Showing posts with label technology. Show all posts
Showing posts with label technology. Show all posts

Tuesday, June 30, 2009

New Firefox knows where you live !!!

· 0 comments

 

The all new Firefox v. 3.5 is finally out for download … with lots of new features and enhancements … but the feature i am talking about is … embedded Google technology called .. Geo-location … so , now new firefox browser can know your geographical location from your IP !!! …

I don’t know about others out there , but for me , i sure don’t like this feature .. ( i am not paranoid about my identification but still i don’t like this feature ) … so , i do very little reading about it … and found that its easy to disable this feature ( lucky for me that i am not alone to think this feature is invasion on privacy just same like google do every time we use google search  or any of its services ) …

to disable this feature … just type …

about:config

in browser address bar … and it will show warning page indicating that , now firefox warranty will expire if we change this options !!! ( i never had any idea that softwares DO COME with warranty ) … just say OK … and in FILTER … just type GEO , it will list all strings starts with GEO … just locate ..

geo.enabled

.. and make it FALSE …

 

geo_location

and you are done with it …

 

enjoy …

Saturday, June 6, 2009

Darpa to take humans out of network management

· 0 comments

The Defense Advanced Research Projects Agency (Darpa) is researching computer networks that can organise and run themselves without human intervention, and dramatically increase available radio spectrum.

The organisation has been outlining its research goals to Congress in its 2009 Strategic Plan (PDF). One area is the design of a network infrastructure that can configure and maintain itself. It is initially intended for linking participants in battle, but could also have civilian uses.

"At the core of this concept are robust, secure and self-forming networks. These networks must be at least as reliable, available, secure and survivable as the weapons and forces they connect. They must distribute huge amounts of data quickly and precisely," says the report.

"But in order for these networks to realise their full potential, they must form, manage, defend and heal themselves, so they always function at the enormously high speeds that provide their advantages. This means that people can no longer be central to establishing, managing and administering them."

Some of the systems are in a very advanced stage, the agency reports. The Network Centric Radio System is already in operation, and can set up a self-healing ad hoc network gateway to link radio and network communications systems.

Darpa is also funding research into how to use existing spectrum more efficiently. Its neXt Generation Communications technology is being used to allocate spectrum dynamically, so that devices can use spectrum assigned to other uses when it is not being used. Tests have shown a tenfold increase in spectrum efficiency using this method.

from VUnet

Njoy …

Monday, June 1, 2009

New Cyber-Security Standards for N. American Power System

· 0 comments

It was recently in news that N. American Power Grid was hacked / breached by foreign hackers and that was perhaps the greatest threat , so finally Government has revised cyber-security standards for the North American bulk power system were approved by the North American Electric Reliability Corporation's (NERC) independent board of trustees.

 

 

grid1 The revised standards were passed by the electric industry last week with an 88 percent approval, according to NERC officials, which noted the majority approval indicated strong support in the industry for the more stringent standards.

"The approval of these revisions is evidence that NERC's industry-driven standards development process is producing results, with the aim of developing a strong foundation for the cyber security of the electric grid," said Michael Assante, Vice President and Chief Security Officer at NERC, in a statement.

The standards, according to the statement, are comprised of approximately 40 'good housekeeping' requirements designed to lay a solid foundation of sound security practices. The revisions approved address concerns raised by the Federal Energy Regulatory Commission when it conditionally approved the standards currently in effect. The revisions notably include the removal of the term "reasonable business judgment," said NERC officials.

The standards "if properly implemented, will develop the capabilities needed to secure critical infrastructure from cyber security threats," the statement noted. Entities that fail to comply can be fined up to $1 million per day, per violation in the U.S., with other enforcement provisions in place throughout much of Canada, said NERC. Audits for compliance will begin on July 1, 2009.

The changes come on the heels of a Wall Street Journal report last month that cited national-security officials who claimed cyberspies from China, Russia and other countries had successfully penetrated the U.S. electrical grid and left behind software programs that could be used to disrupt the system. However, Assante stressed in his statement that the changes were part of a process that was launched last July and was already well underway.

"It's important to note, however, that these standards are not designed to address specific, imminent cyber security threats," he said. "We firmly believe carefully crafted emergency authority is needed at the government level to address this gap."

The revised Critical Infrastructure Protection reliability standards are available here. A second phase of revisions will be presented to the board in 2010.

From CSO

Njoy …

Friday, May 22, 2009

GPS system 'close to breakdown' ???

· 0 comments

It has become one of the staples of modern, hi-tech life: using satellite navigation tools built into your car or mobile phone to find your way from A to B. But experts have warned that the system may be close to breakdown.

realtime_diff_GPS

US government officials are concerned that the quality of the Global Positioning System (GPS) could begin to deteriorate as early as next year, resulting in regular blackouts and failures – or even dishing out inaccurate directions to millions of people worldwide.

The warning centres on the network of GPS satellites that constantly orbit the planet and beam signals back to the ground that help pinpoint your position on the Earth's surface.

The satellites are overseen by the US Air Force, which has maintained the GPS network since the early 1990s. According to a study by the US government accountability office (GAO), mismanagement and a lack of investment means that some of the crucial GPS satellites could begin to fail as early as next year.

"It is uncertain whether the Air Force will be able to acquire new satellites in time to maintain current GPS service without interruption," said the report, presented to Congress. "If not, some military operations and some civilian users could be adversely affected."

The report says that Air Force officials have failed to execute the necessary steps to keep the system running smoothly.

Although it is currently spending nearly $2bn (£1.3bn) to bring the 20-year-old system up to date, the GAO – which is the equivalent of Britain's National Audit Office – says that delays and overspending are putting the entire system in jeopardy.

"In recent years, the Air Force has struggled to successfully build GPS satellites within cost and schedule goals," said the report. "It encountered significant technical problems … [and] struggled with a different contractor."

The first replacement GPS satellite was due to launch at the beginning of 2007, but has been delayed several times and is now scheduled to go into orbit in November this year – almost three years late.

The impact on ordinary users could be significant, with millions of satnav users potential victims of bad directions or failed services. There would also be similar side effects on the military, which uses GPS for mapping, reconnaissance and for tracking hostile targets.

Some suggest that it could also have an impact on the proliferation of so-called location applications on mobile handsets – just as applications on the iPhone and other GPS-enabled smartphones are starting to get more popular.

Tom Coates, the head of Yahoo's Fire Eagle system – which lets users share their location data from their mobile – said he was sceptical that US officials would let the system fall into total disrepair because it was important to so many people and companies.

"I'd be surprised if anyone in the US government was actually OK with letting it fail – it's too useful," he told the Guardian.

"It sounds like something that could be very serious in a whole range of areas if it were to actually happen. It probably wouldn't damage many locative services applications now, but potentially it would retard their development and mainstreaming if it were to come to pass."

The failings of GPS could also play into the hands of other countries – including opening the door to Galileo, the European-funded attempt to rival America's satellite navigation system, which is scheduled to start rolling out later next year.

