Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

Malware Turns Computers Into Cellular Antenna

August 19, 2015 by  
Filed under Security

Comments Off on Malware Turns Computers Into Cellular Antenna

A team of Israeli researchers have improved on a way to steal data from air-gapped computers, thought to be safer from attack due to their isolation from the Internet.

They’ve figured out how to turn the computer into a cellular transmitter, leaking bits of data that can be picked up by a nearby low-end mobile phone.

While other research has shown it possible to steal data this way, some of those methods required some hardware modifications to the computer. This attack uses ordinary computer hardware to send out the cellular signals.

Their research, which will be featured next week at the 24th USENIX Security Symposium in Washington, D.C., is the first to show it’s possible to steal data using just specialized malware on the computer and the mobile phone.

“If somebody wanted to get access to somebody’s computer at home — let’s say the computer at home wasn’t per se connected to the Internet — you could possibly receive the signal from outside the person’s house,” said Yisroel Mirsky, a doctoral student at Ben-Gurion University and study co-author.

The air-gapped computer that is targeted does need to have a malware program developed by the researchers installed. That could be accomplished by creating a type of worm that infects a machine when a removable drive is connected. It’s believed this method was used to deliver Stuxnet, the malware that sabotaged Iran’s uranium centrifuges.

The malware, called GSMem, acts as a transmitter on an infected computer. It creates specific, memory-related instructions that are transmitted between a computer’s CPU and memory, generating radio waves at GSM, UMTS and LTE frequencies that can be picked up by a nearby mobile device.

The GSMem component that runs on a computer is tiny. “Because our malware has such a small footprint in the memory, it would be very difficult and can easily evade detection,” said Mordechai Guri, also a doctoral student at Ben-Gurion.

Source

NSA Developing System To Crack Encryption

January 13, 2014 by  
Filed under Computing

Comments Off on NSA Developing System To Crack Encryption

The U.S. National Security Agency is working to develop a computer that could ultimately break most encryption programs, whether they are used to protect other nations’ spying programs or consumers’ bank accounts, according to a report by the Washington Post.

The report, which the newspaper said was based on documents leaked by former NSA contractor Edward Snowden, comes amid continuing controversy over the spy agency’s program to collect the phone records Internet communications of private citizens.

In its report, The Washington Post said that the NSA is trying to develop a so-called “quantum computer” that could be used to break encryption codes used to cloak sensitive information.

Such a computer, which would be able to perform several calculations at once instead of in a single stream, could take years to develop, the newspaper said. In addition to being able to break through the cloaks meant to protect private data, such a computer would have implications for such fields as medicine, the newspaper reported.

The research is part of a $79.7 million research program called “Penetrating Hard Targets,” the newspaper said. Other, non-governmental researchers are also trying to develop quantum computers, and it is not clear whether the NSA program lags the private efforts or is ahead of them.

Snowden, living in Russia with temporary asylum, last year leaked documents he collected while working for the NSA. The United States has charged him with espionage, and more charges could follow.

His disclosures have sparked a debate over how much leeway to give the U.S. government in gathering information to protect Americans from terrorism, and have prompted numerous lawsuits.

Last week, a federal judge ruled that the NSA’s collection of phone call records is lawful, while another judge earlier in December questioned the program’s constitutionality. The issue is now more likely to move before the U.S. Supreme Court.

On Thursday, the editorial board of the New York Times said that the U.S. government should grant Snowden clemency or a plea bargain, given the public value of revelations over the National Security Agency’s vast spying programs.

Source

FTC Pushes For Security Standards

December 30, 2013 by  
Filed under Security

Comments Off on FTC Pushes For Security Standards

Despite growing resentment from companies and powerful industry groups, the Federal Trade Commission continues to insist that it wants to be the nation’s enforcer of data security standards.

The FTC, over the past years, has gone after companies that have suffered data breaches, citing the authority granted to it under a section of the FTC Act that prohibits “unfair” and “deceptive” trade practices. The FTC extracted stiff penalties from some companies by arguing that their failure to properly protect customer data represented an unfair and deceptive trade practice.

On Thursday, FTC Chairwoman Edith Ramirez called for legislation that would bestow the agency with more formal authority to go after breached entities.

“I’d like to see FTC be the enforcer,” Law360 quoted Ramirez as saying at a privacy event organized by the National Consumers League in Washington. “If you have FTC enforcement along with state concurrent jurisdiction to enforce, I think that would be an absolute benefit, and I think it’s something we’ve continued to push for.”

According to Ramirez, the FTC supports a federal data-breach notification law that would also give it the authority to penalize companies for data breaches. In separate comments at the same event, FTC counsel Betsy Broder reportedly noted that the FTC’s enforcement actions stem from the continuing failure of some companies to adequately protect data in their custody.

“FTC keeps bringing data security cases because companies keep neglecting to employ the most reasonable off-the-shelf, commonly available security measures for their systems,” Law360 quoted Broder as saying.

An FTC spokeswoman was unable to immediately confirm the comments made by Ramirez and Broder but said the sentiments expressed in the Law360 story accurately describe the FTC’s position on enforcement authority.

The comments by the senior officials come amid heightening protests against what some see as the FTC overstepping its authority by going after companies that have suffered data breaches.

Over the past several years, the agency has filed complaints against dozens of companies and extracted costly settlements from many of them for data breaches. In 2006 for instance, the FTC imposed a $10 million fine on data aggregator ChoicePoint, and more recently, online gaming company RockYou paid the agency $250,000 to settle data breach related charges.

Source

Does The Cloud Need To Standardize?

September 20, 2013 by  
Filed under Computing

Comments Off on Does The Cloud Need To Standardize?

Frank Baitman, the CIO of the U.S. Department of Health and Human Services (HHS), was at the Amazon Web Services conference  praising the company’s services. Baitman’s lecture was on the verge of becoming a long infomercial, when he stepped back and changed direction.

Baitman has reason to speak well of Amazon. As the big government system integrators slept, Amazon rushed in with its cloud model and began selling its services to federal agencies. HHS and Amazon worked together in a real sense.

The agency helped Amazon get an all-important security certification best known by its acronym, FedRAMP, while Amazon moved its health data to the cloud. It was the first large cloud vendor to get this security certification.

“[Amazon] gives us the scalability that we need for health data,” said Baitman.

But then he said that while it would “make things simpler and nicer” to work with Amazon, since they did the groundwork to get Amazon federal authorizations, “we also believe that there are different reasons to go with different vendors.”

Baitman said that HHS will be working with other vendors as it has with Amazon.

“We recognize different solutions are needed for different problems,” said Baitman. “Ultimately we would love to have a competitive environment that brings best value to the taxpayer and keeps vendors innovating.”

To accomplish this, HHS plans to implement a cloud broker model, an intermediary process that can help government entities identify the best cloud approach for a particular workload. That means being able to compare different price points, terms of service and service-level agreements.

To make comparisons possible, Baitman said the vendors will have to “standardize in those areas that we evaluate cloud on.”

The Amazon conference had about 2,500 registered to attend, and judging from the size of the crowd it certainly appeared to have that many at the Washington Convention Center. It was a leap in attendance. In 2012, attendance at Amazon’s government conference was about 900; in 2011, 300 attended; and in 2010, just 50, Teresa Carlson, vice president of worldwide public sector at Amazon, said in an interview.

Source

Judge Oks Sprint’s Lawsuit Against AT&T

November 10, 2011 by  
Filed under Smartphones

Comments Off on Judge Oks Sprint’s Lawsuit Against AT&T

A judge in the U.S. on Wednesday gave the go ahead to parts of C Spire Wireless and Sprint Nextel’s lawsuits against AT&T’s proposed US$39 billion acquisition of T-Mobile USA.

AT&T and T-Mobile had moved for dismissal of the lawsuits arguing that the complaints by Sprint and C Spire, formerly Cellular South, failed to adequately substantiate that the merger would cause them “antitrust injury”.

The decision by District Judge Ellen Segal Huvelle of the United States District Court for the District of Columbia could complicate AT&T’s defense of the deal which has been already opposed by the U.S. government.

The U.S. Department of Justice filed a lawsuit in August to block AT&T from acquiring T-Mobile, saying that the deal would significantly reduce competition, increase prices and stifle innovation. Seven state attorneys general have joined the lawsuit. That case goes on trial in February before Judge Huvelle.

Where private plaintiffs have successfully pleaded antitrust injury, the fact that they are defendants’ competitors is no bar, Judge Huvelle said before allowing Sprint and C Spire to proceed with their claim that the merger would make it difficult for them to acquire wireless devices. The companies had claimed that after the merger AT&T and Verizon would be in a better position to get exclusive handset deals, while foreclosing their access to the most innovative handsets and raise their costs.

Source…

China Denies Hack Attack

November 2, 2011 by  
Filed under Security

Comments Off on China Denies Hack Attack

China has denied involvement in hacking US environment monitoring satellites.

Last week the US-China Economic and Security Review Commission released a draft report about several incidents where US satellites were interfered with in 2007 and 2008.

The Commission did not say that the attacks were traced back to China, but it did cite China’s military as a prime suspect, due to the similarity of the techniques used with “authoritative Chinese military writings” on disabling satellite control.

The hackers gained access to the satellites on at least four occasions through a ground station in Norway. The unauthorised access lasted for between two and 12 minutes. While the attacks did no real damage, they did demonstrate that it is possible to hijack satellites, which is a worrying realisation when military satellites are taken into consideration.

China has a bad reputation throughout the world for alleged cyber attacks, often being the first to blame when a major attack has been discovered. The US has not been the only target either, with alleged attacks against Canada and France having been reported earlier this year.

“[The US] has always been viewing China with colored lenses. This report is untrue and has ulterior motives. It’s not worth a comment,” said Hong Lei, a spokesperson for the Chinese Foreign Ministry, according to Reuters.

Source….

Websites ‘Leaking’ User Info To Other Firms

October 19, 2011 by  
Filed under Around The Net

Comments Off on Websites ‘Leaking’ User Info To Other Firms

Many top websites share their visitors’ names, usernames or other personal information with their partners without alerting users and, in some cases, without knowing they’re doing it, according to a new study from Stanford University.

Many websites “leak” usernames to third-party advertising networks by including usernames in URLs that the ad networks can see in referrer headers, said the study, released Tuesday by Stanford Law School’s Center for Internet and Society. While there’s a debate in legal circles whether usernames are personal information, there’s a growing consensus among computer scientists that Web-based companies can use usernames to identify their owners, said Jonathan Mayer, a Stanford graduate student who led the study.

“The vast majority of usernames are unique,” he said. “Given the prevalence of social networking, often times, once you have a username for a social network, you then also have a person’s real name, possibly a photo, possibly more.”

Other websites share first names, email addresses and other information with advertising or other partners, Mayer said at a privacy conference in Washington. Those identifiers “get associated not just with what you’re doing right now, but get associated with what you’ve done in the past, and what Web browsing activity you may have in the future,” he said.

Source….

Sprint Sues To Stop AT&T-T-Mobile merger

September 14, 2011 by  
Filed under Smartphones

Comments Off on Sprint Sues To Stop AT&T-T-Mobile merger

Sprint on Tuesday announced it has initiated a lawsuit against AT&T and Deutsche Telekom to block the two companies from merging “as a violation of Section 7 of the Clayton Act.” Section 7 of the Clayton Antitrust Act bars any person from acquiring “the whole or any part of the stock or other share capital” that would “substantially … lessen competition, or to tend to create a monopoly.” In its suit, Sprint argues that the proposed merger would violate this act because it would lead to AT&T and Verizon’s controlling 75% of the wireless market while taking in 90% of the profits.

Sprint’s antitrust suit comes less than a week after the U.S. Department of Justice filed an antitrust suit against the merger with the U.S. District Court for the District of Columbia. In its suit, the DOJ similarly argued that the proposed merger would significantly damage competition in the wireless industry, especially since T-Mobile has historically offered low-cost wireless voice and data services for customers. The DOJ also contended that any efficiencies gained by combining AT&T and T-Mobile spectrum would not be enough to offset the damage done to U.S. consumers by further consolidation of the wireless industry.

Read More….

EBS Coming To Your Smartphone

May 14, 2011 by  
Filed under Smartphones

Comments Off on EBS Coming To Your Smartphone

In the event of local and/or nationwide disasters, wireless carriers will soon begin alerting the public by sending emergency SMS text messages to mobile phones.

AT&T, Sprint, T-Mobile and Verizon Wireless have all agreed to a participate in this new Emergency Broadcast System alert method. It  will initially be rolled  out in New York and Washington, D.C., later this year, and nationwide next year, in April at the earliest.

The emergency text messages will cover public safety threats, Amber Alerts for missing children, and messages from the president, the New York Times reports. Messages will be free for customers, who can opt out of them all except the presidential messages.

We don’t expect the alerts to be frequent,” Julius Genachowski, chairman of the Federal Communications Commission, told the Times. “They will be reserved for when they are truly needed, for tornadoes or for disasters like 9/11.”

Genachowski said the emergency texts will look different from ordinary messages, making them more difficult for hackers to infiltrate or fake. They’ll probably appear directly on the screen, along with a special vibration or other signal. No word on how closely they’ll resemble the tone and color bars of the current Emergency Broadcast System for televisions, or whether users can expect “this is a test” messages on a regular basis.

Read More…..