<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>VR World &#187; Vulnerability</title>
	<atom:link href="http://www.vrworld.com/tag/vulnerability/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.vrworld.com</link>
	<description></description>
	<lastBuildDate>Fri, 10 Apr 2015 07:54:22 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.1.1</generator>
	<item>
		<title>Yahoo Hacked via Shellshock Vulnerability</title>
		<link>http://www.vrworld.com/2014/10/06/yahoo-hacked-via-shellshock-vulnerability/</link>
		<comments>http://www.vrworld.com/2014/10/06/yahoo-hacked-via-shellshock-vulnerability/#comments</comments>
		<pubDate>Tue, 07 Oct 2014 01:40:08 +0000</pubDate>
		<dc:creator><![CDATA[Anshel Sag]]></dc:creator>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Cloud Computing]]></category>
		<category><![CDATA[Enterprise]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Bash Bug]]></category>
		<category><![CDATA[email]]></category>
		<category><![CDATA[Exploit]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Shellshock]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[Yahoo]]></category>
		<category><![CDATA[Yahoo email]]></category>
		<category><![CDATA[Yahoo mail]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=39694</guid>
		<description><![CDATA[<p>The Shellshock bug, also known as the bash bug appears to already be taking some major tech companies as its first victims.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/10/06/yahoo-hacked-via-shellshock-vulnerability/">Yahoo Hacked via Shellshock Vulnerability</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="980" height="600" src="http://cdn.vrworld.com/wp-content/uploads/2014/10/YahooLogo1.jpg" class="attachment-post-thumbnail wp-post-image" alt="Yahoo Logo" /></p><p>A <a href="http://www.futuresouth.us/yahoo_hacked.html" target="_blank">security researcher has discovered</a> that Yahoo has become a victim of the newly discovered <a title="No, Kevin Mitnick is not Selling Zero Day Exploits to Hackers" href="http://www.brightsideofnews.com/2014/09/25/kevin-mitnick-selling-zero-day-exploits-hackers/">Shellshock vulnerability</a> (also known as bash bug) via Romanian hackers gaining access to Yahoo&#8217;s systems. There is already confirmation of the fact that Yahoo has been hacked <a href="http://www.futuresouth.us/yahoo_response.jpg" target="_blank" rel="lightbox-0">via an email from Yahoo&#8217;s security team</a>. This was originally submitted to Yahoo, but isn&#8217;t eligible for their bug bounty program, which for some reason doesn&#8217;t reward people for finding chinks in Yahoo&#8217;s armor for them before hackers do. This appears to be a significant flaw in Yahoo&#8217;s security policies and must be addressed by Marissa Mayer herself.</p>
<blockquote><p>He states:<br />
Disclosure and disclaimer: This document is being released due to several high profile companies being infiltrated using the recent Shellshock vulnerability, and what I have deemed as an improper response, or lack thereof, to resolving the issue from certain key companies contacted, as well as the FBI. Amongst the affected companies are Yahoo! and Lycos, major players and names in the technology world. This breach affects ALL of us in one way or another, and it’s crucial that this problem be resolved with haste. The FBI took the information down and went on their way. Yahoo! has not responded at all. I’ve attempted to email them, call them, and resorted to contacting Marissa Mayer directly via both email and Twitter, neither to which I have received a response as of yet. The ignoring of this issue is grossly negligent and even almost criminal. As such, I felt that for the safety of anyone using these services, it would be best to publicly disclose as much information as needed to get them moving and working towards resolving the issue before things get worse. All research and testing discussed in this paper was performed by Jonathan D. Hall of Future South Technologies.</p></blockquote>
<p>Yahoo has been struggling to gain back trust from users after their <a href="http://www.forbes.com/sites/jameslyne/2014/01/31/yahoo-hacked-and-how-to-protect-your-passwords/" target="_blank">email data breaches</a> and the overall meltdown of the company as an internet destination for most users. Under Marissa Mayer&#8217;s rule, the company has tried to become more of a content provider rather than a search or news destination. Their most popular applications like Flickr have struggled to really retain their audiences and regain the losses to other services like 500px due to simply being too unwilling to listen to the community and simply give them what they want. Flickr was once the default destination for professional and amateur photographers and since the service&#8217;s decline tons of viable competitors have cropped up to give people what they want.</p>
<p>The problem here for Yahoo is that they simply are not taking security risks seriously and continually find themselves the targets of hackers. Why? Because they appear not to take security as seriously as they say they do. And Yahoo still has a fairly large user base, especially Yahoo mail, which means that they become a big juicy target for hackers that know that Yahoo is slow to adapt and secure. The security game is an ever evolving one and if your security team is not constantly working to address new threats and actively working to prevent them, then you are going to end up like Yahoo, a sitting duck and popular target.</p>
