Apple iOS 9.3.1 (iPhone 6S & iPhone Plus) – (3D Touch) Passcode Bypass Vulnerability

Posted by Vulnerability Lab on Apr 05

Document Title:
===============
Apple iOS 9.3.1 (iPhone 6S & iPhone Plus) – (3D Touch) Passcode Bypass
Vulnerability

References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=1814

Release Date:
=============
2016-04-05

Vulnerability Laboratory ID (VL-ID):
====================================
1814

Common Vulnerability Scoring System:
====================================
6.1

Product & Service…

Silk Road 2.0 Dark-Web Admin Pleads Guilty

An admin of Silk Road 2, named Brian Farrell, who helped maintain the notorious dark web site by providing customer and technical support, approving and suspending vendors, and promoting staff members, has pleaded guilty and could face 8 years in prison.

The 28-year-old man, who used the moniker “DoctorClu,” had been accused last year of being the right-hand to the creator of Silk Road 2.0

One out of five businesses are infected by Malware through Social Media

Imagen 2

“Log-out” is the hardest button to click. Can anyone deny that we are hooked on social media? Many of us do not even manage to hold back at work: taking our breaks to message friends on our open Facebook pages or reading what is happening on Twitter.

What at first seems an unimportant habit, can have serious repercussions.  Yes, an employee risks the chance of being caught in the act, but what about the company?

Osterman Research consultants have confirmed in their latest report that 18% of companies have suffered malware infections because of social networks.  Employees aren’t the only ones using these platforms, though.  Companies often have business profiles which makes it more difficult to detect the source of the problem. Imagen 1

According to this document, 73% use Facebook for work purposes, 64% use LinkedIn and 56% use Twitter.  Companies are also showing interest in collaborative platforms designed for them such as Microsoft SharePoint, different Cisco products, the Salesforce Chatter software solution and Connections, a platform developed by IBM.

All of these tools are useful to make a business more efficient, improve teamwork and speed decision-making within the corporation. Shared data, documents and activities are jointly managed using some of the options on the corporate platforms, while the social networks allow them to interact with customers, improve their public image and search for new employees.  This can also increase the possibility of a cyber-attack that can affect the company’s equipment where important information or passwords are saved to access services in the corporate cloud.

imagen principal

Experts warn that the attacks may be caused by careless workers publishing content that includes a geographic location, or even by an employee who is actually working with cyber-criminals. The report, prepared as a guide for best practices within the company, also provides precautions and measures that these businesses can take to avoid the possibility of unpleasant consequences by:

  • Conducting an internal audit.  This will determine what social networks are being used for within the company and their benefits. We don’t want to ban the use of social media (which would affect the performance of workers and their relationships with customers).  The audit will help assess what is necessary.
  • Setting company rules.  Setting clear standards will determine a safe and acceptable way to use these platforms. First, experts should identify the people or positions who are entitled to use these platforms.
  • Establishing rights regarding surveillance or monitoring of employees while using social networks.

Technology and Training

Of course it is important to educate workers and inform them of the standards, rules and the consequences of breaking them but at the same time businesses need to control their systems and equipment. To do this, those responsible for the company must hire qualified personnel and maintain the technology and software needed to prevent attacks and minimize future risks. If you do not take these measures, the repercussions could cost your company a lot of money.

The post One out of five businesses are infected by Malware through Social Media appeared first on Panda Security Mediacenter.

Personal Data of 50 Million Turkish Citizens Leaked Online

Personal details of nearly 50 Million Turkish citizens, including the country’s President Recep Tayyip Erdogan, have been compromised and posted online in a massive security breach.

A database, which contains 49,611,709 records, appeared on the website of an Icelandic group on Monday, offering download links to anyone interested.

If confirmed, the data breach would be one of the

Sophos Cyberoam NG Series Cross Site Scripting

Multiple reflected cross site scripting issues were discovered in Cyberoam NG appliances. Input passed via the ‘ipFamily’, ‘applicationname’ and ‘username’ GET parameters to LiveConnections.jsp and LiveConnectionDetail.jsp is not properly sanitized before being returned to the user. Adding arbitrary ‘X-Forwarded-For’ HTTP header to a request makes the appliance also prone to a XSS issue. This can be exploited to execute arbitrary HTML and script code in a user’s browser session in context of an affected site.

Ubuntu Security Notice USN-2944-1

Ubuntu Security Notice 2944-1 – It was discovered that Libav incorrectly handled certain malformed media files. If a user were tricked into opening a crafted media file, an attacker could cause a denial of service via application crash, or possibly execute arbitrary code with the privileges of the user invoking the program.