U.S. government begins asking foreign travelers about social media

NEW YORK — The U.S. government quietly began requesting that select foreign visitors provide their Facebook, Twitter and other social media accounts upon arriving in the country
[…]
Since Tuesday, foreign travelers arriving in the United States on the visa waiver program have been presented with an “optional” request to “enter information associated with your online presence,” a government official confirmed Thursday. The prompt includes a drop-down menu that lists platforms including Facebook, Google+, Instagram, LinkedIn and YouTube, as well as a space for users to input their account names on those sites.
[…]
“There are very few rules about how that information is being collected, maintained [and] disseminated to other agencies, and there are no guidelines about limiting the government’s use of that information,” said Michael W. Macleod-Ball, chief of staff for the American Civil Liberties Union’s Washington office.
“The choice to hand over this information is technically voluntary,” he said. “But the process to enter the U.S. is confusing, and it’s likely that most visitors will fill out the card completely rather than risk additional questions from intimidating, uniformed officers — the same officers who will decide which of your jokes are funny and which ones make you a security risk.”

Opponents also worry that the U.S. change will spark similar moves by other countries.

“Democratic and non-democratic countries — including those without the United States’ due process protections — will now believe they are more warranted in demanding social media information from visitors that could jeopardize visitors’ safety,” said Internet Association general counsel Abigail Slater. ”The nature of the DHS’ requests delves into personal information, creating an information dragnet.”

Source: U.S. government begins asking foreign travelers about social media

The 4th Reich in action again.

It’s not just your browser: Your machine can be fingerprinted easily

The group – Yinzhi Cao and Song Li of from Lehigh University in Pennsylvania, and Erik Wijmans from Washington University in St. Louis – have worked out how to access various operating system and hardware-level features that can fingerprint an individual machine, regardless of browser.

These include screen resolution with zoom; CPU virtual cores; installed fonts and writing scripts; the AudioContext call; GPU features such as line and curve rendering, anti-aliasing, shading, and transparency; and more.

The researchers reckon they can fingerprint a machine with 99.24 per cent accuracy (compared to under 91 per cent for browser fingerprinting).

Cao and friends say there’s one browser that defeats the worst of their attacks: the Tor browser.

Source: It’s not just your browser: Your machine can be fingerprinted easily

MongoDB hackers now sacking ElasticSearch

Some 35,000 mostly Amazon Web Services ElasticSearch servers are open to the internet and to ransoming criminals, Shodan boss John Matherly says.

So far more than 360 instances have had data copied and erased, held to ransom using the same techniques that blitzed tens of thousands of MongoDB servers this week.

Affected ElasticSearch administrators are greeted in one actor’s attacks with a message reading:

“Send 0.2 bitcoins to this wallet: 1DAsGY4Kt1a4LCTPMH5vm5PqX32eZmot4r if you want recover (sic) your database! Send to this email your service IP after sending the bitcoins p14t0s@sigaint.org (sic).”

Source: MongoDB hackers now sacking ElasticSearch

NL MoD plans for flexible defence

Minister Jeanine Hennis-Plasschaert van Defensie heeft vandaag een brief naar Tweede Kamer gestuurd over de invoering van het Total Force Concept. In Nederland ‘de Adaptieve Krijgsmacht’ genoemd. Hierin presenteert de bewindsvrouw hoe zij de krijgsmacht nog flexibeler en duurzamer wil laten samenwerken met bedrijven en organisaties. De krijgsmacht heeft bijvoorbeeld niet meer alles zelf op de plank, maar kan over mens en materieel beschikken waar en wanneer dat nodig is.

Source: Defensie flexibeler met de Adaptieve Krijgsmacht | Nieuwsbericht | Defensie.nl

hier de kamerbrief

By employing personnel outside of defence and subcontracting jobs, they will work up to a more flexible model in 2020 in a “Total Force Concept”

WhatsApp backdoor allows snooping on encrypted messages

WhatsApp’s end-to-end encryption relies on the generation of unique security keys, using the acclaimed Signal protocol, developed by Open Whisper Systems, that are traded and verified between users to guarantee communications are secure and cannot be intercepted by a middleman. However, WhatsApp has the ability to force the generation of new encryption keys for offline users, unbeknown to the sender and recipient of the messages, and to make the sender re-encrypt messages with new keys and send them again for any messages that have not been marked as delivered.

