Cryptography


Shadowserver Starts Free Binary-Checking Service

A non-profit group that tracks malicious activity online has just started a new free service that enables users to check executable files against a database of known good applications and to help determine whether a given file is malicious.

Verizon DBIR Challenge Clue #2

This year’s Verizon Data Breach Investigations Report (DBIR) challenge is  well and truly underway.  I see where the (public) contestants are stumped so, here’s a clue to nudge them along:


Minutes after Apple issued a security update Wednesday, the maker of a
10-day-old jailbreak exploit released code that others could put to use
hijacking iPhones, iPod Touches and iPads. Read the full article. [Computerworld]

A bug in Facebook’s login system allows attackers to match unknown email
addresses with users’ first and last names, even when they’ve
configured their accounts to make that information private. Read the full article. [The Register]

Significant weaknesses in the common
configuration of Kerberos-based authentication servers could allow
attackers to more easily circumvent security measures in networks that
rely on the open authentication standard, according to research
presented at Black Hat. Read the full article. [Dark Reading]

The U.S. Computer Emergency Readiness Team has issued two warnings on flaws in the embedded systems’ OS technology VxWorks as discovered by researcher HD Moore. One flaw deals with weakness in the hashing algorithm of the API authentication; The second regards debug settings being enabled by default and affects nearly 60 vendors’ products. Read the algorithm warning here. Read the debug warning here. [US CERT]