Darren Pauli

Contact Mail Follow Twitter RSS feed

Hardened Linux stalwarts Grsecurity pull the pin after legal fight

The gurus behind the popular and respected Linux kernel hardening effort Grsecurity will stop providing free support for their stable offering. In future, only paying sponsors will get stable patches to shore up their kernels' defenses. The public stable patches will not be distributed beyond the next two weeks in response to …
Darren Pauli, 27 Aug 2015

Malware menaces poison ads as Google, Yahoo! look away

Feature Online advertising has become an increasingly potent threat to end-user security on the internet. More hackers than ever are targeting the internet's money engine, using it as a powerful attack vector to hide exploits and compromise huge numbers of victims. Malvertising, as poisoned ads are known, is as deadly as it is diverse …
Darren Pauli, 27 Aug 2015

FireEye intern VXer pleads guilty for Darkode droid RAT ruse

A former FireEye intern has pleaded guilty to creating and selling the Dendroid malware on the raided Darkode criminal forum. Morgan Culbertson, 20, of Pittsburgh, pleaded guilty before a Pittsburgh federal judge and faces sentencing 2 December. He faces a maximum of 10 years prison and a $250,000 fine, and has no prior …
Darren Pauli, 27 Aug 2015

Boffins promise file system that will NEVER lose data

Six MIT research boffins have demonstrated a system capable of recovering all data in the event of a crash that was previously constrained to high-end theory. The team will October showcase the first albeit slow file system "mathematically guaranteed" to not lose data during crashes. Authors Haogang Chen; Daniel Ziegler; Tej …
Darren Pauli, 26 Aug 2015

Devs are SHEEP. Which is good when the leader writes secure code

Programmers with security chops are seen as more productive and influential workers whom other coders strive to emulate, according to security researchers from North Carolina State University and Microsoft Research. A sextet of security researchers has produced a trio of studies on the topic, finding that programmers are …
Darren Pauli, 26 Aug 2015

Carders fleece $4.2 million from Victoria's MyKi transport agency

Scammers have inflicted some AUD$4.2 million in damages of damage to Public Transport Victoria (PTV) by buying and selling MyKi travel cards loaded with cash stolen from credit cards. The agency in the southern Australian state coughed up the dough to international credit card holders whose cards were fleeced. MyKi cards are …
Darren Pauli, 25 Aug 2015

Gored Ashley Madison love nest stumps up $500k for hackers' heads

The much-hacked and hated sexual sin-bin Ashley Madison is offering $500,000 Canadian Dollars (US$377,000) to anyone who can provide information leading to the arrest of the those behind its hacking. Records on some 30 million members of the online hoping-for-adultery site were leaked in the hack, along with internal emails …
Darren Pauli, 25 Aug 2015

Body-worn cameras a 'Pandora's Box' says ex Vic Police chief Nixon

Gartner: The Former police commissioner for the Australian state of Victoria, Christine Nixon, says body-worn cameras are a 'Pandora's Box' that cause more problems than they fix. Body-worn cameras are being used, or trialled, by police forces in all six Australian states and are widely used or contemplated around the world. …
Darren Pauli, 25 Aug 2015

Hacker slaps Dolphin, Mercury browsers, squirts zero day

Mobile security guy Rotologix has popped two popular not-Chrome not-Firefox Android browsers, gaining the power to commit remote code execution using zero-day flaws. The holes affect Dolphin Browser and Mercury Browser which have something in the realm of 100 million and one million installs respectively. For comparison …
Darren Pauli, 24 Aug 2015

Even 'super hackers' leave entries in logs, so prepare to drown in data

Gartner: Super hackers basically don't exist, your incident response plan sucks, and you should relish the opportunity to drown in data: such are the lessons from incident response fanatic Anton Chuvakin. The analyst, physicist, and former director of Security Warrior Consulting gave delegates of the Gartner Security and Risk …
Darren Pauli, 24 Aug 2015

