<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber Security January 2018</title>
	<atom:link href="http://www.epanorama.net/blog/2018/01/03/cyber-security-january-2018/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2018/01/03/cyber-security-january-2018/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Tue, 07 Apr 2026 21:53:31 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/01/03/cyber-security-january-2018/comment-page-3/#comment-1580404</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Feb 2018 05:38:48 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=62442#comment-1580404</guid>
		<description><![CDATA[UK mass digital surveillance regime ruled unlawful
https://www.theguardian.com/uk-news/2018/jan/30/uk-mass-digital-surveillance-regime-ruled-unlawful-appeal-ruling-snoopers-charter?CMP=twt_gu

Judges say snooper’s charter lacks adequate safeguards around accessing personal data

Appeal court judges have ruled the government’s mass digital surveillance regime unlawful in a case brought by the Labour deputy leader, Tom Watson.

Liberty, the human rights campaign group which represented Watson in the case, said the ruling meant significant parts of theInvestigatory Powers Act 2016 – known as the snooper’s charter – are effectively unlawful and must be urgently changed.]]></description>
		<content:encoded><![CDATA[<p>UK mass digital surveillance regime ruled unlawful<br />
<a href="https://www.theguardian.com/uk-news/2018/jan/30/uk-mass-digital-surveillance-regime-ruled-unlawful-appeal-ruling-snoopers-charter?CMP=twt_gu" rel="nofollow">https://www.theguardian.com/uk-news/2018/jan/30/uk-mass-digital-surveillance-regime-ruled-unlawful-appeal-ruling-snoopers-charter?CMP=twt_gu</a></p>
<p>Judges say snooper’s charter lacks adequate safeguards around accessing personal data</p>
<p>Appeal court judges have ruled the government’s mass digital surveillance regime unlawful in a case brought by the Labour deputy leader, Tom Watson.</p>
<p>Liberty, the human rights campaign group which represented Watson in the case, said the ruling meant significant parts of theInvestigatory Powers Act 2016 – known as the snooper’s charter – are effectively unlawful and must be urgently changed.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/01/03/cyber-security-january-2018/comment-page-3/#comment-1580318</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 31 Jan 2018 11:58:55 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=62442#comment-1580318</guid>
		<description><![CDATA[Ugly, perfect ten-rated bug hits Cisco VPNs
https://www.theregister.co.uk/2018/01/30/cisco_asa_and_firepower_cvss_10_0_bug_patch_asap/

Patch your Adaptive Security Appliance and Firepower Threat Defense code before they&#039;re utterly p0wned

A programming slip in Cisco VPN software has introduced a critical vulnerability hitting ten different Adaptive Security Appliance and Firepower Threat Defense Software products.]]></description>
		<content:encoded><![CDATA[<p>Ugly, perfect ten-rated bug hits Cisco VPNs<br />
<a href="https://www.theregister.co.uk/2018/01/30/cisco_asa_and_firepower_cvss_10_0_bug_patch_asap/" rel="nofollow">https://www.theregister.co.uk/2018/01/30/cisco_asa_and_firepower_cvss_10_0_bug_patch_asap/</a></p>
<p>Patch your Adaptive Security Appliance and Firepower Threat Defense code before they&#8217;re utterly p0wned</p>
<p>A programming slip in Cisco VPN software has introduced a critical vulnerability hitting ten different Adaptive Security Appliance and Firepower Threat Defense Software products.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/01/03/cyber-security-january-2018/comment-page-3/#comment-1580316</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 31 Jan 2018 11:57:17 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=62442#comment-1580316</guid>
		<description><![CDATA[To hack Australia and learn its secrets, buy second-hand furniture
Secret cabinet documents found in filing cabinet sold because someone lost the key
https://www.theregister.co.uk/2018/01/31/australian_cabinet_leaked_a_cabinet/

The Australian government has suffered what must as one of the most ridiculously embarrassing security breach in its history: cabinet records from five successive governments were sent to a second-hand furniture store.

The trove ended up in the hands of the Australian Broadcasting Corporation (ABC - which is in the process of publishing what it judges safe to publish here).

It appears that someone decided to sell two filing cabinets intact because they&#039;d lost the key (really); the buyer applied a power drill to the locks, and the rest is history.

