IE security flaw exploited in recent Google attacks

This next item’s for any rogue states out there that might be planning a comprehensive wave of cyber-attacks: It looks like Microsoft has admitted that indeed it was a security flaw in Internet Explorer that hackers based in China exploited in the recent attacks on Google. As is often the case, the flaw is neatly summed up in the title of the advisory: “Vulnerability in Internet Explorer could allow remote code execution.” According to news agency AFP, the incident (which targeted Chinese human rights activists) shows “a level of sophistication above that of typical, isolated cyber criminal efforts.” (Which is, evidently, how we like to think of our own cyber criminal efforts.) Microsoft has yet to release a formal software update. In the meantime, if you think your machine could be at risk, hit the source link for all the details. Or just switch to Firefox.

IE security flaw exploited in recent Google attacks originally appeared on Engadget on Fri, 15 Jan 2010 14:02:00 EST. Please see our terms for use of feeds.

Permalink BBC  |  sourceMicrosoft  | Email this | Comments

Researchers Crack 3G Network Encryption

MISTY_Encryption.jpg

Just two weeks after researchers broke the encryption inherent to GSM networks comes word that another team has cracked 3G encryption.

The attack takes just a few hours on a typical PC, reports Ars Technica. That’s enough time to crack 3G’s KASUMI system, which is based on a simplified type of Fiestel encryption called MISTY (pictured; good luck with that.) MISTY uses multiple keys and a recursive, multi-round encryption process.

The “simplified” KASUMI algorithm was supposed to make it “faster and more hardware-friendly” without compromising security. But as the report indicates, it seems that’s no longer the case. This doesn’t mean that every AT&T and T-Mobile cell phone is suddenly insecure; a research environment is very different than the real world. But it’s food for thought nonetheless.

3G GSM encryption cracked in less than two hours

Looks like all that GSM code-cracking is progressing faster than we thought. Soon after the discovery of the 64-bit A5/1 GSM encryption flaw last month, the geniuses at Israel’s Weizmann Institute of Science went ahead and cracked the KASUMI system — a 128-bit A5/3 algorithm implemented across 3G networks — in less than two hours. If you must know, the method applied is dubbed ‘related-key sandwich attack’ where multiple values of known differentials are processed through the first seven rounds of KASUMI, then using resulting quartets that are identified sharing key differences, subkey materials can be obtained in round eight to build up the 128-bit key. Sure, it’s hardly snooping-on-the-go at this speed, but worryingly this was only an ‘unoptimized implementation… on a single PC.’ At the same time, the paper condemns the presumably red-faced GSM Association for moving from MISTY — a more computationally-expensive but much stronger predecessor algorithm — to KASUMI. Guess we’ll just have to stick with Skype.

3G GSM encryption cracked in less than two hours originally appeared on Engadget on Fri, 15 Jan 2010 06:45:00 EST. Please see our terms for use of feeds.

Permalink PhoneArena  |  sourceInternational Association for Cryptologic Research  | Email this | Comments

Droid security flaw makes lock screen a mere inconvenience for evil-doers

You might recall Apple having a hard time keeping its lock screen locked at one point, and it looks like we’ve got a common theme brewing here now that Android’s suffering from the same drama. Turns out that Android 2.0.1 — the build currently deployed on the Droid — suffers from a flaw whereby you can back out to a locked phone’s home screen simply by pressing the Back button after accepting an incoming call. Of course, you’d either have to know a phone’s number or wait for a call to actually take advantage of this, but we’d argue that it’s a pretty low barrier of entry. The bright side of the story, we suppose, is that the phone goes back to being locked as soon as the call ends, but then again it doesn’t take much time to peep your juicy emails. Google’s aware of the issue, so we’re thinking this’ll make it into the Droid’s next software update; we don’t have a launch window for that just yet, so in the meantime… you know, just make sure no one ever calls you and you should be good to go.

Droid security flaw makes lock screen a mere inconvenience for evil-doers originally appeared on Engadget on Mon, 11 Jan 2010 15:49:00 EST. Please see our terms for use of feeds.

Permalink PhoneArena  |  sourceTheAssurer  | Email this | Comments

Classy Swann Pen Takes Secret Videos

PenCam.jpg

Spy gear brings out the secret agent in all of us. Today we learn that the Swann Security PenCam Mini Video Camera & Recorder has been upgraded. While it appears to be a working executive pen, this gadget records color AVI video at a 640-by-480 VGA resolution and takes JPEG images at a 1280-by-960 resolution. The pen includes 2GB of memory, enough for over an hour of video or 9,600 images. The included rechargeable lithium ion battery will keep you spying for 90 minutes.

The pinhole camera is located just above the clip, so you should be able to hold the camera naturally while recording. The box includes a USB connection cable and three replacement ink cartridges. The pen is available with either gold or silver trim and sells for $99.99.

