Google patches Flash vulnerability in Chrome, leaves other browsers hanging

Remember that massive security vulnerability that Adobe identified in its Flash Player, Acrobat and Reader software? Well, shockingly enough, it hasn’t yet taken over the internet and ground productivity to a halt, but Google’s been proactive about it and patched the flaw by itself. Of course, the fix applies only to its own Chrome web browser, Firefoxes and Internet Explorer types will have to wait for Adobe’s fix, which is expected any minute now. Still, it’s good to know someone’s looking out for the security of our data, even if that someone already has access to most of it anyway.

Google patches Flash vulnerability in Chrome, leaves other browsers hanging originally appeared on Engadget on Mon, 21 Mar 2011 09:04:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceGuardian  | Email this | Comments

Burglar Blaster Alarm Fires Pepper Spray

The Burglar Blast squirts out pepper spray when activated by intruders or pets

I’m not sure if booby-trapping your home, your possessions, or your anything is at all legal, but if you really want to get back at those damn burglars rather than just scaring them away, then the Burglar Blaster is the gadget you have been waiting for.

It’s an intruder alarm with a surprise payload: pepper spray. When the passive infrared detector sees something move, it sounds a high-pitched squeal for anything up to 40 seconds before delivering a dose of chili vapor into your home which will then drift to fill a space of up to 2,000 feet. It is built into an aluminum case, and can run for up to four years on a set of C-cell batteries.

What could possibly go wrong?

I have lived and worked in enough places with alarms to know that they go off for any and all reasons, whether they’re supposed to or not. And while being woken by an alarm screaming at you from downstairs is annoying, being gassed in your own bed by a malfunctioning detector is a terrifying thought.

All this talk of booby-traps got me thinking about and old college friend of mine. We lived in a rough part of town, prone to burglaries. He had a scheme which would have involved hiding razor-blades behind the edges of his vintage movie and music posters to slice the fingers of any thief. It would have been a wonderful plan, except for the fact that burglars don’t steal posters, and that his house was full of expensive music gear.

The Burglar Blaster comes from the same people who brought us the Bed Bunker gin safe, and costs $600.

Burglar Blaster product page [Bed Gun Safe]

See Also:


Hiplok Bike Lock Is Worn Like a Belt

The Hiplok is a bike lock and seatbelt in one

Whenever I see somebody riding with a bike chain slung around their body, I wince. Whether it is encircling their waist or slung diagonally across shoulder and torso, I imagine what could happen if things went wrong.

A simple crash could turn into a body-halving catastrophe if the chain were to get caught on a speeding car. A neck could be broken. The bike itself could get caught up and pulled along with you instead of just falling safely away.

Enter the Hiplok, a bike chain designed to be worn around your waist, but without locking in place. It works a lot like an airplane seatbelt. The padlock itself has an extra rectangular loop on its base, through which you thread a seatbelt webbing strip joined to the end of the chain. The padlock is similar to a belt buckle.

It’s adjustable, to suit any girth, and can be had with its clothes-protecting nylon sleeve in bright, reflective material. While this may not be as safe as having nothing around your body, at least it’s easy for the paramedics to remove. And carrying weight around your waist when riding makes the weight disappear — you don’t really feel it at all.

I want to see this lock tested, or to check its sturdiness out in person before laying down £70 ($113). I’m also thinking hard about modding my existing bike chains to work like this. Maybe I’ll even put in a special loop to carry my hipster D-Lock (where “D” stands for “douche”), the Kryptonite Evo Mini.

Hiplok product page [Hiplok via Urban Velo]

See Also:


Creeper, the first computer virus, is 40 years young today

Forty years ago today is considered by many to be the birthday of the first computer virus. Of course, in the early 1970s they weren’t called computer viruses, but that doesn’t make Bob Thomas’s handiwork any less special. Creeper (named after a character in the old Scooby Doo cartoons) spread from BBN Technologies’ DEC PDP-10 through Arpanet, displaying the message: “I’m the creeper, catch me if you can!” and messing with people’s printers. One notable difference between this and the majority of viruses was the fact that it it deleted old versions as it replicated itself. Incidentally, that would make 2011 the fortieth anniversary of the first antivirus software: called, appropriately enough, Reaper.

