Blogs

Steps to determine if you are infected with Mac OSX Flashback Trojan and how to remove it

http://www.f-secure.com/v-descs/trojan-downloader_osx_flashback_i.shtml

F-Secure has released the steps needed to determine if you Mac OSX has been infiltrated by the Flashback Trojan.

"Trojan-Downloader:OSX/Flashback.I connects to a remote site to download its payload; on successful infection, the malware modifies targeted webpages displayed in the web browser."

If you suspect your Mac is compromised, running the steps in the above article should remove this trojan.

phpMyAdmin 3.4.x Path disclosure due to missing verification of file presence.

http://www.phpmyadmin.net/home_page/security/PMASA-2012-2.php

"The show_config_errors.php scripts did not validate the presence of the configuration file, so an error message shows the full path of this file, leading to possible further attacks."

This is a non-critical update, but it may be a good time to review what version of phpMyAdmin you are running and consider upgrading to 3.4.10.2 for other security vulnerabilities that have been patched along the way.

Thanks,
Brian

PacketFence 3.2.0 Released, Closes XSS Hole

http://www.packetfence.org/news/2012/article/packetfence-320-released.html

http://www.h-online.com/security/news/item/PacketFence-3-2-0-brings-new-...

"Reflected Cross-site scripting (XSS) in Web Admin printing system (#1362)" vulnerability was fixed in this release.

Various other non-security improvements are part of this release.

New Flashback Trojan Horse Variant Uses Novel Delivery Method to Infect Macs

http://blog.intego.com/new-flashback-trojan-horse-variant-uses-novel-del...

By using vulnerable version of Java on MacOS, the flashback Trojan installs itself without user intervention. "There is no more installer, no request for a password."

There is a patch for the Macintosh version of Java available.

We continue to suggest using anti-virus on MacOS X. Also, make sure to keep 3rd party applications up to date.

Proof of concept and Leaked exploit in the wild for Remote RDP exploit

https://technet.microsoft.com/en-us/security/bulletin/ms12-020
http://www.techworld.com.au/article/418814/leaked_exploit_prompts_resear...

For anyone who hasn't already patched their vulnerable version of Remote Desktop (RDP), here are some very good reasons to do so.

Thanks,
ep

A test matrix of Android anti-virus applications by AV-TEST


http://www.av-test.org/en/tests/android/


AV-TEST, "The Independent IT-Security Institute" from Magdeburg, Germany, released a report this week reviewing Anti-Virus applications for Android devices.  Their test results can be downloaded here:


http://www.av-test.org/fileadmin/pdf/avtest_2012-02_android_anti-malware...

Horde Groupware contains backdoor in Horde 3.3.12 and Groupware 1.2.10

http://m.h-online.com/security/news/item/Horde-Groupware-contains-backdo...

"Unknown perpetrators infiltrated a backdoor into several installation packages during an attack on groupware provider Horde's FTP server. Horde 3.3.12, Groupware 1.2.10 and the webmail edition of the groupware product are all affected. Horde 4 was not modified. The CVS and Git servers are also unaffected.

Pages