And what a history it&#039;s turned out to be: for the ABC. The broadcaster says it&#039;s “withheld documents if there are national security reasons, if the information is already public, or to protect the privacy of public servants.”

Vulture South will keep our eyes on the cabinet leaks to look for other snippets of interest to our readers.]]></description>
		<content:encoded><![CDATA[<p>To hack Australia and learn its secrets, buy second-hand furniture<br />
Secret cabinet documents found in filing cabinet sold because someone lost the key<br />
<a href="https://www.theregister.co.uk/2018/01/31/australian_cabinet_leaked_a_cabinet/" rel="nofollow">https://www.theregister.co.uk/2018/01/31/australian_cabinet_leaked_a_cabinet/</a></p>
<p>The Australian government has suffered what must as one of the most ridiculously embarrassing security breach in its history: cabinet records from five successive governments were sent to a second-hand furniture store.</p>
<p>The trove ended up in the hands of the Australian Broadcasting Corporation (ABC &#8211; which is in the process of publishing what it judges safe to publish here).</p>
<p>It appears that someone decided to sell two filing cabinets intact because they&#8217;d lost the key (really); the buyer applied a power drill to the locks, and the rest is history.</p>
<p>And what a history it&#8217;s turned out to be: for the ABC. The broadcaster says it&#8217;s “withheld documents if there are national security reasons, if the information is already public, or to protect the privacy of public servants.”</p>
<p>Vulture South will keep our eyes on the cabinet leaks to look for other snippets of interest to our readers.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/01/03/cyber-security-january-2018/comment-page-3/#comment-1580315</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 31 Jan 2018 11:54:38 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=62442#comment-1580315</guid>
		<description><![CDATA[Unsanitary Firefox gets fix for critical HTML-handling hijack flaw
Versions 56 through 58 need patching, pronto
https://www.theregister.co.uk/2018/01/30/mozilla_patches_critical_firefox_vulnerability/

Mozilla has patched a nasty security bug in Firefox, affecting versions 56, 57 and 58, and their point updates.

The CVSS-8.8-rated flaw means that if an attacker can get a user to open a malicious document or link, remote code execution becomes a possibility – allowing spyware, ransomware and other nasties to be installed and run.

An advisory from Cisco explains: “The vulnerability is due to insufficient sanitisation of HTML fragments in chrome-privileged documents by the affected software … A successful exploit could allow the attacker to execute arbitrary code with the privileges of the user. If the user has elevated privileges, the attacker could compromise the system completely.”]]></description>
		<content:encoded><![CDATA[<p>Unsanitary Firefox gets fix for critical HTML-handling hijack flaw<br />
Versions 56 through 58 need patching, pronto<br />
<a href="https://www.theregister.co.uk/2018/01/30/mozilla_patches_critical_firefox_vulnerability/" rel="nofollow">https://www.theregister.co.uk/2018/01/30/mozilla_patches_critical_firefox_vulnerability/</a></p>
<p>Mozilla has patched a nasty security bug in Firefox, affecting versions 56, 57 and 58, and their point updates.</p>
<p>The CVSS-8.8-rated flaw means that if an attacker can get a user to open a malicious document or link, remote code execution becomes a possibility – allowing spyware, ransomware and other nasties to be installed and run.</p>
<p>An advisory from Cisco explains: “The vulnerability is due to insufficient sanitisation of HTML fragments in chrome-privileged documents by the affected software … A successful exploit could allow the attacker to execute arbitrary code with the privileges of the user. If the user has elevated privileges, the attacker could compromise the system completely.”</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/01/03/cyber-security-january-2018/comment-page-3/#comment-1580314</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 31 Jan 2018 11:54:11 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=62442#comment-1580314</guid>
		<description><![CDATA[Scammers become the scammed: Ransomware payments diverted with Tor proxy trickery
Of course this does nothing for victims&#039; encrypted files
https://www.theregister.co.uk/2018/01/30/ransomware_diversions/

Cybercriminals are using Tor proxies to divert ransomware payments to their own Bitcoin wallets.

Ransomware scammers have long directed victims to payment portals on the Tor network. For those who do not want to or cannot install the Tor browser necessary to pay their ransoms, operators generally direct victims to a Tor proxy such as onion.top or onion.to, which allows users to access the Tor network via standard web browsers.

