Over 225,000 Apple Accounts Compromised Via iOS Malware

An anonymous reader writes: Researchers from Palo Alto Networks and WeipTech have unearthed a scheme that resulted in the largest known Apple account theft caused by malware. All in all, some 225, 000 valid Apple accounts have been compromised. The theft is executed via variants of the KeyRaider iOS malware, which targets jailbroken iOS devices. Most of the victims are Chinese — the malware is distributed through third-party Cydia repositories in China — but users in other countries have also been affected (European countries, the U.S., Australia, South Korea, and so on). “The malware hooks system processes through MobileSubstrate, and steals Apple account usernames, passwords and device GUID by intercepting iTunes traffic on the device, ” Palo Alto researcher Claud Xiao explained. “KeyRaider steals Apple push notification service certificates and private keys, steals and shares App Store purchasing information, and disables local and remote unlocking functionalities on iPhones and iPads.” Read more of this story at Slashdot.

See more here:
Over 225,000 Apple Accounts Compromised Via iOS Malware

Russian software security firm Kaspersky threatened to ‘rub out’ rival, email reveals

A hot tech intrigue story from Joe Menn at Reuters on alleged dirty-doings between Kaspersky and its rivals. Read the rest

View the original here:
Russian software security firm Kaspersky threatened to ‘rub out’ rival, email reveals

Bruce Schneier On Cisco ROMMON Firmware Exploit: "This Is Serious"

When Bruce Schneier says of a security problem “This is serious, ” it makes sense to pay attention to it. And that’s how he refers to a recently disclosed Cisco vulnerability alert about “an evolution in attacks against Cisco IOS Classic platforms. Cisco has observed a limited number of cases where attackers, after gaining administrative or physical access to a Cisco IOS device, replaced the Cisco IOS ROMMON (IOS bootstrap) with a malicious ROMMON image.” Schneier links to Ars Technica’s short description of the attack, whicih notes The significance of the advisory isn’t that the initial firmware can be replaced. As indicated, that’s a standard feature not only with Cisco gear but just about any computing device. What’s important is that attackers are somehow managing to obtain the administrative credentials required to make unauthorized changes that take control of the networking gear. Read more of this story at Slashdot.

Follow this link:
Bruce Schneier On Cisco ROMMON Firmware Exploit: "This Is Serious"

The Promise of 5G

An anonymous reader writes: From instant monitoring of leaking pipelines, to real-time worldwide collaboration, the increase in machine-to-machine communications that 5G allows will change the way we live. This TechCrunch article takes a look at the promise that 5G holds and its possibilities. From the article: “By 2030, 5G will transform and create many uses that we cannot even think of yet. We will live in a world that will have 10-100 times more Internet-connected devices than there are humans. Hundreds of billions of machines will be sensing, processing and transmitting data without direct human control and intervention.” Read more of this story at Slashdot.

Read More:
The Promise of 5G

Former Employees Accuse Kaspersky Lab of Faking Malware

An anonymous reader writes: Reuters reports that two former employees of Moscow-based Kaspersky Lab faked malware to damage the reputations of their rivals. The alleged campaign targeted Microsoft, AVG, Avast, and others, tricking them into classifying harmless files as viruses. The ex-employees said co-founder Eugene Kaspersky ordered some of the attacks as retaliation for emulating his software. The company denied the allegations, and Kaspersky himself reiterated them, adding, “Such actions are unethical, dishonest and their legality is at least questionable.” The targeted companies had previously said somebody tried to induce false positives in their software, but they declined to comment on the new allegations. “In one technique, Kaspersky’s engineers would take an important piece of software commonly found in PCs and inject bad code into it so that the file looked like it was infected, the ex-employees said. They would send the doctored file anonymously to VirusTotal.” The alleged attacks went on for more than 10 years, peaking between 2009 and 2013. Read more of this story at Slashdot.

