Monthly Archives: August 2015
Zero Day Flaw Found In Mac OS X Yosemite Security Update
How Hacker's Hijack The Net's Phone Books
Ashley Madison Hackers Leak Data On Millions Of Users
MumsNet hit by hack, DDoS attack and SWAT
Mumsnet, the phenomenally popular British parenting website, has suffered an attack from hackers which has seen users’ accounts breached, and passwords stolen. And the damage doesn’t end there…
The post MumsNet hit by hack, DDoS attack and SWAT appeared first on We Live Security.
![]()
Dark times for Android: Examining Certifi-gate and the newest Stagefright updates
Certifi-gate and Stagefright are two recent threats that have put many Android devices at risk. Photo via Ars Technica.
When it comes to security, it seems that Android has seen better days. A slew of vulnerabilities and threats have been cropping up recently, putting multitudes of Android users at risk. Certifi-gate and Stagefright are two threats that, when left unprotected against, could spark major data breaches.
Certifi-gate leaches permissions from other apps to gain remote control access
Certifi-gate is a Trojan that affects Android’s operating system in a scary way. Android devices with Jelly Bean 4.3 or higher are affected by this vulnerability, making about 50% of all Android users vulnerable to attacks or to their personal information being compromised.
What’s frightening about this nasty bug is how easily it can execute an attack – Certifi-gate only requires Internet access in order to gain remote control access of your devices. The attack takes place in three steps:
- A user installs a vulnerable app that contains a remote access backdoor onto their Android device
- A remotely-controlled server takes control of this app by exploiting its insecure backdoor
- Using remote access, Certifi-gate obtains permissions from others apps that have previously been granted higher privileges (i.e. more permissions) by the user and uses them to exploit user data. A good example of an app targeted by Certifi-gate is TeamViewer, an app that allows you to control your Android device remotely.
The good news here is that Avast Mobile Security blocks the installation packages that make it possible for Certifi-gate to exploit the permissions of your other apps. Breaking this down further, Avast Mobile Security would block the package before the action in Step 2 is carried out, making it impossible for a remotely-controlled server to take control of an insecure app that contains a vulnerable remote access backdoor.
Google’s Stagefright patch can be bypassed
We’ve already told you about the Stagefright bug, which has exposed nearly 1 billion Android devices to malware. Whereas Certifi-gate uses Internet access to control your device, Stagefright merely needs a phone number in order to infect users.
Due to the scope and severity of this threat, Google quickly put out a security patch that was intended to resolve the Stagefright issue once and for all. Unfortunately, it hasn’t been fully successful — it’s possible for the patch to be bypassed, which leaves Android users with a false sense of security and a vulnerable device.
As Avast security researcher Filip Chytry explains in his original post examining Stagefright, Avast encourages users to disable the “auto retrieve MMS” feature within their default messaging app’s settings as a precautionary measure. You can read our full set of instructions for staying safe against Stagefright in the post.
Follow Avast on Facebook, Twitter, YouTube, and Google+ where we keep you updated on cybersecurity news every day.
![]()
The most sought-after professional profiles in the information security sector

Direct attacks, identity and information theft of all sorts (especially social engineering), persistent advanced threats… the risks associated with information security are continually multiplying in a world which is increasingly more digital, mobile, and multi-device based. With this backdrop it is no surprise that cybersecurity experts are in high demand along with professionals in other sectors such as information analysis, big data technology, and data scientists.
So, which are the most desired profiles in security departments? Which training do these professionals need to have and how much are they paid? To get the answers to all of these questions, and to help security experts and the businesses which are looking for them have a realistic idea of how they fit into the marketplace, we have consulted two HR experts with specific experience in the IT sector. Sára Álvarez, Spring Professional manager at Adecco, is in no doubt – engineers and security technicians, as well as auditors specialized in this area and even pre-sales engineers, are the most sought-after roles in security departments.
María Mosquera, executive manager at Michael Page Technology, adds that Logic Security Managers, IT Security Technicians and Experts, Security Managers, Ethical Hacking Experts, and CISOs (“this is generally a position attained after a promotion from another management role”) are the job profiles that are in demand. They are particularly sought-after by consultancy firms “where there are parts of the business solely dedicated to information security”. The role of CISO, she says, “is generally reserved for larger companies”.
