pastebin - collaborative debugging tool
kpaste.net RSS


SecurityFlakes2 04/2013
Posted by Anonymous on Fri 12th Apr 2013 10:06
raw | new post

  1.  
  2. ** News Links for April 2013 @ https://securityflakes2.wordpress.com
  3.  
  4. 1. Spanish Linux users launch legal challenge to Microsoft’s secure boot
  5. 2. Wikipedia editor allegedly forced by French intelligence to delete “classified” entry
  6. 3. Microsoft EMET 3.5 Tech Preview
  7. 4. Why Bitcoin scares banks and governments
  8. 5. The ATF Wants ‘Massive’ Online Database to Find Out Who Your Friends Are
  9. 6. Social Engineering Framework - not a news story, a database of information!
  10. 7. Microsoft Creative Director 'Doesn't Get' Always-On DRM Concerns
  11.    + Microsoft Game Director Adam Orth Resigns Following Xbox Comments
  12. 8. Interspecies telepathy: human thoughts make rat move
  13. 9. Price Increases for U.S. Military Gear Dwarf Most Nations’ Defense Budgets
  14. 10. Research Article - Human Breath Analysis May Support the Existence of Individual Metabolic Phenotypes
  15. 11. British Library To Archive One Billion UK Websites
  16. 12. Silent Circle - The Baffling Patronage of Silent Circle & More
  17. 13. Lasers capture 3D images from a kilometre away
  18. 14. Advanced Persistent Threats get more advanced, persistent and threatening
  19. 15. 5 Linksys router vulnerabilities (so that consumers may be aware of the risks)
  20.     + Anatomy of an exploit - Linksys router remote password change hole
  21. 16. Has your Hewlett-Packard ScanJet printer just tried to infect your PC with malware?
  22. 17. Google Uses Reputation To Detect Malicious Downloads
  23. 18. Gag the Whistleblower: 6 States That Might Criminalize Taping Animal Cruelty
  24. 19. Unpatched Remote Access Tools: Your Gift To Attackers
  25. 20. Is Gapz the most complex bootkit yet?
  26. 21. Infographic: Packers Landscape
  27. 22. StackExchange's Reverse Engineering beta
  28. 23. Berkeley researchers replace passwords with passthoughts by reading your mind
  29. 24. Cubans Evade Censorship By Exchanging Flash Drives (Sneakernet)
  30.     + The Cuban Memory Stick Underground
  31. 25. Pentagon to Build Robots With ‘Real’ Brains
  32. 26. Data broker Acxiom to reveal what it knows about you
  33. 27. High-tech burglary suspect nabbed after secret camera found
  34. 28. No honeypot? Don't bother calling yourself a security pro
  35.     Deploy one of these honeypots and you'll soon find out who's attacking you
  36.     and devise a strong defense to fight back.
  37. 29. Rootkit coders beware: Malwarebytes is in hot pursuit (Windows related)
  38. 30. Now Your iPhone Can Read Fingerprints, Scan Irises and ID Your Face
  39. 31. Justice Dept. to Congress: We want greater email, Facebook, Twitter snooping powers
  40. 32. Yes, the FBI and CIA can read your email. Here's how
  41. 33. Secrets of FBI Smartphone Surveillance Tool Revealed in Court Fight
  42. 34. Government Fights for Use of Spy Tool That Spoofs Cell Towers
  43.  
  44. - Non-Security Related Posts -
  45.  
  46. 35!. How Google GLASS works [INFOGRAPHIC]
  47. 36!. Stunning photos of super-dense Hong Kong apartments look like Borg cubes
  48. 37!. Tiny Chiplets: a New Level of Micro Manufacturing
  49. 38!. Researchers create 3Gbps LiFi network with LED bulbs
  50.     + Micro-LED LiFi: Where every light source in the world is also TV, and provides
  51.       gigabit internet access
  52. 39!. The PC inside your phone: A guide to the system-on-a-chip
  53. 40!. Where No Search Engine Has Gone Before Google has a single towering obsession:
  54.     It wants to build the Star Trek computer.
  55.  
  56. ###
  57.  
  58. 1. Spanish Linux users launch legal challenge to Microsoft’s secure boot
  59.  
  60. @ http://www.infosecurity-magazine.com/view/31499/spanish-linux-users-launch-legal-challenge-to-microsofts-secure-boot/
  61. @ http://h-online.com/-1830714
  62. @ http://www.h-online.com/security/news/item/Secure-Boot-complaint-filed-against-Microsoft-1830714.html
  63. @@ http://www.infosecurity-magazine.com/view/24199/rsa-2012-malware-gets-the-boot-in-windows-8-notes-charney
  64. @@ http://www.reuters.com/article/2013/03/26/us-microsoft-eu-idUSBRE92P0E120130326
  65. @@ http://www.h-online.com/open/news/item/Secure-Boot-complaint-filed-against-Microsoft-1830714.html
  66. @@ http://www.europarl.europa.eu/sides/getAllAnswers.do?reference=E-2013-000162&language=EN
  67. @@ http://www.hispalinux.es/node/758
  68. @@@ http://www.nbcnews.com/id/51329950/ns/business-us_business/t/exclusive-open-software-group-files-complaint-eu-against-microsoft/
  69. @@@ http://newyork.newsday.com/business/technology/microsoft-target-of-hispalinux-open-source-software-users-in-complaint-to-eu-1.4909950
  70. @@@ http://www.mobilenapps.com/articles/8058/20130327/linux-users-file-complaint-against-microsoft-over-secure-boot-windows.htm
  71. @@@ http://rcpmag.com/articles/2013/04/01/spanish-complaint-windows-8-secure-boot.aspx
  72. @@@ http://www.eitb.com/en/news/technology/detail/1297786/hispalinux-microsoft--hispalinux-files-complaint-microsoft/
  73.  
  74. ###
  75.  
  76. 2. Wikipedia editor allegedly forced by French intelligence to delete “classified” entry
  77.  
  78. A military compound becomes a lesson in obscurity on the Internet.
  79.  
  80. @ http://arstechnica.com/tech-policy/2013/04/wikipedia-editor-allegedly-forced-by-french-intelligence-to-delete-classified-entry/
  81. @ http://boingboing.net/2013/04/07/french-spies-demand-removal-of.html
  82. @ http://yro.slashdot.org/story/13/04/06/139216/french-intelligence-agency-forces-removal-of-wikipedia-entry
  83. @ http://yro.slashdot.org/story/13/04/08/0532235/why-french-govts-attempt-to-censor-wikipedia-matters
  84. @ http://intelnews.org/2013/04/09/01-1233/
  85.  
  86. ###
  87.  
  88. 3. Microsoft EMET 3.5 Tech Preview
  89.  
  90. @ http://dedoimedo.com/computers/windows-emet-v3-5-tp.html
  91. @ https://www.microsoft.com/en-us/download/details.aspx?id=30424
  92.  
  93. ###
  94.  
  95. 4. Why Bitcoin scares banks and governments
  96.  
  97. Bitcoin offers an alternative to the conventional, state-sanctioned banking system. Maybe that's why powerful institutions are so wary of it
  98.  
  99. @ http://www.guardian.co.uk/technology/2013/apr/07/bitcoin-scares-banks-governments
  100. @ http://www.bloomberg.com/news/2013-04-05/bitcoin-really-is-an-existential-threat-to-the-modern-liberal-state.html
  101. @@ http://www.newyorker.com/online/blogs/elements/2013/04/the-future-of-bitcoin.html
  102. @@ http://www.schneier.com/blog/archives/2013/04/bitcoins_in_the.html
  103.  
  104. ###
  105.  
  106. 5. The ATF Wants ‘Massive’ Online Database to Find Out Who Your Friends Are
  107.  
  108. @ http://www.wired.com/dangerroom/2013/04/atf-database/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+wired%2Findex+%28Wired%3A+Top+Stories%29
  109. @ http://yro.slashdot.org/story/13/04/05/2322220/the-atf-wants-to-know-who-your-friends-are
  110. @ http://www.wired.com/dangerroom/2013/04/atf-database/?cid=6928234
  111. @@ https://www.fbo.gov/index?s=opportunity&mode=form&tab=core&id=974186e6ff5bfc7bfed500f5d51af352&_cview=0
  112.  