High-heeled hacker builds pen-test kit into her skyscraper shoes

MILDLY NSFW A Chinese hardware hacker has hidden a penetration-testing toolkit into her high-heeled shoes. The Wi-Fi-popping platforms were forged in a 3D printer, and contain compartments to smuggle hacking hardware past strict security checks in data centres and the like, and later retrieved. The hacker and pen-tester, who goes by the …
Darren Pauli, 24 Aug 2015

Telstra News spews banking trojan after malvertising attack

Australia's dominant telco, Telstra, has been serving one of the world's most dangerous hacking tools after its news site was infected with malvertising. Malwarebytes researcher Jerome Segura says the attackers were likely dropping the Tinba trojan, considered to be the world's smallest malware by file size at about 20kb and …
Darren Pauli, 24 Aug 2015

NASA reveals Cassini probe's last glimpse of Saturn's icy moon Dione

NASA has released images from the Cassini probe's last fly-by of Saturn's moon Dione. The August 17 encounter captured Dione's icy pockmarked landscape from a distance of 474 kilometres above the moon's surface. Cassini came within 100km of Dione in December 2011. The images offer another look at the haunting moon and were …
Darren Pauli, 21 Aug 2015

Geeks on quest for world's most pointless YouTube video

Four tech geeks are seeking the most useless, unpopular, waste-of-space YouTube videos as part of an international competition, dubbed NoTube. The online contest, hosted in Switzerland, seeks to find videos on the mammoth Google video attic that make a mockery of YouTube's user-created content slogan 'broadcast yourself'. …
Darren Pauli, 21 Aug 2015

Blue Termite hacker group eating Japanese business from within

Kaspersky researcher Suguru Ishimaru says an advanced threat group is breaking convention and hacking high-end Japanese industries from within the country. The group is popping the kind of targets sophisticated groups prefer, such as government agencies, financial firms, and manufacturing organisations. Ishimaru says the …
Darren Pauli, 21 Aug 2015

Unholy Hong Kong hackers hit evangelicals with IE 0day

Hackers are already using an Internet Explorer vulnerability disclosed this week to hack members of an evangelical church. The attackers compromised the website of the Evangelical Lutheran Church of Hong Kong, injecting a malicious iFrame that redirects the faithful to a malicious website sporting the Internet Explorer …
Darren Pauli, 21 Aug 2015

iOS storing enterprise credentials in directory anyone can read

Security bod Kevin Watkins says Apple is storing enterprise credentials in a readable-by-anybody directory that is ripe for data theft. The sandbox vulnerability (CVE-2015-3269) affects all apps that use the managed app configuration setting in devices that have not applied the most recent iOS 8.4.1 update. Watkins says …
Darren Pauli, 21 Aug 2015

Activist pens pirate's map to 'liberating' academic journals

The cause of those who feel that information wants to be free, and that academic research should always be, have a new tool: a guide to defeating tracking traps that could identify document leakers. An activist using the alias Storm Harding (@StormHarding) told the Chaos Communications Camp in Zehdenick, Germany, his "purely- …
Darren Pauli, 20 Aug 2015

Net scum respect their elders so long as it leads to p0wnage

Net scum are employing both cool new attacks like the Angler exploit kit and oldies-but-goodies such as macroviruses in their undergoing something of a generational clash, with Cisco reporting both Word macros and the sophisticated Angler exploit kit are the most popular attack vectors this year. Blackhats dumped macros as an …
Darren Pauli, 20 Aug 2015

Holes found in Pocket Firefox add-on

Information security man Clint Ruoho has detailed server-side vulnerabilities in the popular Pocket add-on bundled with Firefox that may have allowed user reading lists to be populated with malicious links. The since-patched holes were disclosed July 25 and fixed August 17 after a series of botched patches, and gave attackers …
Darren Pauli, 20 Aug 2015

Google reveals OnHub WiFi router, complete with GLOWING RING

Google will shortly release its first WiFi router and has made automatic updating a frontline feature. The new "OnHub" is designed to offer a rather more pleasant experience for home users, starting with a cute coffee cup form factor and extending to an app-driven user interface. Google's even banished blinking lights [Heresy …
Darren Pauli, 19 Aug 2015

Microsoft drops rush Internet Explorer fix for remote code exec hole

Microsoft has released an out-of-band patch for Internet Explorer versions 7 through 11, to close a dangerous remote code execution flaw allowing attackers to commandeer machines. The attack will be a highly useful tool in hacker arsenals likely allowing them to build powerful phishing, watering hole, and malvertising …
Darren Pauli, 19 Aug 2015

Anti-botnet initiatives USELESS in sea of patch-hating pirates

Three Dutch researchers have crunched data gleaned from efforts to battle the Conficker bot and declared anti-botnet initiatives all but useless for clean up efforts. Conficker was born in 2008 spreading aggressively through a since patched remote code execution Microsoft vulnerability (MS08-067) that affected all operating …
Darren Pauli, 18 Aug 2015

Veedub flub hubbub stubs car-jack hack flap

Dutch and British researchers Roel Verdult and Baris Ege, the duo behind the revelation that many VW cars have a security flaw, have now revealed that Ferraris, Maseratis, Pontiacs, and Porches that use Megamos Crypto transponders can be stolen. The duo demonstrated how the Megamos engine immobiliser, which unlocks when an …
Darren Pauli, 18 Aug 2015

Ransomware blueprints published on GitHub in the name of education

Turkish security bod Utku Sen has published what appears to be the first openly available source code for ransomware – free for people to use and spread. The "Hidden Tear" ransomware, available to GitHub, is a functional version of the malware the world has come to hate; it uses AES encryption to lock down files and can …
Darren Pauli, 18 Aug 2015

Ten years after the Samy worm its discoverer's voice is lost in the din

It has been 10 years since Sydney security bod Wade Alcorn disclosed how cross-site scripting vulnerabilities could be weaponised, a revelation that would one week later see the proof of concept become the fastest-spreading worm ever. There is no direct link between Alcorn's disclosure and Samy Kamkar's eponymously named worm …
Darren Pauli, 17 Aug 2015

Adobe pays US$1.2M plus settlements to end 2013 breach class action

Adobe has paid an undisclosed amount to settle customer claims and faces US$1.2 million in legal fees after its 2013 data breach which compromised the details of 38 million users. The creative content king was served a November 2013 class action lawsuit filed in California in which it is claimed "shoddy" security practises …
Darren Pauli, 17 Aug 2015

Choc Factory patches zero day Google for Work hack hole

Google has patched a vulnerability in the Google Admin application that could allow attackers to steal enterprise accounts. MWR Labs researcher Rob Miller reported the sandbox-hopping hole, rated medium severity, which can be exploited by malware residing on a user's device. The flaw can be used to steal Google for Work …
Darren Pauli, 17 Aug 2015

Boffins nail 2FA with 'ambient sound' login for the lazy

Internet users who think two taps on a smartphone is two taps too much may soon be able to use seamless second factor authentication that verifies a person is in possession of their phone by matching ambient noise sound prints. Researchers Nikolaos Karapanos, Claudio Marforio, Claudio Soriente, and Srdjan Capkun of the …
Darren Pauli, 17 Aug 2015

Facebook hands hackers $100k for breaking browsers

Four researchers have scored US$100,000 from Facebook for revealing 11 bugs affecting platforms including the Chrome and Firefox browsers using novel vulnerability discovery methods. The Georgia Institute of Technology team of PhD students Byoungyoung Lee and Chengyu Song, and professors Taesoo Kim and Wenke Lee discovered the …
Darren Pauli, 14 Aug 2015

