Tech content trusted by users in North America and around the world
6,206 Reviews & Articles | 40,142 News Posts
TRENDING NOW: GTA V will have 'just for PC' features, including a video editor

TweakTown News

Refine News by Category:

Hacking & Security Posts - Page 89

Apple updates malware definitions to protect from Yontoo adware

Apple appears to be taking security more seriously. Just a mere 24 hours after Yontoo adware was discovered to be affecting Mac OS X systems, Apple has pushed out an update to its malware definitions to protect from the malware. The Yontoo adware was found to be injecting ads into sites visited in Chrome, Safari, and Firefox.


TweakTown image news/2/9/29283_1_apple_updates_malware_definitions_to_protect_from_yontoo_adware.png


Apple hasn't always been so quick to respond to new threats. For a long time, Apple actually advertised that Mac OS X was basically invulnerable to viruses. Variants of Yontoo are bound to show up and it will be interesting to see if Apple is able to keep them at bay. As always, we'll keep our eye on the latest security threats and alert users when major problems arise.

Apple bug allows Apple ID password reset with just e-mail and date of birth

If you haven't enabled two-factor authentication quite yet, you might want to get on it. Yes, right now. A new vulnerability has been found that will allow a malicious user to reset a user's password by knowing just their e-mail address and date of birth. It's not clear if this bug resulted from Apple's new two-step authentication or if it has always been there.


TweakTown image news/2/9/29281_1_apple_makes_a_big_oops_when_enabling_two_step_authentication_allows_password_reset_with_just_e_mail_and_date_of_birth.png


A guide to doing the hack has been posted online, though we will not be linking to it for some very obvious security reasons. A malicious user has to simply paste in a modified URL and answer the date of birth security question to reset the password. The exploit makes use of Apple's iForgot tool.

Cyber attack on South Korea wiped master boot records of affected PCs

Nearly 48 hours ago, South Korea saw a cyber attack that took down multiple banks and TV stations. It's now being reported that the cyber attack wiped the HDDs of the affected PCs, according to McAfee's analysis on the attack.


TweakTown image news/2/9/29269_08_cyber_attack_on_south_korea_wiped_hdds.jpg


The PCs were infected by malware, wiping the master boot record (MBR) of the affected PCs. The MBR on a HDD contains crucial information on how the file systems on a HDD are organized, messing with this can take down a system easily. The malware used overwrote the data in the MBR with some weird characters: "PRINCPES, PR!NCPES, HASTATI." The attack also overwrote some random parts of the file system with the same weird characters.


The systems affected were then given a forced reboot command, but because the MBR and file system were attacked and thus corrupted, the restart was unable to complete.

Apple unveils two-step verification for iCloud, Apple ID

Apple is implementing a security feature known as two-step verification. It's similar to the security measures used by Google and other web services. Users are able to enable the service through the Apple ID website, after which two-step verification will be required to make changes to a user's account.


TweakTown image news/2/9/29256_1_apple_unveils_two_step_verification_for_icloud_apple_id.png


Users will set up a trusted device, such as a Mac or iPhone, and will need to print a recovery key. In order to reset a user's password, they will need to have access to the recovery key that they printed out. The first time you attempt to buy an app on a new device, you'll be required to enter a pin that can be accessed from a trusted device.


You can head over to the Apple ID website to enable it for yourself. It's definitely recommended, though it's only currently available in the United States, United Kingdom, Australia, Ireland, and New Zealand.

Mac-specific Trojan discovered, injects ads into webpages

A new virus specific to Mac has been discovered by Russian security firm Doctor Web. Named Trojan.Yontoo.1, the virus injects ads into webpages on the infected machine.


TweakTown image news/2/9/29252_2_mac_specific_trojan_discovered_injects_ads_into_webpages.png


The malware works by installing an adware plugin into any of the popular browsers then overlays an advertisement in key locations on webpages. Doctor Web says that this trojan is just another piece of a large adware puzzle that has been infecting OS X for some time now.


TweakTown image news/2/9/29252_1_mac_specific_trojan_discovered_injects_ads_into_webpages.png


The virus can be caught in several different ways, with the most popular method being the use of movie trailer pages in which users must install a plugin to view the content. Other methods of injection have been media player enhancement programs and download accelerators. One indication of infection is that when launched, Trojan.Yontoo.1 will prompt users to install a program called "Free Twit Tube" or something similar.


No information has been released from Apple on a removal tool yet, and it is expected that Apple will just patch its XProtect.plist which already blocks about 15 previous malware attacks. The best thing is to avoid any installs from unknown websites or anything that has a funny name. Remember, Google is your friend and if you are unsure of an application's validity, a five second search could prevent an infection. Be smart.

Lockscreen bypass bug discovered in iOS 6.1.3

Just when Apple thought they were out of the woods, a new lockscreen vulnerability has been discovered. Apple released iOS 6.1.3 to fix a previously found lockscreen vulnerability, though it appears to have introduced a new one--or failed to fix one that was present in previous versions.



The bug isn't too difficult to activate, nor is it difficult to protect from. A person needs to simply make a telephone call by using Siri and remove the SIM card at the correct time. The bypass is demonstrated in the above embedded video.


To protect against the bypass until Apple fixes it, you just have to disable voice dial from the Password Lock screen. It's time for Apple to start working on iOS 6.1.4.

Continue reading 'Lockscreen bypass bug discovered in iOS 6.1.3' (full post)

Samsung working on fixing security flaw present on some Android devices

Samsung has confirmed that they are working on a fix for a flaw that allows bypassing of the lock screen. The bug was posted to the internet today and shows a method for bypassing the lock screen, permanently, if you have enough time to download an app from the Play Store.



The steps to reproduce the bug are below:


  1. From the lock screen, hit the emergency call button.
  2. Dial a non-existent emergency services number - e.g. 0.
  3. Press the green dial icon.
  4. Dismiss the error message.
  5. Press the phone's back button.
  6. The app's screen will be briefly displayed.
  7. This is just about long enough to interact with the app.
  8. Using this, you can run and interact with any app / widget / settings menu.
  9. You can also use this to launch the dialler.
  10. From there, you can dial any phone number (one digit at a time) and place a phone call.
  11. With Google Play, you can search for apps using the voice interface.
  12. You can download apps from the app store which will disable the screen lock.


The bug is only present on Samsung's implementation of Android. It doesn't seem to affect the stock build. In a statement, Samsung said, "We are aware of this issue and will release a fix at the earliest possibility. Samsung considers user privacy and the security of user data its top priority."


TweakTown image news/2/9/29229_1_samsung_working_on_fixing_security_flaw_present_on_some_android_devices.jpg

High-profile Xbox Live accounts hacked, former and current Microsoft employee accounts compromised

Microsoft is currently dealing with some high-profile hackings that have compromised the Xbox Live accounts of former and current Microsoft employees. The attack apparently used a series of stringed social engineering tactics that collected social security numbers and other information necessary to gain access to the accounts.


TweakTown image news/2/9/29227_1_high_profile_xbox_live_accounts_hacked_former_and_current_microsoft_employee_accounts_compromised.jpg


A group of attackers are using several stringed social engineering techniques to compromise the accounts of a handful of high-profile Xbox Live accounts held by current and former Microsoft employees. We are actively working with law enforcement and other affected companies to disable this current method of attack and prevent its further use.


It's not clear what Microsoft will be able to do to prevent this from happening in the future. Microsoft needs a way to properly identify an account's owner, but they can't prevent third-parties from giving out that private information.

New NATO cyber war manual details what is and what isn't allowed in cyber warfare

NATO has released a new document that lays down the law about cyber warfare for all of its members. The document details what is considered acceptable and what is thought of as out of bounds for state sponsored hacking.


TweakTown image news/2/9/29195_1_new_nato_cyber_war_manual_details_what_is_and_what_isn_t_allowed_in_cyber_warfare.jpg


Hospitals, nuclear power stations, dams and dykes are all on the do not touch list much like similar UN resolutions that do not allow its members to bomb certain targets. The new document does give the go-ahead to enact analog war against a country who is digitally attacking you.


"An international armed conflict exists whenever there are hostilities, which may include or be limited to cyber operations occurring between two states or more." The Guardian suggest that this may roll over into the so-called "hacktivist" community as well. This could leave its members venerable to physical attack if a country deems them a threat.

Samsung to fix Galaxy S3 lock screen bug 'shortly', Lookout has temporary fix in Play Store

Samsung will be issuing a fix for a bug that allows unfettered access to a locked Galaxy S3's files "shortly". Meanwhile, Lookout, the company behind the popular antivirus app of the same name, has already produced a fix that is currently available through the Google Play Store.


TweakTown image news/2/9/29053_1_samsung_to_fix_galaxy_s3_lock_screen_bug_lookout_has_fix_on_play_store.jpg


Lookout describes how their app protects devices from being exploited through this particular bug: "When Lookout detects the emergency contact dialer has been backgrounded, we preemptively bring it back to the forefront so that the rest of the phone cannot be accessed."


Lookout says they expect Samsung to be released shortly, though an official statement from Samsung has not been given. Lookout highly recommends updating to the latest patch whenever Samsung makes it available. You can read Lookout's full blog post about the issue here. To read more about the bug in the Galaxy S III, you can see our other coverage.

Latest News Posts

View More News Posts

Forum Activity

View More Forum Posts

Press Releases

View More Press Releases