But, in what appears to be the first such attack of its kind, operators of a onion.top proxy are performing man-in-the-middle attacks to substitute their own Bitcoin payment addresses for those originally specified in selected ransomware strains, net security firm Proofpoint reports.

Double dipping: Diverting ransomware Bitcoin payments via .onion domains
https://www.proofpoint.com/us/threat-insight/post/double-dipping-diverting-ransomware-bitcoin-payments-onion-domains]]></description>
		<content:encoded><![CDATA[<p>Scammers become the scammed: Ransomware payments diverted with Tor proxy trickery<br />
Of course this does nothing for victims&#8217; encrypted files<br />
<a href="https://www.theregister.co.uk/2018/01/30/ransomware_diversions/" rel="nofollow">https://www.theregister.co.uk/2018/01/30/ransomware_diversions/</a></p>
<p>Cybercriminals are using Tor proxies to divert ransomware payments to their own Bitcoin wallets.</p>
<p>Ransomware scammers have long directed victims to payment portals on the Tor network. For those who do not want to or cannot install the Tor browser necessary to pay their ransoms, operators generally direct victims to a Tor proxy such as onion.top or onion.to, which allows users to access the Tor network via standard web browsers.</p>
<p>But, in what appears to be the first such attack of its kind, operators of a onion.top proxy are performing man-in-the-middle attacks to substitute their own Bitcoin payment addresses for those originally specified in selected ransomware strains, net security firm Proofpoint reports.</p>
<p>Double dipping: Diverting ransomware Bitcoin payments via .onion domains<br />
<a href="https://www.proofpoint.com/us/threat-insight/post/double-dipping-diverting-ransomware-bitcoin-payments-onion-domains" rel="nofollow">https://www.proofpoint.com/us/threat-insight/post/double-dipping-diverting-ransomware-bitcoin-payments-onion-domains</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/01/03/cyber-security-january-2018/comment-page-3/#comment-1580306</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 31 Jan 2018 10:05:16 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=62442#comment-1580306</guid>
		<description><![CDATA[Cisco Patches Critical Code Execution Flaw in Security Appliances
http://www.securityweek.com/cisco-patches-critical-code-execution-flaw-security-appliances

Cisco informed customers on Monday that updates released for its Adaptive Security Appliance (ASA) software patch a critical vulnerability that can be exploited to gain full control of devices or cause them to reload.

The security hole, tracked as CVE-2018-0101 and assigned a CVSS score of 10, allows a remote and unauthenticated attacker to execute arbitrary code or cause a denial-of-service (DoS) condition.]]></description>
		<content:encoded><![CDATA[<p>Cisco Patches Critical Code Execution Flaw in Security Appliances<br />
<a href="http://www.securityweek.com/cisco-patches-critical-code-execution-flaw-security-appliances" rel="nofollow">http://www.securityweek.com/cisco-patches-critical-code-execution-flaw-security-appliances</a></p>
<p>Cisco informed customers on Monday that updates released for its Adaptive Security Appliance (ASA) software patch a critical vulnerability that can be exploited to gain full control of devices or cause them to reload.</p>
<p>The security hole, tracked as CVE-2018-0101 and assigned a CVSS score of 10, allows a remote and unauthenticated attacker to execute arbitrary code or cause a denial-of-service (DoS) condition.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/01/03/cyber-security-january-2018/comment-page-3/#comment-1580305</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 31 Jan 2018 10:04:52 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=62442#comment-1580305</guid>
		<description><![CDATA[Mozilla Patches Critical Code Execution Flaw in Firefox
http://www.securityweek.com/mozilla-patches-critical-code-execution-flaw-firefox

An update released this week by Mozilla for Firefox 58 patches a critical vulnerability that can be exploited by a remote attacker for arbitrary code execution.

The vulnerability, tracked as CVE-2018-5124, affects Firefox versions 56 through 58 and it has been fixed with the release of Firefox 58.0.1. According to Mozilla, Firefox for Android and Firefox 52 ESR are not impacted. Linux distributions have also started pushing out updated packages that include the fix.