Creeper, the first computer virus, is 40 years young today originally appeared on Engadget on Thu, 17 Mar 2011 19:34:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourcePhysOrg  | Email this | Comments

Caribou Android app opens doors over the internet, needs neither permission nor keys (video)

Opening doors with wireless RFID cardkeys is old hat at this point, but opening those doors with a smartphone is rather more intriguing. Doing so without permission of the people who put the locks on the doors, well, that brings things up to a whole new level of awesomeness. That’s what Caribou does, a little Android app that remotely connects to a server managing the locks at a supposedly secure location. The app then diddles the ports and security settings of that server until it finds the magic phrase and, in a couple of seconds, it’s open sesame time. Doors are unlocked remotely and then, 30 seconds later, automatically locked again. How thoughtful.

We first saw this demonstrated a few days ago but weren’t entirely convinced of its legitimacy. But now, after exchanging a few e-mails with Michael Gough, who discovered the exploit, and Ian Robertson, who wrote the app, we’re convinced. They’re actually working with US-CERT on this issue so that appropriate measures will be taken but, in the short-term, if you have a system like this and it’s sitting out there, IP open to the internet and being caressed by every passing breeze, you might want to think about pulling that in behind your firewall. Lots more info at both source links below, though you can see it working for yourself right here in a video after the break, running on an HTC Incredible.

Continue reading Caribou Android app opens doors over the internet, needs neither permission nor keys (video)

Caribou Android app opens doors over the internet, needs neither permission nor keys (video) originally appeared on Engadget on Thu, 17 Mar 2011 10:41:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceCyberSecurityGuy, Hacker Hurricane  | Email this | Comments

Hacking Competition Leaves Android and Windows Phone 7 Devices Undefeated

The Nexus S is the Android phone target in the 2011 Pwn2Own competition.

From the results of the Pwn2Own hacking competition, it looks like Android and Windows Phone 7 are tough nuts to crack.

It took only two days for hackers to crack into the Apple and Blackberry operating systems during the three-day Pwn2Own tournament last week, while Android and Windows Phone 7 models were abandoned and left unhacked by the end of the contest.

Is this because their operating systems are more secure? Yes and no.

“The survival of a target at Pwn2Own does not automatically declare it safer than a target that went down,” last year’s Internet Explorer Pwn2Own winner Peter Vreugdenhil cautions. The contestants who were lined up to beat the Android and WP7 devices in the competition withdrew for a variety of reasons.

Pwn2Own, now in its fifth year, is a hacking competition divided into two areas: web browsers and mobile phones.

This year, Microsoft Internet Explorer 8, Apple Safari 5.0.3, Mozilla Firefox, and Google Chrome were the web-browser targets. In the mobile phone category, the Dell Venue Pro (Windows Phone 7), Apple iPhone 4 (iOS), BlackBerry Torch 9800 (Blackberry 6) and Nexus S (Android) were targeted. The OS and browser versions were frozen last week (so for example, Apple’s Safari 5.0.4 update was not used), ensuring that all contestants are working on the same version of each OS.

Pwning and owning occurs if the hacker defeats the frozen version. If the exploit they used still exists in the current firmware, they are also eligible to receive a monetary prize. The 2011 Pwn2Own competition ran March 9 to 11.

Vreugdenhil says many different factors determine how hard a target is to hack. There’s the safety of the software itself, the exploit mitigations that are already in place for that software, and then the amount of research that has already been conducted (which can speed up the process of writing an actual exploit).

Firefox and Chrome web browsers were also left undefeated because contestants withdrew from Pwn2Own.

“Chrome has the advantages of having multiple exploit-mitigation techniques that certainly make it more difficult to hack. As for Android, we see no particular reason why Android would be harder to hack than one of the other targets.”

