<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<?xml-stylesheet href="/css/rss20.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:s="http://www.zdnet.com/search" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd">
	<channel>
		<link>http://www.zdnet.com/</link>
		<title>ZDNet | Zero Day Blog RSS</title>
		<description>Latest blogs in Zero Day</description>
		<language>en</language>
		<copyright>ZDNet</copyright>
		<managingEditor>http://www.zdnet.com/meet-the-team/</managingEditor>
		<webMaster>http://www.zdnet.com/meet-the-team/</webMaster>
		<pubDate>Wed, 07 Aug 2013 10:56:42 -0700</pubDate>
		<lastBuildDate>Wed, 07 Aug 2013 10:56:42 -0700</lastBuildDate>
		<docs>http://blogs.law.harvard.edu/tech/rss</docs>
		<ttl>2</ttl>
		<image>
			<url>http://i.zdnet.com/images/spry/zdnet_300x300.jpg</url>
			<link>http://www.zdnet.com/</link>
			<title>ZDNet | Zero Day Blog RSS</title>
			<width>143</width>
			<height>39</height>
		</image>
		<s:counts>
			<start>0</start>
			<return>20</return>
			<found>3096</found>
		</s:counts>
		<item>
			<guid isPermaLink="false">7000019105</guid>
			<link><![CDATA[http://www.zdnet.com/doj-probing-claims-u-s-drug-agency-collaborated-with-nsa-on-intelligence-7000019105/]]></link>
			<title><![CDATA[DOJ probing claims U.S. drug agency 'collaborated' with NSA on intelligence]]></title>
			<description><![CDATA[The U.S. Justice Dept. said it was "looking into the issues" raised by an Reuters story, that one of its law enforcement agencies collaborated with the NSA to crack down on alleged drug criminals.]]></description>
			<pubDate><![CDATA[Wed, 07 Aug 2013 19:19:05 +0000]]></pubDate>
			<media:credit role="author"><![CDATA[Zack Whittaker]]></media:credit>
			<s:doctype><![CDATA[Text]]></s:doctype>
			<category domain="http://www.zdnet.com/topic-government-us/">Government US</category>
			<media:text type="html"><![CDATA[<figure><img title="DELIVERANCE_01" alt="DELIVERANCE_01" src="http://cdn-static.zdnet.com/i/r/story/70/00/019105/deliverance01-620x370.jpg?hash=L2IvMzD5MQ&upscale=1" height="370" width="620"><figcaption>If the Drug Enforcement Administration is found to have broken the rules by acquiring intelligence by the National Security Agency, the Justice Dept. may have to clean out its own house. (Image: Justice Dept.)</figcaption></figure>
<p>A day after Reuters reported that the U.S. Drug Enforcement Administration (DEA) was using tip-offs and intelligence collected by the National Security Agency (NSA) to crack down on suspected drug-related criminals, the U.S. government said it will investigate.</p>
<p>In <a href="http://www.theguardian.com/world/2013/aug/06/justice-department-surveillance-dea">response to The Guardian</a> on Tuesday, the&nbsp;Justice Department said it was "looking into the issues raised by this story," but declined to comment further.</p>
<!-- Parsed pinbox:"10125268" -->
<div class="relatedContent alignRight"><h3>Read this</h3>
<div><a href="http://www.zdnet.com/us-spy-system-xkeyscore-allows-nsa-to-wiretap-anyone-7000018825/" class="thumb"><img src="http://cdn-static.zdnet.com/i/r/library/us-thumbs/thumb-eyespy-220x165.jpg?hash=MQAuZmOuZT&upscale=1" alt="U.S. spy system XKeyscore allows NSA to 'wiretap anyone'" width="220" height="165" /></a></div><p><a href="http://www.zdnet.com/us-spy-system-xkeyscore-allows-nsa-to-wiretap-anyone-7000018825/">U.S. spy system XKeyscore allows NSA to 'wiretap anyone'</a></p>
<ul class="alignRight"><li><a href="http://www.zdnet.com/us-spy-system-xkeyscore-allows-nsa-to-wiretap-anyone-7000018825/">Read more</a></li></ul></div>
<p>This ties in <a href="http://www.usatoday.com/story/news/nation/2013/08/05/justice-dea-special-operations-shield/2620439/">with comments made</a> by White House Press Secretary Jay Carney in the afternoon briefing.</p>
<p>Though the data used to crack down on suspected criminals, <a href="http://www.reuters.com/article/2013/08/05/us-dea-sod-idUSBRE97409R20130805">reported the Reuters news agency on Monday</a>, DEA agents are trained to "recreate" the origin of the intelligence. The report said this is to mask the true source from the courts, which as a matter of public record could have blown the lid on the whole intelligence collaboration operation.&nbsp;</p>
<p>Lawyers speaking to Reuters for the piece said these actions could violate a defendant's constitutional rights to a fair trial.</p>
<p>The tips the agency received originally came from the NSA, according to the reports, specifically from its Special Operations Division (SOD). The division was first named in June when revelations about the NSA's surveillance program <a href="http://www.zdnet.com/prism-heres-how-the-nsa-wiretapped-the-internet-7000016565/">first came to light</a>. The SOD's remit is understood to collect intelligence on non-U.S. persons relating to national security, not drug crimes.</p>
<p>The Electronic Frontier Foundation&nbsp;<a href="https://www.eff.org/deeplinks/2013/08/dea-and-nsa-team-intelligence-laundering">said on Wednesday</a>&nbsp;that this so-called practice of "parallel construction" as "intelligence laundering," and dubbed tactics as deceptive and dishonest.</p>
<p>ZDNet put in calls to the DEA (at the Justice Dept.) but did not hear back outside U.S. business hours at the time of writing.</p>]]></media:text>
		</item>
		<item>
			<guid isPermaLink="false">7000019099</guid>
			<link><![CDATA[http://www.zdnet.com/ios-7-records-displays-user-location-data-reactions-from-the-trenches-7000019099/]]></link>
			<title><![CDATA[iOS 7 records, displays user location data: Reactions from the trenches]]></title>
			<description><![CDATA[We all presume our phones log where we go and when. But when you see it in front of you on your iPhone, that's when it gets a little creepy. ]]></description>
			<pubDate><![CDATA[Wed, 07 Aug 2013 18:41:04 +0000]]></pubDate>
			<media:credit role="author"><![CDATA[Zack Whittaker]]></media:credit>
			<s:doctype><![CDATA[Text]]></s:doctype>
			<category domain="http://www.zdnet.com/topic-ios/">iOS</category>
			<category domain="http://www.zdnet.com/topic-security/">Security</category>
			<media:text type="html"><![CDATA[<p>Here's one for you.</p>
<p>Apple's latest mobile operating system, iOS 7, running on an iPhone 4S, logs and records where you've been, when you were there, and makes it available to view on your device, albeit buried deep in the settings.&nbsp;</p>
<figure><img title="Screen Shot 2013-08-07 at 11.59.02" alt="Screen Shot 2013-08-07 at 11.59.02" src="http://cdn-static.zdnet.com/i/r/story/70/00/019099/screen-shot-2013-08-07-at-11-59-02-620x456.png?hash=ZQL0LGOxBG&upscale=1" height="456" width="620"><figcaption>(Image: ZDNet)</figcaption></figure>
<p>First discovered <a href="https://news.ycombinator.com/item?id=6171514">on Y Combinator's Hacker News</a>, iOS 7 developers and Apple users alike discussed this "feature" with healthy discussion but mixed reactions.</p>
<p>Some are naturally concerned in the wake of the U.S. National Security Agency's PRISM program and other state surveillance systems, while some privacy-minded folk agree that, despite the accusations of "copying" from rival phone software makers — such as Google Now,&nbsp;a level of transparency is the best policy.&nbsp;</p>
<p>User <a href="https://news.ycombinator.com/item?id=6171698">julianpye</a>:</p>
<blockquote>
<p>If you want to build transparent context-aware services, your system will need to create this information.</p>
</blockquote>
<p>In agreement, <a href="https://news.ycombinator.com/item?id=6171807">jbrooksuk</a>:</p>
<blockquote>
<p>What's wrong with this? Apple are openly providing this information for you to view —&nbsp;rather than others who don't even warn the user. Plus, it's improving their services which you more than likely need.&nbsp;Why complain? You can opt out.</p>
</blockquote>
<p>New user <a href="https://news.ycombinator.com/item?id=6171754">northwest</a> chimed in:</p>
<blockquote>
<p>Society has accepted to be tracked all the time/everywhere with the introduction of mobile phones.&nbsp;If we don't like this, we should start to talk more proactively to people about the dangers our technology brings.</p>
</blockquote>
<p>User&nbsp;<a href="https://news.ycombinator.com/item?id=6171690">donquichotte</a> started a line of thinking about the nature of opt-in versus opt-out:</p>
<blockquote>
<p>But how much of the collected data do they show you? [In my opinion] services like this should be opt-in, rather than opt-out.</p>
</blockquote>
<p>Germany, where much of the privacy scandal has been focused due to its strong data protection laws. A few lines of inquiry quickly becomes political. "Germans love their privacy-by-default and opt-in," said <a href="https://news.ycombinator.com/item?id=6171818">one user</a>.</p>
<p>User <a href="https://news.ycombinator.com/item?id=6171957">eduard</a> added:</p>
<blockquote>
<p>Given current affairs, it's bad that this system doesn't inform the user about a new feature being activated on default. It is hidden in the background.</p>
</blockquote>
<p>The reason to bring up "what the community says" is that it's interesting to see how developers in particular, who understand the underlying software roots better than most others, feel in the wake of&nbsp;the NSA surveillance scandal breaking.</p>
<p>There are some takeaway lessons here.</p>
<!-- Parsed pinbox:"10125267" -->
<div class="relatedContent alignRight"><h3>Read this</h3>
<div><a href="http://www.zdnet.com/blog/btl/apples-location-tracking-response-five-lingering-questions/47922" class="thumb"><img src="http://cdn-static.zdnet.com/i/r/library/us-authors/larry-dignan-640x465-220x165.jpg?hash=AwLkZGV3BT&upscale=1" alt="Apple's location tracking response: Five lingering questions" width="220" height="165" /></a></div><p><a href="http://www.zdnet.com/blog/btl/apples-location-tracking-response-five-lingering-questions/47922">Apple's location tracking response: Five lingering questions</a></p>
<ul class="alignRight"><li><a href="http://www.zdnet.com/blog/btl/apples-location-tracking-response-five-lingering-questions/47922">Read more</a></li></ul></div>
<p>For Apple, it's worth being up front about it. As the comments noted, Google also tracks its users in a similar way, both on mobile devices and <a href="https://maps.google.com/locationhistory/b/0/">on the desktop</a>. We as users opt into it, often without knowing. Terms of service are long, boring, and only very few actually read them. But when the word gets out, it's better to be proactively transparent and open rather than allow the freak-out machine to do its thing until fears are calmed.</p>
<p>Some are reminded by "Locationgate," which was not so long ago. Apple, along with Google and Microsoft, were <a href="http://news.cnet.com/8301-27080_3-57378450-245/lawmakers-ask-apple-to-explain-iphone-app-privacy-policies/">implicated in a privacy row</a>, in which mobile devices and smartphones would quietly collect location data and stored in an unencrypted file on the device.&nbsp;</p>
<p>The scandal <a href="http://news.cnet.com/8301-27080_3-57378450-245/lawmakers-ask-apple-to-explain-iphone-app-privacy-policies/">led to lawmakers</a> getting involved,&nbsp;<a href="http://news.cnet.com/8301-27076_3-57378551-248/apple-apps-using-address-data-are-in-violation-fix-to-come/">patches issued</a>, and a general shake-up of the third-party app industry&nbsp;in a bid to prevent this tracking from happening.</p>
<p>On the flip side, we assume many things in this world, and those assumptions come from somewhere. As the user, it's worth keeping in mind that from a personal security perspective, we can't avoid cell companies and governments accessing our tracking data. But if our phones are stolen, the last thing we might want is a map of "home" and "work" being readily available to the thief.&nbsp;</p>
<p>(<em><a href="https://news.ycombinator.com/item?id=6171514">via Hacker News</a></em>)</p>]]></media:text>
		</item>
		<item>
			<guid isPermaLink="false">7000019097</guid>
			<link><![CDATA[http://www.zdnet.com/single-android-flaw-can-be-used-to-target-entire-enterprise-7000019097/]]></link>
			<title><![CDATA[Single Android flaw can be used to target entire enterprise]]></title>
			<description><![CDATA[Google's Android "weblogin" feature may be simple and quick to use, but researchers say it can be used to take down an entire system of applications. ]]></description>
			<pubDate><![CDATA[Wed, 07 Aug 2013 17:52:04 +0000]]></pubDate>
			<media:credit role="author"><![CDATA[Charlie Osborne]]></media:credit>
			<s:doctype><![CDATA[Text]]></s:doctype>
			<category domain="http://www.zdnet.com/topic-android/">Android</category>
			<category domain="http://www.zdnet.com/topic-security/">Security</category>
			<media:text type="html"><![CDATA[<figure class="alignRight"><img title="1credit cnet" alt="1credit cnet" src="http://cdn-static.zdnet.com/i/r/story/70/00/019097/1credit-cnet-v1-200x140.jpg?hash=ZQZ4ATIxZG&upscale=1" height="140" width="200"><figcaption>Credit: CNET</figcaption></figure>
<p>A security researcher exploring the weak links in Google's Android ecosystem says that a single feature can be used to take down a plethora of business applications -- and ignore two-step verification entirely.</p>
<p>Speaking at the Def Con 21 hacking conference, senior security researcher at Tripwire Craig Young said he is able to "fully compromise Google Apps" using only one feature. The weak link? The "weblogin" token that allows Android users to sign once for all Google-based services, as <a href="http://www.darkreading.com/attacks-breaches/one-hacked-android-user-can-lead-to-an-e/240159556">reported by Dark Reading</a>.</p>
<p>Does Android trade security for convenience? Young believes so. Rather than using passwords, the feature basically uses cookies -- but if an attacker gains access to the domain control panel, then havoc can ensue. Once breached, a hacker could reset passwords, download files from Drive, disable two-step verification, modify user roles and create mailing lists -- potentially full of spam or malicious content.</p>
<p>Access can be granted physically -- if a device is already logged in using tokens -- or through root exploits, chip-off forensics or most commonly, malware. If a systems administrator with access to the domain control panel has a compromised mobile device and is running malicious applications unwittingly, then it may only be a matter of time before the log-in system is used to steal data, download files or reset account passwords.</p>
<p>The researcher's findings should make businesses sit up and take note, especially considering <a href="http://www.zdnet.com/android-app-malware-rates-jump-40-percent-7000019093/">recent Trend Micro data</a> which says the rate of malicious applications being uploaded into the Google Play store has jumped by 40 percent in the past several months. Dodgy applications found in the Android ecosystem rose to 718,000 at the end of the second quarter, in comparison to 509,000 in the first quarter of this year.</p>
<p>In an interview with the publication, Young said:</p>
<blockquote>
<p>"The reason I [went] with this token research is I bought an Android tablet about a year ago and realized Chrome auto-signed me into Google's websites, which made me very unhappy. At that time, I hadn't realized Google Apps control panel was exposed this way, too: it was a real revelation. I had used Google Apps domain for a while now, and had always logged in using that admin account."</p>
</blockquote>
<p>Young says the best ways to protect yourself and your business against such threats is to remain vigilant when receiving token requests, run antivirus software to seek out root exploits, and only purchase or download applications from trusted sources.</p>
<p>"Companies using Google for the cloud need to make sure that their IT admins who need to have admin access to the Google Apps control panel do so but not necessarily from their phones. If they do, then they need to enter a password," Young says.</p>
<p>For more information, view Young's <a href="http://secur3.us/DC21Slides.pdf">presentation slides</a> (.pdf).</p>
<p><strong>Via: <a href="http://www.darkreading.com/attacks-breaches/one-hacked-android-user-can-lead-to-an-e/240159556">Dark Reading</a></strong></p>]]></media:text>
		</item>
		<item>
			<guid isPermaLink="false">7000019093</guid>
			<link><![CDATA[http://www.zdnet.com/android-app-malware-rates-jump-40-percent-7000019093/]]></link>
			<title><![CDATA[Android app malware rates jump 40 percent]]></title>
			<description><![CDATA[A new report released by Trend Micro says that mobile malware rates are skyrocketing.]]></description>
			<pubDate><![CDATA[Wed, 07 Aug 2013 17:00:06 +0000]]></pubDate>
			<media:credit role="author"><![CDATA[Charlie Osborne]]></media:credit>
			<s:doctype><![CDATA[Text]]></s:doctype>
			<category domain="http://www.zdnet.com/topic-android/">Android</category>
			<category domain="http://www.zdnet.com/topic-malware/">Malware</category>
			<category domain="http://www.zdnet.com/topic-mobility/">Mobility</category>
			<media:text type="html"><![CDATA[<figure class="alignRight"><img title="credit cnet" alt="credit cnet" src="http://cdn-static.zdnet.com/i/r/story/70/00/019093/credit-cnet-v1-200x113.jpg?hash=ZJEuZGxlMQ&upscale=1" height="113" width="200"></figure>
<p>Mobile malware in the Android ecosystem has grown by over 40 percent in the past few months, researchers say.</p>
<p>A new report <a href="http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/reports/rpt-2q-2013-trendlabs-security-roundup.pdf">issued by Trend Micro</a> (.pdf) says that high-risk, malicious app rates found in the Google Play store rose to 718,000 at the end of the second quarter in comparison to 509,000 in the first quarter of this year.</p>
<p>The number of malicious Android apps in circulation surged by over 350,000 in this time period -- which originally took three years to reach when Google's Android operating system became established.</p>
<figure><img title="android malware ecosystem rise mobile threat security risk applications" alt="android malware ecosystem rise mobile threat security risk applications" src="http://cdn-static.zdnet.com/i/r/story/70/00/019093/screen-shot-2013-08-07-at-10-20-54-620x294.png?hash=MJLkZwqvBG&upscale=1" height="294" width="620"></figure>
<p>The majority of malware discovered was packaged as fake, spoof or trojan-laden versions of popular applications. Almost half -- 44 percent -- were designed to subscribe unwitting downloaders to expensive services, and 24 percent were created to steal data. Adware-laden applications came in third at 17 percent.</p>
<figure><img title="android malware ecosystem rise mobile threat security risk applications" alt="android malware ecosystem rise mobile threat security risk applications" src="http://cdn-static.zdnet.com/i/r/story/70/00/019093/screen-shot-2013-08-07-at-10-21-25-620x395.png?hash=BQuxMQOwZw&upscale=1" height="395" width="620"></figure>
<p>However, the researchers note that the discovery of the <a href="http://www.zdnet.com/security-firm-claims-99-percent-of-android-apps-open-to-takeover-7000017672/">"master key" vulnerability</a> in Android's security model was the most crucial revelation this year. Last month, a team from Bluebox Security found a vulnerability which could allow attacks to convert 99 percent of apps into a trojan -- which could then be used to steal data or connect to botnets without the user knowing.</p>
<p>Following the discovery, Duo Security and System Security Lab (NEU SecLab) <a href="http://www.zdnet.com/third-party-app-released-to-fix-bluebox-security-android-hole-7000018208/">released an app</a>, ReKey, which they claim fixes the security flaw for you.</p>
<figure><img title="Screen Shot 2013-08-07 at 10.21.38" alt="Screen Shot 2013-08-07 at 10.21.38" src="http://cdn-static.zdnet.com/i/r/story/70/00/019093/screen-shot-2013-08-07-at-10-21-38-v1-620x405.png?hash=Lmt0Z2LkLm&upscale=1" height="405" width="620"></figure>
<p>The United Arab Emirates was reported as the country with the highest rate of malicious app download volume at 13.79 percent. Myanmar and Vietnam came second and third. The United States and United Kingdom did not make the top ten list.</p>
<p>"The UAE recorded the highest malicious android app download volume, overtaking Myanmar, which placed first in the previous quarter," the report says. "Six new countries figured in this month's top 10, which may indicate an increase in mobile device use and/or attacks against such devices in these locations."</p>
<p>When analyzing the countries most vulnerable to privacy or data exposure, the report noted that "similar to last quarter, mobile users in Saudi Arabia downloaded the most number of high-risk apps. Vietnam placed second in light of the increasing mobile device use in the country."</p>
<p>According to Linda Barrabee, Research Director, Connected Intelligence at The NPD Group, approximately only 30 percent of all Android smartphones and tablets in the U.S., have any type of security app installed today. Coupled with the high rates of apps being added to the ecosystem every day worldwide, a large number of Android devices are likely to be exposed to risks -- and this trend is likely to continue in the future.</p>
<p>JD Sherry, vice president of technology and solutions at Trend Micro said:</p>
<blockquote>
<p>"Due to the fractured nature of the Android network, it is very difficult for patches to reach all users in an effective timeframe. In some cases, users will never get patches as vendors leave their customers at risk of attack. Until we have the same urgency to protect mobile devices as we have for protecting PCs, this very real threat will continue to grow rapidly.</p>
<p>At the rate this malware is accelerating -- almost exponentially -- we appear to be reaching a critical mass. To fight this, Android users need to take great care when using their devices and take the simple, but effective, step of adding security software to all mobile devices."</p>
</blockquote>]]></media:text>
		</item>
		<item>
			<guid isPermaLink="false">7000019071</guid>
			<link><![CDATA[http://www.zdnet.com/cybersecurity-omb-obama-incentive-proposals-white-house-7000019071/]]></link>
			<title><![CDATA[Cybersecurity incentive proposals from White House underwhelm]]></title>
			<description><![CDATA[The security of critical infrastructure is clearly important, but don't expect much from the Federal Government's efforts to promote it. ]]></description>
			<pubDate><![CDATA[Wed, 07 Aug 2013 06:02:04 +0000]]></pubDate>
			<media:credit role="author"><![CDATA[Larry Seltzer]]></media:credit>
			<s:doctype><![CDATA[Text]]></s:doctype>
			<category domain="http://www.zdnet.com/topic-government-us/">Government US</category>
			<media:text type="html"><![CDATA[<p>The Federal Government's long-term plan to 'do something' about the security of critical national infrastructure reached another milestone today with <a href="http://www.zdnet.com/white-house-outlines-possible-incentives-for-cybersecurity-framework-7000019066/">the floating of some trial balloon proposals for voluntary industry incentives</a>.</p>
<p>Just in case my tone didn't come through there, while I think the issues involved here are important, I think and expect very little from the Federal Government's involvement. My principal reason for this is that I can't believe that the government can tell private companies how to secure their networks better than they can themselves. Market and liability incentives really ought to be enough, and if they aren't it's because management isn't being held sufficiently accountable.</p>
<figure class="alignRight"><img title="Seal_Of_The_Executive_Office_Of_The_President" alt="Seal_Of_The_Executive_Office_Of_The_President" src="http://cdn-static.zdnet.com/i/r/story/70/00/019071/sealoftheexecutiveofficeofthepresident-200x200.jpg?hash=BQOvAmNlL2&upscale=1" height="200" width="200"></figure>
<p>(An aside: I despise the term 'cybersecurity.' It's more a political than a technical term and doesn't really have a clear definition. But I think we're stuck with it.)</p>
<p>Some of the ideas in <a href="http://www.whitehouse.gov/blog/2013/08/06/incentives-support-adoption-cybersecurity-framework">the proposals released today</a> by <a href="http://www.whitehouse.gov/blog/author/Michael%20Daniel">Michael Daniel, the Special Assistant to the President and Cybersecurity Coordinator</a>, are not bad, but others seem to me like they're just muddying the waters. Even the good ideas don't necessarily merit involvement of our Cybersecurity Czar.&nbsp;</p>
<p>The idea of cybersecurity insurance is obviously one which is being worked out already between insurance companies and their customers, and common sense for both sides should lead them to the conclusion that more secure companies should pay lower premiums. Why do we need the Federal Government to 'engage' with the insurance industry to do that which is plainly in their own interest? It's like when government pays farmers to do soil conservation.</p>
<p>Grants, process preference, public recognition, all these likely to be of marginal value to a company that qualifies as 'critical infrastructure.' Liability limitation could be a great incentive for industry, tied closely in with the insurance incentives, but I don't seriously expect it from this administration.</p>
<p>This effort to develop voluntary incentives came from Congress's failure to pass legislation in this area last year. The administration decided to move on with proposals they could exercise through executive action. And yet, some of the proposals sound like they would have to have legislative approval, limitation of liability being one of them. I wonder whether the same is true of the proposal for rate recovery for price-regulated industries, a proposal which would also involve state and local decisions. As for the proposal to streamline regulations, not only is it the most tired of policy bromides, but the administration has had a Regulatory Czar ("Administrator of the <a href="http://www.whitehouse.gov/omb/inforeg_default">Office of Information and Regulatory Affairs</a>") since 2009. Just a few months ago <a href="http://www.reuters.com/article/2013/04/26/us-usa-obama-regulations-idUSBRE93P02T20130426">Howard Shelanski was named to this position to replace Cass Sunstein</a>. Do we need a whole new bureaucracy to administer the streamlining of regulations?</p>
<p>Finally, it's worth asking whether private industry should take computer security advice from Michael Daniel. Like me, Daniel has a degree in public policy, but he has spent his career in the government, largely in the executive administration of intelligence services. He has been involved in federal cybersecurity efforts for several years, but that doesn't impress me.</p>
<p>The Bush administration was every bit as phony on these matters as the Obama administration, so the charade that the Federal Government is engaged in these problems is an old and established one by now. So far, the mission of the Cybersecurity Czar seems to be to issue a report every couple years calling for further study of the matter. At least they're only wasting our money like this rather than actively making things worse.</p>]]></media:text>
		</item>
		<item>
			<guid isPermaLink="false">7000019037</guid>
			<link><![CDATA[http://www.zdnet.com/windows-phones-open-to-hackers-when-connecting-to-rogue-wi-fi-7000019037/]]></link>
			<title><![CDATA[Windows Phones open to hackers when connecting to rogue Wi-Fi]]></title>
			<description><![CDATA[Microsoft has warned that a vulnerability in Windows Phone operating systems could allow hackers to access your passwords when connected to rogue Wi-Fi hotspots. ]]></description>
			<pubDate><![CDATA[Tue, 06 Aug 2013 17:22:05 +0000]]></pubDate>
			<media:credit role="author"><![CDATA[Charlie Osborne]]></media:credit>
			<s:doctype><![CDATA[Text]]></s:doctype>
			<category domain="http://www.zdnet.com/topic-malware/">Malware</category>
			<category domain="http://www.zdnet.com/topic-microsoft/">Microsoft</category>
			<category domain="http://www.zdnet.com/topic-mobility/">Mobility</category>
			<media:text type="html"><![CDATA[<figure><img title="nokia-610-620x464" alt="nokia-610-620x464" src="http://cdn-static.zdnet.com/i/r/story/70/00/019037/nokia-610-620x464-v1-620x464.jpg?hash=AmZmZJVkBQ&upscale=1" height="464" width="620"><figcaption>Credit: Nokia</figcaption></figure>
<p>A new Microsoft security advisory warns that smartphones running the Windows Phone operating system could be susceptible to infiltration when connecting to a rogue Wi-Fi hotspot.</p>
<p>A rogue access point, also known as a rogue AP, is a Wi-Fi access point installed on a network, operating without authorization and not under the control of a systems administrator. If installed, rogue APs could allow anyone to connect to your network through Wi-Fi, and may not adhere to WLAN security policies.</p>
<p>The bulletin, <a href="http://technet.microsoft.com/en-us/security/advisory/2876146">advisory 2876146</a>, says that hackers could exploit a known weakness in the Wi-Fi authentication protocol known as PEAP-MS-CHAPv2 (Protected Extensible Authentication Protocol with Microsoft Challenge Handshake Authentication Protocol version 2). The protocol is used in Windows Phones for WPA2 wireless authentication.</p>
<p>The tech giant says that an attacker can exploit a weakness in the protocol when the mobile device attempts to automatically authenticate with a hotspot posing as Wi-Fi. Once the attempt to connect is made -- without user permission -- a hacker can intercept the victim's encrypted domain credentials before decrypting and lifting the data.</p>
<p>"To exploit this issue, an attacker controlled system could pose as a known Wi-Fi access point," the advisory warns. "An attacker could then exploit cryptographic weaknesses in the PEAP-MS-CHAPv2 protocol to obtain the victim's domain credentials. Those credentials could then be re-used to authenticate the attacker to network resources, and the attacker could take any action that the user could take on that network resource."</p>
<p>Microsoft has not received any reports of this vulnerability being used to steal corporate data, passwords or breach a network to date. There is no security patch available for this; instead, Microsoft suggests that you enable the certificate verification process before executing the PEAP-MS-CHAPv2 protocol to connect to Wi-Fi hotspots.</p>
<p>The bulletin <a href="http://technet.microsoft.com/en-us/security/advisory/2876146">contains instructions</a> for configuring your Windows Phone versions 7.8 or 8 to fix the security flaw. Older versions are not affected.</p>]]></media:text>
		</item>
		<item>
			<guid isPermaLink="false">7000018974</guid>
			<link><![CDATA[http://www.zdnet.com/u-s-cloud-industry-stands-to-lose-35-billion-amid-prism-fallout-7000018974/]]></link>
			<title><![CDATA[U.S. cloud industry stands to lose $35 billion amid PRISM fallout]]></title>
			<description><![CDATA[Revelations of the U.S. government's spying programs could have a massive impact on the U.S. cloud industry, which stands to lose vast sums over the next three years as a result — compounded by other countries bankrolling efforts to combat U.S. market leadership.]]></description>
			<pubDate><![CDATA[Tue, 06 Aug 2013 16:16:05 +0000]]></pubDate>
			<media:credit role="author"><![CDATA[Zack Whittaker]]></media:credit>
