Feeds

Security > More stories

Spotify

PANDA chomps through Spotify's DRM

Music can be ripped from Spotify using a tool that cracks digital rights management copyright protection, a Georgia Tech University researcher says. Code dubbed Platform for Architecture-Neutral Dynamic Analysis - aka PANDA - posted to GitHub does the job, says researcher Brendan Doln-Gavitt. "[The technique] by itself is just …
Darren Pauli, 4 Jul 2014
Grumpy cat

What do we want? CAT VIDEOS! How do we get them? TOR!

The Onion Router project has fired back at the National Security Agency, after it emerged that those who use the network – and read Linux magazines – are considered worthy of surveillance. Tor's blogged riposte points out that “Just learning that somebody visited the Tor or Tails website doesn't tell you whether that person is a …

Big Java security fixes on the way – but not so fast, Windows XP users

As if running Windows XP after Microsoft withdrew support wasn't risky enough, XP users who have Java installed may soon have even more to worry about. Oracle is due to issue its next Critical Patch Update – the massive, quarterly fix-it fests that deliver security updates across the company's entire product line, including Java …
Syrian electronic army

Hacked Israel Defence Force Twitter account spruiks nuke leak fears

Hacker outfit the Syrian Electronic Army (SEA) hours ago cracked Israel's Defence Force (IDF) Twitter account where it posted a fake warning of a possible nuclear leak due to rocket strikes. The group posted under the IDF (@IDFSpokesperson) account of a "possible nuclear leak in the region after two rockets hit [the] Dimona …
Darren Pauli, 4 Jul 2014
Paul Winchell

Your Android phone is a SNITCH: Wi-Fi bug makes you easy to track

Your mobile device could be compromising your privacy by broadcasting your location history over the air, even when it is in sleep mode, according to new research by the Electronic Frontier Foundation. Of particular concern are newer Android gadgets, specifically those running Android 3.1 "Honeycomb" or later. That version of …

Windows users: You get a patch! And you get a patch! And you get a patch! Everybody gets...

Microsoft has issued its usual warning to admins ahead of this month's Patch Tuesday – and servers are getting some serious fixes. Redmond will be pinging out six parcels of patches; two critical batches, three important and one rated moderate – the latter covering the service bus for Windows Server. But Windows RT, Server 2008 …
Iain Thomson, 3 Jul 2014
NSA parody T-shirt

Use Tor or 'extremist' Tails Linux? Congrats, you're on an NSA list

Alleged leaked documents about the NSA's XKeyscore snooping software appear to show the paranoid agency is targeting Tor and Tails users, Linux Journal readers – and anyone else interested in online privacy. At the heart of the claims is this sample configuration file for the XKeyscore system. The top-secret documents were …
Iain Thomson, 3 Jul 2014
Punk-styled girl with piercing gazes at an apple

Future Apple gumble could lock fanbois out of their own devices

Apple has filed a patent for a new location-sensitive security system which could leave fanbois' fumbling to get into their iDevices if they travel to unusual locations. The patent application describes "location-sensitive security levels and setting profiles based on detected location". It's basically describes a system which …
Jasper Hamill, 3 Jul 2014
Blasphemous Password

You CAN'T bust into our login app's password vault, insists Roboform

Password management company RoboForm has tweaked how the mobile version of its password manager works in response to criticism by a security expert. Yet the firm rejects further criticisms that its technology might easily be circumvented. IT security contractor Paul Moore discovered a pair of what he argues are potentially …
John Leyden, 3 Jul 2014
Evil Android

Oh SNAP! Old-school '80s Unix hack to smack OSX, iOS, Red Hat?

