Story H1EZ Some PDFs from Blackhat 2015 Similar

Story

Some PDFs from Blackhat 2015

Similar News

Security researchers hack a car and apply the brakes via text
Vulnerability revealed in diagnostic dongles used for vehicle tracking and insurance that lets them take control using just an SMSResearchers have hacked a car, remotely activated its windscreen wipers, applied its brakes and even disabled them, all via simple text messages.
IoT security is RUBBISH says IoT vendor collective
Online Trust Alliance calls on gadget vendors to stop acting like clowns A vendor group whose membership includes Microsoft, Symantec, Verisign, ADT and TRUSTe reckons the Internet of Things (IoT) market is being pushed with no regard to either security or consumer privacy.…
LXer: Linux Concerns: Convenience vs. Security
Published at LXer: Ask why you should use Linux, and inevitably someone will claim that it is more secure than Windows, and doesn't need anti-virus protection, either. Read More......
Security experts warn against using fingerprints as passwords
Ever since Apple introduced TouchID for iPhones, more and more smartphones feature fingerprint scanners. And that has some security researchers worried.
LXer: Intel left a fascinating security flaw in its chips for 16 years -- here's how to exploit it
Published at LXer: A design flaw in Intel's processors can be exploited to install malware beneath operating systems and antivirus – making it tough to detect and remove.… Read More......
Mounted police to patrol Spain's Camino de Santiago amid security fears
Team of Guardia Civil officers to provide escort for walkers on ancient route to cathedral after reports of harassment and disappearance of American pilgrimFor hundreds of years, pilgrims have trekked along Spain’s Camino de Santiago to the cathedral at Santiago de Compostela, believed to be the final resting place of St James.But this year, pilgrims and hikers have a police escort for part of the way, with a team of five Guardia Civil police officers on horseback covering up to 18 miles a day of the ancient Catholic pilgrimage. Continue reading...
Complete failure of Oracle security response (2005)
Comments
Security updates for Tuesday
Arch Linux has updated ppp (denial of service).Debian has updated subversion (two vulnerabilities).Debian-LTS has updated opensaml2 (denial of service).Fedora has updated elasticsearch(F22: multiple vulnerabilities), lxc (F22; F21: twovulnerabilities), and rubygems (F22: DNS hijacking).
HP grabs global senior veep Barsamian to run security biz
Location of current incumbent unknown... Anyone seen Art Gilliland lately? HP has called on channel sales veteran Sue Barsamian to take charge of the enterprise security products unit in the software division amid the breakup of the corporation.…
Oracle security chief to customers: Stop checking our code for vulnerabilities
"Stop reverse engineering our code, already.”
Pwnie Awards 2015: Oscars der Security-Szene verliehen
Keine Black Hat ohne Pwnies. Eine Jury bestehend aus renommierten Sicherheitsexperten hat die begehrte Auszeichnung für die spektakulärsten Schwachstellen und Datenleaks vergeben. Auch der beste Song wurde freilich wieder gekürt.
Brit-educated bloke takes Dept of Homeland Security's infosec reins
Cambridge graduate Andy Ozment teams up with one-time HP gros fromage The US Department of Homeland Security (DHS) has appointed Andy Ozment, currently the Assistant Secretary of the Office of Cybersecurity and Communications – the DHS's main processing center for threat information sharing – as leader of its cybersecurity centre.…
Intel left a fascinating security flaw in its chips for 16 years – here's how to exploit it
Howler opens door for SMM rootkits Black Hat In-Depth A design flaw in Intel's processors can be exploited to install malware beneath operating systems and antivirus – making it tough to detect and remove.…
DataGravity Focuses On Security In Latest Release
DataGravity announced version 2.0 of its storage appliance today, one that focuses on data security, particularly knowing what files you have and who’s been accessing them.When DataGravity emerged last summer with a new concept of data aware storage, it announced a number of key features, but it found that “customers were gravitating most around security at the point of… Read More
LXer: Android Certifi-Gate remote access security hole exploited
Published at LXer: A security hole in Android's remote support tool is being exploited in the wild. Read More......
The Anatomy of a Cyber Security Assessment
Design NewsBy Rob SpeigelOver the last five years, the DuPont Co. has regularly monitored all aspects of the security of its Sabine River Works plant on the Gulf Coast of Texas. The plant produces ethylene copolymers used in plastic packaging. The monitoring process began with a full security assessment. The assessment focused heavily – though not exclusively – on cyber threats.
Psychology group bans members from harsh national security interrogations
Psychologists' involvement in interrogations aided US assertions torture was legal.
