11/22/2014

putin pays extreme right in Europe for its support (another stalin-hitler pact)

"Front national, nouveau « parti de l’étranger » ? La question risque de hanter le congrès du parti d’extrême droite, qui s’ouvre samedi prochain, au centre des congrès de Lyon. Selon les informations obtenues par Mediapart, la présidente du FN a décroché, en septembre, un prêt de 9 millions d’euros de la First Czech Russian Bank (FCRB), une banque fondée en République tchèque aujourd’hui basée à Moscou.
http://www.mediapart.fr/journal/france/221114/marine-le-p...

and so it goes throughout nearly the whole extreme right in Europe which is fascinated by his authoritain leadership and guided by its anti-americanism

Permalink | |  Print |  Facebook | | | | Pin it! |

meanwhile in #Mexico - 43 students become the symbol of a nation in protest

by murdering those students the bandits have accomplished what no corrupt government at any level at any time in Mexican history has accomplished

bring thousands and thousands of people in the street during weeks to protest for more democracy and legality and just a normal life

but they ain't going to wait or stand still

Permalink | |  Print |  Facebook | | | | Pin it! |

the new complete Man in the Middle attack : Double Direct (and they get it all)

"DoubleDirect uses ICMP Redirect packets (type 5) to modify routing tables of a host. This is legitimately used by routers to notify the hosts on the network that a better route is available for a particular destination[2]. However, an attacker can also use ICMP Redirect packets to alter the routing tables on the victim host, causing the traffic to flow via an arbitrary network path for a particular IP. As a result, the attacker can launch a MITM attack, redirecting the victim’s traffic to his device. Once redirected, the attacker can compromise the mobile device by chaining the attack with additional Client Side vulnerability (e.g: browser vulnerability), and in turn, provide an attacker with access to the corporate network.

 

With the detection of DoubleDirect in the wild we understood that the attackers are using previously unknown implementation to achieve full-duplex MITMs using ICMP Redirect. Traditional ICMP Redirect attacks has limitations and known to be half-duplex MITM. Zimperium Mobile Security Labs researched the threats and determined that the attackers are able to predict the IPs being accessed by the victim. We have investigated the attacks and also created a POC tool to prove that it is possible to perform full-duplex ICMP Redirect attacks. ICMP Redirect attacks are not easy to emulate because the attacker must know beforehand which IP address the victim has accessed. (There isn’t a systematic way to forward all the traffic from the victim through the attacker.)
http://blog.zimperium.com/doubledirect-zimperium-discover...

so if they earn all the traffic from and to your machine because it goes through their servers than there is not a lot you can do to protect yourself and if you aren't fully encrypted from end to end than you just lose everything.

Permalink | |  Print |  Facebook | | | | Pin it! |

why should malware only take one password if it could copy all your passwords

"IBM Trusteer researchers found a new configuration of Citadel that is being used to compromise password management and authentication solutions. It instructs the malware to start keylogging (capturing user keystrokes) when some processes are running.

 

The relevant part of the configuration is shown below (in IBM Trusteer’s proprietary format):

 

Snippet form the Citadel configuration file (in IBM Trusteer
http://securityintelligence.com/cybercriminals-use-citade...

so in fact this means that now with a passwordmanagement software but later with whatever identification file or system on your computer it can be intercepted or copied

that is way in the safe portable (sophos) the identification files are not in root or kernel or system of windows but on a preboot encrypted seperated system (and this is why it doesn't work with the Belgian EID but only with a token from safenet)

Permalink | |  Print |  Facebook | | | | Pin it! |

how airplanes can be monitoring and intercepting your mobile phones (one pic)

Spy Planes Equipped with Dirtbox Devices Collecting Smartphone Data

Permalink | |  Print |  Facebook | | | | Pin it! |

Snowden and Greenwald are polically dead in the US

"Now it looks very much like Greenwald is becoming a voice in the blogging wilderness again, and Snowden is watching from Moscow, once again isolated, as his explosive revelations fizzle out politically. On Tuesday, led by Republicans voting en masse, the U.S. Senate defeated a motion to vote on the USA Freedom Act, which would have curbed the NSA's bulk collection of Americans' phone records. The new, harder-line Republican Congress coming in January doesn’t seem likely to pass the bill either
http://www.politico.com/magazine/story/2014/11/edward-sno...

