background preloader

Security

Facebook Twitter

CrowdStrike denied bid to block security report in legal challenge against ''subversive'' NSS Labs.

Tor, CacheBrowser, etc.

Passwords. Internet of Things. Hidden backdoor API to root privileges in Apple OS X. The Admin framework in Apple OS X contains a hidden backdoor API to root privileges.

Hidden backdoor API to root privileges in Apple OS X

It’s been there for several years (at least since 2011), I found it in October 2014 and it can be exploited to escalate privileges to root from any user account in the system. The intention was probably to serve the “System Preferences” app and systemsetup (command-line tool), but any user process can use the same functionality. Apple has now released OS X 10.10.3 where the issue is resolved. OS X 10.9.x and older remain vulnerable, since Apple decided not to patch these versions. We recommend that all users upgrade to 10.10.3.

Why I started searching for vulnerabilities in OS X.

Secure Platforms and Services

Anonymous Operating System. Cisco purchase of CIA-funded company may fuel distrust abroad. The CIA's non-profit venture capital arm, In-Q-Tel, has been pumping millions of dollars into technology startups since its launch in 2000, meaning it's not the least bit unusual for major vendors to have acquired and assimilated one of these CIA-nurtured seedlings.

Cisco purchase of CIA-funded company may fuel distrust abroad

So what would make Cisco's recent acquisition of In-Q-Tel-backed security company ThreatGRID any more noteworthy than all the others? You've probably seen the pictures of NSA employees apparently intercepting and bugging Cisco equipment, and read of the letter sent by Cisco CEO John Chambers to President Obama suggesting the obvious: that this kind of thing is bad for business.

DHS licenses malware forensics. Cybersecurity DHS licenses malware forensics By Mark RockwellFeb 23, 2015 The Department of Homeland Security Science and Technology Directorate has licensed a malware forensics detection and software assurance package, the second technology to emerge from the Cyber Security Division Transition to Practice program.

DHS licenses malware forensics

R&K Cyber Solutions LLC, a Manassas, Va. -based application development and cyber solution company licensed Hyperion, which was originally developed by Oak Ridge National Laboratory. The Transition to Practice program identified Hyperion in 2012 as a promising candidate for further development and private-sector use. Lenovo PCs ship with man-in-the-middle adware that breaks HTTPS connections [Updated] Lenovo is selling computers that come preinstalled with adware that hijacks encrypted Web sessions and may make users vulnerable to HTTPS man-in-the-middle attacks that are trivial for attackers to carry out, security researchers said.

Lenovo PCs ship with man-in-the-middle adware that breaks HTTPS connections [Updated]

The critical threat is present on Lenovo PCs that have adware from a company called Superfish installed. As unsavory as many people find software that injects ads into Web pages, there's something much more nefarious about the Superfish package. It installs a self-signed root HTTPS certificate that can intercept encrypted traffic for every website a user visits.

“SSL hijacker” behind Superfish debacle imperils large number of users. Thursday's revelations that Lenovo PCs ship with adware that intercepts sensitive HTTPS-protected traffic have focused intense scrutiny on Superfish, the company that markets the intrusive software.

“SSL hijacker” behind Superfish debacle imperils large number of users

But lost in the furor is the central role a company called Komodia plays in needlessly exposing the passwords and other sensitive data of not just Lenovo customers but also a much larger base of PC users. How “omnipotent” hackers tied to NSA hid for 14 years—and were found at last. The NSA hides surveillance software in hard drives. It's been known for a while that the NSA will intercept and bug equipment to spy on its soon-to-be owners, but the intellgency agency's techniques are apparently more clever than first thought.

The NSA hides surveillance software in hard drives

Security researchers at Kaspersky Lab have discovered apparently state-created spyware buried in the firmware of hard drives from big names like Seagate, Toshiba and Western Digital. When present, the code lets snoops collect data and map networks that would otherwise be inaccessible -- all they need to retrieve info is for an unwitting user to insert infected storage (such as a CD or USB drive) into an internet-connected PC.

The malware also isn't sitting in regular storage, so you can't easily get rid of it or even detect it. Kaspersky isn't explicitly naming the culprits, but it also isn't shy about pointing a finger in the US government's direction. The NSA isn't commenting on the findings. Utah government sees 10,000-fold increase in cyberattacks. Utah government sees 10,000-fold increase in cyberattacks By Mark PomerleauFeb 10, 2015 For government IT managers, cyberattacks are a daily reality and they are typically prepared with a host of detection and remediation tools to ensure sensitive data is not compromised.