Russia, India and China have developed their own satellite navigation technologies that are currently being expanded …fingerscrossed

Njoy …

Tuesday, May 12, 2009

WiMAX challenges Wi-Fi

· 0 comments

When most people hear “wireless Internet,” they think “Wi-Fi.” The technology has allowed millions of computers and mobile devices to browse the Web without the snarl of cords. But there’s another wireless standard out there – one that’s arguably more tempting if it can get its act together.

WiMAX delivers the Web similar to Wi-Fi, but covers wide areas like a cellphone tower. While the range of a Wi-Fi router is measured in yards – enough to blanket a house or office – WiMAX can broadcast for miles. This added range has attracted interest from local governments looking into citywide wireless networks.

Several early citywide Wi-Fi plans were abandoned because they underestimated the cost of installing enough hot spots. But with WiMAX, “Instead of needing 20 or 30 Wi-Fi access points per square mile, you need one,” says Craig Settles, an independent wireless analyst. And many cities won’t need to brainstorm creative places to stick a WiMAX antenna, because it can be attached to current cell phone towers. Sprint rolled out a pilot WiMAX program in Baltimore last year. The network delivers average download speeds of two to four megabits per second, half the rate of cable Internet but several times faster than the 3G mobile service used by many of today’s smart phones, according to Sprint’s tests. The company plans to introduce WiMAX in 10 American cities this year and five more in 2010.

“But here’s the big problem,” says Mr. Settles. “How many iPhones have a WiMAX chip in them? None.”

In fact, barely any devices understand a WiMAX signal because it uses different frequencies from Wi-Fi. This incompatibility issue has exacerbated the normal chicken-and-egg problem that plagues new technology: People won’t buy WiMAX devices until there are more WiMAX networks, but why build the network when Wi-Fi is doing so well? Sprint’s plan requires a proprietary antenna that plugs into laptops, similar to the early Wi-Fi cards that have since been built into computers.

If WiMAX takes off, its performance could drop off quickly, says Settles, because fewer towers means that each station needs to juggle more requests. “Some testers were stunned at the difference in reliability as more people join,” he says. “3G has about a 90 percent uptime. WiMAX is around 70% .” In the US, WiMAX has an additional hurdle because it relies on frequencies that are regulated by the government, so companies will need to pay extra for broadcast rights.

While Settles questions WiMAX’s chances, he says there’s a middle solution. “Locally owned” service provider B2X Online harnesses WiMAX-like towers to deliver broadband Internet to Franklin County, Va. The towers, which transmit over an unlicensed frequency, allow the small company to circumvent the expensive process of laying Internet cables to rural areas.

from the CSMonitor

Njoy …

Monday, May 11, 2009

An invention that could change the internet for ever

· 0 comments

The new system, Wolfram Alpha, showcased at Harvard University in the US last week, takes the first step towards what many consider to be the internet's Holy Grail – a global store of information that understands and responds to ordinary language in the same way a person does.

image 

Although the system is still new, it has already produced massive interest and excitement among technology pundits and internet watchers.

Computer experts believe the new search engine will be an evolutionary leap in the development of the internet. Nova Spivack, an internet and computer expert, said that Wolfram Alpha could prove just as important as Google. "It is really impressive and significant," he wrote. "In fact it may be as important for the web (and the world) as Google, but for a different purpose.

Tom Simpson, of the blog Convergenceofeverything.com, said: "What are the wider implications exactly? A new paradigm for using computers and the web? Probably. Emerging artificial intelligence and a step towards a self-organizing internet? Possibly... I think this could be big."

Wolfram Alpha will not only give a straight answer to questions such as "how high is Mount Everest?", but it will also produce a neat page of related information – all properly sourced – such as geographical location and nearby towns, and other mountains, complete with graphs and charts.

The real innovation, however, is in its ability to work things out "on the fly", according to its British inventor, Dr Stephen Wolfram. If you ask it to compare the height of Mount Everest to the length of the Golden Gate Bridge, it will tell you. Or ask what the weather was like in London on the day John F Kennedy was assassinated, it will cross-check and provide the answer. Ask it about D sharp major, it will play the scale. Type in "10 flips for four heads" and it will guess that you need to know the probability of coin-tossing. If you want to know when the next solar eclipse over Chicago is, or the exact current location of the International Space Station, it can work it out.

Dr Wolfram, an award-winning physicist who is based in America, added that the information is "curated", meaning it is assessed first by experts. This means that the weaknesses of sites such as Wikipedia, where doubts are cast on the information because anyone can contribute, are taken out. It is based on his best-selling Mathematica software, a standard tool for scientists, engineers and academics for crunching complex maths.

"I've wanted to make the knowledge we've accumulated in our civilization computable," he said last week. "I was not sure it was possible. I'm a little surprised it worked out so well."

Dr Wolfram, 49, who was educated at Eton and had completed his PhD in particle physics by the time he was 20, added that the launch of Wolfram Alpha later this month would be just the beginning of the project.

"It will understand what you are talking about," he said. "We are just at the beginning. I think we've got a reasonable start on 90 per cent of the shelves in a typical reference library."

The engine, which will be free to use, works by drawing on the knowledge on the internet, as well as private databases. Dr Wolfram said he expected that about 1,000 people would be needed to keep its databases updated with the latest discoveries and information.

He also added that he would not go down the road of storing information on ordinary people, although he was aware that others might use the technology to do so.

 

Wolfram Alpha has been designed with professionals and academics in mind, so its grasp of popular culture is, at the moment, comparatively poor. The term "50 Cent" caused "absolute horror" in tests, for example, because it confused a discussion on currency with the American rap artist. For this reason alone it is unlikely to provide an immediate threat to Google, which is working on a similar type of search engine, a version of which it launched last week.

"We have a certain amount of popular culture information," Dr Wolfram said. "In some senses popular culture information is much more shallowly computable, so we can find out who's related to who and how tall people are. I fully expect we will have lots of popular culture information. There are linguistic horrors because if you put in books and music a lot of the names clash with other concepts."

He added that to help with that Wolfram Alpha would be using Wikipedia's popularity index to decide what users were likely to be interested in.

With Google now one of the world's top brands, worth $100bn, Wolfram Alpha has the potential to become one of the biggest names on the planet.

Dr Wolfram, however, did not rule out working with Google in the future, as well as Wikipedia. "We're working to partner with all possible organizations that make sense," he said. "Search, narrative, news are complementary to what we have. Hopefully there will be some great synergies."

from Independent

Njoy …

Friday, May 8, 2009

Hiding Identity under the Onion … How To of TOR software

· 0 comments

 

Just like i said before … Tor is really good application … in this post i will show how this thing works and anonymize our identity on internet !!!

first all you need is to download the TOR from TOR project website … i chose , the 2nd option, “ Tor Browser Bundle for Windows (Contains Tor, Vidalia, Torbutton, Polipo, and Firefox) “ … its 0.2.1.14-rc … they says its UNSTABLE so … may give unexpected results or may be it will not make you much “anonymous” around the internet but i really don’t know the actual reason .. sigh … i use this version because , NO NEED TO INSTALL or SETUP anything and its PORTABLE …

once you download it , extract it on a usb drive ( if you are planning to use it on any other pc )or in any folder of computer ( to use only in that machine ) …

image

now , simply double click on that Vidalia icon … it will run the script and automatically

image

once connected to Tor network , it will launch Tor’s old buddy …. the Firefox … you can make sure that you are connected by viewing , the Vidalia control panel , which shows CONNECTED TO THE TOR NETWORK message with green onion …

 image

 

as it will launch FF, you will see the welcome message just like above ( ofcouse IP will be different ) … just remember to NOT TO CLOSE FIREFOX , because it will automatically exit TOR … ( i think you can change that option ) …

 

image

 

the thing is , i was using google’s chrome too , now see when is check the website … www.whatismyip.com

 

image 

the chrome shows my real IP , but the TORed firefox shows the IP that others will SEE when i use TOR … hmm …thats TORrific .. right ??

and if you ever wonder what is the route to that IP from ur IP , and how you are anonymized … just try to see the routing path of TOR … it shows TOR NETWORK MAP … as you know TOR uses onion routing , so after passing through these much number of nodes … its really hard to find your real IP ( that’s the best part ) … !!!

1124170844-1

and the thing is , i am sitting in public library which has restricted access to sites and can’t access to youtube ( no offence ) … but i really like to watch cartoons on it … so before i can’t use it because it has been blocked by firewall and filters … but now ?? … nothing is between me and my favorite show ( expect my g/f .. hehehe ) …

so that is the way how can you anonymize your identity on internet using tor … but you need to remember that TOR is all free , open to public and non profit thing , so may be you won’t feel glitch when you surf the internet , but you will feel a bit leggy performance when you watch video on youtube …and about security , TOR CAN NOT secure your connection outside the TOR network , means hacker sitting at the end of exit node can intercept / sniff your packets and crack your password  ( for security, TOR recommends SSL connection between End to End Connection )…  also , many times the search results are different then what you expected or language is different … this is because , now you have IP of another geographic location , the search engine  thinks you are from that place so it will display results according to it ( its good if you surf porn sites a lot , because they will not get your real location ….. huh, wait a minute … do you really want it  ??? ) …

 

fingerscrossedNjoy …

Monday, May 4, 2009

Hiding Identity under the Onion !!!

· 0 comments

 tor_sticker

Vidalia … a sweet onion , great in taste indeed and better choice for eating raw compared to other breeds … but the vidalia onion i am talking about is something different … its the TOR Project , which has symbol of vidalia onion, because it uses onion routing concept … Tor is a software , which allows user to surf internet anonymously …

Logic behind the Onion …

Onion routing is a technique for anonymous communication over a computer network. Messages are repeatedly encrypted and then sent through several network nodes called onion routers. Each onion router removes a layer of encryption to uncover routing instructions, and sends the message to the next router where this is repeated. This prevents these intermediary nodes from knowing the origin, destination, and contents of the message. Here, volunteers provide their network node ( at their expense of bandwidth and $$$ ofcourse ) …

But Tor is not the magic wend of fairy god-mother that will make user completely anonymous on internet … it has its own limitation and rules … it does not guarantee for security of data transmitted , once it leaves tor network … so to ensure end-to-end security, measures need to be taken ( SSL connection for example ) … because it has been already proved that , a user ( a hacker , to be more precise )  sitting at end node of network can sniff / capture data leaving tor network and can use it too …

onionroutingfig7

But if you are an adventurer just like me … who just want to try tor for study and experiment … then its really amazing …

the tor software which runs from usb drive gives you ultra portability , ease of use … you don’t even need to install anything in pc … and more good , we can use it anywhere …  is just amazing …

i want to write about  it but some another time …

history about tor

tor official site

till then …

Njoy … fingerscrossed

Tuesday, April 28, 2009

Hide your tracks at work ???

· 0 comments

 

We all spend some of our time at work doing things that have nothing to do with our job. We surf the Web. We play games. Sure, we all need our downtime, and the enlightened manager knows that. But still, we'd rather just surf in private than deal with the raised eyebrows.

That's why we need ways to ensure that when our boss surprises us or sneaks up behind us, she'll think that we're actually working. Here's a list of apps and services that help.

Camouflaged Web services

SpreadTweet If you're a Twitter fanatic, try SpreadTweet. The software hides your Twitter stream in what looks like an Excel window. It displays everything in plain text to make it look like a real spreadsheet. It's sure to fool any boss.

1cup1coffee 1cup1coffee looks like a Windows Explorer pane (so don't use it on a Mac), but all those Word documents and Powerpoint presentations are actually a collection of Flash games. 1cup1coffeeSimply click on one of the "files" and you can play a game in what looks like your Windows Explorer window. If you hear your boss, you can hit the back button and you'll be brought back to the file listing.

Anonymizer If you don't want the IT folks to know what you're up to, spend $30 and get Anonymizer. The software redirects your Web traffic through its servers to not only safeguard your IP from outside sources, but also to get your employer's IT people off your trail.

C.H.I.M.P. Rearview Monitor Mirror chimpWhile playing a game or doing something you shouldn't, just glance up at the C.H.I.M.P. Rearview Monitor Mirror to see if your boss is approaching from behind. The mirror won't hide what you're doing, but it will give you some time to switch to something more appropriate. And in case you're wondering, C.H.I.M.P. stands for Chimp Has Invincible Monkey Powers. Yeah, I don't get it either. But it is worth the $6.99 price tag.

Don's Boss Page Don's Boss Page (no relation) is full of great boss trickery. If you want to aimlessly browse the Web, but make it sound like you're working, you can keep clicking the site's keyboard audio clips to make others think you're typing.

Quick tip: Resize your windows When I was an accountant, I used Outlook. To make everyone think I was so engrossed in my e-mail, I resized Firefox to fit perfectly in the Outlook preview pane. Anyone who walked by thought I was just reading an e-mail. If they ever got too close, I'd switch to another message. It worked beautifully.

Don't Panic 1.2 If you don't want to get busted by the boss, try installing Don't Panic 1.2 onto your Windows machine. The software will allow you to minimize multiple windows at the same time. You can also maximize multiple windows simultaneously to ensure your boss will be happy when they walk by.

Or just use keyboard shortcuts Brush up on your knowledge of keyboard shortcuts. Whenever you hear someone coming, you can quickly drop a few keys and you'll immediately look like you're working.  

StealthSwitch You'll have to pay $40 to get it, but StealthSwitch is worth the price -- until your boss finds it. Once connected to your computer via USB, StealthSwitch sits on the floor. While playing a game or doing something you shouldn't at work, you can quickly tap the StealthSwitch when you hear your boss approaching. It immediately makes the current window invisible and brings you back to a window that's related to your work. Once your boss walks away, you can tap the StealthSwitch again to get back to your game.

panicbuttonThe Last ( and my fav. too smile_tongue)  $25 USB Panic Button is similar, if you're quicker with your hands than your mouse and don't mind a garish missile-launch control button sitting on your desk. Simply push the plastic covering up, press the red button, and the tool will automatically change the screen on your computer to a spreadsheet, your favorite picture, your company's Web site, or anything else you set it to switch to.

from CNET

Njoy … (your work) … fingerscrossed

Saturday, April 18, 2009

PIN Crackers Nab Holy Grail of Bank Card Security ….

