GSM – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Wed, 16 Aug 2017 07:35:33 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png GSM – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 Leaky Pumps | TechSNAP 332 https://original.jupiterbroadcasting.net/117451/leaky-pumps-techsnap-332/ Tue, 15 Aug 2017 23:35:33 +0000 https://original.jupiterbroadcasting.net/?p=117451 RSS Feeds: HD Video Feed | MP3 Audio Feed | iTunes Feed | Torrent Feed Become a supporter on Patreon: Show Notes: Gas Pump Skimmer Sends Card Data Via Text Skimming devices that crooks install inside fuel station gas pumps frequently rely on an embedded Bluetooth component allowing thieves to collect stolen credit card data […]

The post Leaky Pumps | TechSNAP 332 first appeared on Jupiter Broadcasting.

]]>
RSS Feeds:

HD Video Feed | MP3 Audio Feed | iTunes Feed | Torrent Feed

Become a supporter on Patreon:

Patreon

Show Notes:

Gas Pump Skimmer Sends Card Data Via Text

  • Skimming devices that crooks install inside fuel station gas pumps frequently rely on an embedded Bluetooth component allowing thieves to collect stolen credit card data from the pumps wirelessly with any mobile device. The downside of this approach is that Bluetooth-based skimmers can be detected by anyone else with a mobile device. Now, investigators in the New York say they are starting to see pump skimmers that use cannibalized cell phone components to send stolen card data via text message.

  • Skimmers that transmit stolen card data wirelessly via GSM text messages and other mobile-based communications methods are not new; they have been present — if not prevalent — in ATM skimming devices for ages.

  • But this is the first instance KrebsOnSecurity is aware of in which such SMS skimmers have been found inside gas pumps, and that matches the experience of several states hardest hit by pump skimming activity.

  • see also Gas Theft Gangs Fuel Pump Skimming Scams

Erasing hard drives – dd might be enough – Dan talks about how he erased the drives


Feedback


Round Up:

The post Leaky Pumps | TechSNAP 332 first appeared on Jupiter Broadcasting.

]]>
Inspired – Not Directed By | Unfilter 142 https://original.jupiterbroadcasting.net/81637/inspired-not-directed-by-unfilter-142/ Wed, 06 May 2015 20:45:34 +0000 https://original.jupiterbroadcasting.net/?p=81637 Home grown terrorists strike in Texas, and “ISIS” is claiming responsibility. We break this story down and poke at the obvious & rather subtle flaws. Plus a Stingray breakthrough, the NSA’s Big Data problem, a look at the unlikeliest for 2016 & much more! Direct Download: Video | MP3 Audio | OGG Audio | Torrent […]

The post Inspired - Not Directed By | Unfilter 142 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Home grown terrorists strike in Texas, and “ISIS” is claiming responsibility. We break this story down and poke at the obvious & rather subtle flaws.

Plus a Stingray breakthrough, the NSA’s Big Data problem, a look at the unlikeliest for 2016 & much more!

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

Foo

Show Notes:

News:

NSA is so overwhelmed with data, it’s no longer effective, says whistleblower | ZDNet

William Binney

A former National Security Agency official turned whistleblower has spent almost a decade and a half in civilian life. And he says he’s still “pissed” by what he’s seen leak in the past two years.

In a lunch meeting hosted by Contrast Security founder Jeff Williams on Wednesday, William Binney, a former NSA official who spent more than three decades at the agency, said the US government’s mass surveillance programs have become so engorged with data that they are no longer effective, losing vital intelligence in the fray.

That, he said, can — and has — led to terrorist attacks succeeding.

ISIS claim responsibility for shooting at Texas Muhammad cartoon contest | Fox News

The claim was made in an audio message on the group’s Al Bayan radio station, based in the Syria city of Raqqa, which ISIS has proclaimed to be the capital of its self-proclaimed caliphate. It is the first time ISIS has taken credit for an attack on U.S. soil, though it was not immediately clear whether the group’s claim was an opportunistic co-opting of a so-called “lone wolf” attack as its own.

How Western media would cover Baltimore if it happened elsewhere

If what is happening in Baltimore happened in a foreign country, here is how Western media would cover it:

International leaders expressed concern over the rising tide of racism and state violence in America, especially concerning the treatment of ethnic minorities in the country and the corruption in state security forces around the country when handling cases of police brutality. The latest crisis is taking place in Baltimore, Maryland, a once-bustling city on the country’s Eastern Seaboard, where an unarmed man named Freddie Gray died from a severed spine while in police custody.

Black Americans, a minority ethnic group, are killed by state security forces at a rate higher than the white majority population. Young, black American males are 21 times more likely to be shot by police than white American males.

The United Kingdom expressed concern over the troubling turn of events in America in the last several months. The country’s foreign ministry released a statement: “We call on the American regime to rein in the state security agents who have been brutalizing members of America’s ethnic minority groups. The equal application of the rule of law, as well as the respect for human rights of all citizens, black or white, is essential for a healthy democracy.” Britain has always maintained a keen interest in America, a former colony.

The post Inspired - Not Directed By | Unfilter 142 first appeared on Jupiter Broadcasting.

]]>
Google Got Caught | Tech Talk Today 147 https://original.jupiterbroadcasting.net/79212/google-got-caught-tech-talk-today-147/ Fri, 20 Mar 2015 10:47:44 +0000 https://original.jupiterbroadcasting.net/?p=79212 The FTC found Google is abusing their monopoly position, but buried their case in 2013. We share the revealing details. Facebook has big plans for Messenger, Augmented VR gets teased… Then our Kickstarter of the week might just blow your mind! Direct Download: MP3 Audio | OGG Audio | Video | HD Video | Torrent […]

The post Google Got Caught | Tech Talk Today 147 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

The FTC found Google is abusing their monopoly position, but buried their case in 2013. We share the revealing details. Facebook has big plans for Messenger, Augmented VR gets teased…

Then our Kickstarter of the week might just blow your mind!