<p>Yahoo <a href="http://www.businessweek.com/news/2014-10-06/yahoo-says-no-data-stolen-in-shellshock-hack" target="_blank">has said to Bloomberg</a> that three of their servers were compromised but that no data was taken, which may still need to be evaluated if only three servers were accessed.</p>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/10/06/yahoo-hacked-via-shellshock-vulnerability/">Yahoo Hacked via Shellshock Vulnerability</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/10/06/yahoo-hacked-via-shellshock-vulnerability/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Security Researcher Claims iOS Devices Have a Backdoor</title>
		<link>http://www.vrworld.com/2014/07/23/security-researcher-claims-ios-devices-backdoor/</link>
		<comments>http://www.vrworld.com/2014/07/23/security-researcher-claims-ios-devices-backdoor/#comments</comments>
		<pubDate>Wed, 23 Jul 2014 19:29:35 +0000</pubDate>
		<dc:creator><![CDATA[Anshel Sag]]></dc:creator>
				<category><![CDATA[Cloud Computing]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Rumors]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[CIA]]></category>
		<category><![CDATA[com.apple.mobile.pcapd]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[Firmware]]></category>
		<category><![CDATA[iOS]]></category>
		<category><![CDATA[Jonathan Zdziarski]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[Secure]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Vulnerability]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=36690</guid>
		<description><![CDATA[<p>A security researcher is claiming to have found a set of services in iOS that appear to be a firmware-level backdoor in iOS devices. What&#8217;s ...</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/07/23/security-researcher-claims-ios-devices-backdoor/">Security Researcher Claims iOS Devices Have a Backdoor</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="960" height="960" src="http://cdn.vrworld.com/wp-content/uploads/2014/05/AppleLogo1.jpg" class="attachment-post-thumbnail wp-post-image" alt="Apple Logo iMessage iWatch Backdoor" /></p><p>A <a href="http://www.zdziarski.com/blog/?p=3441" target="_blank">security researcher is claiming to have found</a> a set of services in iOS that appear to be a firmware-level backdoor in iOS devices. What&#8217;s more interesting is that Apple has, in a very non-Apple manner, responded to his claims by <a href="https://support.apple.com/kb/HT6331?viewlocale=en_US&amp;locale=en_US" target="_blank">posting a support page about it</a>. He claims that these are confirmations of the backdoors that he found in iOS and that Apple claims to use them for diagnostic and enterprise purposes. These backdoors can only be accessed by Apple (or anyone that has access to Apple&#8217;s services) so they&#8217;re mostly secure backdoors, but they are backdoors nonetheless. Most consumers are completely and wholly unaware that alternative pathways into their devices exist and can be exploited by ANYONE (in this case Apple) other than themselves. This is also why remote bricking and other &#8216;security&#8217; features being pushed through legislatures are also a problem, but at least we&#8217;re aware of their existence unlike these services on iOS.</p>
<p>The services in question, om.apple.mobile.pcapd, com.apple.mobile.file_relay, com.apple.mobile.house_arrest among others have been addressed in <a href="https://support.apple.com/kb/HT6331?viewlocale=en_US&amp;locale=en_US" target="_blank">Apple&#8217;s knowledge base article</a>. Apple does not directly address <a href="https://twitter.com/JZdziarski" target="_blank">Jonathan Zdziarski&#8217;</a>s claims but instead tries to illuminate their use of these services and what they&#8217;re supposed to be used for. Apple claims that some of these services are used for diagnostic purposes internally as well as for iTunes and Apple Care support. However, the fact that these supposed backdoor services exist without users&#8217; or developers&#8217; knowledge is a bit worrisome.</p>
<p>The real truth here is that no matter what happens, or is really happening, customers should be aware of how intrusive some of these services are or can be. Sure, some of them are limited in scope in terms of what they can access, but even so, Apple should notify customers when they use such services or sign up for the operating system that there are services running on their devices that give Apple access to their device. Backdoor systems are not a joke and some of them are open invitations to hackers to try to hack into a backdoor and use it for their own purposes. Backdoors are inherently insecure and consumers should be made aware of them, malicious or not.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/07/23/security-researcher-claims-ios-devices-backdoor/">Security Researcher Claims iOS Devices Have a Backdoor</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/07/23/security-researcher-claims-ios-devices-backdoor/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The Whitehouse Says They Have Right to Withhold a Security Vulnerability</title>
