Friday, 8 February 2013

Google Blocks High Profile Sites After Advertising Provider NetSeer is Hacked

Google Chrome users, among others, couldn't access some of the most popular Web sites Monday after an advertising network's corporate Web site was injected with malware. But, according to the ad company's chief executive, those sites were safe.

Those who called up sites such as The Huffington Post, New York Times, Los Angeles Times, Washington Post and many other media sites, among others, were greeted with a warning that the sites contained malware. An example of a warning: "Content from cm.netseer.com, a known malware distributor, has been inserted into this web page. Visiting this page now is very likely to infect your computer with malware." Another warned that the virus peddler was images.buddytv.com.

In both cases, the culprit turned out to be the Santa Clara, Calif. startup Netseer, an advertising provider with a considerable global digital footprint.

"Early this morning we received alerts that our 3rd party hosted corporate website (netseer.com) was hacked and infected with malware. Consequently, Google added our domain to the list of malware affected websites and Chrome and some other browsers started blocking any sites that had ‘netseer.com’ code," according to a letter from the CEO on the company's homepage.  
 
"Our ad serving infrastructure is completely different from the corporate website but shares the same domain (netseer.com). So although the malware never impacted the ad serving all our ad serving partners saw Chrome and other browsers flagging malware warnings to users. To reiterate, the malware was never served into ad serving stream and the browser behavior was completely due to ad serving and the corporate website sharing the same domain name."

The company said Google had removed the site from its malware impacted site list by 9:30 a.m. Pacific time, but users continued to report blocked sites hours throughtout the day.

According to various news reports, Internet Explorer users had no trouble accessing the impacted sites with that browser.


Courtesy by Anne Saita

Tuesday, 27 November 2012

Facebook Proposes Eliminating User Voting System for Privacy Changes

Facebook today announced plans to eliminate its voting system that gave users a say in how their privacy is handled.

In a statement issued Wednesday 21st November, Elliot Schrage, Vice President, Communications, Public Policy and Marketing for the Menlo Park, Calif.-based social media company, said the voting system set in place in 2009 hasn't worked as well as planned. It allowed users to publicly post comments on proposed changes to Facebook’s Statement of Rights and Responsibilities (SSR) and Terms of Use. If the site received 7,000 comments, users could then vote on alternatives -- provided at least 30 percent of all active users participate. The site currently has 1 billion users.

Schrage said the system initially worked well but as of late had become a mere numbers game.

"In the past, your substantive feedback has led to changes to the proposals we made. However, we found that the voting mechanism, which is triggered by a specific number of comments, actually resulted in a system that incentivized the quantity of comments over their quality," he wrote. "Therefore, we’re proposing to end the voting component of the process in favor of a system that leads to more meaningful feedback and engagement."The company plans to keep its seven-day comment period open and hold a Q&A with its Chief Privacy Officer, but it did not say how privacy decisions would be made once the voting system is eliminated.

"We will also provide additional notification mechanisms, including email, for informing you of those changes," Schrage said.

Other proposed updates include:
  • setting up new filters to manage incoming messages
  • making sure people understand where "hidden" posts may still appear (like others' timelines or news feeds)
  • providing tips for deleting posts, activity logs and others' posts where you're tagged.

Courtesy by Anne Saita

Monday, 19 November 2012

Google Sheds Light on New Android App Scanner

Google has divulged more information about its forthcoming application verifier for the Android operating system. The feature is being rolled out over the air alongside the latest build of the OS, Jelly Bean 4.2, on Nexus 7 and Galaxy Nexus devices as of yesterday.

While it can be disabled, the app verifier feature is turned on by default according to a new description from Google/Nexus that describes the process as follows:

If users attempt to download and install an unsafe app, they’ll see one of two notifications warning them the app is either potentially dangerous – recommending they cancel installation - or informing them the app is dangerous – blocking installation.

Android app verifier
The description mentions that by allowing Google to verify your applications, the company will receive information from your phone including URLs related to the app along with general information about the device, including its ID, the current build of the operating system, IP addresses and cookies.

Users can reach the new verifier, which analyzes apps from all app stores, even those not found in Google’s Play store, by clicking Settings > Security > Verify apps.

Users wishing to sideload apps from third-party app stores without Google analzying them will simply need to turn off the service.

Google announced the verifier, along with other security plans for 4.2 late last month but it wasn’t until yesterday that one of the company’s Android developers, Michael Morrissey, highlighted an expanded description of the service in a post on Google+.

It still appears unclear if or how Google’s acquisition of VirusTotal earlier this fall, feeds into Android’s new app verifier. Despite being obtained in September, the online virus scanning company claimed it would continue to operate independently.


 Courtesy by Christopher Brook

Thursday, 1 November 2012

Have We Learnt to ……?



Have we learnt to smile amidst tears?

Have we learnt to overcome our fears?

Have we learnt to walk on an edge?

Have we learnt to forget old grudge?

Have we learnt to find difference in brick and stone?

Have we learnt to sit on a horny throne?

Have we learnt to fight against injustice?

Have we learnt to shun ill will and malice?

Have we learnt to help each other?

Have we learnt to be together?

Have we learnt to gaze thru those deceitful eyes?

Have we learnt to perceive those cunning smiles?

Have we learnt to listen to a good advice?

Have we learnt before speaking to think twice?

Have we learnt before live alone and separate?

Have we learnt to love and hate?

Have we learnt to pray longer, harder?

Have we learnt to make our faith stronger?


Courtesy by Shalini Jalali Koul

Wednesday, 31 October 2012

To My Conscience



Your being with me is a blessing,
For you are so friendly and so caring.

                             In my despair
                             You give me solace,
                             And in my happiness
                             You smile with me.

Your guide me whenever
I need your advice any ill will
Warn me against any ill will
Unmindful of which I may be.

                                                     You always remain
                             With me in my strife,
                             Stand by me through all
                             The ups and downs of my life.

Thanks to you.
For you have kept me alive,
You are the only one,
For whom I really strive.


Courtesy by Shalini Jalali Koul

Monday, 29 October 2012

The Dead Flower



The Dead flower has lost
its fragrance
which it was having once
when it was blooming
to its full,
with great joy
and enthusiasm,
spreading its aroma
all around
and giving out a radiant smile,
but little was he knowing
that his days are numbered.
                                                Couldn’t save himself
                                                from the cruel
                                                hands of nature
                                                and was dispersed
            on the ground,
            as he had to bow
            his head
            before the power,
            much more
            stronger than him.
The withered petals,
lying,
were soon driven off
by the heartless wind
as he couldn’t tolerate
seeing them together.
                                                Separated, they kept
                                                on saying
                                                that even if they
                                                live a short life
                                                but much more
                                                dignified
                                                and full of ecstasy.


Courtesy by Shalini Jalali Koul

Friday, 19 October 2012

Research Shows Serious Problems With Android App SSL Implementations

There are thousands of apps in the Google Play mobile market that contain serious mistakes in the way that SSL/TLS is implemented, leaving them vulnerable to man-in-the-middle attacks that could compromise sensitive user data such as banking credentials, credit card numbers and other information. Researchers from a pair of German universities conducted a detailed analysis of thousands of Android apps and found that better than 15 percent of those apps had weak or bad SSL implementations.

The researchers conducted a detailed study of 13,500 of the more popular free apps on Google Play, the official Android app store, looking at the SSL/TLS implementations in them and trying to determine how complete and effective those implementations are. What they found is that more than 1,000 of the apps have serious problems with their SSL implementations that make them vulnerable to MITM attacks, a common technique used by attackers to intercept wireless data traffic. In its research, the team was able to intercept sensitive user data from these apps, including credit card numbers, bank account information, PayPal credentials and social network credentials.

The team also built a proof-of-concept tool called MalloDroid that was designed to find the potentially exploitable SSL bugs in Android apps, which they then investigated further to determine whether an attack was in fact possible. In a lot of cases--1,074, to be exact--it was.

