Language Selection

English French German Italian Portuguese Spanish

Security Leftovers

Filed under
Security
  • Open-source code from Mars rover used in espionage campaign targeting Indian government

    Two open-source code libraries used in the development of the historic Mars rover have been exploited by cybercriminals and moulded into an effective espionage tool that is being used to target high-level officials in the Indian government.

    First exposed by security researchers at Palo Alto Networks, the malware, now dubbed Rover, was found in a malicious phishing email received by India's ambassador to Afghanistan that was made to look like it was sent from India's defence minister which, if opened, would have installed a slew of vicious exploits on the computer system.

    Upon analysis, the experts found the malware, which contained code that attacked a flaw in Office XP, boasted a range of spying features including the ability to hijack computer files, launch a keylogger, take screenshots and even record audio and video in real-time. All of the data compromised would be sent straight to the malware creator's command and control (C&C) server.

  • Open Source Code Of Mars Rover Being Used To Create Malware To Target Indian Government

    Last year on December 24, 2015, a potential online target was identified which was delivered via an email to a high profile Indian diplomat, an Ambassador to Afghanistan. The email was spoofed and crafted as if it was sent by the current defence minister of India, Mr. Manohar Parikar. The mail commended the Ambassador to Afghanistan on his contributions and success.

  • Report: 3.5 Million HTTPS Servers Vulnerable to DROWN

    A report released Tuesday on the DROWN vulnerability raises concerns about possible attacks that could expose encrypted communications. DROWN is a serious vulnerability that affects HTTPS and other services using SSL version 2, according to the team of security researchers who compiled the report. The protocols affected are some of the essential cryptographic protocols for Internet security. An attack could decrypt secure HTTPS communications, such as passwords or credit card numbers, within minutes.

  • OpenSSL update fixes Drown vulnerability
  • HTTPS DROWN flaw: Security bods' hearts sink as tatty protocols wash away web crypto

    DROWN (aka Decrypting RSA with Obsolete and Weakened eNcryption) is a serious design flaw that affects HTTPS websites and other network services that rely on SSL and TLS – which are core cryptographic protocols for internet security. As previously reported, about a third of all HTTPS servers are vulnerable to attack, the computer scientists behind the discovery of the issue warn.

More in Tux Machines

4MLinux 19.0 Distro to Ship with GCC 6.1.0 and Qt 5.7, Public Beta Out Now

Zbigniew Konojacki informs Softpedia about the availability of the public Beta release f his upcoming 4MLinux 19.0 GNU/Linux distribution, which comes one week after the release of the 4MLinux 19.0 Core edition. As reported by us in the second week of July, the Beta release of 4MLinux 19.0 Core, which the developer uses as the base for all the distributions and distrolettes that are being distributed as part of the 4MLinux family, including 4MParted, 4MRescueKit, BakAndImgCD, 4MRecover, and Antivirus Live CD, the operating system uses the GNU Compiler Collection (GCC) 6.1.0. Read more

Weekend in Techrights

Why Open Source is gaining momentum in Digital Transformation?

Once upon a time in IT, using open source simply meant Linux instead of Windows, or maybe MySQL instead of Oracle. Now, there is such a huge diversity of open source tools, and almost every leading digital business and tech startup is making extensive use of them. It’s been a remarkable turnaround for open source over the last 10 years, placing the trend firmly at the heart of the digital revolution. Read more