Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for SpiKey: Eavesdroppin ...

 Technology

A lock is reliable only insofar as it cannot be defeated by an intruder. Computer technology makes things easier, alas, including for those who hate doors they cannot open (and no, we are not talking about cats). Thanks to 3D printers, copying keys has become much easier. Of course, to print them, you need at least   show more ...

one decent image of the original. Researchers in Singapore recently published a paper demonstrating SpiKey, a door lock attack that doesn’t require a picture. You simply use your smartphone to record the clicks of the key being inserted into the keyhole. How the clicks reveal the key The attack works on pin tumbler locks, the most common type in use today. The mechanism is based on a cylinder that must be turned to lock or open the door. This cylinder houses several pins, which consist of two parts of different lengths and are held in place by springs. When there is no key in the keyhole, the pins fill the cylinder entirely, and their outer part prevents the cylinder from turning. A suitably shaped key moves the pins so that the boundary between the two parts coincides with the edge of the cylinder; as a result, nothing prevents it from turning. The main secret of a key is the depth of its grooves (pits), which determine the pins’ fit. Key in a pin tumbler lock. Source When you insert a key into the lock, the pins move based on the shape of the key: They rise when a ridge (the protrusion located between the grooves) passes under them, and then fall again. When the pins fall, they click. By measuring the time between clicks, scientists were able to determine the distance between the ridges on the key. This method, of course, does not reveal the main variable: how deep the grooves on the key are. But it does provide some idea of the shape of the key. By exploiting this approach, researchers were able to find key variants that corresponded to the original key. Why the SpiKey attack is dangerous An attacker cannot use the SpiKey attack to create a detailed portrait of an original key. However, here is another useful fact: Keys aren’t truly random. By combining data on the distance between the ridges and knowledge of the requirements for keys for six-pin locks manufactured by Schlage, the researchers were able to narrow the range of possible keys from 330,000 to just a few. An attacker who wants to copy a key can print just five variants on a 3D printer and try each of them. One of the keys will almost certainly defeat the lock. Don’t panic Like most attacks developed in a lab, SpiKey has its drawbacks, and burglars are unlikely to put it into practice anytime soon. First of all, to perpetrate a successful attack, you need to know the make of the lock. Different manufacturers have different requirements for keys, and for an attacker to craft an effective across-the-board approach would be much more difficult. Also worth noting, not all locks are of the pin-tumbler type; several alternative types are also very popular. Second, if two or more pins in the lock click at the same time, the attack will not work. That is, even if the lock is the right type, there is no guarantee that a matching key for a certain lock can be found. Researchers have found that more than half of Schlage locks are vulnerable, but the proportion will be different for other manufacturers. Third, the experiment also assumed that the key’s insertion into the lock occurs at a fixed speed and without any pauses. Although possible, that scenario is unlikely in the real world. How to protect your home (and other places) from burglary The SpiKey attack represents a development that could help burglars and other dishonest people in the long run. Here’s what you can do to protect yourself from this attack: Use several locks, preferably of different types. Even if a would-be intruder can create a key for one of them, the others will probably stop the culprit; Add other types of security. The market is currently full of alarms and other security systems to suit all tastes, from quite simple to very elaborate; Protect your devices so that intruders cannot hijack your microphone or camera functions.

 Expert Blogs and Opi

No matter how sophisticated your security software is, data cannot be simultaneously used and secured. But that may be changing soon.

 Feed

Red Hat Security Advisory 2020-3548-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include buffer overflow and null pointer vulnerabilities.

 Feed

Ubuntu Security Notice 4472-1 - Noah Misch discovered that PostgreSQL incorrectly handled the search_path setting when used with logical replication. A remote attacker could possibly use this issue to execute arbitrary SQL code. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. Andres Freund discovered   show more ...

that PostgreSQL incorrectly handled search path elements in CREATE EXTENSION. A remote attacker could possibly use this issue to execute arbitrary SQL code. Various other issues were also addressed.

 Feed

Gentoo Linux Security Advisory 202008-10 - A vulnerability has been found in Chromium and Google Chrome that could allow a remote attacker to execute arbitrary code. Versions less than 84.0.4147.135 are affected.

 Feed

Ubuntu Security Notice 4470-1 - Kritphong Mongkhonvanit discovered that sane-backends incorrectly handled certain packets. A remote attacker could possibly use this issue to obtain sensitive memory information. This issue only affected Ubuntu 16.04 LTS. It was discovered that sane-backends incorrectly handled certain   show more ...

memory operations. A remote attacker could possibly use this issue to execute arbitrary code. This issue only applied to Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. Various other issues were also addressed.

 Feed

Ubuntu Security Notice 4469-1 - It was discovered that Ghostscript incorrectly handled certain document files. If a user or automated system were tricked into processing a specially crafted file, a remote attacker could use this issue to cause Ghostscript to crash, resulting in a denial of service, or possibly execute arbitrary code.

 Feed

Ubuntu Security Notice 4471-1 - Tobias Neitzel discovered that Net-SNMP incorrectly handled certain symlinks. An attacker could possibly use this issue to access sensitive information. It was discovered that Net-SNMP incorrectly handled certain inputs. An attacker could possibly use this issue to execute arbitrary   show more ...

code. This issue only affected Ubuntu 14.04 ESM, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 20.04 LTS. Various other issues were also addressed.

 Feed

Red Hat Security Advisory 2020-3520-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.

 Feed

Red Hat Security Advisory 2020-3519-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Jenkins is a continuous integration server that monitors executions of repeated jobs, such as building a software project or jobs run by cron. Issues addressed include a cross site scripting vulnerability.

 Feed

Ubuntu Security Notice 4468-2 - USN-4468-1 fixed a vulnerability in Bind. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM. Dave Feldman, Jeff Warren, and Joel Cunningham discovered that Bind incorrectly handled certain truncated responses to a TSIG-signed request. A remote   show more ...

attacker could possibly use this issue to cause Bind to crash, resulting in a denial of service. Various other issues were also addressed.

 Feed

Sysdig falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace.

 Feed

A popular iOS software development kit (SDK) used by over 1,200 apps—with a total of more than a billion mobile users—is said to contain malicious code with the goal of perpetrating mobile ad-click fraud and capturing sensitive information. According to a report published by cybersecurity firm Snyk, Mintegral — a mobile programmatic advertising platform owned by Chinese mobile ad tech company

 Feed

"In today's knowledge economy, continual learning is an imperative." — Those words from Aytekin Tank, the founder of JotForm, are particularly important for anyone working in IT or development. With over 1,000 premium courses (complete list) from top instructors, StackSkills Unlimited provides endless learning opportunities. Right now, you can grab lifetime membership for $59. Categories of

 Feed

If your web-server runs on Apache, you should immediately install the latest available version of the server application to prevent hackers from taking unauthorized control over it. Apache recently fixed multiple vulnerabilities in its web server software that could have potentially led to the execution of arbitrary code and, in specific scenarios, even could allow attackers to cause a crash

2020-08
Aggregator history
Tuesday, August 25
SAT
SUN
MON
TUE
WED
THU
FRI
AugustSeptemberOctober