Professionals that are requested more and more
“In recent years we have identified a clear need for these profiles in different customers in different sectors. It is a reality that security is increasingly important in companies because everything is already in the network,” states Alvarez. “In 2014, especially, we saw that the focus of the security companies completely changed. Whereas before these profiles were sought out as needed, nowadays they fill their departments with expert, permanent staff in in order to prevent data leaks and other threats. The demand for security professionals almost doubled last year compared to 2013”.

Mosquera agrees with Adecco’s spokeswoman about the growing relevance that security has taken in all organizations, which she says typically have a specific department or work with external consultants specialized in the field. “Hence the demand for relevant specialists to simulate Ethical Hacking security attacks and be ready to counter them,” she added.
Necessary training
Regarding the training demand for these profiles, it is diverse but always related, obviously, to the world of information technology. “Normally these roles have an extensive background in systems and, over time, have been specializing in security,” said Alvarez, although Mosquera says that besides being IT graduates, many professionals in the field of security are telecommunication engineers.
Of course, both agree on the importance of these experts having a series of certifications: “The most important are those such from ISACA, such as CISA, CISSP, and CISM, others like CEH, CRISC, and SIEM. They should also know how to handle tools with ad hoc security solutions at companies like Panda Security, Palo Alto Networks, Bluecoat Systems, Symantec, etc.,”, explains the spokeswoman from Michael Page Technology.
While the more technical positions require more practical training on certain products, they majority related to the management or security strategy, for example, the auditor, which should develop contingency plans and data protection, need more certifications linked to such development plans, with knowledge of the existing data protection rules (in Spain the LOPD), and the advising on information systems, etc.”, reveals Álvarez.
So, how much are they paid?
And now the big question – what is the salary for profiles related to information security? “The positions from technician to manager and expert, often range between €45,000 and €65,000 gross per year, depending on whether the position is for a consultancy or end company. In consulting, the categories above manager can reach €75,000. For the position of CISO, the salary range depends on the size of the department and consequently of the organization, but may be around between €80,000 and €120,000 gross,” reveals Mosquera.
Alvarez is more conservative regarding the salaries. “The lowest profile, the technician, can start from €30,000 gross per year, but if the professional has certifications, speaks English and relevant experience, the salary may be higher, from €35,000 to €37,000. Security engineers earn between €35,000 and €45,000 euros gross per year, the architects, who are the most powerful on a technical level, earn between €40,000 and €52,000, auditors start out with a salary of €42,000 and security managers start with €50,000″. The Adecco spokewoman also highlights a role that is on the rise in the security sector, that of presale management, whose salary is between €35,000 and €46,000 gross per year.
The trend in salaries of these experts, of course, is increasing. Keep in mind that many times it is not easy to find these profiles and, above all, retain them in companies that literally raffle the best. Therefore, another trend that is beginning to prevail in many companies is addressing HR policies aimed at retaining these profiles by other incentives such as training, and social benefits, etc.
The post The most sought-after professional profiles in the information security sector appeared first on MediaCenter Panda Security.
Infra : TLS redirection for centos.org websites.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
The CentOS Project infra team has decided to implement TLS wherever we
can, so we decided to force a redirection of plain http traffic to
https version for the next websites :
- - https://{www}.centos.org (main website)
- - https://www.centos.org/forums (main forums)
- - https://fr.centos.org (French forums)
- - https://bugs.centos.org (CentOS Bugs tracker)
- - https://wiki.centos.org
Should you encounter an issue, feel free to either report it on
https://bugs.centos.org, or in #centos-devel on irc.freenode.net.
on behalf of the Infra team,
- --
Fabian Arrotin
The CentOS Project | http://www.centos.org
gpg key: 56BEC54E | twitter: < at >arrfab
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.22 (GNU/Linux)
iEYEARECAAYFAlXUdcgACgkQnVkHo1a+xU6hqgCePuVdwnQPWUz0ppS5rBUQUB8c
kNkAoIj2VIojQx1SWEf+bh1wSh69QKLz
=3Hof
-----END PGP SIGNATURE-----
Flash Broker-Based Sandbox Escape Via Forward Slash
FlashBroker is vulnerable to an NTFS junction attack to write an arbitrary file to the filesystem under user permissions. There is a bad check in FlashBroker BrokerCreateFile method and BrokerMoveFileEx method. FlashBroker only considers “” as delimiter. If the destination includes “/”, FlashBroker will use a wrong destination folder for check.
Magento CE Remote Command Execution
Magento CE versions prior to 1.9.0.1 post authentication remote command execution exploit.