The recipient is not made aware of this change in encryption, while the sender is only notified if they have opted-in to encryption warnings in settings, and only after the messages have been re-sent. This re-encryption and rebroadcasting effectively allows WhatsApp to intercept and read users’ messages.

The security backdoor was discovered by Tobias Boelter, a cryptography and security researcher at the University of California, Berkeley. He told the Guardian: “If WhatsApp is asked by a government agency to disclose its messaging records, it can effectively grant access due to the change in keys.”

The backdoor is not inherent to the Signal protocol. Open Whisper Systems’ messaging app, Signal, the app used and recommended by whistleblower Edward Snowden, does not suffer from the same vulnerability. If a recipient changes the security key while offline, for instance, a sent message will fail to be delivered and the sender will be notified of the change in security keys without automatically resending the message.

WhatsApp’s implementation automatically resends an undelivered message with a new key without warning the user in advance or giving them the ability to prevent it.

Source: WhatsApp backdoor allows snooping on encrypted messages | Technology | The Guardian

Way More People Will Now Have Access to the NSA’s Raw, Unfiltered Data

Previously, when the NSA passed data it collected through its secretive, advanced, and sometimes illegal methods, an NSA analyst would strip the data that pertained to innocent people, and would only pass on what they deemed necessary. Now, when the NSA shares information with another intelligence agency, it will pass on the raw data, with no redactions. This means that employees and analysts at the 16 other federal intelligence agencies will now see raw, unfiltered data collected by the NSA.

The New York Times neatly summed up the changes: “Essentially, the government is reducing the risk that the N.S.A. will fail to recognize that a piece of information would be valuable to another agency, but increasing the risk that officials will see private information about innocent people.”
Setup Timeout Error: Setup took longer than 30 seconds to complete.

Patrick Toomey, a staff attorney at the American Civil Liberties national security project, slammed the sharing of raw data between agencies, noting that it’s all collected without a warrant.

Source: Way More People Will Now Have Access to the NSA’s Raw, Unfiltered Data

New Android-infecting malware brew hijacks devices and then attacks your wifi router

Hackers have brewed up a strain of Android malware that uses compromised smartphones as conduits to attack routers.The Switcher trojan does not attack Android device users directly. Instead, the malware uses compromised smartphones and tablets as tools to attack any wireless networks they connect to.Switcher brute-forces access to the network’s router and then changes its DNS settings to redirect traffic from devices connected to the network to a rogue DNS server, security researchers at Kaspersky Lab report.This server fools the devices into communicating with websites controlled by the attackers, leaving users wide open to either phishing or further malware-based attacks.The attackers claim to have successfully infiltrated 1,280 wireless networks so far, mainly in China.

Source: New Android-infecting malware brew hijacks devices. Why, you ask? Your router • The Register

Why China especially? Because Google is forbidden there, so Chinese Android users are forced to use different app market places than the Play store.

KLIC-WIN shows the underground infrastructure of your neigbourhood – in NL

De graafsector heeft het initiatief genomen voor het programma KLIC-WIN. Dit programma moderniseert de uitwisseling van kabel- en leidinginformatie volgens de WION en sluit systemen en processen beter aan op de Europese richtlijn INSPIRE. Op deze manier bereiden de graafsector en het Kadaster zich voor op de toekomst.

De naam KLIC-WIN is een samenvoeging van de WION (de Nederlandse Wet informatie-uitwisseling ondergrondse netten) en INSPIRE (de Europese richtlijn Infrastructure for Spatial Information in the European Community).

Source: KLIC-WIN

‘Tooth repair drug’ may replace fillings

The team at King’s College London showed that a chemical could encourage cells in the dental pulp to heal small holes in mice teeth.

