Lucene search

K

WordPress Bitcoin Payments – Blockonomics Security Vulnerabilities

thn
thn

Ancient 'STONED' Virus Signatures found in Bitcoin Blockchain

If you are dealing in cryptocurrency Bitcoin and have Microsoft's Security Essentials (MSE) installed on your system, then you could be infected by a virus called "DOS/STONED" from the Bitcoin BlockChain. With a number of high-profile cases of fraud, theft, and technical incompetence against the...

6.5AI Score

2014-05-19 01:17 AM
9
threatpost
threatpost

PayPal Fixes Serious Account Hijacking Bug in Manager

PayPal patched a hole in its Manager portal this week that could have made it easy for an attacker to hijack an admin’s account, change their password and steal their personal information — not to mention their savings. Manager is a feature of the service that allows users to manage their Payflow.....

-0.4AI Score

2014-05-16 11:30 AM
7
packetstorm
packetstorm

PayPal Filter Bypass

...

-0.1AI Score

2014-05-14 12:00 AM
47
ciscothreats
ciscothreats

Threat Outbreak Alert: Fake Bank Payment Failure Notification Email Messages on May 13, 2014

Medium Alert ID: 34209 First Published: 2014 May 13 17:32 GMT Version: 1 Summary Cisco Security has detected significant activity related to spam email messages that claim to contain a bank payment notification for the recipient. The text in the email message attempts to convince the...

0.8AI Score

2014-05-13 05:32 PM
5
vulnerlab

-0.2AI Score

2014-05-13 12:00 AM
35
vulnerlab

7.1AI Score

2014-05-13 12:00 AM
35
threatpost
threatpost

Microsoft Identifies New Malware Dropping Sefnit Botnet

Plenty has been written about the Sefnit malware family and its favor with using Tor to mask communication, as well as the money it’s made for criminals via click-fraud schemes. Sefnit, however, has had a pair of accomplices that until recently were regarded as harmless programs by most security...

-0.6AI Score

2014-05-07 02:37 PM
6
ciscothreats
ciscothreats

Threat Outbreak Alert: Fake Bank Payment Notification Email Messages on May 6, 2014

Medium Alert ID: 34133 First Published: 2014 May 6 16:59 GMT Version: 1 Summary Cisco Security has detected significant activity related to spam email messages that claim to contain a bank payment notification for the recipient. The email message attempts to convince the recipient to open the...

0.2AI Score

2014-05-06 04:59 PM
4
thn
thn

Target finally Plans to issue Chip and PIN Credit Cards

The massive data breaches in U.S largest retailers 'Target', marked the largest card heists in the U.S. history in which financial credentials of more than 110 million customers were compromised, have forced the retailer to take step towards more secure transactions. The retailer company on...

7.1AI Score

2014-04-30 05:38 AM
6
myhack58
myhack58

Heartbleed patch bypass vulnerability,is bitcoin a Scam or Oolong? - Vulnerability warning-the black bar safety net

Someone in the seclists questions, the new Heartbleed is true? And provide an original link http://pastebin. com/qPxR9BRv to turnthe wallyou know) ! The original of the brief meaning is: They found that the OpenSSL patch scheme to throw the natural vulnerability exists in the processing variables.....

0.2AI Score

2014-04-30 12:00 AM
7
nvd
nvd

CVE-2013-7372

The engineNextBytes function in classlib/modules/security/src/main/java/common/org/apache/harmony/security/provider/crypto/SHA1PRNG_SecureRandomImpl.java in the SecureRandom implementation in Apache Harmony through 6.0M3, as used in the Java Cryptography Architecture (JCA) in Android before 4.4...

6.5AI Score

0.003EPSS

2014-04-29 08:55 PM
prion
prion

Design/Logic Flaw

The engineNextBytes function in classlib/modules/security/src/main/java/common/org/apache/harmony/security/provider/crypto/SHA1PRNG_SecureRandomImpl.java in the SecureRandom implementation in Apache Harmony through 6.0M3, as used in the Java Cryptography Architecture (JCA) in Android before 4.4...

