2015-04-23
Vulnerability Laboratory ID (VL-ID):
====================================
1359
Common Vulnerability Scoring System:
====================================
3
Product & Service…
Zero-day lets hackers hijack WordPress through rogue comments
A vulnerability in the WordPress blogging platform has been uncovered which allows hackers to hijack websites with a comment containing malicious JavaScript, The Hill reveals.
The post Zero-day lets hackers hijack WordPress through rogue comments appeared first on We Live Security.
![]()
0d1n 2.0
0d1n is a web security tool for fuzzing various HTTP payloads. It’s written in C and uses libcurl.
Fedora 20 Security Update: pdns-recursor-3.7.2-1.fc20
Resolved Bugs
1213377 – CVE-2015-1868 pdns: Label decompression bug in PowerDNS can cause crashes on specific platforms
1214703 – CVE-2015-1868 pdns: Label decompression bug in PowerDNS can cause crashes on specific platforms [fedora-all]<br
– Update to 3.7.2
– CVE-2015-1868
External References:
https://doc.powerdns.com/md/security/powerdns-advisory-2015-01/
Your SMB’s Biggest Security Threat Could be Sitting in Your Office
This article is a re-print from the April 1, 2015 edition of Silicon India.
Careless employees, not hackers, are the biggest threat to your company’s data security.
Security threats are evolving quickly, making it difficult to pinpoint just one threat that is currently affecting small and mid-size businesses.
From the threats we have observed in the past and the ones we anticipate for the future, we have learned that while malware can be damaging to businesses, so can human decisions. This makes it vital for small and mid-size business owners to discuss possible threats with their employees and share basic IT guidelines with them, but more importantly, to implement a strong security solution that holds up dangers before they become a real threat.
Taking Advantage of Human Nature: Social Engineering
Hackers understand that it is human nature to make mistakes, which is why they often turn to social engineering. Social engineering is a tactic that tricks people into revealing their personal information, like log in details, or into performing actions, like downloading malware disguised as an attachment or link.
Phishing emails are a popular form of social engineering that can easily sneak their way into your employees’ inboxes, disguising themselves as yet another offer, promotion, or even customer, if you do not have anti-phishing protection. Phishing campaigns come in many forms; they can either use scare tactics to make people believe they are in trouble or that they have won a prize.
In the last few months we have seen Trojans like Pony Stealer and Tinba make their rounds. Both Pony Stealer and Tinba attempted to convince people they owed money and to download an invoice, which was of course not an actual invoice, but a Trojan.
Falling for phishing scams can have devastating effects on businesses; they could not only steal personal information, but also attack Point of Sale (PoS) systems to steal customers’ financial information, thus not only affecting the business itself, but its clients as well.
Lack of security awareness: Beneficial for hackers, bad for your business
Not taking proper security precautions, like choosing weak passwords or ignoring security updates, is another human flaw cybercriminals like to abuse to access accounts and networks. To gain control of a system, hackers can enter common or weak passwords or simply look up hardware’s default administrative log in credentials.
Neglecting to update software is another gateway for hackers, leaving vulnerabilities and loopholes wide open for them to take advantage of. Similarly, connecting to public and open Wi-Fi connections while on a business trip is like sending hackers a personal invitation to snoop around your business.
India’s SMBs are getting technology ready – hackers are getting ready, too
According to Indian consulting firm, Zinnov, 20% of India’s 50 million small and mid-size businesses are technology ready. Cybercriminals will take note of this and are probably preparing plans at this very moment, which is exactly what you should do, too.
Set up basic security guidelines for your employees, teach them about possible threats and make sure they understand how imperative their role plays in securing your business. For example, your employees should be encouraged to choose strong passwords for their devices and accounts, to keep their software updated – if that’s not what you manage centrally – and to use a VPN when connecting to unsecure wireless networks.
You cannot, of course, rely solely on your employees to protect your business – humans innately make mistakes. To protect your business and to provide your employees with a safety net, you need to have a proper business security solution. Small to mid-size businesses should look for security solutions that include anti-phishing, firewall to control network traffic, and server-side protection. If employees are required to travel frequently, it also makes sense to implement a VPN solution on their laptop, smartphone, and tablet. If connecting to open Wi-Fi at an airport, hotel or café, a VPN can be used to encrypt valuable business data and protect it from hackers.
As humans do make mistakes, you cannot rely on your employees to implement and manage the security solution themselves. It is recommendable to choose a solution that empowers you to remotely manage the security on your employees’ computers.
Whether your business is a two-man show, or an army of 2,000, awareness, paired with the right security technology are essential.