Gazan medico team 3D-prints world-leading stethoscope for 30c

Tarek Loubani, an emergency physician working in the Gaza strip, has 3D-printed a 30 cent stethoscope that beats the world's best $200 equivalent as part of a project to bottom-out the cost of medical devices. Loubani together with a team of medical and technology specialists designed the stethoscope and tested it against …
Darren Pauli, 14 Aug 2015

John McAfee launches cert authority but it's got a POODLE problem

Eccentric infosec man John McAfee is now the proprietor of a Certificate Authority named BlackCert. Fresh from a shootout friendly discussion with police over drug and firearm possession, the one-time anti-virus boss has made what is badged as a disruptive play into SSL. BlackCert will offer unlimited use of SSL certificates …
Darren Pauli, 13 Aug 2015

Malvertising set to wreak one BEELLION dollars in damage this year

Records have fallen as malvertising clocked its most prolific month in history, making it one of the biggest threats to endpoint security. If the scourge continues, criminals will have inflicted a billion dollars in damages by the end of the year from a paltry US$12,000 investment, according to researchers at security firm …
Darren Pauli, 13 Aug 2015

Blacklists miss 90% of malware blogged IP love

Threat intelligence firm RecordedFuture says popular web blacklists are missing thousands of IP addresses linked to malware data theft. The Massachusetts company, which boasts it's scored four out of five "top companies in the world" as clients, says correlating IP addresses to malware references yields between a thousand and …
Darren Pauli, 12 Aug 2015

Thirty five Flash Player holes plugged (and there's one quick fix)

Adobe has patched 35 security vulnerabilities in its Flash Player, all but one of which could lead to unexpected code execution. The fixes relate to vulnerabilities including 15 use-after-free, eight memory corruption, and five type confusion bugs. There are five code execution flaws relating to buffer overflows and a lone …
Darren Pauli, 12 Aug 2015

TXT message leaves Corvette wrecked

Four University of California researchers have popped aftermarket vehicle tracking devices used by insurance companies to hijack the brakes, steering, and locks of a Corvette with little more than a text message. The hack targets Mobile Device telematic control units (TCUs) used by Uber and US insurer Metromile which, when …
Darren Pauli, 12 Aug 2015

Dying cipher suites are stinking up TLS with man-in-the-middle vulns

Crypto-researchers have reported bad smells from TLS, the protocol used to provided encrypted HTTPS connections and such like. In particular, there's a strong pong coming from older cipher suites that put netizens at risk of full-blown interception. Researchers Clemens Hlauschek, Markus Gruber, Florian Fankhauser, and …
Darren Pauli, 11 Aug 2015

Five-star Flash phish filched from Hacking Team targets bigwigs

The DarkHotel global advanced threat actor group is targeting suit-wearing types with an old-school HTML application stuffed with the Adobe Flash exploit borrowed from stolen Hacking Team data. The flaws were quickly patched after the Hacking Team goring in July, but DarkHotel appears to have started targeting the exploits …
Darren Pauli, 11 Aug 2015
Bookshelf in the British Library basement

Borg blacklist assimilates Cryptolocker domain name generators

Cisco has developed a means to accurately identify the fleeting pop-up domains used by some of the world's worst malware. The platform builds a reputation score that is in part based on word sources including more than 60 dictionaries, Census data and Alexa top 1000 domains. Using multiple sources helps to identify the …
Darren Pauli, 10 Aug 2015
Android icon desktop toys

HTC caught storing fingerprints AS WORLD-READABLE CLEARTEXT

Four FireEye researchers have found a way to steal fingerprints from Android phones packing biometric sensors such as the Samsung Galaxy S5 and the HTC One Max. The team found a forehead-slapping flaw in HTC One Max in which fingerprints are stored as an image file (dbgraw.bmp) in a open "world readable" folder. "Any …
Darren Pauli, 10 Aug 2015

Facebook unleashes mighty data trove to learn how you laugh

Facebook data scientists Udi Weinsberg, Lada Adamic, and Mike Develin say most social media addicts will write 'haha' once a week, that New Yorkers are emoji addicts, and none uses 'lol' anymore. The awesome demonstration of big data rigs at The Social NetworkTM uses a regular expressions set to crawl over an unspecified …
Darren Pauli, 10 Aug 2015

