Web Users Must Stay Extra Wary to Fend Off Stealthy 'Malvertising'
The malvertising now seems to be showing up on major Websites using well-known ad networks such as Google's DoubleClick.
The reason that malvertising is being distributed by the top ad networks is because the malware writers are actually buying ads and then feeding the ad servers content that is infected with malware, but the latest tactics are even more sinister. Now the malware can simply infect your computer without any action on your part. No longer do you have to click on an infected link.
Segura said that the fingerprinting process will check to see if the computer is using a residential IP address, whether it’s running a real copy of Windows on a real machine or whether it's actually running in a virtual environment.
Big-name sites hit by rash of malicious ads spreading crypto ransomware
Mainstream websites, including those published by The New York Times, the BBC, MSN, and AOL, are falling victim to a new rash of malicious ads that attempt to surreptitiously install crypto ransomware and other malware on the computers of unsuspecting visitors, security firms warned.
The new campaign started last week when "Angler," a toolkit that sells exploits for Adobe Flash, Microsoft Silverlight, and other widely used Internet software, started pushing laced banner ads through a compromised ad network.
According to a just-published post from Malwarebytes, a flurry of malvertising appeared over the weekend, almost out of the blue. It hit some of the biggest publishers in the business, including msn.com, nytimes.com, bbc.com, aol.com, my.xfinity.com, nfl.com, realtor.com, theweathernetwork.com, thehill.com, and newsweek.com. Affected networks included those owned by Google, AppNexis, AOL, and Rubicon.
Marcher Trojan Hits Android Users Through Face Adobe Flash Installer
Many different vulnerabilities show up in Adobe Flash—in fact, Adobe just released fixes 23 of the latest security flaws this week. But the new Android Marcher Trojan isn't using an authentic version of Flash or exploiting vulnerabilities that Adobe has already patched. Rather, the Android Marcher Trojan uses a fake version of an Adobe Flash Player installer to infect users.
Encrypted WhatsApp messages frustrate new court-ordered wiretap
According to a Saturday report in The New York Times, prosecutors have gone head-to-head with WhatsApp, the messaging app owned by Facebook. Citing anonymous sources, the Times reported that "as recently as this past week," federal officials have been "discussing how to proceed in a continuing criminal investigation in which a federal judge had approved a wiretap, but investigators were stymied by WhatsApp’s encryption."
As Ars reported earlier this month, since late 2014, all WhatsApp messages sent between Android devices are end-to-end encrypted, which means that not even parent company Facebook can access their plaintext contents.
Let's Encrypt Free Certificates' Success Challenges SSL/TLS Industry
The Let's Encrypt certificate service was first announced in November 2014 as an effort to help expand the use and availability of cryptographic security for Websites.
"More encryption is great but the ease of obtaining certificates automatically can be riskier," Bocek said. "We've already seen phishing sites and other attacks use Let's Encrypt certificates."
"We are only issuing certificates with 90 day lifetimes, and that will be the case for the foreseeable future," Aas said. "Dealing with certificates manually is inefficient and error-prone. We want to strongly encourage automation. And if your system is automated then it doesn't really matter how long the certificate lifetimes are."
Email inventor Ray Tomlinson dies at 74
Tomlinson was best known for choosing the @ symbol to indicate a message should be sent to a different computer on a network. He also led development of standards for the from, subject, and date fields found in every email message sent today.
News of his death began circulating on a BBN alumni email list tonight. Another networking legend, TCP/IP inventor Vint Cerf, confirmed it via Twitter.
When a WordPress Plugin Goes Bad
Custom Content Type Manager (CCTM) is a relatively popular plugin with three years of development, 10,000+ active installs, and a satisfaction rating of 4.8. It helps create custom post types. Website owners find the classical “blog format” too restrictive, use the plugin to add custom elements to their posts.
All we know is that the plugin hadn’t been updated before that for ten months. Perhaps its developer lost interest in it and accepted an offer from wooranker. On the other hand, taking into account the malicious plugin update and the fact that fireproofsocks was inactive for nearly a year, we can suspect that wooranker could have hacked into the fireproofsocks account and added themselves as a new owner.
UK government launches initiative against online adblocking, compares it to piracy
Today the UK’s culture secretary John Whittingdale has announced that the British government intends to ‘do something’ on the issue, describing the practice as a ‘modern day protection racket’, and comparing it to piracy.
Last month the president and CEO of the Interactive Advertising Bureau (IAB), Randall Rothenburg, described adblocking companies as a freedom-hating ‘Mafia’.
Zynga CEO resigns – again – after terrible results
Both Pincus and Gibeau in a separate email put the blame for Zynga's failure to continue its early successes with games such as Farmville on a reduction in the social aspect of mobile games.
In the fourth quarter, Zynga saw a 24 per cent decline in its users, and revenue also fell from $193m the previous year to $186m.
Shares have fallen 20 per cent since Pincus was brought back in April 2015, but that's nothing compared to the nearly 80 per cent fall in the company's share price since it went public in 2011.
Reinvented ransomware shifts from pwning PC to wrecking websites
The website variant of CTB Locker is encrypting all files on WordPress-powered sites and replacing the index.php with a file that displays instructions for paying the ransom.
Victims can decrypt two separately-encrypted files for free in a bid by attackers to demonstrate the legitimacy of the ransom demand.