Great DANE Adoption (Also TLS 1.1)
Recommended, by the US Computer Emergency Response team : Defense-in-depth methods to protect against man-in-the-middle attacks. US-CERT notes: “Employing multiple network and browser protection methods forces an attacker to develop different tactics, techniques, and procedures to circumvent the new security configuration,” and lists solutions including DNS-based Authentication of Named Entities (DANE), certificate pinning and setting TLS 1.1 as your minimum allowed protocol.
Quick and Easy Anti-Virus . Maybe TOO Quick and Easy?
Stripped of their rankings by major ratings firms: Chinese antivirus vendors Qihoo 360 and Tencent. Both stand accused of gaming the ratings systems used by Virus Bulletin, AV‐Comparatives and AV-Test. Qihoo was spanked for using an AV engine other than their own in the software submitted for testing. Qihoo then used the well-known “But Timmy does it too!” defense, ratting out fellow vendor Tencent for using selective whitelisting to get faster AV checks and higher grades. (Qihoo also implicated Chinese web services company Baidu – no results yet from the ratings organizations there.)
…And Here’s Why you WANT Solid A/V Software…
Reported, by Cisco researchers Ben Baker and Alex Chiu: Rombertik, snooping malware that kills the host computer upon detection. “‘Rombertik is unique in that it actively attempts to destroy the computer” (by trashing the Windows master boot record) when discovered or analyzed, and it also tries mighty hard to obfuscate how it operates when not detected.
…Except When It’s the AV Software ITSELF That’s Harshing Your Workflow
Misflagged, by a recent update to Avast AV software: Assorted dynamically linked libraries (DLLs) on Windows boxes, which were subject to rough treatment at the hands of older versions of Avast. The DLLs were subject to blockage and quarantine, with the fun result of breaking any programs using those libraries (reportedly including TeamViewer and Corel products).
Password Alert Alert
2560 Stream Processors, 4GB 512-Bit GDDR5, Undetectable Malware
Developed as a proof of concept: Malware that works by controlling a computer’s graphics card instead of the usual CPU. No current malware detection programs even look for any such exploit, and the developers note other strengths , including persistence in the GPU memory and of course the ability to use it for heavy number crunching as required.
And What’s Threatening Your WordPress Site *Today?*
Reported, by security company Sucuri: A fairly dire cross-site scripting exploit found in the genericons package of the widely-installed (default, even) WordPress theme Twenty Fifteen, and already found in the wild.
a safer internet is a better internet.