Skype’s IP-leaking security bug creates denial-of-service cottage industry

It’s been more than a year since the WSJ reported that Skype leaks its users’ IP addresses and locations. Microsoft has done nothing to fix this since, and as Brian Krebs reports, the past year has seen the rise of several tools that let you figure out someone’s IP address by searching for him on Skype, then automate launching denial-of-service attacks on that person’s home. In the above screen shot, we can see one such service being used to display the IP address most recently used by the Skype account “mailen_support” (this particular account belongs to the tech support contact for Mailien, a Russian pharmacy spam affiliate program by the same name). Typically, these Skype resolvers are offered in tandem with “booter” or “stresser” services, online attack tools-for-hire than can be rented to launch denial-of-service attacks (one of these services was used in an attack on this Web site, and on that of Ars Technica last week). The idea being that if you want to knock someone offline but you don’t know their Internet address, you can simply search on Skype to see if they have an account. The resolvers work regardless of any privacy settings the target user may have selected within the Skype program’s configuration panel. Beyond exposing one’s Internet connection to annoying and disruptive attacks, this vulnerability could allow stalkers or corporate rivals to track the movement of individuals and executives as they travel between cities and states. Privacy 101: Skype Leaks Your Location

Continue reading here:
Skype’s IP-leaking security bug creates denial-of-service cottage industry

A 50 Gbps Connection With Multipath TCP

First time accepted submitter Olivier Bonaventure writes “The TCP protocol is closely coupled with the underlying IP protocol. Once a TCP connection has been established through one IP address, the other packets of the connection must be sent from this address. This makes mobility and load balancing difficult. Multipath TCP is a new extension that solves these old problems by decoupling TCP from the underlying IP. A Multipath TCP connection can send packets over several interfaces/addresses simultaneously while remaining backward compatible with existing TCP applications. Multipath TCP has several use cases, including smartphones that can use both WiFi and 3G, or servers that can pool multiple high-speed interfaces. Christoph Paasch, Gregory Detal and their colleagues who develop the implementation of Multipath TCP in the Linux kernel have achieved 50 Gbps for a single TCP connection [note: link has source code and technical details] by pooling together six 10 Gbps interfaces.” Read more of this story at Slashdot.

Read the original:
A 50 Gbps Connection With Multipath TCP

Tracking the Web Trackers

itwbennett writes “Do you know what data the 1300+ tracking companies have on you? Privacy blogger Dan Tynan didn’t until he had had enough of being stalked by grandpa-friendly Jitterbug phone ads. Tracking company BlueKai and its partners had compiled 471 separate pieces of data on him. Some surprisingly accurate, some not (hence the Jitterbug ad). But what’s worse is that opting out of tracking is surprisingly hard. On the Network Advertising Initiative Opt Out Page you can ask the 98 member companies listed there to stop tracking you and on Evidon’s Global Opt Out page you can give some 200 more the boot — but that’s only about 300 companies out of 1300. And even if they all comply with your opt-out request, it doesn’t mean that they’ll stop collecting data on you, only that they’ll stop serving you targeted ads.” Read more of this story at Slashdot.

More here:
Tracking the Web Trackers

MasterCard Forcing PayPal To Pay Higher Fees

iComp sends this quote from El Reg: “PayPal, Google Wallet and other online payment systems face higher transaction fees from MasterCard in retaliation for their refusal to share data on what people are spending. Visa is likely to follow suit. The amount that PayPal has to pay MasterCard for every transaction will go up as the latter introduces new charges for intermediated payment processors. This change is on the grounds that such processors don’t share transaction details, which the card giants would love to get hold of as it can be used to research buying patterns and the like. Companies such as PayPal allow payments between users, so the party (perhaps a merchant) receiving the money doesn’t need to be registered with the credit-card company. PayPal collects the dosh from the payer’s card, and deducts a processing fee before passing the cash on to the receiving party. MasterCard would prefer the receiver to be registered directly so will apply the new fee from June to any payment that is staged in this way.” Read more of this story at Slashdot.

Originally posted here:
MasterCard Forcing PayPal To Pay Higher Fees

Twitter Sued For $50M For Refusing To Identify Anti-Semitic Users

redletterdave writes “After a French civil court ruled on Jan. 24 that Twitter must identify anyone who broke France’s hate speech laws, Twitter has since refused to identify the users behind a handful of hateful and anti-Semitic messages, resulting in a $50 million lawsuit. Twitter argues it only needs to comply with U.S. laws and is thus protected by the full scope of the First Amendment and its free speech privileges, but France believes its Internet users should be subject to the country’s tighter laws against racist and hateful forms of expression.” Read more of this story at Slashdot.

More:
Twitter Sued For $50M For Refusing To Identify Anti-Semitic Users

One day after iOS 6.1.3, a new iPhone lock screen bug emerges

Just a day after Apple released iOS 6.1.3 , a new lock screen bug has been discovered that could give an attacker access to private information. The vulnerability is different from the passcode bug(s) addressed by Tuesday’s iOS update, but the end result is similar: access to iPhone’s contact list and photos. The new lock screen bug was first documented by YouTube user videosdebarraquito , who posted a video demoing the procedure. The basic gist, seen in the video below, is to eject the iPhone’s SIM card while using the built-in voice controls to make a phone call. Bypassing the iPhone passcode lock on iOS 6.1.3. There are a couple important things to keep in mind, though. For one, it seems  like this bug applies to most modern iPhones, though apparently the procedure isn’t as easy as it looks. The YouTube video above shows the hack being executed on an iPhone 4, and iphoneincanada was able to replicate it on an iPhone 4. TheNextWeb was able to replicate it on an iPhone 4S but not an iPhone 5. But the iPhone 5 didn’t get away scot free, as German language site iPhoneblog.de appears to have been able to replicate the bug on that version of the phone. We have not yet seen a confirmed case of the bug existing on the iPhone 3GS, though it’s probably safe to assume that it does. Read 1 remaining paragraphs | Comments

Excerpt from:
One day after iOS 6.1.3, a new iPhone lock screen bug emerges

Google Implements DNSSEC Validation For Public DNS

wiredmikey writes “Google on Tuesday announced that it now fully supports DNSSEC (Domain Name System Security Extensions) validation on its Google Public DNS resolvers. Previously, the search giant accepted and forwarded DNSSEC-formatted messages but didn’t actually perform validation. ‘With this new security feature, we can better protect people from DNS-based attacks and make DNS more secure overall by identifying and rejecting invalid responses from DNSSEC-protected domains,’ Yunhong Gu, Team Lead, Google Public DNS, wrote in a blog post. According to Gu, about 1/3 of top-level domains have been signed, but most second-level domains remain unsigned. According to NIST, there has been no progress in enabling DNSSEC on 98 percent of all 1,070 industry domains tested as of March 18, 2013. ‘Overall, DNSSEC is still at an early stage and we hope that our support will help expedite its deployment,’ Gu said.” Read more of this story at Slashdot.

Read More:
Google Implements DNSSEC Validation For Public DNS

First Ever Cellular-Level Video of a Whole Brain Working

This video is the first time scientists have ever been able to image the whole brain of a vertebrate creature in such a way that you can see individual cells and simultaneously how they’re firing and behaving in real time. This is how the brain really, really works—and it’s amazing. More »

Continue Reading:
First Ever Cellular-Level Video of a Whole Brain Working