Surveillance Cameras Sold On Amazon Found Infected With Malware

An anonymous reader shares a report on ZDNet: Security researcher Mike Olsen has warned that some products sold through the Amazon marketplace are harboring a dark secret — malware. Olsen said in a blog post that while scouring Amazon for a decent set of outdoor surveillance cameras for a friend, he came across a deal for 6 PoE cameras and recording equipment. The seller, Urban Security Group, had generally good reviews and was offering a particular Sony setup on sale. After purchasing the kit, Olsen started setting up the surveillance system, logging into the administrator panel to configure it. Upon investigation, Olsen found that the device was talking to a server with hostname Brenz.pl, which is linked to malware distribution. If the device’s firmware links to this domain, malware can be downloaded and installed, potentially leading to unlawful surveillance and data theft.Perhaps the company which made the device didn’t realize its source code was compromised. While the aforementioned incident should serve as a reminder to people on why they need to be wary of the product they are purchasing, this isolated occurrence doesn’t prove in any way that “plenty” of cameras on Amazon are also infected, as the article and the original blog post are subtly trying to imply. Read more of this story at Slashdot.

Link:
Surveillance Cameras Sold On Amazon Found Infected With Malware

Hacked Swedish Military Servers Used In Attacks On US Banks

Reader wiredmikey writes: Swedish military computers were hacked and used in an attack targeting major U.S. banks in 2013, the armed forces said on Monday. The attack knocked out the web sites of as many as 20 major U.S. banks and financial institutions, sometimes for several days. According to Swedish military spokesman Mikael Abramsson, a server in the Swedish defense system had a vulnerability which was exploited by hackers to carry out the attacks. At the time, the attack, which began in 2012 and continued for months, was one of the biggest ever reported. U.S. officials blamed Iran, suggesting it was in retaliation for political sanctions and several earlier cyberattacks on its own systems. Read more of this story at Slashdot.

Continued here:
Hacked Swedish Military Servers Used In Attacks On US Banks

Sophisticated Bribe Scheme Gets Malware Onto Chinese Antivirus Whitelist

An anonymous reader writes “Malware operators have bribed employees of a gaming company to bundle malware with their mobile apps.” Because the app-maker reportedly had a good-faith agreement with China’s biggest antivirus company, the apps were apparently whitelisted without a thorough check, according to Softpedia. They cite a report from Check Point which describes how attackers would later pretend to be shoppers on a popular Chinese site where pictures of the desired items are sent to sellers. “The seller would open the picture on a PC and become infected, ” writes Check Point, “because the Trojan would not be detected, ” and a subsequent request for a refund would deliver the login credentials for the seller’s payment account. “This example illustrates how important it is to avoid third-party stores and to instead at least rely on stores with more reliable security, ” argues Check Point. “But even still, stores like the App Store and Google Play aren’t immune to threats.” Read more of this story at Slashdot.

Read the original post:
Sophisticated Bribe Scheme Gets Malware Onto Chinese Antivirus Whitelist

Every Voter In The Philippines Exposed In Massive Data Breach

schwit1 writes: “The database of the Philippine Commission on Elections has been breached and the personal information of 55 million voters potentially exposed in what could rank as the worst ever government data breach anywhere, ” according to Infosecurity Magazine. The magazine attributes an initial web site breach to Anonymous, who were reportedly trying to persuade the commission to enable more security features on their automated vote-counting system before upcoming national elections on May 9. A second group named LulzSec Pilipinas then later posted the entire voter database online. Trend Micro originally broke the story, writing that “Every registered voter in the Philippines is now susceptible to fraud and other risks after a massive data breach leaked the entire database of the Philippines’ Commission on Elections.” They report that the breached data even included 15.8 million fingerprint records, as well as 1.3 million records for overseas Filipino voters, including their passports’ numbers and expiration dates, all stored in plain text. Read more of this story at Slashdot.

Read More:
Every Voter In The Philippines Exposed In Massive Data Breach

Facebook Rolls Out Major Live Video Update

An anonymous reader writes: Facebook Live was launched last year, allowing public figures and celebrities to live stream to their timeline. Today, Facebook has released a host of new features to its live broadcasting tool, which lets anyone post live streams of themselves to their timeline. Not only can users add filters to their videos, but they can also draw and add doodles as well. “Live Reactions” lets people react in a similar way to live videos as they do to posts, and it will also allow people to replay the comments they receive during their stream. The site has also added new ways of finding videos, either by location or by inviting friends. It also features a new button for people to ask their friends to watch a live video alongside them, for example. The live streaming features are limited to people in the U.S. right now, with new features rolling out to iOS and Android devices “in the coming weeks, ” the company said. Read more of this story at Slashdot.

