• Open-source hardware could defend against the next generation of hacking
    Computer hardware is, for the most part, like the safe whose security mechanisms are secret. In the wake of revelations that Chinese spies may have been able to install a tiny computer chip inside devices used by as many as 30 companies, like Amazon and Apple, as well as the U.S. military and the CIA, I suggest re-evaluating the hardware people and corporations rely on to protect their secrets. Hardware customers could benefit from the clear – if surprising – lesson the software industry has learned from decades of fighting prolific software hackers: Open-source systems can be more secure. Just as when choosing a safe to store a secret document in, customers must decide – should they pick a system whose security is vouched for by the company that makes it, or a system that can be explored, examined and tested? Security with open-source hardware Making open-source hardware systems more available increases regular people’s security by giving them verifiably secure options.Read More
  • The Ripple Effects of the China Chip Hacking Story
    Some argued that Bloomberg’s story appeared deeply sourced, and that the companies implicated have every incentive to stridently deny allegations that could cripple their reputation and upend their supply chains. The problem is that the material needed for information security professionals to verify the Bloomberg story is not likely to be issued to the public any time soon. The story broke the same day as Vice President Mike Pence’s “bombshell” speech at the Hudson Institute in Washington, D.C., in which he made clear that the Trump administration plans to sever economic and industrial ties with China. Even if the timing was just a lucky coincidence for the Trump administration, Bloomberg’s story accelerated a longstanding push to cut out China from U.S. supply chains. Moreover, even if the Bloomberg story falls apart, the approach it describes is consistent with public statements made by the Chinese military for a long time. In just one week following Pence’s speech and the Bloomberg story, we saw an almost daily barrage of negative China news.Read More
  • How do cyber-criminals hack small business startups? Here's what we learned from Microsoft
    USA TODAYSean Etesham and Richard Idigo are two of sharpest young men I have met in quite some time, so the cyberhack these entrepreneurs experienced one recent day shocked us all.October is National Cybersecurity Awareness Month, so a few weeks ago I was asked by executives from the Microsoft Store to participate in a video demonstration in Los Angeles to show just how vulnerable most small businesses are to cyberattack. Richard, who had recently graduated from Cal Poly with a degree in math and computer science (like I said, these guys are uber smart), would be the chief information officer and Sean would be the CEO.More: Tricky Halloween season can be a treat for small businessesMore: Head off a small-business skirmish: Draw up your will or estate plan todayMore: Microsoft co-founder Paul Allen dead at 65 from non-Hodgkin's lymphomaFrom its start, the business — Quants Bakery — was a hit.Read More
  • ​Facial recognition tech allows passengers to clear airport security in Shanghai
    Passengers checking into flights at Shanghai's Hongqiao International Airport can now use their face to prove their identity thanks to the rollout of facial recognition technology. A KFC outlet in Hangzhou, near Shanghai, allows customers to pay using facial recognition technology; a school in the country is using facial recognition cameras to monitor students' reactions in class; and hundreds of ATMs in Macau have also been equipped with facial recognition devices to curb money laundering. It also isn't just China embracing facial recognition technology at airports. Some passengers travelling internationally via Qantas have been trialling biometric technology at Sydney Airport since July, with the first stage using facial recognition for them to complete automated flight check-in and bag drop, gain access to the lounge, and board the plane itself. Australian Minister for Home Affairs Peter Dutton said in February that the use of facial recognition at airports was close to becoming reality, following trials of the tech at Canberra Airport that allowed passengers to walk through the terminal from their flight without producing their passport.Read More
  • GreyEnergy: New malware campaign targets critical infrastructure companies
    Dubbed GreyEnergy by researchers at ESET, the group is believed to have been active over the last three years and to be linked to BlackEnergy, the attack group whose actions left 230,000 people in Ukraine without electricity in December 2015. However, ESET hasn't attributed GreyEnergy to a particular group or state, only noting the links behind the various attacks by what the full research paper describes "as one of the most dangerous APT groups that has been terrorising Ukraine for the past several years" Unlike these highly destructive and visible campaigns, GreyEnergy is very keen for its activity to stay under the radar with attacks focusing on stealth and a select group of targets, with efforts by the attackers to cover their tracks. A third link is that the targets of the two campaigns are very similar - all operate in the energy and critical infrastructure sectors and both families of malware have been spotted on systems in Ukraine and at least one victim of GreyEnergy had previously been targeted by BlackEnergy.Read More
