Current Events Archives - Page 2 of 4 - West Chester Computer Doctors

A major flaw has been found in the OpenSSL library, compromising a large number of websites that use OpenSSL to encrypt web data. Almost one-third of major websites use OpenSSL to encrypt user information (like credit card numbers and sensitive information) that is being passed to their servers. Unfortunately, this vulnerability allows someone to potentially capture important information about the server, making it possible to infiltrate it. Once infiltrated, an attack can pose as the server and intercept any data sent over the SSL connection.
Open SSL has released a patch on Monday to correct the issues. Current users of OpenSSL should either upgrade to OpenSSL 1.0.1g or disable the heartbeat function of the library. The vulnerability has existed for two years, and attack are completely silent and unnoticeable. Experts are also recommending that users of OpenSSL replace their security certificates and keys.
Emergency SSL/TSL Patch Underway- Dark Reading by Information Week

The malware known as “Gameover” is currently targeting employment websites. This trojan is used to redirect users to a fake login page for Monster.com where it collects the targeted victims data. They do this be injecting a fake login button on Monster.com on infected computers. Other than the fake login button, the Monster page looks completely normal. Not only does the trojan collect login data, but it also asks the user to select and answer a security question.

Gameover had previously targeted CareerBuilder.com, but the Monster development is a new one.

Regular users of employment sites are recommended to pay attention to their login pages and make sure nothing seems out of the ordinary or different before logging in.

Gameover Malware Targets Accounts on Employee Websites- ITWorld.com

More and more people are using devices that connect to the internet to improve their home. It’s nice to be able to control your thermostat from your phone or receive a tweet when your refrigerator detects that your milk has gone bad. Unfortunately, with the rise of internet connected things, or “The Internet of Things”, security experts are questioning the security of these devices. The fact of the matter is, there is minimal protection of the internet connected things.

An example would be the fact the 95% of the worlds ATMs are running Windows XP (an operating system that will no longer be supported as of April 8th, 2014). Other creators of internet connected things do not include or have minimal methods of issuing patches or updates. Studies show that even when a system does have a patch available, consumers are not likely to apply it.

‘Thingularity’ Triggers Security Warnings- Information Week’s Dark Reading

At least two apps available in the Google Play store have been found to contain an interesting form of malware. The apps Songs and Prized each contain malware, now known as KageCoin, that utilizes the device as a crypto-currency mining device. Crypto-currency mining is when a device uses a part of its processing power to facilitate crypto-currency transactions, and in return earns the owner (or malware attacker) a portion of the currency.
While annoying, the malware isn’t as bad as it could be. It only performs its mining actions while the device is charging. Because of this, its power consumption is less noticeable.

Android Apps Hide Crypto-Currency Mining Malware- DarkReading.net

Microsoft recently warned of a particular vulnerability in Microsoft Word, specifically the 2010 version. This vulnerability is a defect when a user opens an RTF file with Word. This includes when a users uses Outlook, as Outlook uses Word as its default email viewer. When exploited, Microsoft Word parses a particular RTF file, and the computer’s memory can become compromised. This gives the attacker access to the users computer with the same rights as the user. While standard users may be less affected by the attack, users with administrator rights become more vulnerable. While Microsoft Word 2010 seems to be the most at risk, Microsoft notes that Word 2007 and 2013 also contain the vulnerability. While Microsoft says Word 2013 can be exploited, current research suggests the attack attempt crashes when executed in 2013.

Microsoft has released one of their Fix It tools in order to patch the vulnerability.

New Microsoft Word Zero-Day Used in Targeted Attacks- SecurityWeek.com
Microsoft Advisory and Fix It

Posted in Current Events

Hours

Monday
9am – 5pm
Tuesday
9am – 5pm
Wednesday
9am – 5pm
Thursday
9am – 5pm
Friday
9am – 5pm
Saturday
Closed
Sunday
Closed

West Chester Location

212 East Market St., 2nd Floor
West Chester, PA 19382

Phone (610) 431 0400

Email support@computerwc.com

Affiliates/Friends

West Chester Data Protection
Follow West Chester Computer Doctors on Twitter
Like us on facebook
West Chester Data Protection