Energizer confirms software vulnerability in Duo charging software

Energizer’s Duo USB battery charger has been around for a couple of years now, but the company has just now fessed up to a fairly significant vulnerability in the software for the device after being informed of the problem by CERT. While the software was intended to simply let you keep watch on the battery charging status, it apparently also opened up a backdoor that allowed commands to be executed remotely, including the ability to list directories, send and receive files, and run programs. That vulnerability is only found in the Windows version of the software, and Energizer has already discontinued the product altogether and removed the download from its website. Anyone that already has the software installed is advised to first uninstall it and then remove the Arucer.dll file from the Windows system32 directory.

[Thanks, Michael]

Energizer confirms software vulnerability in Duo charging software originally appeared on Engadget on Mon, 08 Mar 2010 16:19:00 EST. Please see our terms for use of feeds.

Permalink Bleeping Computer  |  sourceMarketWatch  | Email this | Comments

Verayo launches next-generation of ‘unclonable’ RFID chips, hackers get wide-eyed

If there’s one thing a security company should avoid, it’s tempting the hackers to unravel their promises. As we’ve seen time and time again, there are few (if any) completely uncrackable technologies, but Verayo sure seems confident about its next-generation RFID chips. Dubbed “unclonable,” this new product family — which is led by the Vera M4H — promises to make mass transit tickets, secure IDs and access cards more secure, and unlike the original, this one touts a “non-networked, unlimited authentication” feature. We also get the impression that the company has worked to drive costs down with this newfangled line, but we’re still not sure we’d trust our lives to this thing. Anyone down to really put these claims to the test?

Verayo launches next-generation of ‘unclonable’ RFID chips, hackers get wide-eyed originally appeared on Engadget on Mon, 08 Mar 2010 07:08:00 EST. Please see our terms for use of feeds.

Permalink   |  sourceBusiness Wire  | Email this | Comments

Take a Shot in the Dark: Brickhouse Flashlight Hidden Camcorder

FlashlightCamcorder.jpg

It looks like a flashlight, but it’s also a camcorder! Isn’t that cool? I’m crazy about the covert gear at BrickHouse Security, and the Flashlight Hidden Camcorder with Nightvision is just another reason why. While this looks and performs like a standard LED flashlight, it’s able to film VGA quality (640-by-480 pixel) video at 30 fps and record 2-megapixel shots on its microSD card.

The camera can record up to 8 feet away and, since it offers night vision, can capture video or pictures in complete darkness. You can record for up to 5 hours at a time with the rechargeable li-ion battery, and store 5 hours of video on the included 2GB microSD card. If you can think of a legitimate reason why a person might need a tool like this, leave it in the comments. If you’ve talked yourself into buying one, BrickHouse has them for $149.95.

Security ‘Expert’ Claims Thieves Can Detect Wi-Fi In Sleeping Computers

113152393_ff5717dd28_b

Thieves are using Wi-Fi detectors to sniff out notebook computers hidden in office drawers and car trunks, even when those computers have been shut down. How are they achieving this impossible task? As far as we can tell, it’s magic.

The claim comes from Credant, a UK-based data encryption company that sells “solutions” to big business, and clearly has an interest in scary stories about data and laptop theft. The story goes like this: people close their notebooks and stow them in a filing cabinet drawer or in the trunk of their car. The notebooks go to sleep. Or do they? Credant’s *marketing*, Sean Glynn:

because the latest laptops have a set time – sometimes up to 30 minutes – before they go into sleep mode when the laptop lid is shut, it doesn’t take a genius to realize that shopping malls around 6pm on weekdays can be a prime source of potential notebook computers, just waiting to be stolen from cars. [emphasis added]

Perhaps Credant should ask somebody other than the sales boss about the tech side of the business, because those laptops are not sleeping. If you shut the lid and the Wi-Fi radio stays on, or the fans keep spinning, your computer isn’t asleep. It’s pretty easy to tell, too: All MacBooks sleep almost immediately (there is a period of less than a minute while the contents of RAM is written to disk) and then the little sleep-light flashes. My old MSI Wind would sleep immediately, even when it still ran Windows.

By contrast, some notebooks do stay on, but it is also easy to tell. The Alienware M11X I tested at CES in Las Vegas kept glowing and spinning its fans when I closed the lid. In fact, I had to yank the battery just to shut it up and get some sleep (I was a little drunk after the WIRED party).

So, let’s assume that you do in fact have a laptop that keeps its Wi-Fi radio lit up for a half hour after you tell it to go to sleep. How would this actually help the thief? All a Wi-Fi detector does is tell you that a signal is available, how strong it is, and possibly – with some models – the direction of the signal’s source. Is this accurate enough to spot the right trunk in a crowded car-park? Probably not. And it would be almost impossible in an office, where there would be plenty of desktop machines still switched on to confuse things (and assuming the entire office staff leaves within half-an-hour of you stowing your machine).

