Point-of-Sale System Bought On eBay Yields Treasure Trove of Private Data

jfruh writes: Point-of-sale systems aren’t cheap, so it’s not unusual for smaller merchants to buy used terminals second-hand. An HP security researcher bought one such unit on eBay to see what a used POS system will get you, and what he found was disturbing: default passwords, a security flaw, and names, addresses, and social security numbers of employees of the terminal’s previous owner. Read more of this story at Slashdot.

Original post:
Point-of-Sale System Bought On eBay Yields Treasure Trove of Private Data

New Mayhem Malware Targets Linux and UNIX-Like Servers

Bismillah writes: Russian security researchers have spotted a new malware named Mayhem that has spread to 1, 400 or so Linux and FreeBSD servers around the world, and continues to look for new machines to infect. And, it doesn’t need root to operate. “The malware can have different functionality depending on the type of plug-in downloaded to it by the botmaster in control, and stashed away in a hidden file system on the compromised server. Some of the plug-ins provide brute force cracking of password functionality, while others crawl web pages to scrape information. According to the researchers, Mayhem appears to be the continuation of the Fort Disco brute-force password cracking attack campaign that began in May 2013.” Read more of this story at Slashdot.

See the original post:
New Mayhem Malware Targets Linux and UNIX-Like Servers

OpenWRT 14.07 RC1 Supports Native IPv6, Procd Init System

An anonymous reader writes Release Candidate One of OpenWRT 14.07 “Barrier Breaker” is released. Big for this tiny embedded Linux distribution for routers in 14.07 is native IPv6 support and the procd init system integration. The native IPv6 support is with the RA and DHCPv6+PD client and server support plus other changes. Procd is OpenWRT’s new preinit, init, hotplug, and event system. Perhaps not too exciting is support for upgrading on devices with NAND, and file system snapshot/restore so you can experiment without fear of leaving your network broken. There’s also experimental support for the musl standard C library. Read more of this story at Slashdot.

Taken from:
OpenWRT 14.07 RC1 Supports Native IPv6, Procd Init System

Hacking Internet Connected Light Bulbs

An anonymous reader writes We’ve been calling it for years — connect everything in your house to the internet, and people will find a way to attack it. This post provides a technical walkthrough of how internet-connected lighting systems are vulnerable to outside attacks. Quoting: “With the Contiki installed Raven network interface we were in a position to monitor and inject network traffic into the LIFX mesh network. The protocol observed appeared to be, in the most part, unencrypted. This allowed us to easily dissect the protocol, craft messages to control the light bulbs and replay arbitrary packet payloads. … Monitoring packets captured from the mesh network whilst adding new bulbs, we were able to identify the specific packets in which the WiFi network credentials were shared among the bulbs. The on-boarding process consists of the master bulb broadcasting for new bulbs on the network. A new bulb responds to the master and then requests the WiFi details to be transferred. The master bulb then broadcasts the WiFi details, encrypted, across the mesh network. The new bulb is then added to the list of available bulbs in the LIFX smart phone application.” Read more of this story at Slashdot.

View post:
Hacking Internet Connected Light Bulbs

Secure Windows Apps With the Enhanced Mitigation Experience Toolkit

Microsoft’s Enhanced Mitigation Experience Toolkit (EMET) is targeted toward system administrators, but the How-To Geek explains how you can use it to secure your personal Windows system. Read more…

Read the article:
Secure Windows Apps With the Enhanced Mitigation Experience Toolkit

Microsoft Runs Out of US Address Space For Azure, Taps Its Global IPv4 Stock

alphadogg (971356) writes “Microsoft has been forced to start using its global stock of IPv4 addresses to keep its Azure cloud service afloat in the U.S., highlighting the growing importance of making the shift to IP version 6. The newer version of the Internet Protocol adds an almost inexhaustible number of addresses thanks to a 128-bit long address field, compared to the 32 bits used by version 4. The IPv4 address space has been fully assigned in the U.S., meaning there are no additional addresses available, Microsoft said in a blog post earlier this week. This requires the company to use the IPv4 address space available to it globally for new services, it said.” Read more of this story at Slashdot.