Visit site:
Former Employees Accuse Kaspersky Lab of Faking Malware

OwnStar car hacker can remotely unlock BMWs, Benz and Chrysler

Last month security researcher Samy Kamar announced a vulnerability that allowed him to remotely unlock OnStar-enabled GM cars . While that issue has been fixed, it looks like the same vulnerability found in OnStar is also present in BMW Remote, Mercedes’ mbrace and Chrysler’s Uconnect. Kumar told Engadget via email, “the issue itself is the same exact SSL certificate issue that affected OnStar/GM (which they’ve resolved two weeks ago). It was barely any tweaking of the original system — a few lines of code to add support per vehicle.” Uh oh. I’ve updated OwnStar to also unlock cars from and attack BMW Remote, Mercedes-Benz mbrace, and Chrysler Uconnect. https://t.co/qRsjtLnRlM — Samy Kamkar (@samykamkar) August 13, 2015 The OwnStar device intercepts communication between a vehicle and its companion app and sends that information — including login information — to Kamar who then has control of the vehicle via the app and can unlock it. If you’re feeling smug about your vehicle because Kamar hasn’t called it out, you might want to curb that. The SSL certificate issue that allows a person to log in to a vehicle is pretty widespread. “Unfortunately it’s prevalent among half the other mobile unlocking apps I’ve tested, ” Kamar said. A Chrysler spokesperson told Engadget, “Consumer safety and security is our highest priority.” And that it “supports the responsible disclosure and remediation of cyber security vulnerabilities. Consistent with our focus on consumer safety and security FCA US opposes irresponsible disclosure of explicit ‘how to’ information that can help criminals gain unauthorized access to vehicles and vehicle systems.” Kamar won’t be releasing the updated code for OwnStar for at least 30 days so the automakers have a chance to update their systems. But if you’re an automaker that hasn’t been called out by hackers or security researchers, you might want to check your systems anyways. We have contacted BMW and Mercedes Benz for this article and will update when they reply to our queries. Filed under: Misc , Transportation Comments Source: Samy Kamar Tags: BMW, Chrysler, MercedesBenz, OwnStar, SamyKamar, Security

Continue reading here:
OwnStar car hacker can remotely unlock BMWs, Benz and Chrysler

HTC Is Now Essentially Worthless (And Insecure)

 Internet hyperbole (and financial analysis) have rendered HTC, a once high-flying mobile brand, essentially valueless. In short, the company is trading below cash on hand which means if you bought all HTC stock the company would have to pay, you, the buyer to take it over. This means the company’s factories, stock, and brand are worth nothing, at least on Wall Street. Furthermore, the… Read More

See the original post:
HTC Is Now Essentially Worthless (And Insecure)

Hacker Shows How To Fabricate Death Records

wiredmikey writes: Hackers the Def Con gathering in Las Vegas on Friday got schooled in how to be online “killers.” A rush to go digital with the process of registering deaths has made it simple for maliciously minded folks to have someone who is alive declared dead by the authorities. The process of having someone officially stamped dead by getting a death certificate issued typically involves a doctor filling out one form and a funeral home filling out another, according to Rock’s research. Once forms are submitted online, certificates declaring the listed person legally dead are generated. A fatal flaw in the system is that people can easily pose as real doctors and funeral directors. Read more of this story at Slashdot.

Excerpt from:
Hacker Shows How To Fabricate Death Records

Stagefright Detector Detects if Your Phone Is Vulnerable to Stagefright

Android: Last month, we got news of a particularly nasty Android vulnerability called Stagefright that affects nearly every Android device. If you want to find out if you’re vulnerable, Stagefright Detector can let you know. Read more…

View article:
Stagefright Detector Detects if Your Phone Is Vulnerable to Stagefright

This Zombie Printer Was Hacked To Broadcast Radio Waves

All electronic devices emit radio waves when they’re powered on , even if they don’t connect to the internet or Bluetooth. Governments have been using these accidental waves to spy on each other since the 1960s—but this week, a computer scientist at the Black Hat hacker conference took the idea way further than we’d thought possible. Read more…

Visit site:
This Zombie Printer Was Hacked To Broadcast Radio Waves