More:
Facebook Rolls Out Major Live Video Update

Scientists To Open Mass-Cloning Factory in China This Year To Clone Cows, Pets, Humans

An anonymous reader writes: Scientists in China are planning to open a mass-cloning factory by the end of the year. The ambitious and futuristic facility hopes to be mass-producing one million cows every 12 months by 2020. Not only will it clone cattle, but the factory, which will be located in the northern Chinese port of Tianjin, will also cater to more specific needs by genetically engineering police dogs and thoroughbred race horses. It is part of a $21m plan which is backed by the Boyalife group in collaboration with South Korean company Sooam Biotech Research Foundation. Read more of this story at Slashdot.

Taken from:
Scientists To Open Mass-Cloning Factory in China This Year To Clone Cows, Pets, Humans

WhatsApp Enables End-To-End Encryption For All Forms of Communications By Default

Popular instant messaging app WhatsApp, on Tuesday, announced that it is turning on end-to-end encryption for all its users by default. The company says that every call a user makes, every text message they send, all photos and videos they share will now be more secure. Furthermore, the encryption status of any chat is visible under the chat’s preferences screen. The announcement comes a little over a year after the Facebook-owned company partnered with Open Whisper Systems, a nonprofit software group that develops collaborative open source projects with a mission to “make private communication simple.” The end-to-end encryption feature is available on the latest version of the app. In a blog post, Open Whisper Systems further explains the feature: Once a client recognizes a contact as being fully e2e capable, it will not permit transmitting plaintext to that contact, even if that contact were to downgrade to a version of the software that is not fully e2e capable. This prevents the server or a network attacker from being able to perform a downgrade attack. In a blog post, WhatsApp writes: While WhatsApp is among the few communication platforms to build full end-to-end encryption that is on by default for everything you do, we expect that it will ultimately represent the future of personal communication. WhatsApp has also made available the technical details about how the two companies implemented this feature (PDF). For those of you who haven’t heard of WhatsApp, it’s an instant messaging and voice calling app. The free service, which is available across all popular platforms, is used by more than a billion people worldwide every month. A report on Wired says that a team of only 15 engineers enabled this security feature for over a billion users. Privacy researcher and activist Christopher Soghoian rightfully adds, “Google has no excuse.” Read more of this story at Slashdot.

View the original here:
WhatsApp Enables End-To-End Encryption For All Forms of Communications By Default

TSA Paid $1.4 Million For Randomizer App That Chooses Left Or Right

An anonymous reader writes: For those of you who have traveled through U.S. airports in recent years, you may have noticed the Transport Security Administration (TSA) use a Randomizer app to randomly search travelers in the Pre-Check lane. The app randomly chooses whether travelers go left or right in the Pre-Check lane so they can’t predict which lane each person is assigned to and can’t figure out how to avoid the random checks. Developer Kevin Burke submitted a Freedom of Information Act request asking for details about the app. The documents he received reveals the TSA purchased the Randomizer iPad app for $336, 413.59. That’s $336, 413.59 for an app, which is incredibly simple to make as most programming languages of choice have a randomizing function available to use. What may be even more intriguing is that the contract for the TSA Randomizer app was won by IBM. The total amount paid for the project is actually $1.4 million, but the cost is not broken down in Burke’s documents. It’s possible IBM supplied all the iPads and training in addition to the app itself. Read more of this story at Slashdot.

Read More:
TSA Paid $1.4 Million For Randomizer App That Chooses Left Or Right

$40 Hardware Is Enough To Hack $28,000 Police Drones From 2km Away

mask.of.sanity writes: Thieves can hijack $28, 000 professional drones used widely across the law enforcement, emergency, and private sectors using $40 worth of hardware. The quadcopters can be hijacked from up to two kilometers away thanks to a lack of encryption, which is not present due to latency overheads. Attackers can commandeer radio links to the drones from up to two kilometers away, and block operators from reconnecting to the craft. With the targeted Xbee chip being very common in drones, IBM security guy Nils Rodday says it is likely many more aircraft are open to compromise. Read more of this story at Slashdot.

Follow this link:
$40 Hardware Is Enough To Hack $28,000 Police Drones From 2km Away

Newly Discovered Star Has an Almost Pure Oxygen Atmosphere

William Herkewitz, reports for Popular Mechanics: A newly discovered star is unlike any ever found. With an outermost layer of 99.9 percent pure oxygen, its atmosphere is the most oxygen-rich in the known universe. Heck, it makes Earth’s meager 21 percent look downright suffocating. The strange stellar oddity is a radically new type of white dwarf star, and was discovered by a team of Brazilian astronomers led by Kepler de Souza Oliveira at the Federal University of Rio Grande do Sul in Brazil. The star is unique in the known pool of 32, 000 white dwarf stars, and is the only known star of any kind with an almost pure oxygen atmosphere. The new white dwarf has a mouthful of a name — SDSSJ124043.01+671034.68 — but has been nicknamed ‘Dox’ (pronounced Dee-Awks) by Kepler’s team. The discovery was reported today in a paper in the journal Science. Read more of this story at Slashdot.

Link:
Newly Discovered Star Has an Almost Pure Oxygen Atmosphere