Remember, also, that a notebook will not be broadcasting an SSID, which is what a detector will look for (unless you have explicitly set it up to create a network).

If you still doubt that this is a scaremongering scheme, the press release admits that in the UK, nobody is actually stealing laptops this way:

it is only a matter of time before this type of laptop detection technique finds its way to the UK.

So what should you do to keep safe? You guessed it:

You may not be able to totally prevent your laptop being stolen, but only switching on your WiFi when you really need it, and, of course, encrypting your data on the notebook drive [emphasis added].

The press release is not yet available on the Credant site, so I have pasted the entire email below.

Credant press releases [Credant]

Photo: redjar/Flickr

Credant warns users to turn off WiFi to help prevent laptop theft

2nd March 2010 – Credant Technologies, the endpoint data security specialist, has warned laptop users to turn off their WiFi signals before stowing their laptop in the boot of their car or stashing their laptop in the office cupboard or desk drawer, apparently out of sight of thieves.

“BT Openzone recently announced it had passed the million WiFi access point mark in the UK (http://bit.ly/9t3ZF4 ) and cellular carriers are also boosting their WiFi coverage areas to take the load off their hard-pressed 3G networks, which all adds up to something of a WiFi explosion in the UK,” said Sean Glynn, Credant’s VP Marketing.

“This in turn has triggered the widespread availability of low-cost keyfob WiFi detectors for under a fiver, and quite sophisticated directional detectors for around the 30 pounds mark, both of which can be used by thieves to detect the presence of an out of sight laptop,” he added.

Glynn’s warning comes after a warning from a security analyst in Jamaica has reported that a large number of laptops are being stolen using WiFi detection techniques for later criminal use (http://bit.ly/aktKPv )

And, he says, with auction sites selling WiFi detection kit for pocket money prices, it is only a matter of time before this type of laptop detection technique finds its way to the UK.

Credant’s observations, he went on to say, suggest that the real focus of identity thieves is the company laptop, which, as well as being a saleable item in its own right, can also contain valuable company data that can potentially be sold to thehighest bidder online.

And as the jailing of the Darkmarket carder forum mastermind for almost five years on Friday illustrates (http://bit.ly/a2QZKs ) identity theft is now big business, he noted.

Glynn went on to say that, because the latest laptops have a set time – sometimes up to 30 minutes – before they go into sleep mode when the laptop lid is shut, it doesn’t take a genius to realise that shopping malls around 6pm on weekdays can be a prime source of potential notebook computers, just waiting to be stolen from cars.

“And whilst the office worker is busy inside the mall doing their shopping, no-one is going to think twice about someone in a suit waving their `car keys’ around, ostensibly trying to find their car, when in fact s/he is looking for the strongest WiFi signal,” he said.

“You may not be able to totally prevent your laptop being stolen, but only switching on your WiFi when you really need it, and, of course, encrypting your data on the notebook drive, will go a long way to preventing your computer becoming just another statistic,” he added.


Microsoft tells IE faithful on Windows XP to avoid F1 key

Still hanging around on Windows XP? Perfectly acceptable. Still using Internet Explorer to browse the world wide web? Just a wee bit less forgivable, but we understand that some of you simply can’t get around it. If we just rung your bell, you might want to rip the F1 key right off of your keyboard (at least temporarily), as a recently discovered vulnerability in VBScript — which can only bother Windows 2000, Windows XP and Windows Server 2003 — could allow malicious code to weasel its way right into your life with a single keystroke. As the story goes, some ill-willed web sites are encouraging users to smash the F1 key in order to access a Microsoft Help file, and when said key is depressed, “arbitrary code could be executed in the security context of the currently logged-on user.” Microsoft has promised to fully investigate and resolve the issue in due time, but ’til then, we’d highly suggest avoiding your F1 key like the plague switching to Firefox.

Microsoft tells IE faithful on Windows XP to avoid F1 key originally appeared on Engadget on Tue, 02 Mar 2010 16:49:00 EST. Please see our terms for use of feeds.