Unix-based systems, as used worldwide by sysadmins and cloud providers alike, could be hijacked by hackers abusing a hard-coded vuln that allows them to inject arbitrary commands into shell scripts executed by high-privilege users. A class of vulnerabilities involving so-called wildcards allows a user to affect shell commands …
John Leyden, 3 Jul 2014
Xbox_baby

AVG: We need laws to stop biz from tracking our kids

The antivirus giant AVG will today call for legislative action to prevent data-grabbers from spying on children. Yuval Ben-Itzhak, the antivirus firm's chief technical officer, will speak at the Child Internet Safety Summit to call for limits on data-gathering on children's devices. AVG is well known for its antivirus software …
Jasper Hamill, 3 Jul 2014

NSA man says agency can track you through POWER LINES

Forensics and industry experts have cast doubt on an alleged National Security Agency capability to locate whistle blowers appearing in televised interviews based on how the captured background hum of electrical devices affects energy grids. Divining information from electrified wires is a known technique: Network Frequency …
Darren Pauli, 3 Jul 2014
Uncov chronicles the failure of Web 2.0

BAE retracts hedge fund hack allegation

BAE Systems Applied Intelligence has retracted allegations of a nasty attack on a hedge fund it floated on Canadian television a couple of weeks ago. The firm today told Bloomberg was just a scenario that it used for “illustrative” purposes. BAE has promised not to scare us all with hypotheticals any more. That promise is all …
bug

Secluded HijackRAT: Monster mobile malware multitool from HELL

Cybercrooks have brewed up a malicious Android app that bundles a raft of banking fraud tricks into a single strain of mobile malware. The Secluded HijackRAT is banking trojan that packs together new and previously unseen tricks, according to net security firm FireEye. The mobile nasty combines private data theft, banking …
John Leyden, 3 Jul 2014
Brazil flag

Brazilian baddies bank Boleto billions

Brazilian bad guys appear to have made an astonishing $US3.75 billion by scraping a tonne of tiny transactions from a popular payment system used by locals, RSA researcher Eli Marcus says. The carders operating a single fraud ring may have netted enough over the last two years to foot 80 percent of Brazil's $4.7 billion World …
Darren Pauli, 3 Jul 2014
Double Facepalm; when one facepalm is not enough.

Google BLOCKS access to Goldman client-leak email

Updated A Goldman Sachs contractor's inadvertent leak of client data through Gmail has brought the banking giant to a New York court to try and force The Chocolate Factory on a search-and-destroy mission - and Google seems to agree with the bank. Reuters says the slip, which sounds to The Register like someone trusted autocomplete in …
Sign outside the National Security Agency HQ

HOLD THE FRONT PAGE: US govt backs mass spying by US govt

The US government's Privacy and Civil Liberty Oversight Board (PCLOB) has dealt a blow to opponents of the NSA's surveillance programs in a new report that reaffirms the controversial Section 702 program. The PCLOB said in its official review of the program that 702 represented a "considerable value" to the government despite …
Shaun Nichols, 3 Jul 2014

Running Cisco's VoIP manager? Four words you don't want to hear: 'Backdoor SSH root key'

Cisco has warned Unified Communications installations can be remotely hijacked by miscreants, thanks to a hardwired SSH private key. In an advisory, the networking giant said unauthenticated attackers can log into its Unified Communications Domain Manager (Unified CDM) software as a root-level user by exploiting a default SSH …
Shaun Nichols, 2 Jul 2014
A boat full of Fail

Travel website Hotel Hippo yanked offline after data leaks spotted

Travel website Hotel Hippo is closed for business after an infosec bod spotted gaping security flaws which could allow hackers to snoop through customers' booking details. Information security consultant Scott Helme contacted The Register to discuss the security lapse, which could come in very handy for burglars who want to see …
Jasper Hamill, 2 Jul 2014

Cybercrooks breed SELF-CLONING MUTANT that STEALS your BANK DETAILS

Cybercrooks have put together a botnet client which bundles in worm-like functionality that gives it the potential to spread quickly. Seculert warns that the latest version of the Cridex (AKA Geodo) information stealing Trojan includes a self-spreading infection method. Infected PCs in the botnet download a secondary strain of …
John Leyden, 2 Jul 2014
blogspot

MONSTER COOKIES can nom nom nom ALL THE BLOGS

Giant cookies could be used to create a denial of service (DoS) on blog networks, says infosec researcher Bogdan Calin. Such an attack would work by feeding users cookies with header values so large that they trigger web server errors. Calin created a proof of concept attack against the Google Blog Spot network after a customer …
Darren Pauli, 2 Jul 2014
EMET

Redmond's EMET defense tool disabled by exploit torpedo

Microsoft's Enhanced Mitigation Toolkit (EMET) tool can be deactivated andbypassed according to Offensive Security researchers. The exploit struck dead the latest standard and updated version 4.1 of EMET designed to make attacks more complex and expensive through the use of Address Space Layout Randomisation and Data Execution …
Darren Pauli, 2 Jul 2014
Wifi grumpy cat

Sydney wallows in cesspit of WiFi obsolescence and ignorance

Sophos has brought its Raspberry-Pi-powered World of Warbiking WiFi-sniffing peloton to Sydney and found, as it does everywhere around the world, that some people just can't be bothered with WiFi security. The Word of Warbiking sees Sophos' head of security research James Lynbe strap a Pi and various WiFi cards to his bicycle …

EFF sues NSA over snoops 'hoarding' zero-day security bugs

Intelligence agencies are among the most prolific buyers of zero-day computer security flaws that can be used to spy on enemies foreign and domestic, or so it's claimed – and the Electronic Frontier Foundation (EFF) has launched a lawsuit to find out what exactly they are doing with them. "Since these vulnerabilities potentially …
Iain Thomson, 2 Jul 2014
Buncefield fire scene

Sorry, chaps! We didn't mean to steamroller legit No-IP users – Microsoft

Updated Microsoft has admitted that it did disrupt a significant number of legitimate users of No-IP's dynamic DNS service, but says the problem is now sorted out. "Yesterday morning, Microsoft took steps to disrupt a cyber-attack that surreptitiously installed malware on millions of devices without their owners' knowledge through the …
Iain Thomson, 1 Jul 2014

'I don't want to go on the cart' ... OpenSSL revived with survival roadmap

The OpenSSL project, having suffered sharp criticism following the revelation of a string of serious security vulnerabilities, has published a roadmap explaining how it plans to address users' concerns. "The OpenSSL project is increasingly perceived as slow-moving and insular," the intro to the document states. "This roadmap …
3-rotor WWII Enigma

Microsoft thumbs nose at NSA, hardens crypto for Outlook, OneDrive

Microsoft has flipped the switch to activate stronger encryption on its OneDrive and Outlook.com cloud services as part of a broader effort to make it harder for the NSA and other spying agencies to snoop on its customers' data. Specifically, Outlook.com now supports TLS encryption on all connections to its servers, both …
Picard Facepalm

PayPal says sorry: Fat fingers froze fundraiser for anti-spy ProtonMail

PayPal has lifted its embargo on ProtonMail, the Swiss startup raising funds via Indiegogo to build a communications system hardened against surveillance. The payment giant claims the account freeze wasn't a matter of policy, but a simple cock-up. We are happy to announce that @PayPal has restored our account access. Thanks …
Iain Thomson, 1 Jul 2014

New NSA boss plays down impact of Snowden leaks

Incoming NSA chief Admiral Michael Rogers has played down the impact of the Snowden revelations on the spy agency's work. Former NSA director, General Keith Alexander, described the Snowden leaks as one of the worst breaches in intelligence history. UK spy agency bosses at GCHQ and MI6 told a Parliamentary inquiry back in …
John Leyden, 1 Jul 2014
turbine

Deja-vu alert: Russian hackers target US, Euro energy giants

You may be wondering where our coverage is on the "Dragonfly" malware used by mystery Russia-based hackers to target European and US-based energy companies. This is big in the news just now, following a recent announcement by security firm Symantec. But in fact it had previously been discussed - getting rather less take up - by …
Team Register, 1 Jul 2014
Dunce

GCSE Computing teachers cry victory as board decides NOT to bin tech teens' work

Frustrated GCSE Computing teachers who battled against OCR's shambolic handling of cheating claims say they are relieved to see the awarding body has finally reached a "common sense" decision on the matter. The exam board, which is part of Cambridge Assessment, had backtracked on an earlier notice that had said that it had …
Kelly Fiveash, 1 Jul 2014

Iraq civil war: You can fight with an AK-47 ... or a HOME-COOKED Trojan

Iraq's bloody civil war has spilled over onto the internet, notes a researcher that has spotted a large increase in cyber-espionage tools and other forms of malware. Members of the Islamic State of Iraq and al-Sham (ISIS) group have made extensive use of social media to spread slickly produced propaganda as an accompaniment to …
John Leyden, 1 Jul 2014
Random numbers

