Vulnerability revealed in diagnostic dongles used for vehicle tracking and insurance that lets them take control using just an SMSResearchers have hacked a car, remotely activated its windscreen wipers, applied its brakes and even disabled them, all via simple text messages.
Online Trust Alliance calls on gadget vendors to stop acting like clowns A vendor group whose membership includes Microsoft, Symantec, Verisign, ADT and TRUSTe reckons the Internet of Things (IoT) market is being pushed with no regard to either security or consumer privacy.…
Published at LXer: Ask why you should use Linux, and inevitably someone will claim that it is more secure than Windows, and doesn't need anti-virus protection, either. Read More......
Ever since Apple introduced TouchID for iPhones, more and more smartphones feature fingerprint scanners. And that has some security researchers worried.
Published at LXer: A design flaw in Intel's processors can be exploited to install malware beneath operating systems and antivirus – making it tough to detect and remove.… Read More......
Team of Guardia Civil officers to provide escort for walkers on ancient route to cathedral after reports of harassment and disappearance of American pilgrimFor hundreds of years, pilgrims have trekked along Spain’s Camino de Santiago to the cathedral at Santiago de Compostela, believed to be the final resting place of St James.But this year, pilgrims and hikers have a police escort for part of the way, with a team of five Guardia Civil police officers on horseback covering up to 18 miles a day of the ancient Catholic pilgrimage. Continue reading...
Arch Linux has updated ppp (denial of service).Debian has updated subversion (two vulnerabilities).Debian-LTS has updated opensaml2 (denial of service).Fedora has updated elasticsearch(F22: multiple vulnerabilities), lxc (F22; F21: twovulnerabilities), and rubygems (F22: DNS hijacking).
Location of current incumbent unknown... Anyone seen Art Gilliland lately? HP has called on channel sales veteran Sue Barsamian to take charge of the enterprise security products unit in the software division amid the breakup of the corporation.…
Keine Black Hat ohne Pwnies. Eine Jury bestehend aus renommierten Sicherheitsexperten hat die begehrte Auszeichnung für die spektakulärsten Schwachstellen und Datenleaks vergeben. Auch der beste Song wurde freilich wieder gekürt.
Cambridge graduate Andy Ozment teams up with one-time HP gros fromage The US Department of Homeland Security (DHS) has appointed Andy Ozment, currently the Assistant Secretary of the Office of Cybersecurity and Communications – the DHS's main processing center for threat information sharing – as leader of its cybersecurity centre.…
Howler opens door for SMM rootkits Black Hat In-Depth A design flaw in Intel's processors can be exploited to install malware beneath operating systems and antivirus – making it tough to detect and remove.…
DataGravity announced version 2.0 of its storage appliance today, one that focuses on data security, particularly knowing what files you have and who’s been accessing them.When DataGravity emerged last summer with a new concept of data aware storage, it announced a number of key features, but it found that “customers were gravitating most around security at the point of… Read More
Design NewsBy Rob SpeigelOver the last five years, the DuPont Co. has regularly monitored all aspects of the security of its Sabine River Works plant on the Gulf Coast of Texas. The plant produces ethylene copolymers used in plastic packaging. The monitoring process began with a full security assessment. The assessment focused heavily – though not exclusively – on cyber threats.
Bug allows ordinary apps to gain control of gadgets Video Fresh from sorting out the Stagefright flaw, Google has another serious security vulnerability in Android on its hands.…
Government sources tell NBC News that Chinese attack targeted personal emails of ‘all top national security’ officials just days after Pentagon hackThe ongoing saga of successful foreign hack attacks on government databases continued Monday with news of another break-in allegedly perpetrated by China.Just days after the reported spear-phishing attack on the Pentagon’s joint staff email system, which exposed some 4,000 civilian and military employees and is believed to have been sponsored by Russia, anonymous government sources told NBC News that a separate set of Chinese hack attacks targeted the personal emails of “all top national security and trade officialsâ€. Continue reading...
Researchers from FireEye Labs have unearthed multiple vulnerabilities in the fingerprint scanner implementations of several Android handsets. The group's research paper was presented at the Black Hat conference last week, and it describes several vulnerabilities, some of which had the potential to allow for remote background collection of fingerprints. We say "had," because it should be noted that all of the companies mentioned have patched the issues presented in the paper. Other, non-manufacturer-specific vulnerabilities could still be exploited.Android's fingerprint authentication framework originally provided only weak security. Fingerprint data was only as secure as the kernel iself—an attacker who manages to gain root access to the device can read fingerprints. Companies are starting to use ARM's TrustZone functionality , ...Read more...
Published at LXer: The entropy of data generated by Linux servers -- which are the backbone of much of the internet -- is, says security expert Bruce Potter, too low... Potter warns that the low...
CentOS has updated firefox (C7; C6; C5: information leak).Debian has updated activemq(denial of service) and opensaml2 (problemwith previous update).Debian-LTS has updated xmltooling (denial of service).Fedora has updated community-mysql (F22; F21: unspecified vulnerabilities) and firefox (F22; F21: information leak).Mageia has updated cacti (MG4,5:multiple vulnerabilities), firefox (MG4,5:information leak), ghostscript (MG4,5:buffer overflow), libunwind (MG4,5: bufferoverflow), lxc (MG5: two vulnerabilities),and wordpress (MG4: multiple vulnerabilities).Oracle has updated firefox (OL7; OL6; OL5: information leak).Red Hat has updated firefox(RHEL5,6,7: information leak).Scientific Linux has updated firefox (SL5,6,7: information leak).Slackware has updated firefox(information leak) and nss (information leak).