"These 1,074 apps represent 17.0% of the apps that contain HTTPS URLs. To evaluate the real threat of such potential vulnerabilities, we have manually mounted MITM attacks against 100 selected apps from that set. This manual audit has revealed widespread and serious vulnerabilities. We have captured credentials for American Express, Diners Club, Paypal, Facebook, Twitter, Google, Yahoo, Microsoft Live ID, Box, WordPress, IBM Sametime, remote servers, bank accounts and email accounts. We have succesfully manipulated virus signatures downloaded via the automatic update functionality of an anti-virus app to neutralize
 
the protection or even to remove arbitrary apps, including the anti-virus program itself. It was possible to remotely inject and execute code in an app created by a vulnerable app-building framework," the authors wrote in their paper, "Why Eve and Mallory Love Android: An Analysis of Android (In)Security"

Security researcher Jon Oberheide of Duo Security, who has worked extensively on Android security, said that it's important to realize that the presence of problematic code in an app doesn't mean that it's ever actually used during operation.

"The presence of such code in an app doesn't necessarily mean the app is vulnerable to MITM. Many apps may contain the code, but it might not be in use at runtime. For example, many developers will have an option to disable SSL cert validation when the app is in debug mode, but that code path won't be taken when the app is running for real," Oberheide said. 

The researchers discovered several separate classes of vulnerabilities, including apps that accepted any certificate; allowing all hostnames; trusting a huge number of certificate authorities by default; and apps using mixed-mode or no SSL. Their MalloDroid app evaluates target apps in a number of different ways, looking at the permissions they request, what network connections they use, how the apps use HTTP and HTTPS and how SSL certificates are handled. 
 
Once they'd use their tool to weed out the apps with potential MITM vulnerabilities, the researchers set up a test environment to execute sample attacks against the apps, which they did manually.

"For the manual app auditing, we used a Samsung Galaxy Nexus smartphone with Android 4.0 Ice Cream Sandwich. We installed the potentially vulnerable apps on the phone and set up a WiFi access point with a MITM SSL proxy. Depending on the vulnerability to be examined, we equipped the SSL proxy either with a self-signed certi ficate or with one that was signed by a trusted CA, but for an unrelated hostname," the researchers said in the paper.

"Of the 100 apps selected for manual audit, 41 apps proved to have exploitable vulnerabilities. We could gather bank account information, payment credentials for PayPal, American Express and others. Furthermore, Facebook, email and cloud storage credentials and messages were leaked, access to IP cameras was gained and control channels for apps and remote servers could be subverted."

The research, which was done by teams from Leibniz University in Hanover and Philipps University of Hamburg, shows that app developers, like many Web developers, have trouble implementing SSL correctly. The researchers said that while Android's default browser does a good job with SSL connections and gives users useful warnings when a certificate problem arises, there are a number of areas ripe for improvement. They suggest implementing an Android-specific version of the HTTPS Everywhere plugin, which automatically uses SSL when it's available. They also say that using something such as MalloDroid with app installers would help find potentially vulnerable apps and implementing the tool in the app market could help, as well.

"The fi ndings of our investigation suggest several areas of future work. We intend to provide a MalloDroid Web App and will make it available to Android users. Moreover, there seems to be a need for more education and simpler tools to enable easy and secure development of Android apps. But most importantly, research is needed to study which countermeasures o er the right combination of usability for developers and users, security bene ts and economic incentives to be deployed on a large scale," the researchers said.

Oberheide of Duo Security said that there are lessons in the paper both for developers and users.

"The fact that Android and other mobile platforms provide proper HTTPS routines as part of the core platform is important though. There will always be incompetent developers who shoot themselves in the foot security-wise and there's only so much the mobile platform can do to prevent that without hampering legitimate cases," he said.

"As far as users go, I think the biggest lesson to be learned is that downloading third-party unofficial apps can be risky (eg.  downloading an unofficial banking app instead of the one actually released by your bank) for a number of reasons including poor coding practices."


Courtesy by Dennis Fisher