Ubuntuforums.org Hacked

satuon writes “The popular Ubuntu Forums site is now displaying a message saying there was a security breach. What is currently known: Unfortunately the attackers have gotten every user’s local username, password, and email address from the Ubuntu Forums database. The passwords are not stored in plain text. However, if you were using the same password as your Ubuntu Forums one on another service (such as email), you are strongly encouraged to change the password on the other service ASAP. Ubuntu One, Launchpad and other Ubuntu/Canonical services are NOT affected by the breach.” Read more of this story at Slashdot.

Read More:
Ubuntuforums.org Hacked

NHS Fined After Computer Holding Patient Records Found On eBay

judgecorp writes “NHS Surrey, part of Britain’s health service, has been fined £200, 000 when a computer holding more than 3000 patient records was found for sale on eBay. The system was retired, and given to a contractor who promised to dispose of it securely for free, in exchange for any salvage value… but clearly just put the whole system up for sale.” Read more of this story at Slashdot.

Continue reading here:
NHS Fined After Computer Holding Patient Records Found On eBay

Anatomy of a password-crack, part II

Ars Technica’s Nate Anderson Dan Goodin follows up on Nate Anderson’s excellent piece on the nuts and bolts of password cracking with a further attempt to decrypt an encrypted password file leaked from LivingSocial, this time with the aid of experts. The password file they were working on was encrypted with the relatively weak (and now deprecated) SHA1 hashing algorithm, and they were only attacking it with a single GPU on a commodity PC, and were able to extract over 90% of the passwords in the file. The discussion of the guesswork and refinement techniques used in extracting passwords is absolutely fascinating and really is a must-read. However, the whole exercise is still a bit inconclusive — in the end, we know that a badly encrypted password file is vulnerable to an underpowered password-cracking device. But what we need to know is whether a well-encrypted password file will stand up to a good password-cracking system. The specific type of hybrid attack that cracked that password is known as a combinator attack. It combines each word in a dictionary with every other word in the dictionary. Because these attacks are capable of generating a huge number of guesses—the square of the number of words in the dict—crackers often work with smaller word lists or simply terminate a run in progress once things start slowing down. Other times, they combine words from one big dictionary with words from a smaller one. Steube was able to crack “momof3g8kids” because he had “momof3g” in his 111 million dict and “8kids” in a smaller dict… What was remarkable about all three cracking sessions were the types of plains that got revealed. They included passcodes such as “k1araj0hns0n,” “Sh1a-labe0uf,” “Apr!l221973,” “Qbesancon321,” “DG091101%,” “@Yourmom69,” “ilovetofunot,” “windermere2313,” “tmdmmj17,” and “BandGeek2014.” Also included in the list: “all of the lights” (yes, spaces are allowed on many sites), “i hate hackers,” “allineedislove,” “ilovemySister31,” “iloveyousomuch,” “Philippians4:13,” “Philippians4:6-7,” and “qeadzcwrsfxv1331.” “gonefishing1125” was another password Steube saw appear on his computer screen. Seconds after it was cracked, he noted, “You won’t ever find it using brute force.” Anatomy of a hack: How crackers ransack passwords like “qeadzcwrsfxv1331”        

See the article here:
Anatomy of a password-crack, part II

Name.com Resets All Passwords Following Security Breach

An anonymous reader writes “Internet registrar Name.com on Wednesday revealed it was hit by a security breach. The company sent an email to its customers informing them that their usernames, email addresses, passwords, and credit card account information “may have been accessed by unauthorized individuals.”” Read more of this story at Slashdot.

See more here:
Name.com Resets All Passwords Following Security Breach

Chinese Hackers Infiltrate US Army Database, Compromise Safety of Dams

coolnumbr12 writes “Chinese hackers have infiltrated a sensitive U.S. Army database that contains information about the vulnerabilities of thousands of dams located throughout the United States. The U.S. Army Corps of Engineers’ National Inventory of Dams (NID) has raised concerns that information gathered in the hack could help China carry out a cyber-attack on the national electrical power grid.” Read more of this story at Slashdot.

More:
Chinese Hackers Infiltrate US Army Database, Compromise Safety of Dams

Why You’ll End Up Wearing a Smart Watch

People don’t wear watches anymore. You’ll look ridiculous. Why wouldn’t you just use your smartphone instead? These are just some of the negative sentiments skeptics are spewing about smart watches, which are still very much in their nascent stage. Guess what? They’re wrong. More »

Excerpt from:
Why You’ll End Up Wearing a Smart Watch

Dating site Zoosk resets some user accounts following password dump (Updated)

A screenshot from Jeremi Gosney showing passwords cracked by the ocl-Hashcat-plus program. Jeremi Gosney Zoosk.com, an online dating service with about 15 million unique visitors each month, is requiring some users to reset their passwords. The move comes after someone published a list cryptographically protected passcodes that may have been used by subscribers to the website. In the past, the San Francisco-based company has said it has more than 50 million users . With this dump, a small but statistically significant percentage of the 29-million-strong password list contained the word “zoosk,” an indication that at least some of the credentials may have originated with the dating site. Jeremi Gosney, a password expert at Stricture Consulting Group , said he cracked more than 90 percent of the passwords and found almost 3,000 had links to Zoosk. The cracked passcodes included phrases such as “logmein2zoosk,” “zoosk password,” “myzooskpass,” “@zoosk,” “zoosk4me,” “ilovezoosk,” “flirtzoosk,” “zooskmail.” Other passwords contained strings such as “flirt,” “lookingforlove,” “lookingforguys,” and “lookingforsex,” another indication that they were used to access accounts at one or more dating websites. Many users choose passwords containing names, phrases, or topics related to the specific website or generic type of service they’re used to access. In December, Ars profiled a 25-GPU cluster system Gosney built that’s capable of trying every possible Windows passcode in the typical enterprise in less than six hours. . Read 6 remaining paragraphs | Comments

Originally posted here:
Dating site Zoosk resets some user accounts following password dump (Updated)

A Graphene Antenna Could Give Us Wireless Terabit Uploads in One Second

Wireless uploads of big files take for-ev-er. But researchers at Georgia Tech University have plans for an antenna made of crazy thin graphene that would let you transfer a whole terabit of data in just one second. More »

See original article:
A Graphene Antenna Could Give Us Wireless Terabit Uploads in One Second

Australian Tax Office Stores Passwords In Clear Text

mask.of.sanity writes “The passwords of thousands of Australian businesses are being stored in clear readable text by the country’s tax office. Storing passwords in readable text is a bad idea for a lot of reasons: they could be read by staff with ill intent, or, in the event of a data breach, could be tested against other web service accounts to further compromise users. In the case of the tax office, the clear text passwords accessed a subsection of the site. But many users would have reused them to access the main tax submission services. If attackers gained access to those areas, they would have access to the personal, financial and taxpayer information of almost every working Australian. Admins should use a strong hash like bcrypt to minimize or prevent password exposure. Users should never reuse passwords for important accounts.” Read more of this story at Slashdot.

View article:
Australian Tax Office Stores Passwords In Clear Text

Oxford Temporarily Blocks Google Docs To Fight Phishing

netbuzz writes “Fed up with phishers using Google Forms to commandeer campus email accounts as spam engines, Oxford University recently blocked access to Google Docs for two-and-a-half hours in what it called an ‘extreme action’ designed to get the attention of both its users and Google. ‘Seeing multiple such incidents the other afternoon tipped things over the edge,’ Oxford explains in a blog post. ‘We considered these to be exceptional circumstances and felt that the impact on legitimate University business by temporarily suspending access to Google Docs was outweighed by the risks to University business by not taking such action.’ The move generated widespread complaints from those affected, as well as criticism from outside network professionals.” Read more of this story at Slashdot.

Follow this link:
Oxford Temporarily Blocks Google Docs To Fight Phishing