Spoofed URLs: Homograph Attacks Revisited

How homograph attacks can present a spoofed, malicious link, and a case where a secure connection doesn’t guarantee a safe site.

Tor users targeted with exit node malware

An exit node on the Tor network has been discovered to be slipping malware on top of downloads, according to The Register. The server, based in Russia, has been flagged as bad by The Tor Project, but this “would not prevent copycat attackers from the more than 100 exit nodes in operation.”

POODLE Attack – Google uncovers major flaw in SSL 3.0

In an announcement eerily reminiscent of the early phases of the Heartbleed flaw that took internet security by storm earlier in the year, Google has uncovered an exploit that could allow attackers to decode the plaintext traffic of a secure connection.

Microsoft emite alerta por certificados digitais falsos

Pouco mais de uma semana atrás, a Google anunciou que encontrou certificados digitais fraudulentos em alguns de seus domínios. Esses certificados tinham sido gerados pelo Centro Nacional de Informática (NIC) da Índia, autoridade responsável pela geração de certificados de confiança nesse país. O fato desses certificados estarem no programa Windows Root Certificate Program Members da Microsoft

Microsoft emite alerta por certificados digitales falsos

Un poco más de una semana atrás, Google anunció que había encontrado certificados digitales ilegítimos en algunos de sus dominios. Los mismos habían sido generados por el Centro Nacional de Informática (NIC) de India, autoridad de certificación responsable de confianza del país, y esto hace que los mismos sean de confianza para la mayoría de los programas para Windows, como el navegador Internet Explorer. Desde su descubrimiento, han encontrado dominios pertenecientes a Google y Yahoo, entre otros.

Falla en GnuTLS permite truncar conexiones seguras en Linux

La compañía Codenomicon (responsable del hallazgo de Heartbleed) halló un bug en la biblioteca para comunicaciones seguras GnutTLS. La explotación del mismo durante una comunicación cliente – servidor permitiría que este último pueda truncar la validación entre ellos, logrando un buffer overflow y por consiguiente pudiendo lograr hasta una ejecución de código de forma remota.

Nube de Microsoft utilizada para alojar phishing

Usualmente, los atacantes buscan sitios vulnerables para alojar sitios de phishing y robar información de usuarios descuidados. Esta tendencia podría verse facilitada por el uso de servicios de alojamiento con períodos gratuitos de prueba de empresas reconocidas, y esto fue lo que ocurrió con Microsoft Azure. Entre los sitios afectados por estas campañas se encuentran

WhatsApp podría dejar al descubierto tu ubicación geográfica

La funcionalidad de compartir ubicación disponible en WhatsApp, la popular aplicación de mensajería instantánea, podría revelarle a cibercriminales o espías dónde te encuentras. Para compartir la ubicación, es necesario primero abrir una conversación y localizarse en Google Maps, como muestra la siguiente captura: Una vez seleccionada, WhatsApp la envía junto a una imagen de vista

¿No actualizaste tu iPhone o iPad el fin de semana? Es hora de hacerlo

El fin de semana se hizo púlica una vulnerabilidad de alta criticidad para sistemas iOS, es decir, para todos aquellos que cuenten con dispositivos de Apple como iPhone o iPad, e incluso posteriormente se anunció que los equipos con Mac OS también están en riesgo. La vulnerabilidad afecta la seguridad en el uso del procotolo

Urgent iPhone and iPad security update, Mac OS X as well

Users of Apple iPhone and/or iPad need to install iOS 7.0.6 right away to patch a vulnerability in the SSL code that protects connections with websites and other computers. Users of Mac OS X should be on alert for a similar fix, due shortly.

Iranian TOR arms race a shadow of things to come?

Recently, the anonymizing network system TOR (The Onion Router) found its traffic was ratcheted to a standstill in Iran, prompting a comparison by one of the TOR project developers to an emerging “arms race”. Users of the service, hoping to evade state censorship/snooping, encrypt the traffic that then gets routed anonymously around the globe. But

Facebook Fixes Flaw – Farmville Compromises Facebook

After the release of FireSheep, Facebook took an important step to help protect Facebook user accounts by allowing users to choose to keep an encrypted connection as long as they used just Facebook and intelligently designed apps. Savvy users immediately discovered that if they tried to use grossly insecure apps such as Farmville, 21 Questions,

Politicians Better at Security than Twitter, Yahoo, and Amazon

Recently Senator Schumer from New York wrote a letter (http://www.infosecurity-us.com/view/16328/senator-schumer-current-internet-security-welcome-mat-for-wouldbe-hackers/) to Twitter, Yahoo, and Amazon asking them to make SSL the default for internet connections. What this means is that instead of an http connection they should provide and https connection by default. This is important because with http connections you are exposed to risk

Encrypted Facebook Chat?

With the release of Firesheep the Firefox add on HTTPS Everywhere has increased in popularity as it helps ensure that your Facebook session is encrypted. Using Facebook over https breaks the chat on Facebook however. The other day a friend of mine initiated a chat with me on Facebook. Imagine my surprise since I was


In response to my recent cookie theft blog a reader asked the following questions: What is VPN, what is SSL and what is the significance of https? What precautions can we take if we need to do Internet banking from a public computer, Internet café for example? VPN, SSL and https are all about encryption.

Why is Unsecured Wi-Fi So Risky?

I’m sure that at some point you have listened to the radio. A signal goes out and all radios in range can tune in to the broadcast. WI-FI is essentially a radio signal that transmits and receives data. The access point and your computer exchange information, but all computers with wireless capabilities can receive the

Dr. Zeus: the Bot in the Hat

…behaviour like this has been observed in other versions of Zeus. The really interesting discovery in this case is associated with the way in which these samples search for logical devices attached to an infected computer….

HTTPS revisited – Spanish video

Further to our blogs on HTTPS and SSL certificate issues – see http://www.eset.com/threat-center/blog/2009/10/06/ssl-to-certify-web-security-is-not-to-guarantee-it and http://www.eset.com/threat-center/blog/2009/10/04/truth-fiction-and-https – Sebastián Bortnik has been talking to us today about a video that ESET Latin-America have put together demonstrating a phishing attack using HTTPS. If your Spanish is better than mine, you can check it out here. However, we’ve been working on an

SSL: to certify web security is not to guarantee it

Hard on the heels of the translated blog by Sebastián Bortnik that I posted at the weekend comes news from the Register (http://www.theregister.co.uk/2009/10/05/fraudulent_paypay_certificate_published/) of a bogus Paypal SSL certificate released yesterday exploiting a bug in Microsoft’s crypto API that has remained unpatched for more than two months, when Moxie Marlinspike (can I have a handle

Truth, Fiction and HTTPS

Update, 19th October. I was recently contacted indirectly by Eddy Nigg of StartCom, who points out, quite rightly, that this issue is not specific to StartCom, nor a problem created by StartCom. He commented further in a comment to Dan Raywood’s article for SC Magazine arising from this blog entry, and I think it’s only

Follow us

Copyright © 2017 ESET, All Rights Reserved.