<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>VR World &#187; Exploit</title>
	<atom:link href="http://www.vrworld.com/tag/exploit/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.vrworld.com</link>
	<description></description>
	<lastBuildDate>Fri, 10 Apr 2015 07:54:22 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.1.1</generator>
	<item>
		<title>Yahoo Hacked via Shellshock Vulnerability</title>
		<link>http://www.vrworld.com/2014/10/06/yahoo-hacked-via-shellshock-vulnerability/</link>
		<comments>http://www.vrworld.com/2014/10/06/yahoo-hacked-via-shellshock-vulnerability/#comments</comments>
		<pubDate>Tue, 07 Oct 2014 01:40:08 +0000</pubDate>
		<dc:creator><![CDATA[Anshel Sag]]></dc:creator>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Cloud Computing]]></category>
		<category><![CDATA[Enterprise]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Bash Bug]]></category>
		<category><![CDATA[email]]></category>
		<category><![CDATA[Exploit]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Shellshock]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[Yahoo]]></category>
		<category><![CDATA[Yahoo email]]></category>
		<category><![CDATA[Yahoo mail]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=39694</guid>
		<description><![CDATA[<p>The Shellshock bug, also known as the bash bug appears to already be taking some major tech companies as its first victims.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/10/06/yahoo-hacked-via-shellshock-vulnerability/">Yahoo Hacked via Shellshock Vulnerability</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="980" height="600" src="http://cdn.vrworld.com/wp-content/uploads/2014/10/YahooLogo1.jpg" class="attachment-post-thumbnail wp-post-image" alt="Yahoo Logo" /></p><p>A <a href="http://www.futuresouth.us/yahoo_hacked.html" target="_blank">security researcher has discovered</a> that Yahoo has become a victim of the newly discovered <a title="No, Kevin Mitnick is not Selling Zero Day Exploits to Hackers" href="http://www.brightsideofnews.com/2014/09/25/kevin-mitnick-selling-zero-day-exploits-hackers/">Shellshock vulnerability</a> (also known as bash bug) via Romanian hackers gaining access to Yahoo&#8217;s systems. There is already confirmation of the fact that Yahoo has been hacked <a href="http://www.futuresouth.us/yahoo_response.jpg" target="_blank" rel="lightbox-0">via an email from Yahoo&#8217;s security team</a>. This was originally submitted to Yahoo, but isn&#8217;t eligible for their bug bounty program, which for some reason doesn&#8217;t reward people for finding chinks in Yahoo&#8217;s armor for them before hackers do. This appears to be a significant flaw in Yahoo&#8217;s security policies and must be addressed by Marissa Mayer herself.</p>
<blockquote><p>He states:<br />
Disclosure and disclaimer: This document is being released due to several high profile companies being infiltrated using the recent Shellshock vulnerability, and what I have deemed as an improper response, or lack thereof, to resolving the issue from certain key companies contacted, as well as the FBI. Amongst the affected companies are Yahoo! and Lycos, major players and names in the technology world. This breach affects ALL of us in one way or another, and it’s crucial that this problem be resolved with haste. The FBI took the information down and went on their way. Yahoo! has not responded at all. I’ve attempted to email them, call them, and resorted to contacting Marissa Mayer directly via both email and Twitter, neither to which I have received a response as of yet. The ignoring of this issue is grossly negligent and even almost criminal. As such, I felt that for the safety of anyone using these services, it would be best to publicly disclose as much information as needed to get them moving and working towards resolving the issue before things get worse. All research and testing discussed in this paper was performed by Jonathan D. Hall of Future South Technologies.</p></blockquote>
<p>Yahoo has been struggling to gain back trust from users after their <a href="http://www.forbes.com/sites/jameslyne/2014/01/31/yahoo-hacked-and-how-to-protect-your-passwords/" target="_blank">email data breaches</a> and the overall meltdown of the company as an internet destination for most users. Under Marissa Mayer&#8217;s rule, the company has tried to become more of a content provider rather than a search or news destination. Their most popular applications like Flickr have struggled to really retain their audiences and regain the losses to other services like 500px due to simply being too unwilling to listen to the community and simply give them what they want. Flickr was once the default destination for professional and amateur photographers and since the service&#8217;s decline tons of viable competitors have cropped up to give people what they want.</p>
<p>The problem here for Yahoo is that they simply are not taking security risks seriously and continually find themselves the targets of hackers. Why? Because they appear not to take security as seriously as they say they do. And Yahoo still has a fairly large user base, especially Yahoo mail, which means that they become a big juicy target for hackers that know that Yahoo is slow to adapt and secure. The security game is an ever evolving one and if your security team is not constantly working to address new threats and actively working to prevent them, then you are going to end up like Yahoo, a sitting duck and popular target.</p>
