Avast launched its annual Threat Landscape Report, detailing the biggest security trends facing consumers in 2019 as collected by the Avast Threat Labs team.
“This year, we celebrated the 30th anniversary of the World Wide Web. Fast forward thirty years and the threat landscape is exponentially more complex, and the available attack surface is growing faster than it has at any other point in the history of technology,” commented Ondrej Vlcek, President of Consumer at Avast.
The CERT Coordination Center (CERT/CC) has published data on vulnerabilities affecting versions of Microsoft Windows and Windows Server.
Microsoft had issued an advisory for CVE-2018-8611, a Windows kernel elevation of privilege bug that exists when the Windows kernel fails to properly handle objects in memory. An attacker who exploited this flaw could run arbitrary code in kernel mode. The company also issued CVE-2018-8626 for a Windows DNS server heap overflow vulnerability. A remote code execution flaw exists in Windows DNS servers when they don’t properly handle requests, Microsoft explains.
Read more about the critical Windows flaws on DarkReading.
In January of 2018, the world was introduced to two game-changing CPU vulnerabilities, Spectre and Meltdown, that brought “speculative execution side-channel vulnerability” into the enterprise IT security lexicon. Since then, a number of variants of the initial vulnerabilities have been found, along with new vulnerabilities taking advantage of similar functions within the CPUs.
Intel kicked off 2019 with a Jan. 2 editorial laying out its response to the Spectre and Meltdown vulnerabilities over the past year. The chip giant says the culture of the company has changed since the advent of Spectre and Meltdown, and its response has been effective. But vulnerabilities in the core of a CPU tend not to lend themselves too rapid, complete fixes, Intel says.
Read more about Intel’s response to Meltdown & Spectre on DarkReading.
A passel of privilege-escalation vulnerabilities in MacPaw’s CleanMyMac X software would allow a local attacker to gain root access to an Apple machine in various ways. CleanMyMac X is a cleanup application for MacOS that optimizes the drives and frees up space by scanning for unused, redundant or unnecessary files and deleting them. No fewer than a dozen flaws plague 4.0 and earlier versions of the software, all of them in the package’s “helper protocol.”
The helper functions of the software run as root functions and the flaws arise from the fact that they can be accessed by applications without validation – thus giving those applications root access.
Read more about the critical flaws in CleanMyMac X software on Threatpost.
Researchers have spotted a new Android malware hidden behind six different Android applications that were available for download in Google Play. The six apps include Flappy Birr Dog, Flappy Bird, FlashLight, Win7Launcher, Win7imulator, and HZPermis Pro Arabe. Out of these six apps, five have been removed from Google Play since February 2018.
However, these applications have been downloaded at least 100,000 times by users across 196 countries with the majority of victims residing in India.
Read more about the massive Android malware campaign on Cyware.
These are exciting times for authentication technologies. We’ve only just begun to explore a new world beyond passwords. Emerging alternatives abound, from biometrics to multifactor authentication (MFA) to behavioral analysis and many other innovative ideas.
Unfortunately, headlines can also lead us to believe a plethora of myths about passwords and the future of authentication. Before we can pick a path to follow into the future of authentication, we must first overcome these myths and misconceptions around passwords that are still widely held, even by security professionals.
The potential impact of cyber attacks on the economy of the world’s largest cities has risen by nearly nine per cent in the last year, according to the 2019 update of the Global Risk Index from the Centre for Risk Studies at Cambridge Judge Business School. Cyber risk has now risen from seventh to sixth place among global threats in the index.
The research is unique in making an annual quantification of the potential GDP impact of unpredictable shocks on the world’s most prominent cities. The 2019 update to the Global Risk Index sees a uniform rise in GDP@Risk across all the 279 world cities that make up the index and more significant increases in risk for some urban centres.
Read more about the findings of the Global Risk Index on BusinessWeekly.
Malware authors continue to innovate, find new infection vectors and better obfuscate their wares. Heading into 2019, you can bet that cybercriminals will do everything in their power to become even more effective and virulent.
Read about 10 top malware trends to watch for this year on Threatpost.
A security researcher has disclosed exploit code for a fourth zero-day vulnerability in Windows operating system in just as many months. The latest bug enables overwriting a target file with arbitrary data.
Running the proof-of-concept (PoC) code provided by the researcher that uses the online alias SandboxEscaper results in overwriting ‘pci.sys’ with information about software and hardware problems, collected through the Windows Error Reporting (WER) event-based feedback infrastructure. The researcher warns that the exploit she wrote works with some limitations and may not have the expected effect on some CPUs. For instance, she could not reproduce the bug on a machine with one CPU core.
In the past, cyber attacks used to be so infrequent that hearing about just one breach in the news would be reason enough to invest in protection. Nowadays, not a day goes by without news of another hack being disseminated around the world. The temptation to roll your eyes, say ‘not another one’, and shut your browser is palpable.
But according to Real Business’s Mike Smith, becoming fatigued and showing complacency is one of the most dangerous things we can do. And if we need any more evidence than is already in the public realm, a recent report by UK’s National Cyber Security Centre revealed the sheer scale of the problem, admitting to thwarting around 10 attacks every single week.
Read more about the problem of “breach fatigue” on RealBusiness.