Hardware & Technical "Bad Rabbit" malware on the way, uses a fake Adobe Flash update to infect.

No doubt. Still many facebook games and other things that 'average joe' might use on their PC still rely on Flash. It sucks.
 
I guess there is not a relevant 'catch all' thread for this stuff, and this thread became a bit of that? Since the clamp-down on what we can and can not post (that is not obscene or obviously not acceptable etc) it is hard to find motivation to post here, so i do the best i can. Please feel free to make a separate thread for this info if you want :)
 
I guess there is not a relevant 'catch all' thread for this stuff, and this thread became a bit of that? Since the clamp-down on what we can and can not post (that is not obscene or obviously not acceptable etc) it is hard to find motivation to post here, so i do the best i can. Please feel free to make a separate thread for this info if you want :)
Thanks, but meh, I'm too lazy. :)
Good info anyway.
 
A good reason to use the Chrome browser, it blocks all Flash and you have to allow the website via content settings if you really must use it. So no random infected Flash adverts or clicks on sites you haven't allowed.
 
Just in: if you install Flash, legitimate or not, you deserve every bit of pain you get.

Unfortunately many useful things on 't internet require the use of flash - the most annoying one to me is the BBC weather forecasts.

When Firefox went "57" I became very wary of browsing until "noscript" was updated, even now I am not too happy as I get used to the new noscript. But I do have Firefox set to "always ask to activate" flash.
 
@Zak - are you an Ars Technica editor or something? :D

No, but since the decline of the BBC and other 'science' pages and reporting i was happy to discover arstechnica six months or so ago (wish it had been sooner as they are pretty good). So after i've had a run through the beeb and guardian websites i often check arstechnica to see what else is interesting.
 
More security concerns ahead! (and sorry, another arstechnica link!)

'1998 attack that messes with sites’ secret crypto keys is back in a big way':

https://arstechnica.com/information...s-remain-open-to-major-crypto-flaw-from-1998/

A surprisingly big number of top-name websites—Facebook and PayPal among them—recently tested positive for a critical, 19-year-old vulnerability that allowed attackers to decrypt encrypted data and sign communications using the sites' secret encryption key.

........

On Wednesday, a team of researchers said an Internet scan conducted last month found that 27 of the 100 most-visited websites—including Facebook and PayPal—were vulnerable to what was essentially the same attack. About 2.8 percent of the top 1 million sites also tested positive.

So, er, be careful about what info you 'share' online? until they patch it, probably.
 
'Hackers take control of security firm’s domain, steal secret data':

https://arstechnica.com/information...ty-firms-secret-data-in-brazen-domain-hijack/

The attackers were able bypass protections provided by HTTPS-based encryption by first using their control of the Fox-IT domain to obtain a new transport layer security certificate. The process happened in the first 10 minutes of the attack, during which time all Fox-IT email was rerouted to the attackers. With that in place, the attackers were able to able to decrypt all incoming traffic and to cryptographically impersonate the hijacked domain. After intercepting and reading incoming traffic, the attackers forwarded it to Fox-IT in an attempt to prevent company engineers from detecting the attack.

The detailed account underscores just how easily hacks can succeed, even against security-savvy parties with relatively robust practices in place. It wouldn't be surprising to see the same techniques succeed against scores or even hundreds of other companies that use the same industry-standard countermeasures.

So many hackers, so much to hack :(
 
Back
Top Bottom