Text message exploit can force your Nexus phone to reboot (updated)

Google Nexus 5

Watch out if someone sends a flood of text messages to your Nexus phone — they may be trying to break in or otherwise cause havoc. IT administrator Bogdan Alecu has discovered an Android bug that triggers exploitable behavior in the Galaxy Nexus, Nexus 4 and Nexus 5 whenever they’re hit by a large volume of Class 0 SMS messages, or texts that aren’t automatically stored on the phone. The denial of service attack usually forces the handset to reboot, but it can also disable the network connection (if temporarily) or crash the messaging app. Non-Nexus hardware appears to be safe, although Alecu notes that he hasn’t had a chance to test a wide variety of gadgets. Regardless of the problem’s scale, affected users will have to be cautious for a while; Google tells PCWorld that it’s looking into the exploit, but there’s no word on just when we can expect a patch.

Update: There’s already a firewall app in Google Play that protects against the exploit. Thanks, Chipsy4!

Filed under: , ,

Comments

PCWorld

Source: DefCamp, Google Play

Yahoo announces security exploit bounty with payments up to $15,000

Yahoo announces security exploit bounty program with payments up to $15,000

Earlier this week, Yahoo was accused of using change in its sofa cushions as compensation for reports of security exploits, but now the whole ordeal has generated enough buzz to bring about change for the internet pioneer. As it turns out, these small prizes (along with rewards such as t-shirts) were paid for out of pocket by Ramses Martinez, the director of Yahoo’s security team, who took a moment today to explain the company’s new — and far more lucrative — bounty program. Moving forward, Yahoo will reward security researchers with payments that range between $150 and $15,000 for issues that it deems “new, unique and / or high-risk.”

The company is still in the early stages of hammering out a new policy, but promises that payments will be determined “by a clear system based on a set of defined elements that capture the severity of the issue.” Yes, these amounts still pale in comparison to the massive sums that Microsoft recently offered, but researchers now have reasonable incentive to inform Yahoo of the exploits, rather than sell them on the black market. According to Martinez, Yahoo’s revised policy will be available by the end of the month, and as a nice gesture, its new reward structure will retroactively apply to all bugs submitted from July 1st onward.

Filed under:

Comments

Source: Yahoo! Developer Network

Exploits leave some Android-based Bitcoin wallets open to theft

Exploits leave some Bitcoin wallet apps for Android open to theft

If you manage Bitcoins through Android devices, you may need to keep a close eye on your virtual cash in the near future. Developers have found that multiple Android-based Bitcoin apps, such as Bitcoin Wallet and Mycelium Wallet, are vulnerable to number generator exploits that could be used for theft. Although patched apps are either available in beta or coming soon, the complete fix involves more than just new code — users have to both create a new Bitcoin address and send it out to anyone still relying on old details. You’re safe if you use a simple Bitcoin exchange client, but you’ll otherwise want to visit the source link for more help with securing your digital holdings.

Filed under: , ,

Comments

Via: CNET

Source: Bitcoin

Tor browser for Windows exploit discovered, malware may be gathering info for Uncle Sam (updated)

It was just over two years ago that the paragon of internet privacy, the Tor project, decided to build its own browser by forking Firefox. Wired reports that an exploit of that very same browser has been recently discovered that allowed a number of users’ Windows computers to be infected with malware. Once installed, the code delivered infected machines’ hostnames and MAC addresses to a remote web server in Reston, Virginia, a city located just outside Washington D.C. The browser exploit — a JavaScript vulnerability inherent to Firefox version 17, the version upon which the Tor browser was built — was enabled by a breach of Freedom Hosting servers. In this case, affected Freedom Hosting servers delivered web pages to users with the JavaScript exploit embedded in them.

There’s no direct evidence that the malware comes from the government, but the malware’s command and control IP address is registered to a governmental defense contractor. Plus, the data pulled from infected machines indicates it could be an example of the FBI’s computer and internet protocol address verifier (CIPAV) software first identified by Wired in 2007. CIPAV has been used by the FBI to help identify and catch terrorists, hackers and criminals since 2002, but the exact nature of the software has never been revealed. Regardless, the vulnerability in the browser has been identified and fixed, so users need only update to the newest version of the Tor browser to keep their web traffic away from prying eyes… for now, at least.

Update: To be clear, the Firefox exploit in question was fixed, along with the Tor browser well over a month ago, and any users who have updated since June 26th were not affected.

Filed under:

Comments

Via: Wired

Source: Tor Project, Tor Blog

Chromecast update breaks root-friendly exploit

Chromecast exploit in action

We hope you weren’t planning to tinker with your Chromecast this weekend. GTVHacker has confirmed that a recent firmware update to Google’s streaming media stick plugs the bootloader exploit that many are using to get root access. Some XDA-Developers members have tried maintaining root by flashing recovery images and disabling signing keys, but those aren’t reliable solutions — we’ve seen a few reports of bricked Chromecasts. If you’re cautious, it may be best to wait until more adventurous owners find a vulnerability in Google’s newer code.

Filed under: , ,

Comments

Via: Android Police

Source: XDA-Developers, GTVHacker (Twitter)

Apple says iOS 7 will patch exploit that lets rogue chargers install malware

iOS 7 press shot

Recently, Georgia Tech researchers discovered an unusual way to attack iOS: a third-party charger with a hidden computer can install malware when an iOS device is plugged in and unlocked. That won’t be an issue for much longer, however, as Apple has confirmed that iOS 7 beta 4 and future releases contain a fix. While the company hasn’t said what that solution is, Georgia Tech’s Billy Lau says that the new OS can tell when it’s plugged into a computer instead of a charger — there shouldn’t be any rude surprises. The dependence on an iOS 7-based fix could leave many users vulnerable until the fall, although the hardware-specific nature of the exploit means it’s unlikely to be a major concern.

Filed under: , , ,

Comments

Source: Reuters

Google Glass Suffers First Exploit Giving Full Remote Access To Hackers

We’ve seen a lot of firsts for the Google Glass ever since Google released its Explorer Edition of the wearable specs to those who were willing to pay for them. We’ve seen a number of applications already become available, and some […]

Like It , +1 , Tweet It , Pin It Original content from Ubergizmo.

    

Check if your Android phone is patched against the ‘Master Key’ exploit with this app

Check if your Android phone is patched against the 'Master Key' exploit with this app

After discovering a longstanding exploit in Android firmware dating back to version 1.6 that allowed malicious developers to circumvent software security measures, Bluebox Security released an Android app this week for users to check whether their phone is still vulnerable to the exploit. Since Bluebox’s report last week, Google acknowledged the issue and released a patch that it says is in the hands of OEMs and already being pushed out by certain manufacturers (Samsung, for one). The app is thankfully free, and should provide some much-needed reassurance to most Android users. Head to the source link below to snag it for yourself.

Filed under: , , , , ,

Comments

Via: Phone Arena

Source: Google Play

Bluebox reveals Android security hole, may affect 99 percent of devices

Bluebox reveals Android security vulnerability, supposedly affects up to 99 percent of devices

Researchers at Bluebox Security have revealed a disturbing flaw in Android’s security model, which the group claims may affect up to 99 percent of Android devices in existence. According to Bluebox, this vulnerability has existed since Android 1.6 (Donut), which gives malicious app developers the ability to modify the code of a legitimate APK, all without breaking its cryptographic signature — thereby allowing the installation to go unnoticed. To pull off the exploit, a rotten app developer would first need to trick an unknowing user into installing the malicious update, but hackers could theoretically gain full control of a user’s phone if the “update” posed as a system file from the manufacturer.

Bluebox claims that it notified Google of the exploit in February. According to CIO, Bluebox CTO Jeff Forristal has named the Galaxy S 4 as the only device that’s currently immune to the exploit — which suggests that a security patch may already exist. Forristal further claims that Google is working on an update for its Nexus devices. In response to our inquiry, Google told us that it currently has no comment. We certainly hope that device manufacturers do the responsible thing and distribute timely security patches to resolve this issue. Absent that, you can protect yourself by installing updates through the Play Store and Android’s built-in system update utility.

Filed under: , ,

Comments

Source: Bluebox Security, CIO

Hey, bounty hunters: Microsoft is paying $100k for Windows 8.1 Preview exploits

Calling all bounty hunters Microsoft paying up to $100k for Windows 81 Preview exploit techniques

Chalk up one more reason to check out Windows 8.1 Preview when it becomes available on June 26th. Today, Microsoft announced that it’ll pay up to $100,000 in cash to those who discover and report novel security exploits within its latest OS revision, along with up to $50,000 in bonus loot for defensive suggestions that relate to the attack. But wait… there’s more. Starting on June 26th and running through July 26th, the Redmond outfit will also pay up to $11,000 toward the discovery of critical vulnerabilities within Internet Explorer 11 Preview (Windows 8.1 Preview). Whether you’re motivated by your bank account or the good of humanity, you can start taking your best shots at Microsoft’s latest code just one week from now.

Filed under: ,

Comments

Via: TechCrunch

Source: Microsoft