Permalink Switched  |  sourceMicrosoft  | Email this | Comments

LA Port Police Adopt Real-Time Mobile Surveillance

LA_Port_Reality_Mobile.jpg
The LA Port Police have signed a deal with Reality Mobile to try out RealityVision, an enterprise-class, real-time mobile collaboration program.
That sounds innocuous, but the real story is in the instant video and data sharing capabilities: any user on the network can view live video from any source, as well as feed video and other critical data the other way, from smartphones or other video sources to a central command console.
The goal is to extend the Port’s police surveillance and response capacity. Reality Mobile said in a statement that the platform will integrate securely with the Port’s existing security infrastructure, and will receive feeds from over 350 fixed cameras.
The LA Port is the busiest container port in the U.S., and the 8th busiest in the world, according to Reality Mobile.

DARPA longs for magnetic body healers, crazy respawn camps

Even DARPA understands that its futuristic bubble shield can be penetrated given the right circumstances, and when it does, the soldier behind it is going to need some serious healing. In a hurry. In the entity’s newest budget, there’s $6.5 million tucked away “for the creation of a scaffold-free tissue engineering platform, which would allow the construction of large, complex tissues in vitro and in vivo.” As you well know, this type of mad science has been around for quite some time, and now it looks as if DARPA is ready for the next best thing: “non-contact forces.” Put simply, this alludes to replacing scaffolds with magnetic fields or dielectrophoresis, which could purportedly “control cell placement in a desired pattern for a sufficient period of time to allow the cells to synthesize their own scaffold.” It’s still too early to say how close we are to being able to instantaneously heal soldiers on the battlefield, but frankly, the public is apt to never know for sure.

DARPA longs for magnetic body healers, crazy respawn camps originally appeared on Engadget on Wed, 24 Feb 2010 04:22:00 EST. Please see our terms for use of feeds.

Permalink   |  sourceDARPA [PDF], Wired  | Email this | Comments

Let Corsairs Flash Padlock 2 Secures Your Data

CorsairFlashPadlock2.jpg

It’s so easy to lose a Flash drive or leave it behind somewhere. Rather than get heart palpitations at the thought of your precious data in someone else’s hands, just get a super-secure drive. Consider the newly released Corsair Flash Padlock 2, a drive so secure it lets you create your own combination (or PIN, if you prefer). Once you’ve created a PIN, data on that drive can’t be accessed until the correct number is input. Now that’s peace of mind.

And yet there’s more: The Flash Padlock 2 also uses 256-bit AES data encryption for the drive’s contents. Even if someone disassembles your drive and tries to read the data directly off the memory, they won’t be able to.

The Flash Padlock 2 has a rubberized casing and comes in one size, 8GB, enough to store thousands of images or music tracks. It comes with a 10-year warranty and works with Windows, Macintosh, and Linux PCs with no software required. Get if for a street price of $55.99.

GadgetTrak retrieves 95 percent of stolen laptops, puts RoboCop to shame (video)

Want your stolen gear back? Don’t call some gung-ho superhero who’s as likely to blow up your small grocery store as he is to catch those perps, call GadgetTrak instead. The little startup company has grown since we last heard of it back in 2007, and is now operating a $25 per year tracking service that has delivered a statistically significant 95 percent success rate on reuniting gadgets with their owners. Available for Mac OS and Windows laptops, as well as mobile phones (BlackBerrys, WinMo, and iPhone) and even removable USB storage, the software’s intelligent enough to remotely activate your webcam and ping the incriminating info back directly to you — no data is sent to GadgetTrak. Check out some recent news coverage of the software and its implementation in local schools after the break.

Continue reading GadgetTrak retrieves 95 percent of stolen laptops, puts RoboCop to shame (video)

GadgetTrak retrieves 95 percent of stolen laptops, puts RoboCop to shame (video) originally appeared on Engadget on Mon, 22 Feb 2010 07:16:00 EST. Please see our terms for use of feeds.

Permalink   |  sourceGadgetTrak  | Email this | Comments

DoD eases ban on thumb drive use for US military, our enemies rejoice

Betcha didn’t know that USB flash drives weren’t allowed in the US military. Or maybe you did — you know, considering that one with Japan-US troop deployment maps went missing in mid-2008. Oops. At any rate, the Department of Defense has reportedly lifted said ban, but as with anything related to The Man, gobs of red tape will be involved. For starters, they won’t be reintroduced “wholesale,” instead being reserved for “mission essential applications.” We’re also told that the drives themselves must contain specific security features, and administrators will be able to track the use of ’em from the outset. For those unaware, the ban was originally put into place just over a year ago after virus-laden USB keys disrupted military networks, presumably flashing Blingee’d faces of Kim Jong-il onto CIA surveillance screens. Or not, but that’d be pretty hilarious.

DoD eases ban on thumb drive use for US military, our enemies rejoice originally appeared on Engadget on Mon, 22 Feb 2010 00:57:00 EST. Please see our terms for use of feeds.

Permalink Fark  |  sourceDefenseNews  | Email this | Comments