7.1AI Score

0.003EPSS

2014-04-29 08:55 PM
2
threatpost
threatpost

Click-Fraud Sefnit Variant Shuns Tor for SSH

Sefnit was the first malware family to shed light on the problem of botnets and other malicious code using the Tor anonymity network as a communication protocol. While others before and since have done the same, Sefnit made the biggest splash at the end of last summer when the botnet caused a 600.....

-0.7AI Score

2014-04-29 09:26 AM
8
ciscothreats
ciscothreats

Threat Outbreak Alert: Fake Payment Cancellation Notification Email Messages on April 28, 2014

Medium Alert ID: 33973 First Published: 2014 April 28 19:38 GMT Version: 1 Summary Cisco Security has detected significant activity related to spam email messages that claim to contain a payment cancellation notice for the recipient. The text in the email message attempts to convince the...

0.9AI Score

2014-04-28 07:38 PM
6
threatpost
threatpost

Google Removes Bitcoin Mining Android Malware from Play

Google recently removed five bogus wallpaper apps from its Play marketplace after they were deemed malicious and found sneakily mining Bitcoins. The malware, dubbed BadLepricon, was spotted funneling Bitcoin into wallets and allowed the attacker to change mining pools easily to maximize the mining....

0.5AI Score

2014-04-28 04:26 PM
3
thn
thn

Silk Road Dealer Plead Guilty For Selling Illegal Drugs for Bitcoins

Last October, the ‘Silk Road’ story broke when its owner Ross William Ulbricht, a 29-year-old who allegedly created and managed the Silk Road underground website, was arrested by the Federal Bureau of Investigation (FBI). The police seized the website that was considered one of the most popular...

6.8AI Score

2014-04-25 04:53 PM
6
thn
thn

Android Bitcoin-Mining Malware found on Google Play Store

Google always bound to face trouble over the wide and open nature of its app checking policies on Google Play Store, and despite so many security measures, the search engine giant mostly fails to recognize the Android malware that are lurking around its Google Play store in vast numbers. Recently,....

6.8AI Score

2014-04-24 10:49 PM
6
thn
thn

Malicious Chrome Extension Hijacks CryptoCurrencies and Wallets

Although the number of malicious browser extensions has significantly increased in the past years, but recently a new extension of the Google Chrome is allegedly targeting Cryptocurrency users that is capable of stealing Bitcoins and other crypto coins silently. The malicious Chrome browser...

6.9AI Score

2014-04-24 09:41 PM
5
ciscothreats
ciscothreats

Threat Outbreak Alert: Fake Payment Notification Email Messages on April 23, 2014

Medium Alert ID: 33905 First Published: 2014 April 23 13:27 GMT Version: 1 Summary Cisco Security has detected significant activity related to spam email messages that claim to contain a payment notification for the recipient. The text in the email message attempts to convince the recipient...

0.2AI Score

2014-04-23 01:27 PM
5
threatpost
threatpost

Iowa State Hacked--To Mine Bitcoins

It’s an odd week these days when there isn’t a data breach at some university or college. These institutions are prime targets for attackers for several reasons, not the least of which are their open network environments and databases bulging with personal information. But now attackers are...

1.8AI Score

2014-04-23 11:25 AM
7
thn
thn

Desktop Viruses Coming to Your TV and Connected Home Appliances

Smart Devices are growing at an exponential rate and so are the threats to them. After your Computers, Servers, Routers, Mobiles and Tablets, now hackers are targeting your Smart TVs, warns Eugene Kaspersky the co-founder and chief executive of Kaspersky Lab. As the increase in the manufactures...

6.7AI Score

2014-04-22 08:46 PM
8
ciscothreats
ciscothreats

Threat Outbreak Alert: Fake Shipping Documents Attachment Email Messages on June 25, 2014

Medium Alert ID: 33903 First Published: 2014 April 22 20:16 GMT Last Updated: 2014 June 26 11:57 GMT Version: 39 Summary Cisco Security has detected significant activity related to spam email messages that claim to contain shipping documents for the recipient. The text in the email message...

0.7AI Score

2014-04-22 08:16 PM
20
ciscothreats
ciscothreats

Threat Outbreak Alert: Fake Product Purchase Order Request Email Messages on June 26, 2014

Medium Alert ID: 33857 First Published: 2014 April 22 15:37 GMT Last Updated: 2014 June 26 11:57 GMT Version: 42 Summary Cisco Security has detected significant activity related to spam email messages that claim to contain a product purchase order request for the recipient. The email message...

0.1AI Score

2014-04-22 03:37 PM
22
thn
thn

Samsung Galaxy S5 Fingerprint Scanner Easily Get Hacked

Samsung Galaxy S5 Fingerprint feature promises an extra layer of security for your smartphone, which also lets you make payments through PayPal. But does it really secure? Just three days after the launch of the Galaxy S5, Security researchers have successfully managed to hack Galaxy S5...

7.2AI Score

2014-04-15 08:46 AM
9
ciscothreats
ciscothreats

Threat Outbreak Alert: Fake Tax Notification Email Messages on April 7, 2014

Medium Alert ID: 33686 First Published: 2014 April 8 13:16 GMT Version: 1 Summary Cisco Security has detected significant activity related to spam email messages that claim to contain a tax notification for the recipient. The email message attempts to convince the recipient to open the...

-0.4AI Score

2014-04-08 01:16 PM
10
ciscothreats
ciscothreats

Threat Outbreak Alert: Fake Product Purchase Request Email Messages on April 21, 2014

Medium Alert ID: 33675 First Published: 2014 April 7 13:43 GMT Last Updated: 2014 April 22 15:40 GMT Version: 4 Summary Cisco Security has detected significant activity related to spam email messages that claim to contain a product inquiry for the recipient. The text in the email message...

-0.3AI Score

2014-04-07 01:43 PM
18
ciscothreats
ciscothreats

Threat Outbreak Alert: Fake Bank Account Deposit Notification Email Messages on April 7, 2014

Medium Alert ID: 33672 First Published: 2014 April 7 13:43 GMT Version: 1 Summary Cisco Security has detected significant activity related to spam email messages that claims to contain bank account deposit notification for the recipient. The email message attempts to convince the recipient...

0.4AI Score

2014-04-07 01:43 PM
4
thn
thn

Vulnerable Texas Transportation Site 'TxTag' leaves 1.2 Million Credit Cards at Risk

Do you know, Why another major company is getting hacked every week? Because of poor policies, Laziness to Incident Response and lack in will-power to put efforts on applying important patches. Some companies are not taking their security more seriously, and best suitable example for this is...

6.2AI Score

2014-04-05 05:34 AM
12
ciscothreats
ciscothreats

Threat Outbreak Alert: Fake ACH Transaction Error Report Email Messages on April 2, 2014

Medium Alert ID: 33631 First Published: 2014 April 3 15:27 GMT Version: 1 Summary Cisco Security has detected significant activity related to spam email messages that claim to contain an ACH transaction error report for the recipient. The text in the email message attempts to convince the...

0.7AI Score

2014-04-03 03:27 PM
7
threatpost
threatpost

Amazon Web Services Combing Third Parties for Credentials

Amazon Web Services is actively searching a number of sources, including code repositories and application stores, looking for exposed credentials that could put users’ accounts and services at risk. A week ago, a security consultant in Australia said that as many as 10,000 secret Amazon Web...

1.5AI Score

0.975EPSS

2014-04-02 03:01 PM
57
thn
thn

Dumb Ransomware Developer leaves Decryption Keys on Infected Computers

So, How do Hackers compromise a Website? Simply by exploiting the flaws in it, that means they took advantage of the error in the developers’ code. Now, this time the hackers itself has left behind a crucial flaw in its malware code which can be exploited by us to help save our computer systems....

