Skip to content

Gotham Security Daily Threat Alerts

by on July 5, 2013

July 3, Threatpost – (International) Ubisoft urges password changes following hack. Ubisoft warned users to reset their passwords following an attack on some of their online systems that exposed usernames, email addresses, and encrypted passwords. Source: http://threatpost.com/ubisoft-urges-password-changes-following-hack/

July 3, Softpedia – (International) Microsoft experts warn of “System Doctor 2014” fake antivirus. Researchers warned that the creators behind the Rogue:Win32/Winwebsec fake antivirus malware are now spreading a new form of malware called System Doctor 2014 that shares some similarities with its predecessor. Source: http://news.softpedia.com/news/Microsoft-Experts-Warn-of-System-Doctor-2014-Fake-Antivirus-365199.shtml

July 2, Threatpost – (International) njRAT espionage malware targets Middle Eastern governments, telecoms and energy. Fidelis reported a surge in activity involving the njRAT cyberespionage remote access trojan (RAT) targeting energy and telecoms companies based or operating in the Middle East, as well as governments in the region. Source: http://threatpost.com/njrat-espionage-malware-targets-middle-eastern-governments-telecoms-and-energy/

July 2, Dark Reading – (International) Fake Twitter accounts remain multi-million-dollar business. Research from Barracuda Labs found that the market for fake Twitter
accounts to sell as followers has grown, and that the accounts utilize various methods to avoid abuse detection by Twitter and users. Source: http://www.darkreading.com/vulnerability/fake-twitter-accounts-remainmultimillio/240157696

July 2, Network World – (California) California’s first data-breach report finds 131 incidents hit 2.5 million citizens. California’s first State data breach report reported a total of 131 data breach incidents affecting 2.5 million individuals in 2012. Source: https://www.networkworld.com/news/2013/070213-california-data-breach-271488.html

July 2, Threatpost – (International) Skype vulnerability can lead to Android lockscreen bypass. A vulnerability in the Skype app for Android can allow an attacker to bypass the target device’s lockscreen using a second device. Source: http://threatpost.com/skype-vulnerability-can-lead-to-android-lockscreen-bypass/

July 2, The Register – (International) Crimelords: Stolen credit cards…keep ‘em. It’s all about banking logins now. Research by McAfee revealed details of the stolen financial and user information markets, showing the going rate for bank login details, credit card information, user account information, and other products and services available in underweb communities. Source: http://www.theregister.co.uk/2013/07/02/mcafee_cybercrime_exposed/

From → Security

Comments are closed.

%d bloggers like this: