Long TSA Delays Force Airports To Hire Private Security Contractors

An anonymous Slashdot reader writes: TSA checkpoints caused 6, 800 American Airlines passengers to miss their flights in just one week this spring, and the problem isn’t improving. “Two years ago the Transportation Security Administration (TSA) offered $15, 000 to anybody — literally anybody — who could come up with an idea to speed up airport security…” writes Popular Science. “They wouldn’t say who won or for which idea, but since we’re here two years later with longer wait times than ever, it’s fair to say it hasn’t lived up to the groundbreaking ideals of that call to action… Now in summer 2016, the TSA recommends arriving three hours early instead of a mere two.” So this spring the Seattle-Tacoma airport replaced many of the TSA staff with private screeners, although “Private security operates under strict direction from the TSA, and even those airports that heavily utilize private contractors still have a lot of TSA personnel in the back rooms…” according to the article. “The ability to do exactly what the TSA does, only faster and cheaper, seems to be the major draw.” Now 22 U.S. airports are using private screeners, although the Seattle and San Francisco airports are the only ones with significant traffic. The article also cites a Homeland Security report which discovered that investigators were able to smuggle a test bomb past security checkpoints in 67 out of 70 tests. Read more of this story at Slashdot.

More:
Long TSA Delays Force Airports To Hire Private Security Contractors

Penetration-Testing Distro Kali Linux 2016.2 Released

prisoninmate writes: What’s Kali Linux 2016.2? Well, it’s an updated Live ISO image of the popular GNU/Linux distribution designed for ethical hackers and security professionals who want to harden the security of their networks, which contains the latest software versions and enhancements for those who want to deploy the OS on new systems. It’s been quite some time since the last update to the official Kali Linux Live ISOs and new software releases are announced each day, which means that the packages included in the previous Kali Linux images are very old, and bugs and improvements are always implemented in the most recent versions of the respective security tools. Best of all, the new Kali Linux 2016.2 release comes in KDE, MATE, Xfce, LXDE, and Enlightenment E17 flavors. Their blog also points out that Kali recently appeared in an episode of Mr. Robot. Read more of this story at Slashdot.

Continue reading here:
Penetration-Testing Distro Kali Linux 2016.2 Released

New Carbon Nanotube Chip Outperforms Silicon Semiconductors

“Researchers at the University of Wisconsin-Madison are the first to have fabricated carbon nanotube transistors (CNTs) that outperform the current-density of conventional semiconductors like silicon and gallium arsenide, ” reports NanotechWeb. Slashdot reader wasteoid shares the site’s interview with one of the researchers: “When the transistors are turned on to the conductive state (meaning that current is able to pass through the CNT channel) the amount of current traveling through each CNT in the array approaches the fundamental quantum limit, ” he tells nanotechweb.org. “Since the CNTs conduct in parallel, and the packing density and conductance per tube are very high, the overall current density is very high too — at nearly twice that of silicon’s. The result is that these CNT array FETs have a conductance that is seven times higher than any previous reported CNT array field-effect transistor.” The research was funded in part by the U.S. Army and Air Force, as well as the National Science Foundation. “The implication here is that by replacing silicon with a CNT channel, it should be possible for us to make either a higher performing device or one that works at lower power.” In other news, Fujitsu announced this week that it’s joining an effort to release a 256-megabyte 55-nanometer carbon nanotube-based NRAM by 2018. Read more of this story at Slashdot.

Read More:
New Carbon Nanotube Chip Outperforms Silicon Semiconductors

Police Seize Two ‘Perfect Privacy’ VPN Servers

An anonymous reader writes from a report via TorrentFreak: VPN provider Perfect Privacy has informed its customers that two of its servers had been seized by the police in Rotterdam, Netherlands. Torrent Freak reports: “The authorities went directly to the hosting company I3D and the VPN provider itself wasn’t contacted by law enforcement. ‘Currently we have no further information since the responsible law enforcement agency did not get in touch with us directly, we were merely informed by our hoster, ‘ Perfect Privacy says. Despite losing control over two servers, Perfect Privacy assures its customers that no personally identifiable data is present on the seized hardware. Like many other VPNs, the company maintains a strict no-logging policy. ‘Since we are not logging any data there is currently no reason to believe that any user data was compromised, ‘ the VPN provider says. ‘When the Dutch police contact us with a subpoena, we work with them in a professional manner and ensure their request and our responses are in compliance with the Dutch law, ‘ I3D informs us. ‘We think with the affected customer as well, for example by making temporary capacity available so the customer does not suffer extended downtime during the investigation.'” Read more of this story at Slashdot.

Follow this link:
Police Seize Two ‘Perfect Privacy’ VPN Servers

400,000 GitHub Repositories, 1 Billion Files, 14TB of Code: Spaces or Tabs?

Here’s a debate that refuses to die: given a choice, would you rather use spaces or tabs? An episode of Silicon Valley last season had a bit on this. Now we have more data to analyze people’s behavior. A Google developer has looked into 400, 000 GitHub repositories — 1 billion files, 14 terabytes to find that programmers with interest in specific languages do seem to prefer either tabs or spaces. Spoiler alert: space wins, like all the time. Read more of this story at Slashdot.

Continued here:
400,000 GitHub Repositories, 1 Billion Files, 14TB of Code: Spaces or Tabs?

