The Yellow Pages: Rocket Powered Knife Vs Phonebook

rocket-knife-vs-phonebook.jpg

This is a video of a 200/km (~125MPH) rocket knife attempting to cut a phonebook in half (previously: the same experiment vs a quadrocopter). Is it successful? Yes — it is very successful. Me? I am not very successful at all, especially with the ladies. Nobody ever swipes right. “You look like an anthropomorphic turd.” I thought it was what’s on the inside that counts. “You really think what’s inside is much better?” No….not really. Hey — I’m not paying you for these little life coaching lessons, right?

Keep going for the video.

VIDEO

Thanks to Adrian, who agrees the only purpose of phonebooks anymore is letting your kids sit on them in the bath so they can see of the side of the tub.

blog comments powered by Disqus

from Geekologie – Gadgets, Gizmos, and Awesome http://ift.tt/2w6oSPo
via IFTTT

How to Stop the Next Equifax-Style Megabreach—Or At Least Slow It Down

The recent, massive Equifax data breach, which put 143 million US consumers’ personal data at risk—including names, Social Security numbers, birth dates, addresses, and some drivers license and credit card numbers—drove home the dangers facing any organization that stores a valuable trove of data. But awareness alone hasn’t stopped or even slowed the recent slate of mega-breaches, which have impacted even strongly defended networks, like those of the Central Intelligence Agency and National Security Agency. That doesn’t mean it’s time to give up. Even if you can’t stop breaches altogether, plenty of steps could slow them down.

Before Equifax,a number of other memorable data breaches lost tens of millions of records—including at Target, Home Depot, the Office of Personnel Management, and Anthem Medicare. While each attack happened in different ways, extra precautions could have helped mitigate the impacts.

"Breaches happen over and over again because of really simple things, it’s maddening" says Alex Hamerstone, a penetration tester and compliance expert at the IT security company TrustedSec. "Nothing works 100 percent or even close to it, but a lot of things work to a degree and when you start to layer them on top of each other and start doing basic things you’re going to get stronger security."

Organizations can start by segmenting their networks, to limit the fallout if a hacker does break through. Siloing attackers in one part of the network means they can’t gain access beyond it. Even the examples of the CIA and NSA leaks—both embarrassing and damaging incidents for those organizations—show that it’s possible to limit access control such that even attackers who grab something can’t get everything.

Legislation and regulation may also help create more clearly defined repercussions for consumer data loss that motivate organizations to prioritize data security. The Federal Trade Commission declined to comment to WIRED about the Equifax breach, but noted that it provides resources as part of its consumer protection outreach and enforcement efforts.

Lawsuits can also help deter to lax security practices. So far more than 30 suits have been filed against Equifax, including at least 25 in federal court. And companies do suffer losses in the aftermath of a breach, both in terms of money and reputation, that spur some adoption of stronger protections. But all these elements combined still only result in gradual progress in the US, as illustrated by the situation with Social Security numbers, which have been known to be insecure as a universal identification for decades, but are still widely used.

Beyond what individual organizations can achieve on their own, increasing data security overall will require technological overhauls of network systems and user identification/authentication. Countries like Estonia and the Netherlands have made such systems a priority, instituting multi-factor authentication for financial interactions, like opening a credit card account. They also make these mechanisms more readily available to vulnerable industries like healthcare. Organizations can also focus on implementing robust data encryption, so even if attackers access information they can’t do anything with it. But for these technologies to proliferate, industries must commit to reworking infrastructure to accommodate them—as was eventually the case with chip-and-pin credit cards, which the US took decades to adopt. And then there’s just good old fashioned commitment to making sure the systems in place actual work like they’re supposed to.

"There is no security without audit," says Shiu-Kai Chin, a computer security researcher at Syracuse University who studies development of trustworthy systems. "People who run businesses don’t want to think about the cost of information audits, but if they just imagined that every packet of information was a hundred dollar bill, all of a sudden they would start to think about who touches that money and should they be touching that money? They would want to set up the system properly—so you only give people enough access to do their jobs and no more."

As a data-processing company, Equifax certainly had some information security protections in place. Experts note, though, that the network architecture clearly had some significant flaws if an attacker could have potentially compromised records for 143 million people without accessing the company’s core databases—something Equifax claims. Something about the segmentation and user controls in the system allowed too much access. "In information security it’s easy to Monday morning quarterback and say ‘you should have patched, you should have done this’ when it’s actually a lot harder to do," TrustedSec’s Hamerstone says. "But Equifax has money, it wasn’t like they were on a shoestring budget. It was a decision not to invest here, and that’s what kind of blows me away."

A common industry phrase is "there’s no such thing as perfect security." It means that data breaches do happen sometimes no matter what, and always will. The challenge in the US is to creating the right incentives and requirements that compel technological overhauls. With the right setup, a breach doesn’t have to be catastrophic, but without it the effects really are dramatic. "If we can’t account for the integrity of operations," says Chin, "then really all is lost."

from Wired Top Stories http://ift.tt/2wXGWKn
via IFTTT

Billions of devices imperiled by new clickless Bluetooth attack


reader comments
1

Over the past decade, Bluetooth has become almost the default way for billions of devices to exchange data over short distances, allowing PCs and tablets to transfer audio to speakers and phones to zap pictures to nearby computers. Now, researchers have devised an attack that uses the wireless technology to hack a wide range of devices, including those running Android, Linux, and, until a patch became available in July, Windows.

Blueborne, as the researchers have dubbed their attack, is notable for its unusual reach and effectiveness. Virtually any Android, Linux, or Windows device that hasn’t been recently patched and has Bluetooth turned on can be compromised by an attacking device within 32 feet. It doesn’t require device users to click on any links, connect to a rogue Bluetooth device, or take any other action, short of leaving Bluetooth on. The exploit process is generally very fast, requiring no more than 10 seconds to complete, and it works even when the targeted device is already connected to another Bluetooth-enabled device.

“Just by having Bluetooth on, we can get malicious code on your device,” Nadir Izrael, CTO and co-founder of security firm Armis, told Ars. “Blueborne abuses the fact that when Bluetooth is on, all of these devices are always listening for connections.”

Patch now, if you haven’t already

Microsoft patched the vulnerabilities in July during the company’s regularly scheduled Patch Tuesday. Company officials, however, didn’t disclose the patch or the underlying vulnerabilities at the time. A Microsoft representative said Windows Phone was never vulnerable. Google, meanwhile, provided device manufacturers with a patch last month. It plans to make the patch available starting today for users of the Pixel XL and other Google-branded phones, but if past security bulletins are any guide, it may take weeks before over-the-air fixes are available to all users. Izrael said he expects Linux maintainers to release a fix soon. Apple’s iOS prior to version 10 was also vulnerable.

The attack is most potent against Android and Linux devices, because the Bluetooth implementations in both operating systems are vulnerable to memory corruption exploits that execute virtually any code of the hacker’s choosing. The Bluetooth functionality in both OSes also runs with high system privileges, allowing the resulting infection to access sensitive system resources and survive multiple reboots.

Surprisingly, the majority of Linux devices on the market today don’t use address space layout randomization or similar protections to lessen the damage of Blueborne’s underlying buffer overflow exploit, Armis Head of Research Ben Seri said. That makes the code-execution attack on that OS “highly reliable.” Android, by contrast, does use ASLR, but Armis was able to bypass the protection by exploiting a separate vulnerability in the Android implementation of Bluetooth that leaks memory locations where key processes are running. Blueborne also massages Android memory in a way that further lessens the protection offered by ASLR. The result: Blueborne can carry out remote code-execution attacks on both OSes that are both stealthy and reliable.

Armis researchers haven’t confirmed that code execution is possible against Windows’ unpatched Bluetooth implementation, but they were able to carry out other attacks. The most significant one allows hackers to intercept all network traffic sent to and from the targeted Windows computer and to modify that data at will. That means attackers could use Blueborne to bypass personal and corporate firewalls and exfiltrate sensitive data and possibly modify or otherwise tamper with it while it’s in transit. The Android implementation is vulnerable to the same attack.

The following three videos demonstrate the attacks against Android, Linux, and Windows respectively:

VIDEO

Blueborne – Android Take Over Demo.

VIDEO

Linux Take Over Demo.

VIDEO

BlueBorne – Windows MiTM Demo.

In all, Armis researchers uncovered eight Bluetooth-related vulnerabilities in Android, Linux, Windows, and iOS. The researchers consider three of the flaws to be critical. The researchers reported them to Google, Microsoft, and Apple in April and to Linux Maintainers in August. All parties agreed to keep the findings confidential until today’s coordinated disclosure. The vulnerabilities for Android are indexed as CVE-2017-0781, CVE-2017-0782, CVE-2017-0783, and CVE-2017-0785; the vulnerabilities for Linux are CVE-2017-1000251 and CVE-2017-1000250; the vulnerability for Windows is CVE-2017-8628; the designation for iOS vulnerability wasn’t immediately available.

Up until now, Bluetooth has been notable for the dearth of critical vulnerabilities found in the specification or in its many implementations, with Armis being aware of only one code-execution flaw, in Windows, that Microsoft fixed in 2011. The Armis researchers, however, said they believe there are likely many more overlooked critical bugs that remain to be found.

The vulnerabilities are coming to light a few months after two independent reports—one in April from Google’s Project Zero and the other in July from Exodus Intelligence—exposed similarly critical vulnerabilities in Wi-Fi chips manufactured by Broadcom. They, too, allowed attacks that were transmitted wirelessly from device to device with no user interaction.

Typical of most proof-of-concept exploits, the Blueborne attacks demonstrated in the videos are relatively simple. With more work, Armis researchers said they could probably develop a self-replicating worm that would spread from a single device to other nearby devices that had Bluetooth turned on, and from there those devices would infect other nearby devices in a chain reaction. Such self-replicating exploits could quickly take over huge numbers of devices at conferences, sporting events, or in work places.

Dan Guido, a mobile security expert and the CEO of security firm Trail of Bits, told Ars such a worm might be hard to pull off because exploits would have to be customized for the hardware and operating system of each Bluetooth-enabled device. He also downplayed the likelihood of active Blueborne attacks, noting that there’s no indication either of the Broadcom chip vulnerabilities has ever been exploited in the wild.

Izrael confirmed that Blueborne exploits would have to be customized for each platform but said the amount of work required to do so would be manageable. The Android exploit Armis has developed, for instance, already works on both a Pixel and Nexus phones.

“Any further customization for Android-based devices would be a very simple task,” he said. What’s more: “An attacker that would want to weaponize these exploits could achieve generic exploits with very little work.”

from Ars Technica http://ift.tt/2xumqT9
via IFTTT