Microsoft struggles against self-inflicted Office 365 IMAP outage. 7 days and counting.

Microsoft engineers are struggling to fix a seven-day-old, self-inflicted Office 365 IMAP outage. IMAP access to Office 365 tanked on January 18, meaning customers could not access emails using Exchange Online via IMAP or connect third-party mail clients via IMAP. Microsoft told disgruntled Office 365 customers that the problem affected a limited number of licensees Read more about Microsoft struggles against self-inflicted Office 365 IMAP outage. 7 days and counting.[…]

Terrible infections, bad practices, unclean kit – welcome to hospital IT

Medicine is world’s worst industry for data security, it seems Source: Terrible infections, bad practices, unclean kit – welcome to hospital IT Hospitals running unpatched XP and 95, hardware vendors that ship 36 trojans with their patches, people running around pressing keyboard keys to make sure none of the PCs ever logs out, pacemakers with Read more about Terrible infections, bad practices, unclean kit – welcome to hospital IT[…]

Deliberately hidden backdoor account in several AMX (HARMAN Professional) devices used by whitehouse, CIA, NSA, for communications

In the funniest disclosure I’ve read in some time (well, it would be if it wasn’t so terribly dangerous), it turns out that these teleconferencing units had a hardcoded admin account with extra permissions built in with username BlackWidow. In the first “fix”, AMX basically changed the user to Batman. Poor show. SEC Consult: Deliberately Read more about Deliberately hidden backdoor account in several AMX (HARMAN Professional) devices used by whitehouse, CIA, NSA, for communications[…]

RSA asks for plaintext Twitter passwords on conference reg page

Scores of security bods registering for security outfit RSA’s Executive Security Action Forum (ESAF) have handed over their Twitter account passwords to the company’s website in what is seen something between bad practise and outright compromise. The registration process for the February 29 event asks delegates to enter their Twitter credentials so that a prefab Read more about RSA asks for plaintext Twitter passwords on conference reg page[…]

Intel Driver Update Utility flawed

Basically the driver updater looks over HTTP and downloads an unencrypted, easily parsable XML file with URLs leading to the files to download and execute as admin. A man in the middle attack could easily exploit this. Source: Intel Driver Update Utility MiTM This is a lot like the Drupal update vulnerability.

5th Annual State of Application Security Report (Healthcare) 2016

So should we expect a critical mass of consumers to walk away from organizations because their mobile health apps do not have the level of security protection they expect? Based on these research findings, perhaps. When put to the test, the majority of mobile health apps failed security tests and could easily be hacked. Among Read more about 5th Annual State of Application Security Report (Healthcare) 2016[…]

French say ‘Non, merci’ to encryption backdoors

The French government has rejected an amendment to its forthcoming Digital Republic law that required backdoors in encryption systems. Axelle Lemaire, the Euro nation’s digital affairs minister, shot down the amendment during the committee stage of the forthcoming omnibus digital bill, saying it would be counterproductive and would leave personal data unprotected. “Recent events show Read more about French say ‘Non, merci’ to encryption backdoors[…]

Royal Melbourne hospital runs XP, dives into chaos when virus attacks.

Het virus sloeg als eerste toe op de afdeling pathologie en verspreidde zich razendsnel over het ziekenhuis-netwerk. Hierdoor moesten veel medewerkers een hoop handelingen handmatig uitvoeren. Processen als bloed- en weefselverwerking konden niet meer worden uitgevoerd door de computers en ook de verpleegsters moesten samenwerken met de afdeling die het eten verzorgde om ervoor te Read more about Royal Melbourne hospital runs XP, dives into chaos when virus attacks.[…]

OpenSSH Private Crypto Key Leak Patch

The information leak is exploitable in the default configuration of the OpenSSH client, and (depending on the client’s version, compiler, and operating system) allows a malicious SSH server to steal the client’s private keys,” Qualys said in its advisory. “This information leak may have already been exploited in the wild by sophisticated attackers, and high-profile Read more about OpenSSH Private Crypto Key Leak Patch[…]

FFmpeg allows file ops when it reads a video file

ffmpeg has a vulnerability in the current version that allows the attacker to create a specially crafted video file, downloading which will send files from a user PC to a remote attacker server. The attack does not even require the user to open that file – for example, KDE Dolphin thumbnail generation is enough. Desktop Read more about FFmpeg allows file ops when it reads a video file[…]