Staff Breach At OneLogin Exposes Password Storage Feature

River Tam quotes a report from CSO Australia: Enterprise access management firm OneLogin has suffered an embarrassing breach tied to a single employee’s credentials being compromised. OneLogin on Tuesday revealed the breach affected a feature called Secure Notes that allowed its users to “store information.” That feature however is pitched to users as a secure way to digitally jot down credentials for access to corporate firewalls and keys to software product licenses. The firm is concerned Secure Notes was exposed to a hacker for at least one month, though it may have been from as early as July 2 through to August 25, according to a post by the firm. Normally these notes should have been encrypted using “multiple levels of AES-256 encryption, ” it said in a blog post. Several thousand enterprise customers, including high profile tech startups, use OneLogin for single sign-on to access enterprise cloud applications. The company has championed the SAML standard for single sign-on and promises customers an easy way to enable multi-factor authentication from devices to cloud applications. But it appears the company wasn’t using multi-factor authentication for its own systems. OneLogin’s CISO Alvaro Hoyos said a bug in its software caused Secure Notes to be “visible in our logging system prior to being encrypted and stored in our database.” The firm later found out that an employees compromised credentials were used to access this logging system. The company has since fixed the bug on the same day it detected the bug. CSO adds that the firm “also implemented SAML-based authentication for its log management system and restricted access to a limited set of IP addresses.” Read more of this story at Slashdot.

Excerpt from:
Staff Breach At OneLogin Exposes Password Storage Feature

Half Of People Click Anything Sent To Them

Want to know why phishing continues to be one of the most common security issue? Half of the people will click on anything without thinking twice ArsTechnica reports: A study by researchers at a university in Germany found that about half of the subjects in a recent experiment clicked on links from strangers in e-mails and Facebook messages — even though most of them claimed to be aware of the risks. The researchers at the Friedrich-Alexander University (FAU) of Erlangen-Nuremberg, Germany, led by FAU Computer Science Department Chair Dr Zinaida Benenson, revealed the initial results of the study at this month’s Black Hat security conference. Simulated “spear phishing” attacks were sent to 1, 700 test subjects — university students — from fake accounts. The e-mail and Facebook accounts were set up with the ten most common names in the age group of the targets. The Facebook profiles had varying levels of publicly accessible profile and timeline data — some with public photos and profile photos, and others with minimal data. The messages claimed the links were to photos taken at a New Year’s Eve party held a week before the study. Two sets of messages were sent out: in the first, the targets were addressed by their first name; in the second, they were not addressed by name, but more general information about the event allegedly photographed was given. Links sent resolved to a webpage with the message “access denied, ” but the site logged the clicks by each student. Read more of this story at Slashdot.

More here:
Half Of People Click Anything Sent To Them

Google Login Bug Allows Credential Theft

Trailrunner7 writes from a report via On the Wire: Attackers can add an arbitrary page to the end of a Google login flow that can steal users’ credentials, or alternatively, send users an arbitrary file any time a login form is submitted, due to a bug in the login process. A researcher in the UK identified the vulnerability recently and notified Google of it, but Google officials said they don’t consider it a security issue. The bug results from the fact that the Google login page will take a specific, weak GET parameter. Using this bug, an attacker could add an extra step to the end of the login flow that could steal a user’s credentials. For example, the page could mimic an incorrect password dialog and ask the user to re-enter the password. [Aidan Woods, the researcher who discovered the bug, ] said an attacker also could send an arbitrary file to the target’s browser any time the login form is submitted. In an email interview, Woods said exploiting the bug is a simple matter. “Attacker would not need to intercept traffic to exploit — they only need to get the user to click a link that they have crafted to exploit the bug in the continue parameter, ” Woods said. Google told Woods they don’t consider this a security issue. Read more of this story at Slashdot.

Continued here:
Google Login Bug Allows Credential Theft

Microsoft Lost a City Because They Used Wikipedia Data

“Microsoft can’t tell North from South on Bing Maps, ” joked The Register, reporting that Microsoft’s site had “misplaced Melbourne, the four-million-inhabitant capital of the Australian State of Victoria.” Long-time Slashdot reader RockDoctor writes: Though they’re trying to minimise it, the recent relocation of Melbourne Australia to the ocean east of Japan in Microsoft’s flagship mapping application is blamed on someone having flipped a sign in the latitude given for the city’s Wikipedia page. Which may or may not be true. But the simple stupidity of using a globally-editable data source for feeding a mapping and navigation system is … “awesome” is (for once) an appropriate word. Well, it’s Bing, so at least no-one was actually using it. “Bing’s not alone in finding Australia hard to navigate, ” reports The Register. “In 2012 police warned not to use Apple Maps as it directed those seeking the rural Victorian town of Mildura into the middle of a desert.” Read more of this story at Slashdot.

See the original post:
Microsoft Lost a City Because They Used Wikipedia Data

New Ransomware Poses As A Windows Update

Slashdot reader MojoKid quotes an article from Hot Hardware: A security researcher for AVG has discovered a new piece of ransomware called Fantom that masquerades as a critical Windows update. Victims who fall for the ruse will see a Windows screen acting like it’s installing the update, but what’s really happening is that the user’s documents and files are being encrypted in the background… The scam starts with a pop-up labeled as a critical update from Microsoft. Once a user decides to apply the fake update, it extracts files and executes an embedded program called WindowsUpdate.exe… As with other EDA2 ransomware, Fantom generates a random AES-128 key, encrypts it using RSA, and then uploads it to the culprit. From there, Fantom targets specific file extensions and encrypts those files using AES-128 encryption… Users affected by this are instructed to email the culprit for payment instructions. While the ransomware is busy encrypting your files, it displays Microsoft’s standard warning about not turning off the computer while the “update” is in progress. Pressing Ctrl+F4 closes that window, according to the article, “but that doesn’t stop the ransomware from encrypting files in the background.” Read more of this story at Slashdot.

Read More:
New Ransomware Poses As A Windows Update