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Video Feed | Torrent Feed

Become a supporter on Patreon

Foo

Show Notes:

FTC Report: Google Purposely Demoted Competing Shopping Sites

Google deliberately blacklisted competing shopping search sites, despite the company’s past claims that it doesn’t target competitors this way, according to new details of the US Federal Trade Commission investigation into Google on anti-trust charges, found by the Wall Street Journal.

The WSJ obtained a 160 page FTC staff report from the investigation, finding that the FTC should move ahead with an anti-trust lawsuit on several fronts. Our own summary of the WSJ story can be found on our sister-site, Search Engine Land. FTC commissioners ultimately chose to settle with Google in 2013 rather than pursue legal action.

Inside the U.S. Antitrust Probe of Google – WSJ

Officials at the Federal Trade Commission concluded in 2012 that Google Inc. used anticompetitive tactics and abused its monopoly power in ways that harmed Internet users and rivals, a far harsher analysis of Google’s business than was previously known.

Facebook Plans To Turn Messenger Into A Platform | TechCrunch

At first, Facebook will focus on how third parties can build ways for content and information to flow through Messenger. Depending on the success of the early experiments, Facebook may then mull bringing more utilities to Messenger.

Watch Magic Leap’s Video Of Seamless Augmented Reality Office Game Play | TechCrunch

The company isn’t saying whether the video above is pure concept, or an example of live software running on its platform (the involvement of Weta tends to suggest the former), but it did confirm to TechCrunch that it is the source of the YouTube upload. If they can make good on this kind of promise, than the initial excitement and big funding rounds will start to make a lot more sense.

Amazon just got permission from the FAA to start testing its delivery drones in the US | The Verge

The FAA has issued a special “experimental airworthiness certificate” to Amazon, allowing the company to conduct outdoor research, testing, and training of its Prime Air delivery drones.


Spark Electron: Cellular dev kit with a simple data plan by Spark IO — Kickstarter

The M2M world was set up for the types of companies that make industrial products like shipping containers, vending machines, and ATMs. These old-school industries still have old-school practices. If you want to get some M2M SIM cards, you’ve got to get on the phone with somebody. You need an account manager, you’ve got to sign a bunch of paperwork, and it’ll be months before you even see a price sheet. The industry is set up for big, established companies that already know how to navigate telcos, not for individuals. And if you’re not in the club already, it’s hard to gain entrance.

Linux Action Show at LFNW | Teespring

We are releasing another set of LAS shirts in preparation for LinuxFest Northwest which is at the end of April 2015! We hope to color Bellingham Technical College with LAS supporters donning their favorite Linux podcast!

The post Google Got Caught | Tech Talk Today 147 first appeared on Jupiter Broadcasting.

]]>
SuperFishy Mistake | TechSNAP 202 https://original.jupiterbroadcasting.net/77712/superfishy-mistake-techsnap-202/ Thu, 19 Feb 2015 17:29:59 +0000 https://original.jupiterbroadcasting.net/?p=77712 Lenovo PCs ship with man-in-the-middle adware that breaks HTTPS connections, we’ll break down how this is possible, the danger that still exists & more. Plus the story of a billion dollar cyber heist anyone could pull off, the Equation group, your questions, our answers & much much more! Thanks to: Get Paid to Write for […]

The post SuperFishy Mistake | TechSNAP 202 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Lenovo PCs ship with man-in-the-middle adware that breaks HTTPS connections, we’ll break down how this is possible, the danger that still exists & more.

Plus the story of a billion dollar cyber heist anyone could pull off, the Equation group, your questions, our answers & much much more!

Thanks to:


DigitalOcean


Ting


iXsystems

Direct Download:

HD Video | Mobile Video | MP3 Audio | OGG Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feed | Torrent Feed

Become a supporter on Patreon:

Foo

— Show Notes: —

APT Attack robs banks

  • A staggering APT attack has been conducted against over 100 banks in 30 countries, and has reportedly managed to steal as much as 1 billion USD.
  • “In late 2013, an A.T.M. in Kiev started dispensing cash at seemingly random times of day. No one had put in a card or touched a button. Cameras showed that the piles of money had been swept up by customers who appeared lucky to be there at the right moment.”
  • While investigating, Kaspersky Labs found no malware on the ATM, just a strange VPN connection
  • Later, they were called into the bank’s headquarters, after the bank’s security officer got an alert about a connection from their domain controller to China
  • Kaspersky Video
  • “In order to infiltrate the bank’s intranet, the attackers used spear phishing emails, luring users to open them, infecting machines with malware. A backdoor was installed onto the victim’s PC based on the Carberp malicious code, which, in turn gave the name to the campaign — Carbanak.”
  • “After obtaining control over the compromised machine, cybecriminals used it as an entry point; they probed the bank’s intranet and infected other PCs to find out which of them could be used to access critical financial systems.”
  • “That done, the criminals studied the financial tools used by the banks, using keyloggers and stealth screenshot capabilities.”
  • “Then, to wrap up the scheme, the hackers withdrew funds, defining the most convenient methods on a case-by-case basis, whether using a SWIFT transfer or creating faux bank accounts with cash withdrawn by ‘mules’ or via a remote command to an ATM.”
  • On average, it took from two to four months to drain each victim bank, starting from the Day 1 of infection to cash withdrawal.
  • The oldest code that could be found related to these attacks was from August 2013
  • Additional Coverage – NY Times
  • Additional Coverage – ThreatPost
  • Additional Coverage – SecureList
  • Report PDF
  • This attack is related to the malware installed directly on ATMs that we have reported on before