  • Critical Vulnerabilities Allow Takeover of D-Link Routers
    Researchers have found several vulnerabilities that can be exploited to take full control of some D-Link routers, and patches do not appear to be available. Once authenticated, an attacker can exploit a third vulnerability, tracked as CVE-2018-10823, to execute arbitrary commands and take full control of the device. Vulnerabilities in Linksys E-Series routers Researchers at Cisco Talos discovered several vulnerabilities in E-Series routers from Linksys. Unlike the vulnerabilities in D-Link products, the ones found by Talos can only be exploited by an authenticated attacker and the vendor has released patches. Related: Unpatched D-Link Router Vulnerabilities DisclosedRead More
  • Hackers accused of ties to Russia hit three East European companies: cybersecurity firm
    BRATISLAVA (Reuters) - Hackers have infected three energy and transport companies in Ukraine and Poland with sophisticated new malware and may be planning destructive cyber attacks, a software security firm said on Wednesday. The report is the latest to raise suspicions in the West about Russia's GRU spy agency, accused by London of conducting a "reckless campaign" of global cyber attacks and trying to kill a former Russian spy in England. Investigators at ESET said the group responsible for a series of earlier attacks against the Ukrainian energy sector, which used malicious software known as BlackEnergy, had now developed and used a new malware suite called GreyEnergy. ESET has helped investigate a series of high-profile cyber attacks on Ukraine in recent years, including those on the Ukrainian energy grid which led to power outages in late 2015. Lipovsky and fellow ESET researcher Anton Cherepanov said the BlackEnergy attackers' decision to upgrade to the new GreyEnergy malware may have been motivated by a need to cover their tracks and deflect attention from their activities.Read More
  • Brazil expert discovers Oracle flaw that allows massive DDoS attacks
    “A proof of concept (POC) made in only one XLabs server generated a traffic of 69 gigabits per second,” Mauricio told Cibersecurity.net.br. At the time of the discovery, the expert queried Shodan and found that there were nearly 2.6 million servers running RPCBIND on the Internet. RPCBIND is software that provides client programs with the information they need about server programs available on a network. It runs on port 111 and responds with universal addresses of the server programs so that client programs can request data through RPCs (remote procedure calls). “We then decided to open a server with port 111 exposed on the Internet, with the same characteristics as those who were attacking us and we were monitoring that server for weeks. We found that he was receiving requests to generate attacks, ” he explained.  After further analysis of the subject, it was possible to reproduce the attack in the laboratory. “By analyzing the servers exposed at Shodan, the extent of the problem was confirmed,” continues Mauricio.Read More
  • CVE-2018-3211: Java Usage Tracker Local Elevation of Privilege on Windows
    As shown in Figure 5, the previous configuration file in line 9 will force Java Usage Tracker to create a .bat file, then add the custom property: ping 172.0.1.1 >. For example, the Java Usage Tracker’s configuration (usagetracker.properties) can be created for a non-privileged user and the malicious log file (usage tracker log) is created by a process with higher privileges. The global configuration file for Java Usage Tracker is created in the default path %ProgramData%\Oracle\Java\. To exemplify an exploit for this: A user with low privileges can create a malicious configuration file usagetracker.properties and the Tomcat server can create the batch file in any location of the system because it is running with “System” privileges. For example, a scriptable file can be created like a batch file. For example, a scriptable file can be created like a batch file.Read More
  • VMWare issues patch for a critical arbitrary code execution vulnerability in the SVGA virtual graphics card
    ​VMware released a critical-rated bug that impacts its SVGA virtual graphics card used by its Workstation, ESXi and Fusion products. The critical vulnerability could allow attackers to execute arbitrary codes on a targeted host. The vulnerability was assigned with CVE-2018-6974 and named as an out-of-bound vulnerability, according to the security advisory released by VMware. The vulnerability was first discovered by an anonymous researcher, who notified the VMware about the details of the vulnerability through Trend Micro’s Zero Day Initiative (ZDI). However, the flaw was reported to VMware by mid-June this year.Read More