Story H1EZ Some PDFs from Blackhat 2015 Similar

Story

Some PDFs from Blackhat 2015

Similar News

Google creates Android Security Updates Google Group for more transparency
One of the big takeaways from the recent Black Hat security conference was Google announcing plans to issue monthly security updates, and that it would strive to keep us all better informed. Lead engineer for Android security at Google Adrian Ludwig has announced a big step in the right direction with the creation of the Android Security Updates Google Group. The focus of the group is to provide more information about security issues and bulletins, and the first post details exactly what's in the current update for Nexus devices.
Docker 1.8 Improves Container Security With Content Trust
The open-source container technology now benefits from technology that can digitally sign and verify application containers.
LXer: Docker 1.8 Improves Container Security With Content Trust
Published at LXer: The open-source container technology now benefits from technology that can digitally sign and verify application containers. Read More......
SourceDNA (YC S15) finds hidden security and quality flaws in apps
Comments
Study shows gaps in food security and access in Brant widening
A new study on food security and access shows many Brantford and Brant households struggle with not having enough to eat and challenges accessing food. In 2012 and 2014, respectively, 1,247 and 792 Brant residents aged 18 and over participated in th
Dropbox Adds Support For U2F Security Keys
Dropbox today announced that it will now support security keys.Security keys are physical USB dongles from companies like YubiCo that allow you to bypass the traditional app- and text message-based two-factor authentication schemes with their six-digit codes by simply plugging the key into your computer. Read More
Dropbox adds support for USB security keys when using Chrome
Dropbox has announced that it will now offer support for USB security keys for logging in via the service's website. Dropbox already supports two-factor authentication for its site and apps sending one-time codes either through SMS or authenticator apps. USB keys, also known as Universal 2nd Factor or U2F, add a new, physical dimension to securing your Dropbox account.
Hilariously terrifying talk about security
In Not Even Close: The State of Computer Security, a talk given at the Norwegian Deveopers' Conference, Microsoft Research's James Mickens gave the most acerbic, funny, terrifying security talk I can remember seeing (and I've seen a lot of 'em!). Read the rest
Security advisories for Wednesday
Arch Linux has updated firefox (multiple vulnerabilities).CentOS has updated firefox (C7; C6; C5: multiple vulnerabilities).Debian has updated gnutls28 (denial of service), iceweasel (multiple vulnerabilities), and wordpress (multiple vulnerabilities).Fedora has updated devscripts (F22; F21: twovulnerabilities), kernel (F22; F21: information leak), pure-ftpd (F22: denial of service), xen(F22; F21:code execution), and xfsprogs (F22:information disclosure from 2012).Mageia has updated firefox(MG4,5: multiple vulnerabilities), flash-player-plugin (MG4,5: multiplevulnerabilities), and qemu (MG4,5: multiple vulnerabilities).openSUSE has updated gnutls(13.2, 13.1: denial of service).Oracle has updated firefox (OL7; OL6; OL5: multiple vulnerabilities).Red Hat has updated firefox(RHEL5,6,7: multiple vulnerabilities) and kernel (RHEL6.5: use-after-free flaw).Scientific Linux has updated firefox (SL5,6,7: multiple vulnerabilities).SUSE has updated flash-player (SLE12; SLED11SP4,SP3: multiple vulnerabilities).Ubuntu has updated firefox(15.04, 14.04, 12.04: multiple vulnerabilities) and ubufox (15.04, 14.04, 12.04: multiple vulnerabilities).
l+f: Wenn Oracles Security-Chefin vom Leder zieht
Wer Lücken in Oracle-Software findet, sollte sie wohl lieber nicht dem Hersteller melden. Sonst droht Ärger mit Oracles Rechtsanwälten.
Security researchers hack a car and apply the brakes via text
Vulnerability revealed in diagnostic dongles used for vehicle tracking and insurance that lets them take control using just an SMSResearchers have hacked a car, remotely activated its windscreen wipers, applied its brakes and even disabled them, all via simple text messages.
Linux Concerns: Convenience vs. Security
Ask why you should use Linux, and inevitably someone will claim that it is more secure than Windows, and doesn't need anti-virus protection, either.
IoT security is RUBBISH says IoT vendor collective
Online Trust Alliance calls on gadget vendors to stop acting like clowns A vendor group whose membership includes Microsoft, Symantec, Verisign, ADT and TRUSTe reckons the Internet of Things (IoT) market is being pushed with no regard to either security or consumer privacy.…
Intel left a fascinating security flaw in its chips for 16 years -- here's how to exploit it
A design flaw in Intel's processors can be exploited to install malware beneath operating systems and antivirus – making it tough to detect and remove.…
LXer: Linux Concerns: Convenience vs. Security
Published at LXer: Ask why you should use Linux, and inevitably someone will claim that it is more secure than Windows, and doesn't need anti-virus protection, either. Read More......
