Surviving the Week 9/28/12

Passwords of 100k IEEE members lie bare on FTP server

IEEE uses Akamai for content delivery. A FTP directory server was discovered which contained log files of username, password, IP addresses and HTTP request information.  Surprisingly, an organization like IEEE logs such a sensitive information.  NTOSpider looks for similar log files on systems during a scan, Test your application with NTOSpider to find out if any log file accessible from your webroot.

Hackers target Windows Update in phishing attack

Thieves have constructed spam messages which claim to originate from The messages, which are designed to resemble official alerts from Microsoft, advise users that their systems might be at risk and advises them to visit a supposed “update” page. Upon clicking the link, however, users are directed to a phishing site which attempts to harvest email addresses from webmail services including Gmail and AOL mail.

USSD attack not limited to Samsung Android devices, can also kill SIM cards

Ravishankar Borgaonkar, a researcher, recently demonstrated the remote data wiping attack at the Ekoparty security conference. The attack can be launched from a Web page by loading a “tel:” URI (uniform resource identifier) with a special factory reset code inside an iframe. If the page is visited from a vulnerable device, the dialer application automatically executes the code and performs a factory reset. Several Samsung Android devices, including Samsung Galaxy S III, Galaxy S II, Galaxy Beam, S Advance, and Galaxy Ace were reported to be vulnerable because they supported the special factory reset code.

jQuery 1.8.2 Released

jQuery 1.8.2 is released with fixes to several bugs and performance enhancements.

SSL Scanner – SSLyze

A python script to test SSL checks has been released.
Documentation can be found at –

Warrantless snooping by the Feds of email and social networks is on the rise.

Documents released by the American Civil Liberties Union (ACLU) on Thursday show that law enforcement agencies in the U.S. have increased surveillance of Americans’ electronic communications.

Java exploited, again !

A new zero-day vulnerability has been discovered in all currently-supported versions of Oracle’s Java software, potentially allowing attackers to install malware on around 1 billion Macs and PCs. Announced on the Full Disclosure mailing list by security researcher Adam Gowdiak on Wednesday, the bug is present in Java 5, Java 6, and Java 7.  The 1 billion figure is taken from installation statistics provided by Oracle.  This vulnerability has serious implications on those business applications that continue to require older Java versions.

About Dan Kuykendall 173 Articles
Connect with Dan on Google+

Be the first to comment

Leave a Reply

Your email address will not be published.