		<link>http://www.vrworld.com/2014/05/01/whitehouse-says-right-withhold-security-vulnerability/</link>
		<comments>http://www.vrworld.com/2014/05/01/whitehouse-says-right-withhold-security-vulnerability/#comments</comments>
		<pubDate>Thu, 01 May 2014 18:49:57 +0000</pubDate>
		<dc:creator><![CDATA[Anshel Sag]]></dc:creator>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[CIA]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[Heartbleed]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[OpenSSL]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[Whitehouse]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=34849</guid>
		<description><![CDATA[<p>On Monday, as a follow up to the awareness around the Heartbleed bug and all of the rumors that circulated around it, The Whitehouse posted ...</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/05/01/whitehouse-says-right-withhold-security-vulnerability/">The Whitehouse Says They Have Right to Withhold a Security Vulnerability</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="2000" height="1361" src="http://cdn.vrworld.com/wp-content/uploads/2014/05/WhiteHouse_Logo1.png" class="attachment-post-thumbnail wp-post-image" alt="Whitehouse Logo" /></p><p>On Monday, as a follow up to the awareness around <a title="The NSA Exploited the OpenSSL Heartbleed Bug for 2 Years" href="http://www.brightsideofnews.com/2014/04/11/the-nsa-exploited-the-openssl-heartbleed-bug-for-2-years/">the Heartbleed bug</a> and all of the rumors that circulated around it, <a href="http://www.whitehouse.gov/blog/2014/04/28/heartbleed-understanding-when-we-disclose-cyber-vulnerabilities" target="_blank">The Whitehouse posted a blog</a> clarifying their stance on how they approach vulnerabilities such as Heartbleed. In fact, the NSA categorically denied any knowledge of the<a href="https://twitter.com/NSA_PAO/status/454720059156754434" target="_blank"> Heartbleed bug officially on Twitter</a>, even though they have been known to lie to Congress and the American people without hesitation, so their honesty is a little more than at question.</p>
<p>So, what exactly are they going to disclose and when? Well, there&#8217;s a nifty little check list that the Whitehouse has provided us with so that we know when an agency should withhold information from the public and when it should make it public.</p>
<blockquote>
<p class="p1">We have also established a disciplined, rigorous and high-level decision-making process for vulnerability disclosure. This interagency process helps ensure that all of the pros and cons are properly considered and weighed. While there are no hard and fast rules, here are a few things I want to know when an agency proposes temporarily withholding knowledge of a vulnerability:</p>
</blockquote>
<ul>
<li class="p2">
<blockquote><p>How much is the vulnerable system used in the core internet infrastructure, in other critical infrastructure systems, in the U.S. economy, and/or in national security systems?</p></blockquote>
</li>
<li class="p2">
<blockquote><p>Does the vulnerability, if left unpatched, impose significant risk?</p></blockquote>
</li>
<li class="p2">
<blockquote><p>How much harm could an adversary nation or criminal group do with knowledge of this vulnerability?</p></blockquote>
</li>
<li class="p2">
<blockquote><p>How likely is it that we would know if someone else was exploiting it?</p></blockquote>
</li>
<li class="p2">
<blockquote><p>How badly do we need the intelligence we think we can get from exploiting the vulnerability?</p></blockquote>
</li>
<li class="p2">
<blockquote><p>Are there other ways we can get it?</p></blockquote>
</li>
<li class="p2">
<blockquote><p>Could we utilize the vulnerability for a short period of time before we disclose it?</p></blockquote>
</li>
<li class="p2">
<blockquote><p>How likely is it that someone else will discover the vulnerability?</p></blockquote>
</li>
<li class="p2">
<blockquote><p>Can the vulnerability be patched or otherwise mitigated?</p></blockquote>
</li>
</ul>
<p>&nbsp;</p>
<p>So, basically, The Whitehouse and the administration of Obama are basically saying that if a vulnerability doesn&#8217;t really affect us too much, but can gain us lots of valuable intelligence we should keep our mouths shut. What is interesting about this supposed &#8220;rigorous&#8221; process for vulnerability disclosure is that there is no time limit set for how long they are allowed to wait until they disclose a vulnerability. There is no limitation on how long they can leave a vulnerability open if it passes all of these checks that they&#8217;ve established. They mention utilizing the vulnerability for a short period of time, but that doesn&#8217;t actually mean anything because a short period of time could be a day, a week, a month, or a year.</p>
