Security

Wireless & IoT protocols & their security tradeoffs | EDN

http://www.edn.com/design/systems-design/4458666/Wireless—IoT-protocols—their-security-tradeoffs?utm_content=buffer01b00&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer Many products suddenly become hacking targets when their products become smart and connected. This article is about securing them. The issue is that bad press and major security and privacy issues might slow down the adoption of IoT for improving our lives. Many end users are already skeptical to connect simple devices we rely

Reverse Engineering Hardware of Embedded Devices

http://blog.sec-consult.com/2017/07/reverse-engineering-hardware.html?m=1 Nowadays, we are living in a world dominated by embedded systems. Everyone can be spied on through various channels. Routers, IP-cameras, phones, and other embedded devices are affected by security vulnerabilities and are therefore easily hack-able.  This article covers some basic hardware reverse engineering techniques on PCB-level, which are applicable to any electronic embedded

18 Extensions For Turning Firefox Into a Penetration Testing Tool

http://resources.infosecinstitute.com/use-firefox-browser-as-a-penetration-testing-tool-with-these-add-ons/ Mozilla has a website add-on section that has thousands of useful add-ons in different categories. Some of these add-ons are useful for penetration testers and security analysts. These penetration testing add-ons helps in performing different kinds of attacks, and modify request headers direct from the browser.  This article lists a few popular and interesting Firefox add-ons

Wikileaks Unveils CIA Implants that Steal SSH Credentials from Windows & Linux PCs

http://thehackernews.com/2017/07/ssh-credential-hacking.html?m=1 WikiLeaks has today published the 15th batch of its ongoing Vault 7 leak, this time detailing two alleged CIA implants that allowed the agency to intercept and exfiltrate SSH (Secure Shell) credentials from targeted Windows and Linux operating systems. BothanSpy implant is for Microsoft Windows Xshell client. Gyrfalcon targets the OpenSSH client on various distributions of Linux OS: CentOS,

Linux Foundation launches the Open-source EdgeX Foundry for IoT standardisation

https://www.open-electronics.org/linux-foundation-launches-the-open-source-edgex-foundry-for-iot-standardisation/ Security is the Achilles heel of the Internet of Things, according to Steven J. Vaughan-Nichols on ZDNet. The lack of common IoT development standards is part of this problem. This is why the Linux Foundation, along with 50 companies, has announced The EdgeX Foundry. The group will build a common open framework for IoT

OutlawCountry: CIA’s Hacking Tool For Linux Computers Revealed

https://fossbytes.com/outlawcountry-cia-hacking-tool-linux/ Wikileaks has published fresh documents that deal with the CIA’s hacking and spying on Linux machines using a malware strain called OutlawCountry. This tool consists of a kernel module that creates invisible netfilter table for creating new rules with iptables command. Those rules can modify and redirect the network traffic. The OutlawCountry’s prerequisites for operation are

A new Petya-like malware hit

We have recently been facing a huge outbreak of a new Petya-like malware armed with an infector similar to WannaCry. With echoes of WannaCry, infections spread fast. The research is still in progress -Some security researchers describe malware as variant of Petya; others say it’s a brand new sample. The low-level attack works in the

The internet is actually controlled by 14 people who hold 7 secret keys | IFLScience

http://www.iflscience.com/technology/the-internet-is-actually-controlled-by-14-people-who-hold-7-secret-keys/ This sounds like something out of a Dan Brown book, but it isn’t: The whole internet is controlled by seven actual, physical keys. ICANN maps the numbers (easier for computers to use) with words (easier for humans to use). If someone were to gain control of ICANN’s database, that person would control the internet.  The physical

AES-256 keys sniffed in seconds using €200 of kit a few inches away • The Register

https://www.theregister.co.uk/2017/06/23/aes_256_cracked_50_seconds_200_kit/ Side-channel attacks that monitor a computer’s electromagnetic output to snaffle passwords are nothing new. They usually require direct access to the target system and a lot of expensive machinery – but no longer. Researchers at Fox‑IT have managed to wirelessly extract secret AES-256 encryption keys from a distance of one metre (3.3 feet) –

IoT goes nuclear: creating a ZigBee chain reaction | the morning paper

https://blog.acolyer.org/2017/06/22/iot-goes-nuclear-creating-a-zigbee-chain-reaction/ The popular Philips Hue smart lamps use ZigBee for example. Suppose you could build a worm that jumps directly from one lamp to another using their ZigBee wireless connectivity and their physical proximity. If the install base of lamps in a city is sufficiently dense, you could take them all over in no time,