Sun, Mar 3 2013 07:23
| Security, Software, Hackers
On logging into Evernote you'll find that you have to reset your password. Why? Well according to a post on the official Evernote blog, they were hacked, and while no personal information was snatched, emails, usernames, and passwords were. Luckily, those passwords were encrypted, but better safe than sorry.
Tue, Dec 18 2012 06:07
| Security, Samsung
Samsung's Galaxy S3 and Galaxy Note 2 smartphones have been revealed to suffer from a security flaw found in their Exynos ARM-based system-on-chip (SoC) processors, which could lead to users' personal data being exposed to malware.
First spotted by a user on the XDA Developers forums, the flaw affects all Android-based Samsung devices that use the Exynos 4210 and 4412 system-on-chip processor - including the Galaxy S2, Galaxy S3, Galaxy Note, Galaxy Note 2 and Galaxy Note 10.1, but not the cut-down Galaxy S3 Mini, which uses a different processor. The Samsung-manufactured Nexus 10 tablet, meanwhile, also escapes the bug as it uses the next-generation Exynos 5-series processor rather than the Exynos 4 family.
Currently, the flaw is not known to be exploited in the wild except for an application designed to allow users to 'root' their handsets - a process analogous to 'jailbreaking' an iPhone - without the need to connect the handset to a computer and use third-party software. The developer who discovered it, however, warns that it could be potentially serious: allowing full read/write access to the device's memory, the flaw allows malware to read personal details - including usernames and passwords - or patch itself into other applications, such as to record telephone calls or text messages. The vulnerability could even be used to trigger the device's microphone or camera remotely.
So far, there is no news of an official patch from Samsung, with some researchers releasing a third-party unofficial patch to work around the flaw.
Thu, Dec 13 2012 04:38
| Security, Windows, Microsoft
A vulnerability found in Microsoft's Internet Explorer allows hackers to track the movements of your mouse cursor across the screen, which could in turn reveal data entered on virtual keyboards.
Virtual keyboards and keypads can be used to reduce the chance of a keylogger recording every keystroke and therefore being able to "read" your passwords. However Spider.io discovered that Internet Explorer versions 6 to 10 make it possible for your mouse cursor to be tracked anywhere on screen, even if the IE tab is minimised. You can see a video demonstration of the vulnerability embedded in this post, or you can try it yourself at this link (provided you are browsing with IE).
This particular vulnerability is of concern, because if you use Internet Explorer your mouse movements can be recorded even if you never install any software. A hacker simply needs to buy a display advertising placement on any webpage you visit. As long as the tab with the ad remains open, mouse movements can be tracked.
The analytics company disclosed the vulnerability to Microsoft back in October, but has now gone public. The Microsoft Security Research Centre recognises that there is a vulnerability but has said that there are no immediate plans to patch it. Spider.io says that a number of web analytics companies are already making use of this ability to track cursor movements.
Spider's Douglas de Jager explained to Wired.co.uk that they discovered the issue when looking into ways to measure the position of advertisements on a web page. There are two ways to measure the "viewability" of display advertisements online -- i.e. to check whether the ad slots are placed in a prominent place on the website. (This is because some disreputable publishers have been known to place MPUs and other ad placements outside of the frame of the website so that -- for example -- a video might be playing on repeat out of sight, meaning that the advertiser is paying for views of their video when web users aren't actually able to see them.)
One involves a geometric approach, which compares the position of the four corners of the ad relative to the host webpage and comparing the position of the four corners of the browser's viewpoint relative to the host webpage. A variant of this approach is comparing the ad with the screen edge rather than the host page. This geometric approach doesn't work so well when ads are embedded in "unfriendly" or cross-domain iframes. A second approach involves monitoring browser optimisations: by monitoring how a browser allocates resources to render an ad, you can determine what proportion of the ad is in view -- this is the approach that Spider.io uses.
The Internet Explorer issue arose in the geometric approach that the browser takes, which involves showing the position of the cursor relative to the advertisement and relative to the screen edge -- allowing web analytics companies and potentially hackers to ascertain the cursor position at any point.
In order to glean any meaningful information from this attack, any hacker would need to know what website or application the user was using and the layout of the site. The site would also need to use an onscreen keypad or keyboard to enter sensitive information -- something that ING Direct's online banking service uses.
