Skip to content

Gotham Security Daily Threat Alerts

by on March 7, 2013

March 6, IDG News Service – (International) Asprox botnet proves to be a resilient foe. The Asprox botnet has been upgraded and continues to be involved in new spam and fake anti-virus campaigns, according to a paper by Trend Micro. Source: http://www.networkworld.com/news/2013/030613-asprox-botnet-proves-to-be-267425.html

March 6, V3.co.uk – (International) Raspberry Pi hit by DDoS attack. The Raspberry Pi Foundation was the target of an advanced distributed denial of service (DDoS) attack that may have been powered by a botnet with around 1 million nodes. Source: http://www.v3.co.uk/v3-uk/news/2252824/raspberry-pi-hit-by-ddos-attack

March 6, Softpedia – (International) Java exploit signed with digital certificate stolen from Texas-based firm. A security researcher found an exploit kit infecting a German university’s Web site that utilizes a stolen legitimate digital certificate, allowing it to bypass Oracle’s JAR signing and verification ‘jarsigner’ tool. Source: http://news.softpedia.com/news/Java-Exploit-Signed-With-Digital-Certificate-Stolen-From-Texas-Based-Firm-334784.shtml

March 6, V3.co.uk – (International) Security cameras continue to pose snooping risk. A researcher recently found hundreds of publicly-accessible security cameras with a Google search, allowing the cameras to be viewed and in some cases controlled remotely. Source: http://www.v3.co.uk/v3-uk/news/2252800/security-cameras-continue-to-pose-snooping-risk

March 6, The H – (International) D-Link fixes router vulnerabilities very quietly. D-Link created a firmware update to patch critical vulnerabilities in its DIR-645 routers in November 2012, but did not publicize the new release. Source: http://www.h-online.com/security/news/item/D-Link-fixes-router-vulnerabilities-very-quietly-1816873.html

March 6, Softpedia – (International) Samsung Galaxy S III vulnerable to full lock screen bypass. A researcher discovered a way to bypass the lock function of the Samsung Galaxy S III, enabling full access. Source: http://news.softpedia.com/news/Samsung-Galaxy-S-III-Vulnerable-to-Full-Lock-Screen-Bypass-334796.shtml

March 5, Help Net Security – (International) Older MiniDuke strain found, raises questions about its origins. Researchers discovered an older version of the MiniDuke espionage malware, dating back to 2011. Source: http://www.net-security.org/malware_news.php?id=2431

From → Security

Comments are closed.

%d bloggers like this: