<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber Security August 2018</title>
	<atom:link href="http://www.epanorama.net/blog/2018/08/01/cyber-security-august-2018/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2018/08/01/cyber-security-august-2018/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Mon, 20 Apr 2026 21:21:29 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/08/01/cyber-security-august-2018/comment-page-9/#comment-1602185</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 03 Sep 2018 16:21:54 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=178866#comment-1602185</guid>
		<description><![CDATA[The FBI Distributes Child Pornography to Catch People Who Look at It
http://reason.com/blog/2016/08/31/the-fbi-distributes-child-pornography-to

By its own logic, the government victimized children thousands of times.

As part of a recent child pornography investigation disconcertingly known as Operation Pacifier, the FBI ran a website that distributed photographs and videos of sexual abuse. Last year, the Seattle Times reports, &quot;after arresting the North Carolina administrator of The Playpen, a &#039;dark web&#039; child-pornography internet bulletin board, agents seized the site&#039;s server and moved it to an FBI warehouse in Virginia.&quot; 

FBI’s massive porn sting puts internet privacy in crossfire
https://www.seattletimes.com/seattle-news/crime/fbis-massive-porn-sting-puts-internet-privacy-in-crossfire/

The FBI snared scores of people after taking over a child-pornography bulletin board and conducting a sting and computer-hacking operation. But there is a growing social and legal controversy over the bureau’s tactics and the impact on internet privacy.]]></description>
		<content:encoded><![CDATA[<p>The FBI Distributes Child Pornography to Catch People Who Look at It<br />
<a href="http://reason.com/blog/2016/08/31/the-fbi-distributes-child-pornography-to" rel="nofollow">http://reason.com/blog/2016/08/31/the-fbi-distributes-child-pornography-to</a></p>
<p>By its own logic, the government victimized children thousands of times.</p>
<p>As part of a recent child pornography investigation disconcertingly known as Operation Pacifier, the FBI ran a website that distributed photographs and videos of sexual abuse. Last year, the Seattle Times reports, &#8220;after arresting the North Carolina administrator of The Playpen, a &#8216;dark web&#8217; child-pornography internet bulletin board, agents seized the site&#8217;s server and moved it to an FBI warehouse in Virginia.&#8221; </p>
<p>FBI’s massive porn sting puts internet privacy in crossfire<br />
<a href="https://www.seattletimes.com/seattle-news/crime/fbis-massive-porn-sting-puts-internet-privacy-in-crossfire/" rel="nofollow">https://www.seattletimes.com/seattle-news/crime/fbis-massive-porn-sting-puts-internet-privacy-in-crossfire/</a></p>
<p>The FBI snared scores of people after taking over a child-pornography bulletin board and conducting a sting and computer-hacking operation. But there is a growing social and legal controversy over the bureau’s tactics and the impact on internet privacy.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/08/01/cyber-security-august-2018/comment-page-9/#comment-1602121</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 03 Sep 2018 09:34:45 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=178866#comment-1602121</guid>
		<description><![CDATA[GOD MODE UNLOCKED - Hardware Backdoors in x86 CPUs
https://www.youtube.com/watch?v=_eSAF_qT_FY

This talk will demonstrate what everyone has long feared but never proven: there are hardware backdoors in some x86 processors, and they&#039;re buried deeper than we ever imagined possible. While this research specifically examines a third-party processor, we use this as a stepping stone to explore the feasibility of more widespread hardware backdoors.]]></description>
		<content:encoded><![CDATA[<p>GOD MODE UNLOCKED &#8211; Hardware Backdoors in x86 CPUs<br />
<a href="https://www.youtube.com/watch?v=_eSAF_qT_FY" rel="nofollow">https://www.youtube.com/watch?v=_eSAF_qT_FY</a></p>
<p>This talk will demonstrate what everyone has long feared but never proven: there are hardware backdoors in some x86 processors, and they&#8217;re buried deeper than we ever imagined possible. While this research specifically examines a third-party processor, we use this as a stepping stone to explore the feasibility of more widespread hardware backdoors.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/08/01/cyber-security-august-2018/comment-page-9/#comment-1601974</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 01 Sep 2018 07:54:32 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=178866#comment-1601974</guid>
		<description><![CDATA[Mozilla Firefox Will Soon Block All Trackers by Default
https://www.bleepingcomputer.com/news/software/mozilla-firefox-will-soon-block-all-trackers-by-default/

Mozilla has announced that upcoming versions of Firefox will block all cross-site tracking, slow tracking scripts, and malicious miner and fingerprinting scripts by default. These new features will be rolled out over the coming months as part of three new initiatives.

