Skip to main content

WordPress 4.5.3 fixes bug, Carbonite reset password after cyber-attack and 154 Million voter records exposed.

Security folks are always busy trying to protect our information from malicious users or criminal actors out there. Here's what's going for the last couple of days.

Carbonite online backup service resets all users passwords after cyber attack. The company said the attacking third-party didn't compromise any user accounts, mainly because its IT staff caught the attack in its early stages. To make sure nothing was stolen from people's backups, Carbonite has initiated a service-wide password reset.

Brute-force attacks and account hijacking to become more popular. Such types of attacks are known as ATO or Identity Testing Attacks, and according to security firm ThreatMatrix, they are becoming extremely popular. Source: Softpedia.com

WordPress 4.5.3 fixes bug that allowed password change via stolen cookies. The
WordPress.org team announced a new version of the WordPress CMS one that includes fixes for eight security bugs and 17 maintenance issues.

The most critical security flaw the project fixed is a bug that allowed attackers to change a user's password by leveraging stolen cookies. The WordPress security team's Michael Adams discovered this issue internally.

Browser cookies are easy to steal, and there is a lot of publicly available exploit code that can be packed as a simple XSS and steal a user's cookie file, for a specific site, or for all. Source: Softpedia.com

Hackers breach US company and unwittingly expose 154 million voter records. A CouchDB database holding 154 million voter records was left without protection after hackers breached its network and took down its firewall, The Daily Dot reports following an investigation by MacKeeper security researcher Chris Vickery.
Vickery discovered the database earlier this week, and with the help of a Daily Dot reporter, he managed to track it down to a company named L2, which builds, manages, and sells access to US voter records.

Hacker breaches company hosting details of 154 million US voters. When the two inquired about the unprotected database that was exposed online without being protected by a password, L2 said it belonged to one of their clients. Source: Softpedia.com

Happy safe browsing.
Source: KING.NET

Popular posts from this blog

Alternative Social Networks

If you are planning to create your social network e.g. similar to Facebook. Here's a short list of alternative software's:

Open Source and Free​
http://buddypress.org/ - Wordpress (Open Source and Free)http://elgg.org/ - (Open Source and Free)Commercial Social Networks software
http://www.socialengine.com/ ($299 Stand Alone, $29/mo Cloud)http://www.jomsocial.com/ (run with Joomla, need to know CMS)http://www.boonex.com/ (very expensive, $399 for Standard)http://www.anahitapolis.com/http://www.oxwall.org/http://sharetronix.com/http://www.moosocial.com/http://www.jcow.net/http://phpdolphin.comhttp://www.grou.ps (from free to Commercial, I left my networks and they are selling it http://www.phpfox.com/ (I used this before, it's hard to maintain. I moved to NING but left too after it was sold to another company)http://www.ning.com (I don't recommend using this service, it's hard to export your data when it's time to move)Something to check when selecting your next soc…

Example of Out of Office Reply for Terminated Employee

This is a sample message that I used for terminated employees, unless HR staff specified a different message.
=== Example for KING.NET Employee === John Doe (employee or consultant) is no longer with KING.NET effective June 1, 2008 (termination date). For matters relating to "Project Name here" please direct your concerns to John Smith at johnsmith@king.net (Manager or Supervisor). For all other matters, please direct your email to Mary Smith HR at marysmith@king.net.
Please call our main office 703-345-6789 if you have other concerns.
Thank you.
=== end of message ===

Frequent Account Lockout in Active Directory

I have a user in Windows Pro 7, and Windows Server 2003 environment that is frequently account locked out. I tried many different scenarios to resolve this account lockout issue, from resetting his password, changing a new password, remove and re-join the domain, rebooting the workstation and active directory servers.

I tried to use the command prompt utility to run "rundll32.exe keymgrdll, KRShowKeyMgr" (case sensitive) to delete the account in Windows 7 password cache, and still no luck.

Still searching for answer ... Let me know if you encounter a similar issue in Windows Pro 7 and Windows Server 2003.

Continue reading updated post here:
http://www.whaddya.com/2011/09/windows-needs-your-credentials.html