Tue, Nov 6 2012 06:38
| Security, Andriod
Security firm F-Secure’s latest mobile threat report (for Q3) reports “a whopping 51,447 unique samples” detected in the third quarter, up from 5,033 in Q2 and 3,063 in Q1. The majority of the new Android malware detected by F-Secure in Q3 are designed to “generate profit from SMS sending activities or by harvesting information found on the infected device”, it notes — whereas earlier this year driveby malware was the most prolific. Commenting on Android’s security situation last month, a Google spokesman told me: “We are committed to providing a secure experience for consumers in Google Play.” Mountain View claims its data on Android malware shows a 40 percent decrease in “the number of potentially-malicious downloads from Google Play” between the first and second halves of 2011.
Google takes various measured to tackle malware. Earlier this year, when it introduced its app store scanning system — codenamed Bouncer – Hiroshi Lockheimer, VP of Engineering, Android explained how it worked in a blog post
The service performs a set of analyses on new applications, applications already in Android Market, and developer accounts. Here’s how it works: once an application is uploaded, the service immediately starts analyzing it for known malware, spyware and trojans. It also looks for behaviors that indicate an application might be misbehaving, and compares it against previously analyzed apps to detect possible red flags. We actually run every application on Google’s cloud infrastructure and simulate how it will run on an Android device to look for hidden, malicious behavior. We also analyze new developer accounts to help prevent malicious and repeat-offending developers from coming back.
In addition to scanning for malicious code, Google’s security approach includes Content policies that Android developers must adhere to — also tightened up this summer — along with what it describes as “a multi-layered security model based on user permissions and application sandboxing”. Any apps that violate Google policies are pulled from Google Play — but of course that does not stop them being offered on third party app markets.
F-Secure notes that the release of Android 4.1 Jelly Bean included “a number of exploit mitigation features as part of an ongoing effort to improve security on the platform” (Engadget reported Jelly Bean adoption had reached 1.2 percent of Android phones and tablets as of September).
The Android malware identified by F-Secure is not broken down by app store source — so it’s not possible to determine what proportion comes from the Google Play store. “We can’t produce stats on the amount of malware from Google Play vs elsewhere as most of our samples come via anonymized sources,” Mikko Hypponen, F-Secure’s chief research officer, told TechCrunch.
Sun, Aug 12 2012 09:06
| Security, Scam, iPad
Scam: Cheap iPads advertised and used to lure buyers who are then robbed., sometimes at gun point. The latest scam comes from Uniontown, Fayette County and WTAE has the full story.
Police said two people who tried to buy iPads listed for sale on Craigslist were robbed in Uniontown, Fayette County. In each case, an iPad was being offered at a low price, and the interested buyers were lured for an in-person meeting. "However, when they arrived in Uniontown, they were instead met by armed men who, at that point, robbed them," Police Chief Jason Cox said. The incidents happened on Dunlap and Hickle streets.
Police told Channel 4 Action News investigator Paul Van Osdol that each victim was robbed of several hundred dollars. One was forced at gunpoint to withdraw money from an ATM. "The victims were pretty shaken up, and it was very clear they were totally unaware of what they were walking into," Cox said.
These types of scams appear to be happening all over the U.S. and all over the world too; we have heard reports of similar types of scams, not that long ago in the UK. That particular scam involved iPhone and iPads in sealed boxes which when opened were filled with water bottles or potatoes.
Deals like these are always a tempting way to grab yourself an iPad, iPhone or iPod touch at a knock down price but you must use a bit of common sense; if it sounds too good to be true, it usually is too good to be true so stay well away. If you can’t pass up on a deal, make sure you at least arrange to meet any potential sellers in a very public place, not in a car lot, late at night.
Thu, Jul 12 2012 09:08
| Security, Windows, Software
www.tech-sanity.comMicrosoft is speeding up plans to kill off the Windows Gadget platform after receiving word that serious security vulnerabilities will be disclosed at the upcoming Black Hat security conference.According to a brief abstract from the Black Hat site, researchers Mickey Shkatov and Toby Kohlenberg plan to discuss weaknesses associated with Windows Sidebar and Gadgets and demonstrate
Sat, Feb 4 2012 05:25
Microsoft currently testing its own smartphone, says WSJBy Sam Byford on November 2, 2012 12:51 am Email @345triangle98COMMENTS34LikeTweet140This page has been shared 140 times. View these Tweets.85inShareMicrosoft surprised the world earlier this year when it moved into producing its own computer hardware with the Surface, but the company's plans may not stop there. According to the Wall Street