Please login first.

Attacking Sandboxes


Many anti-malware applications use a sandbox as a tool to help identify potentially malicious software. Now knowledge is spreading about techniques and methods that can allow sandboxed software to target the sandbox itself (and by extension the application that applied it). While attacks that specifically target sandboxing applications are probably a little way off, this technology can be considered the logical extension of techniques and procedures to identify the presence of hosted systems (VMWare, Virtual PC, etc.)

beskerming.com theregister.co.uk

... Link (0 comments) ... Comment



Trojan creates bogus webmail accounts to punt drugs


Miscreants have created a strain of malware capable of setting up bogus Hotmail and Yahoo! accounts in order to send spam.

The HotLan-A Trojan uses automatically-generated webmail accounts, suggesting that spammers have found a way to bypass the Captcha system (which typically means accounts can't be created until a user correctly identifies letters depicted in an image).

The Captcha system was set up by online service providers in order to try to ensure that only requests generated by a human, and not automated by a program, are serviced.

These challenge-response systems are often used to stop the automatic creation of webmail accounts by spammers, so their apparent defeat by the HotLan-A Trojan is of particular note.

theregister.co.uk

... Link (0 comments) ... Comment



Heathrow to trial RFID tags


In September, Heathrow Airport will become the largest in Europe to trial RFID-based tags for tracking passenger luggage, comparing accuracy and read rates against their existing barcode-based systems.

Radio Frequency Identification tags are a throw-away technology which can be embedded in the labels attached to luggage on check-in, and then read from a distance of a metre or so (depending on the technology) as the luggage makes its way around the world - sometimes even to the same destination as the passenger.

theregister.co.uk

... Link (0 comments) ... Comment



Worms 2.0! The Metasploit menace inside your firewall


In his research he focused on using a web browser as a beachhead to launch Metasploit-style attacks. What this means is that any Javascript enabled web browser might be used to launch an attack against a service, for example a VoIP server, and gain complete control of the box.

Generally exploits are executed inside a development framework such as Metasploit, or run directly from the code. But this time, the code would run inside the browser, using Javascript. And all of this takes palce without exploiting any bugs in the browser itself.

Your browser is now an active menace against the security of your internal network. However, the problem can't be easily fixed, because it is not based on a bug: it simply uses "Web 2.0" technologies against you.

theregister.co.uk

... Link (0 comments) ... Comment



Hacker Posts Possible Harry Potter Spoiler, Illustrating Corporate Vulnerabilities


An anonymous hacker claims to have used computer magic to peer through the extreme secrecy surrounding the ending of the Harry Potter saga and posted online unverified details from the soon-to-be released final book in best-selling series.

The hacker, posting under the handle Gabriel, claims to have gotten a copy of the seventh and final installment of the blockbuster Harry Potter series that chronicles the adventures of a child magician by hacking into Bloomsbury, the series' London-based publisher.

wired.com Spear phishing: Highly targeted scamseitb24.com

... Link (0 comments) ... Comment



Cyber attack on Pentagon e-mail


A hacker has managed to penetrate one of the Pentagon's e-mail systems, leading officials to take up to 1,500 accounts offline.

The e-mail system did not contain classified information relating to military operations, a spokesman said.

bbc.co.uk theregister.co.uktime.comphysorg.com

... Link (0 comments) ... Comment



Detailed Report of CIA's Wiretapping of Americans and Dirty Tricks To Be Unclassified


In its first 25 years, the Central Intelligence Agency violated its charter by plotting assassinations, funding behavioral and drug studies that included "unwitting participants," opening U.S. mail, creating dossiers on nearly 10,000 American dissidents, wiretapping journalists to root out their sources, and interrogating a Soviet defector against his will for two years, according to a summary of a decades-old CIA report on the agency's activities released Thursday by the National Security Archive, an open government group.

wired.com

... Link (0 comments) ... Comment



Lightning vs Car


What would it be like, if you were struck by lightning while in your car? Richard Hammond finds out by sitting in a VW Golf struck by 800,000 volts from a huge power generator.

... Link (0 comments) ... Comment



How to clone a biometric passport while it's still in the bag


They are the "safest ever", according to the Government. But the Daily Mail has revealed how easily a person’s identity can be stolen from new biometric passports.

Safest ever' passport is not fit for purpose

theregister.com dailymail.co.uk

... Link (0 comments) ... Comment



Italy tops global wiretap league


Britain may have more CCTV cameras per head than anywhere else in the world but when it comes to electronic surveillance the country is way behind Italy, the Netherlands and even Sweden.

theregister.co.uk

... Link (0 comments) ... Comment



Invasion of the naked body scanners


Last week, TSA began using backscatters at airports to screen passengers for weapons. The first machine is up and running in Phoenix. The next ones will be in New York and Los Angeles. The machines have been modified with a "privacy algorithm" to clean up what they show. But even the tempered images tell you more than you need to know about the endowments of the people seated next to you.

slate.com

... Link (0 comments) ... Comment



How hackers make money


It's a murky world of chat rooms, malware factories, and sophisticated phishing schemes. Here's a look inside.

informationweek.com

via

... Link (0 comments) ... Comment