CCTV footage shows crooks using some kind of universal keyless entry fob

CCTV footage from Long Beach, CA shows crooks robbing cars after opening them with some kind of keyless entry fob that appears to defeat the cars’ built-in cryptographic security. The fobs evidently don’t work on all models, and may require operation from the passenger side. It’s not clear what method the fobs use to attack the locks. Any guesses? Adding to the mystery, police say the device works on some cars but not others. Other surveillance videos show thieves trying to open a Ford SUV and a Cadillac, with no luck. But an Acura SUV and sedan pop right open. And they always seem to strike on the passenger side. Investigators don’t know why. “We’ve reached out to the car manufacturers, the manufacturers of the vehicle alarm systems: Nobody seems to know what this technology is,” Hendricks told us. “When you look at the video and you see how easy it is, it’s pretty unnerving.” Police admit they’re ‘stumped’ by mystery car thefts ( via /. )        

See original article:
CCTV footage shows crooks using some kind of universal keyless entry fob

European HbbTV Smart TV Holes Make Sets Hackable

mask.of.sanity writes “Vulnerabilities in Hybrid Broadcast Broadband TV television sets have been found that allow viewers’ home networks to be hacked, the programs they watched spied on, and even for TV sets to be turned into Bitcoin miners. The laboratory attacks took take advantage of the rich web features enabled in smart TVs running on the HbbTV network, a system loaded with online streaming content and apps which is used by more than 20 million viewers in Europe.” Read more of this story at Slashdot.

Link:
European HbbTV Smart TV Holes Make Sets Hackable

U.S. District Judge: Forced Decryption of Hard Drives Violates Fifth Amendment

hansamurai writes with an update to a story we’ve been following for a while. Jeffrey Feldman is at the center of an ongoing case about whether or not crime suspects can be forced to decrypt their own hard drives. (Feldman is accused of having child pornography on his hard drives.) After initially having a federal judge say Feldman was protected by the Fifth Amendment, law enforcement officials were able to break the encyption on one of his many seized storage devices. The decrypted contents contained child pornography, so a different judge said the direct evidence of criminal activity meant Feldman was not protected anymore by the Fifth Amendment. Now, a third judge has granted the defense attorney’s emergency motion to rescind that decision, saying Feldman is once again (still?) protected by the Fifth Amendment. Feldman’s lawyer said, “I will move heaven and earth to make sure that the war on the infinitesimal amount of child pornography that recirculates on the Internet does not eradicate the Fifth Amendment the way the war on drugs has eviscerated the Fourth Amendment. This case is going to go many rounds. Regardless of who wins the next round, the other side will appeal, invariably landing in the lap of the Seventh Circuit Court of Appeals and quite possibly the U.S. Supreme Court. The grim reality facing our country today is one where we currently have a percentage of our population behind bars that surpasses even the heights of the gulags in Stalinist Russia. On too many days criminal lawyers lose all rounds. But for today: The Shellow Group: 1, Government: 0.” Read more of this story at Slashdot.

Read More:
U.S. District Judge: Forced Decryption of Hard Drives Violates Fifth Amendment

Google Security Expert Finds, Publicly Discloses Windows Kernel Bug

hypnosec writes “Security expert Tavis Ormandy has discovered a vulnerability in the Windows kernel which, when exploited, would allow an ordinary user to obtain administrative privileges of the system. Google’s security pro posted the details of the vulnerability back in May through the Full Disclosure mailing list rather than reporting it to Microsoft first. He has now gone ahead and published a working exploit. This is not the first instance where Ormandy has opted for full disclosure without first informing the vendor of the affected software.” Read more of this story at Slashdot.

See more here:
Google Security Expert Finds, Publicly Discloses Windows Kernel Bug

Disposable VPN: Tor Gateways With EC2 Free Tiers

The established regime in Turkey (not to mention many other countries: take your pick) may not like any-to-many communications, but luckily established regimes don’t always get the final word. An anonymous reader writes “Lahana is my little side project to help people access the Internet and Tor via Amazon EC2 free tier-based VPNs. It’s a couple of scripts that set up a new VPN in a couple of minutes that automatically tunnels everything through Tor. It’s easy to share credentials with groups of people and for most people is free to set up and use. I built it with Turkey in mind, but it no doubt has other uses.” Read more of this story at Slashdot.

See the original post:
Disposable VPN: Tor Gateways With EC2 Free Tiers

Oculus VR co-founder, 33, killed by speeding car

Tragedy hits the company that made the Oculus Rift head-mounted virtual-reality display, as co-founder Andrew Reisse finds himself in the wrong place at the wrong time during a police chase. [Read more]        

See original article:
Oculus VR co-founder, 33, killed by speeding car

Casting a Harsh Light On Chinese Solar Panels

New submitter Eugriped3z writes with an article in the New York Times that “indicates that manufacturing defect rates for solar panels manufactured in China vary widely, anywhere from 5-22%. Secrecy in the terms of settlements negotiated by attorneys representing multi-million dollar installations perpetuate the problem by masking the identity of unscrupulous or incompetent actors. Meanwhile, Reuters reports that unit labor costs in Mexico are now lower than in China.” Read more of this story at Slashdot.

Read More:
Casting a Harsh Light On Chinese Solar Panels

Anatomy of a password-crack, part II

Ars Technica’s Nate Anderson Dan Goodin follows up on Nate Anderson’s excellent piece on the nuts and bolts of password cracking with a further attempt to decrypt an encrypted password file leaked from LivingSocial, this time with the aid of experts. The password file they were working on was encrypted with the relatively weak (and now deprecated) SHA1 hashing algorithm, and they were only attacking it with a single GPU on a commodity PC, and were able to extract over 90% of the passwords in the file. The discussion of the guesswork and refinement techniques used in extracting passwords is absolutely fascinating and really is a must-read. However, the whole exercise is still a bit inconclusive — in the end, we know that a badly encrypted password file is vulnerable to an underpowered password-cracking device. But what we need to know is whether a well-encrypted password file will stand up to a good password-cracking system. The specific type of hybrid attack that cracked that password is known as a combinator attack. It combines each word in a dictionary with every other word in the dictionary. Because these attacks are capable of generating a huge number of guesses—the square of the number of words in the dict—crackers often work with smaller word lists or simply terminate a run in progress once things start slowing down. Other times, they combine words from one big dictionary with words from a smaller one. Steube was able to crack “momof3g8kids” because he had “momof3g” in his 111 million dict and “8kids” in a smaller dict… What was remarkable about all three cracking sessions were the types of plains that got revealed. They included passcodes such as “k1araj0hns0n,” “Sh1a-labe0uf,” “Apr!l221973,” “Qbesancon321,” “DG091101%,” “@Yourmom69,” “ilovetofunot,” “windermere2313,” “tmdmmj17,” and “BandGeek2014.” Also included in the list: “all of the lights” (yes, spaces are allowed on many sites), “i hate hackers,” “allineedislove,” “ilovemySister31,” “iloveyousomuch,” “Philippians4:13,” “Philippians4:6-7,” and “qeadzcwrsfxv1331.” “gonefishing1125” was another password Steube saw appear on his computer screen. Seconds after it was cracked, he noted, “You won’t ever find it using brute force.” Anatomy of a hack: How crackers ransack passwords like “qeadzcwrsfxv1331”        

See the article here:
Anatomy of a password-crack, part II