Hackers Grab and Expose 453,000 Yahoo Login Details [Yahoo]

Hacking collective D33Ds Company has posted login details for more than 453,000 user accounts that it claims to have retrieved in plaintext from an unconfirmed service on Yahoo. More »

Microsoft advises nuking Windows Gadgets after security hole discovery, we mourn our stock widgets

Windows 7 with Gadgets

Whether you see Windows Vista and Windows 7 Gadgets as handy tools or a blight upon a pristine desktop, you might want to shut them off for safety’s sake. Mickey Shkatov and Toby Kohlenberg have found that the desktop widgets’ web-based code have flaws that would allow malicious Gadgets, or even hijacked legitimate Gadgets, to compromise a PC without having to go through the usual avenues of attack. Microsoft’s short-term answer to the vulnerability is a drastic one, though: a stopgap patch disables Gadgets entirely, leaving just a barren desktop in its wake. There’s no word on a Gadget-friendly solution arriving before Kohlenberg and Shkatov present at the Black Hat Conference on July 26th, but we suspect Microsoft’s ultimate answer is to move everyone to Windows 8, where Gadgets aren’t even an option. We understand the importance of preventing breaches, of course — we’re just disappointed that we’ll have to forgo miniature stock tickers and weather forecasts a little sooner than expected.

Filed under:

Microsoft advises nuking Windows Gadgets after security hole discovery, we mourn our stock widgets originally appeared on Engadget on Wed, 11 Jul 2012 14:42:00 EDT. Please see our terms for use of feeds.

Permalink Computerworld  |  sourceMicrosoft, Black Hat Conference  | Email this | Comments

Facebook Wants to Keep You Virus-Free [Facebook]

Facebook may be a little lax when it comes to privacy, but it seems to be doubling down on security. The site is now directing users who think their computer might be infected with malware to sites where they can get free antivirus software. More »

Apple granted patent for accelerometer-aided theft-detection system

Apple granted patent for accelerometeraided theftdetection system

Despite the added risk brought on by Apple’s Find My iPhone feature, the iOS handset remains a frequent target for smartphone thieves, thanks to the device’s resale value and compatibility with networks around the world. There’s not much you can do to deter sticky fingers short of keeping your iPhone or MacBook in view at all times, but the issue does appear to have crossed the desks of Apple’s design team, which was just granted patent number 8,217,792 for a sophisticated anti-theft scheme. The acceleration-based system would detect a “known theft condition” based on acceleration characteristics, sounding an alarm and disabling the device. The smartphone or laptop would ignore vibrations from passing cars or those caused by items being dropped onto a nearby surface, instead focusing on undisclosed scenarios that likely involve direct movement. The device owner would use a GUI to configure and disable the system, at which point the handset or computer would return to its pre-disturbed mode. Overall, it sounds like a fairly straightforward hardware/software solution, with the added benefit of a technique to filter out regular motion in an attempt to reduce the number of false alarms. You’ll find the full patent at the source link below.

Filed under: ,

Apple granted patent for accelerometer-aided theft-detection system originally appeared on Engadget on Tue, 10 Jul 2012 15:16:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceUSPTO  | Email this | Comments

DNSChanger Danger: Damned if you do, Damned if you don’t

How much warning is too much warning? At what point does an excess of caution evolve into fear, uncertainty and doubt? That the DNSChanger malware failed to down internet connections across the globe on Monday, despite increasingly shrill warnings that the FBI was preparing to pull the plug on the temporary servers keeping them afloat, is undoubtedly A Good Thing. However, it highlights one of the persistent issues facing computing: the challenges in balancing caution and panic.

DNSChanger was undoubtedly a high-risk issue, certainly before the FBI weighed in. The trojan changed user DNS settings so as to rely on compromised servers, serving up pages with malware, sites that secretly collected user-data, and adverts for fake products. The FBI seized the network and a temporary – and safe – DNS replacement system was set up for those unknowingly relying on the dangerous one.

All good things must come to an end, though, and on July 9 the FBI’s mandate to run the replacement servers ran out. With hundreds of thousands of computers still relying on the makeshift DNS provisions to bridge browsers and sites, that meant warning those users that they’d need to take an active role in their system security if they wanted to stay online.

“We lack a single point of communication – instead we have a hosepipe of hysteria”

Problem is, the sort of users who were inadvertently infected and didn’t realize might not be the sort who would also go hunting for the latest news in malware. What we lack is a single point of communication to highlight security problems; instead, we have a pretty much all-or-nothing hosepipe of rising hysteria.

