Ukraine energy utilities attacked again with open source Trojan backdoor

Battered Ukrainian electricity utilities are being targeted with backdoors in attacks possibly linked to those fingered for recent blackouts. The phishing attacks are attempting to get backdoors installed on utility company computers using techniques similar to those seen in the BlackEnergy attacks. BlackEnergy ripped through Ukrainian utilities in what is largely considered the cause of Read more about Ukraine energy utilities attacked again with open source Trojan backdoor[…]

Microsoft explains why Irish Warrant Fight is important

Without trust, Microsoft thinks, nobody is going to use any cloud services, and the Snowden revelations put the trustworthiness of all technology suppliers in the spotlight. So when a warrant arrived at Microsoft’s Dublin data centre one day in 2013, a not uncommon occurrence for a cloud host, Microsoft was ready to kick back. What Read more about Microsoft explains why Irish Warrant Fight is important[…]

Deliberately hidden backdoor account in several AMX (HARMAN Professional) devices used by whitehouse, CIA, NSA, for communications

In the funniest disclosure I’ve read in some time (well, it would be if it wasn’t so terribly dangerous), it turns out that these teleconferencing units had a hardcoded admin account with extra permissions built in with username BlackWidow. In the first “fix”, AMX basically changed the user to Batman. Poor show. SEC Consult: Deliberately Read more about Deliberately hidden backdoor account in several AMX (HARMAN Professional) devices used by whitehouse, CIA, NSA, for communications[…]

Oracle blurts Google’s Android secrets in court: You made $22bn using Java, punk

And Google paid Apple $1bn to put its search into iPhones An Oracle lawyer has blurted out in court how much money Google has made from Android – figures that the web giant has fiercely fought to keep secret. And those numbers are: US$31bn in revenue, and US$22bn in profit, since 2008, when Android was Read more about Oracle blurts Google’s Android secrets in court: You made $22bn using Java, punk[…]

RSA asks for plaintext Twitter passwords on conference reg page

Scores of security bods registering for security outfit RSA’s Executive Security Action Forum (ESAF) have handed over their Twitter account passwords to the company’s website in what is seen something between bad practise and outright compromise. The registration process for the February 29 event asks delegates to enter their Twitter credentials so that a prefab Read more about RSA asks for plaintext Twitter passwords on conference reg page[…]

Intel Driver Update Utility flawed

Basically the driver updater looks over HTTP and downloads an unencrypted, easily parsable XML file with URLs leading to the files to download and execute as admin. A man in the middle attack could easily exploit this. Source: Intel Driver Update Utility MiTM This is a lot like the Drupal update vulnerability.

Rabobank puts NFC payment on all KPN simcards

The simcards have an NFC element that belongs to the Rabobank. I guess that means that Rabobank must then get quite a lot of information from the telco provider that you wouldn’t necessarily want them to have. Worrying. KPN geeft sinds begin dit jaar een nieuw type simkaart uit dat contactloos betalen per telefoon mogelijk Read more about Rabobank puts NFC payment on all KPN simcards[…]

USMC leadership shows how stuck in the mud they are when they try to fling some at Secretary of the Navy

Old sad dickless USMC leadership who can’t handle working with equally competent gay men or women are trying to get rid of mr Mabus who has not only insisted on using them in combat roles if they meet the standards but also (shock! horror!) insisted on exploring alternative fuels. One is the integration of women Read more about USMC leadership shows how stuck in the mud they are when they try to fling some at Secretary of the Navy[…]

5th Annual State of Application Security Report (Healthcare) 2016

So should we expect a critical mass of consumers to walk away from organizations because their mobile health apps do not have the level of security protection they expect? Based on these research findings, perhaps. When put to the test, the majority of mobile health apps failed security tests and could easily be hacked. Among Read more about 5th Annual State of Application Security Report (Healthcare) 2016[…]

French say ‘Non, merci’ to encryption backdoors

The French government has rejected an amendment to its forthcoming Digital Republic law that required backdoors in encryption systems. Axelle Lemaire, the Euro nation’s digital affairs minister, shot down the amendment during the committee stage of the forthcoming omnibus digital bill, saying it would be counterproductive and would leave personal data unprotected. “Recent events show Read more about French say ‘Non, merci’ to encryption backdoors[…]

Royal Melbourne hospital runs XP, dives into chaos when virus attacks.

Het virus sloeg als eerste toe op de afdeling pathologie en verspreidde zich razendsnel over het ziekenhuis-netwerk. Hierdoor moesten veel medewerkers een hoop handelingen handmatig uitvoeren. Processen als bloed- en weefselverwerking konden niet meer worden uitgevoerd door de computers en ook de verpleegsters moesten samenwerken met de afdeling die het eten verzorgde om ervoor te Read more about Royal Melbourne hospital runs XP, dives into chaos when virus attacks.[…]

OpenSSH Private Crypto Key Leak Patch

The information leak is exploitable in the default configuration of the OpenSSH client, and (depending on the client’s version, compiler, and operating system) allows a malicious SSH server to steal the client’s private keys,” Qualys said in its advisory. “This information leak may have already been exploited in the wild by sophisticated attackers, and high-profile Read more about OpenSSH Private Crypto Key Leak Patch[…]

FFmpeg allows file ops when it reads a video file

ffmpeg has a vulnerability in the current version that allows the attacker to create a specially crafted video file, downloading which will send files from a user PC to a remote attacker server. The attack does not even require the user to open that file – for example, KDE Dolphin thumbnail generation is enough. Desktop Read more about FFmpeg allows file ops when it reads a video file[…]

Hyatt leaks customer credit card details

The investigation identified signs of unauthorized access to payment card data from cards used onsite at certain Hyatt-managed locations, primarily at restaurants, between August 13, 2015 and December 8, 2015. A small percentage of the at-risk cards were used at spas, golf shops, parking, and a limited number of front desks, or provided to a Read more about Hyatt leaks customer credit card details[…]

US spy chief’s personal accounts hacked

US spy chief James Clapper’s personal online accounts have been hacked, his office confirmed Tuesday, a few months after CIA director John Brennan suffered a similar attack. Clapper’s Office of the Director of National Intelligence confirmed the hack but refused to provide details. “We are aware of the matter and we reported it to the Read more about US spy chief’s personal accounts hacked[…]

Cisco forgot its own passwords for seven weeks

Someone’s palm is digging a hole into their face at Cisco, which has just admitted it shipped a bunch of servers with the wrong default password. “A number of C-Series servers have shipped to customers with a non-standard default password which prevents access to the Cisco Integrated Management Controller (CIMC) unless the configured password is Read more about Cisco forgot its own passwords for seven weeks[…]

Fortinet tries to explain weird SSH ‘backdoor’ discovered in firewalls, calls it “management authentication issue”

Anyone who uses this script against vulnerable firewalls will gain administrator-level command-line access to the equipment. After some outcry on Twitter and beyond, Fortinet responded by saying it has already killed off the dodgy login system. “This issue was resolved and a patch was made available in July 2014 as part of Fortinet’s commitment to Read more about Fortinet tries to explain weird SSH ‘backdoor’ discovered in firewalls, calls it “management authentication issue”[…]

A new way to print 3-D metals and alloys using rust

A team of Northwestern University engineers has created a new way to print three-dimensional metallic objects using rust and metal powders. While current methods rely on vast metal powder beds and expensive lasers or electron beams, Northwestern’s new technique uses liquid inks and common furnaces, resulting in a cheaper, faster, and more uniform process. The Read more about A new way to print 3-D metals and alloys using rust[…]

Trend Micro AV gave any website command-line access to Windows PCs

Ormandy, who has made something of a career of late discovering holes in popular security software, analyzed a component in Trend’s software dubbed Password Manager. He found that multiple HTTP RPC ports for handling API requests were accessible. “It took about 30 seconds to spot one that permits arbitrary command execution, openUrlInDefaultBrowser, which eventually maps Read more about Trend Micro AV gave any website command-line access to Windows PCs[…]

Material that can  remember several shapes

We integrate the elasticity and plasticity into a single polymer network. Rational molecular design allows these two opposite behaviors to be realized at different temperature ranges without any overlap Source: Shape memory polymer network with thermally distinct elasticity and plasticity Basically you can save different shapes and recover to those different shapes hundreds of times.