  113. ###
  114.  
  115. 6. Social Engineering Framework - not a news story, a database of information!
  116.  
  117. @ http://www.social-engineer.org/framework/Social_Engineering_Framework
  118.  
  119. ###
  120.  
  121. 7. Microsoft Creative Director 'Doesn't Get' Always-On DRM Concerns
  122.  
  123. @ http://yro.slashdot.org/story/13/04/05/1246233/microsoft-creative-director-doesnt-get-always-on-drm-concerns
  124. @ http://www.osnews.com/story/26925/Microsoft_ridicules_concerns_over_always-on_for_next_Xbox
  125.  
  126. + Microsoft Game Director Adam Orth Resigns Following Xbox Comments
  127.  
  128. @ http://games.slashdot.org/story/13/04/11/1233217/microsoft-game-director-adam-orth-resigns-following-xbox-comments
  129.  
  130. ###
  131.  
  132. 8. Interspecies telepathy: human thoughts make rat move
  133.  
  134. @ http://www.newscientist.com/article/dn23343-interspecies-telepathy-human-thoughts-make-rat-move.html
  135. @@ http://www.newscientist.com/article/dn23221-first-mindreading-implant-gives-rats-telepathic-power.html
  136.  
  137. ###
  138.  
  139. 9. Price Increases for U.S. Military Gear Dwarf Most Nations’ Defense Budgets
  140.  
  141. @ http://www.wired.com/dangerroom/2013/04/military-cost-increases/
  142.  
  143. ###
  144.  
  145. 10. Research Article - Human Breath Analysis May Support the Existence of Individual Metabolic Phenotypes
  146.  
  147. @ http://www.plosone.org/article/info%3Adoi%2F10.1371%2Fjournal.pone.0059909
  148.  
  149. ###
  150.  
  151. 11. British Library To Archive One Billion UK Websites
  152.  
  153. @ http://news.slashdot.org/story/13/04/07/0156222/british-library-to-archive-one-billion-uk-websites
  154. @ http://www.ibtimes.co.uk/articles/453908/20130405/british-library-archive-uk-web-news-publications.htm
  155.  
  156. ###
  157.  
  158. 12. Silent Circle - The Baffling Patronage of Silent Circle & More
  159.  
  160. "PGP Creator Phil Zimmerman has a new business, Silent Circle [silentcircle.com], that does proper encryption for voice and SMS on mobile devices.”
  161.  
  162. Before you place your trust in this, consider:
  163.  
  164. Silent Circle Dangerous to Cryptography Software Development
  165. http://log.nadim.cc/?p=89
  166.  
  167. The Baffling Patronage of Silent Circle
  168. http://log.nadim.cc/?p=102
  169.  
  170. And, amusingly enough:
  171.  
  172. Is Silent Circle Open Source Yet?
  173. http://issilentcircleopensourceyet.com/
  174.  
  175. Page Result as of 04/08/2013:
  176.  
  177. No.
  178. Silent Circle have only released incomplete source code[1], but have been telling press and activists that all source code has been released and openly reviewed.
  179.  
  180. [1] https://github.com/SilentCircle
  181.  
  182. You say, “Creator of PGP Has Already Fixed This” I would disagree at this time.
  183.  
  184. @ http://www.theregister.co.uk/2013/04/06/silent_circle_private_email_expansion/
  185.  
  186. Don't buy into this (unless it becomes open source). Stick with TrueCrypt and GPG (GnuPG), both of which are free and
  187. open source.
  188.  
  189. ###
  190.  
  191. 13. Lasers capture 3D images from a kilometre away
  192.  
  193. @ http://www.theregister.co.uk/2013/04/05/laser_3d_distance_imaging/
  194. @ http://www.engadget.com/2013/04/09/long-range-laser-scanner/
  195. @ http://www.hw.ac.uk/news-events/news/new-camera-system-creates-high-resolution-3-d-11809.htm
  196. @ http://www.extremetech.com/extreme/152922-superconducting-camera-can-snap-3d-photos-from-1100-yards
  197.  
  198. ###
  199.  
  200. 14. Advanced Persistent Threats get more advanced, persistent and threatening
  201.  
  202. @ http://www.theregister.co.uk/2013/04/04/apt_trends_fireeye/
  203. @ https://www.networkworld.com/news/2013/040813-apt-attackers-getting-more-evasive-268500.html
  204. @@ http://www.csoonline.com/article/706130/apt-attackers-are-increasingly-using-booby-trapped-rtf-documents-experts-say
  205.  
  206. ###
  207.  
  208. 15. 5 Linksys router vulnerabilities (so that consumers may be aware of the risks) 03/05/2013
  209.  
  210. @ https://superevr.com/blog/wp-content/uploads/2013/04/linksys_vulns.txt
  211. @ https://superevr.com/blog/2013/dont-use-linksys-routers/
  212.  
  213. + Anatomy of an exploit - Linksys router remote password change hole
  214.  
  215. @ http://nakedsecurity.sophos.com/2013/04/11/anatomy-of-an-exploit-linksys-router-remote-password-change-hole/
  216.  
  217. ###
  218.  
  219. 16. Has your Hewlett-Packard ScanJet printer just tried to infect your PC with malware?
  220.  
  221. @ http://nakedsecurity.sophos.com/2013/04/04/has-your-hewlett-packard-scanjet-printer-just-tried-to-infect-your-pc-with-malware/
  222.  
  223. ###
  224.  
  225. 17. Google Uses Reputation To Detect Malicious Downloads
  226.  
  227. @ http://www.darkreading.com/security-monitoring/167901086/security/client-security/240152413/google-uses-reputation-to-detect-malicious-downloads.html
  228. @ http://tech.slashdot.org/story/13/04/08/1151223/google-uses-reputation-to-detect-malicious-downloads
  229.  
  230. ###
  231.  
  232. 18. Gag the Whistleblower: 6 States That Might Criminalize Taping Animal Cruelty
  233.  
  234. @ http://www.alternet.org/activism/gag-whistleblower-6-states-might-criminalize-taping-animal-cruelty?paging=off
  235.  
  236. ###
  237.  
  238. 19. Unpatched Remote Access Tools: Your Gift To Attackers
  239.  
  240. @ https://www.informationweek.com/security/vulnerabilities/unpatched-remote-access-tools-your-gift/240151523
  241.  
  242. ###
  243.  
  244. 20. Is Gapz the most complex bootkit yet?
  245.  
  246. @ http://www.welivesecurity.com/2013/04/08/is-gapz-the-most-complex-bootkit-yet/
  247.  
  248. ###
  249.  
  250. 21. Infographic: Packers Landscape
  251.  
  252. Packers are most commonly used for compression, code obfuscation, and malware anti-reversing.  While not always malicious, packers are often a clue to look a little deeper into a particular binary.  Ange Albertini did a marvelous job of representing the (known) universe of executable packers in this infographic.
  253.  
  254. @ http://i2.wp.com/forensicmethods.com/wp-content/uploads/2013/04/Packers_Landscape_sm.jpg?resize=575%2C414
  255. @ http://forensicmethods.com/executablepackers
  256. @ [PDF] http://corkami.googlecode.com/files/packers.pdf
  257.  
  258. ###
  259.  
  260. 22. StackExchange's Reverse Engineering beta
  261.  
  262. @ http://reverseengineering.stackexchange.com/
  263.  
  264. ###
  265.  
  266. 23. Berkeley researchers replace passwords with passthoughts by reading your mind
  267.  
  268. @ http://www.extremetech.com/computing/152827-berkeley-researchers-authenticate-your-identity-with-just-your-brainwaves-replace-passwords-with-passthoughts
  269. @ http://www.ischool.berkeley.edu/newsandevents/news/20130403brainwaveauthentication
  270.  
