Ads 468x60px

Labels

Thursday, January 31, 2013

'Silent but deadly' Java security update breaks legacy apps - dev


An application developer reports that the latest Java 7 update "silently" deletes Java 6, breaking applications in the process.
Java 7 update 11 was released two weeks ago to deal with an unpatched vulnerability which had gone mainstream with its incorporation into cybercrook toolkits such as the Blackhole Exploit Kit in the days beforehand. Attacks were restricted to systems running Java browser add-ons.

Patent Term Calculations: District Courts Split on PTA Calculations; Revive Focus on Deference to PTO Determinations


By Dennis Crouch
Exelixis v. Kappos (Exelixis II) (E.D. Va. 2013)
We now have a district court split on post-RCE patent term adjustment. This decision – siding with the PTO – arises from a second Exelixis case and will be called Exelixis II (Brinkema, J.) In Exelixis I, Judge T.S. Ellis sided with the patentee in finding that the PTO was improperly under-calculating the patent term owed to patentees who had filed a request-for-continued examination during the course of prosecution. Exelixis v. Kappos, — F. Supp. 2d —, 2012 WL 5398876 (E.D. Va. Nov. 1, 2012), as amended Nov. 6, 2012. In the parallel caes of Novartis AG v. Kappos, — F. Supp. 2d --, 2012 WL 5564736 (D.D.C. Nov. 15, 2012), Judge Huvelle adopted the reasoning of Judge Ellis in siding with the patentee. Those decisions basically held that "once the three year clock has run, PTA is to be awarded on a day for day basis regardless of subsequent events." The PTO has argued that an RCE stops the running of the PTA clock.

Best Super Bowl Commercial So Far

Smartphone Wars: Micron’s Slide-to-Unlock Patent


by Dennis Crouch

Adding a bit of drama to the slide-to-unlock debate, Micron has just received its own patent covering a "system and method for controlling user access to an electronic device." U.S. Patent No 8,352,745 issued in January 2013 but claims priority to an original application filed in February 2000 and lists Jim McKeeth as inventor.

Claims:

1. A system comprising:

a touch screen upon which a user is to enter, by drawing, a geometric pattern in a specified direction to gain access to the system; and

a processing circuit coupled to the touch screen to compare the user entered geometric pattern to a predefined geometric pattern stored in a memory.

6. The system of claim 1 wherein the user entered geometric pattern is a line.

Apple's slide-to-unlock patents claim priority only to the 2004-2005 timeframe and, although they may be separately patentable, Apple's patents will not serve to invalidate Micron's new patent.

Samsung has a 10-year cross-license deal with Micron. I have not seen reports of any similar deals with Apple, Google\Motorola, or RIM. It will be interesting to see whether Micron holds onto the patent or shifts it two an enforcement company as it did in 2010 in sending 4,000+ patents to John Desmarais for enforcement. Micron is a major manufacturer of computer memory with a market valuation of about $8 billion, perhaps they should just ask for Apple to endorse-over its recent billion dollar patent infringement judgment. One complicating factor is that I suspect Micron is a supplier for all of the potential defendants.

Hacking Hacker's Secrets

:: DOWNLOAD HERE ::


Hacking Bluetooth

:: DOWNLOAD HERE ::


Hacking Windows Registry

:: DOWNLOAD HERE ::


Hacking for Dummies part 2

:: DOWNLOAD HERE ::


Hacking and Network Defences

::  DOWNLOAD HERE ::


Hacking for Dummies

:: DOWNLOAD HERE ::


Hacking History

:: DOWNLOAD HERE ::


Hacking a cock Machine

:: DOWNLOAD HERE ::


Hacking Linux

:: DOWNLOAD HERE ::


Windows product activation

:: DOWNLOAD HERE ::


Hacking IIS servers

:: DOWNLOAD HERE ::


Hacking Step by Step

:: DOWNLOAD HERE ::


Hacking Cisco Router


:: DOWNLOAD HERE ::


Sunday, January 27, 2013

Brisbane online flood maps woefully inadequate


As floods sweep over South-East Queensland for the second time in two years, Premier Campbell Newman took to the airwaves on 27 January advising citizens to “look at their flood maps” to decide whether they were at risk.
To quote News Limited: “residents should check flood maps which would be released on council floods maps [for Brisbane and Ipswich] later tonight.”
Being of an inquiring mind, The Register decided to take that advice, even though Vulture South is nowhere near the floods. And here’s what we find.

The end of the line for Symbian

http://osnews.com/img/26734/series3as.jpg


Buried deep within Nokia's press release about its financial results, there's a line that pretty much signals the end of one of the most popular and successful mobile operating systems in history. With Nokia retiring its use, Symbian is no more.
Symbian wasn't only incredibly successful, it's also incredibly old. Many people think Symbian originated at Psion as EPOC, but that's not entirely true. Technically speaking, Symbian is EPOC32, which is a different operating system than EPOC. EPOC was written in 8086 assembler and C, and powered many of Psion's PDAs, including the Series 3a pictured below. This thing is a joy to use, actually, even though it's from 1993 and uses a 8086. The built-in spell checker is pretty amazing, and quite fast.
EPOC32 is EPOC's (renamed to EPOC16 or SIBO to distinguish it from EPOC32) successor, and was written in C++. It was a completely new operating system, and introduced features to Psion's PDAs such as pre-emptive multitasking and memory protection, and left the 8086 behind in favour of ARM processors. It was first released in 1997.

Fujitsu developing HTML5-based security app for corporate smart phones

http://en.wikipedia.org/wiki/Fujitsu

Engineers at Fujitsu Laboratories are developing an HTML5-based platform for smart phones that designed to keep corporate data secure when accessed from employee-owned handsets.
The system, which Fujitsu plans to launch later this year, is one of a number that addresses this increasingly common problem: how to allow workers access to corporate IT systems while avoiding deliberate or inadvertent leaks of data from devices that are not totally under the company's control.
Fujitsu's system matches an app on the phone with a cloud-based server that delivers corporate apps such as email, sales databases and customer contacts, as HTML5 applications. The phone app senses whether it is in the workplace or not and therefore whether it has access to corporate data. The cloud apps are delivered over an encrypted connection to the handset, which runs them inside a secure application environment on the phone.

Graph Search raises privacy concerns from security experts

http://en.wikipedia.org/wiki/Facebook


Facebook's new Graph Search has security experts warning people who use the social network to raise their privacy settings in order to avoid embarrassment or becoming victims of cybercriminals.
Graph Search, which Facebook introduced this month and is rolling out gradually, lets people use naturally phrased queries, such as "Mexican restaurants my friends like," and receive personalized results. The service makes a lot more useful information available to people, and it gives Facebook a new venue for selling advertising.
Unfortunately, while better search is good for Facebook and its users, it also brings more opportunities for scammers and potential embarrassment for people who are careless about their privacy settings.  Tom Scott posted on the microblogging and social networking site Tumblr queries that returned results that few people would want to be a part of. They included "married people who like prostitutes" and "current employers of people who like racism."

Improving signal-to-noise in risk management

http://www.flickr.com/photos/vek/8016156821/


One of the most important responsibilities of the information security professional (or any IT professional, for that matter) is to help management make well-informed decisions. Unfortunately, this has been an elusive objective when it comes to risk. Although we’re great at identifying control deficiencies, and we can talk all day long about the various threats we face, we have historically had a poor track record when it comes to risk. There are a number of reasons for this, but in this article I’ll focus on just one -- definition.
You’ve probably heard the old adage, “You can’t manage what you can’t measure.”  Well, I’d add to that by saying, “You can’t measure what you haven’t defined.” The unfortunate fact is that the information security profession has been inconsistent in how it defines and uses the term “risk.” Ask a number of professionals to define the term, and you will get a variety of definitions.
Besides inconsistency, another problem regarding the term “risk” is that many of the common definitions don’t fit the information security problem space or simply aren’t practical. For example, the ISO27000 standard defines risk as, “the effect of uncertainty on objectives.” What does that mean?

Week in review: Backdoors in Barracuda appliances, and what makes a good information security professional?


Here's an overview of some of last week's most interesting news, reviews, videos, interviews and articles:


Newest Java update doesn't fix fresh critical vulnerabilities
A little after the latest Java update was released, Adam Gowdiak, CEO of Polish firm Security Explorations had piped up to say that it left a number of critical security flaws unpatched - a claim that he reiterated last Friday on the Full Disclosure mailing list.

What makes a good information security professional?
Information security is a very competitive industry, and one of the very few that kept doing fine even during the recession. It's also a dynamic field that promises a lot of fascinating work, so it's no wonder that so many individuals want to break into it.

Polish CERT hits Virut botnet
The Polish Research and Academic Computer Network (NASK), the national registry of the .pl domain and founder of CERT Polska, has announced that they took over 23 domains that served as C&C servers for the Virut botnet.

Cyber security needs to be a board level issue
As part of the much talked about Cyber Security Strategy, the UK Government is “committed to helping reduce vulnerability to attack and ensure that the UK is the safest place to do business”. One strand of the strategy was an executive briefing, which targeted the most senior levels in the UK’s largest companies and provided them with advice on how to safeguard their most valuable assets, such as personal data, online services and intellectual property.

Skype becomes a malware minefield
Skype users should be careful when using the service these days. First CSIS researchers unearthed a campaign misusing Skype to replicate and spread the Shylock banking Trojan, then Trend Micro researchers discovered highly dangerous worms also being propagated via Skype messages containing malicious links.

