Over 1,400 Vulnerabilities Found In Automated Medical Supply System

An anonymous reader writes: Security researchers have discovered 1, 418 vulnerabilities in CareFusion’s Pyxis SupplyStation system — automated cabinets used to dispense medical supplies — that are still being used in the healthcare and public health sectors in the US and around the world. The vulnerabilities can be exploited remotely by attackers with low skills, and exploits that target these vulnerabilities are publicly available. Things already seem to be getting out hands. Read more of this story at Slashdot.

View article:
Over 1,400 Vulnerabilities Found In Automated Medical Supply System

Severe and Unpatched eBay Vulnerability Allows Attackers To Distribute Malware

An anonymous reader writes: Check Point researchers have discovered a severe vulnerability in eBay’s online sales platform, which allows criminals to distribute malware and do phishing campaigns. This vulnerability allows attackers to bypass eBay’s code validation and control the vulnerable code remotely, to execute malicious Javascript code on targeted eBay users. Read more of this story at Slashdot.

More:
Severe and Unpatched eBay Vulnerability Allows Attackers To Distribute Malware

New Linux Trojan Can Spy on Users by Taking Screenshots and Recording Audio

An anonymous reader writes: Dr.Web, a Russian antivirus maker, has detected a new threat against Linux users: the Linux.Ekoms.1 trojan. It includes functionality that allows it to take screenshots and record audio. While the screenshot activity is working just fine, Dr.Web says the trojan’s audio recording feature has not been turned on, despite being included in the malware’s source code. “All information transmitted between the server and Linux.Ekoms.1 is encrypted. The encryption is initially performed using the public key; and the decryption is executed by implementing the RSA_public_decrypt function to the received data. The Trojan exchanges data with the server using AbNetworkMessage.” Read more of this story at Slashdot.

Taken from:
New Linux Trojan Can Spy on Users by Taking Screenshots and Recording Audio

Critical Zen Cart Vulnerability Could Spell Black Friday Disaster For Shoppers

Mark Wilson writes: It’s around this time of year, with Black Friday looming and Christmas just around the corner, that online sales boom. Today security firm High-Tech Bridge has issued a warning to retailers and shoppers about a critical vulnerability in the popular Zen Cart shopping management system. High-Tech Bridge has provided Zen Cart with full details of the security flaw which could allow remote attackers to infiltrate web servers and gain access to customer data. Servers running Zen Cart are also at risk of malware, meaning that hundreds of thousands of ecommerce sites pose a potential danger. Technical details of the vulnerability are not yet being made public, but having notified Zen Cart of the issue High-Tech Bridge says the date of full public disclosure is 16 December. Read more of this story at Slashdot.

More:
Critical Zen Cart Vulnerability Could Spell Black Friday Disaster For Shoppers

Root password flaw leaves wireless Seagate drives open to attack

Own a wireless hard drive? Was it made by Seagate ? You’ll want to download an update. Researchers at Tangible security have discovered a vulnerability in certain Seagate wireless drives that could give unauthorized users root access to the device. The flaw? A default username and password that activates undocumented Telnet services. It’s a terrifyingly simple vulnerability. Luckily, the fix is almost as simple — all you have to do is patch your drive’s firmware. Security researchers say the vulnerability can be found in Seagate Wireless Mobile storage, Wireless Plus Mobile Storage and LaCie FUEL drives dating back to last October, but warns that other drives may be affected as well. The report also highlights two other possible attacks that exploit the firmware’s file-sharing protocols. Seagate has already tested and confirmed the flaws, and issued firmware update 3.4.1.105 as a fix. Have a Seagate drive? Why are you still readying this? Click here and update, already. Comments Via: CERT Source: Seagate , Tangible Security Tags:

Continue reading here:
Root password flaw leaves wireless Seagate drives open to attack

Researchers Find Major Keychain Vulnerability in iOS and OS X

An anonymous reader notes a report from El Reg on a major cross-app resource vulnerability in iOS and Mac OS X. Researchers say it’s possible to break app sandboxes, bypass App Store security checks, and crack the Apple keychain. The researchers wrote, “specifically, we found that the inter-app interaction services, including the keychain and WebSocket on OS X and URL Scheme on OS X and iOS, can all be exploited by [malware] to steal such confidential information as the passwords for iCloud, email and bank, and the secret token of Evernote. Further, the design of the App sandbox on OS X was found to be vulnerable, exposing an app’s private directory to the sandboxed malware that hijacks its Apple Bundle ID. As a result, sensitive user data, like the notes and user contacts under Evernote and photos under WeChat, have all been disclosed. Fundamentally, these problems are caused by the lack of app-to-app and app-to-OS authentications.” Their full academic paper (PDF) is available online, as are a series of video demos. They withheld publication for six months at Apple’s request, but haven’t heard anything further about a fix. Read more of this story at Slashdot.

View article:
Researchers Find Major Keychain Vulnerability in iOS and OS X

Breakthrough In Face Recognition Software

An anonymous reader writes: Face recognition software underwent a revolution in 2001 with the creation of the Viola-Jones algorithm. Now, the field looks set to dramatically improve once again: computer scientists from Stanford and Yahoo Labs have published a new, simple approach that can find faces turned at an angle and those that are partially blocked by something else. The researchers “capitalize on the advances made in recent years on a type of machine learning known as a deep convolutional neural network. The idea is to train a many-layered neural network using a vast database of annotated examples, in this case pictures of faces from many angles. To that end, Farfade and co created a database of 200, 000 images that included faces at various angles and orientations and a further 20 million images without faces. They then trained their neural net in batches of 128 images over 50, 000 iterations. … What’s more, their algorithm is significantly better at spotting faces when upside down, something other approaches haven’t perfected.” Read more of this story at Slashdot.

Read the original post:
Breakthrough In Face Recognition Software

Nanotech Makes Steel 10x Stronger

An anonymous reader writes: A new metal-making process currently in testing at oil fields uses nano-scale plating to make metals like steel as much as ten times stronger than they would be without it. “[The process] uses an advanced form of electroplating, a process already used to make the chrome plating you might see on the engine and exhaust pipes of a motorcycle. Electroplating involves immersing a metal part in a chemical bath containing various metal ions, and then applying an electrical current to cause those ions to form a metal coating. The company uses a bath that contains more than one kind of metal ion and controls how ions are deposited by varying the electrical current. By changing the current at precise moments, it can create a layered structure, with each layer being several nanometers thick and of different composition. The final coating can be up to a centimeter thick and can greatly change the properties of the original material.” Read more of this story at Slashdot.

Originally posted here:
Nanotech Makes Steel 10x Stronger

US Gas Pump Hacked With ‘Anonymous’ Tagline

An anonymous reader writes Researchers at Trend Micro have uncovered a gas pump in the United States whose ID has been changed from ‘DIESEL’ to ‘WE_ARE_LEGION’ — the call-sign of the Anonymous hacking group. Following up recent revelations regarding the vulnerability of gas pump systems to online attackers, the researchers found 1, 515 completely unprotected gas pump monitoring devices via the Shodan device-based search engine. The report notes that the exposed devices are capable of being protected via six-digit pins, but this security measure is not being used. The report concludes: “Our investigation shows that the tampering of an Internet-facing device resulted in a name change. But sooner or later, real world implications will occur, causing possible outages or even worse.” Read more of this story at Slashdot.

View article:
US Gas Pump Hacked With ‘Anonymous’ Tagline

US Army Releases Code For Internal Forensics Framework

An anonymous reader writes: The U.S. Army Research Laboratory in Maryland has released on GitHub a version of a Python-based internal forensics tool which the army itself has been using for five years. Dshell is a Linux-based framework designed to help investigators identify and examine compromised IT environments. One of the intentions of the open-sourcing of the project is to involve community developers in the creation of new modules for the framework. The official release indicates that the version of Dshell released to Github is not necessarily the same one that the Army uses, or at least that the module package might be pared down from the Army-issued software. Read more of this story at Slashdot.

Read More:
US Army Releases Code For Internal Forensics Framework