Another day, another stunning security flaw in Android – this time hitting 55% of mobes
Bug allows ordinary apps to gain control of gadgets Video Fresh from sorting out the Stagefright flaw, Google has another serious security vulnerability in Android on its hands.…
Chinese hack of US national security details revealed days after Russian hack
Government sources tell NBC News that Chinese attack targeted personal emails of ‘all top national security’ officials just days after Pentagon hackThe ongoing saga of successful foreign hack attacks on government databases continued Monday with news of another break-in allegedly perpetrated by China.Just days after the reported spear-phishing attack on the Pentagon’s joint staff email system, which exposed some 4,000 civilian and military employees and is believed to have been sponsored by Russia, anonymous government sources told NBC News that a separate set of Chinese hack attacks targeted the personal emails of “all top national security and trade officials”. Continue reading...
Researchers point fingers at Android phones' fingerprint security
Researchers from FireEye Labs have unearthed multiple vulnerabilities in the fingerprint scanner implementations of several Android handsets. The group's research paper was presented at the Black Hat conference last week, and it describes several vulnerabilities, some of which had the potential to allow for remote background collection of fingerprints. We say "had," because it should be noted that all of the companies mentioned have patched the issues presented in the paper. Other, non-manufacturer-specific vulnerabilities could still be exploited.Android's fingerprint authentication framework originally provided only weak security. Fingerprint data was only as secure as the kernel iself—an attacker who manages to gain root access to the device can read fingerprints. Companies are starting to use ARM's TrustZone functionality , ...Read more...
LXer: Security is weakened because random numbers are not random enough
Published at LXer: The entropy of data generated by Linux servers -- which are the backbone of much of the internet -- is, says security expert Bruce Potter, too low... Potter warns that the low...
Security advisories for Monday
CentOS has updated firefox (C7; C6; C5: information leak).Debian has updated activemq(denial of service) and opensaml2 (problemwith previous update).Debian-LTS has updated xmltooling (denial of service).Fedora has updated community-mysql (F22; F21: unspecified vulnerabilities) and firefox (F22; F21: information leak).Mageia has updated cacti (MG4,5:multiple vulnerabilities), firefox (MG4,5:information leak), ghostscript (MG4,5:buffer overflow), libunwind (MG4,5: bufferoverflow), lxc (MG5: two vulnerabilities),and wordpress (MG4: multiple vulnerabilities).Oracle has updated firefox (OL7; OL6; OL5: information leak).Red Hat has updated firefox(RHEL5,6,7: information leak).Scientific Linux has updated firefox (SL5,6,7: information leak).Slackware has updated firefox(information leak) and nss (information leak).
Mapping Israel’s Cyber-Security Startups
While many CISOs and corporate executives are familiar with Israeli cyber talent owing to Check Point, Imperva, CyberArk and other notable security success stories, the sheer scope of Israeli startup activity in the cyber sector is staggering. Read More
Facebook: Please fix this security loophole before its too late
Comments
TOFU, Keybase, and Other Vegan Security Choices
Comments
Biometric Security: From Selfies To Walking Gaits
The payments industry, facing the risk of increasingly sophisticated cyber-attacks and various types of credit card fraud, has begun incorporating various types of biometric technology to enhance security and prevent breaches. As recently reported, MasterCard is launching a facial recognition payment service based on “selfies” taken on a smartphone. Read More
Mobile Nations Weekly: Security, Xbox, a new BlackBerry, and more security
Welcome to Mobile Nations Weekly, a look back at the important stories of the week in mobile tech and mobile life. The week that was brought us news, rumors, speculation, fear mongering, and opinion valid and not from all across the mobile space. On the Android front they're dealing with the Stagefright compromise and the rapid response of manufacturers to patch the exploit as well as checking out the awesome-at-twice-the-price Moto G 2015 for under $200. BlackBerry launched their new BlackBerry Passport Silver Edition and saw another leak of the Android-powered Venice slider.
Security News This Week: The Pentagon Got Hacked While You Were at Def Con
The security world doesn’t stop for Def Con, so here’s the big news that happened in the rest of the world. The post Security News This Week: The Pentagon Got Hacked While You Were at Def Con appeared first on WIRED.
PortSwigger Web Security Blog: Server-Side Template Injection
Comments
Hacking For Cause: Today’s Growing Cyber Security Trend
What do the following data-breach headlines from the past year have in common? The Sony Pictures hack: Everything we know so far; Anonymous hackers release emails ordering bear cubs be killed; Hackers threaten to release names from adultery website … Connecting the dots yet? Read More
Mint and Security Updates
Noob question here, as I am just learning about Linux distros)... Is it still the case (and, if so, is it expected to stay the case) that Mint has no security features? If so, can something like...
The people who hold the keys to worldwide Internet security
Comments
Mall security guards have never needed EpiPens in Hamilton pilot project
The city is nearly one year into its pilot project to have food allergy injectors in local malls — but so far, no one has needed it.
Ask HN: Best resources on webapp security?
Comments
Hardening, auditing, host security and network security on Slackware systems
What I would like to accomplish is: 1. Learn how to audit for host based intrusions and audit for network based intrusions. 2. Get some advice on how to identify (and patch) vulnerable software on...
Some security through obscurity
I am tinkering with some security through obscurity. I use static IP addresses for all of my computers. I have an HP LaserJet 4200 with a network card. All devices are assigned an IP address below...
