CodeRed Center

Code Red Center - Virus, Threats, Trojans and Malware Analysis



EC-Council CodeRed Security Advisory System

The EC-Council CodeRed Security Advisory System is designed to assist network and system
administrators to take protective measures when specific computer threat information is received.


There are three levels of the security advisory system.
  Green Level (Low level alert)
Yellow Level (Medium level alert) Red Level (High alert)
 


 
Security News

1CNOOC pledge small step for China transparency, skeptics abound


SINGAPORE/HONG KONG (Reuters) - CNOOC's promise of transparency, pledged to win approval from Canada for its $15.1 billion purchase of Nexen Inc, looks like a positive step on the face of it but is unlikely to represent a sea change in Chinese business practices. To be sure, the details of commitment are not clear. The state-controlled energy firm has promised the Canadian government an annual compliance report on all its commitments that are part of its takeover of Nexen Inc, China's biggest ever takeover.
Read More...

2Huawei duplicará personal en Europa


HELSINKI (Reuters) - El proveedor de equipos de telecomunicaciones chino Huawei Technologies planea duplicar su plantilla de empleados en Europa durante los próximos años e instalará un centro de investigación en Finlandia destinado a desarrollar nuevos teléfonos avanzados. Los planes de expansión para Europa se dieron a conocer dos meses después de que legisladores estadounidenses señalaron que los equipos de Huawei podrían ser usados para espionaje de China.
Read More...

3China's CNOOC lauds Canadian approval of Nexen buy

China's state-owned CNOOC said on Saturday that it is delighted that the Canadian Ministry of Industry has approved its $15.1 billion proposed takeover of Canadian oil and gas producer Nexen.Once finalized.
Read More...

4Huawei executive confirms plans for a 6.1-inch behemoth smartphone


Huawei (002502) has confirmed that it is working on a Samsung (005930) Galaxy Note II competitor. A few months ago it was reported that the company was planning to release an oversized smartphone rumored to be called the Ascend Mate. The handset was said to come with a massive 6.1-inch full HD 1080p display and feature an in-house 1.8GHz quad-core processor with 2GB of RAM. Speaking on Chinese social network Weibo on Wednesday, Huawei Senior Vice President Yu Chengdong confirmed that the company is working on such a device. The executive added that it will be more powerful than the Galaxy Note II and include a “cooler” design, slimmer bezel, better grip, more stunning display and longer battery life.
Read More...


5Empresa china imita a Apple y obtiene una porción del mercado de smartphones

PEKIN (Reuters) - La compañía china Xiaomi Technology es un cuento de hadas para los empresarios "nerds". Menos de tres años después de su fundación, la empresa productora de smartphones está valuada en 4.000 millones de dólares y evoca una adoración de sus seguidores similar a la que ostenta Apple.
Read More...


6Cyber attacks on Gulf infrastructure seen rising

DUBAI (Reuters) - The former chief of the United Arab Emirates' air force said his country's advanced cyber infrastructure made it a favorite target for hackers, especially when tension heightened in the Israeli-Palestinian conflict. "The last war in Gaza led to a barrage of cyber attacks because UAE has advanced telecommunications infrastructure," retired Major General Khaled al-Buainnain said. "The biggest attack was during the 2006 Israel-Lebanon war which was carried out by pro-Israeli hackers who did not understand the nature of the conflict and its parties.
Read More...


7Android 4.2′s built-in antivirus software only detects 15% of malware


The latest version of the Android operating system has been called one of the most bug-ridden releases since Honeycomb, although it has also been recognized as the safest version yet. With Android 4.2, Google (GOOG) integrated a unique and high-powered security feature into the platform that scans for malicious or potentially harmful codes in apps that are loaded onto a user’s device. According to a study conducted by researchers at NC State University, however, the company’s malware protector was found to be less than satisfactory. Google’s app verification service was found to identify malicious apps only 15.32% of the time, compared to various anti-virus programs that varied from 51% to 100% accuracy. The experiment used 1,260 samples of malware, to which the built-in feature.
Read More...