· 0 comments

 

Hackers have crossed into new frontiers by devising sophisticated ways to steal large amounts of personal identification numbers, or PINs, protecting credit and debit cards, says an investigator.  The attacks involve both unencrypted PINs and encrypted PINs that attackers have found a way to crack, according to an investigator behind a new report looking at the data breaches.

The attacks, says Bryan Sartin, director of investigative response for Verizon Business, are behind some of the millions of dollars in fraudulent ATM withdrawals that have occurred around the United States.

"We're seeing entirely new attacks that a year ago were thought to be only academically possible," says Sartin. Verizon Business released a report Wednesday that examines trends in security breaches. "What we see now is people going right to the source ... and stealing the encrypted PIN blocks and using complex ways to un-encrypt the PIN blocks."

The revelation is an indictment of one of the backbone security measures of U.S. consumer banking: PIN codes. In years past, attackers were forced to obtain PINs  piecemeal through phishing attacks, or the use of skimmers and cameras installed on ATM and gas station card readers. Barring these techniques, it was believed that once a PIN was typed on a keypad and encrypted, it would traverse  bank processing networks with complete safety, until it was decrypted and authenticated by a financial institution on the other side.

But the new PIN-hacking techniques belie this theory, and threaten to destabilize the banking-system transaction process. Information about the theft of encrypted PINs first surfaced in an indictment last year against 11 alleged hackers accused of stealing some 40 million debit and credit card details from TJ Maxx and other U.S. retail networks. The affidavit, which accused Albert "Cumbajohnny" Gonzalez of leading the carding ring, indicated that the thieves had stolen "PIN blocks associated with millions of debit cards" and obtained "technical assistance from criminal associates in decrypting encrypted PIN numbers."

But until now, no one had confirmed that thieves were actively cracking PIN encryption.

Sartin, whose division at Verizon conducts forensic investigations for companies that experience data breaches, wouldn't identify the institutions that were hit or indicate exactly how much stolen money was being attributed to the attacks, but according to the 2009 Data Breach Investigations report, the hacks have resulted in "more targeted, cutting-edge, complex, and clever cybercrime attacks than seen in previous years." "While statistically not a large percentage of our overall caseload in 2008, attacks against PIN information represent individual data-theft cases having the largest aggregate exposure in terms of unique records," says the report. "In other words, PIN-based attacks and many of the very large compromises from the past year go hand in hand."

Although there are ways to mitigate the attacks, experts say the problem can only really be resolved if the financial industry overhauls the entire payment processing system. "You really have to start right from the beginning," says Graham Steel, a research fellow at the French National Institute for Research in Computer Science and Control who wrote about one solution to mitigate some of the attacks. "But then you make changes that aren't backwards-compatible."

PIN hacks hit consumers particularly hard, because they allow thieves to withdraw cash directly from the consumer's checking, savings or brokerage account, Sartin says. Unlike fraudulent credit card charges, which generally carry zero liability for the consumer, fraudulent cash withdrawals that involve a customer's PIN can be more difficult to resolve since, in the absence of evidence of a breach, the burden is placed on the customer to prove that he or she didn't make the withdrawal. Some of the attacks involve grabbing unencrypted PINs, while they sit in memory on bank systems during the authorization process. But the most sophisticated attacks involve encrypted PINs.

Sartin says the latter attacks involve a device called a hardware security module (HSM), a security appliance that sits on bank networks and on switches through which PIN numbers pass on their way from an ATM or retail cash register to the card issuer. The module is a tamper-resistant device that provides a secure environment for certain functions, such as encryption and decryption, to occur.

According to the payment-card industry, or PCI, standards for credit card transaction security, PIN numbers are supposed to be encrypted in transit, which should theoretically protect them if someone intercepts the data. The problem, however, is that a PIN must pass through multiple HSMs across multiple bank networks en route to the customer's bank. These HSMs are configured and managed differently, some by contractors not directly related to the bank. At every switching point, the PIN must be decrypted, then re-encrypted with the proper key for the next leg in its journey, which is itself encrypted under a master key that is generally stored in the module or in the module's application programming interface, or API.

"Essentially, the thief tricks the HSM into providing the encryption key," says Sartin. "This is possible due to poor configuration of the HSM or vulnerabilities created from having bloated functions on the device." Sartin says HSMs need to be able to serve many types of customers in many countries where processing standards may be different from the U.S. As a result, the devices come with enabled functions that aren't needed and can be exploited by an intruder into working to defeat the device's security measures. Once a thief captures and decrypts one PIN block, it becomes trivial to decrypt others on a network.

Other kinds of attacks occur against PINs after they arrive at the card-issuing bank. Once encrypted PINs arrive at the HSM at the issuing bank, the HSM communicates with the bank's mainframe system to decrypt the PIN and the customer's 16-digit account number for a brief period to authorize the transaction.

During that period, the data is briefly held in the system's memory in unencrypted form. Sartin says some attackers have created malware that scrapes the memory to capture the data. "Memory scrapers are in as much as a third of all cases we're seeing, or utilities that scrape data from unallocated space," Sartin says. "This is a huge vulnerability." He says the stolen data is often stored in a file right on the hacked system. "These victims don't see it," Sartin says. "They rely almost purely on anti-virus to detect things that show up on systems that aren't supposed to be there. But they're not looking for a 30-gig file growing on a system."

Information about how to conduct attacks on encrypted PINs isn't new and has been surfacing in academic research for several years.  In the first paper, in 2003, a researcher at Cambridge University published information about attacks that, with the help of an insider, would yield PINs from an issuer bank's system.

The paper, however, was little noticed outside academic circles and the HSM industry. But in 2006, two Israeli computer security researchers outlined an additional attack scenario (.pdf) that got widespread publicity. The attack was much more sophisticated and also required the assistance of an insider who possessed credentials to access the HSM and the API and who also had knowledge of the HSM configuration and how it interacted with the network. As a result, industry experts dismissed it as a minimal threat. But Steel and others say they began to see interest for the attack research from the Russian carding community. But until now no one had seen the attacks actually being used in the wild.

Steel wrote a paper in 2006 that addressed attacks against HSMs (.pdf) as well as a solution to mitigate some of the risks. The paper was submitted to nCipher, a British company that manufactures HSMs and is now owned by Thales. He says the solution involved guidelines for configuring an HSM in a more secure manner and says nCipher passed the guidelines to customers.

Steel says his solution wouldn't address all of the types of attacks. To fix the problem would take a redesign. But he notes that "a complete rethink of the system would just cost more than the banks were willing to make at this time."