Lenovo spyware installs own Root CA

  • It has been discovered that Lenovo has been shipping devices preinstalled with an advertising application called SuperFish
  • This “Visual Discovery” advertising system injects picture ads for items related to search terms into your google search results, and other websites
  • While this is bad enough, and upsets many people, the bigger problem is how they do it
  • In order to snoop upon the search terms you are using, SuperFish must intercept your encrypted communications with Google and others
  • In order to do this, the SuperFish software installs its own SSL Root Certificate Authority into the trusted certificate store
  • This makes your machine trust every certificate signed by SuperFish
  • The proxy that SuperFish installs, intercepts all of your web traffic, when it sees you trying to make a secure connection, which it would not be able to snoop on, what it does is create (on the fly), a new certificate for the site you are trying to visit (google.com, bankofamerica.com, whatever), and signs it with its private key
  • Now your browser trusts the authenticity of this fake certificate, so it does not issue a warning, and you are completely unaware that SuperFish is intercepting all of your communications
  • There are a number of security problems with this, including, does SuperFish sign a ‘valid’ certificate even for invalid certificates, like self signed certificates, meaning that an attack could trick you into going to a website, and seeing it as authentic when it is not, because SuperFish has signed a fresh certificate for it
  • Worse, because of the way SuperFish works, rather than relying on the SuperFish backend infrastructure to generate these bogus certificates, instead SuperFish ships the private key for their fake Root CA with their software
  • Researchers at Errata Security were able to crack the password used to encrypt the private key in only 3 hours
  • The password was: komodia
  • He found it fairly easily, first using procdump to defeat the self-encryption used by SuperFish (procdump wrote out the binary as it was in memory after it had decrypted it self)
  • Next, he ran the standard unix tool ‘strings’ on the resulting file, and found the encrypted SSL private key
  • After failed attempts to brute force it, or run a dictionary attack against it, he went back to his ‘strings’ file
  • After filtering it down to only include short all lowercase words, he used it as a dictionary, and found the password
  • Now, anyone can download the SuperFish software, extract the certificate and private key, and start signing bogus certificates for any website they wish, and every Lenovo or other machine that has the SuperFish software installed, will happily accept it as genuine
  • SuperFish CEO Adi Pinhas tells Ars that “Superfish has not been active on Lenovo laptops since December. We standby this Lenovo statement
  • While Lenovo and SuperFish disabled the server side component of SuperFish, which will prevent it from showing the ads, it seems that even uninstalling the SuperFish software, does not remove the trusted root certificate, leaving the users vulnerable to Man-In-the-Middle attacks
  • It is unclear what the certificate pinning feature in Google’s Chrome browser did not prevent this from working
  • Given that this same technique is popular in corporate security software, and there are also open source application proxies that can do it (OpenBSD’s relayd for one), it may be that Google had to relax their requirements to be compatible with corporate networks
  • Lenovo Forums
  • Additional Coverage – ThreatPost
  • Additional Coverage – TheNextWeb
  • Additional Coverage – TechSpot
  • Additional Coverage – ZDNet

The Equation Group — Part of the NSA?

  • Researchers at Kaspersky Lab have uncovered a cyberespionage group that has been operating for at least 15 years and has worked with and supported the attackers behind Stuxnet, Flame and other highly sophisticated operations.
  • Known as the Equation Group, used two of the zero days contained in Stuxnet before that worm employed them and have used a number of other infection methods +
  • Beginning in 2001, and possibly as early as 1996, the Equation Group began conducting highly targeted and complex exploitation and espionage operations against victims in countries around the world. The group’s toolkit includes components for infection, a self-propagating worm that gathers data from air-gapped targets, a full-featured bootkit that maintains control of a compromised machine and a “validator” module that determines whether infected PCs are interesting enough to install the full attack platform on.
  • An unusual if not truly novel way of bypassing code-signing restrictions in modern versions of Windows, which require that all third-party software interfacing with the operating system kernel be digitally signed by a recognized certificate authority. To circumvent this restriction, Equation Group malware exploited a known vulnerability in an already signed driver for CloneCD to achieve kernel-level code execution.
  • The trump card for the Equation Group attackers is their ability to inject an infected machine’s hard drive firmware. This module, known only by a cryptic name – “nls_933w.dll”, essentially allows the attackers to reprogram the HDD or SSD firmware with a custom payload of their own creation.
  • One of the Equation Group’s malware platforms, for instance, rewrote the hard-drive firmware of infected computers—a never-before-seen engineering marvel that worked on 12 drive categories from manufacturers including Western Digital, Maxtor, Samsung, IBM, Micron, Toshiba, and Seagate.
  • Additional Coverage – Ars Technica
  • Additional Coverage – ZDNet
  • Additional Coverage – Digital Munitition

Feedback:


Round-Up:


The post SuperFishy Mistake | TechSNAP 202 first appeared on Jupiter Broadcasting.

]]>
Questions for elementary OS | LAS 352 https://original.jupiterbroadcasting.net/77377/questions-for-elementary-os-las-352/ Sun, 15 Feb 2015 17:26:22 +0000 https://original.jupiterbroadcasting.net/?p=77377 Two members of the elementary OS project join us to discuss the recent dust up around their blog post asking for more funding from their users. We’ll ask the hard questions you’ve been wondering, get the latest from the project & talk about the future. Plus we look at the sales for the first BQ […]

The post Questions for elementary OS | LAS 352 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Two members of the elementary OS project join us to discuss the recent dust up around their blog post asking for more funding from their users. We’ll ask the hard questions you’ve been wondering, get the latest from the project & talk about the future.

Plus we look at the sales for the first BQ Ubuntu Touch edition, Linus’ personal choice award, some good news for OpenShot & more!

Thanks to:


DigitalOcean


Ting

Direct Download:

HD Video | Mobile Video | WebM Torrent | MP3 Audio | OGG Audio | YouTube | HD Torrent

RSS Feeds:

HD Video Feed | Large Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feed | Torrent Feed

Become a supporter on Patreon:

Foo

— Show Notes: —

A Chat with elementary OS


System76

Brought to you by: System76

Freya Beta 2 is here!

You thought the day would never come, but after 6 months and almost 600 fixes we’re bringing you the next step on our way to a final release of elementary OS 0.3!

elementary — Payments

We explicitly say you can download Luna for free, we include a pay-what-you-want (including $0) text entry with $10 pre-filled, and we also include an explicit “Download Luna for free” link that simply sets the text entry to $0 for you.

Next, you’re given the payment/download dialog:image

The text entry matches whatever was on the first screen, but we again let you change it to anything you’d like, including $0.

Users have downloaded Luna over 2,000,000 times. Around 99.875% of those users download without paying. Of the tiny 0.125% who do, the most common payments are the default $10, followed by $1. But again, only a tiny fraction of one percent of users even decide to pay in the first place.

