Friday, September 27, 2013
How Your Computer Gets Hacked in Under a Minute
Sept. 27 (Bloomberg) – With just a few clicks, hackers can access all of your online information and stay in your system for years. Bloomberg’s Megan Huges talks to the experts to show you how it’s done. (Source: Bloomberg)
Tuesday, July 6, 2010
iTunes accounts plundered, Apple's App store needs better control mechanisms
iTunes accounts plundered, Apple's App store needs better control mechanisms
Monday, May 31, 2010
Google Dumps Microsoft Windows Company-Wide!
"Employees wanting to stay on Windows required clearance from “quite senior levels”, one employee said. “Getting a new Windows machine now requires CIO approval,” said another employee."
Thursday, April 8, 2010
Macintosh = Hacker-Proof?
Charlie A. Miller loves his Macbook Pro laptop. And his four other Apple ( AAPL - news - people ) PCs, the iPhone he uses daily and two older iPhones he keeps for tinkering. But his relationship with the company that created those gadgets is somewhat more complicated.
In March, for instance, the 36-year-old security researcher publicized his discovery of 20 security vulnerabilities in Apple's software. Each would allow a cybercriminal to take over the computer of a user who's tricked into opening a certain PDF attachment or who simply visits an infected Web page using Apple's Safari browser.
That haul of bugs is a record even for Miller, who over the last four years has become perhaps the world's most prominent Mac hacker. It may also be definitive proof that Apple devices aren't safe "right out of the box," as the company has claimed for years. "When I first began saying that Macs were less secure than Windows, everyone thought I was an idiot," says Miller. "So I had to prove it again and again and again."
In 2007 Miller became the first to hack the iPhone, using a flaw in its Safari browser to remotely gain control of the not-so-smart phone. Six months later he hacked a Macbook Air in two minutes at a competition in Vancouver. Last summer he revealed a method that allowed him to virally hijack the iPhone using text messages spread via a user's contact list.
Miller says his latest research doesn't aim to show off his elite hacking skills,most of which he learned over five years as a global network exploitation analyst for the National Security Agency. Instead, he wants to show just how easy it is to find chinks in the armor of commonly used software. Miller used a technique known as "dumb fuzzing" to find flaws. He ran the procedure more persistently than most hackers, leaving his fuzzing program to throw junk information at each target for three weeks before mining the data for exploitable flaws.
As for Apple, Miller says the company has learned to accept, if not appreciate, his work. He usually gives Apple weeks of notice before publicly describing its bugs. "They're always very polite," he says. "But I suspect they wish I didn't exist."
Read the full story at Forbes.com by Andy Greenberg
Updated:
Apple Patches Pwn2Own Bug
Thursday, January 28, 2010
Attention Members of the dark side. The Evil emperor has given you a gift
Monday, January 18, 2010
So, just how did Google get hacked?
Security expert Graham Cluley asks whether infected PDFs were to blame
UPDATE: The vector for the attack on Google has since been confirmed as Internet Explorer.
Earlier this week the internet was rocked by a blog post from Googlerevealing that it had been the victim of a targeted attack from Chinese hackers, and was planning to express its outrage by no longer censoring the Chinese version of its search engine.
Google said that it and at least 20 other large companies had been on the receiving end of the "highly sophisticated and targeted attack", which resulted in the theft of intellectual property and the attempted access of Gmail accounts belonging to Chinese human rights activists.
Although targeted attacks are nothing new, it is very unusual for a corporation to be so upfront about an attack, and to pinpoint the blame in a clear direction.
Google, however, must be feeling fairly confident about its facts to so clearly imply that the Chinese state may have been responsible for the hacking attempt.
But how did the hack happen, and how can other companies and individuals protect themselves from similar attacks in the future?
Read the full story
Microsoft admits IE fault in Google China hack
"One of the vectors..."
Microsoft has confessed that a flaw in Internet Explorer was "one of the vectors" used in the attack on Google, with an investigation by McAfee revealing some of the details.
McAfee has been brought in by a number of companies attacked, and they insisted that there was nothing to substantiate the claimsthat Adobe's notorious PDF software could be responsible.
"We have never seen attacks of this sophistication in the commercial space," said Dmitri Alperovitch, a Vice President of Research with McAfee.
"We have previously only seen them in the government space."
German government warns citizens off IE!
"Don't use IE 6, 7 or 8 and switch browser," says Federal Office
"The German government's Federal Office for Information Security is warning computer users in the country NOT to use Microsoft Internet Explorer due to recent security scares.
The state organisation has issued the warning following Microsoft's admission that IE was a 'vector' in the recent attacks on Google in China.
The German government is thus advising its citizens to use alternative browsers such as Mozilla's Firefox, Google Chrome, Apple Safari or Opera."
Saturday, December 5, 2009
Several Restaurants Sue Vendor for Unsecured Card Processor

The restaurants, located in Louisiana and Mississippi, filed a class-action suitagainst Georgia-based Radiant Systems for producing a point-of-sale (POS) system that they say was not compliant with payment card industry security standards and resulted in an undetermined number of customers having their debit and credit card numbers stolen.
The suit alleges that the system stored all the data embedded on the bank card magnetic stripe after the transaction was completed — a violation of industry security standards that made it a high-risk target for hackers.
Also named in the suit is Computer World, a Louisiana-based retailer, which sold and maintained Radiant’s Aloha POS system.
According to plaintiffs, Computer World’s technicians allegedly installed the remote-access program PCAnywhere on the systems to allow its technicians to fix technical problems from off-site. The only problem is, the company failed to secure the program. The suit alleges that the system was not up to date with software patches, and the PCAnywhere remote log-in and password that technicians used to access the POS systems was the same at every one of the 200 Louisiana locations where the system was installed. According to one of the plaintiffs who spoke with Threat Level, the default login was “administrator” and the password was “computer.”
As a result, a hacker, believed to be based in Romania, accessed the systems of at least 19 businesses through the PCAnywhere software, and possibly others plaintiffs say. "
Image courtesy California State Controller’s Office & Wired
Wednesday, December 2, 2009
SSL/TLS Zero-day flaw found in web encryption
The flaw in the TLS authentication process allows an outsider to hijack a legitimate user's browser session and successfully impersonate the user, the researchers said in a technical paper.
The fault lies in an "authentication gap" in TLS, Ray and Dispensa said. During the cryptographic authentication process, in which a series of electronic handshakes take place between the client and server, there is a loss of continuity in the authentication of the server to the client. This gives an attacker an opening to hijack the data stream, they said.
In addition, the flaw allows practical man-in-the-middle attacks against hypertext transfer protocol secure (Https) servers, the researchers said. Https is the secure combination of http and TLS used in most online financial transactions."
Thursday, November 5, 2009
Unlock Any iPhone in Seconds!
Friday, July 3, 2009
Apple patching nasty iPhone SMS vulnerability

Given the hype surrounding Apple's iPhone, we're actually surprised that we haven't seen more holes to plug over the years. In fact, the last major iPhone exploit to take the world by storm happened right around this time two years ago, and now -- thanks to OS X security expert Charlie Miller -- we're seeing yet another come to light.
The only details Miller had were as follows: "The SMS vulnerability allows an attacker to run software code on the phone that is sent by SMS over a mobile operator's network. The malicious code could include commands to monitor the location of the phone using GPS, turn on the phone's microphone to eavesdrop on conversations, or make the phone join a distributed denial of service attack or a botnet."
Wednesday, December 24, 2008
Microsoft Warns of SQL Attack
Microsoft issued a security advisory late Monday, saying that the bug could be exploited to run unauthorized software on systems running versions of Microsoft SQL Server 2000 and SQL Server 2005.
Attack code that exploits the bug has been published, but Microsoft said that it has not yet seen this code used in online attacks. Database servers could be attacked using this flaw if the criminals somehow found a way to log onto the system, and Web applications that suffered from relatively common SQL injection bugs could be used as stepping stones to attack the back-end database, Microsoft said.
Desktop users running the Microsoft SQL Server 2000 Desktop Engine or SQL Server 2005 Express could be at risk in some circumstances, Microsoft said.
Thursday, August 7, 2008
E-Passports Can Be Hacked and Cloned in Minutes

A computer researcher proved it by cloning the chips in two British passports and then implanting digital images of Osama bin Laden and a suicide bomber. Both passports passed as genuine by UN approved passport reader software. The entire process took less than an hour.
read more | digg story