Hack like HammerToss: Students spin social media into data siphons

A sextet of security students have released a tool that spins social media networks into stealthy data siphons, a technique already in use by an elite Russian hacking group. The tool released at BSides Las Vegas this week helps hackers emulate the data pillaging tactics of the HammerToss crime group. FireEye last week …
Darren Pauli, 07 Aug 2015

Crackpot hackpots pop top of GasPots

Blackhat 2015: Trend Micro researchers Kyle Wilhoit and Stephen Hilt believe they've found attackers actively seeking to hack and shut down petrol stations. The duo from the forward-looking research team find the attacks by establishing simulated petrol station monitoring systems around the world as honeypots. Wilhoit and Hilt had earlier …
Darren Pauli, 07 Aug 2015

Slippery Windows Updates' SOAP bubbles up SYSTEM priveleges

Blackhat 2015: Microsoft has bungled Windows Server Update Services (WSUS), according to hackers Paul Stone and Alex Chapman, with insecure defaults that let them hijack OS updates. Attackers that have previously gained admin privilege on a target system can elevate themselves to system-level access by skipping the normal signed update …
Darren Pauli, 07 Aug 2015
Ben Mezrich, Once Upon a Time in Russia: The Rise of the Oligarchs and the Greatest Wealth in History

Global cybercrime fraud boss ran secret pro-Moscow intel sorties

Black Hat 2015 The elusive head of one of the world's most successful online criminal gangs wanted by the FBI was quietly using the Gameover Zeus banking trojan for political espionage inline with Russian interests and may have the protection of Moscow, researchers contend. Evgeniy Mikhailovich Bogachev, better known online as Slavik, has …
Darren Pauli, 06 Aug 2015

Chinese gang shoots down aerospace security with MSFT flaws

Black Hat 2015 An alleged Chinese advanced hacking group has been found cherry-picking data from high-profile governments and corporations, p0wning many within six hours according to Dell researchers. The group, codenamed TG-3390 or Panda Emissary, is thought to operate from China and have an appetite for defence-related aerospace projects …
Darren Pauli, 06 Aug 2015

Researchers make SHODAN of the skies to probe internet-of-things

A clan of security geeks are flying a ZigBee-sniffing drone to map online internet-of-things things universe in what they hope will be the SHODAN of electronic junk. The project run by a team at the Texas-based firm Praetorian is being conducted in researchers' free time and hopes to explore the functionality and security …
Darren Pauli, 05 Aug 2015

Terracotta: The Chinese VPN that hides Beijing's hackers with pwned biz

BlackHat A China-based virtual private network (VPN) provider is powering some of the world's most capable hacking crews by selling infrastructure access stolen from at least 30 hacked businesses, RSA says. The company, which RSA codenamed 'Terracotta VPN', claims to have 1500 mostly-Windows nodes from 300 organisations distributed …
Darren Pauli, 05 Aug 2015

John McAfee cuffed by Tennessee cops, faces drug-driving, gun rap

Pic Paranoid wild man of infosec John McAfee was arrested in the US state of Tennessee over the weekend – and charged with driving under the influence, and possession of a handgun while intoxicated. The charismatic ex-boss of security software biz McAfee can be seen grinning in his police mugshot. "Yes, I was arrested while under …
Darren Pauli, 05 Aug 2015
Vulture Velo cycling jersey

The Register WHEELY needs YOU to help raise charity funds

The biggest event on Sydney's cycling calendar is the annual "Gong Ride", a 90km trip from Sydney to Wollongong. And this year, The Register wants you to join Australian editor Simon Sharwood on the ride, to help raise funds for MS Australia. We're putting our lycra where our mouth is: Vulture South convinced the operators of …
Darren Pauli, 04 Aug 2015