Furthermore, we’ve received feedback that this flow is deceiving. It doesn’t make it clear enough that there are multiple payment options and it includes a payments step even if you’ve chosen to enter $0.

elementary misses the point « Blog Fiasco

A recent post on the elementary blog about how they ask for payment on download created a bit of a stir this week. One particular sentence struck a nerve (it has since been removed from the post): “We want users to understand that they’re pretty much cheating the system when they choose not to pay for software.”

elementary — How big is elementary OS really?


— PICKS —

Runs Linux

The Lego Movie… Runs Linux!

Lego movie creation software screenshot

So I was watching the making of The Lego Movie with the only purpose of finding some Linux goodness. I was pretty upset when I saw Windows 7 and Photoshop at a close up, but then there is the animation (and the GNOME) stuff.

Desktop App Pick

Lets Make Music (LMMS)

Produce music with your computer
by creating melodies and beats, synthesizing and mixing sounds, arranging samples and much more.

LMMS

Weekly Spotlight

AutoKey

AutoKey is a desktop automation utility for Linux and X11. It allows you to manage collection of scripts and phrases, and assign abbreviations and hotkeys to these. This allows you to execute a script or insert text on demand in whatever program you are using.

AutoKey features a subset of the capabilities of the popular Windows-based AutoHotkey, but is not intended as a full replacement. For a Linux-based implementation of AutoHotkey, see IronAHK. AutoKey’s GUI features a number of concepts and features inspired by the Windows program PhraseExpress.

Features
  • Python scripting engine allows you to automate virtually any task that can be accomplished via the keyboard and/or mouse
  • Built-in code editor with autocomplete and calltips
  • Scripts are plain Python files that can be edited in any text editor
  • Similarly, phrases are stored as plain text files
  • Create collections of phrases/scripts in folders, and assign a hotkey or abbreviation to the folder to display a popup menu
  • Regular expressions can be used to filter windows by their title or class, to exclude hotkeys/abbreviations from triggering in certain applications
  • Scripts, phrases and folders can be attached to the notification icon menu, allowing you to select them without assigning a hotkey or abbreviation

Our Past Picks

These are the weekly picks provided by the Jupiter Broadcasting podcast, the Linux Action Show.

This site includes a separate picks lists for the “Runs Linux”, Desktop Apps, Spotlight Picks, Android Picks, and Distro Picks.


— NEWS —

Ubuntu Phone Sells Out During First Flash Sale

BQ Ubuntu Phone

Despite the technical issues the Bq Aquaris E4.5 Ubuntu Edition handset managed to sell out its debut run.

BQ: 12,000 orders per minute

I am back from London. I attended the Ubuntu Phone Insider event and have an Ubuntu Phone I took back with me. Here is what think about the device and the OS. Help support my channel and make it possible for me to obtain devices to review.

VLC Media Player 3.0

VLC 3 Screenshot

VLC Media Player 3.0.0 is one of the most anticipated applications of 2015, eagerly awaited by millions of computer users worldwide. Prominent features of VLC 3.0 include Wayland support, a Chromecast output module, several Android improvements, among which we can mention rotation, opaque, and subpicture blending, as well as batch convert support.

Linux Torvalds awarded Arch Linux as the most consumer friendly distrobution

Arch Screenshot

The purpose of a GNU distribution is to make it easy for users to use their system. It’s a stupid idea to force your users to compile everything from scratch,” said Linus Torvalds at the event. If you think your users are going to compile everything, only compilers will use your software.

OpenShot Video Editor for Windows, Mac, and Linux by Jonathan Thomas — Kickstarter

openshot 2.0 GIF support

There are many challenges that go along with building any software. Some are obvious and some are more subtle. However, some challenges, as I’ve recently realized, aren’t related to computers at all. Sometime in late October, my wife and I decided that it would be fun to put our house on the market, and “test the waters”. We have been talking about moving out of Arlington, TX (a relatively big city) for years, and heading towards a bit more land, and less city. As fate would have it, we had an offer on our house within 1 week, and all of a sudden needed to find a new house, make repairs, pack, rent a moving truck, etc… etc… Needless to say, this required a lot of time and energy.


— FEEDBACK —

— CHRIS’ STASH —

Hang in our chat room:

irc.geekshed.net #jupiterbroadcasting

— NOAH’S STASH —

Noah’s Day Job

Altispeed Technologies

Contact Noah

noah [at] jupiterbroadcasting.com

Find us on Google+

Find us on Twitter

Follow us on Facebook

Catch the show LIVE Sunday 10am Pacific / 1pm Eastern / 6pm UTC:

The post Questions for elementary OS | LAS 352 first appeared on Jupiter Broadcasting.

]]>
Email Constipation | TechSNAP 46 https://original.jupiterbroadcasting.net/17312/email-constipation-techsnap-46/ Thu, 23 Feb 2012 19:17:56 +0000 https://original.jupiterbroadcasting.net/?p=17312 We answer the question: What to do when your email server gets blocked, and why it keeps happening. GSM phones are vulnerable to a simple attack.

The post Email Constipation | TechSNAP 46 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We answer the question: What to do when your email server gets blocked, and why it keeps happening.

PLUS: GSM phones are vulnerable to a simple tracking attack, all you need is some open source software and some spare hardware, we’ll share the details! And we introduce the TechSNAP “Hall of Shame”.

All that more, on this week’s TechSNAP!

Thanks to:

GoDaddy.com Use our codes TechSNAP10 to save 10% at checkout, or TechSNAP20 to save 20% on hosting!

Super special savings for TechSNAP viewers only. Get a .co domain for only $7.99 (regular $29.99, previously $17.99). Use the GoDaddy Promo Code cofeb8 before February 29, 2012 to secure your own .co domain name for the same price as a .com.

Pick your code and save:
cofeb8: .co domain for $7.99
techsnap7: $7.99 .com
techsnap10: 10% off
techsnap20: 20% off 1, 2, 3 year hosting plans
techsnap40: $10 off $40
techsnap25: 25% off new Virtual DataCenter plans
Deluxe Hosting for the Price of Economy (12+ mo plans)
Code:  hostfeb8
Dates: Feb 1-29

   

Direct Download Links:

HD Video | Large Video | Mobile Video | MP3 Audio | OGG Audio | YouTube

 

Subscribe via RSS and iTunes:

Show Notes:

GSM Networks allow attacks to determine your location without your knowledge

  • Researchers at the University of Minnesota have found a way that an attacker using open source software could locate your cell phone to within 1 square kilometer
  • The GSM Protocol attempts to mask the identity of individual devices by using temporary IDs, however it is possible to map the phone number to these temporary IDs
  • The attack works by placing repeated PSTN phone calls to the mobile number, but disconnecting before the first ring on the handset (~4 seconds)
  • This causes the cell towers in the area where the networks believe the user to be to broadcast ‘paging’ requests to the target handset’s temporarily or immutable ID
  • By listening in on the radio frequency for this broadcast, the attacker can determine if the target is in range of one of the cell towers near them. A few repeated calls allow the attacker to isolate which temporary ID corresponds to the mobile device they are placing the aborted calls to
  • In a large area services by many towers, an attacker can determine if the target is within approximately 100 square kilometers
  • This attack could be used by oppressive governments to determine if a person is present at a protest or other gathering without relying on support from the telco, to determine is a victim is away from home before attempting a robbery, or even to locate a high profile individual for stalking or assassination
  • Research Paper

Feedback:

Q: (Traci) My webhost has been added to an RBL and now emails sent from my domain and from my website cannot be received by some people, can you explain what an RBL is and why it is blocking my email. (Dreamhost servers blocked by Trend Micro RBL )[https://www.dreamhoststatus.com/2012/02/14/mailservers-on-trend-micro-rbl-working-on-removal-from-list/]

A: An RBL or Real Time Blacklist is a list of IP addresses or domain names that the maintainer of the list feels should be blocked from sending emails. There are many different RBLs which different criteria from inclusion and removal from their lists. Most RBLs operate based on DNS due to its light weight and extremely low latency.

So, when an ISP, say, comcast, receives new email directed to one of its customers, it will check details of that email against a number of RBLs they comcast subscribes to. It checks the sending IP, any links included in the email, etc. If one or more of these RBLs returns a positive result, the email may be flagged as spam, or rejected entirely.

Different RBLs cover different problems, Spamhaus.org has lists that cover spam, Trojaned PCs and Open Proxies, Dynamic IP ranges, Spam Domains (sites that spam links to), and compromised servers. Spamcop.net bases its RBL on emails they intercept at honeypot addresses, and sampling the emails that users pay $30/year to have their email filtered via spamcop.net.

One of the most common ways for a webhost to get added to an RBL is when one or most customers run insecure CGI or PHP scripts that send email. When that happens, and attacker can cause your site to send email, or install a script that sends email. Sending large amounts of spam from the web host’s servers will cause it to be listed in the RBLs until the webhost resolves the issue. Many RBLs are automated, where they will add an IP when it is detected as a source of spam, and remove it once it has stopped sending spam for 24 hours. The other common cause of listing in an RBL is hosting sites that are the target of the spam messages (rather than the source). When a web application such as wordpress is compromised, the attacker may be able to install their own site in a subdirectory, using your hosting to host the link that send out in their spam messages. The target of the spam could be a page directing the user to buy something, a phishing site designed to look like paypal or a bank, or even malware, hosting the executable or javascript that the unsuspecting user will run. This last example is similar to the exploit we saw with cryptome last week, if other websites on the internet were infected and made to load a javascript file from a domain hosted at your host, then anti-virus vendors such as Trend Micro may add your webhost to their block list.

In the past, there have been a number of legal battles against RBLs where senders have tried to prosecute the RBL for blocking their communications, however, in the end, it is up the individuals ISPs to decide which RBLs to use and how to interpret the results returned by the RBL.

Email Blacklist Check – See if your server is blacklisted


War Story:

Another in our continuing series of War Stories submitted by the other other Alan (Irish_Darkshadow)

*
This incident took place in mid-April 1999 about two months into my technical support career with the US Thinkpad desk. Despite my rocky start I had managed to establish a reputation for myself as an agent who liked to tackle the more difficult calls. In addition, I had also managed to avoid having a single customer “escalate” on me. That is where a user demands a superior or someone who knows more about their issue to take over the call. That all changed with a single call.

I arrived to work that day for my 16:30 to 01:30 shift and settled in to take my first call. It was a relatively easy one where the user had picked up their laptop from a servicer and was having boot problems. It turned out to be a simple case of the servicer having left a driver disk in the floppy drive. Top to bottom the call took about 13 minutes including typing up the documention for it in our ticketing system. I sat in Avail on my phone for the next few minutes before my next call arrived.

Once I managed to get the initial greeting script out I was slammed with a guy screaming down the line about wanting to speak to a manager. I was resigned at this point to losing my “no escalation” record but I still needed to follow procedure and determine what grievance had the user so irate before putting a team lead or manager on the line with him. It took me a few mins to calm him down enough and to vent sufficiently for me to start gathering some information. It turned out that he had returned his laptop to IBM on three separate occasions in the first nine weeks he had owned it for various compatibility issues with 3rd party devices he had purchased. I could see his point of view perfectly in wanting an escalation and I placed him on hold to go look for someone in authority to help the guy out.

My team leader (TL) at the time was easily located and once I had explained the situation he decided to delegate the matter to his assistant team leader (ATL). I took her to my desk where she started speaking with the user and I strolled back to my TL to get some ribbing for my first customer escalation. Normally when a TL or ATL takes over a call it results in the user being placated in some manner or else the customer gets transferred to Customer Relations to be dealt with appropriately. Either way, once an agent handed off a call like that they simply waited for a resolution before taking the next call. No such luck this time. The ATL walked up to where I was standing and started to explain the situation to the TL and how the user had returned the machine three times with no faults found but he still could not get his 3rd party devices to work. Nothing too new there but then she dropped the bombshell that she had promised the user that I would troubleshoot the hardware issues for him immediately! This was unheard of, the customer had four devices that I had no familiarity with and this ATL had just thrown me under the frickin’ bus. I looked at the TL for some sanity to be brought to the situation but he had to acknowledge that the ATL had committed a course of action to the customer and I was going to have to pay for her generosity. Back to my desk I went whilst cursing the ATL, her lineage and any future offspring…..but in a harmless way 😀

Once I was back on the call with the user I started to gather some details on exactly what I was dealing with. The user had a Thinkpad 560 which is termed a “single spindle” machine in that it only had a hard drive within the chassis and no floppy or optical devices. The external floppy drive was attachable via an IBM proprietary connector and the machine was a Pentium 120 with 32mb RAM, a 2.1 Gb HDD and an IrDA 1.0 header.

