Microsoft Word Zero-Day Used In Targeted Attacks

wiredmikey (1824622) writes “Microsoft warned on Monday of a remote code execution vulnerability (CVE-2014-1761) in Microsoft Word 2010 that is being actively exploited in targeted attacks. If successfully exploited, an attacker could gain the same user rights as the current user, Microsoft said, noting that users whose accounts are configured to have fewer user rights on the system could be less impacted than accounts with administrative privileges. ‘The vulnerability could allow remote code execution if a user opens a specially crafted RTF file using an affected version of Microsoft Word, or previews or opens a specially crafted RTF email message in Microsoft Outlook while using Microsoft Word as the email viewer, ‘ Microsoft explained Microsoft did not share any details on the attacks that leveraged the vulnerability, but did credit Drew Hintz, Shane Huntley, and Matty Pellegrino of the Google Security Team for reporting it to Microsoft.” Read more of this story at Slashdot.

See original article:
Microsoft Word Zero-Day Used In Targeted Attacks

Tor Is Building an Anonymous Instant Messenger

An anonymous reader writes in with news about a new anonymous instant messenger client on the way from Tor. “Forget the $16 billion romance between Facebook and WhatsApp. There’s a new messaging tool worth watching. Tor, the team behind the world’s leading online anonymity service, is developing a new anonymous instant messenger client, according to documents produced at the Tor 2014 Winter Developers Meeting in Reykjavik, Iceland.” Read more of this story at Slashdot.

Read More:
Tor Is Building an Anonymous Instant Messenger

The Phone Dragnet That Caught the World’s Top Drug Lord

Daniel_Stuckey writes “The contacts on Zambada-Ortiz’s phone, which officials seized, would prove critical in pinpointing cartel stash houses strewn across Sinaloa state in mountainous northwest Mexico. Crucially, the episode would breathe new life into the joint US-Mexico dragnet that recently caught Chapo, who’d been at large for 13 years after famously escaping from Mexican prison in a laundry basket. Zambada-Ortiz’s capture and the data scraped from his phone led to more and more Sinaloa phones until a month ago, when Mexican authorities (moving on American intelligence work) successfully carried out a number of raids that scored a cache of weapons and the arrests of a few of Chapo’s senior henchmen. With each apprehension came another phone full of leads, ‘a new trove of information for officials to mine, ‘ as TIME reported. Then, sometime last week, Mexican commandos ‘traced a number stored in a seized cell phone to a stash house outside the provincial capital of Culiacan, where they believed Guzman was hiding, ‘ TIME added.” Read more of this story at Slashdot.

View the original here:
The Phone Dragnet That Caught the World’s Top Drug Lord

This Insane Six-Axis 3D Printer Even Works On Curved Surfaces

Still upset about breaking the handle on your favorite mug? A 3D printer can make it as good as new, and thanks to researchers at the University of Southern California, the process is even easier now since they’ve developed a printer that can build directly on curved surfaces. Read more…        

Read this article:
This Insane Six-Axis 3D Printer Even Works On Curved Surfaces

More than 360,000 Apache websites imperiled by critical Plesk vulnerability

Wikimedia Hundreds of thousands of websites could be endangered by publicly available attack code exploiting a critical vulnerability in the Plesk control panel . This particular vulnerability gives hackers control of the server it runs on according to security researchers. The code-execution vulnerability affects default versions 8.6, 9.0, 9.2, 9.3, and 9.5.4 of Plesk running on the Linux and FreeBSD operating systems, a configuration used by more than 360,000 websites . Plesk running on Windows and other types of Unix haven’t been tested to see if those configurations are vulnerable as well. The exploit code was released Wednesday on the Full-Disclosure mailing list by “kingcope,” a pseudonymous security researcher who has frequented the forum for years. He has a proven track record for developing reliable exploits. “This vulnerability has a high severity rating,” kingcope wrote in an e-mail to Ars. “An attacker can use this exploit to get a command line shell remotely with the privileges of the configured Apache user.” Read 7 remaining paragraphs | Comments

See more here:
More than 360,000 Apache websites imperiled by critical Plesk vulnerability

Version 2.0 Released For Open Skype Alternative Jitsi

New submitter emilcho writes with news for anyone looking for a Free alternative to Skype “Among the most prominent new features people will find quality multi-party video conferences for XMPP, audio device hot-plugging, support for Outlook presence and calls, an overhauled user interface and support for the Opus and VP8 audio/video codec. Jitsi has lately shaped into one of the more viable open Skype Alternatives with features such as end-to-end ZRTP encryption for audio and video calls. The 2.0 version has been in the works for almost a year now, so this is an important step for the project” There are prebuilt packages from Debian, Ubuntu, Arch, Fedora, Windows, and OS X. Read more of this story at Slashdot.

See more here:
Version 2.0 Released For Open Skype Alternative Jitsi