Monthly Archives: October 2015
Tor Launches Anti-Censorship Messenger Service
European Parliament Shields Snowden From Extradition
Threatpost News Wrap, October 30, 2015
Mike Mimoso and Chris Brook discuss the news of the week: The latest Xen vulnerability, CISA passing the Senate, a researcher challenging that Weak DH paper, and more.
European Parliament offers support to Edward Snowden
Edward Snowden has been described as a “international human rights defender” by the European Parliament, which has called on all EU member states to back the whistleblower.
The post European Parliament offers support to Edward Snowden appeared first on We Live Security.
![]()
Ransomware: To pay or not to pay?
The recommendation by the FBI that victims of ransomware pay up to have their files decrypted created a buzz within IT folks of all kind. It’s time to ask: Should paying the ransom really be considered an option?
The post Ransomware: To pay or not to pay? appeared first on We Live Security.
![]()
Trick or treat? Beware so a ransomware won’t end up between your Halloween sweets
Ghosts, monsters and the living dead can all send a chill down one’s spine. Ransomware, for some people, is just as spooky. This Halloween, we look at why.
The post Trick or treat? Beware so a ransomware won’t end up between your Halloween sweets appeared first on We Live Security.
![]()
Don’t be careless when throwing away your used boarding cards!
Despite the need to print off documents having a less important role in our lives in the era of smartphones, there are still some things that we need to print off as there aren’t many other options. This is true of boarding cards, which hold a surprisingly important amount of private information which needs to be kept out of the hands of others if you don’t want to run any risks.
The usual protocol after returning from vacation is to throw out the airline tickets without giving them another thought, assuming that nobody is going to trawl through the garbage looking for an out-of-date ticket. Unfortunately, this is exactly what suspicious characters will do, knowing that these pieces of paper are the key to a whole host of private details and information.
What is even worse, however, is taking a photo of your boarding card and publishing it on Facebook or Twitter, especially if your privacy settings aren’t properly configured. By uploading this seemingly innocent image to make your friends jealous, you are inadvertently sharing your details with any user of the Internet who could use the information captured in the image for their potential benefit.
“The barcodes on boarding cards could let anyone discover information about you, your holiday plans, and your frequent flyer account”, according to IT security expert Brian Krebs.
It isn’t always like this, and sometimes the barcode only reveals information such as your name, date of the flight, the related airports, etc. However, in some cases the barcode can turn into a potential goldmine of personal information which can be used to attack your user account in the airline’s website.
The information stored on the barcodes can be extracted by using free access tools and can be interpreted by using step-by-step guides which explain each element.

The real danger that’s stored on these boarding cards is the frequent flyer number, which can be used to access your user account on the airline’s website. Knowing the name and surname of a passenger along with their frequent flyer number is “the first step to getting the password”, states Krebs.
Once inside, among other things, you can check out sensitive personal information (telephone numbers or the accompanying passengers) and even change or cancel upcoming flights. The intruder can even change the access requirements by guessing the answer to a security question – something which we have pointed out before as being rather easy to do.
This vulnerability, according to Krebs, “has created a black market for hacked frequent flyer accounts”. If you don’t want to end up being the next victim, the best thing to do is destroy your boarding cards before throwing them in the garbage or, better yet, use the official airline apps and by-pass the paper option altogether.
The post Don’t be careless when throwing away your used boarding cards! appeared first on MediaCenter Panda Security.
CVE-2015-6344 (asa_cx_context-aware_security_software)
The web-based GUI in Cisco Adaptive Security Appliance (ASA) CX Context-Aware Security 9.3(4.1.11) allows remote authenticated users to bypass intended access restrictions and obtain sensitive user information via an unspecified HTTP request, aka Bug ID CSCuv74105.
CVE-2015-6345 (secure_access_control_server)
SQL injection vulnerability in the Solution Engine in Cisco Secure Access Control Server (ACS) 5.7(0.15) allows remote authenticated users to execute arbitrary SQL commands via a crafted URL, aka Bug ID CSCuw24700.