Now that I had some idea of the core hardware I ventured into the realm of 3rd party peripherals that the user was struggling with. He had a backpack cdrom (parallel port optical drive), a PCMCIA modem, a PCMCIA network card and a HP printer that he wanted to connect to via Infrared. I knew I was screwed at that point but figured I couldn’t really make the problem worse since none of the hardware operational anyway.

I began working with the backpack cdrom which was attached to the printer port. Windows 95 v2.1 was not detecting any new hardware once the drive was switched on. I tried the usual places like device manager for clues but all I could determine was that the parallel port appeared to be operational. I put the cdrom to the side and started working on the two PCMCIA cards. Despite the user having the proprietary CardMagic software installed that acted as a crutch to Windows 95 plug & play (*pray) neither card was detected and a pattern was beginning to emerge. The IR printer suffered from the same lack of detection and so I asked the user if he had any other device that we could attach to the laptop just to see if Windows was detecting anything at all. He connected up the external floppy drive and instantly it was detected and accessible in Windows Explorer. SHIT!!! My instincts were telling me that the OS was corrupted in some way and a reload was imminent and I hated having to do that to any user.

I sent an IM to the Team Leader to let him know that I was going to have to do a reload and he told me to stay on the call with the customer until the reload was complete and then resume working on the 3rd party hardware. As I was preparing the user for the reload I had a sudden realisation of how bad the situation really was. A single spindle machine comes with a specific reload solution where a user starts up Windows for the first time and they get prompted to insert floppy disks onto which the reload disk images will be “burned”. At first the customer didn’t recall any such prompt and I began to get a sinking feeling that I would need to have this laptop shipped to IBM for the 4th time just for a reload and then once it was returned to him, I would need to pick up with troubleshooting the 3rd party hardware. The user had a Eureka moment and told me that he believed that he had a shoe box with the floppy disks that had been in his office closet since the day he made them. He managed to locate the shoe box and the 37 floppy disks inside. 26 of those were the base OS and 11 were for the application layer.

I reckoned that the reload was going to take about two hours to complete which presented me with another challenge due to the team leader telling me to stay on the phone through to completion. One of the rules was that there should not be any dead silences during a tech support call so I was going to have to find a way to get this guy talking for the two hours in between me asking him about what was on the screen and how many disks he had left to go through. This was gonna be fun!

For the two hours of the reload, as the customer went through his 37 disks, I managed to lure him into topics like his job and prior computer experience and pretty much anything else I could come up with to keep things flowing. I was trying to hit on a topic that would allow for lots of conversation with minimal input from my side. It turned out that he was a Judge in NYC who handled criminal cases. The only common ground there is that I could explain to him that I loved My Cousin Vinny which I figured would not go down very well. Eventually he mentioned that his son was at soccer practice and he needed to arrange someone else to pick him up while we reloaded the laptop. That was my angle, I started talking to the guy about every possible soccer item that came to mind and the rest of the reload flew by without incident. I got him to go into the BIOS and I set up the the parallel port and PCMCIA slots before dealing with Windows.

Once the operating system was back on there and up and running I got him to attach the backpack cdrom and I heard the detection sound over the phone. That meant I had at least found one issue and corrected it. Device manager showed the cdrom with an exclamation mark and it looked to me like this thing needed to be installed from a DOS perspective before it would work in Windows. He had a driver disk for the cdrom which I was able to get running in DOS mode so that it added the driver to the config.sys file and called it from the autoexec.bat file. A quick reboot later and the cdrom was usable from within Windows 95. Problem #2 solved. Time for the PCMCIA fun and games.

I decided to go with setting up the modem first as it would be easiest to test. Upon insertion the card was instantly detected and I was able to talk him through configuring it in the CardMagic application. He hooked it up to his fax line and was able to connect to his ISP at a staggering, no, blistering 28.8kbps! Either way, problem #3 solved.

The network card was up next and once more upon insertion it was detected and was able to find a driver on the backpack cdrom drive. There was no network near the user that I could test with but I was able to talk him through some ping tests and winipcfg.exe tests that implied the TCP/IP stack was operational and the bindings to the card were good. So we agreed to call that problem #4 solved. I felt that I was in the home stretch now and when I looked at the clock I realised that the call was coming up on three and a half hours already. Now it was time to get the printer operational.

The printer was able to print a self test page from the buttons on it and so it appeared to be working from a hardware perspective. I got the user to test it using the parallel port by removing the backpack cdrom and that was also successful. The problem came when trying to get the IR link to the printer to work. No matter what configuration I tried I just could not get a connection between the IrDA header on the laptop and that on the HP printer. The customer refused to believe that it was the printer and was adamant that the IrDA header on the Thinkpad was at fault. I was completely stuck for a way to prove otherwise. At some point during that desperation to come up with a troubleshooting idea after nearly four hours of work I hit upon an idea that made sense…at least to me. I asked the user to confirm what COM port the IrDA was configured as and then I had him connect to that COM port via the Hyperterminal application. My next request was a weird one, I asked him to get a remote from a TV or a VCR for me. He rummaged around for a while and then found one for some small TV he had in his office that was barely used. I asked him to point it at the IrDA header on the laptop and keep pressing random buttons on it while watching the hyperterminal window. He said that gibberish symbols came up in the window whenever he pressed a button on the remote. EUREKA! I had solved problem #5 by proving that the issue was with the IR port on the printer and not the one on the laptop. He agreed with my conclusion and he asked me if I would set up the printer on the parallel port so that he could just hook up a cable if he needed to. As we were going through the steps of hooking up the backpack to install the driver he told me that he got a blue and then a black screen. The text said “registry not found”. Apparently he had decided to pull out the PCMCIA cards while the LPT printer driver was installing and it had thrashed Windows.