Now those two are lamblasting the system and the judicial system and the stupid public and whatever they can think off (the media for example) but they seem to forget - as we have said here months ago - that Putin has changed as much the perception of the discussion as 9/11 had when we were discussing Echelon in 2001.

Putin has brought us to the brink of the cold war again and his permanent madness of sending bombers and submarines to our coasts - sometimes nuclear-capable - with all the risks of military incidents or collasions with civil airlines is just too mad to understand. It brought the possibility of military incidents right at our border instead of somewhere in some far part of Ukraine where there is everyday some shooting but nothing that could be really called a real big war.

ISIS has helped also off course.

And it just doesn't seem the right time now to dismantle the NSA now. You never know what they may miss because of the reorganisation, the limited resources or capabilities. They missed an 9/11 once because they didn't have enough translators and analysts.

as long as there is more oversight - for the moment few people care enough

Permalink | |  Print |  Facebook | | | | Pin it! |

truste fined by the US FTC for forgetting to check yearly the security of all its clients

"The US Federal Trade Commission (FTC) has charged TRUSTe, US-based provider of privacy certifications for online businesses, for deceiving consumers about its recertification program for companies’ privacy practices. The FTC Chairwoman, Edith Ramirez, said that “TRUSTe promised to hold companies accountable for protecting consumer privacy, but it fell short of that pledge. Self-regulation plays an important role in helping to protect consumers.  But when companies fail to live up to their promises to consumers, the FTC will not hesitate to take action."

 

The FTC alleges that from 2006 until January 2013, TRUSTe failed to conduct annual re-certifications in over 1,000 cases, but its website informed consumers that companies holding TRUSTe Certified Privacy Seals receive recertification every year.
http://www.privacylaws.com/Int_enews_21_11_14

they have some explanation but whatever they say it ain't right and so it proves that if one wants to set up such a procedure than one needs to do it right

Permalink | |  Print |  Facebook | | | | Pin it! |

HP does the right thing : no slave labor to make your computer or printer

"The electronics manufacturer HP has announced a series of landmark policy changes on labor practices throughout its global supply chains, becoming the first U.S. information technology company to halt the common use of recruitment agencies for hiring foreign migrant workers among its suppliers.

 

Recruitment agencies, which often hire poor workers in one country for employment in another, have for years been criticized for a range of practices that can facilitate forced labor and slavery. Advocates thus see requiring the direct employment of migrant workers by suppliers of multinational corporations as a key opportunity to crack down on bonded labor and other rights abuses in the international economy.

 

“Workers who are employed by labor agents are more at risk of forced labor than those employed directly,” Dan Viederman, the head of Verité, a Massachusetts-based NGO that worked with HP to develop the new recruitment policies, said in a statement.
http://www.mintpressnews.com/hp-becomes-first-tech-compan...

maybe all governmental and big contractors should put the same obligation in their contracts

Permalink | |  Print |  Facebook | | | | Pin it! |

explaining the electrocal (electric electoral) shocks and waves in the US lately

"There is one finding that can well explain the unusual volatility and disaffection of so many American voters over the last decade. In 2000, 16 percent of households were headed by people without high school diplomas, and another 51 percent were headed by people without college degrees. From 2002 to 2012, the median income of the first group, across age cohorts, declined at an average annual rate of 2.4 percent, year after year; and the median income of the second group, across age cohorts fell at an average annual rate of 1 percent, year after year. That tells us that two-thirds of American households have suffered persistent income losses as they aged from 2002 to 2012, through eight years of economic expansion along with two years of serious recession. The median income of the remaining households, headed by college graduates, increased over this period—but at only one-third of the rate of households headed by college graduates in the 1980s and 1990s.

 

These trends have enormous electoral consequences. They explain why, in recent years, overall positive economic numbers and growth are not translating into feelings of shared prosperity. That’s why so many Americans are angry and ready to turn on whichever party has most recently failed to restore the broad income progress that almost everyone experienced in the 1980s and 1990s.
http://www.brookings.edu/blogs/fixgov/posts/2014/11/18-ec...

and this is what will happen in Belgium as we going through a wave of protests and afterwards huge reductions in wages, pensions, subsidies and available income

the same thing can be seen since 2007 in other countries and recently in France

Economists and investors are talking about growth and invesments and returns but the people who do the work don't see much of it, on the contrary

Permalink | |  Print |  Facebook | | | | Pin it! |

what the hell is going on here, massive attacks looks like cyberwar - anybody awake

what is this

somebody declared cyberwar ?

Permalink | |  Print |  Facebook | | | | Pin it! |

Chinese networks are attacking US networks live here (not a game)

this is just small sniper fire

http://map.ipviking.com/

if you don't need traffic from China, don't accept traffic from China, just block it at the router or the firewall

Permalink | |  Print |  Facebook | | | | Pin it! |

networks are slow because the biggest DDOS attacks ever are happening

this is a  picture

it is around 400 GBPS a second

OVH in France in implicated like several servers in the US

the strangest thing is that nobody is seeing this or doing something to stop it

we really need an international center that could cut those servers or routers or hosters untill they have cleaned up their act

Permalink | |  Print |  Facebook | | | | Pin it! |

Fake leaks, fake hacks but real leaks and possible leaks

There are some fake leaks around and as an alert blog you will get caught by them. The reason that we can get caught by them is that we have no authority whatsoever to test them. If we would test them than we would be breaking the law and than every stupid lawyer or just some of all the decisionmaker over here which would rather see me go could land me in court so I could lose my job and so on. Because whatever you do or say the fact that you land up in court means that you lose and there is no way that you can correct this. People will always think that there is still something to it and that suspicion will always stay - even if you are looking for another or better job.

So since ten years I have never been in court and I tend to keep it his way even if I was reporting and researching or discovering all kinds of leaks and breaches.

So we never test those leaks because the only test would be that I would try to use the published credentials to get access and that is illegal whatever you say about it.

It is up for the people who own these credentials or the services they use to do the tests and to take immediate measures of protection if that should be needed.

There are also sometimes hacks that aren't hacks because as in the case of some forum the forum wasn't hacked but the old admin had copied all the information of the members and placed it online. It is maybe not a hack but it is a leak and as such it stays a big problem.

So the information we publish here are possible leaks. Something some services need to check out and if it ain't a leak than it was worth testing it because if it would be a real leak than there would be a lot of trouble and work.

Permalink | |  Print |  Facebook | | | | Pin it! |

NATO stops 200 million cyberattacks a day of which 5 very serious each week

source http://news.sky.com/story/1377444/natos-cyber-war-games-a...

that is why training is so important and that has to be according to scenario's because attacks follow a complicated scenario's in which there are several different aspects that in case of discovery or breach have to be treated at the same time and of which some have to be visible to the attacker and others don't because it is all a mindgame in the first place (chess)

Permalink | |  Print |  Facebook | | | | Pin it! |

US legal framework for information sharing about cyberincidents is stalled

the reason is that it isn't seperated from the more overal discussion about information sharing with the intelligence and securityservices and as such is part of the global discussion about surveillance, democracy and what is a security threat

these things are much clearer in cybersecurity and it is necessary that such discussions and agreements are seperate from discussions about terrorism, subversion and surveillance

they should talk about ddos, hacking attemps, botnets, phishing attacks and so on

source article that follows http://justsecurity.org/17653/takeaways-house-intelligence-committee-cybersecurity-hearing/

On information sharing, Representatives Rogers and Ruppersberger pushed for passage in the lame-duck session of a bill to permit sharing of cyber threat information between the private sector and the government. Rogers and Ruppersberger’s bill on the issue, the Cyber Threat Information Sharing & Protection Act (“CISPA”), passed the House in April 2013, but drew a veto threat from the White House and generated broad public opposition due to privacy concerns about the businesses providing Internet users’ information to the government. A Senate information sharing bill, the Cybersecurity Information Sharing Act, has prompted similar concerns. Proponents of cyber threat information sharing see it as crucial to facilitating increased security for U.S. systems and networks, but such information sharing has been pulled into the broader debate about surveillance reform and the flow of information to the intelligence community. The failure of the USA FREEDOM Act earlier this week substantially dims the chances for information sharing legislation until the new Congress.
http://justsecurity.org/17653/takeaways-house-intelligenc...