Thales is the largest maker of HSMs for the payment-card and other industries, with "multiple tens of thousands" of HSMs deployed in payment-processing networks around the world, according to the company. A spokesman said the company is not aware of any of the attacks on HSMs that Sartin described, and noted that Thales and most other HSM vendors have implemented controls in their devices to prevent such attacks. The problem, however, is how the systems are configured and managed. "It's a very difficult challenge to protect against the lazy administrator," says Brian Phelps, director of program services for Thales. "Out of the box, the HSMs come configured in a very secure fashion if customers just deploy them as is. But for many operational reasons, customers choose to alter those default security configurations — supporting legacy applications may be one example — which creates vulnerabilities." Redesigning the global payment system to eliminate legacy vulnerabilities "would require a mammoth overhaul of virtually every point-of-sale system in the world," he says.

Responding to questions about the vulnerabilities in HSMs, the PCI Security Standards Council said that beginning next week the council would begin testing HSMs as well as unattended payment terminals. Bob Russo, general manager of the global standards body, said in a statement that although there are general market standards that cover HSMs, the council's testing of the devices would "focus specifically on security properties that are critical to the payment system." The testing program conducted in council-approved laboratories would cover "both physical and logical security properties."

From Wired

Njoy … fingerscrossed

Sunday, April 12, 2009

Man Says He Has USB Drive in Prosthetic Finger ??

· 0 comments

 

It is the story of Jerry Jalava, 29, a self-described software developer from Finland who lost part of his left ring finger in May in a motorcycle accident.

Now, he says, he wears a prosthetic finger made of silicone, which looks fairly natural -- except that he can peel back the tip to uncover a USB drive tucked inside. Jalava's finger of the future has become a small Internet sensation.

cen_usb_finger_090318_mn

The USB drive -- also called a flash drive or thumb drive or memory stick -- contains 2 gigabytes of memory and can plug into almost any currently sold computer. Jalava keeps several computer programs on it, he says, and hopes eventually for an upgraded version.

My friends take it same way as I do," he told . "First, they are terrified, hearing about the lost finger, but then they are relieved and laughing after hearing about the USB finger."

Digitally Enhanced Digit

"It is not attached permanently into my body; it is removable prosthetic, which has USB memory stick inside it," he writes, in slightly broken English, on his blog protoblogr.net. "When I'm using the USB, I just leave my finger inside the slot and pick it up after I'm ready."

Jalava said he has two different prosthetic fingertips that he can use. The other is conventional, made to look like a natural finger, but Jalava says he does not plan to keep it that way.

"Right now I use it mostly when I need to do network inspections or memory testing on computers in our office," he said, "but when I get the latest one ready, it will be my single sign-on to my computer and my e-mails."

All this began one day last spring, Jalava says, when he was driving his motorcycle home from work. He hit a deer, slid a couple of hundred feet and lost the tip of his finger. He was taken by ambulance to a hospital in nearby Helsinki.

from ABC

Njoy … fingerscrossed

Friday, April 10, 2009

Access any Hard Drive from internet …

· 0 comments

 

pogoplug

PogoPlug, available in North America as of today, is a cheap, straightforward, single-purpose device that aims to transform network-attached storage into an appliance. It combines any old USB hard drive with your existing Internet connection, and then, voila: everything delicious and convenient about network-attached storage is now within reach.

What is network-attached storage, you ask? It's any device that makes a hard drive available on a network and/or the Internet. Having a network-attached storage device means you can: access all your music, movies, and critical documents, no matter where you are; back up your important files to a single location; and share all your photos, media, and anything else with friends -- without the intervening step of uploading them to YouTube, Flickr, etc.

Here's how it works.

The PogoPlug is $99, and no bigger than the wall plate for a light switch. It resembles an oversized wall wart (like the one hanging off the end of your cell phone charger).

By design, it's dead easy. You plug it into the wall, and into your home router via an ethernet cable, and then into an external USB 2.0-compatible hard drive (or even USB thumb drive) which you've probably got sitting around anyway (and if you don't, they can be had very cheaply).

Go online, register your PogoPlug, and voila --  the drive connected to the PogoPlug is now accessible via my.pogoplug.com. No setting up IP addresses for your home server, or tunneling through your firewall, or needing a spare computer to use as a media server --  all of that is taken care of by a combination of firmware in the PogoPlug and an independent back-end service running on Cloud Engine's own servers.

And this is what it does.

Aside from all the things that any network-attached storage device is capable of, the PogoPlug does a number of nifty things, including automatically generating thumbnails for your media and transcoding video on the fly so that it can be streamed to remote devices without you having to wait for the whole thing to download first.

There's even an iPhone application in case you want to, say, access to every vacation photo you've ever taken, ever. Or swap out your tired playlist for some new music, even if you're in Aruba and your hard drive is in Saskatchewan.

Sharing files with friends is even easier --  you just punch in their email address and the PogoPlug software emails them a link; they don't even have to register. There's no backup software specific to the PogoPlug, though, which, unfortunately, means backing up is still a drag-and-drop operation.

Because it's based on the ultra-low-power Marvell chipset (Marvell works with the same ARM chips that show up in cell phones and portable gaming devices like the Nintendo DS), the PogoPlug draws fewer than 5 watts of power. Most external hard drives are smart enough to turn themselves off after a pre-set period of inactivity, so together the two devices aren't going to draw a lot of power unless you're hitting the server all day long --  even then, it's a lot less than the 20-100 watts that would be required to run a full-blown laptop or tower-based server.

If you want to get really crazy, Cloud Engine's engineers have apparently created an API for the PogoPlug. This means you could access it from any other website, thus making it a DIY media server. However, that would mean that your home or apartment would then be a DIY colocation facility, which is fine if you're sharing baby pictures but not so great if you're hosting business-critical files. Either way, it's nice to have the versatility, and it probably means hackers will come up with a number of cool, off-label uses for the device. 

Njoy … fingerscrossed

Wednesday, April 8, 2009

What is Social Media ???

· 0 comments

 

Definition from Wikipedia:

Social media are primarily Internet-based tools for sharing and discussing information among human beings. Social media is information content created by people using highly accessible and scalable publishing technologies. It is intended to facilitate communications, influence interaction between peers and with public audiences.

DetectorPRO opinion of social media:
I don’t think Social Media has to be an object or a tool. I think Social Media transpires anytime a conversation happens: talking to a friend at a coffee shop, standing on a soap box in the park, or even just walking around the city talking to random people.
Social Media is about the interaction, but we try to manage it through the tools.
And, a bit simpler: Social media is any online space where people have public conversations.

Social media humor:
But, if you browser looks like following picture you may consider yourself as a big social media person (as my colleague used to say: socialist), or at the other hand - you must go outside in the real world and socialize with real people FAST.

 

 

terrible-firefox

 

from DetectorPro

Njoy … fingerscrossed

Thursday, April 2, 2009

Ericsson to enable wireless kill switch for laptops !!!

· 0 comments

 

230x-259200,http---a323.yahoofs.com-ymg-null__12-null-36088585-1228264700.jpg-ymhGWrADEcIYxUjD A laptop remote-kill switch has long been a fantasy of those paranoid about theft and service providers alike. And now, with the latest wave of subsidized notebooks coming out of wireless carriers, said switches are coming in the form of a new mobile broadband card from Ericsson. The card, designed to work on HSPA/GPRS/EDGE networks, is slated for release in June, and carries with it a number of innovative features. But the most interesting is that it supports certain security options that work with Intel's anti-theft technology, allowing carriers to send a signal that will lock down the machine and make it unusable.

Ericsson's F3607gw module boasts reduced power consumption, prolonged battery life, and increased integration with the OS. Ericsson specifically highlights the F3607gw's wake-on-wireless feature, which allows users to remotely wake the notebook at specific times, like when an important message is received or the computer has been stolen.

"An anti-theft management service in the network can send a message via SMS to the mobile-broadband module inside the notebook, which securely transfers the message to Intel's Anti-Theft function inside the processor platform," says Ericsson. "This takes appropriate actions, such as completely locking the computer and making it unusable."

Intel's anti-theft technology (ATT) differs from current disk encryption because it would render the laptop useless even if the hard drive is replaced. While this may not help the victim get the laptop back, if widely adopted, ATT could deter thieves from stealing laptops in the first place if all they would end up with is an inoperable chunk of plastic and metal. Of course, if users want their data to be secure and for the laptop to be unbootable, it's probably wise to employ both ATT and some sort of disk encryption technology, in case the hard drive is removed and placed in another machine.

Theft isn't the only situation in which the machine may be remotely locked down, though. As noted by the AP, customers who bought their notebooks under heavy subsidies from wireless carriers in exchange for service contracts may also find their computers being locked down if they fall too far behind on their bills. This situation seems unlikely, however—not only would it be seen as a massive invasion of privacy for a carrier to lock users out of their own computers, but there will likely be a way for users to shut off the wake on wireless feature, rendering such attempts useless.

Njoy … fingerscrossed

Wednesday, April 1, 2009

US-CERT Advisory for Conficker worm …

· 0 comments

 

HISTORY …

Conficker, also known as Downup, Downadup and Kido, is a computer worm that surfaced in October 2008 and targets the Microsoft Windows operating system. The worm exploits a previously patched vulnerability in the Windows Server service used by Windows 2000,Windows XP, Windows Vista, Windows Server 2003, Windows Server 2008, Windows 7 Beta, and Windows Server 2008 R2 Beta . The worm has been unusually difficult for network operators and law enforcement to counter because of its combined use of advanced malware techniques.

Although the origin of the name "conficker" is not known with certainty, Internet specialists and others have speculated that it is a German portmanteau fusing the term "configure" with "ficken", the German word for "fuck !!!".  Microsoft analyst Joshua Phillips describes "conficker" as a rearrangement of portions of the domain name 'trafficconverter.biz'

Four main variants of the Conficker worm are known and have been dubbed Conficker A, B, C and D. They were discovered 21 November 2008, 29 December 2008, 20 February 2009, and 4 March 2009, respectively.

SYMPTOMS …

  • Account lockout policies being reset automatically.
  • Certain Microsoft Windows services such as Automatic Updates, Background Intelligent Transfer Service (BITS), Windows Defender and Error Reporting Services disabled.
  • Domain controllers responding slowly to client requests.
  • Unusual amounts of traffic on local area networks.
  • Websites related to antivirus software becoming inaccessible.

EFFECTS …

Experts say it is the worst infection since 2003's SQL Slammer. Estimates of the number of computers infected range from almost 9 million PCs to 15 million computers.The initial rapid spread of the worm has been attributed to the number of Windows computers—estimated at 30%—which have yet to apply the Microsoft MS08-067 patch.

Another antivirus software vendor, Panda Security, reported that of the 2 million computers analyzed through ActiveScan, around 115,000 (6%) were infected with this malware.

Intramar, the French Navy computer network, was infected with Conficker in 15 January 2009. The network was subsequently quarantined, forcing aircraft at several airbases to be grounded because their flight plans could not be downloaded.

The U.K. Ministry of Defence reported that some of its major systems and desktops were infected. The worm has spread across administrative offices, NavyStar/N* desktops aboard various Royal Navy warships and Royal Navy submarines, and hospitals across the city of Sheffield reported infection of over 800 computers.

On 13 February 2009, the Bundeswehr reported that about one hundred of their computers were infected.

A memo from the British Director of Parliamentary ICT informed the users of the House of Commons on 24 March 2009 that it had been infected with the worm. The memo, which was subsequently leaked, called for users to avoid connecting any unauthorized equipment to the network.

IN NEWS !!!

As of 13 February 2009, Microsoft is offering a $250,000 USD reward for information leading to the arrest and conviction of the individuals behind the creation and/or distribution of Conficker.

On 24 March 2009, CIRA, the Canadian Internet Registration Authority, locked all previously-unregistered .ca domain names expected to be generated by Conficker C over the next 12 months.[35]

On 31 March 2009 NASK, the Polish national registrar, locked over 150,000 .pl domains expected to be generated by Conficker C over the coming 5 weeks. NASK has also warned that worm traffic may unintentionally inflict a DDoS attack to legitimate domains which happen to be in the generated set.

Message , FROM United State Computer Emergency Readiness Team …

Conficker/Downadup worm, which can infect a Microsoft Windows system from a thumb drive, a network share, or directly across a corporate network, if the network servers are not patched with the MS08-067 patch from Microsoft.
Home users can apply a simple test for the presence of a Conficker/Downadup infection on their home computers. The presence of a Conficker/Downadup infection may be detected if a user is unable to surf to their security solution website or if they are unable to connect to the websites, by downloading detection/removal tools available free from those sites:
http://www.symantec.com/norton/theme.jsp?themeid=conficker_worm&inid=us_ghp_link_conficker_worm
http://www.microsoft.com/protect/computer/viruses/worms/conficker.mspx
http://www.mcafee.com
If a user is unable to reach any of these websites, it may indicate a Conficker/Downadup infection. The most recent variant of Conficker/Downadup interferes with queries for these sites, preventing a user from visiting them. If a Conficker/Downadup infection is suspected, the system or computer should be removed from the network or unplugged from the Internet - in the case for home users.
Instructions, support and more information on how to manually remove a Conficker/Downadup infection from a system have been published by major security vendors. Please see below for a few of those sites. Each of these vendors offers free tools that can verify the presence of a Conficker/Downadup infection and remove the worm:
Symantec:
http://www.symantec.com/business/security_response/writeup.jsp?docid=2009-011316-0247-99
Microsoft:
http://support.microsoft.com/kb/962007
http://www.microsoft.com/protect/computer/viruses/worms/conficker.mspx
Microsoft PC Safety hotline at 1-866-PCSAFETY, for assistance.
US-CERT encourages users to prevent a Conficker/Downadup infection by ensuring all systems have the MS08-067 patch (seehttp://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx), disabling AutoRun functionality (see http://www.us-cert.gov/cas/techalerts/TA09-020A.html), and maintaining up-to-date anti-virus software.