  271. ###
  272.  
  273. 24. Cubans Evade Censorship By Exchanging Flash Drives (Sneakernet)
  274.  
  275. @ http://politics.slashdot.org/story/13/03/19/2351234/cubans-evade-censorship-by-exchanging-flash-drives
  276. @ http://www.mcclatchydc.com/2013/03/09/185347/cubans-evade-censorship-by-exchanging.html
  277. @@ https://en.wikipedia.org/wiki/Sneakernet
  278. @@ https://en.wikipedia.org/wiki/USB_dead_drop
  279. @@ https://en.wikipedia.org/wiki/Data_Mule
  280.  
  281. EARLIER STORY:
  282.  
  283. The Cuban Memory Stick Underground
  284.  
  285. @ http://yro.slashdot.org/story/08/03/06/1717242/the-cuban-memory-stick-underground
  286.  
  287. ###
  288.  
  289. 25. Pentagon to Build Robots With ‘Real’ Brains
  290.  
  291. @ http://www.infowars.com/pentagon-to-build-robots-with-real-brains/
  292.  
  293. ###
  294.  
  295. 26. Data broker Acxiom to reveal what it knows about you
  296.  
  297. @ http://news.cnet.com/8301-1009_3-57578897-83/data-broker-acxiom-to-reveal-what-it-knows-about-you/
  298. @ http://www.ft.com/intl/cms/s/0/e1c48f9a-a1c2-11e2-ad0c-00144feabdc0.html
  299. @@ http://ftc.gov/opa/2012/12/databrokers.shtm
  300. @@ http://ftc.gov/os/2012/03/120326privacyreport.pdf
  301. @@@ http://www.zdnet.com/global-consumer-data-broker-plans-to-reveal-your-data-7000013828/
  302.  
  303. ###
  304.  
  305. 27. High-tech burglary suspect nabbed after secret camera found
  306.  
  307. @ http://www.wfaa.com/news/crime/High-tech-burglary-suspect-nabbed-after-secret-camera-found-201167711.html
  308. @@ http://www.kens5.com/news/texas-news/High-tech-burglary-suspect-nabbed-after-secret-camera-found-201328311.html
  309. @@ http://www.khou.com/news/crime/201368031.html
  310.  
  311. ###
  312.  
  313. 28. No honeypot? Don't bother calling yourself a security pro
  314.     Deploy one of these honeypots and you'll soon find out who's attacking you
  315.     and devise a strong defense to fight back.
  316.  
  317. @ https://www.infoworld.com/d/security/no-honeypot-dont-bother-calling-yourself-security-pro-216038
  318. @@ https://honeynet.org/
  319. @@ https://honeynet.org/project
  320. @@ https://honeynet.org/papers
  321.  
  322. ###
  323.  
  324. 29. Rootkit coders beware: Malwarebytes is in hot pursuit (Windows related)
  325.  
  326. @ http://www.techrepublic.com/blog/security/rootkit-coders-beware-malwarebytes-is-in-hot-pursuit/9207
  327. @ http://www.malwarebytes.org/
  328. @ http://www.malwarebytes.org/products/chameleon/
  329. @ http://blog.malwarebytes.org/news/2012/11/meet-malwarebytes-anti-rootkit/
  330. @@@ http://www.techrepublic.com/blog/10things/10-things-you-should-know-about-rootkits/416
  331. @@@ http://www.techrepublic.com/blog/networking/malware-scanners-mbam-is-best-of-breed/797
  332.  
  333. ###
  334.  
  335. 30. Now Your iPhone Can Read Fingerprints, Scan Irises and ID Your Face
  336.  
  337. @ http://www.wired.com/dangerroom/2013/04/iphone-biometrics/
  338. @@@ http://www.wired.com/dangerroom/2013/02/biometric-smartphone/
  339. @@@ http://www.wired.com/dangerroom/2010/08/military-prison-builds-big-afghan-biometric-database/
  340. @@@ http://www.engadget.com/2012/05/28/precise-biometrics-tactivo-for-iphone-and-ipad-locks-data-by-fingerprint-and-smart-card/
  341. @@@ http://www.wired.com/dangerroom/2011/10/begun-these-army-phone-wars-have/
  342. @@@ http://www.wired.com/dangerroom/2013/01/biometrics/
  343.  