7.1AI Score

2014-04-02 01:43 AM
6
threatpost
threatpost

DVR Infected with Bitcoin Mining Malware

Johannes Ullrich of the SANS Institute claims to have found malware infecting digital video recorders (DVR) predominately used to record footage captured by surveillance camera systems. Oddly enough, Ullrich claims that one of the two binaries of malware implicated in this attack scheme appears to....

-0.2AI Score

2014-04-01 01:57 PM
6
ciscothreats
ciscothreats

Threat Outbreak Alert: Email Messages with Malicious Attachments on March 31, 2014

Medium Alert ID: 33580 First Published: 2014 March 31 17:14 GMT Version: 1 Summary Cisco Security has detected significant activity related to spam email messages that contain an attachment for the recipient. The email message attempts to convince the recipient to open the attachment for...

1.3AI Score

2014-03-31 05:14 PM
6
ciscothreats
ciscothreats

Threat Outbreak Alert: Fake Tax Information Request Email Messages on March 31, 2014

Medium Alert ID: 33579 First Published: 2014 March 31 15:42 GMT Version: 1 Summary Cisco Security has detected significant activity related to spam email messages that claim to contain a request for tax information for the recipient. The text in the email message attempts to convince the...

1.1AI Score

2014-03-31 03:42 PM
5
ciscothreats
ciscothreats

Threat Outbreak Alert: Fake Payment Transfer Notice Email Messages on March 31, 2014

Medium Alert ID: 33578 First Published: 2014 March 31 15:39 GMT Version: 1 Summary Cisco Security has detected significant activity related to spam email messages that claim to contain a payment transfer cancellation notice for the recipient. The text in the email message attempts to convince...

0.7AI Score

2014-03-31 03:39 PM
6
ciscothreats
ciscothreats

Threat Outbreak Alert: Fake Money Transfer Notification Email Messages on March 31, 2014

Medium Alert ID: 33573 First Published: 2014 March 31 12:57 GMT Version: 1 Summary Cisco Security has detected significant activity related to spam email messages that claim to contain a money transfer notification for the recipient. The text in the email message attempts to convince the...

0.3AI Score

2014-03-31 12:57 PM
8
hackerone
hackerone

Coinbase: Coinbase Android Application - Bitcoin Wallet Leaks OAuth Response Code

Hi, There's a simple bug here, the Coinbase Android App. "BitCoin Wallet" leaks the OAuth Response Code which can be obtained using adb logcat -s Coinbase command line for testing, and any Android application on the same phone can read the response code for the user by reading the logs. As of now.....

7.1AI Score

2014-03-31 06:12 AM
32
thn
thn

Android Malware found on Google Play Store mines Cryptocurrencies

Cyber criminals are more business-minded than you might expect. As the business has moved to greater use of mobile and non-Windows computers, so cyber criminals have adapted techniques monetize their efforts. Security researchers at Lookout Mobile Security discovered that various apps uploaded to.....

6.9AI Score

2014-03-28 07:04 AM
10
threatpost
threatpost

Android Malware Mines Digital Cryptocurrency

On its surface, the idea of turning a smartphone into a cryptocurrency mining machine sounds novel. But practical and profitable? Not so much. That hasn’t stopped thieves from corrupting a number of popular Android applications for just that purpose, including two on the Google Play store called...

-0.1AI Score

2014-03-27 11:44 AM
11
kitploit
kitploit

Cpuminer - CPU miner for Litecoin and Bitcoin

cpuminer is a multi-threaded, highly optimized CPU miner for Litecoin, Bitcoin and other cryptocurrencies. Currently supported algorithms are SHA-256d and scrypt(1024, 1, 1). It supports the getwork mining protocol as well as the Stratum mining protocol, and can be used for both solo and pooled...

7.1AI Score

2014-03-26 03:37 PM
36
threatpost
threatpost

Bitcoin Transaction Malleability Flaw Resolved

The so-called transaction malleability software issue blamed for the dissolution of Bitcoin exchange Mt. Gox has been patched. Also, the Bitcoin-QT reference client was also rebranded to Bitcoin Core, in order to clear confusion users might have had between the Bitcoin network and software....

