PRISM fallout: EU votes to investigate US, threatens to cut data sharing

Tensions between the US and Europe continue to escalate, after the EU voted to begin an “in-depth inquiry” into allegations that the NSA and other US security agencies bugged EU premises as well as regularly monitor the communications European citizens. The Civil Liberties Committee investigation – supported by 483 votes to 98 (with 65 abstentions) – sees the EU demand full details from the US on how, exactly, programs like PRISM affect EU member states, in addition to exploring greater protections for whistleblowers like Edward Snowden.

prism-580x3781

That could include formal “procedures allowing whistleblowers to unveil serious violations of fundamental rights” as well as international agreements for how such people should be handled. As it stands, Edward Snowden – the former NSA contractor who revealed details of PRISM and other spying behaviors – is currently in a no-mans-land of residence, seeking asylum from around twenty different countries but without a passport as it has been rescinded by the US government.

Repercussions for EU-US relations could be significant. Members of the European Parliament have apparently called for potentially extreme cuts in data sharing, “including suspending the current air passenger and bank data deals.” Those are the schemes which see the EU and US share passenger name record data for travelers, as well as tracking potential terrorist financing.

Although the new investigation may seem, at first glance, specifically critical to the US, the EU also wants to know what’s going on with reports that other countries operate their own comprehensive spying schemes. “Parliament also expresses grave concern about allegations that similar surveillance programmes are run by several EU member states, such as the UK, Sweden, The Netherlands, Germany and Poland” the EU said in a statement. “It urges them to examine whether those programmes are compatible with EU law.”

The end goal, the EU says, is for a more comprehensive – and fair – data-sharing system to be established, with MEPs demanding that “the final deal must ensure that EU citizens’ access to the US judicial system is equal to that enjoyed by US citizens.”

The Civil Liberties Committee is expected to present its findings by the end of the year, though the PRISM fall-out is likely to worsen considerably before that happens. The US government is yet to comment on the new inquiry.


PRISM fallout: EU votes to investigate US, threatens to cut data sharing is written by Chris Davies & originally posted on SlashGear.
© 2005 – 2013, SlashGear. All right reserved.

Club Nintendo Japan hacked

Nintendo Japan has warned Club Nintendo users to change their passwords, after revealing that the member rewards site was hacked back in June, leading to tens of thousands of unauthorized logins. The first Nintendo realized of the compromised security was a dramatic increase in errors spotted on July 2, with subsequent investigation turning up 23,926 stolen logins and almost 15.5m attempts.

club_nintendo_logo

However, the first of the hacks apparently begin on June 9, continuing up to July 4, Nintendo Japan says. All passwords for the Club Nintendo service have been reset, and users will need to create new credentials when they next try to log in.

Club Nintendo is the company’s membership scheme, which offers rewards – including both in-game content, special limited edition games, warranty extensions, and real promotional gifts – in return for playing games on the Wii U, Wii, 3DS, and other Nintendo consoles. There’s no indication that Club Nintendo US or Club Nintendo UK have been compromised.

Fortunately, Club Nintendo never held any credit card data from its users, though the company says that it suspects names, addresses, phone numbers, and email addresses have all be taken. There’s currently no confirmation that any unauthorized use of Club Nintendo Points has taken place.

Nintendo is bulking up its security systems, in the hope of preventing something like this from happening again, but advises anyone who used the same credentials – such as email address, username, or password – for other services to change them there, just in case. It’s also sensible to be on the lookout for a potential increase in phishing attempts, which often follow email address thefts.

VIA Kotaku


Club Nintendo Japan hacked is written by Chris Davies & originally posted on SlashGear.
© 2005 – 2013, SlashGear. All right reserved.

Sony my Xperia goes global: “Find my iPhone” for Sony Androids

Sony has begun its global roll-out of “my Xperia“, the company’s mobile security service that offers “Find my iPhone” style remote tracking, locking, and wiping for Xperia Android phones. Trialled as a limited beta back in February, “my Xperia” should begin hitting phones more broadly across the globe “over the next few weeks” Sony says, providing greater peace-of-mind for Xperia owners.

sony_my_xperia

Like Apple’s service, “my Xperia” has various levels of security and protection. If you’ve lost your phone around the house somewhere, or left it lying on a cafe table perhaps, it’s possible to log into the web interface (at myxperia.sonymobile.com) and remotely trigger the phone to sound an alert. That’ll happen even if your Xperia is in silent mode, with the default being maximum volume.