 

currently this worm is set to get active at 1st April , 2009 ( TODAY !!! ) … and yet nobody knows what’s it upto smile_zipit … lets hope people come with some sound solution to this perhaps the most notorious virus in history of viruses !!!

 

Njoy … fingerscrossed

parts from … US-CERT  and Wikipedia

Thursday, March 26, 2009

Hackers start P2P Bank !!!

· 0 comments

 

The hacking community and open source hardware developers have joined forces to create a funding source.
Usually when you think "open source", software comes to mind. However, in the background, the open source hardware market is booming.
The concept is great -- eventually there will be specs published for a variety of hardware ranging from graphic cards and CPUs to laptops and desktops. Anyone who wishes will have the ability to take the designs and build upon them. This would allow for individuals to make money based on free designs, while also giving back their improvements to the community that they've benefited from.
The downside is that open source hardware development needs a lot more money than software, due to the physical materials needed for test builds, and the services of the specialized plants used to build chips and printed circuit boards.

Hardware enthusiasts often find that they have a difficult time securing funding for their projects.
When Justin Huynh and Matt Stack met at a New York event they found that they had a major common interest: open source hardware. Huynh works as a pharmaceutical consultant and saw a need for community-funded open source projects. Huynh and Stack have now opened the Open Source Hardware Bank which they will utilize to fund hardware projects. Details of the bank and its concept are laid out in Stack’s blog.

Their new bank will work to raise capital from hardware enthusiasts and then share the wealth with developers. Much like any other social network or community, this group will work to finance one another. Currently the two manage the bank using Open Office Calc and a statistics program called R. Eventually they want to take the banking online via their website and provide a list of funded projects. "This speaks to the rise of the do-it-yourselfer, someone who is not just a consumer but also a producer, inventor and investor," Huynh told Wired.com. "But someone also ought to be thinking about the money problem when it comes to open source hardware and we are doing just that."

The Open Source Hardware Bank wants to deliver freedom from two financial issues faced by hardware developers: throwaway costs that come from having to repeatedly revise a product during the development process and the unfortunate inability to take advantage of reduced rates that come when one purchases in bulk.
Each project which the bank funds is provided with the funds to build twice as many units as there are potential buyers. This doubles the number of units which are developed, thus reducing production rates by 10 to 30 percent for each unit. The bank received some of its inspiration from peer-to-peer lending sites like Prosper and Zopa. Prior to the current credit crisis these sites delivered borrowers and investors with a connection tool that acted as a secondary market for funds and investments.

Currently, the Open Source Hardware Bank is not fully open for business. Additionally it is not yet a federally regulated lending institution. With 70 lenders signed up with the bank it does allow individuals with interest to make investments in specific products and then ideally reap the benefit of a 5 to 15 percent return for the successful project sales. For developers the bank is capable of delivering funds which could significantly reduce their project costs and push them to continuously be ingenious and create. For investors these returns are much greater than those you’ll find anywhere else in today’s economy.

The lenders are given their returns based on rolling six-month averages, meaning that projects that do not take off will be offset by those which flourish. The bank owners feel that it won’t take but a few deals to make great money and with the community which it is developed around being both knowledgeable and dedicated to their craft great projects will be funded with ease.

How Open Source Hardware Bank tells you to invest:




The SEC has many regulations which involve peer-to-peer lending and they are not always simple or cut and dry. Currently Open Source Hardware bank is working through these issues. Regardless the company is in business and ready to work.

from … APC Magazine

Njoy … fingerscrossed

Monday, March 2, 2009

Netbooks … Sale Decliners of Micro$oft !!!

· 0 comments

 

299_microsfot

When Microsoft laid off 5,000 people in January, analysts and pundits pointed to plenty of reasons for the first major layoffs in the company’s history. The obvious culprits included the overall economic meltdown, Apple’s continued success and Wall Street’s desire to see a leaner Microsoft.

But the real cause of the layoffs can be summed up in a single word: netbooks. These lightweight, stripped-down laptops that sell for between $200 and $400 have taken a big chunk out of Microsoft’s bottom line. Unless the company comes up with a plan to handle them, its revenue will stagnate. In announcing the layoffs, Microsoft said that its revenue had increased an anemic 1.6 per cent in the quarter that ended 31 December compared to the same quarter a year earlier.

But that number doesn’t tell the whole story. Windows took the biggest hit, while systems for servers and related tools had hefty increases in sales. Windows sales were down an eye-popping 8 percent; server and related revenue grew 15 per cent. Microsoft clearly blames netbooks for the drop in Windows sales. Here’s what it said in its statement: “Client revenue declined 8 per cent as a result of PC market weakness and a continued shift to lower priced netbooks.” Netbooks have become the only bright spot for PC makers, with sales accelerating while the rest of the PC market stays in the doldrums. According to IDC, 10 million netbooks were sold in 2008 and that number should double to 20 million in 2009.

Why is all this bad news for Microsoft? First, an estimated 30 per cent of all netbooks ship with Linux. That means Microsoft doesn’t get a penny for Windows from 30 per cent of all netbooks being sold. Given that netbooks represent the fastest-growing PC market segment, the company’s problem may get worse with time. In addition, netbook owners who buy Linux machines won’t be buying Microsoft Office, handing Microsoft an additional revenue hit for every Linux netbook sold.

So it’s not surprising that in the most recent quarter, sales of Office were anemic. Overall, sales for Microsoft’s business division, which is in charge of Office, were up slightly, at 1.9 percent. But sales of the consumer version of Office plummeted 23 per cent—and consumers are the people buying netbook.

Microsoft faces other netbook-related woes as well. The company doesn’t get paid as much for a version of Windows sold on a netbook as it does for a version of Windows sold on a laptop or desktop PC. There’s very little margin on a machine selling for $200 to $400, and so Microsoft simply can’t charge full freight for Windows on one. And given the price that Microsoft charges for consumer versions of Office - usually about $200 for the lowest-priced version – netbook owners who use Windows aren’t likely to pay for Office either. It doesn’t make much sense to pay as much for a piece of software as you did for your entire PC. Microsoft clearly recognizes the problem and is taking action to try to solve it. First, it built windows 7 to run on netbook, something that Vista doesn’t do. When windows 7 ships, expect Microsoft to spend plenty of money promoting it for use on netbook, in an attempt to drastically cut into Linux sales.

In addition, Microsoft is working on low-cost, ad-supported, Web-based versions of Office. That way, it can start to get Office revenue from netbook owners. Will these steps be enough to make up for the overall shortfall in revenue caused by netbooks? Probably not. That’s why the company is desperate to figure out a way to make its online businesses succeed. If it can’t, the days of big revenue growth are behind Microsoft, thanks in part to netbooks.

from Macworld !!!

Njoy … fingerscrossed

Sunday, February 15, 2009

Billions to eavesdrop Skype !!!

