Food Order Portal version 8.3 suffers from a cross site request forgery vulnerability. Note that this finding houses site-specific data.
All posts by 007admin
WordPress Photo Album Plus 5.4.4 Cross Site Scripting
WordPress Photo Album plugin versions 5.4.3 through 5.4.4 suffer from multiple cross site scripting vulnerabilities.
Travel Portal II 6.0 Cross Site Request Forgery
Travel Portal II version 6.0 suffers from a cross site request forgery vulnerability.
Hacked Brazilian Newspaper Site Targets Router DNS Settings
A Brazilian political website has been compromised and is injecting iFrames that attempt to change the victim’s router DNS settings.
AVAST invites you to the WebExpo 2014 in Prague!
WebExpo is the largest Central European conference focused on topics related to the digital world. Among many topics, this year’s focus is security and big data. AVAST Software is not only a proud general sponsor of this event, but also an active participant.
One weekend, over 1,400 online professionals, presentations, workshops, and lots of fun.
WebExpo is a great networking and knowledge exchanging opportunity, and those here in Prague will get a chance to meet AVAST experts from various areas. You can meet the AVAST team at our booth, as well as on the stage. The AVAST booth is located at CEVRO Institut.Â
Our team plans some fun for you at the booth, including testing new revolutionary glasses Oculus Rift – virtual reality headset for 3D gaming, and Android Wear. UX experts can try Card Sorting. For the most active expo-goers we will have prizes, so stop by to play and say Ahoy! ![]()
For the less technically-oriented, we also offer some fun and prizes. If you spot someone wearing an AVAST T-shirt, grab a selfie with this person and post it on Twitter or Instagram with the hashtag #AVASTselfie. Come to our booth and show us the tweet or instagram post and you will receive a 1-year free license of avast! Premium Mobile Security!
The best part of WebExpo is all the knowledge sharing from AVAST specialists. Here is a list of our colleagues and the topics they will be presenting:
- PostgreSQL as Big Data solution [Michal Augustýn] @AugiCZ
- Prompt data delivery in cloud – as an weapon in the armament race of security companies [Petr Chytil] @chytil
- Security threats online [Pavel Šrámek, Jan Širmer]
- Massively Scalable Services at AVAST - Case Study [Jakub JaneÄek] @jakubjanecek
- It is all about the data. Â [Pavel KuÄera]
- Medium data aka Why you should avoid Big data in Business Intelligence [Pavel Chocholouš ] @pavel242
- Local approach, as key factor to success in e-commerce [Tomáš Janů]
If you can’t attend personally, we have good news for you. Our team will be commenting during the event on social media, so you can join the conversation by following our accounts and special hashtags. Follow us at Twitter and Instagram at
- @avast_antivirus
- @avast_devs
- http://instagram.com/avast_antivirus
or follow comments with hashes:
- #AVASTdevs
- #AVASTbooth
- #webExpo
Week in security: Home Depot speaks, Gmail and Android ‘leak’
American home-improvers havenât had a great week, with Home Depot once again dominating the security news – and this week, Android and Gmail users have had things to fret over, too. On the home improvement front, not only has Home Depot confirmed that there was a large-scale data breach at the world’s largest home improvement chain, the indefatigable security reporter Brian Krebs uncovered evidence of PIN-protected debit card information stolen in the breach being used for large-scale fraud, due to weak protection against criminals changing PIN codes by phone using basic information such as ZIP codes.
Meanwhile, University of New Haven researchers tormented Android chat app users all week, with a series of videos showing just how leaky chat apps on the platform could be: a dozen apps were shown to have serious privacy issues, including big names such as Instagram, OoVoo, OKCupid and Grindr.
Many Gmail passwords were changed in a hurry, too, as a dump of five million usernames and passwords appeared online. Things turned out not to be QUITE as bad as they seemed, but it might be time to change that dusty old password anywayâ¦
Security news: Home Depot tops the bill, again
The news for anyone whoâs shopped in Home Depotâs American stores, and used plastic, started bad, and is just getting worse and worse.
This week, the worldâs largest home improvement chain store, Home Depot, confirmed a data breach affecting Home Depot credit cards and debit cards used in stores on the American mainland, which may have continued since April.