Security experts warn against using fingerprints as passwords
Ever since Apple introduced TouchID for iPhones, more and more smartphones feature fingerprint scanners. And that has some security researchers worried.
LXer: Intel left a fascinating security flaw in its chips for 16 years -- here's how to exploit it
Published at LXer: A design flaw in Intel's processors can be exploited to install malware beneath operating systems and antivirus – making it tough to detect and remove.… Read More......
Mounted police to patrol Spain's Camino de Santiago amid security fears
Team of Guardia Civil officers to provide escort for walkers on ancient route to cathedral after reports of harassment and disappearance of American pilgrimFor hundreds of years, pilgrims have trekked along Spain’s Camino de Santiago to the cathedral at Santiago de Compostela, believed to be the final resting place of St James.But this year, pilgrims and hikers have a police escort for part of the way, with a team of five Guardia Civil police officers on horseback covering up to 18 miles a day of the ancient Catholic pilgrimage. Continue reading...
Complete failure of Oracle security response (2005)
Comments
Security updates for Tuesday
Arch Linux has updated ppp (denial of service).Debian has updated subversion (two vulnerabilities).Debian-LTS has updated opensaml2 (denial of service).Fedora has updated elasticsearch(F22: multiple vulnerabilities), lxc (F22; F21: twovulnerabilities), and rubygems (F22: DNS hijacking).
HP grabs global senior veep Barsamian to run security biz
Location of current incumbent unknown... Anyone seen Art Gilliland lately? HP has called on channel sales veteran Sue Barsamian to take charge of the enterprise security products unit in the software division amid the breakup of the corporation.…
Oracle security chief to customers: Stop checking our code for vulnerabilities
"Stop reverse engineering our code, already.”
Pwnie Awards 2015: Oscars der Security-Szene verliehen
Keine Black Hat ohne Pwnies. Eine Jury bestehend aus renommierten Sicherheitsexperten hat die begehrte Auszeichnung für die spektakulärsten Schwachstellen und Datenleaks vergeben. Auch der beste Song wurde freilich wieder gekürt.
Brit-educated bloke takes Dept of Homeland Security's infosec reins
Cambridge graduate Andy Ozment teams up with one-time HP gros fromage The US Department of Homeland Security (DHS) has appointed Andy Ozment, currently the Assistant Secretary of the Office of Cybersecurity and Communications – the DHS's main processing center for threat information sharing – as leader of its cybersecurity centre.…
Android Certifi-Gate remote access security hole exploited
A security hole in Android's remote support tool is being exploited in the wild.
Intel left a fascinating security flaw in its chips for 16 years – here's how to exploit it
Howler opens door for SMM rootkits Black Hat In-Depth A design flaw in Intel's processors can be exploited to install malware beneath operating systems and antivirus – making it tough to detect and remove.…
DataGravity Focuses On Security In Latest Release
DataGravity announced version 2.0 of its storage appliance today, one that focuses on data security, particularly knowing what files you have and who’s been accessing them.When DataGravity emerged last summer with a new concept of data aware storage, it announced a number of key features, but it found that “customers were gravitating most around security at the point of… Read More
Security is weakened because random numbers are not random enough
The entropy of data generated by Linux servers -- which are the backbone of much of the internet -- is, says security expert Bruce Potter, too low... Potter warns that the low entropy problem means that seemingly random numbers could in fact be easier to guess or crack than first thought.
LXer: Android Certifi-Gate remote access security hole exploited
Published at LXer: A security hole in Android's remote support tool is being exploited in the wild. Read More......
The Anatomy of a Cyber Security Assessment
Design NewsBy Rob SpeigelOver the last five years, the DuPont Co. has regularly monitored all aspects of the security of its Sabine River Works plant on the Gulf Coast of Texas. The plant produces ethylene copolymers used in plastic packaging. The monitoring process began with a full security assessment. The assessment focused heavily – though not exclusively – on cyber threats.
Psychology group bans members from harsh national security interrogations
Psychologists' involvement in interrogations aided US assertions torture was legal.
Another day, another stunning security flaw in Android – this time hitting 55% of mobes
Bug allows ordinary apps to gain control of gadgets Video Fresh from sorting out the Stagefright flaw, Google has another serious security vulnerability in Android on its hands.…
Chinese hack of US national security details revealed days after Russian hack
Government sources tell NBC News that Chinese attack targeted personal emails of ‘all top national security’ officials just days after Pentagon hackThe ongoing saga of successful foreign hack attacks on government databases continued Monday with news of another break-in allegedly perpetrated by China.Just days after the reported spear-phishing attack on the Pentagon’s joint staff email system, which exposed some 4,000 civilian and military employees and is believed to have been sponsored by Russia, anonymous government sources told NBC News that a separate set of Chinese hack attacks targeted the personal emails of “all top national security and trade officials”. Continue reading...
