Author Topic: SECURITY WARNINGS & Notices - Please post them here  (Read 2904435 times)

0 Members and 7 Guests are viewing this topic.

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33920
  • malware fighter
Re: SECURITY WARNINGS & Notices - Please post them here
« Reply #4530 on: February 29, 2016, 06:22:34 PM »
`WeirdPress` gonna be more and more insecure.

You are right Steven Winderlich, on their linuxmint blog site they still have it installed.

Quote
With a staggering 33,621 plugins downloaded a total of 749,138,518 times in the case of WordPress, the impact of exploiting security vulnerabilities could be huge
Quote by Mark Wilson, one year ago, the situation may even have grown worse now.  :o

polonus
« Last Edit: March 01, 2016, 12:47:12 AM by polonus »
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

Offline Dwarden

  • Avast Evangelist
  • Super Poster
  • ***
  • Posts: 1793
  • Ideas, that's ocean without borders!
    • Bohemia Interactive
Re: SECURITY WARNINGS & Notices - Please post them here
« Reply #4531 on: March 01, 2016, 06:56:28 AM »
so much for wireless devices, here goes mousejack exploit https://www.mousejack.com/

more in-depth details https://www.bastille.net/technical-details
https://twitter.com/FoltynD , Tech. Community, Online Services & Distribution manager of Bohemia Interactive

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33920
  • malware fighter
Re: SECURITY WARNINGS & Notices - Please post them here
« Reply #4532 on: March 01, 2016, 06:21:47 PM »
A basic implementation error will turn major browsers into a real cookie monster,
Quote
so cookies set via HTTP requests may allow a remote attacker to bypass HTTPS and reveal private session information”.
Quotes taken from this article: http://www.theregister.co.uk/2015/09/25/cookies_monster_your_security/
article author =  Richard Chirgwin
Quote
The malicious cookie is under the attacker's control, but even a user who looks through their cookie list might not realise it's a fake - opening the way for the attacker to grab private information.

polonus
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

Offline DavidR

  • Avast Überevangelist
  • Certainly Bot
  • *****
  • Posts: 89131
  • No support PMs thanks
Re: SECURITY WARNINGS & Notices - Please post them here
« Reply #4533 on: March 01, 2016, 07:38:30 PM »
Most of those cookies are likely to be 3rd party ones I suspect.

One of the other sort of security add-ons for firefox that I use is CookieMonster, this allows a reasonable degree of configuration on what cookies are allowed - particularly 3rd party cookies.

Not to mention, I automatically disable 3rd party cookies in firefox, also when I close firefox any session cookies are removed.
Windows 10 Home 64bit/ Acer Aspire F15/ Intel Core i5 7200U 2.5GHz, 8GB DDR4 memory, 256GB SSD, 1TB HDD/ avast! free 24.4.6112 (build 24.4.9067.762) UI 1.0.803/ Firefox, uBlock Origin, uMatrix/ MailWasher Pro/ Avast! Mobile Security

REDACTED

  • Guest
Re: SECURITY WARNINGS & Notices - Please post them here
« Reply #4534 on: March 02, 2016, 02:22:11 AM »
There are several extensions for Firefox that allow cookies to be controlled. I use one with the painfully obvious name of Cookie Controller. Works, and stays out of the way most of the time. Most sites I use frequently get my default of 1st-party cookies only, treating all cookies as session (gone when closing the browser). That, plus NoScript with some tuning, keeps attacks to a dull roar but does have side effects in a few places. MS, for instance, blocks access to it's "support.microsoft.com" web site if you have cookies or javascript blocked, or even if those extensions are simply present. There are other ways in, if information is needed, so that's an annoyance at worst, but these privacy mechanisms aren't without side effects.

I've tried the Avast extension in FF. It works, but doesn't appear to know that things are already blocked by something else and wants to block again. Then, after a while, everything stops working for some major sites (I think they recognize the Avast extension and throw a fit), but it all starts working again if I drop back to just Cookie Controller and NoScript. Privacy Badger is another good one, and stays mostly out of the way, but its main features are now (with less control) incorporated into FF. Ah well ... why am I reminded of Elmer Fudd trying biocontrol of the bugs in his vegetable patch ...

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33920
  • malware fighter
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33920
  • malware fighter
Re: SECURITY WARNINGS & Notices - Please post them here
« Reply #4536 on: March 03, 2016, 01:38:59 AM »
Infecting users through malicious ads gets sneakier and sneakier....malware campaigns make these ads are hidden to infest visitors with vulnerable unpatched software on their OS. Fingerprinting code inside ads can discriminate between a real victim to infest or security researchers using a honeypot for instance. Read about it here: https://malwarebytes.app.box.com/Operation-Fingerprint

This again demonstrates that visiting to-days Internet can be best done with a decent up to date adblocker up and running.

polonus
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

Offline bob3160

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 48595
  • 64 Years of Happiness
    • bob3160 Protecting Yourself, Your Computer and, Your Identity
Re: SECURITY WARNINGS & Notices - Please post them here
« Reply #4537 on: March 03, 2016, 01:58:47 AM »
Keeping your browser, OS and programs updated also goes a long way toward staying safe. :)
Free Security Seminar: https://bit.ly/bobg2023  -  Important: http://www.organdonor.gov/ -- My Web Site: http://bob3160.strikingly.com/ - Win 11 Pro v24H2 64bit, 32 Gig Ram, 1TB SSD, Avast Free 24.4.6112, How to Successfully Install Avast http://goo.gl/VLXdeRepair & Clean Install https://goo.gl/t7aJGq -- My Online Activity https://bit.ly/BobGInternet