The web UI also shows mapping data of where the phone last checked in; Sony says that, if it can’t instantly get a fix, it will keep trying and then send users an email when a location has been pinpointed. There’s also the option to override the current PIN or whatever other security is on the Xperia, and reset it to a new 4-digit PIN code remotely.

A message – such as the offer of a reward for safe return, and a contact number – can optionall be flashed up on the display.

Finally, as a last resort, it’s possible to wipe the Xperia altogether, either just the internal memory, or the memory card (if loaded), or both. Sony claims that, once that’s done, the only way to recover any of the files would be a restore from backup.

It’s a potentially valuable service, given the amount of personal data and account access our phones commonly hold, though Sony’s system is not the first time we’ve seen it for Android from a major OEM. HTC Sense Online, the company’s web-based component for Android phones running the Sense skin, went live back in 2010 and also offered remote location, locking, wiping, and other services, including accessing messages and contacts saved on the phone through the desktop browser.

However, HTC axed the online side of Sense in early 2012, after effectively leaving it to languish with little investment and minimal marketing. Also yet to show its hand is Google itself, though the company is undoubtedly looking at remote security for Android.

In the meantime, third-party options are on offer for those not using a Sony Xperia phone. Lookout, for instance, offers an Android app with the same functionality.

VIA AndroidBeat


Sony my Xperia goes global: “Find my iPhone” for Sony Androids is written by Chris Davies & originally posted on SlashGear.
© 2005 – 2013, SlashGear. All right reserved.

A 4-Year-Old Android Bug Could Bring Malware to 99% of Devices

A 4-Year-Old Android Bug Could Bring Malware to 99% of Devices

A team of security researchers claim to have identified a four-year-old Android bug that can allow malicious trojans to appear as verified apps, infecting devices with malware while users remain unaware of its presence.

Read more…

    

Android vulnerability discovered affecting devices running version 1.6 and later

A doozy of an Android bug has been discovered by Bluebox Security’s Bluebox Labs, one that affects all Android releases since 1.6 Donut. With the vulnerability, malicious coders can create a trojan application to serve whatever purpose they’d like, whether to steal a user’s information or take over control of the device. More information will be given at Black Hat USA 2013 in a keynote speech.

android-donut

According to Bluebox Labs, because of how many versions of Android are affected, a potential 900 million devices could suffer from the vulnerability, which involves a means for modifying APK code without harm to the app’s cryptographic signature. As such, a perfectly legit app can be converted into a trojan that slips under the radar.

The company goes on to specify that apps developed by the handset’s makers pose a greater risk due to their elevated privileges. Because of this, one of these apps that are exploited and turned into a trojan can give the hacker complete access to the mobile OS’s apps and system, as well as all their related data. The ramifications of this are two-fold:

Depending on the intent of the hacker, personal data like text messages, emails, any documents on the device, account passwords that are saved, pictures, and other related items can be swiped, potentially giving access to things like bank accounts and revealing contacts’ information. In addition, this can be taken a step further so that the hacker has the ability to use the device to send text messages, snap pictures, record videos, make phone calls, etc.

In an extreme case, the vulnerability could be used to create a botnet.

According to Bluebox, it informed Google of this Android vulnerability in February of this year. To take care of the issue, every device manufacturer will need to create a patch and roll it out to its users, who will then need to install it. The security firm says it will release “tools/material” and more info about this vulnerability during Blackhat USA 2013, which takes place later this month.

SOURCE: BlueBox


Android vulnerability discovered affecting devices running version 1.6 and later is written by Brittany Hillen & originally posted on SlashGear.
© 2005 – 2013, SlashGear. All right reserved.

Bluebox reveals Android security hole, may affect 99 percent of devices

Bluebox reveals Android security vulnerability, supposedly affects up to 99 percent of devices

Researchers at Bluebox Security have revealed a disturbing flaw in Android’s security model, which the group claims may affect up to 99 percent of Android devices in existence. According to Bluebox, this vulnerability has existed since Android 1.6 (Donut), which gives malicious app developers the ability to modify the code of a legitimate APK, all without breaking its cryptographic signature — thereby allowing the installation to go unnoticed. To pull off the exploit, a rotten app developer would first need to trick an unknowing user into installing the malicious update, but hackers could theoretically gain full control of a user’s phone if the “update” posed as a system file from the manufacturer.

