<body><script type="text/javascript"> function setAttributeOnload(object, attribute, val) { if(window.addEventListener) { window.addEventListener('load', function(){ object[attribute] = val; }, false); } else { window.attachEvent('onload', function(){ object[attribute] = val; }); } } </script> <div id="navbar-iframe-container"></div> <script type="text/javascript" src="https://apis.google.com/js/platform.js"></script> <script type="text/javascript"> gapi.load("gapi.iframes:gapi.iframes.style.bubble", function() { if (gapi.iframes && gapi.iframes.getContext) { gapi.iframes.getContext().openChild({ url: 'https://www.blogger.com/navbar.g?targetBlogID\x3d24008684\x26blogName\x3d53cur!ty+6109\x26publishMode\x3dPUBLISH_MODE_BLOGSPOT\x26navbarType\x3dSILVER\x26layoutType\x3dCLASSIC\x26searchRoot\x3dhttps://g1rma.blogspot.com/search\x26blogLocale\x3den_US\x26v\x3d2\x26homepageUrl\x3dhttp://g1rma.blogspot.com/\x26vt\x3d7463756522070264080', where: document.getElementById("navbar-iframe-container"), id: "navbar-iframe", messageHandlersFilter: gapi.iframes.CROSS_ORIGIN_IFRAMES_FILTER, messageHandlers: { 'blogger-ping': function() {} } }); } }); </script>

53cur!ty 6109

Girma Nigusse

Java apps have most flaws, Cobol apps the least, study finds

January 13, 2012

"Such a legacy of problematic programming that violates good architectural and coding practices is called "technical debt," a metaphor that is gaining broader attention. [Read more from computer world]"

Labels: ,

Android weakness allows hackers to record phone calls

"A VULNERABILITY in Android smartphones allows hackers to record phone conversations and monitor location data. According to scientists from North Carolina State University, this can be done on Samsung, Motorola and HTC Google handsets because they contain code that exposes powerful capabilities to untrusted apps. [Read more from the theinquirer]"

Labels:

German spyware exploits iTunes vulnerability

December 01, 2011

"According to a report in Spiegel Online, "remote monitoring software" developed in Germany is designed to exploit a vulnerability in iTunes in order to infect target computers. In an advertising video, German company Gamma International GmbH is reported to have shown its FinFisher spyware application specifically using a vulnerability in the iTunes update system to install itself on target systems. Read more from [h-online]"

Labels: ,

Surveillance Company Says It Sent Fake iTunes, Flash Updates

"Gamma International UK Ltd. touts its ability to send a “fake iTunes update” that can infect computers with surveillance software, according to one of the company’s marketing videos. Read more from [The Wall Street Journal].

Labels:

Google mail crypto tweak makes eavesdropping harder

"The feature, a type of key-establishment protocol known as forward secrecy, ensures that each online session is encrypted with a different public key and that corresponding private keys are never kept in long-term storage. That, in essence, means there's no master key that unlocks multiple sessions that may span months or years. Attackers who recover a key will be able to decrypt communications exchanged only during a single session. Read more from [theregister]"

Labels: ,

The Hackers are Getting Younger

"As Kathy Ishizuka described in this School Library Journal article, this year's Defcon hacker's convention included for the first time a kids’ section, where budding computer nerds as young as eight learned how to pick locks (the physical kind) and hack Google. They also met with agents from the Department of Homeland Security and the National Security Agency to learn about “intelligence gathering, cyber weapons, war strategy, and more. Read more from [PC World]

Labels:

Barrett Brown is Anonymous

November 11, 2011

"Anonymous was the first group to build an operational voluntary botnet. By running the LOIC on your computer, you are, essentially, declaring your allegiance to Anonymous. You donate part of your computer’s processing power to the cause. That cause—or, if you prefer, the target—is determined by rough consensus among Anons. Read more from [dmagazine]"

Labels:

New techniques for detecting hardware Trojans

"As hardware devices are almost exclusively produced in countries where controls about who has access to the manufacturing process are non-existent or, at best, pretty lax, government agencies, military organizations and businesses that operate systems critical to a country's infrastructure can never be too careful when checking whether the devices they are planning to use have been tampered with. Read more from [net-security.org]"

