The sixth version of the Building Security in Maturity Model (BSIMM) was released today and for the first time includes data on the software security practices of health care organizations.
Tag Archives: Vulnerabilities
Apple Patches Productivity Software; Mozilla Updates Firefox with Security Fix
Apple and Mozilla on Thursday released patches, addressing vulnerabilities that put private user data at risk.
Emergency Adobe Flash Zero Day Patch Arrives Ahead of Schedule
Adobe has decided to patch the zero day vulnerability that was disclosed in Flash Player earlier this week today — instead of next week as originally scheduled.
Emergency Adobe Flash Update Coming Next Week
Adobe will push out an emergency update for Flash after reports of a zero day being publicly exploited.
Google Patches Chrome, Changes Mixed Content Warnings
Google has changed the way it presents HTTPS Mixed Content warnings in Chrome.
Microsoft Releases Six Bulletins, Continues RC4 Deprecation
Microsoft released six security bulletins today, and continued its deprecation of the weak RC4 encryption algorithm across Windows systems.
Adobe Patches 69 Vulnerabilities in Reader, Acrobat, Flash
Adobe released a large update for Reader, Acrobat, and Flash today that addresses 69 critical vulnerabilities combined in the software.
Threatpost News Wrap, October 12, 2015
Mike Mimoso and Chris Brook discuss the week in news–including how researchers disrupted a campaign using the Angler Exploit Kit, how a researcher was forced to pull a talk from a conference, and how a practical SHA-1 collision could be months away, not years.
Stagefright the sequel – Android devices vulnerable again
Researchers at Zimperium, a specialist cybersecurity company, has announced that it has found another major vulnerability in the Android operating systems that many of us use on our mobile devices.
A blog post published by Zimperium says “Meet Stagefright 2.0, a set of two vulnerabilities that manifest when processing specially crafted MP3 audio or MP4 video files.” Nearly every single device since Android 1.0, released in 2008, is affected according to the blog post. The researchers were able to exploit the flaw in devices running Android 5.0 and later, and conceptually nearly every single device since Android 1.0 (2008) could be affected. According to Zimperium, earlier devices could be impacted through media players and instant messenger that use the Stagefright library.
Media files carry additional information called metadata, which is processed when the file is opened or previewed. This means the video or audio file on the device would not even need to be opened by the user for the attack to occur. Once the device was infected, the most likely method an attacker would use would be via a web browser.
How might this happen in a real environment?
- An attacker will try to convince you to visit a link that points to an infected website via either a malicious ad campaign or using spear-phishing techniques.
- An attacker on the same network as you could inject the exploit by intercepting your mobile network traffic destined for the browser.
- Infection of 3rd party apps that are using the vulnerable software library.
Zimperium has said that they notified Google’s Android Security team in August, and that Google responded quickly to try and fix it. They’ve also said that full technical details of the exploit will not be released publicly until Google has confirmed that the issue has been fixed and is available to users.
Bugs and vulnerabilities in operating systems are not uncommon. This exploit highlights the need for users to ensure that their devices are running the very latest version of their operating system and applications.
Unfortunately, unlike the first time Stagefright appeared, when disabling the automatic retrieval of MMS messages could prevent your device from being infected, this time we need to wait for the update from Google, our phone carrier as well as our handset manufacturers to make it available to us.
In the meantime there are some precautions you can take:
- Check with your handset provider or carrier for a patch/update.
- Update all the apps you have on your device.
- Avoid downloading media files from untrusted sources, and even when trusted, use caution.
- If you haven’t disabled the ‘Auto retrieve MMS’ feature, switch it off now.
Remember, the most important thing you can do is keep your operating system and apps up to date. For that extra layer of protection, download AVG AntiVirus for Android to help protect your devices against malicious phishing sites.
Follow me on Twitter @TonyatAVG
![]()
![]()