<p>Yahoo <a href="http://www.businessweek.com/news/2014-10-06/yahoo-says-no-data-stolen-in-shellshock-hack" target="_blank">has said to Bloomberg</a> that three of their servers were compromised but that no data was taken, which may still need to be evaluated if only three servers were accessed.</p>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/10/06/yahoo-hacked-via-shellshock-vulnerability/">Yahoo Hacked via Shellshock Vulnerability</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/10/06/yahoo-hacked-via-shellshock-vulnerability/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>No, Kevin Mitnick is not Selling Zero Day Exploits to Hackers</title>
		<link>http://www.vrworld.com/2014/09/25/kevin-mitnick-selling-zero-day-exploits-hackers/</link>
		<comments>http://www.vrworld.com/2014/09/25/kevin-mitnick-selling-zero-day-exploits-hackers/#comments</comments>
		<pubDate>Fri, 26 Sep 2014 00:43:12 +0000</pubDate>
		<dc:creator><![CDATA[Anshel Sag]]></dc:creator>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Cloud Computing]]></category>
		<category><![CDATA[Enterprise]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Rumors]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Exploit]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[Kevin Mitnick]]></category>
		<category><![CDATA[Malicious]]></category>
		<category><![CDATA[Researchers]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Wired]]></category>
		<category><![CDATA[Zero Day]]></category>
		<category><![CDATA[Zero Day Expoit]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=39287</guid>
		<description><![CDATA[<p>There&#8217;s a very good chance that today&#8217;s Wired piece about Kevin Mitnick&#8217;s newest venture has a lot to do with the discovery of the Bash ...</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/09/25/kevin-mitnick-selling-zero-day-exploits-hackers/">No, Kevin Mitnick is not Selling Zero Day Exploits to Hackers</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="980" height="600" src="http://cdn.vrworld.com/wp-content/uploads/2014/09/GhostInTheWires.jpg" class="attachment-post-thumbnail wp-post-image" alt="Zero Day Kevin Mitnick" /></p><p>There&#8217;s a very good chance that today&#8217;s <em>Wired</em> piece about Kevin Mitnick&#8217;s newest venture has a lot to do with the discovery of the <a href="https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/" target="_blank">Bash Bug</a> within various Linux and Unix operating systems. This is a bug that could be considered a Zero Day exploit because of the fact that it is a security vulnerability within an application that is possible to exploit due to the fact that the software vendor has no knowledge of it yet or it has not been patched yet.</p>
<p>Either way, it is a vulnerability that someone can take advantage of. Now, <em>Wired</em> ran a piece about <a href="https://www.mitnicksecurity.com/" target="_blank">Kevin Mitnick and his security company</a> which does security consulting which includes a whole host of internet and non-net consulting all pertaining to security. The <a href="http://www.wired.com/2014/09/kevin-mitnick-selling-zero-day-exploits/" target="_blank"><em>Wired</em> piece</a> in question talks about one of Mitnick&#8217;s latest ventures which claims that his company is finding security researchers&#8217; and hackers&#8217; zero day exploits and selling them to the highest bidder.</p>
<p>&#8220;With his latest business venture, Mitnick has switched hats again: This time to an ambiguous shade of gray,&#8221; <em>Wired </em>wrote.</p>
<p>Late last week, Mitnick revealed a new branch of his security consultancy business he calls Mitnick’s Absolute Zero Day Exploit Exchange. Since its quiet inception six months ago, he says the service has offered to sell corporate and government clients high-end “zero-day” exploits, hacking tools that take advantage of secret bugs in software for which no patch yet exists. Mitnick says he’s offering exploits developed both by his own in-house researchers and by outside hackers, guaranteed to be exclusive and priced at no less than $100,000 each, including his own fee.</p>
<p>And what will his clients do with those exploits? “When we have a client that wants a zero-day vulnerability for whatever reason, we don’t ask, and in fact they wouldn’t tell us,” Mitnick tells <em>Wired</em> in an interview. “Researchers find them, they sell them to us for X, we sell them to clients for Y and make the margin in between.”</p>
<p>Mitnick declined to name any of his customers, and wouldn’t say how many, if any, exploits his exchange has brokered so far. But the <a href="https://www.mitnicksecurity.com/shopping/absolute-zero-day-exploit-exchange">website he launched to reveal the project last week</a> offers to use his company’s “unique positioning among security researchers and the hacker community” to connect exploit developers with “discerning government and corporate buyers.&#8221;</p>
<p>In fact, they interviewed Mitnick appearing to take many of his quotes out of context in order to sell their own agenda that he is selling these Zero Day exploits to whomever will pay him. In fact, it seems odd that they would include commentary from people on Twitter as part of their article when its merely an opinion and doesn&#8217;t actually add anything to the piece, other than mentioning that Mitnick responded to his tweet.</p>
<p>The reality of the situation is that for people that discover vulnerabilities in government and corporate infrastructure, there is a very difficult balance to strike. Many ethical hackers looking to notify companies of their security holes eventually become the targets of investigations and attacked for what they do. Sure, there are plenty of unethical hackers out there that might try to hold a company ransom for a fee to give them the Zero Day that they&#8217;ve found, but that has nothing to do with what Mitnick is doing. They are offering researchers and security minded people an intermediary to help those companies find and close Zero Day exploits and to reward the researchers for their work and at the same time protect them from frivolous lawsuits if they try to approach the company directly.</p>
