Published September 04, 2012
Unfortunately, it appears that Java is once again unsafe. Over the weekend, the good folks over at security firm FireEye spotted a new attack that exploits a vulnerability in Java to install a Trojan named Poison Ivy, which communicates with C&C servers in China and Singapore.
Since there’s no fix in sight, it is highly recommended that users turn off/disable Java in their browsers. This might keep certain websites from operating 100% but, it will help prevent possible “drive-by downloads”. What is a “drive-by download” you might ask? Well, in a drive-by download, your computer becomes infected just by visiting a website which contains malicious code. Cybercriminals search the Internet looking for vulnerable web servers that can be hacked, and when one is found, they can then inject their malicious code onto the web pages. If your operating system or one of your applications is un-patched, a malicious program is downloaded to your computer automatically when you access the infected web page.
For instructions on how to disable Java in Google Chrome, go here, for Firefox, go here, for Safari, here and for disabling it in Internet Explorer, click here. You might be tempted to “downgrade” to an earlier version of Java since these new exploits only target version 7 but, don’t do it! The previous versions of Java also have security flaws. Don’t waste time downgrading to an earlier version since it will be equally insecure.
If you absolutely MUST use a Java-enabled browser for mission-critical productivity apps, Brian Krebs over at Krebs On Security suggests users switch to a secondary browser with Java installed, using a Java-less browser for normal browsing and only occasionally switching to a Java-enabled one. This isn’t a bullet proof plan but, it’s safer than surfing the Web with a browser where Java is fully enabled. Good news if you use Google Chrome, you will get a warning every time Java wants to execute and you can decide for yourself whether or not to allow it.
Published August 13, 2012
Account details for millions of players have been stolen in a hack attack on Blizzard, the maker of World of Warcraft, StarCraft and Diablo. Blizzard president, CEO and co-founder Michael Morhaime has released a statement explaining that:
“Some data was illegally accessed, including a list of email addresses for global Battle.net users, outside of China. For players on North American servers, the answer to the personal security question, and information relating to Mobile and Dial-In Authenticators were also accessed. Based on what we currently know, this information alone is NOT enough for anyone to gain access to Battle.net accounts.”
Blizzard claims – but doesn’t guarantee – that financial data such as credit cards, billing addresses, and real names weren’t accessed. Nonetheless, since Blizzard’s servers hold enough data to verify that you know your password and can type it in correctly, therefore anyone who has a clone of Blizzard’s authentication system can easily run a password-guessing attack against accounts.
Here are a few steps that you should implement immediately:
Published July 23, 2012
I have been a fan of the Diablo series since the 1st installment was released on December 31st, 1996. After waiting over ten years since the 2nd installment in 2000, Diablo III finally arrived in May. As one of the most highly anticipated games this year, it was only a matter of time before malware authors began targeting it. Besides its immense popularity, another thing that is bound to make Diablo III even more attractive to cybercriminals is a new feature called Real Money Auction House. The new auction house (not yet live) will allow players to buy/sell items and gold for real money.
The time has come. Diablo III hasn’t even been out 3 months and associated malware is already starting to pop up. Security researchers over at Symantec have discovered a new W32.Gammima.AG variant that steals Diablo III communications. This malware is not brand-new, it has been encountered several times before–most notably for attacking the popular game World of Warcraft. This is just a slightly updated version, specifically designed for targeting Diablo III.
The game’s developer, Blizzard Entertainment, has included some security protection, such as a one-time password authenticator and account locking, so that gamers can prevent their items and gold being stolen. As always, remember that in order to stay safe, please ensure that you have the latest patches installed on your system and keep your antivirus definitions up to date.
Published July 09, 2012
Brian Krebs over at KrebsOnSecurity.com has just issued a warning regarding a new Java exploit, powered by The Blackhole Exploit Kit. It is very important to make sure your Java is constantly up-to-date and patched since it is one of the most common vulnerabilities related to malicious attacks.
For more details, you can check out Brian Krebs' original post on the Java exploit
We here at New River Computing would like to thank Mr. Krebs for all of his great work on keeping everyone informed with the latest security news!
Published June 26, 2012
I recently stumbled across a fantastic article written by Marcin Kleczynsk that I’d like to share with our readers.
Mr. Kleczynsk is the CEO of Malwarebytes, a provider of highly effective, award winning anti-malware solutions.
To read the full article check out Mr. Kleczynsk's Fighting cybercrime: How to avoid malware and other computer viruses