Bikers wearing ‘Hells Angels’ jackets force Harper’s team to beef up security
Stephen Harper’s security detail was forced to take extra precautions at the Conservative leader’s hotel after a group of bikers — some wearing full-patched Hells Angels jackets — rumbled into the parking lot Thursday.
Ontario cabinet minister sues Globe & Mail for stories raising security concerns
An Ontario cabinet minister has launched a defamation lawsuit against the Globe and Mail newspaper over articles that said Canadian intelligence agents had expressed concerns about his “unusually close ties” to Chinese officials.
Security updates for Friday
Arch Linux has updated firefox (information leak) and wordpress (multiple vulnerabilities).Debian has updated kernel (multiple vulnerabilities).Debian-LTS has updated openssh(two vulnerabilities) and remind (buffer overflow).Fedora has updated drupal6-cck (F22; F21:unspecified vulnerability), lighttpd (F22; F21: loginjection), mantis (F22; F21: information disclosure),opensaml-java (F22; F21: missing host name verification),opensaml-java-openws (F22; F21: missing host name verification), and openstack-swift (F22: arbitrary object deletion).Oracle has updated kernel 3.8.13 (OL7; OL6:information leak), kernel 2.6.39 (OL6; OL5: twovulnerabilities), and kernel 2.6.32 (OL6; OL5: two vulnerabilities).Ubuntu has updated firefox(15.04, 14.04, 12.04: information leak) and openjdk-6 (12.04: multiple vulnerabilities).
Certifi-gate is the latest Android security scandal
Today's high-level Android vulnerability is called Certifi-gate. As you might have guessed, it gets its name from an underlying problem with the way the operating system handles digital certificates in the context of remote support tools (RSTs). The vulnerability can let an attacker gain full control over a victim's device.Here's roughly how it goes. A bog-standard RST app will usually ask for a normal set of user permissions, but it also needs to install a plugin with elevated permissions so it can perform its tasks. While the RST is digitally signed by its ...Read more...
Ultra Electronics adds DNP3 to CyberFence security software
The capability dynamically inspects and validates all DNP3 communications, adding previously unavailable security to counter vulnerable pathways in the SCADA systems used by most water and electric utilities.
LG joins Samsung and Google by promising monthly security updates
Just like Samsung and Google, LG also plans to roll out security updates once a month directly to smartphones, in order to help prevent exploits like Stagefright from occurring again.
Apple pay $700,000 a year for Tim Cook's security
New figures buried in SEC filing, which also shows Apple chief executive gained the security team in 2014Tim Cook’s security expenses cost Apple almost $700,000 (£450,000) a year, according to new figures filed with America’s securities and exchange commission.The docs, discovered by news site Patently Apple buried in a SEC filing from March, count the security detail among the Apple executive’s benefits in kind. Under the heading “all other compensation”, the filing breaks down the figure of $774,176 for 2014. Continue reading...
Security Bilanz Deutschland: IT-Sicherheit des Mittelstands hat sich deutlich verschlechtert
Die Security Bilanz Deutschland erfasst jährlich bei mittelständischen Unternehmen die gefühlte Bedrohung der eigenen IT und die Zufriedenheit mit den eigenen Schutzvorkehrungen.
#BlackLivesMatter activists are monitored by U.S. Homeland Security and cybersecurity firms
In a Reddit AMA, activists DeRay McKesson, Johnetta Elzie and ACLU’s Nus Choudhury talked policing and police reform in America, and surveillance of activists. Read the rest
Should Software Companies Be Legally Liable For Security Breaches?
It’s a truism that all software has bugs and security holes. It’s another that license agreements invariably make software vendors immune to liability for damage or losses caused by such flaws. But, to my surprise, Black Hat’s founder and keynote speaker are arguing that software product liability, presumably mandated by governments, is inevitable. If they’re right,… Read More
Waiting for Android’s inevitable security Armageddon
Editorial: Android's update strategy doesn't scale, and that's recipe for disaster.
New security video gives clues to notorious Gardner museum art heist
Never-before-seen footage from the Isabella Stewart Gardner museum shows a possible dry run on 19 March 1990, the day before the robbery. The video could lead investigators closer to solving the heist of $500m worth of art
Jeremy Corbyn: put life security before nuclear weapons – video
Labour leadership candidate Jeremy Corbyn says that real security for a country is providing well for its citizens in terms of housing, education and employment, rather than spending a ‘phenomenal’ amount of money on weapons of mass destruction. Corbyn was speaking at a Campaign for Nuclear Disarmament event in London on Thursday to commemorate the 70th anniversary of the Hiroshima atomic bombing Continue reading...
Comparing the Security Practices of Experts and Non-Experts
https://www.schneier.com/blog/archives/2015/07/comparing_the_s_1.html https://www.usenix.org/system/files/conference/soups2015/soups15-paper-ion.pdf The main things that experts find important...
12345