<p>Mitnick&#8217;s company vigorously vets all of their potential clients and makes sure that no bad actors are being involved in the process. They are not selling Zero Day exploits to competitors of the companies that have the security holes and they aren&#8217;t selling Zero Day exploits to the government that might make a company vulnerable. The goal is to help companies see their problems and give them the opportunity to fix them before they become public.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/09/25/kevin-mitnick-selling-zero-day-exploits-hackers/">No, Kevin Mitnick is not Selling Zero Day Exploits to Hackers</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/09/25/kevin-mitnick-selling-zero-day-exploits-hackers/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Time to Run and Hide from Internet Explorer, For Now</title>
		<link>http://www.vrworld.com/2014/04/29/time-run-hide-internet-explorer-now/</link>
		<comments>http://www.vrworld.com/2014/04/29/time-run-hide-internet-explorer-now/#comments</comments>
		<pubDate>Tue, 29 Apr 2014 19:19:02 +0000</pubDate>
		<dc:creator><![CDATA[Anshel Sag]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Browser]]></category>
		<category><![CDATA[Chrome]]></category>
		<category><![CDATA[Exploit]]></category>
		<category><![CDATA[Firefox]]></category>
		<category><![CDATA[IE11]]></category>
		<category><![CDATA[IE6]]></category>
		<category><![CDATA[IE9]]></category>
		<category><![CDATA[Internet Explorer]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Operation Clandestine Fox]]></category>
		<category><![CDATA[Remote Code Execution]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[Zero Day]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=34780</guid>
		<description><![CDATA[<p>Internet Explorer has had a pretty bad reputation over the years as a pretty awful browser, and from the IE6 through the IE9 days, that ...</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/04/29/time-run-hide-internet-explorer-now/">Time to Run and Hide from Internet Explorer, For Now</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="1920" height="1200" src="http://cdn.vrworld.com/wp-content/uploads/2014/04/IE9V2_31.jpg" class="attachment-post-thumbnail wp-post-image" alt="Internet Explorer" /></p><p>Internet Explorer has had a pretty bad reputation over the years as a pretty awful browser, and from the IE6 through the IE9 days, that was a pretty accurate statement. However, nowadays Internet Explorer is fairly good and the only browser on Windows worth anything for touch. The guys and gals over at <a href="http://www.fireeye.com/blog/uncategorized/2014/04/new-zero-day-exploit-targeting-internet-explorer-versions-9-through-11-identified-in-targeted-attacks.html" target="_blank">FireEye managed to discover this Zero Day Exploit</a> and dubbed the entire operation, &#8220;Operation Clandestine Fox.&#8221; They claim that this zero day exploit targets IE9 through IE11 browsers, which make up about 26% of all browser users around the world which is pretty significant. Microsoft has <a href="https://technet.microsoft.com/en-US/library/security/2963983" target="_blank">also put out a security bulletin</a> on the issue stating that users using IE6 through IE11 could be affected, which would broaden the scope of this issue by millions more users.</p>
<p>While Microsoft claims this issue is occurring in &#8220;limited attacks&#8221; the potential for this attack to grow is now exponentially greater now that the issue has been discovered but not yet fixed. We don&#8217;t know the details of how long FireEye waited to let Microsoft resolve this issue before they announced it, but I have a feeling they didn&#8217;t just post about it and expect Microsoft to deal with the repercussions. Microsoft is a much more serious company when it comes to security, which is what makes this IE zero day vulnerability all the more puzzling. The fact that such a zero day has managed to exist through potentially all versions of IE and only get caught now is also a bit suspicious (now that we live in the post-Snowden era where anything could be deliberate).</p>
<p>The vulnerability itself as described by the FireEye team is that the exploit leverages a previously unknown use-after-free vulnerability as well as a well-known flash exploit to achieve arbitrary memory access and bypass Windows&#8217; ASLR and DEP protections. What this ultimately means for users is that if you&#8217;re using Internet Explorer right now, you should probably stop doing so and switch to Chrome or Firefox until this issue gets resolved. Personally, I use four different browsers simultaneously, but I don&#8217;t really recommend that to anyone, especially in this case. If you must absolutely use Internet Explorer, then you should disable Flash (or uninstall it) and use your browser with a proper anti-virus application, even though it would just be easier to use Chrome or Firefox in the meantime.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/04/29/time-run-hide-internet-explorer-now/">Time to Run and Hide from Internet Explorer, For Now</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/04/29/time-run-hide-internet-explorer-now/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

Content Delivery Network via Amazon Web Services: CloudFront: cdn.vrworld.com

 Served from: www.vrworld.com @ 2015-04-10 15:59:10 by W3 Total Cache -->