Built-in LG smartphone app created data hack risk

“SNAP” allows an attacker to run arbitrary JavaScript code on the vulnerable LG devices, according to security researchers from Israeli security firms BugSec and Cynet. This might be easily exploited to allow private data leakage, phishing attacks and/or crash a vulnerable device, say the researchers. The security flaw is rooted in a bug in one Read more about Built-in LG smartphone app created data hack risk[…]

A Health Insurer Lost Six Hard Drives Holding Data About 1 Million Customers

Centene, based in St Louis, says that the hard drives in question contain personal data about people who received laboratory services between 2009 and 2015. Stored on the drives are details including names, addresses, dates of birth, social security numbers, member ID numbers and health information. Source: A Health Insurer Lost Six Hard Drives Holding Read more about A Health Insurer Lost Six Hard Drives Holding Data About 1 Million Customers[…]

Lenovo ShareIT comes with hardcoded password and directory traversal

Hard-coded password in Lenovo SHAREit for Windows [CVE-2016-1491] When Lenovo SHAREit for Windows is configured to receive files, a Wifi HotSpot is set with an easy password (12345678). Any system with a Wifi Network card could connect to that Hotspot by using that password. The password is always the same. Remote browsing of file system Read more about Lenovo ShareIT comes with hardcoded password and directory traversal[…]

Microsoft struggles against self-inflicted Office 365 IMAP outage. 7 days and counting.

Microsoft engineers are struggling to fix a seven-day-old, self-inflicted Office 365 IMAP outage. IMAP access to Office 365 tanked on January 18, meaning customers could not access emails using Exchange Online via IMAP or connect third-party mail clients via IMAP. Microsoft told disgruntled Office 365 customers that the problem affected a limited number of licensees Read more about Microsoft struggles against self-inflicted Office 365 IMAP outage. 7 days and counting.[…]

Terrible infections, bad practices, unclean kit – welcome to hospital IT

Medicine is world’s worst industry for data security, it seems Source: Terrible infections, bad practices, unclean kit – welcome to hospital IT Hospitals running unpatched XP and 95, hardware vendors that ship 36 trojans with their patches, people running around pressing keyboard keys to make sure none of the PCs ever logs out, pacemakers with Read more about Terrible infections, bad practices, unclean kit – welcome to hospital IT[…]

Deliberately hidden backdoor account in several AMX (HARMAN Professional) devices used by whitehouse, CIA, NSA, for communications

In the funniest disclosure I’ve read in some time (well, it would be if it wasn’t so terribly dangerous), it turns out that these teleconferencing units had a hardcoded admin account with extra permissions built in with username BlackWidow. In the first “fix”, AMX basically changed the user to Batman. Poor show. SEC Consult: Deliberately Read more about Deliberately hidden backdoor account in several AMX (HARMAN Professional) devices used by whitehouse, CIA, NSA, for communications[…]

RSA asks for plaintext Twitter passwords on conference reg page

Scores of security bods registering for security outfit RSA’s Executive Security Action Forum (ESAF) have handed over their Twitter account passwords to the company’s website in what is seen something between bad practise and outright compromise. The registration process for the February 29 event asks delegates to enter their Twitter credentials so that a prefab Read more about RSA asks for plaintext Twitter passwords on conference reg page[…]

Intel Driver Update Utility flawed

Basically the driver updater looks over HTTP and downloads an unencrypted, easily parsable XML file with URLs leading to the files to download and execute as admin. A man in the middle attack could easily exploit this. Source: Intel Driver Update Utility MiTM This is a lot like the Drupal update vulnerability.