Bluebox claims that it notified Google of the exploit in February. According to CIO, Bluebox CTO Jeff Forristal has named the Galaxy S 4 as the only device that’s currently immune to the exploit — which suggests that a security patch may already exist. Forristal further claims that Google is working on an update for its Nexus devices. In response to our inquiry, Google told us that it currently has no comment. We certainly hope that device manufacturers do the responsible thing and distribute timely security patches to resolve this issue. Absent that, you can protect yourself by installing updates through the Play Store and Android’s built-in system update utility.

Filed under: , ,

Comments

Source: Bluebox Security, CIO

Restore The Fourth

Restore the FourthThis year, the Fourth of July celebrations take a special importance for those who care about privacy and want to protest the NSA surveillance exposed in recent leaks.

Twitter Wants to Start Tracking You on the Web, Here’s How to Opt-Out

Twitter Wants to Start Tracking You on the Web, Here's How to Opt-Out

In a blog post today, Twitter announced that they’re "experimenting with new ways of targeting ads," which is their way of saying they’re planning to track you around the web—even when you leave Twitter—and relay that information to advertisers to craft better ads. Here’s how to opt out.

Read more…

    

Ubisoft hack spawns Watch Dog promo conspiracy theories

Yesterday, game publisher Ubisoft was hacked, leading to usernames and passwords on their ubi.com website being stolen. However, it seems that a lot of Ubisoft fans are wondering if it’s a serious situation or just a publicity stunt for a marketing campaign for Ubisoft’s upcoming game Watch Dogs, which is a game based on hacking into various computer systems.

watch-dogs

When Ubisoft posted about the hack on their Facebook page, many fans commented on and questioned whether or not the hack was actually legitimate, or just propaganda for Watch Dogs. Users asked questions like, “Are you sure its not just a watch dogs promotional stunt?” and commenting, “this is probably a Watch Dogs stunt,” and “hacked by Aiden Pearce.”

It seems the questionable hack was brought up after the fact that users received an email from Ubisoft, but noted that the email looked like spam with some users saying that the email was in German and full of grammatical mistakes. Other users noted that there was no signature attached to the email, so they couldn’t tell who it was from. Even the email address seemed a bit weird: email_ubi@email.ubi.com.

39386826

However, Ubisoft clarified over and over that it was a real hack, giving users a link to change their passwords. While the game publisher says that passwords are encrypted, there’s still a chance that they could be cracked by the hackers, so they’re warning all users to change their passwords before the hackers end up cracking them to get access to further information.

Ubisoft also says that financial information is safe, as the publisher doesn’t host that information on their website or server, but rather through a third-party. Then again, if a hacker ended up logging into your account, they could eventually find their way to your financial information and other personal info. Hacked or not, it’s always a good idea to change your password every so often to prevent peeping eyes from gaining access to your info.


Ubisoft hack spawns Watch Dog promo conspiracy theories is written by Craig Lloyd & originally posted on SlashGear.
© 2005 – 2013, SlashGear. All right reserved.

KeyMe Lets You Retrieve Lost Keys, Digitally

So you’ve lost your key, now what? If you don’t have a spare one (or lost all your spare keys as well!), then it’s time to change locks, which is a huge waste of time and money. But here’s something you might want to consider before the inevitable happens: save a duplicate of your key in the cloud.

keymeThis is made possible by the KeyMe kiosk. Create an account first, and then scan the key in the kiosk. The key image and pattern is then stored in the cloud, waiting to be accessed by you in case you lose your key and need it duplicated.

The cool thing is that the kiosk gives you choices on the types of keys that you want to have made.

key me key 2

Some of the options include decorative keys and combination keys that have embedded bottle openers on them. It only accepts home and office keys and not car keys, though, which is a bummer. If you’re worried about key security, KeyMe says it doesn’t store any information on your lock’s location, and requires a fingerprint and credit card for authentication.

The KeyMe kiosks were made in partnership with Benchmark Electronics and they’re set up in several 7-Eleven stores in New York City for now. Storing key patterns is free, while cutting a new key from the pattern will cost $19.99 (USD).

[via Gizmag]