8Hackers hook the Nexus 4 onto AT&T’s LTE network in limited markets


Hackers hook the Nexus 4 onto AT&T’s LTE network in limited marketsLTE on the Nexus 4 — it’s not just for Canadians anymore. Android Police points out the some members of the XDA-Developers forum have been able to use AT&T’s (T) LTE network on their Nexus 4 smartphones, but only in limited markets. The reason, as Android Police explains, is that the Nexus 4′s radio can pick up frequencies on the AWS band that spans from 1710 to 1755 MHz on the uplink and from 2110 to 2155 MHz on the downlink. But while AT&T uses this band for LTE services in some markets, it mostly deploys LTE on the 700MHz band that has significantly better propagation than the AWS band. All that said, Android Police notes that if you own a Nexus 4.
Read More...



9Huawei to double staff in European expansion


HELSINKI (Reuters) - Chinese telecoms equipment maker Huawei Technologies plans a hiring spree in Europe, seeking growth outside the United States where its prospects have been clouded by spying concerns. Huawei said on Monday it planned to double its workforce in Europe and would set up a research center to develop new smartphones in Finland, where former global leader Nokia Oyj is shedding thousands of workers. "Europe has proven to be quite an open business environment for Huawei," company spokesman Roland Sladek said. The expansion plans for Europe come two months since a U.S.
Read More...


10Pa. woman sues Google over Gmail privacy, ads

A Pennsylvania woman has accused Google Inc. of illegal wiretapping for "intercepting" emails she sent to Gmail accounts and publishing content-related ads.Her lawsuit echoes others filed around.
Read More...
11Apple's ranking in China smartphone market falls to No.6: IDC


HONG KONG (Reuters) - Apple Inc's rank in China's smartphone market, which is set to become the world's largest this year, fell to No.6 in the third quarter as it faced tough competition from Chinese brands, research firm IDC said on Thursday. IDC's announcement comes a day after Apple's shares fell more than 6 percent on the Nasdaq, logging its biggest single-day loss in four years and losing $35 billion of its value, on concerns about rivals gaining ground in the mobile devices market.
Read More...


12UN telecoms talks in Dubai hit by apparent hackers

Organizers of a U.N. conference on global telecommunications say hackers apparently blocked one of its main websites and caused disruptions in the talks that some critics fear could lead to greater controls over the Internet.
Read More...


13Cyber criminals could increasingly look to attack, hijack smartphones in 2013

TORONTO - Some cyber criminals who disseminate viruses and malware in attempts to hijack computers are beginning to shift their focus.
Read More...


14New net rules would hit digital economy: diplomat

DUBAI (Reuters) - Inter-governmental regulation of the Internet could deter investment, raise costs for consumers and hinder online access, a U.S. diplomat said on Wednesday. The United States has been leading efforts to stop a United Nations body from extending its authority into cyberspace. U.S. Ambassador Terry Kramer reiterated his country's "hands off" message at a summit hosted by the International Telecommunication Union that could decide the future of the Internet, at present largely unregulated at a global level.
Read More...


15Foreign hackers targeted former military chief Mullen: report


WASHINGTON (Reuters) - Foreign hackers targeted the computers of Mike Mullen, ex-chairman of the Joint Chiefs of Staff, the Wall Street Journal reported on Wednesday, calling it the latest in a pattern of attacks on computers of former high-ranking U.S. officials. The FBI is pursuing the hackers, the Journal reported. The agency was not immediately available for comment. Mullen's office confirmed that the retired admiral was cooperating with a cyber investigation.
Read More...



16Recent hacking of U.N. nuclear agency not first attempt: IAEA

WASHINGTON (Reuters) - A recently announced hacking of the U.N. nuclear agency's computer servers was not the first time an attempt had been made to break into the organization's computer system, the head of the agency said on Thursday. Yukiya Amano, director general of the International Atomic Energy Agency, said that a few months ago a group broke into the agency's computer system and stole personal information of scientists working on peaceful uses of nuclear energy.
Read More...