0.5AI Score

2014-03-20 03:57 PM
31
threatpost
threatpost

New Zorenium Bot Boasts Ability to Run on iOS

UPDATE–The iOS platform has been remarkably resistant to malware infections over the years and attackers interested in mobile devices mainly have focused their efforts on Android. But the developer of a little-known bot that has the ability to run on Linux and Windows machines now has a version...

1.5AI Score

2014-03-20 11:12 AM
2
thn
thn

Linux Worm targets Internet-enabled Home appliances to Mine Cryptocurrencies

Could a perfectly innocent looking device like router, TV set-top box or security cameras can mine Bitcoins? YES! Hackers will not going to spare the Smart Internet-enabled devices. A Linux worm named Linux.Darlloz, earlier used to target Internet of Things (IoT) devices, i.e. Home Routers,...

9.4AI Score

0.973EPSS

2014-03-19 10:26 PM
47
thn
thn

MtGox Hacker tricks people to install Bitcoin Stealer

This News will blow everyone’s mind! If you are a bitcoins holder then you might be aware of MtGox, Once the World's biggest Bitcoin exchange. MtGox filed for bankruptcy last month after saying it lost some 8,50,000 Bitcoins to hackers and suddenly went dark with no explanations. A few days ago,...

6.9AI Score

2014-03-15 04:59 AM
7
ciscothreats
ciscothreats

Threat Outbreak Alert: Fake Bank Account Information Email Messages on March 12, 2014

Medium Alert ID: 33306 First Published: 2014 March 12 17:17 GMT Version: 1 Summary Cisco Security has detected significant activity related to spam email messages that claim to contain bank payment details for the recipient. The text in the email message attempts to convince the recipient to...

AI Score

2014-03-12 05:17 PM
10
thn
thn

Payment Card processing services upgrading to Chip-and-PIN and Point-to-Point Encryption

The massive data breaches in U.S retailers 'Target' and 'Neiman Marcus', in which financial credentials of more than 110 million and 1.1 million customers were compromised respectively, have put a spotlight on the need for more secure transactions. To tackle this issue, the two major payment card.....

7.1AI Score

2014-03-11 11:25 PM
8
hackerone
hackerone

Coinbase: Coinbase Android Security Vulnerabilities

My name is Bryan Stern and I am Android Software Engineer. Last night I took another look at your Android application and found some disturbing vulnerabilities that could allow for a user's account to be hijacked. Fortunately, they are very easy to resolve. Below I have outlined the issue, gave...

6.9AI Score

2014-03-11 08:05 PM
17
thn
thn

Tor Network used to Host 900 Botnets and hidden Darknet Markets

Tor network offers users browse the Internet anonymously and is mostly used by activists, journalists to conceal their online activities from prying eyes. But it also has the Dark side, as Tor is also a Deep Web friendly tool that allows hackers and cyber criminals to carry out illicit activities.....

6.7AI Score

2014-03-07 12:07 AM
11
ciscothreats
ciscothreats

Threat Outbreak Alert: Fake Product Quotation Request Email Messages on March 5, 2014.

Medium Alert ID: 33215 First Published: 2014 March 6 15:04 GMT Version: 1 Summary Cisco Security has detected significant activity related to spam email messages that claim to contain a product quotation request for the recipient. The text in the email message attempts to convince the...

0.9AI Score

2014-03-06 03:04 PM
16
threatpost
threatpost

Microsoft, Kaspersky Shed Light on Sefnit Tor Botnet

Alarm bells went off last August when spikes in Tor client downloads were traced to a large click-fraud and Bitcoin-mining botnet called Sefnit. The malware was using the popular anonymity network to communicate with hackers in order to transmit stolen data and receive additional commands. In...

-0.4AI Score

0.974EPSS

2014-03-06 01:49 PM
248
Total number of security vulnerabilities6256