Cryptography


Researcher to Release Hacker Footprint Tool

A researcher at Black Hat USA next month plans
to give away a homemade tool that helps organizations glean intelligence about the attacker behind the malware that includes information about native tongue, geographic location, and
ties to other attacks. Read the full article. [Dark Reading]

ATM Skimming Technology Advances with SMS

Operating and planting an ATM skimmer can be a risky venture, because the crooks have to return to the
scene of the crime to retrieve their skimmers along with the purloined
data. Some criminals are now using ATM skimmers that
eliminate much of that risk by relaying the information via text
message. Read the full article. [KrebsonSecurity]


The dream of bolting security onto the Internet’s Domain Name System
takes one step closer to reality as Internet
policymakers hosted a ceremony in northern Virginia to generate and
store the first cryptographic key that will be used to secure
the Internet’s root zone. Read the full article. [Network World]

Researchers looking into the security of GSM phone networks are
suggesting that the recent breach, which saw tens of thousands of e-mail
addresses and ICC-IDs inadvertantly disclosed AT&T, could have far more significant implications
than a bit of extra spam: attackers can use the information to learn
the names and phone numbers of the leaked users, and can even track
their position. Read the full article. [Ars Technica]

Keystroke-logging computer viruses let crooks steal your passwords, and
sometimes even read your e-mails and online chats. Recently, however,
anonymous criminals have added insult to injury, releasing a keylogger
that publishes stolen information for all the world to see at online
notepad sharing sites such as pastebin.com. Read the full article. [KrebsonSecurity]

A researcher was able to gain unfettered access to
his iPhone 3GS from Ubuntu 10.04. If he connected the device whilst it
was turned off and then turned it on, Ubuntu auto-mounted the file
system and was able to access several folders despite never having
previously been connected to the iPhone. Read the full article. [The H Security]