17Apple hires ex-Microsoft hacker to beef up operating system security


When Apple (AAPL) needs talent, it knows exactly where to look first: the sea of hackers. Kristin Paget, a former Microsoft (MSFT) hacker now officially works for Apple, reports Wired. Paget, now a core operating system security researcher at Apple, was once responsible for discovering bugs in Windows Vista before Microsoft shipped it in 2007. Paget helped prevent “a lot of bugs from shipping on Vista” and we kid you not, was awarded with a T-shirt signed by Microsoft Vice President of Windows Development Brian Valentine that read: “I delayed Windows Vista.” Wired writes Paget’s Vista bugs literally saved the OS from being a complete disaster. As Macs become more popular, the once “virus-free” computers are becoming more and more vulnerable to attacks.
Read More...

18Hackers said to hit UN telecoms talks in Dubai

Organizers of a U.N. conference on global telecommunications said Thursday that hackers apparently blocked their website and disrupted the talks, a gathering some critics fear could lead to greater controls over the Internet.
Read More...


19UK student convicted of denial of service attack

A London jury convicted a 22-year-old student and member of the hacking group Anonymous on Thursday of taking part in cyberattacks on several major companies' computer systems.Self-described "hacktivist".
Read More...


20UK jury convicts member of activist group Anonymous in computer denial-of-service attack

LONDON - A London jury convicted a 22-year-old student and member of the hacking group Anonymous on Thursday of taking part in cyberattacks on several major companies' computer systems.
Read More...


21New Full HD phablets from Samsung, Sony, LG and more to launch in early 2013


There’s no escape… supersized smartphones are here to stay. Following the lead set by HTC’s (2498) DROID DNA, Samsung (005930), Sony Mobile (SNY), LG (066570), Huawei and ZTE are all set to launch new Full HD Android-powered smartphones in the first half of 2013, according to a new report. Digitimes on Thursday cited multiple unnamed industry sources when making the claim, and the site says each new handset will feature a 5-inch display with 1080p Full HD resolution just like HTC’s latest DROID phone. Samsung and LG will use in-house panels according to the report, while Sony will use display panels from its joint venture JDI.
Read More...

22Selling flak jackets in the cyberwars


SAN FRANCISCO (Reuters) - When the Israeli army and Hamas trade virtual blows in cyberspace, or when hacker groups like Anonymous rise from the digital ether, or when WikiLeaks dumps a trove of classified documents, some see a lawless Internet. But Matthew Prince, chief executive at CloudFlare, a little-known Internet start-up that serves some of the Web's most controversial characters, sees a business opportunity.
Read More...


23Samsung Galaxy Note III with 6.3-inch display rumored for 2013 launch


Ridiculous sizes aside, oversized smartphones (“phablets”) that border on tablet territory are here to stay. By next year, the crop of smartphones with 5-inch displays will seem tiny compared to phablets with 6-inch+ screens. According to The Korea Times, Samsung (005930) is reportedly planning to launch the Galaxy Note III with a 6.3-inch OLED display in 2013. By comparison, the current Galaxy Note II has 5.5-inch display. Huawei also (002502) confirmed last week it will release a Galaxy Note II competitor with a 6.1-inch screen. Having pioneered the “phablet” category, Samsung might see no problem with consumers adjusting to even bigger smartphones. It sounds silly to imagine people carrying smartphones with 6-inch displays, but then again, many people thought “phablets” would be rejected by consumers for their large.
Read More...

24FBI arresta a 10 ciberdelincuentes; hay un peruano

Diez personas, entre ellos por lo menos una persona de Perú, fueron arrestadas como parte de una investigación sobre redes internacionales de delitos en internet que robaban información sobre tarjetas de crédito, cuentas bancarias y otras a millones de personas, informó el miércoles el FBI.
Read More...


25Foxconn International chairman to retire from January 1

HONG KONG (Reuters) - Foxconn International Holdings Ltd (FIH), the world's biggest contract maker of cellphones, has replaced its chairman just months after appointing a new CEO at the loss-making company. FIH has seen its shares and financial results languish over the past few years as key clients such as Nokia Oyj suffered from weak orders. Unlike its parent, Foxconn Technology Group's flagship unit Hon Hai Precision Industry, FIH does not assemble Apple's iPhones, iPads and iPods.
Read More...


26PUC approves writing rules for smart meter opt-out

The Public Utility Commission has decided to develop a set of rules so consumers can opt out of the smart meters installed in millions of Texas homes and businesses.Consumers have opposed the new meters,.
Read More...


27Internet regulation seen at national level as treaty talks fail

SAN FRANCISCO (Reuters) - The world's major Internet companies, backed by U.S. policymakers, got much of what they wanted last week when many nations refused to sign a global telecommunications treaty that opponents feared could lead to greater government control over online content and communications. In rejecting even mild Internet language in the updated International Telecommunications Union treaty and persuading dozens of other countries to refuse their signatures, the U.S. made a powerful statement in support of the open Internet, U.S. officials and industry leaders said.
Read More...


2818 million Android devices could get whacked with malware in 2013

One security firm on Thursday claimed that 2013 will be the year of mobile malware for Android users, however no specific numbers had been given. The team at Lookout Mobile Security has painted a similar picture for Google’s (GOOG) operating system. The firm notes that more than 1.2 billion mobile devices are expected to be purchased in 2013 and in the following year users are forecasted to download over 70 billion mobile apps. Due to Android’s popularity, it is estimated that 18 million devices running the operating system may encounter some form of mobile malware. The likelihood that users will encounter malware or spyware, however, is heavily dependent on geographical location and behavior. Research from the security firm reveals that users.
Read More...


29Samsung Smart TVs: The next frontier for data theft and hacking [video]

Smart TVs, particularly Samsung’s (005930) last few generations of flat screens, can be hacked to give attackers remote access according to a security startup called ReVuln. The company says it discovered a “zero-day exploit” that hackers could potentially use to perform malicious activities that range from stealing accounts linked through apps to using built-in webcams and microphones to spy on unsuspecting couch potatoes. Don’t panic just yet, though. In order for the exploit to be activated, a hacker needs to plug a USB drive loaded with malicious software into the actual TV to bypass the Linux-based OS/firmware on Samsung’s Smart TVs. But, if a hacker were to pull that off, every piece of data stored on a Smart TV could theoretically be retrieved.
Read More...


3092K Missourians affected by insurance data breach

State officials say the personal information of more than 92,000 Missourians was accessed by potential identity thieves who hacked the computer systems of Nationwide Insurance, which also does business .
Read More...


31Meeting delay a sign of cooling US-Vietnam ties


The U.S. and Vietnam, former enemies who share concerns about China's rise, are finding that one issue — human rights — is keeping them from becoming closer friends.
Read More...


32Court OKs sale of U.S. government-backed A123 to Chinese firm

WILMINGTON, Delaware (Reuters) - China's largest auto parts maker got court approval on Tuesday for its controversial purchase of A123 Systems Inc, a bankrupt maker of electric car batteries, but the judge said he was troubled that a U.S. rival might be working to kill the deal. A123, which was partly funded with U.S. government money, was sold at an auction on Saturday for $256.6 million to Wanxiang Group of China, which outbid Johnson Controls Inc of Milwaukee. The auction result prompted outcry from U.S.
Read More...


33Nexen chief executive says CNOOC deal not yet done


CALGARY, Alberta (Reuters) - The $15.1 billion takeover of Canadian oil and gas producer Nexen Inc by China's state-owned CNOOC Ltd is not yet wrapped up despite the Canadian government's blessing after months of heated debate, Nexen's chief executive said on Monday. "We are nowhere near done," Nexen interim CEO Kevin Reinhart told Reuters as he left a business conference about economic ties between Canada and Asia. He declined to give his reaction to Ottawa's decision on Friday to approve the deal, saying it was too early.
Read More...


