Android ‘smishing’ vulnerability discovered by NCSU researchers; Google has a fix incoming

Android 'smishing' vulnerability discovered by NCSU researchers Google has a fix incoming

The art of smishing (SMS-Phishing) has been practiced for some time, but a discovery by the wizards at NC State University has uncovered a new vulnerability that could bring the aforesaid act back into the spotlight. Xuxian Jiang’s research team recently identified the hole and confirmed that it impacts Gingerbread, Ice Cream Sandwich and Jelly Bean. Put simply, if an Android user downloads an infected app, the attacking program can “make it appear that the user has received an SMS, or text, message from someone on the phone’s contact list or from trusted banks.” This fake message can solicit personal information, such as passwords for user accounts. The team isn’t going to disclose proof until Google patches it up, but the school has said that Google will be addressing it “in a future Android release.” For now, however, Jiang recommends additional caution when downloading and installing apps from unknown sources, while also suggesting that folks pay close attention to received SMS text messages.

Filed under: , , ,

Android ‘smishing’ vulnerability discovered by NCSU researchers; Google has a fix incoming originally appeared on Engadget on Fri, 02 Nov 2012 14:08:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceNC State University (1), (2)  | Email this | Comments

Microsoft issues security patches for Flash vulnerabilities in Windows 8 and Internet Explorer

As promised, Microsoft is issuing a security patch for a Flash vulnerability on Windows 8 in Internet Explorer 10. Though the operating system has yet to see its official public release, researchers testing the RTM version found a bug that could cause Flash to crash and allow for attackers to take control of a user’s machine. Additionally, the company is rolling out an update to address a security hole in Internet Explorer versions 7 and 8 on Windows XP — and IE 9 on Windows 7 and Windows Vista — which left the door open for hackers to spread malware via a specially designed Flash animation. Both security patches are available via Microsoft’s Windows Update service.

Filed under: ,

Microsoft issues security patches for Flash vulnerabilities in Windows 8 and Internet Explorer originally appeared on Engadget on Fri, 21 Sep 2012 22:53:00 EDT. Please see our terms for use of feeds.

Permalink The Verge  |   | Email this | Comments

Microsoft confirms Flash vulnerability fix for Internet Explorer 10 coming soon

Microsoft confirms Flash vulnerability fix for Internet Explorer 10 coming soon

Microsoft has just announced that it will be providing security patches for the Windows 8 IE10-specific version of Flash, despite the software giant initially suggesting it wouldn’t. The patch will be available “shortly,” and hints at a return to the update cycles of old. More significantly, as ZDNet points out, unless Microsoft coordinates these releases with Adobe, there could be a constant cycle of IE10 being vulnerable in the future. On a positive note, the fix should be released before Windows 8 goes prime time, but for those who jumped on board early, you might want to keep one eye locked on the update page, and get it when it lands.

Filed under:

Microsoft confirms Flash vulnerability fix for Internet Explorer 10 coming soon originally appeared on Engadget on Tue, 11 Sep 2012 11:27:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceZDNet  | Email this | Comments

iPhone reportedly vulnerable to text message spoofing flaw

iPhone reportedly vulnerable to text message spoofing flaw

If you’re an iPhone owner, you may want to use good judgment before responding to any out-of-the-blue text messages in the near future. French jailbreak developer and security researcher pod2g finds that every iPhone firmware revision, even iOS 6 beta 4, is susceptible to a flaw that theoretically lets a ne’er-do-well spoof the reply address of outbound SMS messages. As Apple is using the reply-to address of a message’s User Data Header to identify the origin rather than the raw source, receiving iPhone owners risk being fooled by a phishing attack (or just a dishonest acquaintance) that poses as a contact or a company. A proof of concept messaging tool is coming to the iPhone soon, but pod2g is pushing for an official solution before the next iOS version is out the door. We’ve asked Apple for commentary and will get back if there’s an update. In the meantime, we wouldn’t panic — if the trickery hasn’t been a significant issue since 2007, there isn’t likely to be a sudden outbreak today.

Filed under:

iPhone reportedly vulnerable to text message spoofing flaw originally appeared on Engadget on Fri, 17 Aug 2012 12:53:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourcepod2g  | Email this | Comments

Ubisoft UPlay may accidentally contain web plugin exploit, Ezio would not approve (update: fixed)

Assassin's Creed 2 - Ezio Auditore da Firenze

If you’ve played Assassin’s Creed 2 (or other Ubisoft games), you may have installed more stealthy infiltration than you bargained for. Some snooping by Tavis Ormandy around Ubisoft’s UPlay looks to have have discovered that the service’s browser plugin, meant to launch locally-stored games from the web, doesn’t have a filter for what websites can use it — in other words, it may well be open season for any maliciously-coded page that wants direct access to the computer. Closing the purported, accidental backdoor exploit is thankfully as easy as disabling the plugin, but it could be another knock against the internet integration from a company that doesn’t have a great reputation for online security with its copy protection system. We’ve reached out to Ubisoft to confirm the flaw and learn what the solution may be, if it’s needed. For now, we’d definitely turn that plugin off and continue the adventures of Ezio Auditore da Firenze through a desktop shortcut instead.

Update: That was fast. As caught by Geek.com, the 2.0.4 update to UPlay limits the plugin to opening UPlay itself. Unless a would-be hacker can find a way to compromise the system just before you launch into Rayman Origins, it should be safe to play.

Filed under: ,

Ubisoft UPlay may accidentally contain web plugin exploit, Ezio would not approve (update: fixed) originally appeared on Engadget on Mon, 30 Jul 2012 10:02:00 EDT. Please see our terms for use of feeds.

Permalink TechDirt  |  sourceSeclists.org  | Email this | Comments

Microsoft advises nuking Windows Gadgets after security hole discovery, we mourn our stock widgets

Windows 7 with Gadgets

Whether you see Windows Vista and Windows 7 Gadgets as handy tools or a blight upon a pristine desktop, you might want to shut them off for safety’s sake. Mickey Shkatov and Toby Kohlenberg have found that the desktop widgets’ web-based code have flaws that would allow malicious Gadgets, or even hijacked legitimate Gadgets, to compromise a PC without having to go through the usual avenues of attack. Microsoft’s short-term answer to the vulnerability is a drastic one, though: a stopgap patch disables Gadgets entirely, leaving just a barren desktop in its wake. There’s no word on a Gadget-friendly solution arriving before Kohlenberg and Shkatov present at the Black Hat Conference on July 26th, but we suspect Microsoft’s ultimate answer is to move everyone to Windows 8, where Gadgets aren’t even an option. We understand the importance of preventing breaches, of course — we’re just disappointed that we’ll have to forgo miniature stock tickers and weather forecasts a little sooner than expected.

Filed under:

Microsoft advises nuking Windows Gadgets after security hole discovery, we mourn our stock widgets originally appeared on Engadget on Wed, 11 Jul 2012 14:42:00 EDT. Please see our terms for use of feeds.

Permalink Computerworld  |  sourceMicrosoft, Black Hat Conference  | Email this | Comments