Safari, Chrome, iPhone, Android and Blackberry all use WebKit in their browsers, which means that they are all susceptible to exploitation through the browser — and that’s exactly how the iPhone and Blackberry were attacked.

Charlie Miller, a Pwn2Own veteran, worked with Dion Blazakis to hack the iPhone 4 in this year’s competition using a flaw in its Mobile Safari Web browser and a “specially-crafted webpage.” A team of 3 (Vincenzo Iozzo, Willem Pinckaers, and Ralf Philipp Weinmenn) defeated the BlackBerry Torch using a similar technique.

So what did the contest’s organizers think of the outcome of 2011’s Pwn2Own?

Vreugdenhil and other organizers were not surprised that the iPhone went down quickly. It has been a major target and a lot of research has already been done on that platform.

Android’s survival was a bit of a surprise, since it is also a big target and had four contestants lined up.

Although no device is unhackable, some factors contribute to a safer product. For those that are out to find the safest phone on the market, Vreugdenhil says you’ll want to compare features such as DEP (Data Execution Prevention), ASLR (address space layout randomization), Sandboxing, code signing and the ease with which software can be updated on the device.

Pwn2Own Day 2 [Ars Technica]


Twitter adds ‘Always use HTTPS’ option, makes cyberterrorists FOF

One small checkbox for your mouse pointer, one giant leap for your Twitter account’s security. The microblogging site that every techie knows, loves, and occasionally loathes, has added a new option to allow users to go HTTPS full-time. For the unenlightened among you, that means all your communications with Twitter can now be done over an SSL-encrypted channel, which massively boosts their resilience to external attacks. That won’t protect you if you’re careless with your password or leave your account logged in on computers other than your own, but at least you can sleep a little more restfully knowing that nobody other than yourself will be embarrassing you on the Twittersphere.

Twitter adds ‘Always use HTTPS’ option, makes cyberterrorists FOF originally appeared on Engadget on Wed, 16 Mar 2011 09:09:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceTwitter Blog  | Email this | Comments

Adobe finds ‘critical’ security hole in Flash Player, won’t fix it before next week

Oh, here we go again. Adobe’s kicked out a security bulletin for users of its Flash Player on “all platforms” — that’ll be the entire population of the internet, then — warning them that a new critical vulnerability has been discovered that may cause crashes and potentially permit the hijacking of systems. The issue also affects the company’s Reader and Acrobat software products. Even better news is that Adobe has found it’s being actively exploited “in the wild” via a .swf file embedded in an Excel spreadsheet, but a fix won’t be forthcoming until the beginning of next week. So, erm, enjoy your full web experience until then!

Adobe finds ‘critical’ security hole in Flash Player, won’t fix it before next week originally appeared on Engadget on Tue, 15 Mar 2011 04:03:00 EDT. Please see our terms for use of feeds.

Permalink PC World (Yahoo! News)  |  sourceAdobe  | Email this | Comments

Apple doubles down on in-app purchasing security in iOS 4.3, password now required

As you might recall, a certain game was racking up credit card bills because of its in-app purchases — something which probably resulted in some angry parents (or as the folks in Finland say, “birds”). In Apple’s latest iOS update, a feature has been implemented that requires the user to input their password whenever an in-app purchase is made. Will this new security measure actually prevent those children from purchasing hundreds worth of virtual fruit? A big boon for grown-ups, a big downer for those who no longer have an excuse to explain their Smurfberry obsession.

Apple doubles down on in-app purchasing security in iOS 4.3, password now required originally appeared on Engadget on Fri, 11 Mar 2011 01:46:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceGigaom  | Email this | Comments

New FAA Rule Turns Airplane Lavatories Into Deadly Traps [Video]

Air Worthiness Directive 2011-04-09. That’s the name of a new FAA rule that might kill you one day. It dictates that emergency oxygen masks should be removed from lavatories in every commercial plane in the United States. More »