Release 1.4.14 includes security bug fixes introduced in 1.4.13 and a further bug fix.
Monthly Archives: April 2017
tnef-1.4.14-1.fc26
Release 1.4.14 includes security bug fixes introduced in 1.4.13 and a further bug fix.
Tax identity fraud: Bringing the fight to this menace
Tax identity fraud is a multibillion dollar industry for criminals. ESET’s Lysa Myers explores new measures and offers some top tips on how to tackle this menace.
The post Tax identity fraud: Bringing the fight to this menace appeared first on WeLiveSecurity
![]()
Millions of iCloud Accounts Could Be Wiped if Apple Refuses Ransom

No less than $75,000 in cryptocurrency (Bitcoin or Ether), or $100,000 in iTunes gift cards — this is the exorbitant ransom that cybercriminals have demanded from Apple. The group, calling themselves the Turkish Crime Family, claims to have stolen access to 300 million iCloud accounts, and have threatened to wipe them on April 7 (tomorrow) if the corporation doesn’t pay up.
The cybercriminals sent a series of screen shots to Motherboard that apparently show the exchange of emails between the hacker group and Apple’s security team. They also provided access to one of the email accounts that they allegedly used to communicate with the company and lay down their conditions for the deal.
According to the messages on the account, the cybercriminals uploaded videos to YouTube to show how they were able to log in to several stolen iCloud accounts and even showed how they were able to access an elderly woman’s photos and remotely delete them.
Apple Won’t Be Had So Easily
Allegedly, an Apple employee had asked the criminals to take down the video that they’d uploaded to YouTube. The company also declared, “We do not reward cyber criminals for breaking the law”.
There are a few holes in the attackers’ story. In the initial correspondence, they claimed to have accessed 300 million accounts on Apple’s iCloud, but on the Turkish Crime Family twitter account the claim was a more modest 200 million. In a later correspondence, the number jumped up to 559 million.
“I just want my money and thought this would be an interesting report that a lot of Apple customers would be interested in reading and hearing,” one of the hackers told Motherboard. It seems clear that one of the strategies of this group is to blackmail Apple by making their actions public, alarming as many Apple clients as possible.
However, a spokesperson for Apple has stated that “there have not been any breaches in any of Apple’s systems including iCloud and Apple ID.” The supposed list of email addresses and passwords may therefore have been obtained through a third-party service that had been previously compromised.
The spokesperson also stated that they are “actively monitoring to prevent unauthorized access to user accounts and are working with law enforcement to identify the criminals involved.” We’ll have to wait until tomorrow to see if there is a real threat, or if the hackers are simply bluffing.
In any event, the company has taken the opportunity to remind users to use robust passwords, that they don’t use the same credentials over various websites, and that they activate two-step authentication to add an extra layer of security.
The post Millions of iCloud Accounts Could Be Wiped if Apple Refuses Ransom appeared first on Panda Security Mediacenter.
7 ways a giraffe can damage your device

With April the Giraffe about to give birth in the Animal Adventure Park in Harpursville, New York, it is time to warn readers of how a giraffe can damage their device in ways that a cat or dog would only dream of: Licking it – A giraffe’s tongue is about 50 cm long and black. Equipped to […]
The post 7 ways a giraffe can damage your device appeared first on Avira Blog.
Microsoft Finally Reveals What Data Windows 10 Collects From Your PC
Since the launch of Windows 10, there has been widespread concern about its data collection practices, mostly because Microsoft has been very secretive about the telemetry data it collects.
Now, this is going to be changed, as Microsoft wants to be more transparent on its diagnostics data collection practices.
Till now there are three options (Basic, Enhanced, Full) for Windows 10 users to
![]()
Bugtraq: Spiceworks 7.5 TFTP Improper Access Control File Overwrite / Upload
Spiceworks 7.5 TFTP Improper Access Control File Overwrite / Upload
RHSA-2017:0867-1: Low: Red Hat Enterprise Virtualization 3.x – 180 Day End Of Life Notice
This is the 180 day notification for the End of Production Phase 2 of
Red Hat Enterprise Virtualization 3.x.
CVE-2017-7452
The iwbmp_read_info_header function in imagew-bmp.c in libimageworsener.a in ImageWorsener 1.3.0 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted file.
CVE-2017-7454
The iwgif_record_pixel function in imagew-gif.c in libimageworsener.a in ImageWorsener 1.3.0 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted file.