MIT and CERN's secure webmail plan stumped by PayPal freeze

The Proton Mail project, which offers end-to-end encrypted webmail from the user's browser, has had a stick thrust into its operational spokes courtesy of PayPal. The MIT-and-CERN-inspired project, based on Switzerland, had decided against VC funding for reasons of credibility among users. Instead, it relies on users willing to …
Canada Day celebration

Redmond reinstates infosec mailing list after Canadian law panic

Microsoft has resurrected its Lazarus security mailing list, following apparent confusion over Canada's Anti-Spam Law (CASL) that came into effect on July 1st. Redmond reversed an announcement Friday that it would shutter the Advanced Notification Service mailing list which would have forced email fans to get their infosec fix …
Darren Pauli, 1 Jul 2014
Angry woman on mobile

Anti-snoop Android 'Blackphone' sees the light of day

The “Blackphone”, a super-secure Android handset promised to arrive in late June has just made its deadline, with the announcement that the first batch started to ship on the last day of the month. The handset is the brainchild of Spanish smartphone maker Geeksphone and Silent Circle, a secure communications firm founded by …

Microsoft's anti-malware crusade knackers '4 MILLION' No-IP users

Microsoft has won a court order to gain control of 23 No-IP domains owned by dynamic DNS (DDNS) provider Vitalwerks Internet Solutions. The US software giant claimed the domains were being used by malware developed in the Middle East and Africa. Vitalwerks operates its No-IP DDNS service from Nevada, and there is no suggestion …
Iain Thomson, 1 Jul 2014

Apple ships security fixes for iOS, OS X, Safari ... basically EVERYTHING

Apple on Monday shipped new versions of its operating systems, its web browser, and Apple TV firmware – with each update a minor release aimed at fixing bugs and closing security vulnerabilities. The latest release of OS X Mavericks, version 10.9.4, addresses a total of 19 vulnerabilities in a variety of OS subsystems, ranging …
Neil McAllister, 30 Jun 2014
Android 4.1 Jelly Bean

Using Android 4.3? Don't let malware snatch your private login keys

If you're one of the 10.3 per cent of Android users running version 4.3, aka Jelly Bean, your login keys are at risk of theft – thanks to a vulnerability in the operating system's KeyStore software. KeyStore, as the name suggests, stores a user's cryptographic keys, which are used by apps to log into services without the user …
Iain Thomson, 30 Jun 2014
snowden SXSW

Remaining Snowden docs will be released to avert 'unspecified US war' – ‪Cryptome‬

All the remaining Snowden documents will be released next month, according t‪o‬ whistle-blowing site ‪Cryptome, which said in a tweet that the release of the info by unnamed third parties would be necessary to head off an unnamed "war".‬ ‪Cryptome‬ said it would "aid and abet" the release of "57K to 1.7M" new documents that had …
John Leyden, 30 Jun 2014

Application delivery controllers tighten the security perimeter

The application and data landscape today is in something of a state of flux. Of course, information technology is always in a state of flux but this is a new kind of dynamism. The current network IT stack is a heady concoction of old apps on new infrastructures and data-delivery mechanisms. Serve that up on new devices in a BYOD …
DDoS image

London teen charged over Spamhaus mega-DDoS attacks

An unnamed London teenager has been charged with a series of criminal offences following a series of denial-of-service attacks against internet exchanges and the Spamhaus anti-spam service last year. The 17-year-old male from London was charged on Friday and faces computer misuse, fraud and money-laundering offences at a hearing …
John Leyden, 30 Jun 2014
 Dummy hand grenades are used by the Marines from the 3rd Low Altitude Air Defense Battalion, for practice before throwing the M-67 Fragment Grenades at the firing range.jpg

Dropbox used as command and control for Taiwan time bomb

A remote access trojan (RAT) is using Dropbox for command and control in a targeted attack against the Taiwanese Government, malware analyst Maersk Menrige says. The upgraded PlugX RAT is the first targeted attack to use Dropbox to update command and control settings, Menrige said, as distinct from other malware and ransomware …
Darren Pauli, 30 Jun 2014