Security News > 2020 > July

Better get Grandpa off Windows 7 because zero-day bug in Zoom allows remote code execution on vintage OS
2020-07-13 11:50

With world+dog on Zoom these days, news of a zero-day attack against the videoconferencing app would cause a stir, but relax - it's only if you're on Windows 7 or older. An independent researcher told ACROS Security about the flaw that would allow for remote code execution on any Zoom Client for Windows used by Windows 7, even with extended support after the OS was shuttered in January.

Better get Grandma off Windows 7 because zero-day bug in Zoom allows remote code execution on vintage OS
2020-07-13 11:50

With world+dog on Zoom these days, news of a zero-day attack against the videoconferencing app would cause a stir, but relax - it's only if you're on Windows 7 or older. An independent researcher told ACROS Security about the flaw that would allow for remote code execution on any Zoom Client for Windows used by Windows 7, even with extended support after the OS was shuttered in January.

Amazon Says Email to Employees Banning TikTok Was a Mistake
2020-07-13 11:43

Roughly five hours after an internal email went out Friday to Amazon employees telling them to delete the popular video app TikTok from their phones, the online retailing giant appeared to backtrack, calling the ban a mistake. U.S. Secretary of State Mike Pompeo said this week that the government was "Certainly looking" at banning the app, setting off confused and irritated posts as well as jokes by TikTok users.

A Peek into the Fake Review Marketplace
2020-07-13 11:21

A personal account of someone who was paid to buy products on Amazon and leave fake reviews. Fake reviews are one of the problems that everyone knows about, and no one knows what to do about - so we all try to pretend doesn't exist.

Finding the Right Threat Intelligence Vendors
2020-07-13 11:02

In May 2019, Flashpoint CEO Josh Lefkowitz shared in SecurityWeek tips for evaluating threat intelligence vendors that cover the deep and dark web. I wanted to look at the entire threat intelligence space and provide some thoughts on how to evaluate the best vendors for you.

HITB Lockdown: Hands-on technical trainings coming next week!
2020-07-13 10:40

HITB Lockdown 002 will feature a number of hands-on technical trainings, taking place July 20-23, 2020. 2-day trainings Advanced ICS Hacking Trainer: Yamila Levalle (Security Researcher, Dreamlab...

Monday review – the hot stories of the week
2020-07-13 10:22

Get yourself up to date with everything we've written in the last seven days - it's weekly roundup time.

Backdoors Identified in Tens of C-Data Fiber Broadband Devices
2020-07-13 10:00

Security researchers have discovered backdoors impacting a total of 29 Fiber-To-The-Home Optical Line Terminal devices from Chinese vendor C-Data. Security researchers Pierre Kim and Alexandre Torres discovered that the FD1104B and FD1108SN OLTs are impacted by several vulnerabilities, including a telnet server accessible from both the WAN and the FTTH LAN interfaces.

Trump reveals US cyber-attack on Russian election-misdirection troll farms
2020-07-13 08:02

In 1965, Gordon Moore published a short informal paper, Cramming more components onto integrated circuits. Based on not much more but these few data points and his knowledge of silicon chip development - he was head of R&D at Fairchild Semiconductors, the company that was to seed Silicon Valley - he said that for the next decade, component counts by area could double every year.

The crypto-agility mandate, and how to get there
2020-07-13 05:21

This is accomplished by tracking down every digital certificate deployed across the organization and capturing details including algorithms and their size, the type of hashing/signature, validity period, where it's located and how it can be used. Once you have a complete inventory, you'll then need to identify the vulnerable certificates by the type of cryptography in use and look for anomalies and potential problems.