Microsoft has attempted something like that single point, with its Security Center in Windows. Apple, late to the game when it comes to malware and virus threats, hasn’t a centralized security hub in OS X, though the company has been doing more to prevent insidious apps working their way into the platform.

Windows Security Center is too easily overlooked. Third-party security firms individually push alerts to their blogs – and to their (generally paid) software packages – but there’s no all-inclusive feed that distills all of that to the user’s desktop in an easily understood way.

It’s a problem with no easy solution. In the aftermath of the DNSChanger anticlimax, there’s likely to be no shortage of accusations that the malware was “over-hyped” and its potential impact “overstated” so as to drive pageviews. Still, while we’ve gotten off easy now – a somewhat breathless and clogged news-cycle notwithstanding – there’s the distinct possibility that the next big security crisis could be made exponentially worse when contingency gives way to uncontrollable FUD and users’ eyes glaze over.


DNSChanger Danger: Damned if you do, Damned if you don’t is written by Chris Davies & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.


RIM CEO: We don’t build phones in China in case they steal our code

RIM CEO Thorsten Heins has cited security concerns around industrial espionage and software theft as the reason BlackBerry devices are not produced in China. Speaking during the Q&A session of the RIM shareholders meeting today, Heins was asked what steps the company had taken to avoid security breaches of the sort that impacted Nortel for a decade.

Heins said that he was unable to detail specific protections around how RIM protects its software, but did talk about how software might fall into the wrong hands. “Unlike our competitors,” he pointed out, “we do not manufacture our devices in China.”

That, Heins indicated, was because there was a threat that Chinese contractors could presumably use the access to the phone and tablet software to quietly hack RIM’s infrastructure. That would have significant implications for RIM’s reputation among enterprise clients, where BlackBerry encryption is a distinct selling point – and one for which customers pay handsomely.

RIM has faced calls to open up its security systems to government agencies before, particularly those that want to monitor users of BBM and other messaging systems for potential signs of terrorist plots. The company has always denied such requests.


RIM CEO: We don’t build phones in China in case they steal our code is written by Chris Davies & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.


Google Faces FTC’s Largest Ever Fine Over Safari Cookie Debacle [Google]

Five months on from the Wall Street Journal spotting that Google was circumventing cookie privacy settings in Safari, the big G is now close to settling the matter with the FTC. There’s one bitter pill that still remains to be swallowed, though: the WSJ reports that Google is set to pony up $22.5 million, the FTC’s largest ever fine. More »

Your Cell Phone Is Under More Surveillance Than Ever [Privacy]

United States law enforcement agencies are requesting user information such as “text messages, caller locations and other information” at an alarming rate—at least 1.3 million requests last year alone—according to cellular carriers. More »

Internet goes offline for thousands as DNSChanger cleanup peaks

Thousands of internet users are waking up to no web connection this morning, with the temporary servers handling those infected by DNSChanger being shut down. ISPs and the FBI had warned surfers that, had their DNS settings been changed by the malware, they would lose access to the workaround fix that had been in operation for the past few months. Estimates of how many people will be impacted today are unclear, with the numbers of those relying on the most active servers last month exceeding 100,000.

In fact, according to the DNSChanger Working Group, the team established to handle the fall-out of the malware, back on June 13 there were 135,331 unique IPs accessing the top 25 replacement servers. Since then there has been a sizable outreach campaign as ISPs and others attempt to warn those users affected. In late May, around 330,000 systems were believed to be infected.

DNSChanger was a trojan that changed DNS settings – the links to servers which point browsers in the right direction for the sites you request – to alternative, compromised ones. Control of those sites allowed the malware operators to collect user data, show adverts for fake products and otherwise manipulate the internet experience.

Thankfully, the method of cleaning up a DNSChanger infection has improved since the early days, when a complete reinstallation of the OS – whether Windows or OS X – was required. Now, there’s a simple set of tools which do it without all of that headache, though it’s still advisable to run a full backup of personal files beforehand, just in case.

If you’re reading this (and you’ve not been forced to turn to a smartphone or tablet with your regular computer refusing to load sites) then you’re okay, but stand-by for parents and friends who may have complaints.


Internet goes offline for thousands as DNSChanger cleanup peaks is written by Chris Davies & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.


How to Choose a Secure Pet Name [Humor]

Most secure services ask users for some personal details to generate security questions. Some of the classics you can do little about—but humor news site NewsBiscuit amusingly points out that pet names can, and should, be changed on a regular basis in the interests of security. More »