Cylance Accused of Distributing Fake Malware Samples To Customers To Close Deals

New submitter nyman19 writes: Ars Technica reports how security vendor Cylance has been distributing non-functioning malware samples to prospective customers in order to “close the sale[s] by providing files that other products wouldn’t detect” According to the report: “A systems engineer at a large company was evaluating security software products when he discovered something suspicious. One of the vendors [Cylance] had provided a set of malware samples to test — 48 files in an archive stored in the vendor’s Box cloud storage account. The vendor providing those samples was Cylance, the information security company behind Protect, a ‘next generation’ endpoint protection system built on machine learning. In testing, Protect identified all 48 of the samples as malicious, while competing products flagged most but not all of them. Curious, the engineer took a closer look at the files in question — and found that seven weren’t malware at all.” Read more of this story at Slashdot.

Read More:
Cylance Accused of Distributing Fake Malware Samples To Customers To Close Deals

G.SKILL Hits 4500MHz With All-New Trident Z DDR4-4333MHz 16GB Memory Kit

BrianFagioli quotes a report from BetaNews: G.SKILL is a respected RAM maker, and the company is constantly pushing the envelope. Today, it announced a new DDR4-4333MHz 16GB Memory Kit (2x8GB) — the first ever. While that alone is very cool, the company is bragging about what it accomplished with it — an overclock that hit 4500MHz using an Intel Core i5-7600K processor paired with an ASUS ROG Maximus IX Apex motherboard. Pricing and availability for this kit is unknown at this time. With that said, it will probably be quite expensive. What we do know, however, its that the insane overclock to 4500MHz is for real. This was achieved using timings of CL19-19-19-39 in dual channel, which resulted in read/write of 55/65GB/s and copy speed of 52GB/s. Read more of this story at Slashdot.

Excerpt from:
G.SKILL Hits 4500MHz With All-New Trident Z DDR4-4333MHz 16GB Memory Kit

NSA-Leaking Shadow Brokers Just Dumped Its Most Damaging Release Yet

An anonymous reader quotes a report from Ars Technica: The Shadow Brokers — the mysterious person or group that over the past eight months has leaked a gigabyte worth of the National Security Agency’s weaponized software exploits — just published its most significant release yet. Friday’s dump contains potent exploits and hacking tools that target most versions of Microsoft Windows and evidence of sophisticated hacks on the SWIFT banking system of several banks across the world. Friday’s release — which came as much of the computing world was planning a long weekend to observe the Easter holiday — contains close to 300 megabytes of materials the leakers said were stolen from the NSA. The contents (a convenient overview is here) included compiled binaries for exploits that targeted vulnerabilities in a long line of Windows operating systems, including Windows 8 and Windows 2012. It also included a framework dubbed Fuzzbunch, a tool that resembles the Metasploit hacking framework that loads the binaries into targeted networks. Independent security experts who reviewed the contents said it was without question the most damaging Shadow Brokers release to date. One of the Windows zero-days flagged by Hickey is dubbed Eternalblue. It exploits a remote code-execution bug in the latest version of Windows 2008 R2 using the server message block and NetBT protocols. Another hacking tool known as Eternalromance contains an easy-to-use interface and “slick” code. Hickey said it exploits Windows systems over TCP ports 445 and 139. The exact cause of the bug is still being identified. Friday’s release contains several tools with the word “eternal” in their name that exploit previously unknown flaws in Windows desktops and servers. Read more of this story at Slashdot.

Read this article:
NSA-Leaking Shadow Brokers Just Dumped Its Most Damaging Release Yet

Former Sysadmin Accused of Planting ‘Time Bomb’ In Company’s Database

An anonymous reader writes: Allegro MicroSystems LLC is suing a former IT employee for sabotaging its database using a “time bomb” that deleted crucial financial data in the first week of the new fiscal year. According to court documents, after resigning from his job, a former sysadmin kept one of two laptops. On January 31, Patel entered the grounds of the Allegro headquarters in Worcester, Massachusetts, just enough to be in range of the factory’s Wi-Fi network. Allegro says that Patel used the second business-use laptop to connect to the company’s network using the credentials of another employee. While connected to the factory’s network on January 31, Allegro claims Patel, who was one of the two people in charge of Oracle programming, uploaded a “time bomb” to the company’s Oracle finance module. The code was designed to execute a few months later, on April 1, 2016, the first week of the new fiscal year, and was meant to “copy certain headers or pointers to data into a separate database table and then to purge those headers from the finance module, thereby rendering the data in the module worthless.” The company says that “defendant Patel knew that his sabotage of the finance module on the first week of the new fiscal year had the maximum potential to cause Allegro to suffer damages because it would prevent Allegro from completing the prior year’s fiscal year-end accounting reconciliation and financial reports.” Read more of this story at Slashdot.

Continue reading here:
Former Sysadmin Accused of Planting ‘Time Bomb’ In Company’s Database

Pirate Bay Founder: ‘I Have Given Up’

The future of illegal torrent websites doesn’t look good. As torrent websites continue to disappear, the founder of The Pirate Bay believes the trend is the just the beginning. From an article: While it might look like torrenters are are still fighting this battle, Sunde claims that the reality is more definitive: “We have already lost.” Take the net neutrality law in Europe. It’s terrible, but people are happy and go like “it could be worse.” That is absolutely not the right attitude. Facebook brings the internet to Africa and poor countries, but they’re only giving limited access to their own services and make money off of poor people. Well, I have given up the idea that we can win this fight for the internet. The situation is not going to be any different, because apparently that is something people are not interested in fixing. Or we can’t get people to care enough. Maybe it’s a mixture, but this is kind of the situation we are in, so its useless to do anything about it. We have become somehow the Black Knight from Monty Python’s Holy Grail. We have maybe half of our head left and we are still fighting, we still think we have a chance of winning this battle. Read more of this story at Slashdot.

View post:
Pirate Bay Founder: ‘I Have Given Up’

Ubuntu 17.04 ‘Zesty Zapus’, Featuring Unity, Now Available To Download

Brian Fagioli, writing for BetaNews: Ubuntu 17.04 “Zesty Zapus” is available for download. No, this is not an Alpha or Beta, but an official stable version of the Linux-based operating system. Unfortunately, the release is a bit tainted — it uses Unity as the official desktop environment, which Canonical has announced will be killed. Not to mention, there has been some controversy regarding some comments by Ubuntu founder Mark Shuttleworth. Just yesterday, the CEO of Canonical announced she is leaving the position. With all of the aforementioned controversy and chaos, it is understandably hard to get too excited for “Zesty Zapus, ” especially as this is not a long term support version. With that said, if you are an existing Ubuntu user that likes Unity, this is certainly a worthwhile upgrade if you are OK with the shorter support. Unity may no longer have a future, but version 7 will continue to be supported — for a while, at least. Read more of this story at Slashdot.

Excerpt from:
Ubuntu 17.04 ‘Zesty Zapus’, Featuring Unity, Now Available To Download

New ‘Spray-On’ Memory Could Turn Everyday Items Into Digital Storage Devices

Researchers at Duke University have developed “spray-on” digital memory using only an aerosol jet printer and nanoparticle inks. An anonymous reader quotes Duke Today: The device, which is analogous to a 4-bit flash drive, is the first fully-printed digital memory that would be suitable for practical use in simple electronics such as environmental sensors or RFID tags. And because it is jet-printed at relatively low temperatures, it could be used to build programmable electronic devices on bendable materials like paper, plastic or fabric… The new material, made of silica-coated copper nanowires encased in a polymer matrix, encodes information not in states of charge but instead in states of resistance. By applying a small voltage, it can be switched between a state of high resistance, which stops electric current, and a state of low resistance, which allows current to flow. And, unlike silicon, the nanowires and the polymer can be dissolved in methanol, creating a liquid that can be sprayed through the nozzle of a printer. Amazingly, its write speed is three microseconds, “rivaling the speed of flash drives.” The information can be re-written many times, and the stored data can last for up to 10 years. Read more of this story at Slashdot.

See the article here:
New ‘Spray-On’ Memory Could Turn Everyday Items Into Digital Storage Devices

US Hacker Sets Off 156 Sirens At Midnight

“I had the displeasure of being awoken at midnight to the sounds of civil-defense/air-raid sirens, ” writes very-long-time Slashdot reader SigIO, blaming “some schmuck with a twisted sense of humor.” The Dallas News reports: Rocky Vaz, director of Dallas’ Office of Emergency Management, said that all 156 of the city’s sirens were activated more than a dozen times… Dallas officials blame computer hacking for setting off emergency sirens throughout the city early Saturday… It took until about 1:20 a.m. to silence them for good because the emergency system had to be deactivated. The system remained shut down Saturday while crews safeguarded it from another hack. The city has figured out how the emergency system was compromised and is working to prevent it from happening again, he said… The city said the system should be restored Sunday or Monday. City officials reported 4, 400 calls to their 9-1-1 emergency phone number in the first four hours of Saturday morning, with over 800 occurring in that first 15 minutes when all 156 sirens started going off simultaneously. Read more of this story at Slashdot.

Continued here:
US Hacker Sets Off 156 Sirens At Midnight

Gigabyte Firmware Bugs Allow the Installation of BIOS/UEFI Ransomware

An anonymous reader writes from a report via BleepingComputer: Last week, at the BlackHat Asia 2017 security conference, researchers from cyber-security firm Cylance disclosed two vulnerabilities in the firmware of Gigabyte BRIX small computing devices, which allow an attacker to write malicious content to the UEFI firmware. During their presentation, researchers installed a proof-of-concept UEFI ransomware, preventing the BRIX devices from booting, but researchers say the same flaws can be used to plant rootkits that allow attackers to persist malware for years. The two vulnerabilities discovered are CVE-2017-3197 and CVE-2017-3198. The first is a failure on Gigabyte’s part to implement write protection for its UEFI firmware. The second vulnerability is another lapse on Gigabyte’s side, who forgot to implement a system that cryptographically signs UEFI firmware files. Add to this the fact that Gigabyte uses an insecure firmware update process, which doesn’t check the validity of downloaded files using a checksum and uses HTTP instead of HTTPS. A CERT vulnerability note was published to warn users of the impending danger and the bugs’ ease of exploitation. Read more of this story at Slashdot.

Read the original post:
Gigabyte Firmware Bugs Allow the Installation of BIOS/UEFI Ransomware

USB Canary Sends An SMS When Someone Tinkers With Your USB Ports

An anonymous reader quotes a report from BleepingComputer: A new tool released on GitHub last week can help paranoid sysadmins keep track of whenever someone plugs in or disconnects an USB-based device from high-value workstations. Called USB Canary, this tool is coded in Python and currently, works only on Linux (versions for Windows and Mac are in the works). The tool works by watching USB ports for any activity while the computer is locked, which generally means the owner has left his desk. If an USB device is plugged in or unplugged, USB Canary can perform one of two actions, or both. It can alert the owner by sending an SMS message via the Twilio API, or it can post a message in a Slack channel, which can be monitored by other co-workers. USB Canary can prove to be a very useful tool for large organizations that feature strict PC policies. For example, if you really want to enforce a “No USB drives” at work, this could be the tool for the job. Further, with modifications, it could be used for logging USB activity on air-gapped systems. Read more of this story at Slashdot.

Taken from:
USB Canary Sends An SMS When Someone Tinkers With Your USB Ports