Utah government sees 10,000-fold increase in cyberattacks

But the state of Utah has recently been subject to an unusual level of cyber malice that many believe is attributable to the $1 billion National Security Agency data center located there. Estimates on the number of attacks on Utah’s state computer networks range from 300 million per day to 500 million. In contrast, in 2013 the state was only seeing 50,000 to 20 million cyberattacks daily. "Maybe these hackers are thinking: 'If we can attack state systems, we can get info that NSA isn't releasing," said director of the University of Maryland, Baltimore County's, graduate cybersecurity program Richard Forno in an AP report.

Why I Hope Congress Never Watches Blackhat. From left, Chris Hemsworth and director/producer Michael Mann on the set of Blackhat.

Why I Hope Congress Never Watches Blackhat

Frank Connor/Legendary Pictures and Universal Pictures What a strange time. Last week I was literally walking the red carpet at the Hollywood premiere of Michael Mann’s Blackhat, a crime thriller that I had the good fortune to work on as a “hacker adviser” (my actual screen credit). Today, all I’m thinking is, please, God, don’t let anybody in Congress see the film. Browsing in privacy mode? Super Cookies can track you anyway. For years, Chrome, Firefox, and virtually all other browsers have offered a setting that doesn't save or refer to website cookies, browsing history, or temporary files.

Browsing in privacy mode? Super Cookies can track you anyway

Privacy-conscious people rely on it to help cloak their identities and prevent websites from tracking their previous steps. Now, a software consultant has devised a simple way websites can in many cases bypass these privacy modes unless users take special care. Ironically, the chink that allows websites to uniquely track people's incognito browsing is a much-needed and relatively new security mechanism known as HTTP Strict Transport Security. Websites use it to ensure that an end user interacts with their servers only when using secure HTTPS connections.

By appending a flag to the header a browser receives when making a request to a server, HSTS ensures that all later connections to a website are encrypted using one of the widely used HTTPS protocols. VeraCrypt - Home. How The NSA Works Hard To Break Encryption Any Way It Can. Spiegel has published a detailed article, relying mostly on documents that Ed Snowden leaked, looking at the many ways in which the NSA breaks encryption (and the few situations where it still has not been able to do so).

How The NSA Works Hard To Break Encryption Any Way It Can

As we've seen from previous leaks, the NSA stupidly treats encryption as a "threat. " And, sure, it is a "threat" to the way in which the NSA snoops on everything, but for the vast majority of users, it's a way to protect their privacy from snooping eyes. The report does reveal that certain encryption standards appear to still cause problems for the NSA, including PGP (which you already use for email, right?)

NSA collects millions of text messages daily in 'untargeted' global sweep. The National Security Agency has collected almost 200 million text messages a day from across the globe, using them to extract data including location, contact networks and credit card details, according to top-secret documents. The untargeted collection and storage of SMS messages – including their contacts – is revealed in a joint investigation between the Guardian and the UK’s Channel 4 News based on material provided by NSA whistleblower Edward Snowden. The documents also reveal the UK spy agency GCHQ has made use of the NSA database to search the metadata of “untargeted and unwarranted” communications belonging to people in the UK.

The NSA program, codenamed Dishfire, collects “pretty much everything it can”, according to GCHQ documents, rather than merely storing the communications of existing surveillance targets. N.S.A. Collecting Millions of Faces From Web Images. The is harvesting huge numbers of images of people from communications that it intercepts through its global surveillance operations for use in sophisticated facial recognition programs, according to top-secret documents. The spy agency’s reliance on facial recognition technology has grown significantly over the last four years as the agency has turned to new software to exploit the flood of images included in emails, text messages, social media, videoconferences and other communications, the N.S.A. documents reveal. Agency officials believe that technological advances could revolutionize the way that the N.S.A. finds intelligence targets around the world, the documents show.

The agency’s ambitions for this highly sensitive ability and the scale of its effort have not previously been disclosed. Photo. New NSA Slides Reveal Tailored Access Run Amok. The NSA has seen the future of mass surveillance, and it appears they believe that the future lies in malware. Earlier this week, The Intercept reported on a series of slides and memos leaked by Edward Snowden describing the NSA's "more aggressive" approach to signals intelligence, which circumvents encryption such as web browsing via HTTPS and email using PGP, by installing spyware directly onto targets' computers.

Angry Birds and 'leaky' phone apps targeted by NSA and GCHQ for user data. The National Security Agency and its UK counterpart GCHQ have been developing capabilities to take advantage of "leaky" smartphone apps, such as the wildly popular Angry Birds game, that transmit users' private information across the internet, according to top secret documents. The data pouring onto communication networks from the new generation of iPhone and Android apps ranges from phone model and screen size to personal details such as age, gender and location. Some apps, the documents state, can share users' most sensitive information such as sexual orientation – and one app recorded in the material even sends specific sexual preferences such as whether or not the user may be a swinger.

Attacking Tor: how the NSA targets users' online anonymity. The online anonymity network Tor is a high-priority target for the National Security Agency. Critical networks in US, 15 other nations, completely owned, possibly by Iran. Detekt: A New Malware Detection Tool That Can Expose Illegitimate State Surveillance on YOUR Computer - GovernmentSecrets.com. Recent years have seen a boom in the adoption of surveillance technology by governments around the world, including spyware that provides its purchasers the unchecked ability to target remote Internet users’ computers, to read their personal emails, listen in on private audio calls, record keystrokes and passwords, and remotely activate their computer’s camera or microphone.

EFF, together with Amnesty International, Digitale Gesellschaft, and Privacy International have all had experience assisting journalists and activists who have faced the illegitimate use of such software in defiance of accepted international human rights law. Continuous Software Assurance Marketplace. The Digital Hunt for Duqu, a Dangerous and Cunning U.S.-Israeli Spy Virus. US government planes mimic cellphone towers to collect user data – report. The US justice department is reportedly using electronic equipment on aircraft to simulate cellphone towers so it can collect phone location and identifying information on a mass scale from users on the ground below. Tracking Isis, stalking the CIA: how anyone can be big brother online. Google and Mozilla told to limit browser's ability to watch users. Browser makers need to make it clearer to users when web sites and apps are watching and listening to them, European security researchers have warned. At present Chrome and Firefox rely on "coarse permissions" when granting sites access to users' camera and microphones for communications via WebRTC, said researchers from EU-funded group Strews.

"The browsers only provide coarse permissions, but ask for them at the start of a specific application, which may lead the user to believe he has given a specific permission, when in fact he has given a wide-ranging permission," they write in the report. FBI Says Cybercriminals Keep Getting Away, Need Unprecedented Authority - GovernmentSecrets.com. Rebirth of BackTrack, the Penetration Testing Distribution. Reliable, up-to-date advice on how to defend your privacy and security online. Leaked docs show spyware used to snoop on U.S. computers. Russia Stunned After NY Times Makes $1 Million Off Fake Hacking Story. World's Largest English Language News Service with Over 500 Articles Updated Daily. New technique could boost internet speeds tenfold.

EFF releases Chrome, Firefox plug-in to block third-party tracking. Scientists Come Up With Pass Codes You Can’t Forget. Ukrainian government texts ominous Orwellian message directly to cell phones of protesters. Target data breach exposes serious threat of POS malware and botnets. NSA Elite Hacking Team Operations Exposed - NSA 'hacking unit' infiltrates computers around the world – report. Snowden Strikes Again - another breaking story. Crackdown successfully reduces spam. The second operating system hiding in every mobile phone. Meet “badBIOS,” the mysterious Mac and PC malware that jumps airgaps. LEAKED: German Government Warns Key Entities Not To Use Windows 8 – Links The NSA. Password Strength Meter. The beginners guide to breaking website security with nothing more than a Pineapple.

What Government Should Know About 'Pass the Hash' Java 0day countdown. Java zero-day holes appearing at the rate of one a day. Help Prevent Session Hijacking. Private Web Browsing. Offensive Security Training and Professional Services. BackTrack Linux - Penetration Testing Distribution. How to Evade Government Surveillance and Stay Anonymous Online. Security: Authenticate Users Across Organizations Using ADFS. Howto: Ubuntu server as an Active Directory member server. Ubuntu 9.04 Samba Server Integrated With Active Directory. Which VPN Providers Really Take Anonymity Seriously? HoneyMap. Silent Circle App. Implementing Two Factor Authentication in ASP.NET MVC with Google Authenticator. Widely used fingerprint reader exposes Windows passwords in seconds.