· 0 comments

 

During old times it was always big problem for Govt. agencies to tape phones of suspected individuals … then technology evolved with time and phone taping became handy tool to keep an “ear” on people … but then age came of mobile phone and satellite phones which became another challenge for agencies to spy on … and now at internet age … new way to communication has been evolved … that we use knowingly or unknowingly … its called VOIP  (Voice Over IP) a.k.a. interne telephone !!! …

Yes, when we make any call using internet it uses internet protocol ,just like we surf internet … and it becomes a bit difficult to watch over all these calls because its very cheap and easy to use … so users using this method of call is very hugeeeeeeeee number … and perhaps its the biggest problem spy agencies facing to tape terrorists who are using modern technology to communicate ( before 9/11 we had never thought that they can use e-Mails’ draft service to communicate ,right ??? ) …

Recently , An industry source disclosed that America's super secret National Security Agency (NSA) is offering "billions" to any firm which can offer reliable eavesdropping on Skype IM and voice traffic. Skype in particular is a serious problem for spooks and cops. Being P2P, the network can't be accessed by the company providing it and the authorities can't gain access by that route. The company won't disclose details of its encryption, either, and isn't required to as it is Europe based. This lack of openness prompts many security pros to rubbish Skype on "security through obscurity" grounds: but nonetheless it remains a popular choice with those who think they might find themselves under surveillance. Rumor suggests that America's NSA may be able to break Skype encryption - assuming they have access to a given call or message - but nobody else.

The NSA may be able to do that: but it seems that if so, this uses up too much of the agency's resources at present.

"They are saying to the industry, you get us into Skype and we will make you a very rich company," said the industry source, adding that the obscure encryption used by the P2Pware is believed to change frequently as part of software updates.

The spyware kingpin suggested that Skype is deliberately seeking to frustrate national listening agencies, which seems an odd thing to do - Skype has difficulties enough getting revenues out of its vast user base at any time, and a paid secure-voice system for subversives doesn't seem like a money-spinner.

But corporate parent eBay, having had to write down $1.4bn already following its $2.6bn purchase of Skype back in the bubble-2.0 days of 2005, might see an opportunity here. A billion or two from the NSA for a backdoor into Skype might make the acquisition seem like a sensible idea.

The spybiz exec, who preferred to remain anonymous, confirmed that Skype continues to be a major problem for government listening agencies, spooks and police. This was already thought to be the case, following requests from German authorities for special intercept/bugging powers to help them deal with Skype-loving malefactors. Britain's GCHQ has also stated that it has severe problems intercepting VoIP and internet communication in general

Njoy … fingerscrossed

Tuesday, February 3, 2009

How do they make all that malware !!!

· 0 comments

 

It is hard to believe that a man is telling the truth when you know that you would lie if you were in his place.

-H. L. Mencken

Anti-virus vendors are getting more than 50,000 submissions of new malware per day now. How can the malware business be so productive? It turns out the numbers aren't really as big as all that.

Welcome to the malware generation business model. So you want to be a malware star? Well listen now to what I say. Unfortunately, I will be somewhat vague, but the fact is that anyone who's technically competent and has the will to do so can find the missing pieces of the puzzle I'll lay out.

First, very little malware is lovingly hand-crafted from scratch these days. The name of the game in defeating anti-virus software is volume. You generate huge numbers of slight variants of a malicious program, do things like use different packers on the executable, and some end up different enough that the anti-malware products can't detect them.

So you write or get someone else's malcode generator. These are programs that generate malicious code variants. (No, I won't tell you where to find them.) You can get source to lots of popular malware, make your own changes and make zillions of variants. But the overwhelming majority of these variants will be detected by any decent anti-malware program, and you can't distribute all of then, so how are you to know which are the undetectable ones?

The answer is to use one of the public malware scanning services. The first and most famous one is VirusTotal, but there are several others. You upload a file to these services, and they scan it with a collection of scanners. Here's the list of VirusTotal's scanners, ripped straight off of their site:

You get a report back saying what scanners found the malware, what they detected it as, and which didn't find it. With new malware, the detections will be overwhelmingly generic/heuristic.

The good news is you can see which variants are undetected enough to be useful. The bad news is that when a product does not detect your sample, VirusTotal and the other scanners submit it to the AV companies so that they can add a signature or adjust their heuristics. You won't go undetected for long. And of those 50,000 submissions, probably no more than a few hundred, perhaps much less than that, are ever seen in the wild. Even fewer do real damage.

This arrangement is what makes it worthwhile for the anti-malware companies to cooperate with VirusTotal. It gets them early access to new malware. It's also how the AV companies are getting 50,000 submissions a day: The malware authors are, in effect, sending the new malware directly to the companies. That they will only have a limited window of opportunity to attack protected users with the new malware is just a cost of doing business.

If you want to spend some money to avoid having to inform the industry about your new code, start your own multiproduct scanning lab. You'll need current subscriptions for as many products as you can get, but I'm not sure it would buy you much time. These companies talk to each other, and if a new, undetectable variant came out from the wild, word would spread pretty quickly; soon someone would feed it through VirusTotal or one of the other services, and the jig would be up.

None of this is news and shouldn't be surprising. The moral of it all, and this too should not be news to you, is that anti-malware should not be your only line of defense. Many people call it useless because some attacks get through, and now you know how, but no line of defense is perfect. Anti-malware needs to be combined with other forms of defense, like a firewall, an intrusion prevention product, running your system with least privileged access and not clicking on links in e-mails (or at least being very careful about doing so).

 

from eWeek.com

Njoy …

Sunday, January 18, 2009

New generation of “smart” malwares !!!

· 0 comments

 

Malware authors are adopting a new technique to avoid getting caught.


Recently, two malware families -- Swizzor and Conficker -- stopped infecting machines in countries out of which the authors were operating, so not to attract law enforcement, Pierre-Marc Bureau, senior researcher at ESET, told SCMagazineUS.com on Friday. If a cybercriminals targets users outside of their country, it's harder for authorities to respond, he said.
The Swizzor malware has been around for about two years but only recently stopped infecting Russian machines by identifying the language of a user's operating system, Bureau said. Users running a Russian version of Windows will not be infected.
The fact that the trojan is now avoiding Russian targets reveals some clues about the cybercriminals behind the Swizzor malware, Bureau said. The individuals likely have servers located there and perhaps are conducting other operations, such as money laundering.

Meanwhile, the earliest variants of the rapidly spreading Conficker virus, which exploits a patched Windows Server Service vulnerability, was avoiding Ukraine targets. The malware was able to detect the keyboard layout.
However, the latest variant of Conficker -- responsible for infecting millions of machines this week, according to F-Secure -- is not choosing which victims to infect.
Still, big malware families are adopting this technique to avoid bringing attention on themselves, Bureau said.

“We have not seen this before a couple of months ago,” he said.

 

from SC Magazine ..

Njoy !!!

Supporting the Cause

Creative Commons

Translate into your Language

New Day New Giveaway

Powered By Blogger