Square’s Jack Dorsey calls VeriFone’s vulnerability claims ‘not fair or accurate’

We had a feeling that Square wouldn’t let VeriFone call it out without issuing some sort of statement, and CEO Jack Dorsey has responded to the claims of a gaping security hole in the form of an open letter on the company’s website. Dorsey calls its competitor’s accusations “not fair or accurate” and says that many of the necessary security measures are already built-in to your credit card itself. He also points out that this sort of credit card number thievery is possible every time you hand your plastic over to a waiter or salesperson, and that its partner bank, JPMorgan Chase, stands behinds all aspects of the service. To us, it seems like Verifone is more than a little scared at the prospect of Square undercutting its fees and potentially upending the POS business — but we’re just theorizing. One thing is for sure though, we’ll be hearing a lot more about this as the mobile payment war heats up in the future.

Square’s Jack Dorsey calls VeriFone’s vulnerability claims ‘not fair or accurate’ originally appeared on Engadget on Thu, 10 Mar 2011 14:07:00 EDT. Please see our terms for use of feeds.

Permalink Electronista  |  sourceSquare  | Email this | Comments

VeriFone calls out Square for ‘gaping security hole,’ publishes sample app to demonstrate

VeriFone, a huge provider of credit card processing systems that’s been around since time immemorial, has taken a huge swipe at upstart Square today, branding its free, headphone jack-based credit card readers “skimming devices” and demanding their immediate removal from the market. Crazy, right? VeriFone’s CEO has thrown up a YouTube video talking about the exploit its thrown together, and it’s more of a social engineering hack than a technical one: a bad guy makes a fake Square app for his phone, plugs in the reader, and steals your unencrypted credit card details without running a “real” payment through Square’s system. They’re really going big with this, too — not only is VeriFone’s sample app available for download, but they’ve sent notices to Visa, MasterCard, American Express, and JP Morgan Chase, which handles Square’s processing. Sounds like a possible problem, sure — but when the “exploit” is being announced in such grand fashion by a company that’s most threatened by Square’s business model, you can’t help but feel a little icky about it. Follow the break for video.

Continue reading VeriFone calls out Square for ‘gaping security hole,’ publishes sample app to demonstrate

VeriFone calls out Square for ‘gaping security hole,’ publishes sample app to demonstrate originally appeared on Engadget on Wed, 09 Mar 2011 11:30:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceVeriFone  | Email this | Comments

Lock-Cracking Robot Is Your Companion in Crime

Next time you forget the combination to your locker, you might turn to a team of students at Olin College of Engineering. Instead of using the brute-force method of hammer and cold-chisel preferred by tough-guys such as me, they opted to be egg-heads, and built a robot that will solve any Masterlock combination un under two hours.

If you know one or more of the numbers in your combination, the robot will crack the code much quicker. Quick enough for you to open “your” locker, grab whatever you came for, and get out, undetected.

The robot consists of a clamp, which hold the lock in place using a thumb-screw, and a puller, a solenoid-controlled grabber which yanks the loop of the lock to try to open it, and a stepper-motor which actually turns the knob and dials in the combinations.

Once the lock is in place, you fire up the companion software called LockCracker. You input the numbers you know, hit start, then go out behind the bike-shed to smoke an illicit cigarette. The software — written in Python — runs through all possible combinations in turn, trying the lock each time (so it really does use brute-force after all). Eventually, it will pop, and you’re in. It will even tell you the combination so you can do it yourself next time.

Like any powerful invention, the LockCracker can be used for good or evil. Or just demonstrations. Seeing as you would have to drag a computer, workbench and the robot itself into the locker room, this may be a little unwieldy for your criminal capers. Perhaps that hammer and chisel will be useful after all?

The LockCracker [Olin. Thanks, Jessica!]

See Also:


Intel brings vPro to Sandy Bridge CPUs, makes losing your work laptop slightly less painful

Imagine, if you will, business travelers gallivanting across the globe with nary a care in the world — secure in the fact that should they lose their laptop by hook or by crook, they can disable it with a simple text message. Well, the dream is now a reality as Intel has put its third-gen vPro technology in Sandy Bridge Core i5 and i7 business chips, giving users the ability to lock down and reactivate a PC remotely via SMS. Not exactly a fresh idea, but nice to see it passed on to more modern chipsets. To further simplify the lives of IT professionals, the new version of vPro also has an encryption login requirement upon awakening from sleep mode, 1920 x 1200 resolution remote management, and host-based configuration to allow the set up of countless PCs at once. Of course, that assumes your employer’s willing to pony up for Chipzilla’s new gear — the economic downturn’s almost over, right?

Intel brings vPro to Sandy Bridge CPUs, makes losing your work laptop slightly less painful originally appeared on Engadget on Tue, 08 Mar 2011 20:54:00 EDT. Please see our terms for use of feeds.

Permalink InformationWeek  |  sourceIntel  | Email this | Comments

Google flips Android kill switch, destroys a batch of malicious apps

When 21 rogue apps started siphoning off identifying information from Android phones and installing security holes, Google yanked the lot from Android Market, and called the authorities to boot. But what of the 50,000 copies already downloaded by unwitting users? That’s what Google’s dealing with this week, by utilizing Android’s remote kill switch to delete them over the air. But that’s not all, because this time the company isn’t just removing offending packages, but also installing new code. The “Android Market Security Tool March 2011” will be remotely added to affected handsets to undo the exploit and keep it from sending your data out, as well as make you wonder just how much remote control Google has over our phones. Yes, we welcome our new Search Engine overlords and all that, so long as they’ve got our best interests at heart, but there’s a certain irony in Google removing a backdoor exploit by using a backdoor exploit of its own — even one that (in this case) will email you to report what it’s done.

