找回密码
 注册创意安天

每日安全简讯(20161006)

[复制链接]
发表于 2016-10-5 19:03 | 显示全部楼层 |阅读模式
发表于 2016-10-6 20:44 | 显示全部楼层
1、BadKernel漏洞影响1/16安卓设备,涵盖主流品牌
标题:BadKernel Vulnerability Affects One in 16 Android Smartphones
Security flaw affects Chromium browsers & WebView component

作者信息:Oct 5, 2016 01:30 GMT By Catalin Cimpanu

//BEGIN
A security bug in Google's V8 JavaScript engine is indirectly affecting around one in 16 Android devices, impacting smartphone models from all major
vendors, such as LG, Samsung, Motorola, and Huawei.
Google的V8版本的JavaScript 引擎存在安全bug间接影响近十六分之一的所有Android设备,影响的Android手机品牌计划覆盖了所有知名的厂商:韩国的LG,三星;美国的
摩托以及中国的华为等。

//END
To avoid exposing themselves to BadKernel attacks, users should always keep their apps up to date, and they should not delay installing Android OS
system updates.
为了避免遭到BadKernel等严重漏洞的影响,用户应该及时保持其使用的APP以及其运行的操作系统为最新版。

//下载: BadKernel-Affected-Model-Lists-20161006.pdf (393.79 KB, 下载次数: 407)
文件名:BadKernel-Affected-Model-Lists-20161006.pdf
文件大小:403,237 bytes
MD5:A2C585B51041C5D52CC0853AD7FA9027

点评:BadKernel的广角解读与分析。
回复

使用道具 举报

发表于 2016-10-6 20:45 | 显示全部楼层
2、研究者发现胰岛素泵存在远程恶意指令控制漏洞
标题:Insulin Pump Security Flaws Could Be Used to Set Off Hypoglycemic Reactions
Researcher says there's no reason to panic

作者信息:Oct 4, 2016 21:15 GMT  By Catalin Cimpanu

//BEGIN
People with diabetes that use OneTouch Ping insulin pumps made by Animas, a Johnson & Johnson subsidiary, might want to check their mail in the
upcoming days for instructions on how to secure their device against remote hacking.
美国强生公司的子公司为糖尿病患者生成的胰岛素泵可能存在安全隐患,黑客们利用这个安全隐患,可以远程攻击患者使用的该设备。在接下来的几天中,患者们会被提
醒采取一些步骤来预防这些攻击或者威胁。

//END
More details are available via the company's letter, also sent to patients. A video demonstration of Radcliffe's discoveries is available here. The
OneTouch Ping vulnerabilities are tracked as CVE-2016-5084, CVE-2016-5085, and CVE-2016-5086.
公司给客户会发送公开信,提醒用户防范的步骤和方法。同时安全研究者会发布一段视频,演示黑客们可能发起的攻击。
该安全漏洞是有三个相连编号组成的:CVE-2016-5084, CVE-2016-5085和CVE-2016-5086.

//insulin 胰岛素; Hypoglycemic 血糖过低的,低血糖症的;

点评:三连号CVE漏洞。
回复

使用道具 举报

发表于 2016-10-6 20:46 | 显示全部楼层
3、苹果iMessage新版存泄露IP地址和设备信息漏洞
标题:Apple's iMessage Exposes User IP Address and Device Details to Spammers
iMessage link preview feature was added in iOS 10 and macOS 10.12, and currently can't be turned off

作者信息:Oct 4, 2016 18:15 GMT  By Catalin Cimpanu

//BEGIN
Apple might need to fine-tune the link preview feature the company added to iMessage in iOS 10 and macOS 10.12, released two weeks ago, in September.
两周前APPLE公司发布的新版操作系统iOS10和macOS 10.12 可能需要更新一下其连接预览特性,以避免泄露用户的个人隐私信息:比如使用者的IP地址和设备相关信息等

//END
The second is more ingenious and doesn't require Apple to set up any additional servers. McKillop says that Apple could update iMessages, so link
previews are retrieved from the sender's device, and then embedded as metadata inside the sent message. In this case, attackers would be collecting
data on their own devices.
第二种方法可能更加精巧一些,它不需要APPLE公司自身单独设置服务器。但是需要APPLE公司升级一下其iMessages,从而使得其预览特性直接从发送者的设备中采集,并
将其元数据包装在信息中。如果采取这种策略的话,那么攻击者将采集的信息都是其自身的,而不会是使用者的了。