Link:
Microsoft Runs Out of US Address Space For Azure, Taps Its Global IPv4 Stock

Viewdns.info Combines Tons of Internet Troubleshooting Tools Into One Web Page

When you are trying to troubleshoot internet connection issues, knowledge is power. Viewdns.info consolidates 21 different tests on one handy page. Read more…

View post:
Viewdns.info Combines Tons of Internet Troubleshooting Tools Into One Web Page

How to Set Up Steam In-Home Streaming and Fix Its Quirks

Yesterday, Steam released its In-Home Streaming feature to everyone. The feature allows you to install games on one PC and stream them via your home network to any other machine. Here’s how to get it set up (and fix some of the quirkier problems). Read more…

View post:
How to Set Up Steam In-Home Streaming and Fix Its Quirks

Physician Operates On Server, Costs His Hospital $4.8 Million

Hugh Pickens DOT Com (2995471) writes “Jaikumar Vijayan reports at Computerworld that a physician at Columbia University Medical Center (CU) attempted to “deactivate” a personally owned computer from a hospital network segment that contained sensitive patient health information, creating an inadvertent data leak that is going to cost the hospital $4.8 million to settle with the U.S. Department of Health and Human Services (HHS). The error left patient status, vital signs, laboratory results, medication information, and other sensitive data on about 6, 800 individuals accessible to all via the Web. The breach was discovered after the hospital received a complaint from an individual who discovered personal health information about his deceased partner on the Web. An investigation by the HHS Office for Civil Rights (OCR) found that neither Columbia University nor New York Presbyterian Hospital, who operated the network jointly, had implemented adequate security protections, or undertook a risk analysis or audit to identify the location of sensitive patient health information on the joint network. “For more than three years, we have been cooperating with HHS by voluntarily providing information about the incident in question, ” say the hospitals. “We also have continually strengthened our safeguards to enhance our information systems and processes, and will continue to do so under the terms of the agreement with HHS.” HHS has also extracted settlements from several other healthcare entities over the past two years as it beefs up the effort to crack down on HIPAA violations. In April, it reached a $2 million settlement with with Concentra Health Services and QCA Health Plan. Both organizations reported losing laptops containing unencrypted patient data.” Read more of this story at Slashdot.

Link:
Physician Operates On Server, Costs His Hospital $4.8 Million

US Nuclear Missile Silos Use Safe, Secure 8" Floppy Disks

Hugh Pickens DOT Com (2995471) writes “Sean Gallagher writes that the government built facilities for the Minuteman missiles in the 1960s and 1970s and although the missiles have been upgraded numerous times to make them safer and more reliable, the bases themselves haven’t changed much and there isn’t a lot of incentive to upgrade them. ICBM forces commander Maj. Gen. Jack Weinstein told Leslie Stahl from “60 Minutes” that the bases have extremely tight IT and cyber security, because they’re not Internet-connected and they use such old hardware and software. “A few years ago we did a complete analysis of our entire network, ” says Weinstein. “Cyber engineers found out that the system is extremely safe and extremely secure in the way it’s developed.” While on the base, missileers showed Stahl the 8-inch floppy disks, marked “Top Secret, ” which is used with the computer that handles what was once called the Strategic Air Command Digital Network (SACDIN), a communication system that delivers launch commands to US missile forces. Later, in an interview with Weinstein, Stahl described the disk she was shown as “gigantic, ” and said she had never seen one that big. Weinstein explained, “Those older systems provide us some, I will say, huge safety, when it comes to some cyber issues that we currently have in the world.”” Read more of this story at Slashdot.

Continued here:
US Nuclear Missile Silos Use Safe, Secure 8" Floppy Disks