Infosec Weekly Round-up November 26- December 02, 2012
Samsung printer firmware contains a printer SNMP backdoor
Samsung printers contain a hardcoded SNMP community string that could allow a remote attacker to take control of an affected device.
Financial Malware Detects Remote Desktop Environments to Evade Researchers
Like any other group of business people, cybercriminals want to protect their investments. In the case of malware, that means thwarting research and analysis. According to Trusteer, the author of the financial malware platform known as Shylock has added a new mechanism to identify and avoid remote desktop environments commonly used by researchers when analyzing malware.
Simple flaw in hotel door locks leaves MILLIONS of guests vulnerable to robberies and break-ins
A simple security flaw in millions of hotel room doors is raising serious concerns over safety, after a string of robberies at a Houston Hyatt was said to be caused by the glaring technical problem. Earlier this year, it was revealed that more than four million hotel rooms were in jeopardy after a 24-year-old developer for Mozilla demonstrated how easily hotel door locks made by Onity could be disabled using a device he created for less than $50.
AV-test and Microsoft Security Essential failure
Every two months, the independent IT security institute AV-Test lab check popular antivirus software and software packages protection, checking their effectiveness in different ways. The last test in September and October 2012 ended badly to Microsoft Security Essentials. This program was not able to show required protection result, sufficient for certification AV-Test on Windows 7.
Obviously Microsoft AV was the only program that hasn’t achieved to get the certificate. All other anti-virus software, including free product such as Avast, AVG and Panda Cloud, passed the test.
Spear-Phishing Email: Most Favored APT Attack Bait
Advanced persistent threat (APT) campaigns comprise a growing part of the current threat landscape. Some APT campaigns remain active, in fact, even after drawing extensive media attention. Campaigns’ routines may vary over time but their primary goal remains the same—to gain entry to a target organization’s network and obtain confidential information.