The goals of these three initiatives is to protects a user&#039;s privacy, block malicious scripts, and to decrease page loading times when browsing the web.

According to a study by Ghostery, a huge percentage of the time it takes to load a site is caused by tracking scripts.

&quot;Tracking slows down the web. In a study by Ghostery, 55.4% of the total time required to load an average website was spent loading third party trackers,&quot;]]></description>
		<content:encoded><![CDATA[<p>Mozilla Firefox Will Soon Block All Trackers by Default<br />
<a href="https://www.bleepingcomputer.com/news/software/mozilla-firefox-will-soon-block-all-trackers-by-default/" rel="nofollow">https://www.bleepingcomputer.com/news/software/mozilla-firefox-will-soon-block-all-trackers-by-default/</a></p>
<p>Mozilla has announced that upcoming versions of Firefox will block all cross-site tracking, slow tracking scripts, and malicious miner and fingerprinting scripts by default. These new features will be rolled out over the coming months as part of three new initiatives.</p>
<p>The goals of these three initiatives is to protects a user&#8217;s privacy, block malicious scripts, and to decrease page loading times when browsing the web.</p>
<p>According to a study by Ghostery, a huge percentage of the time it takes to load a site is caused by tracking scripts.</p>
<p>&#8220;Tracking slows down the web. In a study by Ghostery, 55.4% of the total time required to load an average website was spent loading third party trackers,&#8221;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/08/01/cyber-security-august-2018/comment-page-9/#comment-1601909</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 31 Aug 2018 13:36:51 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=178866#comment-1601909</guid>
		<description><![CDATA[https://www.bleepingcomputer.com/news/security/openssh-versions-since-2011-vulnerable-to-oracle-attack/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.bleepingcomputer.com/news/security/openssh-versions-since-2011-vulnerable-to-oracle-attack/" rel="nofollow">https://www.bleepingcomputer.com/news/security/openssh-versions-since-2011-vulnerable-to-oracle-attack/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/08/01/cyber-security-august-2018/comment-page-9/#comment-1601908</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 31 Aug 2018 13:36:36 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=178866#comment-1601908</guid>
		<description><![CDATA[We&#039;re all sick of Fortnite, but the flaw found in its downloader is the latest way to attack Android
Man-in-the-Disk technique able to add malicious files to a device&#039;s external storage
https://www.theregister.co.uk/2018/08/29/android_external_storage_man_in_the_disk/]]></description>
		<content:encoded><![CDATA[<p>We&#8217;re all sick of Fortnite, but the flaw found in its downloader is the latest way to attack Android<br />
Man-in-the-Disk technique able to add malicious files to a device&#8217;s external storage<br />
<a href="https://www.theregister.co.uk/2018/08/29/android_external_storage_man_in_the_disk/" rel="nofollow">https://www.theregister.co.uk/2018/08/29/android_external_storage_man_in_the_disk/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/08/01/cyber-security-august-2018/comment-page-9/#comment-1601907</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 31 Aug 2018 13:36:18 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=178866#comment-1601907</guid>
		<description><![CDATA[https://www.wired.com/story/at-commands-android-vulnerability/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.wired.com/story/at-commands-android-vulnerability/" rel="nofollow">https://www.wired.com/story/at-commands-android-vulnerability/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/08/01/cyber-security-august-2018/comment-page-9/#comment-1601906</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 31 Aug 2018 13:36:03 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=178866#comment-1601906</guid>
		<description><![CDATA[3D Printers in The Wild, What Can Go Wrong?
https://isc.sans.edu/diary/rss/24044

Richard wrote a quick diary yesterday about an interesting information that we received from one of our readers. It&#039;s about a huge amount of OctoPrint interfaces that are publicly facing the Internet. Octoprint[1] is a web interface for 3D printers that allows to control and monitor all features of the printer. They are thousands of Octoprint instances accessible without any authentication reported by Shoda

Here is an example of a publicly open interface connected to an online printer (status is &quot;operational&quot;)

So, what can go wrong with this kind of interface? It’s just another unauthenticated access to an online device. Sure but the printer owners could face very bad situations.

The interface allows downloading the 3D objects loaded in the printer. Those objects are in G-code format

We are facing here the first issue: G-code files can be downloaded and lead to potentially trade secret data leak. Indeed, many companies R&amp;D departments are using 3D printers to develop and test some pieces of their future product.

If the authentication is completely disabled, it is possible to upload G-code files and… print them! What if an anonymous person sends a malicious G-code file to the printer and instructs to print it while nobody is around? There were bad stories of low-cost 3D printers which simply burned!

Worse, what if the attacker downloads a G-code file, alters it and re-upload it. Be changing the G-code instructions, you will instruct the device to print the object but the altered one won’t have the same physical capabilities and could be a potential danger once used. Think about 3D-printer guns[4] but also 3D-printed objects used in drones. Drone owners are big fans of self-printed hardware.]]></description>
		<content:encoded><![CDATA[<p>3D Printers in The Wild, What Can Go Wrong?<br />
<a href="https://isc.sans.edu/diary/rss/24044" rel="nofollow">https://isc.sans.edu/diary/rss/24044</a></p>
<p>Richard wrote a quick diary yesterday about an interesting information that we received from one of our readers. It&#8217;s about a huge amount of OctoPrint interfaces that are publicly facing the Internet. Octoprint[1] is a web interface for 3D printers that allows to control and monitor all features of the printer. They are thousands of Octoprint instances accessible without any authentication reported by Shoda</p>
<p>Here is an example of a publicly open interface connected to an online printer (status is &#8220;operational&#8221;)</p>
<p>So, what can go wrong with this kind of interface? It’s just another unauthenticated access to an online device. Sure but the printer owners could face very bad situations.</p>
<p>The interface allows downloading the 3D objects loaded in the printer. Those objects are in G-code format</p>
<p>We are facing here the first issue: G-code files can be downloaded and lead to potentially trade secret data leak. Indeed, many companies R&amp;D departments are using 3D printers to develop and test some pieces of their future product.</p>
<p>If the authentication is completely disabled, it is possible to upload G-code files and… print them! What if an anonymous person sends a malicious G-code file to the printer and instructs to print it while nobody is around? There were bad stories of low-cost 3D printers which simply burned!</p>
<p>Worse, what if the attacker downloads a G-code file, alters it and re-upload it. Be changing the G-code instructions, you will instruct the device to print the object but the altered one won’t have the same physical capabilities and could be a potential danger once used. Think about 3D-printer guns[4] but also 3D-printed objects used in drones. Drone owners are big fans of self-printed hardware.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/08/01/cyber-security-august-2018/comment-page-9/#comment-1601900</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 31 Aug 2018 13:30:21 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=178866#comment-1601900</guid>
		<description><![CDATA[Researchers Detail Two New Attacks on TPM Chips
https://www.bleepingcomputer.com/news/security/researchers-detail-two-new-attacks-on-tpm-chips/

Some PC owners may need to apply motherboard firmware updates in the near future to address two attacks on TPM chips detailed earlier this month by four researchers from the National Security Research Institute of South Korea.

Both attacks target computers that come equipped with a Trusted Platform Module (TPM). TPMs are dedicated microcontrollers (chips, cryptoprocessors) and they are usually deployed on high-value computers, such as those used in enterprise or government networks, but they are also used on personal computers as well.

The role of a TPM chip is to ensure hardware authenticity. A TPM uses RSA encryption keys to authenticate the hardware components involved in a computer&#039;s boot-up process, but also its normal functioning.

The way a TPM works and how the TPM authenticates components part of the boot-up chain is dictated by the TPM 2.0 specification released in 2013.

TPM flaws allow attackers to hide tampered boot components]]></description>
		<content:encoded><![CDATA[<p>Researchers Detail Two New Attacks on TPM Chips<br />
<a href="https://www.bleepingcomputer.com/news/security/researchers-detail-two-new-attacks-on-tpm-chips/" rel="nofollow">https://www.bleepingcomputer.com/news/security/researchers-detail-two-new-attacks-on-tpm-chips/</a></p>
<p>Some PC owners may need to apply motherboard firmware updates in the near future to address two attacks on TPM chips detailed earlier this month by four researchers from the National Security Research Institute of South Korea.</p>
<p>Both attacks target computers that come equipped with a Trusted Platform Module (TPM). TPMs are dedicated microcontrollers (chips, cryptoprocessors) and they are usually deployed on high-value computers, such as those used in enterprise or government networks, but they are also used on personal computers as well.</p>
<p>The role of a TPM chip is to ensure hardware authenticity. A TPM uses RSA encryption keys to authenticate the hardware components involved in a computer&#8217;s boot-up process, but also its normal functioning.</p>
<p>The way a TPM works and how the TPM authenticates components part of the boot-up chain is dictated by the TPM 2.0 specification released in 2013.</p>
<p>TPM flaws allow attackers to hide tampered boot components</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/08/01/cyber-security-august-2018/comment-page-9/#comment-1601896</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 31 Aug 2018 13:27:16 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=178866#comment-1601896</guid>
		<description><![CDATA[Patch Management Must be Guided by Risk
https://www.flashpoint-intel.com/blog/patch-management-must-be-guided-by-risk/

