Affichage des articles dont le libellé est News. Afficher tous les articles
Affichage des articles dont le libellé est News. Afficher tous les articles

jeudi 5 février 2015

Old ‘The Pirate Bay’ Back Online, BUT Seized by FBI



Old ‘The Pirate Bay’ Back Online, BUT Seized by FBI :


Anonymous says, “The Pirate Bay has a new domain! Old domain compromised.”
Yes, the pirate bay is back after two months, as promised, they have come back on the 1st of February, 2015 under a new domain ‘.ac’. Last year, in December, The Pirate Bay’s servers were raided by Swedish police which led to them being ‘offline’ for several weeks. Its previous and current members suggested that The Pirate Bay would not return but now one of the members, know as ‘pseudonym’ and ‘mr 1010010000′ said, “if The Pirate Bay will be back… then it would be back with a bang.” While The Pirate Bay was offline, the Isohunt team had created its own version as a tribute and showing support, called “oldpiratebay,” and invested $100,000 for developers to develop the website. Today on Twitter, one of the famous Anonymous accounts (@theanonmessage), tweeted about the return of the official, The Pirate Bay:
“ALERT: STAY AWAY from The Pirate Bay website as we have gotten reports that it has been seized indirectly by the FBI and is logging IPs.”
“ALERT CONTINUED: The team at TPB are currently building their servers at a new website and should be up in a matter of hours.”
“ALERT: ThePirateBay has a new domain! Old domain compromised. This will be live in a couple hours. Always use VPN: http://thepiratebay.ac “

Today, The Pirate Bay has responded to the concerns about its use of U.S.-based CDN service CloudFlare, explaining that it’s only using Cloudflare temporarily in order to cope with the continued stream of millions of visitors.
"We have seen that there has been some question to why we are using Cloudflare," TPB says in astatement. "This is only initially to handle the massive load upon the servers. It will be removed shortly."
The second concern was the lack of moderation on TPB. As soon as The Pirate Bay returned, many fake torrents have been posted to the site and without moderators these were not removed. However, TPB operators now explain that the decision to keep the staff out was taken as a security measure.
In order to deal with the spam and fake torrent problem TPB added a report link to every torrent details page. "Before we sort everything out we have instead added a 'Report link' to all torrents which you can find in the details page," the admin wrote. "We believe that the TPB community can help moderate the site for the time being."



Source : www.thehackernews.com
              www.anonhq.com
Share:

dimanche 1 février 2015

Google Earth Pro Is Now Available For Free



Google Earth Pro Is Now Available For Free :




Google has announced that it will no longer charge users to gain access to Google Earth Pro, the premium version of its geospatial desktop software that provides more than a billion people a virtual tour to our Earth.
Stafford Marquardt, the Google product manager for Google Earth Pro in a blog said that “ anyone who wants to use the software will have to request a free key to download and install the software on their computers“. Earlier the software cost a staggering $399 to use every year.
Since most people use the software mainly for their of virtual travel, the Pro version is targeted toward engineers, architects, scientists, pilots, other professionals, and businesses who have used the advanced tools in Google Earth Pro for a variety of purposes, such as measuring 3D buildings, printing high-resolution images, and recording high-definition movies of one’s virtual travels.
“Over the last 10 years, businesses, scientists, and hobbyists from all over the world have been using Google Earth Pro for everything from planning hikes to placing solar panels on rooftops,” says Marquardt.


Both the software’s are equally beneficial but the two versions have some major differences. Firstly, Google Earth is limited to printing screen resolution images, while the Pro version allows users to print high-resolution images that can be used for presentations. It also allows importing of images that have more than the max texture size allowed by Google Earth.
Secondly, though both versions use the same imagery, but Google Earth Pro has additional tools to create animation videos and automatically locate geographic information system (GIS) images that can only be manually located in Google Earth.

Next, Google Earth Pro gives businesses and market researcher’s access to multiple layers of demographic data. For instance, for each state in the United States, Google Earth Pro provides demographic information related to age, gender, income, education, and other factors for a certain period.
Last but not the least, Google Earth Pro is now free, so there is virtually no barrier in using the software. The system required for the software is a PC running on Windows XP or higher or OS 10.6 or higher for Mac users. At least 500MB of storage and 512MB of RAM are needed.
Google Earth was acquired by Google as EarthViewer 3D, a project of the CIA-backed Keyhole, in 2004. The software maps the Earth by superimposing images obtained from satellite imagery, aerial photography, and GIS 3D globe.


Source : www.techworm.net
Share:

The Pirate Bay is back again !!



The Pirate Bay is back again !! 



The Pirate Bay homepage returned a week or so ago complete with a countdown clock that suggested the site would return in full on February 1. It not only returned, but it did so a day early.
As of writing, the site appears to be fully functional at its original domain. The admins have even replaced their iconic pirate ship logo with a phoenix to celebrate the occasion. According to the Guardian, this symbol of rebirth has been used by the site to ring in previous relaunches.
The Pirate Bay is no stranger to run-ins with law enforcement but the most recent downtime was one of the longest in the site’s history. Many questioned whether or not the popular torrent site would be able to return although thosefamiliar with how the site operates probably knew better than to question its resilience.
The site is famously known to run off of virtual servers that are hosted at secret locations around the globe. Taking down a single location proves futile as no one location controls the entire site. It would seem that the only way to take the site offline permanently would be to shut down multiple servers simultaneously.



" Like a phoenix rising from the ashes, The Pirate Bay is back online today following a police raid on its servers in early December. As Joe Rogan once said, you can’t stop the Internet."

Source : www.techspot.com
Share:

jeudi 15 janvier 2015

A new generation of mobile experiences


Ubuntu introduces a new way to enjoy your smartphone — a world away from the traditional app icon grid.
For the first time, there will be a phone that revolves around you and the content and services important to you. Say goodbye to opening and switching between multiple apps and, instead, let Ubuntu scopes bring everything you need to your screen.
Scopes are a new UI paradigm, designed to deliver content and services directly to categorised home screens, giving users a rich, unfragmented experience. Developers have a new way to create app-like experiences that are easier to discover, build, and are integral to the OS.


Engaging experiences delivered directly to the screen

Ubuntu phones come with several categorized home screens — including music, video, news, and more - that define the device’s default experience. These aggregation scopes bring together content and services from multiple sources and deliver them as a unified experience. For example, the video scope will display multiple video sources like YouTube and Vimeo in addition to your own recorded videos, and similarly a music scope can display your music plus content from the likes of Soundcloud, Grooveshark and more.
Each source can then expand into an app-like, fully branded experience. For developers, this is the fastest path to develop a rich mobile experience on Ubuntu — at fraction of the cost of traditional apps. And by attributing categories (music, news, videos, etc) to your branded scopes, users can discover them from both the default aggregation scopes and the Store. And once a user favourites a scope, it becomes a default screen on the device.
Share:

mardi 13 janvier 2015

Galaxy S6 will be two versions

It is clear that the date of disclosure of the South Korean company Samsung Galaxy S6 new phone will be very soon, as sources indicated that the date of submission of the company's new phone will be in the month of March on the sidelines of the exhibition Mobile World Congress 2015 in Barcelona.

And the Galaxy S5 phone launched by Samsung in the past year and that it intends to launch from behind to achieve huge financial profit and contrary to expectations has achieved great commercial failure, but it seems that Samsung is working to restore its balance soon through the launch of her new Galaxy S6.

New News transferred "Business Insider" site yesterday by close to the new project, and this news sources indicate that the new phone from Samsung Galaxy S6 will come in two versions, the first version will be the structure of a metal and a normal screen in what will be the second version similar curved screen what is present in the Galaxy Note Edge.

According to Business Insider, the site versions of the Galaxy S6 will work system Android 5.0 and will begin marketed starting from April.
Share:

lundi 12 janvier 2015

WhatsApp and iMessage could be banned under new surveillance plans



WhatsApp and iMessage could be banned under new surveillance plans :









David Cameron could block WhatsApp and Snapchat if he wins the next election, as part of his plans for new surveillance powers announced in the wake of the shootings in Paris.
The Prime Minister said today that he would stop the use of methods of communication that cannot be read by the security services even if they have a warrant. But that could include popular chat and social apps that encrypt their data, such as WhatsApp.
Apple's iMessage and FaceTime also encrypt their data, and could fall under the ban along with other encrypted chat apps like Telegram.


He said: “In our country, do we want to allow a means of communication between people which […] we cannot read?” He made the connection between encrypted communications tools and letters and phone conversations, both of which can be read by security services in extreme situations and with a warrant from the home secretary.

But companies such as WhatsApp have remained committed to keeping their services encrypted and unable to be read by authorities, a project which has stepped up in the wake of the Edward Snowden’s revelations on NSA surveillance.


And privacy groups have repeatedly criticised attempts to limit the use of privacy tools in the name of security. When the government announced plans to crack down on the dark net, for example, butprivacy groups have warned that much of the tools are used by people in oppressed countries and victims of crime to stay safe.




Source : www.independent.co.uk
Share:

Kernel 3.18 Released !



Kernel 3.18 Released ! :


Linux 3.18 has been released on Sun, 7 Dec 2014.

Summary: This release adds support for overlayfs, which allows to combine two filesystem in a single mount point; support for mapping user space memory into the GPU on Radeon devices, a bpf() syscall that allows to upload BPF-like programs that can be attached to events; a TCP congestion algorithm optimized for data centers; the Geneve virtualization encapsulation, support for embedding IP protocols over UDP, improved networking performance thanks to batching the processing of socket buffers, and optional multi-queue SCSI support. There are also new drivers and many other small improvements. 


Prominent features :


  • Nouveau (free Nvidia GPU driver) now supports basic DisplayPort audio
  • Support for the Razer Sabertooth gamepad, maps it as Xbox 360 controller
  • Xilinx USB2 peripherals
  • Touchscreen support for Microchip AR1021 i2c, PenMount 6000 touch
  • Audio codecs:  Cirrus Logic CS35L32, Everest ES8328and Freescale ES8328 
  • Audio support: Generic Freescale sound cards, Analog Devices SSM4567 audio amplifier
  • Various filesystem improvements, including Btrfs and F2FS
  • DCTCP congestion control algorithm now supported
  • JIT compilation of eBPF programs on 64-bit builds
  • “Tinification” patches to help developers compile leaner, smaller kernels


Upgrade to Kernel 3.18.1-1 stable version :


Although classed as stable and bringing numerous new changes to the table, don’t feel in a rush to try and upgrade your own OS to it anytime soon. Unless you’re adept at handling the sort of monitor-smashing, CPU-charring, rage-inducing issues that arise from swapping out the engine in your OS motor, you shouldn’t.

If you insist, you’ll find source packages available at the kernel.org website :


Download Kernel 3.18.1-1



That's all enjoy ,)

Share:

dimanche 11 janvier 2015

Google Adopt End-To-End Encryption For Gmail And Chrome



Google To Adopt End-To-End Encryption For Gmail And Chrome :

















Google has changed it’s policy for Gmail and Chrome in order to improve the security of data and content. Gmail has setup Content Security Policy (CSP) within preliminary code for end-to-end email encryption. Company is planning to encrypt all the data communication that happens between the sender and receiver in Gmail and Chrome web versions.
CSP became popular when Mozilla implemented it in Firefox 4 in 2010. The basic idea behind CSP is to limit the risk of Cross Site Scripting (XSS) security flaws. There are some malicious extensions available for Chrome. Some of these extensions run encrypted script that interferes with Gmail session. The inbuilt CSP in Gmail and Chrome will stop these extensions from loading the unsafe script.
Google’s end-to-end email encryption offers fully encrypted email mechanism that is totally new and interoperable with any other online webmail services. Google seems to have followed Yahoo’s footstep by announcing the end-to-end encryption for emails. The project is still in alpha stage of development.
Google is planning to launch a chrome extension for encryption, decryption, digital signature, verification of signed emails using this extension within the browser. Google’s Security and Privacy Product Manager, Stephan Somogyi has posted a blog post that states company doesn’t think End-to-End encryption is as usable as it sounds. The project is still in alpha stage and it’s not yet available for public usage.
Somogyi said, “Anyone accessing the source code through our Github page will understand that the code refers to our key server. We are still working on the system, which is why it does not point towards the public server.” The end-to-end encryption will bring highest tier of email security for Gmail conversations.
Google is also considering to adopt a new strategy that will label non-SSL/HTTPS sites as insecure websites. A chromium proposal states that, agent users need to change their UX to display non-secure origins as affirmatively non-secure.” Google plans to deploy the transition plan for Chrome in coming year.


Source : azure.efytimes.com
Share:

vendredi 9 janvier 2015

YouTube will be integrated into the new cryptographic over the coming weeks

It seems that Google is working hard and continuously to develop a platform for video, and in this context some press sources indicated that during the next few weeks, users will be able to deploy technology videos 360 degree view.

And to now this technique is still in vogue dramatically and only a small number of capable cameras on the completion of this formula are no videos, and including the Kodak camera SP360 In addition to that there are no video platform supports the formula 360 degrees.

But it seems that Google wants to YouTube platform to be the first video platform to publish videos panoramic 360 degree view technology, where Google officials confirmed to the site "Gizmodo" that this technology will be available in the next few weeks on YouTube.

It is clear that the arrival of helmets virtual reality technology, especially Samsung Gear VR and Oculus Rift will contribute to the spread of videos display 360 degree view.
Share:

jeudi 8 janvier 2015

Learn new tool Wifi and dangerous hack wifi Wi-Fi Phisher (WPA / WPA2) quite easily!

Today no one did not use a wireless network in his daily life, use of this type of communication became more famous and used widely, especially because they provide the technique of easy access, as well as linking the largest possible number of devices and to cover long distances. Of course, this widespread technology Wi-flowing saliva hackers and permanent methods to penetrate this type of networking technologies and there .aka these tools are Wifiphisher tool.
This new tool launched by George Chatzisofroniou Greek security researcher under the name Wifiphisher. It is a tool to penetrate wireless networks, which use intelligent fraud and style in a new way far from the traditional stereotypes methods known .alojml tool that integrates several techniques in the field of penetration as well as many of the weaknesses in the protocols used in networks.

How Wifiphisher works and why is it dangerous?

Common way to get through the Wi-Fi networks for a long time is Alaatmadeh mainly on the dictionary, which includes hundreds of thousands of random words and tested to reach the password for the router or Alrotr.ohma known attack "brute force" and take a long time.
The new method, which relies upon Wifiphisher are totally different and smarter. It can Tl_khasaha in the following:
The tool is to reproduce your Access Point Access Point, and offers a new point of counterfeit victim will be "Kaltoam evil", while at the same time you Aladh Btid blocking DoS service attack on the router to disable the original point of contact, making the victim believe there is documentation and access problems for the point of origin Contact and thus the tool Bajabbark smart and tricky way of the contact point counterfeit that will be quite similar to the original (and you will be sent as well as tool and fake page asking for the password) and of course the user will be reassuring and will not feel any difference thus will enter the password voluntarily; and the latter sent to your attacker. also noteworthy that the attack tool "Deauthentication" to separate all related to the original point contact devices, and forcing them to call fake point.


Once you get the original password, this point contact counterfeit or "evil twin" can continue to work as the connection broker (between the original access point and other users), the sense will be connected to the Internet like you are connected to the original point of contact!. Yes, and this may lead to steal passwords and other information and passing on this network lyrics, and this is very dangerous too.
Wifiphisher certainly can be considered intelligent combination of social engineering (the most common method of penetration), with a simple application that combines many techniques and styles.
Share:

Google supports Charlie Hebdo 250,000 Euros


Giant Google the company decided to offer generous financial support to the newspaper French cartoonist satirical Charlie Hebdo was estimated at 250,000 euros after exposure headquarters Gazette armed attack that killed 12 people, including a number of news Gazette, the new support will enable the Gazette printed a million copies instead of 60,000, as was the case in the past.

And was Charlie Hebdo satirical French newspaper has been an armed attack last Wednesday, killing 12 people and threatened the future of the newspaper, but on the other hand, got a wave of support, including support for Google's giant digital world company.

Newspaper Charlie Hebdo decided after this process printed a million copies of their paper instead of No. 60,000 as it was in the past, and Google has decided to support 250,000 euros, the British newspaper "The Guardian" as you will receive support from others in the same amount.
Share:

mercredi 7 janvier 2015

Win money from Etoro



eToro, the investment network that uses real-time features to let users follow and trade based on other users’ activities, has raised another $15 million in funding in a venture round led by Spark Capital with participation from existing investors BRM, Guy Gamzu and Jonathan Kolber. The new round takes the total amount of funding in the Israel-based company to $33.9 million.
Billing itself as a disruptive social trading platform, the company has seen some strong growth over the last year, and now claims to be the world’s largest online investment network, with more than 2 million users across 140 countries, with traded positions on the network growing by more than 500 percent in the period.
While there are a fair number of companies out there that cater to the armchair investor — letting individuals play the stock market without having to invest vast sums or deal with brokers — the unique thing about eToro (electronic bull, geddit?) is that it takes the investment model and gives it a kind of Twitter/Klout twist: the central feature of the site is a river charting what all of the other users are doing on the network, right there and then.
Then eToro takes that one step further: using its CopyTrader function, you can “follow” others on the network, to watch what they do, and even invest money to mimic their trading activities — a bit like going to a casino and putting money down on someone having a lucky streak at the Craps table. eToro says that on average the “win ratios” for those who copy traders is 80 percent.
The traders who get followed, as a result, have a double revenue stream: one from their trades (if they’re good) and one from those who copy their trades: Yoni Assia, the company’s founder and CEO, tells me that the company pays its members $10 per follower per month.
The most popular user at the moment, “Moksel1972” from Germany, has just over 3,000 copiers, and nearly 20,000 followers. For the record, he’s a currency trader and 99.6 percent of his trades have been profitable.
eToro, like other investing sites, takes a commission on the trades made — but otherwise does not charge for its service. Assia says this commission is competitive with those of other trading networks. Assia says its spreads are on average 0.03 percent of the value of the deal. (The spread varies between instruments between 0.03 percent to 0.1 percent.)
This is a compelling model, and one that has the opportunity of bringing in people into the stock market who have often thought of investing but have been reluctant to do so for lack of knowledge and experience. And the full disclosure on trades also pulls down the curtain on a process that a lot of people regard with wariness (especially in recent times, with all the banking fiascoes).
There is a lot of growth left to do for eToro. Assia says the new funds will be used to hire more employees — their numbers have already doubled in the last year to 200 in Europe, the U.S., Australia and Israel  — and to invest in more R&D.
But there are other areas where we might also see some activity coming up: for example, the company has yet to properly launch in the U.S. — partly because it needs to still finalize licenses and partnerships (required by regulations) to be enable the “CopyTrader” service. Assia tells me that the company expects a proper U.S. entry later this year.
Equally, for the moment the company runs its platform as a retail-only operation, but Assia says that it is also speaking with a number of other institutions to white-label this service. “We are working with the top investment houses on a white label services, including a couple of banks and financial institutions,” he tells me. “That will give them the ability to offer our services on a wide consumer basis.” If that comes to pass, this may not be the last we see of this bull.
Share:

dimanche 4 janvier 2015

"TSU" That Pays You to Friend

Asked about the inspiration for Tsu, the social network he’s just launched, Sebastian Sobczak doesn’t immediately mention Facebook or Twitter. Instead, he talks about Ed O’Bannon.
Mr. O’Bannon, a former U.C.L.A. basketball player, sued to challenge N.C.A.A. rules banning athletes from making money from their own images — in August, the Supreme Court decided in his favor. And for Mr. Sobczak, he’s a sort of personification of Tsu’s ethos: People should get paid for the content they produce.
While Facebook and Twitter have been criticized for failing to share their profits with those who post on their platforms, Tsu pledges to do just that: It will give 90 percent of its ad revenue back to users.
Tsu’s philosophy is that “all content creators, which is basically every social user, should receive royalties for the commercial use of their image, likeness and work,” Mr. Sobczak told Op-Talk. “They essentially do all the work, they should get rewarded with the lion’s share.”
“What people don’t realize is how much value is created by these platforms on the backs of basically everybody’s networking,” he said.
“It’s the exact analogy to the N.C.A.A. If the N.C.A.A.’s going to be paid hundreds of millions of dollars by gaming companies using Tim Tebow or Ed O’Bannon,” he added, then “you gotta pay the guys!”
Tsu plans to pay users not only for its content, but also for its ability to bring in more people. Each user gets a unique code that allows him or her to invite others to the site. And after Tsu takes its 10 percent cut, it gives half of each post’s revenue to the user who posted it — the remainder gets divided up among the users that person invited, the users those users invited, and so on, the share diminishing with each remove from the original poster. So even if your posts aren’t generating much revenue, or if you’re not posting much, you can still make some money from the posts of the people you know. “If you brought value to the system” by inviting someone whose posts get a lot of attention, said Mr. Sobczak, “you’re actually rewarded for that.”
He believes paying users will benefit Tsu as well: “We’re everybody’s kind of de facto payment platform that is giving them purchasing power for their data, their content and their network. That’s very powerful.” Becoming a payment platform would allow the company to go beyond merely selling ads, he added. “I would rather play in the peer-to-peer credit and merchant services markets, because that’s 10 times a larger market than just digital advertising and mobile advertising markets.” He imagines Tsu potentially becoming “the people’s global banker.”
It’s not the first time a social network has paid users. At ReCode, Kurt Wagner notes that “Bubblews, a social network founded in 2012 with a similar mindset, pays users when the content they share generates engagement like comments or Likes.”
But such revenue-sharing is by no means mainstream, and some have taken the major social networks to task for what they say is exploitation of users’ time and energy.
The artist Laurel Ptak writes in her much-discussed piece, “Wages for Facebook”: “They say it’s friendship. We say it’s unwaged work. With every like, chat, tag or poke our subjectivity turns them a profit.” And on her website, she asks:
“In 2012 Facebook reached more than 1 billion users and generated a revenue of 5.1 billion dollars. It is the first social-media website to be traded on the stock exchange wherein all content on its site is created by its usersIs what we do on Facebook work? How would we calculate our value? What could an alternate form of social media, based on an idea of the commons or a feminist praxis, look like?”
Astra Taylor describes a similar concern in her book “The People’s Platform.” “A frustrated minority,” she writes, “have complained that we are living in a world of ‘digital feudalism,’ where sites like Facebook and Tumblr offer up land for content providers to work while platform owners expropriate value with impunity and, if you read the fine print, stake unprecedented claim over users’ creations.” She quotes Marina Gorbis of the Institute for the Future:
“We, the armies of digital peasants, scramble for subsistence in digital manor economies, lucky to receive scraps of ad dollars here and there, but mostly getting by, sometimes happily, on social rewards — fun, social connections, online reputations. But when the commons are sold or traded on Wall Street, the vast disparities between us, the peasants, and them, the lords, become more obvious and more objectionable.”
Can Tsu be the more communal social network critics are looking for? Brooke Duffy, a professor of media and communication who has studied women’s digital-media behavior, has doubts. “I understand the appeal and I certainly understand the buzz of it,” she told Op-Talk. “I think the problem is, if it gets a critical mass — and I think that’s a big if — who’s actually going to be benefitting?”
Her prediction: “I think what we’ll end up seeing is the same kind of social media influencers that are already getting compensated for their work are the ones that are ultimately going to benefit from this.” Those who have already amassed large followings on other social-media platforms, she argued, may have the easiest time earning money on Tsu.
Some may be able to use Tsu to gain lots of followers from scratch: “There’s always the handful who rise to the top,” she said. “But is this going to radically redefine the compensation model of social network content creation? I’m pretty skeptical of it.”
“There’s a great deal of enthusiasm for whatever the next big social network is,” she added, “and there’s always these hopes that we can identify the next big thing. But I think in all of these cases it tends to be a very small number of people that actually benefit from the contributions of the many.” Those who benefit are those who get in early, but “also people who have the time and income to actually work to grow this audience base.”
“Something that gets swept aside,” she said, “is the level of economic and social capital people need to even get started.”
Mr. Sobczak is more optimistic about users’ chances of making significant money on Tsu. “The monetization is for everybody,” he said, “that’s the beauty of it.”
“Talk to some of these kids out there, they have 5,000 Facebook friends,” he said. He estimated that bringing in 100 friends could make a user thousands of dollars annually. And, he said, “It’s not a zero-sum game: the more people that join, the more ad revenue, and the higher the rate.”
He said the user base was growing rapidly — “we’ve been in the several thousands of requests per second.” One recent adopter: Ed O’Bannon
Share:

Google Researcher Reveals Zero-Day Windows 8.1 Vulnerability




Google Researcher Reveals Zero-Day Windows 8.1 Vulnerability :



















A Google security researcher, 'James Forshaw' has discovered a privilege escalation vulnerability in Windows 8.1 that could allow a hacker to modify contents or even to take over victims' computers completely, leaving millions of users vulnerable.
The researcher also provided a Proof of Concept (PoC) program for the vulnerability. Forshaw says that he has tested the PoC only on an updated Windows 8.1 and that it is unclear whether earlier versions, specifically Windows 7, are vulnerable.
Forshaw unearthed the bug in September 2014 and thereby notified on the Google Security Research mailing list about the bug on 30th September. Now, after 90 days disclosure deadline the vulnerability and Proof of Concept program was made public on Wednesday.
The vulnerability resides in the function AhcVerifyAdminContext, an internal function and not a public API which actually checks whether the user is an administrator.


"This function has a vulnerability where it doesn't correctly check the impersonation token of the caller to determine if the user is an administrator," Forshaw wrote in the mailing list"It reads the caller's impersonation token using PsReferenceImpersonationToken and then does a comparison between the user SID in the token to LocalSystem's SID."
"It doesn't check the impersonation level of the token so it's possible to get an identify token on your thread from a local system process and bypass this check. For this purpose the PoC abuses the BITS service and COM to get the impersonation token but there are probably other ways."


The PoC contains two program files and some set of instructions for executing the files which, if successful, finally result in the Windows calculator running as an Administrator. According to the researcher, the vulnerability is not in Windows User Account Control (UAC) itself, but UAC is used in part to demonstrate the bug.
Forshaw tested the PoC on Windows 8.1 update, both 32 bit and 64 bit versions, and he recommended users to run the PoC on 32 bit. To verify perform the following steps:



  • Put the AppCompatCache.exe and Testdll.dll on disk
  • Ensure that UAC is enabled, the current user is a split-token admin and the UAC setting is the default (no prompt for specific executables).
  • Execute AppCompatCache from the command prompt with the command line "AppCompatCache.exe c:\windows\system32\ComputerDefaults.exe testdll.dll".
  • If successful then the calculator should appear running as an administrator. If it doesn't work first time (and you get the ComputerDefaults program) re-run the exploit from 3, there seems to be a caching/timing issue sometimes on first run.

A Microsoft spokesperson confirms the vulnerability and says that it’s already working on a fix:


"We are working to release a security update to address an Elevation of Privilege issue. It is important to note that for a would-be attacker to potentially exploit a system, they would first need to have valid logon credentials and be able to log on locally to a targeted machine. We encourage customers to keep their anti-virus software up to date, install all available Security Updates and enable the firewall on their computer."

 There's no patch available and all Windows 8.1 systems are vulnerable to hackers at this time.


Source :  www.thehackernews.com
Share:

vendredi 2 janvier 2015

Masque Attack: New iOS Vulnerability Allows Hackers to Replace Apps with Malware



Masque Attack : New iOS Vulnerability Allows Hackers to Replace Apps with Malware :












Android have been a long time target for cyber criminals, but now it seems that they have turned their way towards iOS devices. Apple always says that hacking their devices is too difficult for cyber crooks, but a single app has made it possible for anyone to hack an iPhone.

A security flaw in Apple's mobile iOS operating system has made most iPhones and iPads vulnerable to cyber attacks by hackers seeking access to sensitive data and control of their devices, security researchers warned.

The details about this new vulnerability was published by the Cyber security firm FireEye on its blog on Monday, saying the flaw allows hackers to access devices by fooling users to download and install malicious iOS applications on their iPhone or iPad via tainted text messages, emails and Web links.


MASQUE ATTACK - REPLACING TRUSTED APPS
The malicious iOS apps can then be used to replace the legitimate apps, such as banking or social networking apps, that were installed through Apple's official App Store through a technique that FireEye has dubbed "Masque Attack."


"This vulnerability exists because iOS doesn't enforce matching certificates for apps with the same bundle identifier," the researchers said on the company's blog. "An attacker can leverage this vulnerability both through wireless networks and USB."

Masque attacks can be used by cyber criminals to steal banking and email login credentials or users’ other sensitive information.

Security researchers found that the Masque attack works on Apple’s mobile operating system including iOS 7.1.1, 7.1.2, 8.0, 8.1, and the 8.1.1 beta version and that all of the iPhones and iPads running iOS 7 or later, regardless of whether or not the device is jailbroken are at risk.

According to FireEye, the vast majority, i.e. 95 percent, of all iOS devices currently in use are potentially vulnerable to the attack.


MASQUE ATTACK IS MORE DANGEROUS THAN WIRELURKER :
The Masque Attack technique is the same used by "WireLurker," malware attack discovered last week by security firm Palo Alto Networks targeting Apple users in China, that allowed unapproved apps designed to steal information downloaded from the Internet. But this recently-discovered malware threat is reportedly a "much bigger threat" than Wirelurker.
"Masque Attacks can pose much bigger threats than WireLurker," the researchers said. "Masque Attacks can replace authentic apps,such as banking and email apps, using attacker's malware through the Internet. That means the attacker can steal user's banking credentials by replacing an authentic banking app with an malware that has identical UI."
"Surprisingly, the malware can even access the original app's local data, which wasn't removed when the original app was replaced. These data may contain cached emails, or even login-tokens which the malware can use to log into the user's account directly."
HOW TO PROTECT YOURSELF FROM MASQUE ATTACK :
Apple devices running iOS are long considered more safe from hackers than devices running OS like Microsoft’s Windows and Google’s Android, but iOS have now become more common targets for cybercriminals.

In order to avoid falling victim to Masque Attack, users can follow some simple steps given below:
  • Do not download any apps offer to you via email, text messages, or web links.
  • Don't install apps offered on pop-ups from third-party websites.
  • If iOS alerts a user about an "Untrusted App Developer," click "Don't Trust" on the alert and immediately uninstall the application.
In short, a simple way to safeguard your devices from these kind of threats is to avoid downloading apps from untrusted sources, and only download apps directly from the App Store.



Source : www.thehackernews.com
Share:

Popular Posts