			<s:doctype><![CDATA[Text]]></s:doctype>
			<category domain="http://www.zdnet.com/topic-cloud/">Cloud</category>
			<media:text type="html"><![CDATA[<figure><img title="close_up_server_room_data_center" alt="close_up_server_room_data_center" src="http://cdn-static.zdnet.com/i/r/story/70/00/018974/closeupserverroomdatacenter-620x323.jpg?hash=BGV2LmDjMG&upscale=1" height="323" width="620"><figcaption>The U.S. cloud computing could take a hammering in confidence over the next few years as a result of the NSA's surveillance programs, while fostering strong international growth. (Image via CNET)</figcaption></figure>
<p>The U.S.' dominance in the cloud space may soon be challenged by rival countries, particularly those in the European Union, as the global surveillance scandal threatens to wipe up to $35 billion off the U.S. cloud slate.</p>
<p>A <a href="http://www.itif.org/publications/how-much-will-prism-cost-us-cloud-computing-industry">new report</a> by non-profit group the&nbsp;Information Technology and Innovation Foundation claims that Europeans are attempting to nudge away from their American counterparts in a bid to&nbsp;distance themselves from U.S. electronic surveillance and eavesdropping.&nbsp;</p>
<!-- Parsed pinbox:"10125110" -->
<div class="relatedContent alignRight"><h3>Read this</h3>
<div><a href="http://www.zdnet.com/prism-fallout-could-cost-us-cloud-industry-billions-warns-europes-digital-chief-7000017712/" class="thumb"><img src="http://cdn-static.zdnet.com/i/r/library/global-thumbs/misc/european-parliament-flags-220x165.jpg?hash=Zwt1ZmV2BG&upscale=1" alt="PRISM fallout could cost US cloud industry billions, warns Europe's digital chief" width="220" height="165" /></a></div><p><a href="http://www.zdnet.com/prism-fallout-could-cost-us-cloud-industry-billions-warns-europes-digital-chief-7000017712/">PRISM fallout could cost US cloud industry billions, warns Europe's digital chief</a></p>
<p class="more">

																	<p>US cloud service providers could miss out on business from EU firms because of anger of US government surveillance programmes, warns the EU's digital chief.</p>

																</p>
<ul class="alignRight"><li><a href="http://www.zdnet.com/prism-fallout-could-cost-us-cloud-industry-billions-warns-europes-digital-chief-7000017712/">Read more</a></li></ul></div>
<p>While the risk of the Patriot Act was known three years ago and confidence was already&nbsp;<a href="http://www.zdnet.com/blog/btl/european-companies-need-confidence-over-patriot-act-concerns/56878">shaky in some sectors of the IT industry</a>, now that news of the U.S. National Security Agency's PRISM program, among others, came to light, cloud providers outside the U.S. are stoking the fires once more. By 2016, the global public cloud industry will stand to be a $207 billion industry, with spending expected to rise by 100 percent in the four years from 2012.</p>
<p>It comes just weeks after EU Digital Agenda Commissioner Neelie Kroes warned that <a  turn away</a> from U.S. companies embroiled in the PRISM scandal, which automated the process of sharing user data with intelligence agencies.</p>
<p>"The United States has both the most to gain and the most to lose,"&nbsp;writes report author Daniel Castro, citing job growth and revenue dependent on the U.S. exporting cloud computing services.</p>
<p>The "low end" scenario estimates assumes the U.S. loses about 10 percent of its foreign market to European or Asian competitors, or $21.5 billion over the next three years.&nbsp;</p>
<p>However, the "high end" of $35 billion assumes a 20 percent loss to foreign markets by 2016.</p>
<p>The report notes at this early stage it is impossible to gauge exactly how the U.S. cloud computing market has suffered as a result of the NSA's surveillance programs. But based on surveys conducted by the Cloud Security Alliance during June and July, over the two primary months of news relating to the scandal, 56 percent of non-U.S. organizations said they would not use a U.S. provider in future. (ZDNet's Liam Tung&nbsp;<a >has more on these figures</a>).&nbsp;</p>
<p>In concluding remarks, Castro said the U.S. government should "proactively set the record straight," and declassify information where possible and necessary.</p>
<p>"The economic consequences of national security&nbsp;decisions should be part of the debate, and this cannot happen until more details about&nbsp;PRISM have been revealed," the report says.</p>]]></media:text>
		</item>
		<item>
			<guid isPermaLink="false">7000019015</guid>
			<link><![CDATA[http://www.zdnet.com/bgp-spoofing-routing-router-phishing-why-nothing-on-the-internet-is-actually-secure-7000019015/]]></link>
			<title><![CDATA[BGP spoofing - why nothing on the internet is actually secure]]></title>
			<description><![CDATA[A skilled attacker with access to the right router can co-opt routes to destination IP address. When this happens, nothing on the internet is trustworthy. And there's no way to stop it. ]]></description>
			<pubDate><![CDATA[Tue, 06 Aug 2013 11:00:00 +0000]]></pubDate>
			<media:credit role="author"><![CDATA[Larry Seltzer]]></media:credit>
			<s:doctype><![CDATA[Text]]></s:doctype>
			<category domain="http://www.zdnet.com/topic-cisco/">Cisco</category>
			<category domain="http://www.zdnet.com/topic-networking/">Networking</category>
			<media:text type="html"><![CDATA[<p>The scariest hack of them all on the internet has been around for a long time, but it doesn't get a lot of attention in the broader tech press. It's BGP spoofing and it compromises the most basic functions of the internet: the routing of data from one system to another.</p>
<p>Effective use of BGP spoofing is not within the reach of script kiddies, but there's a lot of it going on. How much? Nobody knows and nobody can know. It's possible to detect that an attack is going on, but it's impossible to prevent it and it may be difficult to stop an attack in progress.</p>
<p>I spoke with Dave Rand, Technical Fellow at <a title="Trend Micro" href="http://www.trendmicro.com/">Trend Micro</a>. Back in the mid-90's Rand worked at an ISP and first encountered BGP spoofing used to facilitate spamming. The routing in the mail headers of the spam looked particularly genuine because all the addresses were correct. At the bottom of it was a compromised router at an ISP. I've spoken to Dave many times over the years about BGP spoofing. He's always considered it a very serious problem that is fundamentally insolvable and I'd like to thank him for all the information below.</p>
<figure class="alignRight"><img title="networking" alt="networking" src="http://cdn-static.zdnet.com/i/r/story/70/00/019015/networking-200x150.jpg?hash=AGqwAwIyAm&upscale=1" height="150" width="200"><figcaption>In the hands of a talented attacker, BGP spoofing can perform startling attacks and can't be stopped</figcaption></figure>
<p>How is all this possible? It starts with the very basics of how the internet works.</p>
<p>The internet is a network of networks. Routers are used to move data between networks according to IP addresses that are stored in their routing tables. Routers will advertise to each other that they use certain addresses.</p>
<p>But — and this is very important — there is no authority to check to confirm that a particular address belongs to a particular network. There are organizations, such as <a href="http://www.ripe.net/">RIPE</a> in Europe and <a href="http://www.arin.net/">ARIN</a> for the US and Canada, which allocate IP addresses (all they have left is IPv6 addresses), but there's no where you can check to confirm an allocation authoritatively. Because of this, the updating of routing tables is done entirely on trust.</p>
<p>Consider this simplistic example: ISP1 has the address space 1.0.0.0/8 and ISP2 has 2.0.0.0/8. They each advertise their space to the other. Now ISP3 advertises 3.0.0.0/8 to ISP1 and asks ISP1 to advertise its addresses, which it does. ISP1 becomes a transit provider for ISP3, a service for which ISP3 pays ISP1. But ISP1 has no real way to confirm that ISP3's advertisements are accurate.</p>
<p>Here's another important point: shorter routes get higher priority from the router. If ISP3 were to advertise a small subset of addresses to ISP1 with shorter paths than what ISP1 already had, ISP1 would follow those routes instead of what was already in the routing table.</p>
<p>It's important to note that in order to execute this attack you need control of an ISP router. You might think that this would be hard to do, and it's harder than it used to be, but it's not impossible. It's still possible to find routers with default admin passwords or passwords on a common dictionary list.&nbsp; And once you do and take control, there's nothing to stop you from advertising Bank of America addresses on your network.</p>
<p>I suspect that the large majority of erroneous advertisements are, well, erroneous. They're not malicious, they're just screwups. There was a recent incident where <a href="https://isc.sans.edu/forums/diary/BGP+multiple+banking+addresses+hijacked/16249">some bad routes in NedZone Internet BV's network included Amazon.com and a bunch of big banks</a>. It looks way too brazen to be an attack.</p>
<p>If you really wanted to be effective and surreptitious with such an attack you'd be lower-profile. You'd attack the router of a small or mid-size ISP and you'd only advertise it for a short time, but during that time you'd have other attacks, like cross-site scripting and targeted spam, ongoing against that ISP's users. When they attempt to communicate with their bank or retailer they will instead go to your servers; you can spoof those servers, see the cookies, it all depends on how ornate you want to get, but all you really need is to get users to log on to the site, which can satisfy SSL and get the little lock icon because the attacker can control those addresses too. Once you have validated logins for those accounts you can sell them for a lot.</p>
<p>Sometimes malicious attacks are not for profit, but just network vandalism. In 2008 there was a dispute between YouTube and the government of Pakistan about certain content. Sometime later false BGP routes pointed YouTube traffic in much of Europe to Pakistan Telecom, stealing traffic from YouTube but also flooding Pakistan Telecom with all of YouTube's traffic. RIPE, the regional internet registry for Europe, has <a href="http://www.youtube.com/watch?v=IzLPKuAOe50">a fascinating YouTube video of how it happened</a>.</p>
<p>After an attack like this there may be no footprints left. Nobody logs router advertisements. There are groups that log and analyze the global routing table, such as the fascinating <a href="http://www.cidr-report.org/as2.0/">CIDR Report</a>, and look for routes that don't make sense. But these only catch changes that propagate out to the global routing table. A transient advertisement which only goes to an ISP's peer and not a transit provider won't get to the global table. And even if it does, by the time anyone can see what's going on it will be too late.</p>
<p>It's impossible to block BGP spoofing attacks in a consistent, automated fashion, but it is possible to apply some common sense and experience, what you might call heuristics, to determine that a route isn't kosher. If a small ISP in Brazil starts advertising routes to PayPal then an experienced CNE might think twice about replicating it. But these things don't usually get vetted by a human being; there's too much going on. All ISPs advertise their routes to the other networks to which they connect and these companies (there are 30 or 40 thousand ISPs now) have a relationship and contracts, so they trust each other. And if they wanted to check the addresses they couldn't; there's no authoritative place to check.</p>
<p>You might complain that best administration practices, such as good route filtering, would prevent these attacks, and there's something to that. You can certainly prevent a lot of them with best practices. There are other practices that can make it harder to exploit such attacks successfully, such as using strong encryption and authentication for all local traffic, but there's no technique that will block these attacks in all cases.</p>
<p>If you find out that an ISP has bogus routes to your network what can you do? All you can do is call them and ask them (nicely or otherwise) to withdraw the route, but you can't make them. If they don't respond adequately you can complain to their upstream providers and ask them to block the route, but once again there is no official mechanism for doing this because there is no authority in charge of it, and you probably don't even have a relationship with the ISP to which you're complaining.</p>
<p>Of all the attacks happening under the radar on the internet, the most dangerous ones are likely based on BGP spoofing. It's the best reason to assume that a lot more network compromising, by criminal and government actors, is happening than is officially acknowledged, and even the officials don't really know how much is happening.&nbsp; What can be done? If Dave Rand doesn't know then I sure don't.</p>]]></media:text>
		</item>
		<item>
			<guid isPermaLink="false">7000018946</guid>
			<link><![CDATA[http://www.zdnet.com/nsa-spying-trust-the-pki-or-its-anarchy-on-the-internet-7000018946/]]></link>
			<title><![CDATA[Trust the PKI or it's anarchy on the Internet]]></title>
			<description><![CDATA[When Microsoft automatically updates your Windows trusted root certificates, are they inserting secret backdoors for the NSA to spy on you? No, but even if they were, you'd still have to trust them.]]></description>
			<pubDate><![CDATA[Mon, 05 Aug 2013 21:04:05 +0000]]></pubDate>
			<media:credit role="author"><![CDATA[Larry Seltzer]]></media:credit>
			<s:doctype><![CDATA[Text]]></s:doctype>
			<category domain="http://www.zdnet.com/topic-browser/">Browser</category>
			<media:text type="html"><![CDATA[<p>The PKI (Public Key Infrastructure) is an imperfect system, requiring trust in organizations that not everyone trusts. Even so, nearly everyone on the Internet is dependent for their security, to some degree, on the system of digital certificates and the software which employs them.&nbsp;</p>
<p>The system fails now and then and, when it does, it rightly attracts a lot of attention. It works 99.(<em>some very large number</em>) percent of the time, but the only way it works is if we submit to it. We have to put our trust in the certificates issued by Symantec and Comodo and their ilk. And it's not just them, it's also Apple and Microsoft and many large telecom companies and, in many countries, the government. (Of course, we now know that, even in the US, if you trust Microsoft and Apple you implicitly trust the US government.)&nbsp;</p>
<p>There's really no choice. Even for those who know what's going on with their SSL and certificates, it's impractical to try to trust the system just a little or to pick and choose. The vast bulk of the Internet population wouldn't even know what to do.&nbsp;</p>
<p>So it's unhelpful to complain, as German magazine C'T does, that <a href="http://www.heise.de/ct/artikel/Microsofts-Hintertuer-1921730.html">Microsoft's automatic updating of root certificates lacks transparency</a>. (That article is in German; I can't find an official English translation and I'm mostly relying on the account of Johannes Ullrich, who <a href="https://isc.sans.edu/podcastdetail.html?id=3451">discussed the article in his daily ISC StormCast on July 31</a>.)</p>
<figure class="alignRight"><img title="Win7-certificates-dialog" alt="Win7-certificates-dialog" src="http://cdn-static.zdnet.com/i/r/story/70/00/018946/win7-certificates-dialog-200x184.png?hash=MTMyL2L4AG&upscale=1" height="184" width="200"><figcaption>Windows includes many trusted root certificates, possibly some from the US government.</figcaption></figure>
<p>Trusted root certificates are digital certificates that are trusted inherently in the system. Individual certificates for sites cannot be trusted on their own, so they refer up a certificate chain of issuers which the client can verify up to the root. The issuers of these roots&nbsp; - generally Certificate Authorities - are the ones you have to trust. Below is a screen grab of the Windows 7 trusted root certificate list.&nbsp;</p>
<p>C'T's complaint is that Microsoft automatically issues updates to their root certificate list without user interaction or any clear indication that it has made any changes.&nbsp;</p>
<p>The implication, and based on Google Translate I think C'T says this out loud, is that Microsoft could issue a root certificate at the behest of the NSA or some other shadowy agency to assist them in compromising your computer and accounts.</p>
<p>Yes, of course they could do this. We're talking about Microsoft, the people who write the operating system. They could put code to compromise your computer right into the operating system. But the government doesn't need to use Microsoft to issue malicious root certificates; as the screen grab above shows, the US government has its own certificates in the list. (Of course, if you don't trust Microsoft, why should you trust that the list itself is accurate?)&nbsp;</p>
<p>Automatic updating of root certificates is essential to the proper functioning of the PKI. At times the list changes: root certificates are issued and revoked, or they may even expire. In the case of a root certificate revocation it's essential that the update go out quickly in order to protect users. In that same Certificates manager in the screen grab you can find the "Untrusted Publishers" tab; several of those certificates are root certificates.</p>
<p>Too many users ignore updates to let this go unaddressed. Incidentally, it's not just Internet Explorer; Google Chrome, Apple Safari and a lot of other software - basically any software which uses the Windows CryptoAPI - relies on the Windows Certificate Store, which is the database displayed in the Certificates list in the image above.</p>
<p>Mozilla software, including Firefox, is the exception. They have their own crypto code and their own certificate store, and they update it too, although they do so through documented updates <a href="http://www.mozilla.org/security/announce/2011/mfsa2011-11.html">such as this one</a>.&nbsp; Microsoft doesn't announce their root certificate updates (that I've found), but <a href="http://search.microsoft.com/en-us/DownloadResults.aspx?q=root%20certificate%20update">they do provide the updates separately in the Download Center</a> so you could look them up there.&nbsp; And there's nothing new about this practice by Microsoft. C'T links to <a href="http://technet.microsoft.com/en-us/library/cc787832(v=WS.10).aspx">a Technet article on how Windows Server 2003 performs this function</a>. .</p>
<p>Microsoft provides ways for you to <a href="http://technet.microsoft.com/en-us/library/cc734054(WS.10).aspx">turn off the updates using registry hacks or group policy</a>, but it would be a bad idea to do so. If you do, you can expect errors in the browser (IE, Safari, Chrome) and elsewhere indicating certificates being signed by untrusted authorities.</p>
<p>Ullrich says that automatic updating is "kind of a good thing," but I wouldn't qualify it the way he does. It's an obviously good thing, and the counterarguments are petty. Ullrich points out that the only real alternative, unless you reject the PKI entirely, is to create your own list of trusted root certificates and install it manually. Almost nobody does this; it's completely impractical.</p>
<p>What are the checks and balances on the software companies and CAs? One is the market; if a CA gets a bad rep they may lose customers to their numerous competitors. The CAs know that their business depends on their reputation. In theory the market also applies to the software companies in this way, but it's hard to see certificate management being a major factor in customers shifting between operating systems or even browsers. The companies, like Microsoft and Mozilla, that manage certificate stores, also have policies for inclusion of root certificates that could result in a certificate being removed for insecure practices of the organization.</p>
<p>But the main check is the research community. These are the hackers, like <a title="Thoughtcrime.org" href="http://thoughtcrime.org/">Moxie Marlinspike</a>, who focus on the weaknesses in the CA system and put pressure on them to work as best they can, even if, as Moxie would argue, the system itself is fundamentally flawed. Like I said, CAs need to have a good reputation, and hacker exposs are bad for business.</p>
<p>There are experiments going on for how to replace the CAs as part of the PKI, but they are clearly not ready for prime time, and it's not at all clear that they will scale to Internet levels of demand. The best-known is <a href="http://tack.io/">TACK (Trust Assertions for Certificate Keys)</a> by Marlinspike and others, but the standards draft they wrote has a lot of dust on it and I see no evidence the IETF is interested.</p>
<p>No, your choices are to trust all those big, bad corporations or anarchy. I don't think that's hyperbole; an Internet without a CA system today would be anarchy. Nobody could perform any sensitive operations like banking and you'd be nuts even to do email on it. So just accept that you have to trust Microsoft and Symantec and, for what it's worth, the NSA.&nbsp;</p>]]></media:text>
		</item>
		<item>
			<guid isPermaLink="false">7000018912</guid>
			<link><![CDATA[http://www.zdnet.com/carriers-rush-to-fix-sim-card-vulnerability-by-hacking-into-them-7000018912/]]></link>
			<title><![CDATA[Carriers rush to fix SIM card vulnerability — by hacking into them]]></title>
			<description><![CDATA[How do you fix a major security flaw that could lead to attackers hacking into hundreds of millions of SIM cards? By getting the carriers to hack into them first.]]></description>
			<pubDate><![CDATA[Fri, 02 Aug 2013 20:13:05 +0000]]></pubDate>
			<media:credit role="author"><![CDATA[Zack Whittaker]]></media:credit>
			<s:doctype><![CDATA[Text]]></s:doctype>
			<media:text type="html"><![CDATA[<figure><img title="starhub_eztravel_sim_500" alt="starhub_eztravel_sim_500" src="http://cdn-static.zdnet.com/i/r/story/70/00/018912/starhubeztravelsim500-v1-620x371.jpg?hash=Z2SxLJSvAz&upscale=1" height="371" width="620"><figcaption>(Image: CNET Asia)</figcaption></figure>
<p>A bug that could have allowed hackers to exploit a vulnerability in millions of SIM cards, commonly used in mobile phones and other cellular equipment, has been fixed, according to the security researcher who first discovered the flaw.</p>
<p>Germany-based Karsten Nohl of&nbsp;Security Research Labs discovered the flaw after three years of investigative research into SIM card technologies, which are most often used to authenticate and connect GSM phones to cellular networks.</p>
<!-- Parsed pinbox:"10124999" -->
<div class="relatedContent alignRight"><h3>Read this</h3>
<div><a href="http://www.zdnet.com/best-of-show-black-hat-usa-2013-vendors-and-sponsors-7000018763/" class="thumb"><img src="http://cdn-static.zdnet.com/i/r/story/70/00/018763/best-of-black-hat-usa-2013-products-and-vendors-220x165.jpg?hash=ZJH5LwV4BQ&upscale=1" alt="Best of Show, Black Hat USA 2013 Vendors and Sponsors" width="220" height="165" /></a></div><p><a href="http://www.zdnet.com/best-of-show-black-hat-usa-2013-vendors-and-sponsors-7000018763/">Best of Show, Black Hat USA 2013 Vendors and Sponsors</a></p>
<p class="more">

																	<p>Black Hat USA 2013 vendor area included companies such as Veracode, Booz Allen Hamilton and Microsoft, with creative schwag such as Botnets for Breakfast (cereal) and 'hacker' playing cards.</p>

																</p>
<ul class="alignRight"><li><a href="http://www.zdnet.com/best-of-show-black-hat-usa-2013-vendors-and-sponsors-7000018763/">Read more</a></li></ul></div>
<p>He discovered that a vulnerability existed where a Java flaw could be exploited by sending a specially-crafted <a href="http://www.zdnet.com/des-encryption-leaves-sim-cards-vulnerable-to-exploitation-7000018352/">over-the-air (OTA) cryptographically secured text message</a>. SIM cards can contain phone numbers, contact information, and other personally identifiable information to the phone owner.</p>
<p>SIM cards are considered one of the safest technologies around, with almost no exploits publicly available known.</p>
<p>For the size and scale of the potential problem, carriers faced either replacing hundreds of millions of SIM cards which could have cost in the high tens of millions of dollars if not more, or somehow fixing the exploit on device SIM cards.&nbsp;</p>
<p>He was scheduled to show off his findings at the Black Hat security conference on Tuesday (ZDNet's Violet Blue is on the scene and <a href="http://www.zdnet.com/black-hat-usa-2013-day-one-in-pictures-7000018761/">has more on the event</a>), but instead he disclosed that&nbsp;carriers and cellular networks had in fact promptly fixed&nbsp;the bug.</p>
<p><a href="http://edition.cnn.com/2013/08/01/tech/mobile/sim-card-hack/">According to CNN</a>, Nohl confirmed that the carriers hacked into their own SIM cards using the same vulnerability to fix the flaw inside-out.&nbsp;</p>
<p>"They're adopting hacking methods to make it more secure," he told attendees at the conference, the news site reported.</p>
<p>Attackers could have run up charges, redirected costs to premium dialers, track devices, and potentially access credit card information if stored on the device.</p>
<p>Though it's not the first time a white hat solution has been employed, it's becoming increasingly common to employ "good" hackers to — with prior authorization&nbsp;— access secure systems in order to find weaknesses and help patch security flaws. It's also certainly a novel solution to a vast and complicated problem.</p>
<p>Exactly how the "hack" was carried out remains unclear. Nohl reportedly declined to name the carriers.&nbsp;</p>
<p><em>(<a href="http://edition.cnn.com/2013/08/01/tech/mobile/sim-card-hack/">via CNN</a>)</em></p>]]></media:text>
		</item>
		<item>
			<guid isPermaLink="false">7000018907</guid>
			<link><![CDATA[http://www.zdnet.com/researchers-reveal-details-of-active-comfoo-cyberespionage-campaign-7000018907/]]></link>
			<title><![CDATA[Researchers reveal details of active 'Comfoo' cyberespionage campaign]]></title>
			<description><![CDATA[The trojan used in the RSA breach of 2010 is still active and targeting corporate and  government targets worldwide; over 200 variants of 'Comfoo' recently discovered by researchers. ]]></description>
			<pubDate><![CDATA[Fri, 02 Aug 2013 18:25:04 +0000]]></pubDate>
			<media:credit role="author"><![CDATA[Charlie Osborne]]></media:credit>
			<s:doctype><![CDATA[Text]]></s:doctype>
			<category domain="http://www.zdnet.com/topic-malware/">Malware</category>
			<media:text type="html"><![CDATA[<p>A cyberespionage campaign which targeted the RSA in 2010 is still active and targeting networks worldwide.</p>
<p>Dell SecureWorks researchers Joe Stewart and Don Jackson have released a new <a href="http://www.secureworks.com/cyber-threat-intelligence/threats/secrets-of-the-comfoo-masters/">threat intelligence report</a> documenting the "Comfoo" remote access trojan (RAT) -- malware used to infiltrate corporate and governmental networks across the globe.</p>
<p>The so-called Advanced Persistent Threat (APT) attack is simply one of many that organizations are scrambling to defend against as cyberthreats become more sophisticated, and in some cases, state-sponsored.</p>
<p>Corporations and governments rely heavily upon digital networks to store valuable data. Bank accounts, national security data, trade secrets and confidential governmental programs are only some targets which can be lucrative for a hacker to acquire -- whether for personal gain or on a competitor's orders. As a result, the cybercrime market is booming -- and we often see reports of household name businesses and agencies gaining cybercriminal attention.</p>
<p>APT attacks stand apart from garden variety script-kiddies or low-profile fraudulent schemes. Those behind APT attacks are often well-trained and have access to resources and funding. As data from corporations and governments can be so valuable, with the time and money to spend, hackers are able to "exercise virtually unlimited patience in penetrating and persisting inside their specific target's network until they accomplish their goals," according to the researchers.</p>
<p>A trademark of APT attacks is the use of malware. Once backdoor access has been granted through the use of malicious code, hackers can patiently and persistently lurk in a network until the targeted information can be stolen.</p>
<p>The Comfoo trojan campaign is a prime example of an advanced persistent threat. Comfoo has been in operation since at least 2006, and first came to light as part of <a href="http://www.zdnet.com/rsa-breach-report-lacks-depth-kaminsky-1339311583/">the RSA data breach</a> in 2010. According to the report, the trojan has been used in at least 64 targeted attacks worldwide, and there are hundreds of variants of the RAT.</p>
<p>To lurk within a corporate system, the Comfoo RAT often replaces the DLL path of an "existing unused service rather than installing a new service," -- which is less likely to be noticed by system administrators. A rootkit is also sometimes used to hide Comfoo disk files. Network traffic generated by the RAT is encrypted in order to securely send data back to the malware's command and control centers.</p>
<p>The researchers could not see the data that was lifted, but were able to plot out the network and see how Comfoo logged keystrokes, accessed and downloaded files, executed commands and was able to open command shares. A relay server -- part of the C&amp;C -- is able to take control of a vulnerable network through the use of the encryption method and static encryption key hard-coded within the Comfoo binary.</p>
<figure><img title="Screen Shot 2013-08-02 at 10.58.03" alt="Screen Shot 2013-08-02 at 10.58.03" src="http://cdn-static.zdnet.com/i/r/story/70/00/018907/screen-shot-2013-08-02-at-10-58-03-518x238.png?hash=ZQAxAmZ5AG&upscale=1" height="238" width="518"></figure>
<p>While monitoring the RAT, researchers found that government entities and private firms based in the U.S., Europe, and Asia Pacific were often infected. Many Japanese and Indian governmental bodies were targeted, as well as educational institutions, media, telecommunications companies and energy firms.</p>
<figure><img title="Screen Shot 2013-08-02 at 10.58.27" alt="Screen Shot 2013-08-02 at 10.58.27" src="http://cdn-static.zdnet.com/i/r/story/70/00/018907/screen-shot-2013-08-02-at-10-58-27-532x273.png?hash=AzZ4LzEvZG&upscale=1" height="273" width="532"></figure>
<p>Interestingly, audio and videoconferencing firms are also a frequent target. The researchers speculate that this may be due to hackers seeking intellectual property, or the trojan may have been used to quietly listen-in on commercial and government organizations.</p>
<p>Dell's researchers have not revealed the identity of targeted organizations, but has informed them of the security breach. However, they also caution that there is likely to be "hundreds more unidentified victims" due to the amount of variants found and the time the cyberespionage campaign has been in operation.&nbsp;</p>
<p><a href="http://www.secureworks.com/cyber-threat-intelligence/threats/secrets-of-the-comfoo-masters/">Read the full report</a>.</p>]]></media:text>
		</item>
		<item>
			<guid isPermaLink="false">7000018763</guid>
			<link><![CDATA[http://www.zdnet.com/best-of-show-black-hat-usa-2013-vendors-and-sponsors-7000018763/]]></link>
			<title><![CDATA[Best of Show, Black Hat USA 2013 Vendors and Sponsors]]></title>
			<description><![CDATA[Black Hat USA 2013 vendor area included companies such as Veracode, Booz Allen Hamilton and Microsoft, with creative schwag such as Botnets for Breakfast (cereal) and 'hacker' playing cards.]]></description>
			<pubDate><![CDATA[Fri, 02 Aug 2013 08:05:04 +0000]]></pubDate>
			<media:credit role="author"><![CDATA[Violet Blue]]></media:credit>
			<s:doctype><![CDATA[Gallery]]></s:doctype>
			<category domain="http://www.zdnet.com/topic-big-data/">Big Data</category>
			<category domain="http://www.zdnet.com/topic-cisco/">Cisco</category>
			<category domain="http://www.zdnet.com/topic-data-management/">Data Management</category>
			<category domain="http://www.zdnet.com/topic-dell/">Dell</category>
			<category domain="http://www.zdnet.com/topic-government-us/">Government US</category>
			<category domain="http://www.zdnet.com/topic-ibm/">IBM</category>
			<media:text type="html"><![CDATA[<p>Leading security conference <a href="http://www.blackhat.com/us-13/">Black Hat</a> showcased its 2013 USA vendors and sponsors in the gigantic Octavius Ballrom in Caesars Palace, Las Vegas, Nevada. For two days, security companies displayed wares and products for all manner of security solutions, with many debuting new gadgets and services.</p><p>The always-smiling <a href="https://www.eff.org/">Electronic Frontier Foundation</a> had a table in one of the main halls, with a classic NSA shirt on display for the occasion.</p><p>Ravens adorned the <a href="http://www.cisco.com/">Cisco</a> booth, and beyond, making it a magnet for attendees who sometimes openly gawked at the creative spectacle.</p><p><a href="http://www.cisco.com/">Cisco's</a> spooky booth was the most eye-catching of all.</p><p>The fabulous, funny, smart and friendly <a href="http://www.veracode.com/">Veracode</a> staff posing for an action shot!</p><p><a href="http://www.splunk.com/">Splunk's</a>&nbsp;fun t-shirts, with slogans such as "I like big data and I cannot lie."</p><p>A close-up of <a href="http://www.splunk.com/">Splunk's</a> great - and coveted - t-shirts, which they gave away free for both show days.</p><p><a href="http://www.qualys.com/">Qualys</a> had some of the friendliest booth staff ever, and a huge piece of real estate.</p><p><a href="http://www.ibm.com/us/en/">IBM</a>&nbsp;- far from its <a href="http://www-03.ibm.com/ibm/history/exhibits/music/music_intro.html">songbook</a> days -&nbsp;had a sprawling booth.</p>
<p>Watch me interview <a href="http://cnettv.cnet.com/commodore-64-turns-25/9742-1_53-31867.html">IBM's Bill Lowe at the Computer History Museum</a> for the C-64 anniversary.</p><p><a href="http://www.dell.com/">Dell</a> made the most of iconic villain imagery.</p><p><a href="http://www.ssh.com/">SSH</a>&nbsp;at Black Hat USA 2013 - these boyshorts were so popular with attendees that they only had the demo left on the second day.</p><p><a href="http://www.ssh.com/">SSH</a> at Black Hat USA 2013 - these boyshorts were so popular with attendees that they only had the demo left on the second day.</p><p><a href="http://www.ssh.com/">SSH</a>&nbsp;at Black Hat USA 2013 - these boyshorts were so popular with attendees that they only had the demo left on the second day.</p><p>The <a href="http://www.alienvault.com/">Alien Vault</a> booth created an outdoorsy corner on the enormous vendor floor with fake grasses - and an alien spaceship.</p><p>Botnets for Breakfast cereal, made for promotion by <a href="https://www.paloaltonetworks.com/">Palo Alto Networks</a>.</p><p><a href="http://www.arbornetworks.com/">Arbor Networks</a> had an artist on site painting custom skateboard decks that were raffled at the end of the conference.</p><p>We went back to <a href="https://filetrek.com/">FileTrek</a>'s&nbsp;Edward Snowden "Hero or villian?" vote at the side of the Black Hat Sponsor Hall to see how the vote was going. Their friendly representative said that at the end of the first day, they were astonished to count the tally and find an even split - a 91-91 heat (attendees voted by putting chips in either of the "hero" or "villain" canisters on FileTrek's table).</p>
<p>FileTrek told us that they would publish the total results after Black Hat ends today, and that voters came in three distinct flavors: one who would put a chip right in the "villain" canister calling him a traitor, another who'd unhesitatingly vote for "hero" and a third who asked if FileTrek would put a can in the middle.</p>
<p>Its booth and cardboard cutout of Edward Snowden was situated directly across the aisle from Snowden's former government contractor employer, Booz Allen Hamilton.&nbsp;</p>
<p>See also:</p>
<ul>
<li><a href="http://www.zdnet.com/black-hat-2013-talks-and-panels-hot-list-7000018657/">Black Hat 2013: talks and panels 'hot list'</a></li>
<li><a href="http://www.zdnet.com/researchers-reveal-how-to-hack-an-iphone-in-60-seconds-7000018822/">Researchers reveal how to hack an iPhone in 60 seconds&nbsp;at Black Hat 2013</a></li>
<li><a href="http://www.zdnet.com/nsa-director-accused-of-lying-to-congress-at-black-hat-usa-2013-keynote-7000018810/">NSA Director accused of lying to Congress at Black Hat USA 2013 keynote</a></li>
<li><a href="http://www.zdnet.com/nsa-director-alexander-black-hat-usa-2013-keynote-gallery-7000018815/">NSA Director Alexander Black Hat USA 2013 Keynote: Gallery</a></li>
</ul>]]></media:text>
		</item>
		<item>
			<guid isPermaLink="false">7000018873</guid>
			<link><![CDATA[http://www.zdnet.com/cfaa-violations-key-to-2012-obama-victory-7000018873/]]></link>
			<title><![CDATA[CFAA violations key to 2012 Obama victory?]]></title>
			<description><![CDATA[An important tactic of the Obama reelection campaign was likely a violation of Facebook's terms of service, and therefore a violation of federal law. This is yet more evidence that Justice Department interpretations of the Computer Fraud and Abuse Act are unreasonable and need to be curtailed.]]></description>
			<pubDate><![CDATA[Fri, 02 Aug 2013 03:13:04 +0000]]></pubDate>
			<media:credit role="author"><![CDATA[Larry Seltzer]]></media:credit>
			<s:doctype><![CDATA[Text]]></s:doctype>
			<category domain="http://www.zdnet.com/topic-government-us/">Government US</category>
			<media:text type="html"><![CDATA[<p><strong>Correction:</strong> <em>The blog post which inspired this story has issued a correction which affects this story as well. Apps, such as the Obama campaign app, are subject to a separate set of terms which are different from those cited in this story. The actions taken by the app and the campaign conform to those terms, and therefore they do not violate the CFAA under anyone’s reading of the act.</em></p>
<p>It's generally accepted in post-mortems on the 2012 presidential election that high turnout among Obama voters was key to his victory. How did the campaign generate such high turnout?&nbsp;<a >the CFAA (Computer Fraud and Abuse Act)</a>.</p>
<p>The tactic was revealed in Dan Balz’s forthcoming book about the 2012 presidential campaign, “Collision 2012: Obama vs. Romney and the Future of Elections in America,”&nbsp;which&nbsp;<a >is being excerpted in the Washington Post</a>. The campaign wanted to expand the reach of their already large database of supporters and found a way to use Facebook for it.</p>
<p>Here's how it worked:</p>
<figure class="alignRight"><img title="computer-fraud-abuse" alt="computer-fraud-abuse" src="http://cdn-static.zdnet.com/i/r/story/70/00/018873/computer-fraud-abuse-v1-200x133.jpg?hash=AQH4MQDkAG&upscale=1" height="133" width="200"><figcaption>If the campaign violated the Facebook terms then, by extension, they violated the CFAA</figcaption></figure>
<p>Balz quotes campaign manager Jim Messina: "…what if we could build a piece of software that … allowed you to match your friends on Facebook with our lists, and we said to you, ‘Okay, so-and-so is a friend of yours, we think he’s unregistered, why don’t you go get him to register?’ Or ‘So-and-so is a friend of yours, we think he’s undecided. Why don’t you get him to be decided?’ And we only gave you a discrete number of friends. That turned out to be millions of dollars and a year of our lives. It was incredibly complex to do.”</p>
<p>The campaign could then, with permission from the user, gain access to their friends. Using other data the campaign had they made a determination as to who was likely to be registered to vote and follow up with them. Balz says that this technique was a big factor for the campaign. But does it violate the CFAA?</p>
<p>The Justice Department has claimed in other cases that a violation of a website's terms of service or an employer's workplace policies can be a violation of the CFAA because it amounts to unauthorized access of a computer or data.</p>
<p>Vatis cites several lines from&nbsp;<a >the Facebook Statement of Rights and Responsibilities</a>&nbsp;which he claims are violated by the campaign's practices. One obvious one is: “You will not … let anyone else access your account.” Another interesting one: “If you collect information from users, you will: obtain their consent, make it clear you (and not Facebook) are the one collecting their information, and post a privacy policy explaining what information you collect and how you will use it.”</p>
<p>If the campaign violated the Facebook terms then, by extension, they violated the CFAA.</p>
<blockquote class="alignLeft">
<p>The Obama campaign's tactics clearly run afoul of the DoJ's interpretations of the law, but are they actually fraudulent, unauthorized access?&nbsp;</p>
</blockquote>
<p>Vatis is not calling for prosecution here, but rather using the incident to criticize the Justice Department's broad interpretation of the CFAA, an interpretation which was controversial back in 2008 when&nbsp;<a >it was first used against Lori Drew, whose fraudulent use of MySpace led 13-year-old Megan Meier to kill herself</a>.</p>
<p>It reached a new low last year when it was used to prosecute Internet developer and activist Aaron Swartz,&nbsp;<a >leading to his suicide this January</a>. After that, the movement in legal and Internet circles to amend the CFAA picked up steam.</p>
<p>There is such a thing as computer fraud and abuse, and it needs to be illegal. The Obama campaign's tactics clearly run afoul of the DoJ's interpretations of the law, but are they actually fraudulent, unauthorized access? That doesn't make sense to me.</p>
<p>All this does present a problem for Facebook. If they do nothing about this huge, public violation of their terms of service, can they then go after anyone else who violates them? What happens in the next election when other candidates use the same methods?</p>
<p>The unhelpful bottom line of it all is that these things are complicated. It's really hard to come up with a set of rules which are comprehensible, fair and which cover all the circumstances the service needs to cover. Same with the law. Until they figure out how to word these things right, companies and even more so the Department of Justice, need to be restrained in their use of the rules.</p>
<p>&nbsp;</p>]]></media:text>
		</item>
		<item>
			<guid isPermaLink="false">7000018761</guid>
			<link><![CDATA[http://www.zdnet.com/black-hat-usa-2013-day-one-in-pictures-7000018761/]]></link>
			<title><![CDATA[Black Hat USA 2013: Day One, In Pictures]]></title>
			<description><![CDATA[Leading security conference Black Hat 2013 boasts over 100 talks that include hacking nuclear facilities, rooting SIM cards, OPSEC failures of spies, a keynote from the NSA and more. ]]></description>
			<pubDate><![CDATA[Thu, 01 Aug 2013 12:30:05 +0000]]></pubDate>
			<media:credit role="author"><![CDATA[Violet Blue]]></media:credit>
			<s:doctype><![CDATA[Gallery]]></s:doctype>
			<category domain="http://www.zdnet.com/topic-apple/">Apple</category>
			<category domain="http://www.zdnet.com/topic-government-us/">Government US</category>
			<media:text type="html"><![CDATA[<p>With temperatures hovering around 103 degrees (39 celsius) outside in Las Vegas, <a href="https://www.blackhat.com/us-13/">Black Hat USA 2013</a> kept over 7,000 security professionals cool inside&nbsp;Caesers Palace while they attended explosive talks, compelling vendor booths, <a href="http://www.blackhat.com/us-13/arsenal.html">Black Hat Arsenal</a> demonstrations, and the <a href="http://pwnies.com/">2013 Pwnie Awards</a>.</p><p>Posing ominously in front of Black Hat USA 2013 signage at Ceasers Palace are Simon Carless (EVP, Black Hat) and Marco Pardi (President, Business Technology Events, UBM Tech).</p>
<p><em>Photo used with permission, <a href="http://www.flickr.com/photos/blackhatevents/9404943516/in/photostream/">courtesy of Black Hat Events</a>.</em></p><p>This is not a standard Black Hat badge; this "Hacker" badge belongs to <a href="http://nmap.org/">Nmap</a> author&nbsp;Gordon "Fyodor" Lyon.</p><p>The Black Hat bookstore featured books such as x, x and x.</p>
<p><em>Photo used with permission, <a href="http://www.flickr.com/photos/blackhatevents/9404943516/in/photostream/">courtesy of Black Hat Events</a>.</em></p><p>All areas of the Ceasers Palace conference center were dressed top to toe with Black Hat projections, banners and more.</p><p>Black Hat attendees are cautioned not to use ATM machines around the conference area for security reasons.</p><p>An estimated 7,000 high-level security experts are attending Black Hat this year.</p>
<p><em>Photo used with permission,&nbsp;<a href="http://www.flickr.com/photos/blackhatevents/9404943516/in/photostream/">courtesy of Black Hat Events</a>.</em></p><p>For the opening keynote by NSA Director Keith Alexander, 3200 Black Hat attendees packed the room and around 1500 were sent to an overflow video room.</p>
<p>Read more in&nbsp;<a href="http://www.zdnet.com/nsa-director-accused-of-lying-to-congress-at-black-hat-usa-2013-keynote-7000018810/">NSA Director accused of lying to Congress at Black Hat USA 2013 keynote</a>.</p>
<p><em>Photo used with permission,&nbsp;<a href="http://www.flickr.com/photos/blackhatevents/9404943516/in/photostream/">courtesy of Black Hat Events</a>.</em></p><p>Just before the NSA Director's keynote, it was seen that eggs were being passed around the audience. The eggs were confiscated by security before the keynote began.</p>
<p>Read more in&nbsp;<a href="http://www.zdnet.com/nsa-director-accused-of-lying-to-congress-at-black-hat-usa-2013-keynote-7000018810/">NSA Director accused of lying to Congress at Black Hat USA 2013 keynote</a>.</p><p>During his packed Black Hat USA keynote NSA Director Keith Alexander assured the crowd that the NSA's surveillance programs are lawful interception; attendees did not hesitate to shout "Bullshit."</p>
<p>Read more in&nbsp;<a href="http://www.zdnet.com/nsa-director-accused-of-lying-to-congress-at-black-hat-usa-2013-keynote-7000018810/">NSA Director accused of lying to Congress at Black Hat USA 2013 keynote</a>.</p>
<p><em>Photo used with permission,&nbsp;<a href="http://www.flickr.com/photos/blackhatevents/9404943516/in/photostream/">courtesy of Black Hat Events</a>.</em></p><p>Black Hat organizer Trey Ford onstage at the NSA keynote. After the General's keynote, Ford facilitated a question-and-answer session with the audience where the questions were pre-screened, and Ford cautioned the audience that the General had the option of declining to answer any question.</p>
<p>Read more in&nbsp;<a href="http://www.zdnet.com/nsa-director-accused-of-lying-to-congress-at-black-hat-usa-2013-keynote-7000018810/">NSA Director accused of lying to Congress at Black Hat USA 2013 keynote</a>.</p>
<p><em>Photo used with permission,&nbsp;<a href="http://www.flickr.com/photos/blackhatevents/9404943516/in/photostream/">courtesy of Black Hat Events</a>.</em></p><p>Researcher Christine Dudley presenting her Wednesday talk <a href="https://www.blackhat.com/us-13/briefings.html#Dudley">Beyond the application: Cellular privacy regulation space</a>.</p>
<p><em>Photo used with permission,&nbsp;<a href="http://www.flickr.com/photos/blackhatevents/9404943516/in/photostream/">courtesy of Black Hat Events</a>.</em></p><p>Three Georgia Tech hackers have revealed how to hack iPhones and iPads with malware imitating ordinary apps in under sixty seconds using a "malicious charger."</p>
<p>At a Wednesday, July 31 Black Hat&nbsp;press conference, the researchers revealed for the first time exactly how the USB charger they built can compromise iOS devices in less than a minute.</p>
<p>Read more in&nbsp;<a href="http://www.zdnet.com/researchers-reveal-how-to-hack-an-iphone-in-60-seconds-7000018822/">Researchers reveal how to hack an iPhone in 60 seconds</a>.</p><p>Billy Lau, Yeongjin Jang and Chengyu Song showed how they made an ordinary looking charger into a malicious vector for transmitting malware using an open source&nbsp;<a href="http://beagleboard.org/Products/BeagleBoard">BeagleBoard</a>, available for $125 (similar to a Raspberry Pi).</p>
<p>For the demo, the Facebook app was used as an example.</p>
<p>Within seconds of plugging in the charger, the Facebook app was invisibly removed from the device and seamlessly replaced with a Facebook app imitation with a malicious payload.</p>
<p>Apple responded by Wednesday evening saying it will issue a patch in its Fall iOS 7 update.</p>
<p>Read more in&nbsp;<a href="http://www.zdnet.com/researchers-reveal-how-to-hack-an-iphone-in-60-seconds-7000018822/">Researchers reveal how to hack an iPhone in 60 seconds</a>.</p><p>Lavish booths, costumes and plenty of giveaways made the Sponsor Hall an attraction.</p>
<p><em>Photo used with permission,&nbsp;<a href="http://www.flickr.com/photos/blackhatevents/9404943516/in/photostream/">courtesy of Black Hat Events</a>.</em></p><p>At the&nbsp;<a href="http://www.blackhat.com/us-13/arsenal.html">Black Hat Arsenal</a>,<strong>&nbsp;</strong>Researchers demoed&nbsp;<a >web application security audits</a>,&nbsp;and much more.</p>
<p><em>Photo used with permission,&nbsp;<a href="http://www.flickr.com/photos/blackhatevents/9404943516/in/photostream/">courtesy of Black Hat Events</a>.</em></p><p>In the Black Hat Arsenal area, popular company <a href="http://pwnieexpress.com/">Pwnie Express</a> was a huge draw. The company launched its newest product at Black Hat this week, <a href="http://pwnieexpress.com/blogs/pwnie/8402911-announcing-the-pwn-plug-r2">the Pwn Plug R2</a>.</p>
<p><em>Photo used with permission,&nbsp;<a href="http://www.flickr.com/photos/blackhatevents/9404943516/in/photostream/">courtesy of Black Hat Events</a>.</em></p><p>At the side of the Black Hat Sponsor Hall, cheeky data tracking and security company <a href="https://filetrek.com/">FileTrek</a> ran a "Hero or villian?" vote (we'll be back tomorrow to see how conference attendees voted).</p>
<p>Its booth and cardboard cutout of Edward Snowden was situated directly across the aisle from Snowden's former government contractor employer, Booz Allen Hamilton.&nbsp;</p>
<p>See also:</p>
<ul>
<li><a >Black Hat 2013: talks and panels 'hot list'</a></li>
<li><a >Researchers reveal how to hack an iPhone in 60 seconds&nbsp;at Black Hat 2013</a></li>
<li><a >NSA Director accused of lying to Congress at Black Hat USA 2013 keynote</a></li>
<li><a >NSA Director Alexander Black Hat USA 2013 Keynote: Gallery</a></li>
</ul>]]></media:text>
		</item>
		<item>
			<guid isPermaLink="false">7000018822</guid>
			<link><![CDATA[http://www.zdnet.com/researchers-reveal-how-to-hack-an-iphone-in-60-seconds-7000018822/]]></link>
			<title><![CDATA[Researchers reveal how to hack an iPhone in 60 seconds]]></title>
			<description><![CDATA[Three Georgia Tech hackers have disclosed how to hack iPhones and iPads with malware in under sixty seconds using a "malicious charger." UPDATED.]]></description>
			<pubDate><![CDATA[Thu, 01 Aug 2013 05:05:04 +0000]]></pubDate>
			<media:credit role="author"><![CDATA[Violet Blue]]></media:credit>
			<s:doctype><![CDATA[Text]]></s:doctype>
			<category domain="http://www.zdnet.com/topic-apple/">Apple</category>
			<category domain="http://www.zdnet.com/topic-ios/">iOS</category>
			<category domain="http://www.zdnet.com/topic-iphone/">iPhone</category>
			<category domain="http://www.zdnet.com/topic-ipad/">iPad</category>
			<media:text type="html"><![CDATA[<p>Three Georgia Tech hackers have revealed how to hack iPhones and iPads with malware imitating ordinary apps in under sixty seconds using a "malicious charger."</p>
<p>Today at a <a href="http://www.blackhat.com/us-13/">Black Hat USA 2013</a> press conference, the researchers revealed for the first time exactly how the USB charger they built can compromise iOS devices in less than a minute.</p>
<figure class="alignRight"><img title="Mactans" alt="Mactans" src="http://cdn-static.zdnet.com/i/r/story/70/00/018822/dsc02934-200x133.jpg?hash=BTDmZTAuAz&upscale=1" height="133" width="200"></figure>
<p>Billy Lau, Yeongjin Jang and Chengyu Song showed how they made an ordinary looking charger into a malicious vector for transmitting malware using an open source <a href="http://beagleboard.org/Products/BeagleBoard">BeagleBoard</a>, available for $125 (similar to a Raspberry Pi).</p>
<p>For the demonstration, the researchers used an iPhone. They plugged in the phone, and when the passcode was entered, the sign-code attack began.</p>
<p>For the demo, the Facebook app was used as an example.</p>
<p>Within seconds of plugging in the charger, the Facebook app was invisibly removed from the device and seamlessly replaced with a Facebook app imitation with a malicious payload.</p>
<p>The app's icon was in the exact same spot as it was before the attack - there is no way of knowing the application is not malware.</p>
<p>The researchers said that all the user needs to do to start the attack is enter their passcode - they pointed out that this is a pattern of ordinary use, such as to check a message while the phone is charging.</p>
<p>Once the app was launched, the malware was launched and the phone was compromised - and could do things such as take screenshots when other passwords are entered, send a spoofed screen, and more.</p>
<p>In this manner, depending on what payload the attacker has put on the fake app, sensitive data could be accessed and compromised in a variety of ways.</p>
<p>The researchers found malicious ways to call and use the private API; the attack works on physical weaknesses, and operates on all versions of iOS, stock (up to the beta developer version of 7, which is the only version that Apple has patched).</p>
<p>The operating system used for the attack is Linux, and the researchers acknowledged that someone could easily use a Raspberry Pi instead of a BeagleBoard.</p>
<p>No root permission is accessed for the attack.</p>
<p>The targeted iOS device does not need to be jailbroken in order for the attack to be successful. It only needs to be plugged in to the innocuous seeming, but poisoned, iOS charger.</p>
<p>The Mactans charger is no longer a charger, but its own little computer - running custom software that immediately cracks and infects any attached Apple gadget; Mactans can install software unknown to the user.</p>
<p>Details of the vulnerability, something the researchers held back on disclosing until now, will be described in more deatil in researchers' Black Hat talk today, "<a href="http://www.blackhat.com/us-13/briefings.html#Lau">Mactans: Injecting Malware Into iOS Devices Via Malicious Chargers</a>."</p>
<p>The researchers disclosed the attack and vulnerability to Apple, but it appears that Apple hasn’t addressed or fixed the issue for versions prior to 7 (beta, developer release) - the hackers had previously stated they refused to reveal details until their Black Hat presentation.</p>
<p>The venomous iOS charger is called "Mactans" - Latin name for the virulent and pernicious Black Widow spider.</p>
<p>The researchers explained,</p>
<blockquote>
<p>Mactans was built with [a] limited amount of time and a small budget, we also briefly consider what more motivated, well-funded adversaries could accomplish.</p>
</blockquote>
<p>The researchers contacted Apple - and Apple has patched iOS 7 to prevent the attack. Currently, all other versions are vulnerable.</p>
<p>Needless to say, iPhone, iPad and other iOS device users will want to be sure not to leave their chargers laying around - or use any "community" chargers from here on out.</p>
<figure><img title="Mactans" alt="Mactans" src="http://cdn-static.zdnet.com/i/r/story/70/00/018822/dsc02945-620x414.jpg?hash=AJRjAwZ1Zw&upscale=1" height="414" width="620"></figure>
<p>&nbsp;</p>
<p><a href="http://www.blackhat.com/us-13/briefings.html#Lau">Mactans: Injecting Malware into iOS Devices via Malicious Chargers</a> will be presented today, July 30, in room Augustus 3/4 at 5:00 pm.</p>
<p><strong>UPDATE Wednesday July 1, 8:50 pm:</strong> In a late evening announcement Apple stated it will be <a href="http://www.reuters.com/article/2013/08/01/us-apple-hacking-idUSBRE97002120130801">fixing the vulnerability in the Fall release of its iOS 7 update</a>. Apple has not specified a date for the fix. This means devices are vulnerable to the attack until the release, as are all previous versions of the OS. The issue has only been fixed in the beta version of 7, released to developers.</p>]]></media:text>
		</item>
		<item>
			<guid isPermaLink="false">7000018815</guid>
			<link><![CDATA[http://www.zdnet.com/nsa-director-alexander-black-hat-usa-2013-keynote-gallery-7000018815/]]></link>
			<title><![CDATA[NSA Director Alexander Black Hat USA 2013 Keynote: Gallery]]></title>
			<description><![CDATA[During his packed Black Hat USA keynote NSA Director Keith Alexander assured the crowd that the NSA's surveillance programs are lawful interception; attendees did not hesitate to shout "Bullshit."]]></description>
			<pubDate><![CDATA[Thu, 01 Aug 2013 01:37:05 +0000]]></pubDate>
			<media:credit role="author"><![CDATA[Violet Blue]]></media:credit>
			<s:doctype><![CDATA[Gallery]]></s:doctype>
			<category domain="http://www.zdnet.com/topic-government-us/">Government US</category>
			<media:text type="html"><![CDATA[<p>At leading security conference Black Hat USA 2013 Gen. Keith Alexander, Commander, U.S. Cyber Command (USCYBERCOM) and Director of the NSA told attendees&nbsp;<a href="https://www.blackhat.com/us-13/briefings.html#Alexander">in the event's opening keynote</a>&nbsp;that "the same people who uphold the Constitution are the same people that run these programs"</p>
<p>Read the full report in: <a href="http://www.zdnet.com/nsa-director-accused-of-lying-to-congress-at-black-hat-usa-2013-keynote-7000018810/">NSA Director accused of lying to Congress in Black Hat USA 2013 Keynote</a>.</p><p>Alexander explained that he wanted to, "give attendees an insider&rsquo;s look into the U.S. Cyber Command and the interworking of offensive cyber strategy" and he did, showing slides with prepared information about some of the surveillance programs used by the NSA.</p>
<p>Read the full report in:&nbsp;<a href="http://www.zdnet.com/nsa-director-accused-of-lying-to-congress-at-black-hat-usa-2013-keynote-7000018810/">NSA Director accused of lying to Congress in Black Hat USA 2013 Keynote</a>.</p><p>The main thrust of the NSA Director's speech was that the NSA's surveillance programs were to protect Americans and combat foreign threats.</p>
<p>He told Black Hat in regard to the NSA's data collection requests, "these are not rubber stamped."</p>
<p>Read the full report in:&nbsp;<a href="http://www.zdnet.com/nsa-director-accused-of-lying-to-congress-at-black-hat-usa-2013-keynote-7000018810/">NSA Director accused of lying to Congress in Black Hat USA 2013 Keynote</a>.</p><p>When NSA Director General Keith Alexander told the attendees of&nbsp;<a href="http://www.blackhat.com/">Black Hat USA 2013</a>&nbsp;that, speaking as the NSA, "we stand for freedom" - a member of the audience immediately shouted, "Bullshit!"</p>
<p>The vociferous crowd did not hesitate to talk back. One attendee shouted, "what I'm saying is that we don't trust you." Another accused the General of lying to Congress and shouted, "How do we know you're not lying to us right now?"</p>
<p>Near the talk's end, an attendee shouted that General Alexander should read the Constitution.</p>
<p>He responded saying, "I have. You should, too."</p>
<p>Read the full report in:&nbsp;<a href="http://www.zdnet.com/nsa-director-accused-of-lying-to-congress-at-black-hat-usa-2013-keynote-7000018810/">NSA Director accused of lying to Congress in Black Hat USA 2013 Keynote</a>.</p><p>The General's speech stressed that the NSA's focus was on terrorism suspects, and minimized the scope of the surveillance programs.</p>
<p>Read the full report in:&nbsp;<a href="http://www.zdnet.com/nsa-director-accused-of-lying-to-congress-at-black-hat-usa-2013-keynote-7000018810/">NSA Director accused of lying to Congress in Black Hat USA 2013 Keynote</a>.</p><p>Today's keynote comes during the NSA's most turbulent time in history - under Alexander's watch - when it has been rocked by Wikileaks, the Manning trial, former contractor turned whistleblower Edward Snowden and the Prism leaks, and widespread outrage at the revealed extent of the NSA's domestic and global surveillance programs.</p>
<p>The NSA Director told attendees of North America's leading security conference that he was at Black Hat to ask for the help of the security professionals in attendance for their help, most especially if they felt the programs were wrong.</p>
<p>Read the full report in:&nbsp;<a href="http://www.zdnet.com/nsa-director-accused-of-lying-to-congress-at-black-hat-usa-2013-keynote-7000018810/">NSA Director accused of lying to Congress in Black Hat USA 2013 Keynote</a>.</p><p>Americans, US politicians and the over 7,000 attendees of Black Hat USA 2013 are currently struggling with revelations and further, previous allegations that the NSA has been surveilling them and spying on their digital communications far more than was previously believed, known or even understood.</p>
<p>Last year, the Director controversially delivered a keynote at DEF CON, the hacker conference after Black Hat. He was not invited back this year.</p>
<p>Only two weeks ago, <a href="http://www.zdnet.com/feds-not-welcome-at-def-con-hacker-conference-7000017926/">Federal agents were openly disinvited to DEF CON by the organizer</a>, in a blog post saying that the conference needed "time off" in its bizarre relationship with "Feds."</p>
<p>Read the full report in:&nbsp;<a href="http://www.zdnet.com/nsa-director-accused-of-lying-to-congress-at-black-hat-usa-2013-keynote-7000018810/">NSA Director accused of lying to Congress in Black Hat USA 2013 Keynote</a>.</p>]]></media:text>
		</item>
		<item>
			<guid isPermaLink="false">7000018810</guid>
			<link><![CDATA[http://www.zdnet.com/nsa-director-accused-of-lying-to-congress-at-black-hat-usa-2013-keynote-7000018810/]]></link>
			<title><![CDATA[NSA Director accused of lying to Congress at Black Hat USA 2013 keynote]]></title>
			<description><![CDATA[During his packed Black Hat USA keynote NSA Director Keith Alexander assured the crowd that the NSA's surveillance programs are lawful interception; attendees did not hesitate to shout "Bullshit."]]></description>
			<pubDate><![CDATA[Thu, 01 Aug 2013 00:27:04 +0000]]></pubDate>
			<media:credit role="author"><![CDATA[Violet Blue]]></media:credit>
			<s:doctype><![CDATA[Text]]></s:doctype>
			<category domain="http://www.zdnet.com/topic-government-us/">Government US</category>
			<media:text type="html"><![CDATA[<!-- Parsed pinbox:"10124892" -->
<div class="relatedContent alignRight"><h3>Read this</h3>
<div><a href="http://www.zdnet.com/researchers-reveal-how-to-hack-an-iphone-in-60-seconds-7000018822/" class="thumb"><img src="http://cdn-static.zdnet.com/i/r/story/70/00/018822/researchers-reveal-how-to-hack-an-iphone-in-60-seconds-220x165.jpg?hash=ZmOwAGuwZw&upscale=1" alt="Researchers reveal how to hack an iPhone in 60 seconds" width="220" height="165" /></a></div><p><a href="http://www.zdnet.com/researchers-reveal-how-to-hack-an-iphone-in-60-seconds-7000018822/">Researchers reveal how to hack an iPhone in 60 seconds</a></p>
<ul class="alignRight"><li><a href="http://www.zdnet.com/researchers-reveal-how-to-hack-an-iphone-in-60-seconds-7000018822/">Read more</a></li></ul></div>
<p>When NSA Director General Keith Alexander told the attendees of <a href="http://www.blackhat.com/">Black Hat USA 2013</a> that, speaking as the NSA, "we stand for freedom" - a member of the audience immediately shouted, "Bullshit!"</p>
<p>The rogue comment was received by the crowd with applause. The General acknowledged the comment and response, and moved on to continue telling the hackers and security professionals that the NSA's surveillance programs had prevented multiple terrorist attacks around the world.</p>
<ul>
<li>See the full gallery of the General's keynote and slides in&nbsp;<a href="http://www.zdnet.com/nsa-director-alexander-black-hat-usa-2013-keynote-gallery-7000018815/">NSA Director Alexander Black Hat USA 2013 Keynote: Gallery</a>.</li>
</ul>
<figure class="alignLeft"><img title="black-hat-2013-logo" alt="black-hat-2013-logo" src="http://cdn-static.zdnet.com/i/r/story/70/00/018810/black-hat-2013-logo-200x99.png?hash=AmOzLzD1AQ&upscale=1" height="99" width="200"></figure>
<p>At leading security conference Black Hat USA 2013 Gen. Keith Alexander, Commander, U.S. Cyber Command (USCYBERCOM) and Director of the NSA told attendees <a href="https://www.blackhat.com/us-13/briefings.html#Alexander">in the event's opening keynote</a> that "the same people who uphold the Constitution are the same people that run these programs"</p>
<p>He later went on to tell the room that the people at risk were heroes, and that was "no bullshit."</p>
<p>An equal amount of applause scattered throughout the room.</p>
<p>Alexander explained that he wanted to, "give attendees an insider’s look into the U.S. Cyber Command and the interworking of offensive cyber strategy" and he did, showing slides with prepared information about some of the surveillance programs used by the NSA.</p>
<p>The main thrust of the NSA Director's speech was that the NSA's surveillance programs were to protect Americans and combat foreign threats.</p>
<p>He told Black Hat in regard to the NSA's data collection requests, "these are not rubber stamped."</p>
<p>The Director emphasized that, "we do not see the content of your calls."</p>
<p>He continued, loosely describing the methods used to trace and individual number. He said,</p>
<blockquote>
<p>To get a number approved, there are only 22 people at the NSA that can approve that number. Only numbers on the lists compiled [of terrorism suspects] can be queried.</p>
<p>Only 35 people at the NSA are allowed to do queries into that database.</p>
</blockquote>
<p>He stressed the training that those individuals are required to complete. The General's speech stressed that the NSA's focus was on terrorism suspects, and minimized the scope of the surveillance programs.</p>
<figure><a href="http://www.zdnet.com/nsa-director-alexander-black-hat-usa-2013-keynote-gallery-7000018815/" target="_blank"><img title="NSA Black Hat keynote" alt="NSA Black Hat keynote" src="http://cdn-static.zdnet.com/i/r/story/70/00/018810/nsa-black-hat-keynote-620x417.jpg?hash=ZGOuATAyMG&upscale=1" height="417" width="620"></a></figure>
<p>&nbsp;</p>
<p>He then told the audience,</p>
<blockquote>
<p>In 2012 there were less than 300 numbers approved for queries. Those queries resulted in 12 reports to the FBI (...) they contained less than 500 minutes. The intent of this program is to find a terrorist actor and identify them to the FBI.</p>
</blockquote>
<p>General Alexander went on to state that the NSA's programs, the very ones under fire in the press - such as Prism - were directly responsible for finding known terrorists. "This is our lawful intercept program."</p>
<p>"We have the courts, Congress and lawmakers looking at what we do." Referring to a slide projected for the audience he continued, "This shows you we have 100% auditability on every query we make. (...) We worked with committees in Congress for a directorate of compliance."</p>
<p>The vociferous crowd did not hesitate to talk back. One attendee shouted, "what I'm saying is that we don't trust you." Another accused the General of lying to Congress and shouted, "How do we know you're not lying to us right now?"</p>
<p>The NSA Director told attendees of North America's leading security conference that he was at Black Hat to ask security professionals in attendance for their help, most especially if they felt the programs were wrong.</p>
<p>Near the talk's end, an attendee shouted that General Alexander should read the Constitution.</p>
<figure class="alignRight"><a href="http://www.zdnet.com/nsa-director-alexander-black-hat-usa-2013-keynote-gallery-7000018815/" target="_blank"><img title="NSA Director Keith Alexander at Black Hat 2013" alt="NSA Director Keith Alexander at Black Hat 2013" src="http://cdn-static.zdnet.com/i/r/story/70/00/018810/dsc02904-200x129.jpg?hash=MQWuAQHkZT&upscale=1" height="129" width="200"></a></figure>
<p>He responded saying, "I have. You should, too."</p>
<p>The General's retort was met with applause.</p>
<p>Gen. Alexander's talk was presented in the atmosphere of today's new allegations in the Guardian UK that the NSA tool <a href="http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data">"XKeyscore" collects nearly everything a user does on the internet</a> - and alleges that NSA analysts require no prior authorization for searches.</p>
<p>Americans, US politicians and the over 7,000 attendees of Black Hat USA 2013 are currently struggling with revelations and further, previous allegations that the NSA has been surveilling them and spying on their digital communications far more than was previously believed, known or even understood.</p>
<p>At last year's DEF CON keynote - the hacker conference following Black Hat every year - Director Alexander had denied NSA surveillance and spying to the audience when directly asked.</p>
<p>Alexander responded saying that this was "absolute nonsense." He continued, saying that managing hundreds of millions of individual citizen files would be impossible for the department to do.</p>
<p>Today's keynote comes during the NSA's most turbulent time in history - under Alexander's watch - when it has been rocked by Wikileaks, the Manning trial, former contractor turned whistleblower Edward Snowden and the Prism leaks, and widespread outrage at the revealed extent of the NSA's domestic and global surveillance programs.</p>
<p>Last year, the Director controversially delivered a keynote at DEF CON, the hacker conference after Black Hat. He was not invited back this year.</p>
<p>Only two weeks ago, Federal agents were openly disinvited to DEF CON by the organizer, in a blog post saying that the conference needed "time off" in its bizarre relationship with "Feds."</p>
<p><strong>Conflict between NSA DEF CON keynote and Snowden leaks</strong></p>
<p>Alexander's DEF CON keynote, presented in a black t-shrt and jeans, had the NSA Director saying that DEF CON was the "world's best cybersecurity community" and asked hackers for their help.</p>
<p>The NSA Director was asked during DEF CON's Q and A if the NSA keeps files on all US citizens.</p>
<p>CNET reported that <a href="http://news.cnet.com/8301-1009_3-57481689-83/nsa-director-finally-greets-defcon-hackers/">General Alexander had stated</a>,</p>
<blockquote>
<p>"No we don't. Absolutely not," he said. "Our job is foreign intelligence. We get oversight by Congress...everything we do is auditable by them, by the FISA (Foreign Intelligence Surveillance Act)...and by the (Obama) Administration."</p>
<p>He acknowledged that occasionally there are slip ups. "We may, incidentally in targeting a bad guy, hit on a good guy," he said. "We have requirements from (the FISA) court and the attorney general to minimize that."</p>
</blockquote>
<p>At DEF CON last year he told hackers,</p>
<blockquote>
<p>In this room right here is the talent we need to secure cyberspace. You know we can protect the networks and have civil liberties and privacy and you can help us get there.</p>
</blockquote>
<p>He had also told the audience of hackers and digital privacy activists that the United States needed "better sharing between private companies and the government" and Alexander ominously added that this was something that then-current proposed cybersecurity legislation can help fix.</p>
<p>Alexander was referring to the doomed Cybersecurity Act of 2012, which was effectively Son of CISPA with a few privacy provisions. Many considered CSA 2012 as the Guardian described it, "<a href="http://www.theguardian.com/commentisfree/2012/aug/02/cybersecurity-act-surveillance-bill-disguise">a surveillance bill in disguise</a>" - effectively outsourcing the NSA's data surveillance to private companies, who are not held under the 4th amendment, and would have received immunity for handing over the data.</p>
<p><strong>UPDATE Wednesday July 31, 8:45 pm</strong>: Just before the General's keynote, it was seen that eggs were being passed around the audience. The eggs were confiscated by security before the keynote began.</p>
<p>&nbsp;</p>
<blockquote class="twitter-tweet">
<p>Mikko Hypponen's mysteriously vanished tweet at Blackhat 2013 just as N S A director was about to speak. Eggs? <a href="http://t.co/YHjH3li6CL">http://t.co/YHjH3li6CL</a></p>
— Paul Blackburn (@mpb) <a href="https://twitter.com/mpb/statuses/362704379926687744">July 31, 2013</a></blockquote>
<p>&nbsp;</p>
<p>&nbsp;</p>
<blockquote class="twitter-tweet">
<p>Security friend admitted to handing out 60 eggs to people before general Alexander <a href="https://twitter.com/search?q=%23blackhat&amp;src=hash">#blackhat</a> talk. Disappointed by lack of use.</p>
— Al Billings (@makehacklearn) <a href="https://twitter.com/makehacklearn/statuses/362636655364022272">July 31, 2013</a></blockquote>
<p>&nbsp;</p>
<p>&nbsp;</p>
<blockquote class="twitter-tweet">
<p><a href="https://twitter.com/search?q=%23BlackHat&amp;src=hash">#BlackHat</a> Security confiscates a dozen eggs before GEN Alexander Keynote</p>
— James Bray (@Jhbray) <a href="https://twitter.com/Jhbray/statuses/362620864438603778">July 31, 2013</a></blockquote>
<p>&nbsp;</p>]]></media:text>
		</item>
		<item>
			<guid isPermaLink="false">7000018718</guid>
			<link><![CDATA[http://www.zdnet.com/cybercrime-bigger-threat-than-nuclear-war-uk-lawmakers-say-7000018718/]]></link>
			<title><![CDATA[Cybercrime 'bigger threat than nuclear war', UK lawmakers say]]></title>
			<description><![CDATA[Following the lead of the U.S., U.K. lawmakers say that preventing cybercrime is now a top priority.]]></description>
			<pubDate><![CDATA[Tue, 30 Jul 2013 14:38:04 +0000]]></pubDate>
			<media:credit role="author"><![CDATA[Charlie Osborne]]></media:credit>
			<s:doctype><![CDATA[Text]]></s:doctype>
			<category domain="http://www.zdnet.com/topic-united-kingdom/">United Kingdom</category>
			<media:text type="html"><![CDATA[<figure class="alignRight"><img title="it-security" alt="it-security" src="http://cdn-static.zdnet.com/i/r/story/70/00/018718/it-security-v1-200x150.jpg?hash=MQtjL2D4Mz&upscale=1" height="150" width="200"></figure>
<p>Is the threat of cybercrime more of concern than a nuclear bomb? The U.K. government believes so.</p>
<p>The U.K. Home Affairs Committee, a panel dedicated to scrutinizing governmental policy, has released a report which claims the country is failing in efforts to protect businesses and consumers against cybercrime. After a ten-month inquiry, the committee released its <a href="http://www.parliament.uk/business/committees/committees-a-z/commons-select/home-affairs-committee/news/130729-e-crime-rpt-published/">report on E-crime</a>, saying that 25 countries have chosen the United Kingdom as a primary target due to the valuable information stored on servers, including bank and financial data.</p>
<p>The report says there is a "black hole" where cybercriminals have free reign to attack targets, and are able to do so due to a lack of active police enforcement. Cybercrimes are often left unreported, and instead of rooting out the problem, banks will often just reimburse customers who may have had their identity or banking details stolen.</p>
<p>As a result, cybercriminals are able to reap large profits with few repercussions, especially if they systematically attack through low-level fraud rather than aim for high-profile targets.</p>
<p>Committee Chair and MP Keith Vaz said:</p>
<blockquote>
<p>"We are not winning the war on online criminal activity. We are being too complacent about these E-wars because the victims are hidden in cyberspace. The threat of a cyber attack to the U.K. is so serious it is marked as a higher threat than a nuclear attack."</p>
</blockquote>
<p>This opinion reflects U.S. intelligence chiefs who said in March that <a href="http://www.zdnet.com/is-cybercrime-more-of-a-threat-than-terrorism-7000012526/">cybercrime has replaced terrorism</a> as the "top threat" facing the United States.</p>
<p>The panel says that sentencing guidelines should be reviewed in order to properly punish cybercriminals, and hackers should "receive the same sentences as if they had stolen the same amount of money or data offline."</p>
<p>Vaz commented:</p>
<blockquote>
<p>"If we don’t have a 21st century response to this 21st century crime, we will be letting those involved in these gangs off the hook. We need to establish a state of the art espionage response centre. At the moment the law enforcement response to e-criminals is fractured and half of it is not even being put into the new National Crime Agency."</p>
</blockquote>
<p>The committee also approves U.K. Prime Minister David Cameron's <a href="http://www.zdnet.com/the-key-to-cleaning-up-the-internet-is-tackling-the-darknets-not-letting-censorship-in-by-the-back-door-7000018339/">recent proposal</a> to place "porn filters" on search engines and block websites that have content deemed "inappropriate," including pornography and terrorism indictment. While many believe the filters are the first step towards online censorship and the U.K.'s very own version of the Great Firewall of China, the report argues:</p>
<blockquote>
<p>It is still too easy for people to access inappropriate online content, particularly indecent images of children, terrorism incitement and sites informing people how to commit online crime. There is no excuse for complacency.</p>
<p>The committee urges those responsible to take stronger action to remove such content. The government should draw up a mandatory code of conduct with them to remove material which breaches acceptable standards.</p>
</blockquote>
<p>As a result, the MPs are "alarmed" that the Child Exploitation &amp; Online Protection Centre (CEOP) is due to suffer budget cuts of 10 percent over the next four years. If porn-related filters go ahead, cutting away the CEOP's resources may result in inappropriate websites slipping through the net and therefore more children placed at risk.</p>
<p>To try and reinforce these claims, the report uses the murder cases of April Jones and Tia Sharp to suggest there are "terrible consequences" to being able to access child pornography online, and says that the next generation of citizens are being "radicalized" as they can access the preaching of clerics including Anwar al-Awlaki on YouTube.</p>
<p>Whether having access to such content prompts action is arguable, but Vaz believes that ISPs, search engine and social media networks are "far too laid back" and failing to censor or take down "inappropriate content." The MP says that if service providers fail to act, the "government should legislate.'</p>]]></media:text>
		</item>
		<item>
			<guid isPermaLink="false">7000018657</guid>
			<link><![CDATA[http://www.zdnet.com/black-hat-2013-talks-and-panels-hot-list-7000018657/]]></link>
			<title><![CDATA[Black Hat 2013: talks and panels 'hot list']]></title>
			<description><![CDATA[Leading security conference Black Hat boasts over 100 talks that include hacking nuclear facilities, rooting SIM cards, OPSEC failures of spies, a keynote from the NSA and more. Here's a 'hot list' of 2013's riveting talks and demos.]]></description>
			<pubDate><![CDATA[Mon, 29 Jul 2013 15:38:05 +0000]]></pubDate>
			<media:credit role="author"><![CDATA[Violet Blue]]></media:credit>
			<s:doctype><![CDATA[Text]]></s:doctype>
			<category domain="http://www.zdnet.com/topic-apps/">Apps</category>
			<category domain="http://www.zdnet.com/topic-data-centers/">Data Centers</category>
			<category domain="http://www.zdnet.com/topic-government-us/">Government US</category>
			<category domain="http://www.zdnet.com/topic-legal/">Legal</category>
			<category domain="http://www.zdnet.com/topic-networking/">Networking</category>
			<media:text type="html"><![CDATA[<p>In its sixteenth year, <a href="http://www.blackhat.com/us-13/">Black Hat USA 2013</a>&nbsp;will introduce nearly a hundred new security tools and 35 0-days in a record 110 unique Briefings (talks) and workshops, with 131 companies showcasing their security solutions on-site.</p>
<p>An estimated 7,000 high-level security experts are set to attend Black Hat this year. It takes place this week, July 27 – August 1, 2013, at Caesars Palace in Las Vegas.</p>
<figure class="alignRight"><img title="Black-Hat-2013" alt="Black-Hat-2013" src="http://cdn-static.zdnet.com/i/r/story/70/00/018657/black-hat-2013-200x100.jpg?hash=MzZ2BQIvMw&upscale=1" height="100" width="200"></figure>
<p>A security conference leader, Black Hat blends hackers, corporations, researchers of all kinds, law enforcement and Feds, in hats ranging from snow-white to so black they actually absorb light.</p>
<p>These attendees will be wearing their nicest professional, casual-Friday armor to meet on neutral territory - all comprising an event that may be the world's biggest confluence of virtual arms dealers.</p>
<p>Black Hat has cautioned press, "You are about to enter one the most hostile environments in the world."</p>
<p>The list of precautions is long, and includes not to use any ATM machines around the conference, keep our hotel keys deep in our belongings, not to use the wi-fi unless we are security experts, not to leave any devices out of sight (EVER!), and to change all of our passwords immediately after leaving Las Vegas.</p>
<p>Still, the list of cautions will probably not be enough.</p>
<p>There is so much to see and absorb at Black Hat 2013, it will likely be a Vegas gamble worth taking. The packed schedule proves that Black Hat wanted to raise the excitement meter to eleven this year.</p>
<p>To mediate overwhelm, we've compiled an insider's 'hot list'.</p>
<p>Outside of the usual press releases, we asked organizers what they think will be hot, as well as compiling our own list. Combining the results, we've got a hell of a starting point for attendees listed here:</p>
<ul>
<li><a </li>
</ul>
<ul>
<li><a >Mactans: Injecting Malware into iOS Devices via Malicious Chargers - Billy Lau</a>. They'll demonstrate how an Apple iOS device can be compromised within one minute of being plugged into a malicious charger, and disclose the details of the vulnerability on-site – something they've held back on so far.</li>
</ul>
<ul>
<li><a >Rooting SIM Cards - Karsten Nohl</a>. Karsten will disclose his vulnerability onsite; the UN's ITU issued a global warning about it.</li>
</ul>
<ul>
<li><a >Compromising Industrial Facilities from 40 Miles Away - Lucas Apa</a>. Compromises around nuclear/energy, gas and oil facilities, among others - including shutting them down remotely - even from 40 miles away.</li>
</ul>
<ul>
<li><a >Energy Fraud and Orchestrated Blackouts: Issues With Wireless Metering Protocols (WM-Bus) - Cyrill Brunschwiler</a>. Energy fraud + widespread orchestrated blackouts are far easier than anyone thinks; Brunschwiler will disclose new flaws in wireless smart meters, resulting in not only a good cheat on your energy bill... but also widespread blackouts as the energy grid is directly impacted. Californians take note.</li>
</ul>
<ul>
<li><a >Lets Get Physical: Breaking Home Security Systems and Bypassing Buildings' Controls - Drew Porter, Stephen Smith</a>. Hardware-based vulnerabilities impacting a very broad audience – specifically impacts smart homes.</li>
</ul>
<ul>
<li><a >Home Invasion v2.0: Attacking Network Controlled Hardware Jennifer Savage, Daniel Crowley, David Bryan</a>. This team has hacked home-based network-connected devices and reveal how havoc or danger could be unleashed at home - specifically, ones that have been 'impossible' to hack until now - from space heaters to door locks, surveillance systems and much more.</li>
</ul>
<ul>
<li><a >What Security Researchers Need to Know About Anti-Hacking Law - Marcia Hofmann</a>. Reduce risk by finding out ways to reduce potential legal trouble from a number of things researchers wonder about; Hofmann surveys issues relevant to researchers now, including cases on port scanning, violating website terms of use, and designing tools capable of bypassing technical access controls.</li>
</ul>
<ul>
<li><a </li>
</ul>
<ul>
<li><a >Above my Pay Grade: Cyber Response at the National Level - Jason Healey</a>. Examining the decisions and actions at all levels of response escalation when a cyber attack is also a national security event, using an example attack on the finance sector, from banks to the military and presidential level.</li>
</ul>
<ul>
<li><a </li>
</ul>
<ul>
<li><a >Exploiting Network Surveillance Cameras Like a Hollywood Hacker - Craig Heffner</a>. A live demonstration of leveraging vulnerabilities described in this talk to freeze and modify legitimate video streams from cameras such as those found in in homes, businesses, hotels, casinos, banks and prisons, as well as military and industrial facilities.</li>
</ul>
<ul>
<li><a >Aaron Swartz, Weev, the CFAA and The Future - Kurt Opsahl, EFF</a> [panel]. With the dangers of the CFAA and overzealous, uneducated prosecutors now known, the infosec community has been thrust into the role of educating and persuading lawmakers to reform this dangerous law. The EFF's Opsahl leads a panel and on-the-spot outreach to the community to discuss and propose tactics on all levels.</li>
</ul>
<ul>
<li><a  Being served with a search warrant for a criminal investigation can be scary enough, but if you're the target of a national security investigation, you won't be allowed to tell anyone about it. This panel discusss the technical risks of surveillance architectures, the legal and technical defenses against over-broad or invasive searches, and actual experiences fighting against secret surveillance orders.</li>
</ul>
<p><strong>Mobile hot list highlights:</strong></p>
<p>Threats to mobile devices such as injecting malware into <a href="http://www.blackhat.com/us-13/briefings.html#Lau">Apple’s iOS devices with malicious chargers</a>, intercepting traffic and SMS messages through <a href="http://www.blackhat.com/us-13/briefings.html#Ritter">compromised femtocells</a> <a href="http://www.blackhat.com/us-13/briefings.html#Weinmann">cracking BlackBerry’s new OS 10</a>, <a href="http://www.blackhat.com/us-13/briefings.html#Nohl">rooting SIM cards</a> and building a <a href="http://www.blackhat.com/us-13/briefings.html#McNamee">spyphone</a> that can record conversations and send messages without you ever knowing.</p>
<p><strong>Infrastructure hot list highlights:</strong></p>
<p>Preventing attacks on critical infrastructure and national security with talks around <a href="http://www.blackhat.com/us-13/briefings.html#Reidy">insider threats at the FBI</a>, <a href="http://www.blackhat.com/us-13/briefings.html#Brunschwiler">energy fraud and orchestrated blackouts</a>, <a href="http://www.blackhat.com/us-13/briefings.html#Apa">compromising industrial facilities</a>, <a href="http://www.blackhat.com/us-13/briefings.html#Forner">threats to major oil and gas pipelines</a> and <a href="http://www.blackhat.com/us-13/briefings.html#Heffner">exploiting network surveillance cameras</a>.</p>
<p><strong>Home attacks hot list:</strong></p>
<p>Exposing vulnerabilities within our homes from <a href="http://www.blackhat.com/us-13/briefings.html#Fouladi">automation systems</a> such as HVAC and lighting, to other network-controlled devices such as <a href="http://www.blackhat.com/us-13/briefings.html#Crowley">door locks and garage sensors</a>, to hacking <a href="http://www.blackhat.com/us-13/briefings.html#Porter">some of the most well known home security systems</a> and even <a href="http://www.blackhat.com/us-13/briefings.html#Lee">the newest smart TVs</a>.</p>
<p><strong>At the <a href="http://www.blackhat.com/us-13/arsenal.html">Black Hat Arsenal</a>:</strong></p>
<p>Researcher demo highlights: <a href="https://www.blackhat.com/us-13/arsenal.html#Illera">bypassing a car’s security for less than 25 dollars</a>, to <a href="http://www.blackhat.com/us-13/arsenal.html#Weidman1">analyzing smartphone penetration testing</a> and performing <a href="http://www.blackhat.com/us-13/arsenal.html#Schmidt">web application security audits</a>.</p>
<p>Can't make it, or just want to keep pace with Black Hat?&nbsp;</p>
<p>Follow Black Hat Briefings on <a href="https://twitter.com/BlackHatEvents">Twitter @BlackHatEvents</a>, check <a href="http://www.facebook.com/blackhat">Black Hat on Facebook</a>, and connect with <a href="http://www.linkedin.com/groups?home=&amp;gid=37658&amp;trk=anet_ug_hm">Black Hat on its LinkedIn Group</a> - social updates can be found at hashtag <a href="https://twitter.com/search?q=%23BlackHat">#BlackHat</a>.&nbsp;Watch for photos on the <a >Black Hat Events Flickr account</a>.</p>
<p><em>An item I had selected for this list was <a href="http://www.blackhat.com/us-13/briefings.html#Jack">Implantable Medical Devices: Hacking Humans by Barnaby Jack</a> - it had been recommended to me by all experts and organizers I queried. There are many heavy hearts at the passing of Mr. Jack, and the sadness is palpable. He will be so very deeply missed. Black Hat has held his room time and talk slot open: Black Hat will not be replacing Barnaby’s talk on Thursday, Aug. 1. The hour will be left vacant for friends and family to gather: Black Hat has set aside the time to commemorate his life and work and stated to this year's attendees, "we encourage you to join us as we celebrate the legacy that he leaves behind."</em></p>]]></media:text>
		</item>
		<item>
			<guid isPermaLink="false">7000018591</guid>
			<link><![CDATA[http://www.zdnet.com/nasdaq-hackers-charged-following-largest-known-data-theft-in-history-7000018591/]]></link>
			<title><![CDATA[Nasdaq hackers charged following 'largest known data theft in history']]></title>
			<description><![CDATA[The U.S. Department of Justice has charged five men who allegedly targeted the Nasdaq and stole over 160 million credit card numbers. ]]></description>
			<pubDate><![CDATA[Fri, 26 Jul 2013 17:49:04 +0000]]></pubDate>
			<media:credit role="author"><![CDATA[Charlie Osborne]]></media:credit>
			<s:doctype><![CDATA[Text]]></s:doctype>
			<media:text type="html"><![CDATA[<p>Five men have been charged in conspiring to steal data from corporate networks worldwide.</p>
<figure class="alignRight"><img title="gavel-v1" alt="gavel-v1" src="http://cdn-static.zdnet.com/i/r/story/70/00/018591/gavel-v1-v1-200x151.jpg?hash=MwH3MJV5AQ&upscale=1" height="151" width="200"></figure>
<p>According to <a href="http://www.justice.gov/opa/pr/2013/July/13-crm-842.html">the Department of Justice</a>, U.S. Attorney Paul J. Fishman of the District of New Jersey revealed the indictment today which charges five men with conspiracy, wire tapping and fraud.</p>
<p>The accused five Eastern European men operated a global hacking scheme which managed to infiltrate a number of the world's largest financial institutions and corporate networks -- allowing the alleged theft of 160 million credit cards in addition to hundreds of millions of dollars in losses.</p>
<p>The defendants are being charged with attacking the Nasdaq, 7-Eleven, Carrefour, JCP, Hannaford, Heartland, Wet Seal, Commidea, Dexia, JetBlue, Dow Jones, Euronet, Visa Jordan, Global Payment, Diners Singapore and Ingenicard. By targeting financial institutions, the hackers were able to steal valuable financial data for profit.</p>
<p>The case <a href="http://www.justice.gov/iso/opa/resources/5182013725111217608630.pdf">brought against the men</a> (.pdf) is the largest hacking scheme ever prosecuted in the United States, according to DoJ officials.</p>
<p>Vladimir Drinkman, 32, of Moscow, Russia, and Alexandr Kalinin, 26, of St. Petersburg, Russia, each allegedly specialized in penetrating network security. Both were previously charged in New Jersey as “Hacker 1” and “Hacker 2” in a 2009 indictment charging Albert Gonzalez in connection with five corporate data breaches. Roman Kotov, 32, of Moscow, allegedly focused on in data mining the exposed networks. Court documents allege that the defendants hid their activities using anonymous web-hosting services provided by Mikhail Rytikov, 26, of Odessa, Ukraine. After data was lifted, Moscow-based Dmitriy Smilianets, 29, allegedly sold the information stolen and handled the books.</p>
<p>By using SQL injections, the hackers were able to lift login credentials from corporate networks, and then install malware to grant the group backdoor access. Sometimes, malware was left on company servers for over a year. Sniffers and a global control center were then developed and installed to store and sell the data.</p>
<p>After acquiring card numbers and additional data, the information dumps were then allegedly sold through online forums or directly to individuals and businesses. According to court documents, $10 was charged for each stolen American credit card number, approximately $50 for each European credit card number, and $15 for each Canadian credit card number. These numbers could then be encoded into blank plastic cards to withdraw funds at ATMs or make purchases.</p>
<p>"This type of crime is the cutting edge," said U.S. Attorney Fishman. "Those who have the expertise and the inclination to break into our computer networks threaten our economic well-being, our privacy, and our national security. And this case shows, there is a real practical cost because these types of frauds increase the costs of doing business for every American consumer, every day. We cannot be too vigilant and we cannot be too careful."</p>
<p>If convicted, the defendants could end up behind bars for decades.</p>]]></media:text>
		</item>
	</channel>
</rss>