Researchers point fingers at Android phones' fingerprint security
Researchers from FireEye Labs have unearthed multiple vulnerabilities in the fingerprint scanner implementations of several Android handsets. The group's research paper was presented at the Black Hat conference last week, and it describes several vulnerabilities, some of which had the potential to allow for remote background collection of fingerprints. We say "had," because it should be noted that all of the companies mentioned have patched the issues presented in the paper. Other, non-manufacturer-specific vulnerabilities could still be exploited.Android's fingerprint authentication framework originally provided only weak security. Fingerprint data was only as secure as the kernel iself—an attacker who manages to gain root access to the device can read fingerprints. Companies are starting to use ARM's TrustZone functionality , ...Read more...
LXer: Security is weakened because random numbers are not random enough
Published at LXer: The entropy of data generated by Linux servers -- which are the backbone of much of the internet -- is, says security expert Bruce Potter, too low... Potter warns that the low...
Security advisories for Monday
CentOS has updated firefox (C7; C6; C5: information leak).Debian has updated activemq(denial of service) and opensaml2 (problemwith previous update).Debian-LTS has updated xmltooling (denial of service).Fedora has updated community-mysql (F22; F21: unspecified vulnerabilities) and firefox (F22; F21: information leak).Mageia has updated cacti (MG4,5:multiple vulnerabilities), firefox (MG4,5:information leak), ghostscript (MG4,5:buffer overflow), libunwind (MG4,5: bufferoverflow), lxc (MG5: two vulnerabilities),and wordpress (MG4: multiple vulnerabilities).Oracle has updated firefox (OL7; OL6; OL5: information leak).Red Hat has updated firefox(RHEL5,6,7: information leak).Scientific Linux has updated firefox (SL5,6,7: information leak).Slackware has updated firefox(information leak) and nss (information leak).
Mapping Israel’s Cyber-Security Startups
While many CISOs and corporate executives are familiar with Israeli cyber talent owing to Check Point, Imperva, CyberArk and other notable security success stories, the sheer scope of Israeli startup activity in the cyber sector is staggering. Read More
Facebook: Please fix this security loophole before its too late
Comments
TOFU, Keybase, and Other Vegan Security Choices
Comments
Biometric Security: From Selfies To Walking Gaits
The payments industry, facing the risk of increasingly sophisticated cyber-attacks and various types of credit card fraud, has begun incorporating various types of biometric technology to enhance security and prevent breaches. As recently reported, MasterCard is launching a facial recognition payment service based on “selfies” taken on a smartphone. Read More
Mobile Nations Weekly: Security, Xbox, a new BlackBerry, and more security
Welcome to Mobile Nations Weekly, a look back at the important stories of the week in mobile tech and mobile life. The week that was brought us news, rumors, speculation, fear mongering, and opinion valid and not from all across the mobile space. On the Android front they're dealing with the Stagefright compromise and the rapid response of manufacturers to patch the exploit as well as checking out the awesome-at-twice-the-price Moto G 2015 for under $200. BlackBerry launched their new BlackBerry Passport Silver Edition and saw another leak of the Android-powered Venice slider.
Security News This Week: The Pentagon Got Hacked While You Were at Def Con
The security world doesn’t stop for Def Con, so here’s the big news that happened in the rest of the world. The post Security News This Week: The Pentagon Got Hacked While You Were at Def Con appeared first on WIRED.
PortSwigger Web Security Blog: Server-Side Template Injection
Comments
Hacking For Cause: Today’s Growing Cyber Security Trend
What do the following data-breach headlines from the past year have in common? The Sony Pictures hack: Everything we know so far; Anonymous hackers release emails ordering bear cubs be killed; Hackers threaten to release names from adultery website … Connecting the dots yet? Read More
Mint and Security Updates
Noob question here, as I am just learning about Linux distros)... Is it still the case (and, if so, is it expected to stay the case) that Mint has no security features? If so, can something like...
The people who hold the keys to worldwide Internet security
Comments
Mall security guards have never needed EpiPens in Hamilton pilot project
The city is nearly one year into its pilot project to have food allergy injectors in local malls — but so far, no one has needed it.
Ask HN: Best resources on webapp security?
Comments
Hardening, auditing, host security and network security on Slackware systems
What I would like to accomplish is: 1. Learn how to audit for host based intrusions and audit for network based intrusions. 2. Get some advice on how to identify (and patch) vulnerable software on...
Some security through obscurity
I am tinkering with some security through obscurity. I use static IP addresses for all of my computers. I have an HP LaserJet 4200 with a network card. All devices are assigned an IP address below...
12345