A biodegradable sponge was soaked in the drug and then put inside the cavity.

The study, published in Scientific Reports, showed it led to “complete, effective natural repair”.
[…]
They discovered that a drug called Tideglusib heightened the activity of stem cells in the dental pulp so they could repair 0.13mm holes in the teeth of mice.

A drug-soaked sponge was placed in the hole and then a protective coating was applied over the top.

Prof Paul Sharpe, one of the researchers, told the BBC News website: “The sponge is biodegradable, that’s the key thing.

“The space occupied by the sponge becomes full of minerals as the dentine regenerates so you don’t have anything in there to fail in the future.”

The team at King’s is now investigating whether the approach can repair larger holes.

Prof Sharpe said a new treatment could be available soon: “I don’t think it’s massively long term, it’s quite low-hanging fruit in regenerative medicine and hopeful in a three-to-five year period this would be commercially available.”

Source: ‘Tooth repair drug’ may replace fillings – BBC News

MIT Unveils New Material That’s Strongest and Lightest On Earth

Graphene, which was heretofore, the strongest material known to man, is made from an extremely thin sheet of carbon atoms arranged in two dimensions. But there’s one drawback: while notable for its thinness and unique electrical properties, it’s very difficult to create useful, three-dimensional materials out of graphene.

Now, a team of MIT researchers discovered that taking small flakes of graphene and fusing them following a mesh-like structure not only retains the material’s strength, but the graphene also remains porous. Based on experiments conducted on 3D printed models, researchers have determined that this new material, with its distinct geometry, is actually stronger than graphene – making it 10 times stronger than steel, with only five percent of its density.

Source: MIT Unveils New Material That’s Strongest and Lightest On Earth

MongoDB ransom attacks soar, body count hits 27,000 in hours

MongoDB databases are being decimated in soaring ransomware attacks that have seen the number of compromised systems more than double to 27,000 in a day.

Criminals are accessing, copying and deleting data from unpatched or badly-configured databases.

Administrators are being charged ransoms to have data returned. Initial attacks saw ransoms of 0.2 bitcoins (US$184) to attacker harak1r1, of which 22 victims appeared to have paid, up from 16 on Wednesday when the attacks were first reported.

However, some payments could be benign transfers designed to make it appear victims are paying.

Norway-based security researcher and Microsoft developer Niall Merrigan says the attacks have soared from 12,000 earlier today to 27,633, over the course of about 12 hours.

Merrigan and his associates have now logged some 15 distinct attackers. One actor using the email handle kraken0 has compromised 15,482 MongoDB instances, demanding 1 bitcoin (US$921) to have files returned. No one appears to have paid. Merrigan says he is investigating “OSINT and finding different IOCs as well the actors involved”.

He credits fellow researcher Victor Gevers with helping victims secure their exposed MongoDB databases, 118 so far, according to the updated working sheet.

All told, a whopping 99,000 MongoDB installations are exposed, Gevers says.

MongoDB security is a known problem: up until recently, the software’s default configuration is insecure. Shodan founder John Matherly warned in 2015 that some 30,000 exposed MongoDB instances were open to the internet without access controls.

Source: MongoDB ransom attacks soar, body count hits 27,000 in hours

Autocomplete hidden form fields a novel phishing hole for Chrome, Safari crims

The attack vector is manifest when victims select autofill while filling out registration forms: attackers hide sensitive fields like street address, date of birth, and phone number, displaying only basic entry boxes like name and email.

Users who type the start of their names will generate a prompt that when selected will throw an option to fill out their complete details. If clicked on a phishing site Kuosmanen describes, a user’s sensitive information will be entered into boxes the user cannot see.

Source: Autocomplete a novel phishing hole for Chrome, Safari crims

One interview question that shows true character

http://www.inc.com/betsy-mikel/1-interview-question-that-cuts-through-the-bs-to-reveal-someones-true-character.html

Are you a giver or a taker? Ask for the names of 4 people the interviewee has boosted their career. If the positions of the people are lower than the interviewee you have a giver. If higher then the interviewee is a taker – a self serving backstabber…