“The vulnerability is due to insufficient sanitization of HTML fragments in chrome-privileged documents by the affected software,”]]></description>
		<content:encoded><![CDATA[<p>Mozilla Patches Critical Code Execution Flaw in Firefox<br />
<a href="http://www.securityweek.com/mozilla-patches-critical-code-execution-flaw-firefox" rel="nofollow">http://www.securityweek.com/mozilla-patches-critical-code-execution-flaw-firefox</a></p>
<p>An update released this week by Mozilla for Firefox 58 patches a critical vulnerability that can be exploited by a remote attacker for arbitrary code execution.</p>
<p>The vulnerability, tracked as CVE-2018-5124, affects Firefox versions 56 through 58 and it has been fixed with the release of Firefox 58.0.1. According to Mozilla, Firefox for Android and Firefox 52 ESR are not impacted. Linux distributions have also started pushing out updated packages that include the fix.</p>
<p>“The vulnerability is due to insufficient sanitization of HTML fragments in chrome-privileged documents by the affected software,”</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/01/03/cyber-security-january-2018/comment-page-3/#comment-1580304</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 31 Jan 2018 10:04:01 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=62442#comment-1580304</guid>
		<description><![CDATA[Lenovo Addresses Hardcoded Password in Fingerprint Manager
http://www.securityweek.com/lenovo-addresses-hardcoded-password-fingerprint-manager

Computer maker Lenovo has updated Fingerprint Manager Pro for Windows 7, 8, and 8.1 to address several insecure credential storage issues in the software, including the presence of a hardcoded password.]]></description>
		<content:encoded><![CDATA[<p>Lenovo Addresses Hardcoded Password in Fingerprint Manager<br />
<a href="http://www.securityweek.com/lenovo-addresses-hardcoded-password-fingerprint-manager" rel="nofollow">http://www.securityweek.com/lenovo-addresses-hardcoded-password-fingerprint-manager</a></p>
<p>Computer maker Lenovo has updated Fingerprint Manager Pro for Windows 7, 8, and 8.1 to address several insecure credential storage issues in the software, including the presence of a hardcoded password.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/01/03/cyber-security-january-2018/comment-page-3/#comment-1580301</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 31 Jan 2018 10:02:16 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=62442#comment-1580301</guid>
		<description><![CDATA[Security Explorations Launches New Research Program
http://www.securityweek.com/atm-jackpotting-attacks-strike-us

Hackers have been targeting automated teller machines (ATMs) in the United States to make them spill out cash using an attack technique known as “jackpotting.”

As part of the attacks, individuals with physical access to the machines connect to them and “install malware, or specialized electronics, or a combination of both to control the operations of the ATM,” The United States Secret Service revealed in a warning issued on Friday.

The attackers targeted stand-alone ATMs located in pharmacies, big box retailers, and drive thru ATMs, the alert reads. Both individual suspects and large organized groups (both local and international organized crime syndicates) are engaged in such attacks.]]></description>
		<content:encoded><![CDATA[<p>Security Explorations Launches New Research Program<br />
<a href="http://www.securityweek.com/atm-jackpotting-attacks-strike-us" rel="nofollow">http://www.securityweek.com/atm-jackpotting-attacks-strike-us</a></p>
<p>Hackers have been targeting automated teller machines (ATMs) in the United States to make them spill out cash using an attack technique known as “jackpotting.”</p>
<p>As part of the attacks, individuals with physical access to the machines connect to them and “install malware, or specialized electronics, or a combination of both to control the operations of the ATM,” The United States Secret Service revealed in a warning issued on Friday.</p>
<p>The attackers targeted stand-alone ATMs located in pharmacies, big box retailers, and drive thru ATMs, the alert reads. Both individual suspects and large organized groups (both local and international organized crime syndicates) are engaged in such attacks.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/01/03/cyber-security-january-2018/comment-page-3/#comment-1580297</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 31 Jan 2018 09:56:55 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=62442#comment-1580297</guid>
		<description><![CDATA[Dridex Authors Build New Ransomware
http://www.securityweek.com/dridex-authors-build-new-ransomware

The authors of the infamous Dridex banking Trojan have created a sophisticated ransomware family, ESET warns.]]></description>
		<content:encoded><![CDATA[<p>Dridex Authors Build New Ransomware<br />
<a href="http://www.securityweek.com/dridex-authors-build-new-ransomware" rel="nofollow">http://www.securityweek.com/dridex-authors-build-new-ransomware</a></p>
<p>The authors of the infamous Dridex banking Trojan have created a sophisticated ransomware family, ESET warns.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