Since the major technology companies have a regular cadence for the release of patches, organizations can, in theory, better allocate resources, prepare to test software updates, and deploy fixes when ready. But when Microsoft patches dozens of bugs on the second Tuesday month after month, or Oracle fixes hundreds of bugs at a time on a quarterly basis, the temptation could arise to just patch it all, or at least rely on criticality scores and bleating pundits to guide your patch management efforts.

A high CVE score or a pithy quote from an expert, however, shouldn’t be the deciding factor as to whether an enterprise deploys every patch to every affected system. The discussion should center on risk, and it should land on the likelihood a vulnerability would be exploited on your network and what impact it will have to continuity, data integrity, and the bottom line. An approach aligned with Business Risk Intelligence (BRI) lends itself to informed decisions about patch management, and the right call could save your company precious time and money, and allow your internal experts to focus on what matters most to the business.]]></description>
		<content:encoded><![CDATA[<p>Patch Management Must be Guided by Risk<br />
<a href="https://www.flashpoint-intel.com/blog/patch-management-must-be-guided-by-risk/" rel="nofollow">https://www.flashpoint-intel.com/blog/patch-management-must-be-guided-by-risk/</a></p>
<p>Since the major technology companies have a regular cadence for the release of patches, organizations can, in theory, better allocate resources, prepare to test software updates, and deploy fixes when ready. But when Microsoft patches dozens of bugs on the second Tuesday month after month, or Oracle fixes hundreds of bugs at a time on a quarterly basis, the temptation could arise to just patch it all, or at least rely on criticality scores and bleating pundits to guide your patch management efforts.</p>
<p>A high CVE score or a pithy quote from an expert, however, shouldn’t be the deciding factor as to whether an enterprise deploys every patch to every affected system. The discussion should center on risk, and it should land on the likelihood a vulnerability would be exploited on your network and what impact it will have to continuity, data integrity, and the bottom line. An approach aligned with Business Risk Intelligence (BRI) lends itself to informed decisions about patch management, and the right call could save your company precious time and money, and allow your internal experts to focus on what matters most to the business.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/08/01/cyber-security-august-2018/comment-page-9/#comment-1601895</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 31 Aug 2018 13:26:44 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=178866#comment-1601895</guid>
		<description><![CDATA[BusyGasper – the unfriendly spy
https://securelist.com/busygasper-the-unfriendly-spy/87627/

In early 2018 our mobile intruder-detection technology was triggered by a suspicious Android sample that, as it turned out, belonged to an unknown spyware family. Further investigation showed that the malware, which we named BusyGasper, is not all that sophisticated, but demonstrates some unusual features for this type of threat. From a technical point of view, the sample is a unique spy implant with stand-out features such as device sensors listeners, including motion detectors that have been implemented with a degree of originality. It has an incredibly wide-ranging protocol – about 100 commands – and an ability to bypass the Doze battery saver.]]></description>
		<content:encoded><![CDATA[<p>BusyGasper – the unfriendly spy<br />
<a href="https://securelist.com/busygasper-the-unfriendly-spy/87627/" rel="nofollow">https://securelist.com/busygasper-the-unfriendly-spy/87627/</a></p>
<p>In early 2018 our mobile intruder-detection technology was triggered by a suspicious Android sample that, as it turned out, belonged to an unknown spyware family. Further investigation showed that the malware, which we named BusyGasper, is not all that sophisticated, but demonstrates some unusual features for this type of threat. From a technical point of view, the sample is a unique spy implant with stand-out features such as device sensors listeners, including motion detectors that have been implemented with a degree of originality. It has an incredibly wide-ranging protocol – about 100 commands – and an ability to bypass the Doze battery saver.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