34Russia backs down on proposals to regulate the Internet


Customers use computers at an internet cafe in Sao PauloDUBAI (Reuters) - A Russia-led coalition on Monday withdrew a proposal to give governments new powers over the Internet, a plan opposed by Western countries in talks on a new global telecom treaty. Negotiations on the treaty mark the most sustained effort so far by governments from around the world to agree on how - or whether - to regulate cyberspace. The United States, Europe, Canada and other advocates of a hands-off approach to Internet regulation want to limit the new treaty's scope to telecom companies.
Read More...

35Editorial: If Barrett Brown's Guilty, Then So Am I


Dallas writer Barrett Brown, who was involved with the "hacktivist" movement Anonymous until earlier this year, was indicted last Tuesday (Dec. 4) on 12 counts related to possession of stolen credit-card numbers.
Read More...


362013 dubbed ‘the year of mobile malware’ for Android users


The old phrase often credited to the late P.T. Barnum, “there’s a sucker born every minute,” can definitely be used to describe some aspects of the mobile industry. As smartphone and tablet adoption continues to increase, hackers and scammers are finding new ways to take advantage of unsuspecting consumers. Things aren’t expect to slow down, security firm BitDefender predicts malware will become so prevalent in 2013 that it has dubbed it “the year of mobile malware.” The firm notes that the number of Android devices infected with malware increased by 41% in the second half of 2012 with individual malware reports increased 75%. In fact, 94.35% of unique malware samples in 2012 were found to be Android trojans. BitDefender chief security strategist Catalin Cosoi believes.
Read More...


3710 arrested in international cybercrime ring

Ten people have been arrested as part of an investigation into international cybercrime rings that steal millions of computer users' credit card, bank account and other personal information, the FBI said.
Read More...


38As China handset makers upgrade chips, pressure remains on profit margins


HONG KONG (Reuters) - Chinese mobile phone makers chasing market share with lower prices in the world's biggest smartphone market will see their margins continue to be pressured as they upgrade to quad-core chips to satisfy demand from users for faster speeds and flashier graphics. Most smartphones now are equipped with single and dual-core chips, but Chinese handset makers are planning quad-core powered devices as consumers get more picky with the speed of screen swipes, how fast they can download movies, send a photo via WeChat messaging or seal a purchase on Taobao online mall.
Read More...

39Google explains cause of massive Gmail, Chrome outages


Users took to social networks on Monday to vent their displeasure with Google (GOOG) following a 40-minute disruption of service affecting the company’s Chrome Web browser and Gmail service. It was previously unclear what caused the services to simultaneously crash and some suspected the company was hit with a denial-of-service attack. Google engineer Tim Steele took to the company’s developer forums to clear up the confusion and confirmed what some developers had already suspected: The reason for the crash had to do with the Google Sync servers getting overwhelmed following a change in the code, not a DDoS attack. “It’s due to a backend service that sync servers depend on becoming overwhelmed, and sync servers responding to that by telling.
Read More...


40Facebook helps FBI bust cybercriminals blamed for $850 million losses

SAN FRANCISCO (Reuters) - Investigators led by the Federal Bureau of Investigation and aided by Facebook Inc, have busted an international criminal ring that infected 11 million computers around the world and caused more than $850 million in total losses in one of the largest cybercrime hauls in history. The FBI, working in concert with the world's largest social network and several international law enforcement agencies, arrested 10 people it says infected computers with "Yahos" malicious software, then stole credit card, bank and other personal information.
Read More...


 

Dashboard

 

  Current Threat Level is Green Virtualization News Wireless News Whitepapers  
  Computer News
 

Become a Information Security Professional with EC-Council Training Certification Programs