Reports by security reporter Brian Krebs broke the even more unwelcome news that large-scale fraud is being perpetrated with stolen debit cards, with $300,000 withdrawn from one bank in under two hours, using what appeared to be debit card numbers used in Home Depot.
In an official release, the company said that anyone who used a payment card at a Home Depot store since April 2014 may have been affected, and the chain is to offer free identity protection and credit monitoring to such customers. Customers who shopped online or in Mexico have not been affected, the chain said in an official release.
ESET senior security researcher Stephen Cobb offers an important reminder about who the real villains are in such hacks: itâs not the beleaguered corporations themselves, but the criminals who install malware in shop POS terminals to steal from the innocent. In a thoughtful blog post, Cobb analyzes where guilt REALLY lies in both the recent leak of celebrity photos and the Home Depot hack.
Gmail: Passwords leaked online, but service ânot hackedâ
Users of Google Mail got a fright earlier this week when a dump of what appeared to be five million username-password combinations for the site appeared online on a Russian Bitcoin security forum.
The truth, however, wasnât quite as bad as it appeared: although if you havenât changed your Gmail password in years, it might be worth a quick refresh.
Google pointed out in an official statement that less than 2% of the leaked passwords actually worked – although, as Forbes points out, thatâs still 100,000 passwords which do, and that there was speculation that the list had simply been cobbled together from hacks on other sites where Google was used as a login.
ESET senior security researcher Stephen Cobb wrote, âThe assumption is that this compromised data is a collection of credentials obtained by phishing campaigns or malware attacks over recent years.â
âA website called isleaked.com appeared during the day purporting to allow people to check if their Gmail address had been compromised. However, as of right now, it does not appear to be functioning correctly and frankly I would not go there. Instead, you can check your email address at this site âHave I been pwned â which is run by Troy Hunt, a trusted Microsoft MVP.â
Chat apps fingered for leaking data
Chat apps on Android are not a particularly good way to have a genuinely private conversation, it seems – University of New Haven researchers spent the week drip-feeding a series of videos showing serious security flaws in everything from Instagram to OoVoo and from OKCupid to Grindr.
With many of the most popular chat apps on Android affected, tech news site CNET calculates that nearly a billion(968 million) users could be putting highly private data in the hands of apps that transmit and store it unencrypted.
Many of the Android apps (the researchers focused on Android rather than iOS, although there is no evidence the iOS apps behave differently), send text wirelessly unencrypted, and store images on servers for weeks without encryption or authentication.
The researchers used PC âsnifferâ software such as Wireshark and Network Miner to monitor the data transmitted by the apps, and found images and text transmitted and stored unencrypted â and potentially at risk from snoopers.
Facebook freaks out world… again
A simple case of mistaken identity? Or a dark hint at what Facebookâs algorithms might be able to do? The answer might well be both, after a young data scientist was mistakenly âtaggedâ in a series of photos heâd posted – of his mother as a young woman.
The case raised several intriguing questions: for instance, if genetic similarities are enough to trigger mistaken identity, could Facebookâs algorithms identify someone who had never used the site?
And could the biometric identification systems in use by law enforcement mistake someoone for a relative?
Fred Benenson, who was mistaken for his (very similar-looking) mother, said that the âoddly compellingâ incident âopens the door to larger and more difficult questions,â according to a report in The Verge.
Clearly in this case, they made an error, Fred Benenson, a data scientist at KickStarter, says, but he said the case raises serious questions: âWhat about the cases where this algorithm isnât used for fun photo tagging?â
âWhat if another false positive leads to someone being implicated for something they didnât do? Facebook is a publicly traded company that uses petabytes of our personal data as their business model â data that we offer to them, but at what cost?â
NECâs Neoface biometric software is already being used by police forces in the U.S. and the UK to identify people from video footage, as reported by We Live Security.
The post Week in security: Home Depot speaks, Gmail and Android ‘leak’ appeared first on We Live Security.
![]()
HttpFileServer 2.3.x Remote Command Execution
HttpFileServer version 2.3.x suffers from a remote command execution vulnerability due to a poorly formed regex.