Hacking Team: Oh great, good job, guys ... now the TERRORISTS have our zero-day exploits

Found on The Register on Thursday, 09 July 2015
Browse Internet

"It is now apparent that a major threat exists because of the posting by cyber criminals of Hacking Team proprietary software on the internet the night of July 6," reads a statement on the Hacking Team website.

"Before the attack, Hacking Team could control who had access to the technology which was sold exclusively to governments and government agencies. Now, because of the work of criminals, that ability to control who uses the technology has been lost. Terrorists, extortionists and others can deploy this technology at will if they have the technical ability to do so. We believe this is an extremely dangerous situation."

Correction: the exploits went from one criminal to others. If HT would have really been so concerned about security, they would have reported the bugs. Instead they decided to use it for their own project which they sold to countries like Saudi Arabia, Sudan and Russia which are not exactly prime examples for freedom. They don't have the slightest moral high ground.

Hacking Team-derived Flash exploit is now in the wild hijacking PCs

Found on The Register on Wednesday, 08 July 2015
Browse Internet

It's the worst-case scenario of the Hacking Team hack: the as-yet-unpatched Flash vulnerability revealed in the trove of source code leaked from the surveillance-ware company is being exploited in the wild

Malwarebytes, which had already warned the exploit would be weaponised quickly, notes: “This is one of the fastest documented case of an immediate weaponisation in the wild, possibly thanks to the detailed instructions left by Hacking Team.”

This makes one wonder if there is any legal way to hold the Hacking Team responsible for damages caused by the exploit which they did not report to upstream to get it fixed.

The FBI Spent $775K on Hacking Team’s Spy Tools Since 2011

Found on Wired on Monday, 06 July 2015
Browse Internet

The FBI is one of the clients who bought hacking software from the private Italian spying agency Hacking Team, which was itself the victim of a recent hack.

The FBI is not in good company here. According to several spreadsheets within the hacked archive, which contain a list of Hacking Team’s customers, many of the other governments who bought the same software are repressive regimes, such as Sudan and Bahrain.

It's in the company of those countries for an obvious reason.

Script-blocker NoScript lets in ANYTHING from googleapis.com

Found on The Register on Wednesday, 01 July 2015
Browse Internet

The researcher says blanket whitelisting of googleapis.com means he was able to create a script that could pass default NoScript configurations and be executed within user browsers.

"Just by visiting the file JavaScript will execute, even if NoScript with default configuration is installed."

That venture was cut short when he found the whitelisted zendcdn.net was available for purchase at just US$10, so he snapped it up and used it to point at his JavaScript payload.

Since it is called NoScript, that's what it should do by default. To be really sure that no scripts are executed, it is a better solution to just disable Javascript completely:
about:config -> javascript.enabled = false

Lush cosmetics in YouTube address dispute

Found on BBC News on Wednesday, 24 June 2015
Browse Internet

A popular video blogger has hit out at cosmetics brand Lush after he lost control of a YouTube address he had been using since 2005.

Google said it was "sympathetic" to Mr Lush's situation and that the decision was made by an algorithm.

Google said its algorithm decided which address Lush Cosmetics was given, based on data from YouTube, Google+, its search engine and other sources.

That's what you get for assuming that some URL belongs to you. As soon as Google sees a chance to make some more profit, you're screwed. What's more surprising is Google seems to say that it cannot undo the decision made by some algorithm. Everybody knows they can because Google does for example de-list results from searches. It's just a cheap (and ridiculous) excuse.

Emergency Adobe Flash Patch Fixes Zero Day Under Attack

Found on Threat Post on Tuesday, 23 June 2015
Browse Internet

Adobe today released an out-of-band patch for a Flash Player zero-day vulnerability being used in targeted attacks by an APT gang known for its storehouse of exploits targeting unpatched browser-based vulnerabilities.

“Any time one of these groups is using a zero day and casting such a wide net, it’s pretty significant, especially since the activity started in early June and a patch was not released until today,” Oppenheim said. “That’s a big window, and possibly tons of victims affected.”

The biggest bug is Flash itself. It ridden with holes and the top reason for infections. In all the years, Adobe has failed hard to make it at least somewhat secure. The best solution is to just remove it from all your systems and move on. With HTML5, there is no real reason to use this piece of bugware anymore.

Germany Says You Can't Sell Adult Ebooks Until After 10 PM

Found on Techdirt on Monday, 22 June 2015
Browse Internet

The law behind this baffling proclamation states it is intended to protect children from coming to harm via "advertising or teleshopping." It was written in 2002, and was no less stupid in its belief that it could somehow force online retailers to take certain items off the "shelves" for two-thirds of the day. It's only receiving attention now because the Youth Protection Authority trying to hammer it into place over bits of the internet.

And no one will be saved, Youth Protection Authority or no. But the YPA gets to say it tried, and I guess that's all that matters. It will just have to live with the mocking laughter.

If someone tells you a story like this, the natural reaction is to reply "They cannot be that stupid". They are though.

DuckDuckGo on CNBC: We’ve grown 600% since NSA surveillance news broke

Found on Technical.ly Philly on Saturday, 20 June 2015
Browse Internet

“We’re doing about three billion searches a year,” Weinberg said, “so we’re already pretty mainstream.”

Browsers Firefox and Safari also made DuckDuckGo available last year.

So some people do want privacy. Not all hope is lost.

The Web is getting its bytecode: WebAssembly

Found on Ars Technica on Thursday, 18 June 2015
Browse Internet

However, there are well-known ways of providing the advantages of JavaScript without those perceived downsides: bytecode runtimes like Java and .NET. Unlike script files, the bytecode represents a low-level, fairly compact representation of a program.

WebAssembly, or wasm for short, is intended to be a portable bytecode that will be efficient for browsers to download and load, providing a more efficient target for compilers than plain JavaScript or even asm.js.

What could possibly go wrong with compiled binaries loaded into your browser. It has been tried before, and Java, ActiveX et al are examples of the failures.

Free encryption project 'Let's Encrypt' to issue first digital certificates next month

Found on The Stack on Wednesday, 17 June 2015
Browse Internet

The project is funded by the Internet Security Research Group (ISRG), a new Californian public-benefit group backed by leading tech firms including Mozilla, The Electronic Frontier Foundation (EFF) and Cisco.

Website operators are generally hesitant to use SSL/TLS certificates due to their cost. An extended validation (EV) SSL certificates can cost up to $1,000 (approx. £640). It is also a complication for operators to set up encryption for larger web services.

EV certs however also provide insurance. That aside, free and easy SSL is good and will help to weed out the self signed certificates which are still used by some services.