Daily NCSC-FI news followup 2019-09-27

Some Voting Machines Still Have Decade-Old Vulnerabilities

www.wired.com/story/voting-village-results-hacking-decade-old-bugs/ The results of the 2019 Defcon Voting Village are inand they paint an ugly picture for voting machine security.. In three short years, the Defcon Voting Village has gone from a radical hacking project to a stalwart that surfaces voting machine security issues. This afternoon, its organizers released findings from this year’s eventincluding urgent vulnerabilities from a decade ago that still plague voting machines currently in use.

Onko sinulla äly-tv? Nämä kaikki tiedot se kerää sinusta

www.is.fi/digitoday/tietoturva/art-2000006247849.html Älytelevisiot tarkkailevat katsojaa ja lähettävät heistä tietoa moneen paikkaan. Asennusvaiheessa on syytä pitää silmä tarkkana.

Divergent: “Fileless” NodeJS Malware Burrows Deep Within the Host

blog.talosintelligence.com/2019/09/divergent-analysis.html Cisco Talos recently discovered a new malware loader being used to deliver and infect systems with a previously undocumented malware payload called “Divergent.”This threat uses NodeJS a program that executes JavaScript outside of a web browser as well as the legitimate open-source utility WinDivert to facilitate some of the functionality in the Divergent malware.

Here’s a phishing URL to give you nightmares https://www.reddit.com/r/sysadmin/comments/d9ndnf/heres_a_phishing_url_to_give_you_nightmares/ I got an alert about a user click on a phishing email. Took a look at the alert and the URI originally looked legit – adobe.com, no problem. I tested the URI string from Adobe, and sure enough you can put anything after &p1= and adobe will redirect you.. See also:

www.bleepingcomputer.com/news/security/adobe-and-google-open-redirects-abused-by-phishing-campaigns/

Kaivinkone katkaisi tietoliikennekaapelin Vantaalla, Apotti-tietojärjestelmän verkkoyhteydet poikki

www.hs.fi/kaupunki/art-2000006252723.html APOTTI-TIETOJÄRJESTELMÄN yhteydet ovat tällä hetkellä poikki Vantaan kaupungin palveluissa. Sosiaali- ja terveystoimen henkilökunta ei pääse käsiksi potilastietoihin, koska he eivät pääse kirjautumaan järjestelmään.

New Checkm8 jailbreak released for all iOS devices running A5 to A11 chips

www.zdnet.com/article/new-checkm8-jailbreak-released-for-all-ios-devices-running-a5-to-a11-chips/#ftag=RSSbaffb68 A security researcher has released today a new jailbreak that impacts all iOS devices running on A5 to A11 chipsets — chips included in all Apple products released between 2011 and 2017. This includes iPhone models from 4S to 8 and X.

You might be interested in …

Daily NCSC-FI news followup 2020-03-30

Revealed: Saudis suspected of phone spying campaign in US www.theguardian.com/world/2020/mar/29/revealed-saudis-suspected-of-phone-spying-campaign-in-us Saudi Arabia appears to be exploiting weaknesses in the global mobile telecoms network to track its citizens as they travel around the US, according to a whistleblower who has shown the Guardian millions of alleged secret tracking requests. Emotet: Dangerous Malware Keeps on Evolving medium.com/threat-intel/emotet-dangerous-malware-keeps-on-evolving-ac84aadbb8de […]

Read More

Daily NCSC-FI news followup 2021-03-22

Näin haittaohjelma tulee älypuhelimeen ja miten se estetään pjarvinen.blogspot.com/2021/03/nain-haittaohjelma-tulee-alypuhelimeen.html?m=1&s=09 Pari päivää sitten puhelimeeni kilahti tekstiviesti: “[OmaPosti] Sinulla on paketti, joka on allekirjoitettava, tarkista…” (ja is.gd-linkkilyhennyspalvelun taakse piilotettu osoite). Haittaohjelmien yhä lisääntyessä virustorjuntaohjelma saattaa olla paikallaan, varsinkin jos puhelimeen ladataan pelejä ja sitä käytetään huolimattomasti. Ilman torjuntaohjelmaakin pärjää, kunhan ei lataa epämääräisiä ohjelmia eikä ikinä asenna […]

Read More

Daily NCSC-FI news followup 2020-01-11

An Empirical Study of Wireless Carrier Authentication for SIM Swaps www.issms2fasecure.com/ We examined the authentication procedures used by five prepaid wireless carriers when a customer attempts to change their SIM card, or SIM swap. We found that all five carriers use insecure authentication challenges that can easily be subverted by attackers. We found 17 websites […]

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.