Hyatt leaks customer credit card details

The investigation identified signs of unauthorized access to payment card data from cards used onsite at certain Hyatt-managed locations, primarily at restaurants, between August 13, 2015 and December 8, 2015. A small percentage of the at-risk cards were used at spas, golf shops, parking, and a limited number of front desks, or provided to a Read more about Hyatt leaks customer credit card details[…]

Cisco forgot its own passwords for seven weeks

Someone’s palm is digging a hole into their face at Cisco, which has just admitted it shipped a bunch of servers with the wrong default password. “A number of C-Series servers have shipped to customers with a non-standard default password which prevents access to the Cisco Integrated Management Controller (CIMC) unless the configured password is Read more about Cisco forgot its own passwords for seven weeks[…]

Fortinet tries to explain weird SSH ‘backdoor’ discovered in firewalls, calls it “management authentication issue”

Anyone who uses this script against vulnerable firewalls will gain administrator-level command-line access to the equipment. After some outcry on Twitter and beyond, Fortinet responded by saying it has already killed off the dodgy login system. “This issue was resolved and a patch was made available in July 2014 as part of Fortinet’s commitment to Read more about Fortinet tries to explain weird SSH ‘backdoor’ discovered in firewalls, calls it “management authentication issue”[…]

Trend Micro AV gave any website command-line access to Windows PCs

Ormandy, who has made something of a career of late discovering holes in popular security software, analyzed a component in Trend’s software dubbed Password Manager. He found that multiple HTTP RPC ports for handling API requests were accessible. “It took about 30 seconds to spot one that permits arbitrary command execution, openUrlInDefaultBrowser, which eventually maps Read more about Trend Micro AV gave any website command-line access to Windows PCs[…]

SLOTH attack means MD5 needs to be removed from TLS and SSH ASAP

In a paper [PDF] published in time for a cryptography conference in Silicon Valley this week, the authors from French research institute INRIA note that while MD5 (and its successor SHA1) are being phased out, they continue to be used in “mainstream protocols” like TLS, IKE, and SSH. This is not exactly news, but the Read more about SLOTH attack means MD5 needs to be removed from TLS and SSH ASAP[…]

Drupal – Insecure Update Process, has been known since 2012

Source: IOActive Labs Research: Drupal – Insecure Update Process Issue #1: Whenever the Drupal update process fails, Drupal states that everything is up to date instead of giving a warning. Issue #2: An attacker may force an admin to check for updates due to a CSRF vulnerability on the update functionality Issue #3: Drupal security Read more about Drupal – Insecure Update Process, has been known since 2012[…]

2nd database with 56m records exposed due to misconfiguration, looks similar to breach with 191m records

Around the same time the first database was discovered a second, smaller database was also found by researcher Chris Vickery. This second database contains voter profiles similar to those previously discovered, however, it also includes records that hold targeted demographic information. MORE ON CSO:Lost in the clouds: Your private data has been indexed by Google Read more about 2nd database with 56m records exposed due to misconfiguration, looks similar to breach with 191m records[…]

Dutch govt says no to backdoors, slides $540k into OpenSSL without breaking eye contact

A government position paper, published by the Ministry of Security and Justice on Monday and signed by the security and business ministers, concludes that “the government believes that it is currently not appropriate to adopt restrictive legal measures against the development, availability and use of encryption within the Netherlands.” The conclusion comes at the end Read more about Dutch govt says no to backdoors, slides $540k into OpenSSL without breaking eye contact[…]

Database of 191 million U.S. voters exposed on Internet

An independent computer security researcher uncovered a database of information on 191 million voters that is exposed on the open Internet due to an incorrectly configured database, he said on Monday. The database includes names, addresses, birth dates, party affiliations, phone numbers and emails of voters in all 50 U.S. states and Washington, researcher Chris Read more about Database of 191 million U.S. voters exposed on Internet[…]

Australian government urges holidaymakers to kill two-factor auth

The official Twitter account for myGov – a portal for accessing government services online – told Aussies this week: “Going overseas this summer? If you’re registered for myGov security codes make sure you turn them off before you go.” The startling tweets come complete with professional cartoon graphics, clearly suggesting that rather than a civil Read more about Australian government urges holidaymakers to kill two-factor auth[…]