Offline mchain

  • Avast Evangelist
  • Ultra Poster
  • ***
  • Posts: 5666
  • Spartan Warrior
Re: SECURITY WARNINGS & Notices - Please post them here
« Reply #4538 on: March 03, 2016, 11:02:45 AM »
Linux Mint no longer uses WordPress CMS on their website: http://blog.linuxmint.com/?p=2994
Direct access to website CMS was too much of a risk, but a lot of website owners like the easy way better than the secure way.

polonus

Wappalyzer still lists it tho.
Linux Mint Forums Hacked:  https://forums.linuxmint.com/viewtopic.php?f=143&t=217298&sid=9e27bc4310f2a05cc38871aa8de6f814 
Windows 10 Home 64-bit 22H2 Microsoft Windows Defender - Windows 11 Home 23H2 - Windows 11 Pro 23H2 Avast Premier Security version 24.4.6112 (build 24.4.9067.762) UI version 1.0.803

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33920
  • malware fighter
Re: SECURITY WARNINGS & Notices - Please post them here
« Reply #4539 on: March 04, 2016, 02:36:19 PM »
Mozilla blocks add-on that can seriously hamper browser security settings and allow malicious extension to be installed:
https://addons.mozilla.org/en-US/firefox/blocked/i1129

polonus
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33920
  • malware fighter
Re: SECURITY WARNINGS & Notices - Please post them here
« Reply #4540 on: March 05, 2016, 01:19:04 AM »
In the line of the DROWn attack insecurity discussion (on vulnerable SSL v.2/SSL v.3 in stead of TLS) e-mail server config could be the weakest link. Read: https://security.stackexchange.com/questions/116139/what-is-drown-and-why-is-it-even-possible   info credits go to Thomas Pornin:
Quote
There is just one thing that seems understated: e-mail servers are broken security-wise... by default and by design.
To check use sslyze: https://github.com/nabla-c0d3/sslyze
Conclusion:
Quote
At any rate, if you disable SSLv2/3 on your mail server, you are safe from DROWN.

Above quote credit goes to "sleske".  :)

polonus
« Last Edit: March 05, 2016, 01:43:17 AM by polonus »
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33920
  • malware fighter
Re: SECURITY WARNINGS & Notices - Please post them here
« Reply #4541 on: March 05, 2016, 02:37:57 PM »
WordPress plug-in backdoored to steal your passwords!
The issue with Custom Content Type Manager was detected by Sucuri's.
Read: https://blog.sucuri.net/2016/03/when-wordpress-plugin-goes-bad.html

Check WordPress plug-ins here: https://hackertarget.com/wordpress-security-scan/
or use this extension: Scan WP when the site has been built using WordPress.

WordPress plug-ins are not insecure: http://www.itpro.co.uk/security/24163/the-wordpress-cms-isnt-insecure-you-are
link article author = Davey Winder
Developers are not trained or instructed to develop with security in mind.

Still actuality: http://www.networkworld.com/article/2224843/opensource-subnet/7-of-10-leading-wordpress-plugins-are-vulnerable.html  article author = Alin Shimel.

polonus (volunteer website security analyst and website error-hunter)

P.S. Seems the questioned plug-in has been taken down or has been left.  ;)
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

Offline Para-Noid

  • Avast Evangelist
  • Starting Graphoman
  • ***
  • Posts: 6700
  • Trust only what you test yourself!
Re: SECURITY WARNINGS & Notices - Please post them here
« Reply #4542 on: March 08, 2016, 04:23:11 PM »
Direct deposits rerouted after Illinois State University data breach

http://www.scmagazine.com/illinois-state-university-data-breach-compromised-employee-payments/article/480815/

It’s 2016, so why is the world still falling for Office macro malware?

http://arstechnica.com/security/2016/03/its-2016-so-why-is-the-world-still-falling-for-office-macro-malware/

This was a pain to post. Chrome was taking forever to load. Had to resort to copy/paste Chrome to Firefox.
Somethings Chrome is best...somethings Firefox is best.
Dell Inspiron, Win10x64--HP Envy Win10x64--Both systems Avast Free v17.9.2322, Comodo Firewall v8.2 w/D+, MalwareBytes v3.0, OpenDNS, Super Anti-Spyware, Spyware Blaster, MCShield, Unchecky, Vivaldi Browser and, various browser security tools.

"Look before you leap!" Use online scanners before you click on any link.

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33920
  • malware fighter
Re: SECURITY WARNINGS & Notices - Please post them here
« Reply #4543 on: March 08, 2016, 04:28:01 PM »
DROWn Attack Vulnerability gonna produce a lot of threat where you do not expect it:
https://forum.avast.com/index.php?topic=184007.msg1298072#msg1298072

Background info on this attack of the week:  http://blog.cryptographyengineering.com/2016/03/attack-of-week-drown.html
link article author: Matthew Green

polonus
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

Offline Simion

  • Advanced Poster
  • **
  • Posts: 976