Tag Archive for: Breaks

‘Dogspectus’ Breaks New Ground For Android Ransomware – Dark Reading


BGR

'Dogspectus' Breaks New Ground For Android Ransomware
Dark Reading
Malware writers appear to have broken new ground with 'Dogspectus' a ransomware sample that infects smartphones and tablets running certain older versions of Android, via drive by download. Unlike other mobile ransomware tools, Dogspectus does not …
Creepy new Android ransomware installs itself, demands payment in iTunes gift cardsBGR
Cyber Police ransomware can lock your Android device and ask for paymentDigital Trends
New Android Ransomware Infects Phones When Users Visit A Certain WebsiteTech Times
Inquirer –Techworm –Computerworld
all 35 news articles »

\\”android+ransomware\\” – read more

DOD radar blimp breaks loose, takes out power lines in 160-mile flight [Updated]

One of the two tethered aerostats that make up the Joint Land Attack Cruise Missile Defense Elevated Netted Sensor System (JLENS), broke loose from its moorings today and drifted across the skies of Maryland and  Pennsylvania, before coming down to earth 160 miles away. Two Air National Guard F-16 fighters were scrambled to monitor its movements, while its trailing tether took out power lines in Pennsylvania, causing blackouts across the state.

JLENS’ twin aerostats are (or were) supposed to provide airborne early warning and targeting of low-flying airborne threats coming in from the Atlantic, covering a radius of 300 miles with their look down search and targeting radar. They have been the subject of much controversy because of the cost of the program; a recent Los Angeles Times report called the $ 2.7 billion dollar project delivered by Raytheon a “zombie” program: “costly, ineffectual and seemingly impossible to kill.”

The twin white balloons with their radomes are usually visible from Baltimore and much of surrounding Maryland, flying on tethers at sites in Baltimore County and Harford County near the Army’s Aberdeen Proving Ground.The 242-foot long JLENS aerostats are designed to operate at altitudes of up to 10,000 feet, and can stay aloft for up to 30 days at a time before being retrieved for maintenance. The tethers, made of Vectran (a substance similar to kevlar), are 1 1/8 inches thick, and are designed to withstand 100 mile-per-hour winds. However, the Harford County tether, near Aberdeen Proving Grounds’ Edgewood Arsenal facility, broke today, about halfway up to the JLENS aerostat, allowing the unmanned, unpowered blimp to be carried off while trailing 6,700 feet of cable. High winds during a storm that passed through the Baltimore region, or perhaps wind shear associated with the storms, snapped the tether just after noon local time, setting the aerostat adrift.

Read 4 remaining paragraphs | Comments

Ars Technica » Technology Lab

Lookout breaks into enterprise market with mobile security service – ZDNet

Lookout breaks into enterprise market with mobile security service
ZDNet
Lookout Mobile Threat Protection offers not just visibility, but protection from these risks." The new mobile service includes advanced malware protection, which "predicts attacks before an app exhibits suspicious behavior or does harm to an

and more »

flame malware – read more

Second HTTPS snooping flaw breaks security for thousands of iOS apps

Attackers can potentially snoop on the encrypted traffic of over 25,000 iOS applications due to a vulnerability in a popular open-source networking library.

The vulnerability stems from a failure to validate the domain names of digital certificates in AFNetworking, a library used by a large number of iOS and Mac OS X app developers to implement Web communications—including those over HTTPS (HTTP with SSL/TLS encryption).

The flaw allows attackers in a position to intercept HTTPS traffic between a vulnerable application and a Web service to decrypt it by presenting the application with a digital certificate for a different domain name. Such man-in-the-middle attacks can be launched over insecure wireless networks, by hacking into routers or through other methods.

To read this article in full or to leave a comment, please click here

Network World Security