点评:以其矛攻其盾。
回复

使用道具 举报

发表于 2016-10-6 20:47 | 显示全部楼层
4、研究人员发现三星移动安全方案KNOX绕过方法
标题:Researchers Leverage RKP Module to Bypass Samsung KNOX

作者信息: October 04, 2016 By Ionut Arghire

//BEGIN
Security researchers from Viral Security Group Ltd. have managed to bypass the Samsung KNOX security features by exploiting vulnerabilities that
render unpatched devices susceptible to compromise.
研究人员发现三星移动安全方案KNOX绕过方法

//END
Some of the remediation solutions proposed by the security researchers include treating system permissions similar to root; performing a PID check
later in the permission-granting process, because RKP grants processes with PID 0 root privileges (and the researchers leveraged that); and placing
the lkmauth_bootmode variable and the security_ops structure in an RKP-protected, read-only page.
一些安全人员提供的解决方案包括:将系统system权限等同于root权限;执行PID的值检查;将RKP保护模式下的变量设置为只读模式,比如lkmauth启动模式变量和安全
ops结构变量。

//RKP:Real-time Kernel Protection 实时内核保护

//下载: 6步跨越KNOX机制.pdf (413.48 KB, 下载次数: 467)
文件名:6步跨越KNOX机制.pdf
大小:423,399 bytes
MD5:41C0F3D9FF8077243FE62431C72D27CA

点评:
回复

使用道具 举报

发表于 2016-10-6 20:49 | 显示全部楼层
5、Dropbox 6800万账号信息被安全研究人员泄漏
标题:Download for free 68 Million account details from Dropbox Data Breach

作者信息:October 4, 2016  By Pierluigi Paganini

//BEGIN
You don’t need to pay in order to receive the full dump from the DropBox data breach, security researcher leaked it online.
Dropbox以前泄露的6800万账户信息现在不用付钱就可以获得了: 安全人员将其公布在网上(大约3G)。

//END
Dropbox is only one of the numerous massive data breaches suffered by many IT firms including Yahoo, LinkedIn, MySpace, and VK.com.
Dropbox只是众多IT公司数据泄露的受害者之一。

//下载:
链接:http://pan.baidu.com/s/1kVFa4hp 密码:o0ss
文件名:DropBox.rar
文件大小:2,952,576,971 bytes
MD5: C004F3F03895F5F5048E220C297398D0
解密:文件名
*请谨慎使用

点评:未经验证。
回复

使用道具 举报

发表于 2016-10-6 20:51 | 显示全部楼层
6、Yahoo被指允许美国政府暗中扫描用户邮件
标题:Reuters – Yahoo allowed US government to secretly scanning customer emails

作者信息:October 5, 2016  By Pierluigi Paganini

//BEGIN
Yahoo may have allowed US government to search user emails by using a secret software program that scanned hundreds of millions of Mail accounts.
Yahoo被指允许美国政府暗中扫描用户邮件,而且是实时的,采用的工具是其开发的一个秘密的程序。

//END
The news arrived a few days after a former Yahoo executive revealed the number of affected user accounts in the 2012 Yahoo data breach may be between
1 Billion and 3 Billion.
该消息是在YAHOO的邮箱被泄露的消息被披露不久,2012年那时被泄露的数量可能有10亿到30亿之多。

点评:棱镜门事件或许还有很多细节未被曝光。
回复

使用道具 举报

发表于 2016-10-8 11:21 | 显示全部楼层
Wenster 发表于 2016-10-6 20:49
5、Dropbox 6800万账号信息被安全研究人员泄漏
标题:Download for free 68 Million account details from ...

由于文件过大,保存1个月后,2016-11-9后将删除。
回复

使用道具 举报

发表于 2016-11-9 09:37 | 显示全部楼层
Wenster 发表于 2016-10-8 11:21
由于文件过大,保存1个月后,2016-11-9后将删除。

已删除。
Deleted due to the capacity limits.
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 注册创意安天

本版积分规则

Archiver|手机版|小黑屋|创意安天 ( 京ICP备09068574,ICP证100468号。 )

GMT+8, 2026-5-2 16:10

Powered by Discuz! X3.5

© 2001-2025 Discuz! Team.

快速回复 返回顶部 返回列表