  344. ###
  345.  
  346. 31. Justice Dept. to Congress: We want greater email, Facebook, Twitter snooping powers
  347.  
  348. @ http://www.zdnet.com/justice-dept-to-congress-we-want-greater-email-facebook-twitter-snooping-powers-7000012786/
  349.  
  350. ###
  351.  
  352. 32. Yes, the FBI and CIA can read your email. Here's how
  353.  
  354. @ http://www.zdnet.com/yes-the-fbi-and-cia-can-read-your-email-heres-how-7000007319/
  355.  
  356. ###
  357.  
  358. 33. Secrets of FBI Smartphone Surveillance Tool Revealed in Court Fight
  359.  
  360. @ http://www.wired.com/threatlevel/2013/04/verizon-rigmaiden-aircard/all/
  361.  
  362. ###
  363.  
  364. 34. Government Fights for Use of Spy Tool That Spoofs Cell Towers
  365.  
  366. @ http://www.wired.com/threatlevel/2013/03/gov-fights-stingray-case/all/
  367.  
  368. ------------------------------
  369.  
  370. - Non-Security Related Posts -
  371.  
  372. 35!. How Google GLASS works [INFOGRAPHIC]
  373.  
  374. @ http://glass-apps.org/how-google-glass-works
  375.  
  376. ---
  377.  
  378. 36!. Stunning photos of super-dense Hong Kong apartments look like Borg cubes
  379.  
  380. @ http://io9.com/stunning-photos-of-super-dense-hong-kong-apartments-loo-471306214
  381.  
  382. ---
  383.  
  384. 37!. Tiny Chiplets: a New Level of Micro Manufacturing
  385.  
  386. @ http://hardware.slashdot.org/story/13/04/09/2156231/tiny-chiplets-a-new-level-of-micro-manufacturing
  387.  
  388. ---
  389.  
  390. 38!. Researchers create 3Gbps LiFi network with LED bulbs
  391.     + Micro-LED LiFi: Where every light source in the world is also TV, and provides
  392.       gigabit internet access
  393.  
  394. @ http://www.extremetech.com/computing/152740-researchers-create-3gbps-lifi-network-with-led-bulbs
  395. @@ http://www.extremetech.com/extreme/147339-micro-led-lifi-where-every-light-source-in-the-world-is-also-tv-and-provides-gigabit-internet-access
  396.  
  397. ---
  398.  
  399. 39!. The PC inside your phone: A guide to the system-on-a-chip
  400.  
  401. @ http://arstechnica.com/gadgets/2013/04/the-pc-inside-your-phone-a-guide-to-the-system-on-a-chip/
  402. ---
  403.  
  404. 40!. Where No Search Engine Has Gone Before Google has a single towering obsession:
  405.     It wants to build the Star Trek computer.
  406.  
  407. @ http://www.slate.com/articles/technology/technology/2013/04/google_has_a_single_towering_obsession_it_wants_to_build_the_star_trek_computer.single.html
  408.  
  409. ___
  410.  
  411. This document was a post for: SecurityFlakes2 @ https://securityflakes2.wordpress.com
  412.  
  413. This document is being archived at the following locations:
  414.  
  415. http://pastebin.calculate-linux.org/en/show/5391
  416. http://crunchbanglinux.org/pastebin/2042
  417. http://paste.ubuntu.com/5700808/
  418. https://paste.debian.net/249048/
  419. http://paste.kde.org/722840/
  420. ___
  421. EOF

Submit a correction or amendment below (click here to make a fresh posting)
After submitting an amendment, you'll be able to view the differences between the old and new posts easily.

Syntax highlighting:

To highlight particular lines, prefix each line with {%HIGHLIGHT}




All content is user-submitted.
The administrators of this site (kpaste.net) are not responsible for their content.
Abuse reports should be emailed to us at