Investigating clever scamming techniques and their evolution
Christopher Boyd is a Senior Threat Researcher for GFI Software. Chris has been credited for finding the first instance of a rogue Web browser installing without permission, the first Twitter DIY botnet kit, and the first rootkit in an IM bundle. In this interview he talks about cunning scamming techniques and their evolution.

Google searching for hardware alternatives to passwords
Passwords are on the way out, it seems. With current boom - and obvious success - of phishing, it's time to see what could be a better alternative to this flawed solution. Despite having considerable success with the two-step login authentication option made available to its customers, Google is looking in the direction of hardware authentication.

How to spot APT attacks
With the proliferation of Advanced Persistent Threats (APTs), it's paramount for those who are charged with defending the systems and networks of likely targets to know that these attackers often utilize legal and common tools whose use is more difficult to spot by forensic investigations.

Twitter bug gives 3rd-party apps access to users' Direct Messages
A Twitter bug allowed third-party applications to access Direct Messages of users who signed in to the apps by using their Twitter account, reported IOActive researcher Cesar Cerrudo.

Augmented Reality: An Emerging Technologies Guide to AR
ugmented Reality is not the stuff of science fiction any more, and we should all be at least familiar with its current and likely future uses. This book aims to be an easy-to-digest guide on the subject matter.

Employees targeted with fake DocuSign "confidential message"
An email purportedly sent by the DocuSign Electronic Signature Service on behalf of the administrative departments of a wide variety of organizations and businesses is hitting the inboxes of their employees, Bitdefender warns.

DNS attacks increase by 170%
Radware identified a number of new attack methods representative of today’s increasingly sophisticated and severe DDoS threat. Their latest report highlights server-based botnets and encrypted layer attacks as just two of the new attack tools challenging organizations during DDoS attacks.

Most exploit kits originated in Russia, say researchers
58 percent of the vulnerabilities targeted by the most popular exploit kits in Q4 were more than two years old and 70 percent of exploit kits reviewed were released or developed in Russia, reveals Solutionary SERT's Q4 2012 Quarterly Research Report.

Jobs offered to student kicked out of college for discovering security flaw
Ahmed Al-Khabaz, the student that has been expelled from Dawson College because of an unauthorized intrusion in the college's systems to check whether a flaw he recently discovered in its student web portal was fixed, has not been reinstated.

The arrival of the post-PC threat era
Trend Micro's Annual Security Roundup shows that most of our predictions for 2012 have come true, and we encapsulate 2012 as the year where threats launched the beginning of the post-PC era. Threats have now escalated past the desktop environment.

People need help controlling personal info online
Microsoft released new data reflecting consumers' perceptions about how their information is used online and a new series of short videos to help people better manage their online privacy.

Video: Practical exploitation of embedded systems
This video from Hack in The Box conference is an in-depth exploration of the reverse engineering and exploitation of embedded systems.

Barracuda Networks confirms exploitable backdoors in its appliances
The backdoor accounts are present on in all available versions of Barracuda Spam and Virus Firewall, Web Filter, Message Archiver, Web Application Firewall, Link Balancer, Load Balancer, and SSL VPN appliances.

Watering hole campaign targeting "Reporters without Borders" visitors
Watering hole attacks continue unabated and, according to Avast's Director of Threat Intelligence Jindrich Kubec, the finger could be safely pointed to China once again.

Top five hurdles to security and compliance in industrial control systems
For many decades, Industrial Control Systems (ICS) have been the operational systems relied upon to safely and reliably deliver the essentials of daily life. Sometimes referred to as a Critical Infrastructure, they are the backbone of a modern economy. With these systems generally working well, there has been little need to make major changes to them. There has been innovation and some incremental changes, but in the ICS world, it has largely been ‘business as usual.’

SCADA password cracking code available
ICS-CERT has issued an alert about the existence and general availability of the proof-of-concept exploit code for a tool that can brute force passwords and thus gain access and control of programmable logic controllers (PLCs).

How to avoid Facebook scams and limit the damage they make
What should users who have fallen for Facebook scams do to minimize the danger to themselves and others, and what they can do to stop falling for similar ones in the future - or at all.

GitHub's new search reveals passwords and private keys
GitHub has unveiled a new search infrastructure that should help coders find specific code within the millions of the individual repositories GitHub hosts. But, as helpful as this tool promises to be, it can still be misused. And unfortunately, it didn't take long to prove that, as only hours later a number of individuals realized that quite a few careless coders inadvertently published their private encryption keys or their passwords in their repository.

 

Count

About Me

HatHack flashes on the updated news on hacking the system which ranges from the computer to internet and network hacking. Hacking -- Taking control over any thing and every is hacking of that particular system. Start Hacking !!!!

Visits

Sample Text