January 13, 2012
"Such a legacy of problematic programming that violates good architectural and coding practices is called "technical debt," a metaphor that is gaining broader attention.
[Read more from computer world]"
Labels: technical debt, vulnerability
December 01, 2011
"According to a report in Spiegel Online, "remote monitoring software" developed in Germany is designed to exploit a vulnerability in iTunes in order to infect target computers. In an advertising video, German company Gamma International GmbH is reported to have shown its FinFisher spyware application specifically using a vulnerability in the iTunes update system to install itself on target systems.
Read more from [h-online]"
Labels: surveillance software, trojan
"Gamma International UK Ltd. touts its ability to send a “fake iTunes update” that can infect computers with surveillance software, according to one of the company’s marketing videos.
Read more from [The Wall Street Journal].
Labels: surveillance software
"The feature, a type of key-establishment protocol known as forward secrecy, ensures that each online session is encrypted with a different public key and that corresponding private keys are never kept in long-term storage. That, in essence, means there's no master key that unlocks multiple sessions that may span months or years. Attackers who recover a key will be able to decrypt communications exchanged only during a single session.
Read more from [theregister]"
Labels: cryptography, forward secrecy
"The largest telecommunications company in the Netherlands has stopped issuing SSL certificates after finding indications that the website used for purchasing the certificates may have been hacked.
Read more from [computerworld]"
Labels: digital certificate
October 31, 2011
"In this paper, they provide a security analysis pertaining to the control interfaces of a large Public Cloud (Amazon) and a widely used Private Cloud software (Eucalyptus). Their research results are alarming: in regards to the Amazon EC2 and S3 services, the control interfaces could be compromised via the novel signature wrapping and advanced XSS techniques. Similarly, the Eucalyptus control interfaces were vulnerable to classical signature wrapping attacks, and had nearly no protection against XSS."
Read more from [marcoramilli]
Labels: cloud security, signature wrapping attacks, XSS
"... “These cybercapabilities are still like the Ferrari that you keep in the garage and only take out for the big race and not just for a run around town, unless nothing else can get you there,” one Obama administration official told the NYT."
Read more:
theregister
" ... "I'm amazed I still can't do public key-encrypted email with people in the local community," Berners-Lee said at an RSA Conference press event on Thursday. "The things that public key cryptography promised us are not actually there in practice." ..."
Read more:
zdnetLabels: PGP, public key encryption
"A weakness in XML Encryption can be exploited to decrypt sensitive information, researchers say."
Read more:
computerworldLabels: XML Encryption
October 22, 2011
"A little more than one year after the infrastructure-destroying Stuxnet worm was discovered on computer systems in Iran, a new piece of malware using some of the same techniques has been found infecting systems in Europe, according to researchers at security firm Symantec."
Read more:
wiredLabels: stuxnet