5th Annual State of Application Security Report (Healthcare) 2016

So should we expect a critical mass of consumers to walk away from organizations because their mobile health apps do not have the level of security protection they expect? Based on these research findings, perhaps. When put to the test, the majority of mobile health apps failed security tests and could easily be hacked. Among Read more about 5th Annual State of Application Security Report (Healthcare) 2016[…]

French say ‘Non, merci’ to encryption backdoors

The French government has rejected an amendment to its forthcoming Digital Republic law that required backdoors in encryption systems. Axelle Lemaire, the Euro nation’s digital affairs minister, shot down the amendment during the committee stage of the forthcoming omnibus digital bill, saying it would be counterproductive and would leave personal data unprotected. “Recent events show Read more about French say ‘Non, merci’ to encryption backdoors[…]

Royal Melbourne hospital runs XP, dives into chaos when virus attacks.

Het virus sloeg als eerste toe op de afdeling pathologie en verspreidde zich razendsnel over het ziekenhuis-netwerk. Hierdoor moesten veel medewerkers een hoop handelingen handmatig uitvoeren. Processen als bloed- en weefselverwerking konden niet meer worden uitgevoerd door de computers en ook de verpleegsters moesten samenwerken met de afdeling die het eten verzorgde om ervoor te Read more about Royal Melbourne hospital runs XP, dives into chaos when virus attacks.[…]

OpenSSH Private Crypto Key Leak Patch

The information leak is exploitable in the default configuration of the OpenSSH client, and (depending on the client’s version, compiler, and operating system) allows a malicious SSH server to steal the client’s private keys,” Qualys said in its advisory. “This information leak may have already been exploited in the wild by sophisticated attackers, and high-profile Read more about OpenSSH Private Crypto Key Leak Patch[…]

FFmpeg allows file ops when it reads a video file

ffmpeg has a vulnerability in the current version that allows the attacker to create a specially crafted video file, downloading which will send files from a user PC to a remote attacker server. The attack does not even require the user to open that file – for example, KDE Dolphin thumbnail generation is enough. Desktop Read more about FFmpeg allows file ops when it reads a video file[…]

Hyatt leaks customer credit card details

The investigation identified signs of unauthorized access to payment card data from cards used onsite at certain Hyatt-managed locations, primarily at restaurants, between August 13, 2015 and December 8, 2015. A small percentage of the at-risk cards were used at spas, golf shops, parking, and a limited number of front desks, or provided to a Read more about Hyatt leaks customer credit card details[…]

Cisco forgot its own passwords for seven weeks

Someone’s palm is digging a hole into their face at Cisco, which has just admitted it shipped a bunch of servers with the wrong default password. “A number of C-Series servers have shipped to customers with a non-standard default password which prevents access to the Cisco Integrated Management Controller (CIMC) unless the configured password is Read more about Cisco forgot its own passwords for seven weeks[…]

Fortinet tries to explain weird SSH ‘backdoor’ discovered in firewalls, calls it “management authentication issue”

Anyone who uses this script against vulnerable firewalls will gain administrator-level command-line access to the equipment. After some outcry on Twitter and beyond, Fortinet responded by saying it has already killed off the dodgy login system. “This issue was resolved and a patch was made available in July 2014 as part of Fortinet’s commitment to Read more about Fortinet tries to explain weird SSH ‘backdoor’ discovered in firewalls, calls it “management authentication issue”[…]

Trend Micro AV gave any website command-line access to Windows PCs

Ormandy, who has made something of a career of late discovering holes in popular security software, analyzed a component in Trend’s software dubbed Password Manager. He found that multiple HTTP RPC ports for handling API requests were accessible. “It took about 30 seconds to spot one that permits arbitrary command execution, openUrlInDefaultBrowser, which eventually maps Read more about Trend Micro AV gave any website command-line access to Windows PCs[…]

SLOTH attack means MD5 needs to be removed from TLS and SSH ASAP

In a paper [PDF] published in time for a cryptography conference in Silicon Valley this week, the authors from French research institute INRIA note that while MD5 (and its successor SHA1) are being phased out, they continue to be used in “mainstream protocols” like TLS, IKE, and SSH. This is not exactly news, but the Read more about SLOTH attack means MD5 needs to be removed from TLS and SSH ASAP[…]