Privacy, Security Archive

BlindElephant: Open Source Web Application Fingerprinting Engine

In this video recorded at Black Hat USA 2010, Patrick Thomas, a vulnerability researcher at Qualys, discusses the open source web application fingerprinting engine BlindElephant he created. BlindElephant is a tool that helps security professionals and systems administrators identify everything running on their servers, including any web applications users may have downloaded. It doesn't check for vulnerabilities or vulnerability to a particular exploit, but rather what version of applications are running on their site. For each application that the tool will support, BlindElephant consumes a number of version directories. All files and directories are processed, and a hash is computed for each file. This hash is stored in a temporary table, along with the path and version of the application it came from. Accuracy of the tool was demonstrated by a large-scale survey on Internet-visible hosts.

Microsoft Releases Free Security Tool for Older Platforms

Microsoft has released a free tool to bring newer security protections to older platforms and applications. The enhanced mitigation experience tookit (EMET) was announced at the BlackHat USA 2010 security conference in Las Vegas. EMET will be available from August and is designed to help block targeted attacks against unpatched vulnerabilities in platforms such as Windows XP and Windows Server 2003.

TrueCrypt 7.0 Released

The free open-source disk encryption software Truecrypt reached version 7.0. Among the new features are hardware-accelerated AES, support for devices that use sector sizes other than 512 bytes, ability to configure a volume to be automatically mounted whenever its host device gets connected to the computer, favorites organizer, and more. Downloads for Windows, Linux and Mac OS X are available here.

Shortcut Worm Vulnerability Affects All Windows Versions

Microsoft confirmed the existence of a critical vulnerability in all supported versions of Windows. The new zero-day vulnerability is easily exploitable via USB storage devices, network shares or remote WebDAV shares. All that is required for exploitation is for the contents of the USB device to be viewed in Windows Explorer. Specially crafted shortcut (.lnk) files are allowed to execute code when the shortcut's icon is loaded to the GUI. An exploit targeting this vulnerability is currently in limited use and additional exploits are very likely in the coming weeks.

20 Ways To Lose Your Database

It has been proven to be relatively easy to bribe someone on the inside - or even plant a rogue employee in the organization -- to gain access to sensitive data -- but even if we leave this well-documented risk aside, how often has someone left your organization taking company stationery with them? Do you know what else has been taken? Could they have sneaked out with sensitive material? What about a copy of the entire corporate database? Would you even know if they had?

Microsoft Opens Source Code to Russian Secret Service

Microsoft has signed a deal to open its Windows 7 source code up to the Russian intelligence services. Russian publication Vedomosti reported on Wednesday that Microsoft had also given the Russian Federal Security Service (FSB) access to Microsoft Windows Server 2008 R2, Microsoft Office 2010 and Microsoft SQL Server source code, with hopes of improving Microsoft sales to the Russian state. The agreement will allow state bodies to study the source code and develop cryptography for the Microsoft products through the Science-Technical Centre 'Atlas', a government body controlled by the Ministry of Communications and Press, according to Vedomosti. . . The agreement is an extension to a deal Microsoft struck with the Russian government in 2002 to share source code for Windows XP, Windows 2000 and Windows Server 2000, said Vedomosti.

World of Warcraft Maker to End Anonymous Forum Logins

From BBC News: "A row has erupted after Blizzard - the publishers of the popular online game World of Warcraft - announced that users on its site forums would have to post under their real names. The firm say the move is to put an end to heated online arguments and topics started purely to cause trouble. But users reacted angrily, citing concerns about safety and privacy." The take away quote: "one Blizzard employee posted his real name on the forums, saying that there was no risk to users, and the experiment went drastically wrong. Within five minutes, users had got hold of his telephone number, home address, photographs of him and a ton of other information. The post and topic has since been removed from the Blizzard forum."

Android App Security Risk

About 20 percent of third-party apps available through the Android marketplace allow third-party access to sensitive data, and can do things like make calls and send texts without the owners' knowledge, according to a recent security report from security firm SMobile Systems. There's no indication that any of the highlighted apps is malicious, but the report does underscore the inherent risks of a more open ecosystem as opposed to Apple's oppressive yet more controlled environment, with every app being vetted before availability.

Linux Security – a Few Useful, Tactical Tips

I've bored the readers of my personal website to death with two rather prosaic articles debating the Linux security model, in direct relation to Windows and associated claims of wondrous infections and lacks thereof. However, I haven't yet discussed even a single program that you can use on your Linux machine to gauge your security. For my inaugural article for OSNews, I'll leave the conceptual stuff behind, and focus on specific vectors of security, within the world of reason and moderation that I've created and show you how you can bolster a healthy strategy with some tactical polish, namely software.

Windows XP Remote Assistance Exploit Discovered

An insecurity expert has has discovered a vulnerability in older versions of Windows which pesky attackers could exploit to take over control of your PC. Somewhat ironically, the vulnerability afflicts the Help and Support Center for Windows XP and Server 2003, which users may still - just about - be able to use to get online technical support.

Ironfox: Sandboxed Firefox for MacOSX

The MacOSX sandbox functionality is not talked about, and there exists almost zero documentation on the subject. As Google Chrome uses it to contain it browser, so could any other app. The goal of the ironfox project is to provide the user with a secured Firefox, but still let the user browse the web without the sandbox interfering. It does this by white-listing all the actions that Firefox may do. Should the user's browser be compromised by a vulnerability in Flash or Java, the sandbox would prevent it from leaking any data or executing binaries, preventing system compromise. To break the sandbox the attacker would likely need to have a exploit for the browser and a kernel exploit that would work within the context of the sandbox. The policy is included in the package and should give the user great insights in the workings of the sandbox. It only works in 10.6 but could be backported to 10.5 without much trouble, as both have the seatbelt/sandbox kernel module.

Facebook Finally Gets it with New, Simpler Privacy Controls

"Facebook has introduced its newly overhauled privacy controls, and most critics should be pleased this time around. The company noted during a press conference Thursday that the site today is very different from how it was when it first started in 2004, admitting that the privacy controls had grown into something of a Frankenstein monster as the company kept adding on features. Thanks to feedback from users, CEO Mark Zuckerberg said, Facebook has completely revamped its offerings and has begun slowly rolling out the change to users."

Malware Overwriting Desktop App Updaters

For the first time security researchers have spotted a type of malicious software that overwrites update functions for other applications, which could pose additional long-term risks for users. The malware, which infects Windows computers, masks itself as an updater for Adobe Systems' products and other software such as Java, wrote Nguyen Cong Cuong, an analyst with Bach Khoa Internetwork Security (BKIS), a Vietnamese security company, on its blog.