Google flips Android kill switch, destroys a batch of malicious apps originally appeared on Engadget on Sun, 06 Mar 2011 13:19:00 EDT. Please see our terms for use of feeds.

Permalink Phone Scoop  |  sourceGoogle Mobile Blog  | Email this | Comments

Google flips Android kill switch, destroys a batch of malicious apps (update)

When 21 rogue apps started siphoning off identifying information from Android phones and installing security holes, Google yanked the lot from Android Market, and called the authorities to boot. But what of the 50,000 copies already downloaded by unwitting users? That’s what Google’s dealing with this week, by utilizing Android’s remote kill switch to delete them over the air. But that’s not all, because this time the company isn’t just removing offending packages, but also installing new code. The “Android Market Security Tool March 2011” will be remotely added to affected handsets to undo the exploit and keep it from sending your data out, as well as make you wonder just how much remote control Google has over our phones. Yes, we welcome our new Search Engine overlords and all that, so long as they’ve got our best interests at heart, but there’s a certain irony in Google removing a backdoor exploit by using a backdoor of its own — even one that (in this case) will email you to report what it’s done.

Update: TechCrunch says there were 58 malicious apps and 260,000 affected phones in total.

Google flips Android kill switch, destroys a batch of malicious apps (update) originally appeared on Engadget on Sun, 06 Mar 2011 13:19:00 EDT. Please see our terms for use of feeds.

Permalink Phone Scoop  |  sourceGoogle Mobile Blog  | Email this | Comments

SSDs Make Data Unrecoverable By Law Enforcement

4617834323_bdf153a9ff_z.jpg

[photo by Flickr user gillyberlin]

Finally, it looks like someone has managed to pick the perfect hardware upgrade for all the embattled hedge-fund managers out there. Researchers have found that garbage collection methods on SSDs can often make data completely unrecoverable using available forensics techniques. According to an article published by Macworld, garbage collection purged all but a small percentage of 316,666 test files placed on the hard drive by researchers only three minutes after they were deleted. In a standard spinning drive, all of these files were recoverable.

Even after connecting a write blocker, a device designed to stop a hard drive from purging or writing over files, almost 20 percent of the contents of the drive were unrecoverable. According to the article, this is the first time write blockers have been ineffective in preserving the disk for future analysis.

Forensics experts are worried about the potential impact this has for investigating crimes, especially when the growing capacity of USB sticks and other solid-state media may one day lead to similar garbage collection being implemented there. Add that to the fact that it’s difficult or impossible to tell if this data wiping is done intentionally as a way to cover up evidence or if the average user just wanted more space for their Blu-Ray rip of Inception, and you’ve got a bunch of very nervous security professionals.

[via Macworld]

Handheld millimeter / microwave camera to see through walls, your underpants (video)

You know those scanners that peep your naughty bits at the airport? Well, a team of researchers have been working on a handheld camera that sports the same technology, and while they’re touting its future impact on stuff like cancer detection and aerospace engineering, we can’t help but squirm thinking about its Peeping-Tom potential. The camera currently takes 30 images per second by transmitting millimeter and microwaves to a “collector” on the other side of a subject, and then sends them to a laptop for real-time inspection. Aside from being able to see straight through your BVDs, it can also be used to detect defects in spacecraft insulation, find termites lurking in the walls of your apartment, and help in the diagnosis of skin disease. The camera’s creators are working on a smaller, one-sided version of the device that could have mass-market appeal — we just hope this thing stays in R&D long enough for us to get our bikini bodies back. Check out a video of its G-rated abilities after the break.

Continue reading Handheld millimeter / microwave camera to see through walls, your underpants (video)

Handheld millimeter / microwave camera to see through walls, your underpants (video) originally appeared on Engadget on Sat, 05 Mar 2011 11:24:00 EDT. Please see our terms for use of feeds.

Permalink PhysOrg  |  sourceMissouri University of Science and Technology  | Email this | Comments

Sprint’s Total Equipment Protection app searches out lost Androids and BlackBerrys

Joining AT&T and Verizon in offering some software-based data security for owners of its handsets, Sprint is today introducing its Total Equipment Protection app. Funnily enough, it uses the same Asurion software as the aforementioned other carriers, which would be why its functionality mirrors them so closely. With the TEP app, you’ll be able to track your phone via a web interface, force it to sound an alarm even if muted, lock it, and finally wipe your contacts (which can later be restored once you get your handset back). The app itself, compatible with Android and BlackBerry devices, is free, however you’ll need to be signed up to Sprint’s Total Equipment Protection program, which costs $7 a month. You’ll find more details in the press release after the break.

Continue reading Sprint’s Total Equipment Protection app searches out lost Androids and BlackBerrys

Sprint’s Total Equipment Protection app searches out lost Androids and BlackBerrys originally appeared on Engadget on Mon, 28 Feb 2011 09:03:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceSprint.com/protection  | Email this | Comments

TSA Harasses 9-yo Boy and Other Train Passengers After Their Trip [Video]

After going down in a spiral of paranoid stupidity—called out for saving body scan images, ridiculed for patting down an almost-naked woman or nailed for harrassing a kid at airport security—the TSA has reached a new low. It’s surreal. More »