Pentagon Aims to Go on the Offensive Against Cyber Threats

November 10, 2011

"... "Modern warfare will demand the effective use of cyber, kinetic and combined cyber and kinetic means," said DARPA director Regina Dugan, referring to traditional, "kinetic" methods of warfare that involve troops, vehicles, and bombs. Read more from [pcmag]"

Labels:

9 secrets of getting security projects done in a big company

"With so many potential exposures -- malware, system threats, new regulations -- Cullinane says a big part of his job is calculating a risk picture and quantifying it to show the residual risk and the ROI of your intended fix. Read more from [infoworld]"

KPN stops issuing SSL certificates after possible breach

"The largest telecommunications company in the Netherlands has stopped issuing SSL certificates after finding indications that the website used for purchasing the certificates may have been hacked. Read more from [computerworld]"

Labels:

Wi-Fi security do's and don'ts

"Wi-Fi is inherently susceptible to hacking and eavesdropping, but it can be secure if you use the right security measures. Read more from [computerworld]"

Labels:

A short history of crimeware

"From its origins in 2003, crimeware (also termed financial malware, stealth malware, or banking Trojans) evolved through a series of advancements that outpaced any and all traditional security defenses, including the foundational Internet defense triad of SSL encryption, anti-virus, and two-factor authentication. The result of these advancements is an efficient attack tool--ZeuS and SpyEye being the leading examples--capable of collecting large volumes of highly-sensitive authentication data. Read more from [computerworld]"

Labels:

U.S. report warns of Russia, China cyber spying

"Espionage attempts are expected to increase as more sensitive information moves online. The U.S. can expect more aggressive efforts from countries such as Russia and China to collect information through cyberespionage in areas such as pharmaceuticals, defense and manufacturing, according to a new government report released Thursday. Read more from [computerworld]"

Labels:

Amazon and Eucalyptus hacked

October 31, 2011

"In this paper, they provide a security analysis pertaining to the control interfaces of a large Public Cloud (Amazon) and a widely used Private Cloud software (Eucalyptus). Their research results are alarming: in regards to the Amazon EC2 and S3 services, the control interfaces could be compromised via the novel signature wrapping and advanced XSS techniques. Similarly, the Eucalyptus control interfaces were vulnerable to classical signature wrapping attacks, and had nearly no protection against XSS." Read more from [marcoramilli]

Labels: , ,

NASA Confirms ‘Suspicious Events’ in Satellite Hacking Report

"On Friday, in response to an inquiry about the reported satellite hacks, TPM received the following information in an email from NASA Public Affairs Officer Trent J. Perrotto, who confirmed two hacks affected its Terra AM-1 satellite, but said that no damage, theft or any other security breaches had taken place" Read more from [talkingpointsmemo]

World's most sophisticated rootkit is being overhauled

October 26, 2011

"Experts from security vendor ESET warn that TDL4, one of the most sophisticated pieces of malware in the world, is being rewritten and improved for increased resilience to antivirus detection."

Read more: computerworld

Labels:

US military debated hacking Libyan air defenses

"... “These cybercapabilities are still like the Ferrari that you keep in the garage and only take out for the big race and not just for a run around town, unless nothing else can get you there,” one Obama administration official told the NYT."

Read more: theregister

Berners-Lee: We need PGP for the people

" ... "I'm amazed I still can't do public key-encrypted email with people in the local community," Berners-Lee said at an RSA Conference press event on Thursday. "The things that public key cryptography promised us are not actually there in practice." ..."

Read more: zdnet

Labels: ,

Widely used encryption standard is insecure, say experts

"A weakness in XML Encryption can be exploited to decrypt sensitive information, researchers say."

Read more: computerworld

Labels:

Son of Stuxnet Found in the Wild on Systems in Europe

October 22, 2011

"A little more than one year after the infrastructure-destroying Stuxnet worm was discovered on computer systems in Iran, a new piece of malware using some of the same techniques has been found infecting systems in Europe, according to researchers at security firm Symantec."

Read more: wired

Labels: