Researchers Easily Slipped Weapons Past TSA’s X-Ray Body Scanners

Additionally, they found that they could infect the scanner with malware---most practically for an attacker by picking the lock on the scanner's cabinet and physically installing the malware on the PC inside.

[remote exploits] – HybridAuth install.php PHP Code Execution Exploit

US Nuclear Regulatory Commission hacked 3 times in 3 years

According to documents obtained under an open-records request, two of the hacks, perpetrated via phishing emails, are believed to have originated in foreign countries, while the source of the third remains unknown because incident logs have been destroyed. The report does not say when the attacks occurred, nor does it divulge what, if any, data was compromised.

Hackers steal records on 4.5 million patients from healthcare system

A healthcare system spanning 29 states announced on Monday that cybercriminals operating from China stole information on approximately 4.5 million patients, including names, birth dates, and Social Security numbers.

Community Health Systems, which comprises 206 facilities in the southern and western states, announced the incident in an 8-K filing submitted to the Securities and Exchange Commission (SEC). The data breach likely stems from compromises in April and June of this year, involved sophisticated malware, and is apparently connected to China, the company stated.

"The attacker was able to bypass the Company’s security measures and successfully copy and transfer certain data outside the Company," CHS said in its 8-K filing. "Since first learning of this attack, the Company has worked closely with federal law enforcement authorities in connection with their investigation and possible prosecution of those determined to be responsible for this attack."

Read 5 remaining paragraphs | Comments

Access Point Pinched From Black Hat Show WLAN

A few apparent pranks, practice DDoS attacks, and other mischievous activities were spotted on the Black Hat USA wireless network in Las Vegas this month.

Access Point Pinched From Black Hat Show WLAN

A few apparent pranks, practice DDoS attacks, and other mischievous activities were spotted on the Black Hat USA wireless network in Las Vegas this month.

Why John McAfee Is Paranoid About Mobile

Mobile apps are posing expanding risks to both enterprises and their customers. But maybe being paranoid about mobile is actually healthy for security.

[local exploits] – BlazeDVD Pro v7.0 – (.plf) Buffer Overflow (SEH) Exploit

[local exploits] – BlazeDVD Pro v7.0 – (.plf) Buffer Overflow SEH Exploit

[local exploits] – BulletProof FTP Client 2010 – Buffer Overflow (SEH) Exploit

Supervalu says it was breached – is it the next Target?

US retailer Supervalu is warning customers that an intrusion of its network may have resulted in the theft of credit and debit card account numbers from up to 200 of its stores. Meanwhile, a related data breach affected another 800 stores for which Supervalu provides IT services. Could this be the next Target?

[remote] – Firefox toString console.time Privileged Javascript Injection

Firefox toString console.time Privileged Javascript Injection

Community Health Systems Breach Atypical For Chinese Hackers

Publicly traded healthcare organization's stock goes up as breach notifications go out.

Hacker Couture: As Seen At Black Hat USA, BSides, DEF CON

'Leet tattoos, piercings, mega-beards, (the real) John McAfee, and even a cute puppy were among the colorful sights in Las Vegas this month.

[remote exploits] – Gitlab-shell Code Execution Exploit

[remote exploits] – Firefox toString console.time Privileged Javascript Injection Exploit

[remote exploits] – Firefox toString console.time Privileged Javascript Injection

[remote exploits] – Senkas Kolibri WebServer 2.0 Buffer Overflow Exploit

[webapps] – Tenda A5s Router 3.02.05_CN – Authentication Bypass Vulnerability

Tenda A5s Router 3.02.05_CN - Authentication Bypass Vulnerability

SuperValu Food Stores Reports Network Intrusion

The company is investigating whether data was breached, but it is already offering customers identity theft protection.

Infographic: 70 Percent of World’s Critical Utilities Breached

New research from Unisys and Ponemon Institute finds alarming security gaps in worldwide ICS and SCADA systems within the last 12 months.

Facebook, the security company

Facebook Chief Security Officer Joe Sullivan says that PrivateCore is a "perfect fit" for the social media company.
Ariel Zambelich/WIRED

On August 7, as Def Con was kicking off far below in the bowels of the Rio Hotel’s convention center in Las Vegas, I was ushered into a suite on the 19th floor to see a man who has one of the most high-profile security gigs in the industry: Joe Sullivan, Facebook’s chief security officer. An acquisition of a security startup company announced that same day and a huge internal investment in security technology development have created a software security giant that has but one paying customer—Facebook itself. Sullivan explained the PrivateCore deal as an investment in Facebook’s future—especially when viewed within the context of the company’s effort to bring affordable Internet access (and Facebook) to the still-unwired parts of the planet. “PrivateCore is a perfect fit for the future of Facebook,” Sullivan told Ars.

A VM in a vCage

The technology PrivateCore is developing, vCage, is a virtual “cage” in the telecom industry’s usage of the word. It is software that is intended to continuously assure that the servers it protects have not had their software tampered with or been exploited by malware. It also prevents physical access to the data running on the server, just as a locked cage in a colocation facility would.

The software integrates with OpenStack private cloud infrastructure to continuously monitor virtual machines, encrypt what’s stored in memory, and provide additional layers of security to reduce the probability of an outside attacker gaining access to virtual servers through malware or exploits of their Web servers and operating systems. If the “attestation” system detects a change that would indicate that a server has been exploited, it shuts it down and re-provisions another server elsewhere. Sullivan explained that the technology is seen as key to Facebook’s strategy for because it will allow the company to put servers in places outside the highly secure (and expensive) data centers it operates in developed countries.

Read 12 remaining paragraphs | Comments

[web applications] – MyConnection Server (MCS) 9.7i Cross Site Scripting Vulnerability

[web applications] – Lyris ListManagerWeb 8.95a Cross Site Scripting Vulnerability

[web applications] – WordPress Gallery Objects 0.4 SQL Injection Vulnerability

Stuxnet Exploits Still Alive & Well

Exploits continue abusing a four-year-old bug used in the Stuxnet attack, Kaspersky Lab says.

[web applications] – BlackBerry Z10 Authentication Bypass Vulnerability

[web applications] – HybridAuth 2.2.2 – Remote Code Execution Vulnerability

[web applications] – TomatoCart 1.x – SQL Injection Vulnerability

[remote exploits] – VMTurbo Operations Manager 4.6 vmtadmin.cgi Remote Command Execution

[remote exploits] – VirtualBox 3D Acceleration Virtual Machine Escape Exploit

[web applications] – Jamroom 5.2.6 Cross Site Scripting Vulnerability

[web applications] – Ribose Cross Site Request Forgery Vulnerability

Good bot, bad bot? 23 million Twitter accounts are automated

Its latest SEC filing says that 8.5% of active monthly users are automatons, which could mean there are a boatload of bots on the service. Some are spam, some are useful, some are just publications' own, automated Twitter feeds.

A portable router that conceals your Internet traffic

Ryan Lackey (left) holds up a prototype PORTAL travel router during his Def Con presentation with Marc Rogers (right).
Sean Gallagher

The news over the past few years has been spattered with cases of Internet anonymity being stripped away, despite (or because) of the use of privacy tools. Tor, the anonymizing “darknet” service, has especially been in the crosshairs—and even some of its most paranoid users have made a significant operational security (OPSEC) faux pas or two. Hector “Sabu” Monsegur, for example, forgot to turn Tor on just once before using IRC, and that was all it took to de-anonymize him. (It also didn’t help that he used a stolen credit card to buy car parts sent to his home address.)

If hard-core hacktivists trip up on OPSEC, how are the rest of us supposed to keep ourselves hidden from prying eyes? At Def Con, Ryan Lackey of CloudFlare and Marc Rogers of Lookout took to the stage (short their collaborator, the security researcher known as “the grugq,” who could not attend due to unspecified travel difficulties) to discuss common OPSEC fails and ways to avoid them. They also discussed their collaboration on a set of tools that promises to make OPSEC easy—or at least easier—for everyone.

Called Personal Onion Router To Assure Liberty (PORTAL), the project is a pre-built software image for an inexpensive pocket-sized “travel router” to automatically protect its owner’s Internet traffic. Portal provides always-on Tor routing, as well as “pluggable” transports for Tor that can hide the service’s traffic signature from some deep packet inspection systems.

Read 12 remaining paragraphs | Comments