<p>With the Heartbleed bug and the public disclosure around it, there were a lot of companies scrambling to patch the bug and some attacks that utilized it immediately after its disclosure. However, if left unpatched, Heartbleed could have disasterous implications and would give any government with knowledge of it almost unlimited access across the web. As a result, many people simply don&#8217;t believe that The Whitehouse and the NSA were unaware of such a bug, especially since the NSA had quietly exploited countless other bugs continually without any concern.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/05/01/whitehouse-says-right-withhold-security-vulnerability/">The Whitehouse Says They Have Right to Withhold a Security Vulnerability</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/05/01/whitehouse-says-right-withhold-security-vulnerability/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>Time to Run and Hide from Internet Explorer, For Now</title>
		<link>http://www.vrworld.com/2014/04/29/time-run-hide-internet-explorer-now/</link>
		<comments>http://www.vrworld.com/2014/04/29/time-run-hide-internet-explorer-now/#comments</comments>
		<pubDate>Tue, 29 Apr 2014 19:19:02 +0000</pubDate>
		<dc:creator><![CDATA[Anshel Sag]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Browser]]></category>
		<category><![CDATA[Chrome]]></category>
		<category><![CDATA[Exploit]]></category>
		<category><![CDATA[Firefox]]></category>
		<category><![CDATA[IE11]]></category>
		<category><![CDATA[IE6]]></category>
		<category><![CDATA[IE9]]></category>
		<category><![CDATA[Internet Explorer]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Operation Clandestine Fox]]></category>
		<category><![CDATA[Remote Code Execution]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[Zero Day]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=34780</guid>
		<description><![CDATA[<p>Internet Explorer has had a pretty bad reputation over the years as a pretty awful browser, and from the IE6 through the IE9 days, that ...</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/04/29/time-run-hide-internet-explorer-now/">Time to Run and Hide from Internet Explorer, For Now</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="1920" height="1200" src="http://cdn.vrworld.com/wp-content/uploads/2014/04/IE9V2_31.jpg" class="attachment-post-thumbnail wp-post-image" alt="Internet Explorer" /></p><p>Internet Explorer has had a pretty bad reputation over the years as a pretty awful browser, and from the IE6 through the IE9 days, that was a pretty accurate statement. However, nowadays Internet Explorer is fairly good and the only browser on Windows worth anything for touch. The guys and gals over at <a href="http://www.fireeye.com/blog/uncategorized/2014/04/new-zero-day-exploit-targeting-internet-explorer-versions-9-through-11-identified-in-targeted-attacks.html" target="_blank">FireEye managed to discover this Zero Day Exploit</a> and dubbed the entire operation, &#8220;Operation Clandestine Fox.&#8221; They claim that this zero day exploit targets IE9 through IE11 browsers, which make up about 26% of all browser users around the world which is pretty significant. Microsoft has <a href="https://technet.microsoft.com/en-US/library/security/2963983" target="_blank">also put out a security bulletin</a> on the issue stating that users using IE6 through IE11 could be affected, which would broaden the scope of this issue by millions more users.</p>
<p>While Microsoft claims this issue is occurring in &#8220;limited attacks&#8221; the potential for this attack to grow is now exponentially greater now that the issue has been discovered but not yet fixed. We don&#8217;t know the details of how long FireEye waited to let Microsoft resolve this issue before they announced it, but I have a feeling they didn&#8217;t just post about it and expect Microsoft to deal with the repercussions. Microsoft is a much more serious company when it comes to security, which is what makes this IE zero day vulnerability all the more puzzling. The fact that such a zero day has managed to exist through potentially all versions of IE and only get caught now is also a bit suspicious (now that we live in the post-Snowden era where anything could be deliberate).</p>
<p>The vulnerability itself as described by the FireEye team is that the exploit leverages a previously unknown use-after-free vulnerability as well as a well-known flash exploit to achieve arbitrary memory access and bypass Windows&#8217; ASLR and DEP protections. What this ultimately means for users is that if you&#8217;re using Internet Explorer right now, you should probably stop doing so and switch to Chrome or Firefox until this issue gets resolved. Personally, I use four different browsers simultaneously, but I don&#8217;t really recommend that to anyone, especially in this case. If you must absolutely use Internet Explorer, then you should disable Flash (or uninstall it) and use your browser with a proper anti-virus application, even though it would just be easier to use Chrome or Firefox in the meantime.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/04/29/time-run-hide-internet-explorer-now/">Time to Run and Hide from Internet Explorer, For Now</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/04/29/time-run-hide-internet-explorer-now/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

Content Delivery Network via Amazon Web Services: CloudFront: cdn.vrworld.com

 Served from: www.vrworld.com @ 2015-04-10 16:35:13 by W3 Total Cache -->