Permalink | |  Print |  Facebook | | | | Pin it! |

some damn clear facts about terrorism in 2013

that doesn't mean that in your physical securityplan you don't have to take the protection into account (there are several books about specific physical protection for buildings against terrorism going from bomb attacks (perimeter defense) to hostage taking (secret entrances and secret hide rooms))

source (the documents can be downloaded at the site without registration)

Permalink | |  Print |  Facebook | | | | Pin it! |

#ukraine just a reminder that this is a local limited but REAL daily war

so those who think that we shouldn't have so much attention for it are wrong

here weapons are tested, here strategies are being adopted, here future special soldiers are being trained, here plans are being made for 2020 (by Russia) when its military will have finished its transformation and will have all the new weaponary it needs for...... (read what Putin is saying publicly and you know)

or we win this war and send a clear message now, or we have another one and worse in a few years

Permalink | |  Print |  Facebook | | | | Pin it! |

#ukraine is becoming the biggest real testfield for military hardware in Europe

Even if those weapons have been developed for the wars in Afghanistan and Iraq, they have never been tested in real war in Europe with another climate and other battle conditions. So both sides are starting to send their newest military hardware to the Ukranian battlefield (this is what it is really, sad to say) and to learn what works and what should be changed - especially in the new doctrine of waging or combating a Hybrid war (which is even different from the kinds of wars that are being fought in Iraq and Afghanistan).

 

for those interested in the networking of the battlefield, you will see that secure communication is part of the infrastructure and the success of these military hardware

This is in fact a big argument for NATO or other countries or even industries to get their newest weaponary to Ukraine so they can achieve some military balance and keep the conflict under control as long as there is no diplomatic solution and have a learning process that no exercise can give. When it comes to real or limited war somewhere on our Eastern European borders than those leassons will be very important. The Baltic states surely think so.

Permalink | |  Print |  Facebook | | | | Pin it! |

and the DDOS storms get bigger and bigger : 500 GBPS (against Hong Kong Protest sites)

"The websites, Apple Daily and PopVote, have been vocal supporters of the pro-democracy protests and even carried out mock chief executive elections for Hong Kong. Cloudflare, a company which is employed to protect websites against distributed denial of service attacks, has revealed thatsince June, these two websites have been bombarded by attacks of unprecedented size.

According to Matthew Prince, CEO of Cloudflare, the attacks have hit 500 gigabits per second (Gbps), which tops attacks in February of 400Gbps that were at the time the biggest in internet history.

According to Prince, who was speaking to Forbes: "[It's] larger than any attack we've ever seen, and we've seen some of the biggest attacks the Internet has seen."

Last year a DDoS (distributed denial of service) attack on the anti-spamming group Spamhaus was declared the "biggest in the history of the internet" peaking at 300Gb
http://www.ibtimes.co.uk/largest-cyber-attack-history-hit...

now where does that come from  ?

Permalink | |  Print |  Facebook | | | | Pin it! |

Danish tax administration will use #luxleaks as evidence for reviewing the taxes

the tax administration in Danmark has said that it will use the luxleaks documents and they will ask the firms for an explanation and maybe even ajust the taxes (upwards). They will also use the documents to understand how these countries are negotiating and setting up such tax-rulings, probably to find ways to make them even more difficult or illegal in the future

source for translation that follows http://politiken.dk/oekonomi/fokus_oekonomi/Luxembourg_laekage/ECE2462186/skat-gaar-paa-jagt-i-hundredvis-af-stjaalne-skatteaftaler/

""Tax examines the publicly available agreements between individual companies and the state of Luxembourg closer. If there is information in the material, and this will affect the settlement of tax in Denmark, it will be treated based on the rules of Skat control work - in addition to this materiality and risk, "said in a written statement to Politiken .

Insight into the secret world

Taxes do not want to elaborate. But before the publication of the hundreds of tax treaties, which escaped from the accounting firm PwC Tax expressed interest in gaining insight into how these tax treaties are designed:

"We have heard that such agreements exist, but we have never been told what is in them, and we have never seen one," said Troels Kjølby Nielsen, Tax Administration Division, responsible for international tax treaties"

my comment : this kind of discussions have been going on before about stolen listings and documents and sometimes they have been holding up cases for years or even decennia (ubs case for example) but in the end they were used somewhere - even if it was to blackmail the firms or people into coming to some agreement with the tax administration because they also can't always go through a public conflict about their taxes for years.

Permalink | |  Print |  Facebook | | | | Pin it! |

1 2 3 4 5 6 7 8 Next