Your Passwords Aren’t As Secure As You Think; Here’s How to Fix That

If you allow applications to save your passwords, anyone with physical access to your PC can decode them unless you’re properly encrypting them—and chances are pretty good you’re not. Let’s walk through the right and wrong ways to store your passwords.

For the purpose of this article, we’ll assume that the people you allow into your house are trustworthy enough not to hack your passwords, and your laptop has been stolen instead—but the tips here should apply to either scenario. Regardless of how you choose to save your passwords, you should make sure to use great passwords and even stronger answers for security questions.

Once You Click “Remember Password” It’s All Over

Almost any application that requires you to login to something will also provide an option to save your password, and once you’ve done that, your password may as well be plain text. Behind the scenes, even if the application encrypts the account information, it’s doing so with a static key that can be easily deciphered through some reverse engineering, and somebody not only can, but already has created a utility to recover those passwords.

It doesn’t even matter all that much if you’ve got a tough Windows password; anybody with physical access to your PC can use an Ubuntu Live CD to copy all of your data onto an external drive without modifying anything, and crack your files on another machine whenever they please (assuming you don’t have your entire hard drive encrypted). If they had a little more time, they could use Ophcrack to figure out your password, or they could just be mean and use the System Rescue CD to change your Windows password.

Once that person has access to your files, they can recover your passwords with free tools easily—you can recover passwords in a few clicks from Outlook, Instant Messenger, Wi-Fi, Internet Explorer, Firefox, Chrome, or any number of other applications. All it takes is a quick Google search to find even more cracking utilities.

Pidgin Stores Passwords in Plain Text

That’s right, your favorite open-source, multi-protocol instant messenger client stores your passwords in plain text. If you don’t believe me, just open up your %appdata%\.purple\accounts.xml file in your favorite text editor, and you’ll see your passwords right there for anybody to read.

The decision to store the passwords in plain text is a deliberate one that’s been thoughtfully considered, and while you might initially think it’s a terribly insecure way to handle security, keep in mind that you can simply download any number of utilities like Nirsoft’s MessenPass and recover the passwords from AIM, Windows Live Messenger, Trillian, Miranda, Google Talk, Digsby, etc. The Pidgin developers point out that their option is actually the preferred method for security:

Having our passwords in plaintext is more secure than obfuscating them precisely because, when a user is not misled by a false sense of security, he is likely to use the software in a more secure manner.

The best answer, of course, is to not allow your IM client to store your passwords at all—but if you must store them, you should at least use the built-in Windows encryption, if not a full-blown TrueCrypt setup. Either option would be better than the pseudo-protection most other applications provide.

Password Managers Are the Only Secure Storage

The only truly secure way to store your passwords is to use a password manager to securely track your passwords, combined with a a great master password to protect the rest of your saved passwords—if you use an easy password for your password manager, it would be easy to crack with a brute force attack. Don’t lure yourself into a false sense of security by just using one—your password manager password should be at least 10 alpha-numeric characters if you really want to be secure.

You’ve got a number of great password managers to choose from, like reader favorite Keepass, a cross-platform tool which has many plugins that help you master your passwords and make using a password manager easier to deal with. And, of course, let’s not forget that Firefox has a full password manager built right into the application.

Use a Firefox Master Password (With More Than 8 Characters)

If you want to use Firefox to save the passwords for all your web accounts, you should make sure to enable a Firefox Master Password by heading into Tools –> Options –> Security and checking the box for Use a master password.

Once you’ve done this, Firefox will store all of your passwords with nearly unbreakable AES encryption—providing you use a password with more than 8 alpha-numeric characters and at least one capitalized letter. If you used a weak and pathetic password like “secret”, it could be broken in a matter of minutes with a brute force cracking tool, but a decent 8+ random character password will take at least 73 years for a brute force attack.

Each time you start Firefox and go to a site that requires a saved password, you’ll be first prompted for your master password. By default, the master password authentication will be active for the entire session, but you can use the Master Password Timeout extension to lock your master password again after a certain interval, which is handy if you walk away from your desk without remembering to lock it with Win+L.

Use TrueCrypt to Encrypt Everything

Rather than deal with password managers or whether or not to save your passwords, you could simply create a separate, encrypted TrueCrypt drive, and use portable versions of your applications to keep everything totally secure. If you’re even more paranoid, you can use TrueCrypt to encrypt the entire hard drive—you will be prompted for a password every time you boot, but you can relax knowing that anything you do will be encrypted, even if you use scripts with your passwords stored in plain text. If TrueCrypt isn’t your thing, you can use the built-in encryption functionality in Windows—just keep in mind that if you change your password your data will be inaccessible, and your Windows password can be cracked, giving them full access to your files.


Are you already using a password manager or encryption to keep your passwords secure? Share your best password security tips in the comments.


The How-To Geek uses Keepass and a tough password scheme to keep his accounts secure. His geeky articles can be found daily here on Lifehacker, How-To Geek, and Twitter.

CES: SilentCall Receivers Offer Independence and Safety

CES - SilentCall - Logo

If you or a loved one has hearing problems, is elderly, or just live in a home large enough that you can’t keep an eye on all parts of it at one time, SilentCall Communications‘ alarm and alerting products may be perfect for you. 
A number of SilentCall’s receivers and alarms were on display at CES this year, including the Sidekick II and the Silent Touch SS, all products that find alternate ways to alert you to a ringing telephone, a doorbell, or a smoke or burglar alarm without relying on you having to hear it.

In addition to the hearing impaired, SilentCall
Communications’ products are also targeted at elderly consumer or their
families, who want to give their loved ones the option to live in their
own homes as long as possible without fearing they’ll sleep through a
fire alarm or even miss the doorbell when UPS shows up to drop off a
package.

Twittering Arduino-powered laser tripwire captures trespassers — digitally (video)

Twittering Arduino-powered laser tripwire captures trespassers -- digitally (video)
Spare a thought for the modern thief. They have to face off against phones that can broadcast their location, laptops that lock themselves down, a LoJack service for iPods, and now a laser tripwire that can twitter pictures of unwanted visitors. It’s a decidedly DIY Arduino-based project, but unlike many similarly powered offerings that we hit, this one is described as being very easy — as far as Arduino-based projects go, anyway. Check out the instructions at the read link, or just enjoy the little demo video after the break if you’re feeling lazy.

Continue reading Twittering Arduino-powered laser tripwire captures trespassers — digitally (video)

Twittering Arduino-powered laser tripwire captures trespassers — digitally (video) originally appeared on Engadget on Tue, 05 Jan 2010 03:28:00 EST. Please see our terms for use of feeds.

Permalink   |  sourceinstructables  | Email this | Comments

GSM call encryption code cracked, published for the whole world to see



Did you know that the vast majority of calls carried out on the 3.5 billion GSM connections in the world today are protected by a 21-year old 64-bit encryption algorithm? You should now, given that the A5/1 privacy algorithm, devised in 1988, has been deciphered by German computer engineer Karsten Nohl and published as a torrent for fellow code cracking enthusiasts and less benevolent forces to exploit. Worryingly, Karsten and his crew of merry men obtained the binary codes by simple brute force — they fed enough random strings of numbers in to effectively guess the password. The GSM Association — which has had a 128-bit A5/3 key available since 2007, but found little takeup from operators — has responded by having a whinge about Mr. Nohl’s intentions and stating that operators could just modify the existing code to re-secure their networks. Right, only a modified 64-bit code is just as vulnerable to cracking as the one that just got cracked. It’s important to note that simply having the code is not in itself enough to eavesdrop on a call, as the cracker would be faced with just a vast stream of digital communications — but Karsten comes back to reassure us that intercepting software is already available in customizable open source varieties. So don’t be like Tiger, keep your truly private conversations off the airwaves, at least for a while.

GSM call encryption code cracked, published for the whole world to see originally appeared on Engadget on Tue, 29 Dec 2009 04:18:00 EST. Please see our terms for use of feeds.

Permalink Phone News  |  sourceNew York Times  | Email this | Comments

Video Interview with MacBook Bullet Girl

Lily Sussman, the 21 year-old whose MacBook was taken out the back by Israeli border guards and shot-through with three rifle rounds, has given a video interview to the Daily News Egypt. Apparently, she will be reimbursed for the laptop.

Sussman had spent some time in Cairo before crossing the border at Taba on her way to Jerusalem. Upon her crossing, guards found the MacBook suspicious and put three slugs through its tough little unibody. As you may remember, the hard-drive survived.

Sussman seems to be bewildered as to why the machine was “suspicious”: The border guards didn’t even want to check the contents. Bear in mind that traveling from Israel into Arab lands is usually trouble-free, but the reverse is usually much trickier. Now read this, from the Daily News Egypt article:

Amongst the items the guards found suspicious according to Sussman were an Arabic phrasebook, a guide to Palestine, stamps from various Arab countries and map of a bus station and hostel in Jerusalem in which she was to stay.

Also on her camera were pictures of a photo exhibit about the Israeli attack on Gaza last December.

In the video clip, Sussman also says that she snickered at the guard who was questioning her on her knowledge of Jewish faith (Sussman says she is part Jewish). Ignoring the religion part of this for a moment, it seems clear that if you visit somebody’s country, you play by their rules, and don’t laugh at their customs.

In other (fake) news, a US student attended a bullfight in Spain, painted her MacBook red and started waving it at the bull. The bull smashed the machine. Made-up reports say that she is “shocked and stunned” at the attitude of the Spanish authorities, who say it was “her own stupid fault”.

Video Interview With Us Tourist Whose Laptop Was Shot by Israeli Border Guards [Daily News Egypt]

See Also: