John Leyden

Contact Mail Follow Twitter RSS feed
GHOST vulnerability

Open-source software supply chain vulns have doubled in 12 months

Use of vulnerable open source components has doubled over the last year despite their role in the high profile Equifax mega-breach. Sonatype’s fourth annual Software Supply Chain Report, published on Tuesday (available here, registration required), revealed a 120 per cent rise in the use of vulnerable open source components …
John Leyden, 25 Sep 2018
Tilted glass with milk lying on a table

Aggregate this: NewsNow has spilt a bunch of 'encrypted' passwords

Updated UK aggregator NewsNow has suffered a breach resulting in the leak of users' "encrypted" passwords. Word of the breach surfaced through reports to security consultant Troy Hunt, who runs the Have I Been Pwned service. Data breach at @NewsNowUK pic.twitter.com/6j1b03x4Fp — Troy Hunt (@troyhunt) September 24, 2018 The breach …
John Leyden, 25 Sep 2018
Ruth Bourne in front of reconstructed Bombe [photo credit: Charles Coultas]

WWII Bombe operator Ruth Bourne: I'd never heard of Enigma until long after the war

Interview El Reg had the honour of speaking with a war hero last Friday when the UK's National Museum of Computing fired up its replica Enigma code-breaker to decrypt messages sent from Poland. Ruth Bourne was among hundreds of Wrens who worked on the front line of code-breaking on 200 or so Bombe machines1 at sites in and around …
John Leyden, 25 Sep 2018
Encryption

Bug? Feature? Power users baffled as BitLocker update switch-off continues

Three months on, users continue to report that Microsoft's BitLocker disk encryption technology turns itself off during security updates. The problem, which has prompted much head-scratching in security circles, was raised by power user "kingcr" on Microsoft's technet forums back in June as part of an ongoing discussion. He …
John Leyden, 25 Sep 2018
Enigma machine Shutterstock

Enigma message crack honours pioneering Polish codebreakers

The Bombe team at The National Museum Of Computing (TNMOC) has succeeded in breaking an Enigma-encrypted message in a live Poland-to-England demo. The demonstration was described by TNMOC as a tribute to Polish cryptographers and wartime Bletchley Park staff. The reconstructed Turing-Welchman Bombe at TNMOC in Bletchley Park …
John Leyden, 21 Sep 2018

Scottish brewery recovers from ransomware attack

Updated Staff at Arran Brewery were locked out of its computer systems this week following a ransomware attack. The attack against the Isle of Arran-based Scottish beer maker appears to have been a targeted strike. Prior to the infection, adverts for an already filled finance post at the brewery were placed on recruitment sites …
John Leyden, 21 Sep 2018
You can't fight in here, this is the war room!

NSS Labs sues antivirus toolmakers, claims they quietly conspire to evade performance tests

NSS Labs has thrown a hand grenade into the always fractious but slightly obscure world of security product testing – by suing multiple vendors as well as an industry standards organisation. Its lawsuit, filed in California this week against CrowdStrike, Symantec, ESET, and the Anti-Malware Testing Standards Organization ( …
John Leyden, 20 Sep 2018
Lloyd's Horse logo on building

Sealed with an XSS: IT pros urge Lloyds Group to avoid web cross talk

A pair of IT workers have criticised banks within the Lloyds Banking Group (LBG) for substandard security. The group denies anything is amiss, maintaining it follows industry best practice on cyber-security. Each of the three LBG banks – Lloyds, Halifax, and Bank of Scotland – has implemented transport layer security by …
John Leyden, 20 Sep 2018
Network scientists

Patch for EE's 4G Wi-Fi mini modem nails local privilege escalation flaw

Telco EE's Mini Wi-Fi modem needs to be updated with a recently issued patch. A local privilege escalation vulnerability in the Alcatel-manufactured tech, discovered by ZeroDayLab, could be used to plant malware or steal info from Windows computers that use the kit for internet connectivity, the researchers warned. This …
John Leyden, 19 Sep 2018

Why waste away in a cubicle when you could be a goddamn infosec neuromancer on £50k*?

The UK government is expanding a programme that aims to get more Brits to consider careers in information security. The Cyber Skills Immediate Impact Fund (CSIIF) pilot, launched in February 2018, resulted in the selection of seven schemes that intend to increase diversity and widen the net in recruiting for the field. The …
John Leyden, 19 Sep 2018

Oh Smeg! Hacked white goods maker resurfaces after system shutdown

The Brit limb of unfortunately named and reassuringly expensive domestic appliance maker Smeg is up on its feet again after being hacked. The firm said yesterday it was "back up and running" after an "unfortunate cyber attack" that hit Wednesday 12 September. Important notice for Smeg UK customers: pic.twitter.com/XbBfWuZGHz …
John Leyden, 18 Sep 2018
couple watches tv.

TV Licensing admits: We directed 25,000 people to send their bank details in the clear

The UK's TV Licensing agency has admitted that 25,000 viewers were induced into sending their bank details over an insecure connection. tv television cable cableco entertainment netflix hbo HTTPS crypto-shame: TV Licensing website pulled offline READ MORE The organisation ran transactional pages for bank debits through an …
John Leyden, 18 Sep 2018
Composite image. Image by Syda Productions https://www.shutterstock.com/g/Syda+Productions

Check out this link! It's not like it'll crash your iPhone or anything (Hint: Of course it will)

Apple iPhones, iPads, and Mac computers that stray onto websites with malicious CSS code, while using Safari, can crash or fall over – due to a flaw in the web browser. The WebKit rendering engine vulnerability can be triggered by just a few lines of code in a cascading style sheet (CSS). On iOS devices, at least, it all …
John Leyden, 17 Sep 2018
Suitcases

Brit airport pulls flight info system offline after attack by 'online crims'

Bristol Airport deliberately yanked its flight screens offline for two days over the weekend in response to a cyberattack. Techies took down computer-based flight information systems at the airport in provincial England between Friday morning and the wee hours of Sunday morning. The electronic screens were replaced by …
John Leyden, 17 Sep 2018
university students hanging out

Who's hacking into UK unis? Spies, research-nickers... or rival gamers living in res hall?

Who's hacking into university systems? Here's a clue from the UK higher education tech crew at Jisc: the attacks drop dramatically during summer break. A new study from Jisc (formerly the Joint Information Systems Committee) has suggested that rather than state-backed baddies or common criminals looking to siphon off academic …
John Leyden, 17 Sep 2018
Sceptic wears an incredulous expression, scrunches eyes

Veeam holds its hands up, admits database leak was plain 'complacency'

Veeam has blamed "human error" for the exposure of a marketing database containing millions of names and email addresses. The unencrypted MongoDB resource was left open for anyone to view after a migration between different AWS systems, Peter McKay, co-CEO and president at Veeam, told The Register. The resource – which wasn't …
John Leyden, 14 Sep 2018
three execs worried in office

Kernel sanders: Webroot vuln creates route to root Macs

Details of a locally exploitable but kernel-level flaw in Webroot's SecureAnywhere macOS security software were revealed yesterday, months after the bug was patched. panic Webroot antivirus goes bananas, starts trashing Windows system files READ MORE The fact that the memory corruption bug (CVE-2018-16962) is locally …
John Leyden, 14 Sep 2018

You'll never guess what you can do once you steal a laptop, reflash the BIOS, and reboot it

Video If you can steal someone's laptop, leave it switched on in sleep mode, crack it open, hook up some electronics to alter settings in the BIOS firmware, restart it, and boot into a custom program... you can swipe crypto keys and other secrets from the system. When computers are restarted, the motherboard firmware can wipe the …
John Leyden, 14 Sep 2018
Man vs paperwork. Paper-pusher loses control. Photo by Shutterstock

Back up a minute: Veeam database config snafu exposed millions of customer records

A misconfigured server at data recovery and backup firm Veeam exposed millions of email addresses. Close up of tangled tape Reel talk: You know what's safely offline? Tape. Data protection outfit Veeam inks deal with Quantum READ MORE Security researcher Bob Diachenko discovered the 200GB cache of email addresses, names and …
John Leyden, 12 Sep 2018
Photo by Kaspars Grinvalds / Shutterstock

2-bit punks' weak 40-bit crypto didn't help Tesla keyless fobs one bit

Video Boffins have sprung the bonnet on the weak crypto used in the keyless entry system in Tesla's Model S car. Researchers from the Computer Security and Industrial Cryptography (COSIC) group – part of the Department of Electrical Engineering at Belgian university KU Leuven – were able to clone a key fob, open the doors, and drive …
John Leyden, 12 Sep 2018

Law firm seeking leak victims to launch £500m suit at British Airways

British Airways faces a £500m lawsuit over its recent mega-breach that exposed payment card details of 380,000 customers. The airliner last week apologised and offered to compensate customers for any direct financial loss for the attack that took place between 21 August and 5 September via its website and app. However, an …
John Leyden, 11 Sep 2018
British Airways website

British Airways hack: Infosec experts finger third-party scripts on payment pages

Security experts are debating the cause of the British Airways mega-breach, with external scripts on its payment systems emerging as a prime suspect in the hack. Why infosec folk think it was the payment system Although BA hasn't disclosed the root of the breach, the unusual precision it ascribed to the hack's duration …
John Leyden, 11 Sep 2018
wifi

Register-Orbi-damned: Netgear account order irks infosec bods

Netgear has irked some security pros by demanding people register accounts before they can use a mobile app to control their Orbi mesh routers. Thus, you'll need a Netgear customer account to manage your network infrastructure, thereby "advertising to hackers everywhere that there’s a nice little honeypot on their servers, …
John Leyden, 10 Sep 2018
Monty Python's Terry Gilliam as the nude organist in Monty Python's Flying Circus

Sextortion scum armed with leaked credentials are persistent pests

Persistence pays off for crooks when it comes to sextortion-based phishing scams, research into its effectiveness suggests. One variant bombards prospective marks with threats to release non-existent footage of them watching smut unless they give in to demands. Cleverly, these threats are lent an air of authenticity by using …
John Leyden, 10 Sep 2018
THAT sand penis on BA.com. Just to the left of the L in 'Last minute deals'

Revealed: British Airways was in talks with IBM on outsourcing security just before hack

Exclusive Just weeks before being hacked in late August, British Airways' parent IAG was planning to outsource its cybersecurity to IBM, admitting it needed a "group-wide strategic and proactive approach" to counter threats. The memo in full Subject: Group IT Cyber Security Update From: John Hamilton Sent: 01 August 2018 13:56 All …
John Leyden, 7 Sep 2018

Biting the hand that feeds IT © 1998–2018