My first attempt at a solution was a reboot into safe mode but that failed with the same error and I was only able to get the system to reboot into DOS mode. From there I backed up the existing registry files and restored the user.da0 and system.dao clean registry files. When he booted back into Windows, we were back where things started….no hardware was detected once attached. EPIC USER FAIL!!!
With just over four hours on the timer, the whole procedure had to be done all over again. I asked the user if I could put him on hold and he agreed. Firstly I dealt with my bladder and then I went to the TL and told him what was happening and the sadistic bastard told me to go back with the user and see it through to completion. Fucker.

I got back onto the call and we started going through the whole process all over again from the ground up with one caveat – don’t do anything with the computer unless I authorised it. During the two hour reload portion of the call I got him to give me his AOL email address and I sent him a copy of a tool from the Microsoft site called E.R.U. (emergency recovery utility). This time around once we had managed to get all of the hardware and software to where it needed to be and we had done enough tests to convince us both that everything was operational. At that point I ran the ERU application and made him store that recovery set in his shoe box of floppy disks. We exchanged pleasanties and parted ways. I checked the timer and 8 hrs 38 minutes had passed.

On an average day I would deal with twenty to twenty five calls in a single shift. On this day I managed a grand total of two calls with 1 pee break and no food as I hadn’t taken any of my breaks. However, I was able to leave the office two hours earlier than expected. That didn’t really help with my complete burnout after that long of a call but at least I had a new record for the longest tech support call in the history of the call center and that record still stands today as far as I know.

Try to get a 8hr plus support call in a current day call center. Aside from the focus on 7 minutes per call I doubt you will find the will and dedication to send a customer away satisfied with the experience.

And I never even got a medal but if I ever get into nefarious matters in NYC, I will be calling in a favour from a certain Judge I know there.


Round Up:

The post Email Constipation | TechSNAP 46 first appeared on Jupiter Broadcasting.

]]> Unsafe Wifi | TechSNAP 38 https://original.jupiterbroadcasting.net/15256/unsafe-wifi-techsnap-38/ Thu, 29 Dec 2011 19:09:08 +0000 https://original.jupiterbroadcasting.net/?p=15256 A major implementation flaw in protected Wifi has been found, we’ll share the amazing details.

The post Unsafe Wifi | TechSNAP 38 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

A major implementation flaw in protected Wifi has been found, we’ll share the amazing details.

Also: A federally contracted think tank suffered a major breach this week, with needy charities being caught in the fall out!

Plus our end of year sign off, and so much more, in this week’s episode of TechSNAP!

Thanks to:

GoDaddy.com Use our codes TechSNAP10 to save 10% at checkout, or TechSNAP20 to save 20% on hosting!

Pick your code and save:
techsnap7: $7.49 .com
techsnap10: 10% off
techsnap11: $1.99 hosting for the first 3 months
techsnap20: 20% off 1, 2, 3 year hosting plans
techsnap40: $10 off $40
techsnap25: 25% off new Virtual DataCenter plans
techsnapx: 20% off .xxx domains

 

Direct Download Links:

HD Video | Large Video | Mobile Video | MP3 Audio | OGG Audio | YouTube

   
Subscribe via RSS and iTunes:

Show Notes:

Breaking

New York Times subscriber list may have been compromised

  • This story was first reported minutes before the recording of this episode of TechSNAP, so further information and verification were not possible
  • An email was sent to users asking them to reconsider cancelling their home delivery subscription
  • The email seems to have been targeted at anyone with a NYTimes.com accounts, not just current home delivery subscribers
  • Some people who received the message say that the NYTimes was the only 3rd party that had their email address
  • The email appears to have a correct DKIM signature, meaning it was signed with the private key of the email.newyorktimes.com domain
  • The email was sent via Epsilon Interactive, a mass emailing company that has previously been compromised
  • NYTimes First Responses: Blog.NYTimes.com Twitter
  • Email Headers
  • It is unclear if the email was the result of the compromise of Epsilon’s servers (and the NYTimes private key), or was accidentally sent to all subscribers instead of the intended subset

WiFi Protected Setup (WPS) flaw exposes millions of devices to trivial attack

  • WPS was created to allow users to more easily setup secure wireless networks
  • WPS uses either an 8 digit PIN number, or a ‘push to connect’ button on both the AP and Client device
  • This security vulnerability specifically targets the 8 digit PIN number
  • The 8 digit PIN results in a key space of 10^8 (100 million) keys
  • However, the last digit in the PIN is actually a checksum, used to detect typographic errors
  • The attack described below exploits a flaw in WPS where the attacker is able to determine by the response from a failed attempt, that the first 4 digits of the PIN matched
  • This combined with the last digit being a checksum, effectively narrows the key space of possible PINs to 10^4 + 10^3 (11,000) keys
  • Even this key space should be enough to keep attackers out, however it was discovered that many devices do not implement any type of failed login banning, making brute force attacks much easier and faster
  • It was also observed that rapid brute force attempts also seemed to have a Denial of Service effect on the targeted AP, exhausting its processor time responding to the authentication requests
  • Affected vendors include: Belkin, Buffalo, D-Link, LinkSys, NetGear, TP-Link and ZyXel
  • As of yet, there have been no new firmware offerings to resolve this issue
  • DD-WRT does not support WPS so is not vulnerable
  • To work around the problem, you can disable WPS on your AP, or if it is supported, set a long lockout time for failed attempts
  • Technical Details
  • Vulnerability Announcement

GSM Phones vulnerable to hijacking

  • Security researcher Karsten Nohl, known for his research into exploiting GSM to tap/eavesdrop on mobile phone calls, is set to present new research that he says allows an attacker to impersonate your phone, making calls and sending text messages to expensive premium services operated by the attacker
  • Such attacks are commonly executed against corporate land line PBX systems, breaking in to systems and then placing expensive per-minute calls, collecting large sums of money, and then disappearing before the victim gets their next phone bill and notices the problem
  • In the days of dialup, computer viruses that cause your computer to much similar expensive phone calls in the middle of the night were also fairly common
  • The vulnerability only effects the older 2G GMS network, however most all phones still support GMS as a fallback when newer 3G networks are not available
  • “We can do it to hundreds of thousands of phones in a short time frame,” Nohl told Reuters
  • Security Research Labs (the company Nohl works for) runs a website where they rank the various mobile providers based on their ease of Impersonation, Interception and Tracking
  • “None of the networks protects users very well,” Nohl said.
  • SRLabs plans to release data collection software, allowing users to participate in data collection to grow the improve the database
  • SRLabs research is focused in Europe and did not review any North American telcos

Anonymous claims responsibility for compromise of StratFor website, releases customer information via pastebin

  • The website of US security think tank Strategic Forecasting Inc (Stratfor) was compromised by attackers under the banner of the Anonymous movement
  • Other members of Anonymous stated that the attack was not an official operation, and that because Stratfor is a media source, they are protected by freedom of the press, a highly valued principle in the Anonymous movement
  • The pastebin posts are only flagged as #antisec and #lulzxmas, and may have been falsely attributed to anonymous by the media
  • Stratfor has suspended the operation of its website and email
  • The attackers have obtained the credit card details, password, and addresses of 4000 of Startfor private clients
  • The attackers claimed to have stolen 200GB of data, including emails and research
  • The goal of the #lulzxmas campaign was apparently to make 1 million dollars in donations to charities using stolen credit cards
  • Other twitter posts claim the total number of stolen credit cards was in excess of 90,000. Of these, two lists containing 3956 items and 13,191 items respectively, have been published
  • The data is said to include the CVV values for the credit cards, it is against the PCI-DSS standard to store the CVV value specifically for this reason, so that when a database is compromised, the CVV value is NOT disclosed, so that online stores that use the CVV value can still prevent fraud
  • It also appears that the users’ passwords were stored in plain text. The data that was released via pastebin had the passwords MD5 hashed, but even if that is how they were stored in the database, that is insufficient protection
  • Most of these funds will likely be charged back, actually costing the charities money
  • Stratfor describes itself as a provider of strategic intelligence for business, economic, security and geopolitical affairs
  • Stratfor’s said that they were working with law enforcement to attempt to apprehend the attackers
  • “Stratfor’s relationship with its members and, in particular, the confidentiality of their subscriber information, are very important to Stratfor and me,” wrote Mr. Friedman (Chief Executive of Startfor) in an email to clients
  • “Contrary to this assertion the disclosure was merely a list of some of the members that have purchased our publications and does not comprise a list of individuals or entities that have a relationship with Stratfor beyond their purchase of our subscription-based publications,”
  • Purported Client List
  • Client Details

Round Up:

The post Unsafe Wifi | TechSNAP 38 first appeared on Jupiter Broadcasting.

]]> Hacker Con Round-Up | Jupiter@Nite | 8.02.10 https://original.jupiterbroadcasting.net/2514/hacker-con-round-up-jupiternite-80210/ Mon, 02 Aug 2010 21:33:35 +0000 https://original.jupiterbroadcasting.net/?p=2514 We go BLACK (hat) and review the latest news to surface from Hacker Cons around the world! We’ll show you the latest antics from Black Hat and DEFCON.

The post Hacker Con Round-Up | Jupiter@Nite | 8.02.10 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Tonight on Jupiter@Nite, the boys go BLACK (hat) and review the latest news to surface from Hacker Cons around the world! We’ll show you the latest antics from Black Hat and DEFCON, where security protocols are run through the wringers. Are your cell phone call safe? Did your wallpaper app steal your Android information?

Tune in to find the glorious details!

Tonight’s Show Notes:

Black Hat Conference background:

     A computer security conference that has a unique blend of gov’t officials, corporate IT leaders and hackers in attendance.

     Black Hat was founded in 1997

     Ran in Las Vegas from Jul 24th to the 29th

     Made famous by the antics of their hacker attendees.

     Past conquests:  Local wireless services, hotel billing services, and even the lobby ATM.

     Also famous for exposing faults in popular software.  Sometimes without the prior knowledge of the software’s developers.  Most commonly browsers and operating systems.

 

TOP STORY

Mozilla finds security flaw in Black Hat’s pay-per-view Video Stream

     The stream cost $395 per head for viewing. Ouch.

     Ironic, since Mozilla has been a frequent target of Black Hat’s many ‘whistle blowing’ presentations re: browser security flaws.

     Sources indicate that the Mozilla foundation immediately notified Black Hat about the error, rather than holding onto the information to announce at a later date, as a deliberate “we’re more respectful than you” type of gesture.

 

Some other Black Hat demos:

 

Hacked ATM spews cash, sings a jaunty tune, and displays “Jackpot” on the screen.

     All hacked remotely, and demonstrated live.

 

This $1,500 system can hack into your cell phone calls

     Pretends to be a cell tower, so can even receive encrypted calls.

     Only 2G GSM calls

     “Encrypted calls are not protected from interception because the rogue tower can simply turn it off. Although the GSM specifications say that a phone should pop up a warning when it connects to a station that does not have encryption, SIM cards disable that setting so that alerts are not displayed.”

 

Hacking pre-paid parking meters

 

Android wallpaper app steals millions of subscriber’s personal info

     Watch for apps by “jackeey,wallpaper” and “IceskYsl@1sters!”

     Watch for apps that request access to “android.permission.READ_PHONE_STATE” which grants the application access to APIs to access the device’s phone #, subscriber ID, and more.

     UPDATE:  Details of which data was potentially stolen.

 

Help Crowd Source Jupiter@Nite (and other JB shows) News:

 

              Sign up for Google Reader

              Sign up for Google Buzz (Optional.. But the best way for everyone to discuss topics)

              Subscribe to the Jupiter”@”Nite Google Reader Bundle

              The Linux Action Show Bundle

              LOTSO Bundle

 

Download:

The post Hacker Con Round-Up | Jupiter@Nite | 8.02.10 first appeared on Jupiter Broadcasting.

]]>