While many CISOs and corporate executives are familiar with Israeli cyber talent owing to Check Point, Imperva, CyberArk and other notable security success stories, the sheer scope of Israeli startup activity in the cyber sector is staggering. Read More
The payments industry, facing the risk of increasingly sophisticated cyber-attacks and various types of credit card fraud, has begun incorporating various types of biometric technology to enhance security and prevent breaches. As recently reported, MasterCard is launching a facial recognition payment service based on “selfies†taken on a smartphone. Read More
Welcome to Mobile Nations Weekly, a look back at the important stories of the week in mobile tech and mobile life. The week that was brought us news, rumors, speculation, fear mongering, and opinion valid and not from all across the mobile space. On the Android front they're dealing with the Stagefright compromise and the rapid response of manufacturers to patch the exploit as well as checking out the awesome-at-twice-the-price Moto G 2015 for under $200. BlackBerry launched their new BlackBerry Passport Silver Edition and saw another leak of the Android-powered Venice slider.
The security world doesn’t stop for Def Con, so here’s the big news that happened in the rest of the world. The post Security News This Week: The Pentagon Got Hacked While You Were at Def Con appeared first on WIRED.
What do the following data-breach headlines from the past year have in common? The Sony Pictures hack: Everything we know so far; Anonymous hackers release emails ordering bear cubs be killed; Hackers threaten to release names from adultery website … Connecting the dots yet? Read More
Noob question here, as I am just learning about Linux distros)... Is it still the case (and, if so, is it expected to stay the case) that Mint has no security features? If so, can something like...
What I would like to accomplish is: 1. Learn how to audit for host based intrusions and audit for network based intrusions. 2. Get some advice on how to identify (and patch) vulnerable software on...
I am tinkering with some security through obscurity. I use static IP addresses for all of my computers. I have an HP LaserJet 4200 with a network card. All devices are assigned an IP address below...
Stephen Harper’s security detail was forced to take extra precautions at the Conservative leader’s hotel after a group of bikers — some wearing full-patched Hells Angels jackets — rumbled into the parking lot Thursday.
An Ontario cabinet minister has launched a defamation lawsuit against the Globe and Mail newspaper over articles that said Canadian intelligence agents had expressed concerns about his “unusually close ties†to Chinese officials.
Today's high-level Android vulnerability is called Certifi-gate. As you might have guessed, it gets its name from an underlying problem with the way the operating system handles digital certificates in the context of remote support tools (RSTs). The vulnerability can let an attacker gain full control over a victim's device.Here's roughly how it goes. A bog-standard RST app will usually ask for a normal set of user permissions, but it also needs to install a plugin with elevated permissions so it can perform its tasks. While the RST is digitally signed by its ...Read more...
The capability dynamically inspects and validates all DNP3 communications, adding previously unavailable security to counter vulnerable pathways in the SCADA systems used by most water and electric utilities.
Just like Samsung and Google, LG also plans to roll out security updates once a month directly to smartphones, in order to help prevent exploits like Stagefright from occurring again.
New figures buried in SEC filing, which also shows Apple chief executive gained the security team in 2014Tim Cook’s security expenses cost Apple almost $700,000 (£450,000) a year, according to new figures filed with America’s securities and exchange commission.The docs, discovered by news site Patently Apple buried in a SEC filing from March, count the security detail among the Apple executive’s benefits in kind. Under the heading “all other compensationâ€, the filing breaks down the figure of $774,176 for 2014. Continue reading...
Die Security Bilanz Deutschland erfasst jährlich bei mittelständischen Unternehmen die gefühlte Bedrohung der eigenen IT und die Zufriedenheit mit den eigenen Schutzvorkehrungen.
In a Reddit AMA, activists DeRay McKesson, Johnetta Elzie and ACLU’s Nus Choudhury talked policing and police reform in America, and surveillance of activists. Read the rest
It’s a truism that all software has bugs and security holes. It’s another that license agreements invariably make software vendors immune to liability for damage or losses caused by such flaws. But, to my surprise, Black Hat’s founder and keynote speaker are arguing that software product liability, presumably mandated by governments, is inevitable. If they’re right,… Read More
Never-before-seen footage from the Isabella Stewart Gardner museum shows a possible dry run on 19 March 1990, the day before the robbery. The video could lead investigators closer to solving the heist of $500m worth of art
Labour leadership candidate Jeremy Corbyn says that real security for a country is providing well for its citizens in terms of housing, education and employment, rather than spending a ‘phenomenal’ amount of money on weapons of mass destruction. Corbyn was speaking at a Campaign for Nuclear Disarmament event in London on Thursday to commemorate the 70th anniversary of the Hiroshima atomic bombing Continue reading...
https://www.schneier.com/blog/archives/2015/07/comparing_the_s_1.html https://www.usenix.org/system/files/conference/soups2015/soups15-paper-ion.pdf The main things that experts find important...