Showing posts with label Security. Show all posts
Showing posts with label Security. Show all posts

Saturday, 4 May 2013

Samsung Galaxy S4 wins Pentagon security nod

The Pentagon gives official support to any Samsung unit secured by the Knox security programming, which until further notice incorporates just the Galaxy S4.

Samsung is currently clear to begin pitching its new lead telephone to the administration.
The handset producer declared Friday that its Knox-empowered portable units have been endorsed by the Pentagon for government utilization. Samsung's Knox programming offers abnormal amount encryption, a Vpn characteristic, and a route to differentiate individual information from work information. The programming likewise empowers It heads to maintain a versatile apparatus through particular strategies.
For the present, the Galaxy S4 is the main Samsung apparatus furnished with Knox. Be that as it may the association guarantees that different cell phones and tablets will gain the security programming.

The thumb's up from the Pentagon implies that the S4 and future Knox units could be utilized by U.s. government and military branches that take advantage of the Department of Defense systems. Access to the aforementioned systems needs heightened security models, and the S4 is the first Android telephone to meet the necessities, as per Samsung.

The new exceptional status likewise opens up certain sorts of organizations as potential new clients for Samsung.

"We are exceptionally satisfied to report that the U.s. Division of Defense has sanction Samsung Knox-empowered apparatuses for utilization in Dod organizes," Samsung Mobile President Jk Shin said in a comment. "This support empowers other government firms and directed commercial ventures for example medicinal services and monetary administrations to receive Samsung Galaxy cell phones and tablets. This is a noteworthy breakthrough for Samsung as we work to develop our relationships inside government and hefty corporate endeavors."

On Thursday, the Pentagon gave the same approbation to Blackberry apparatuses with the Blackberry 10 working framework, which makes as its Q10 and Z10 cell phones and Playbook tablets.
In the past, Blackberry was the go-to merchant for government and huge business because of the abnormal amount security on its units. Yet Apple and Android have started cutting out of a lump of this lucrative business. Samsung specifically is expecting to muscle in on Blackberry's domain with assistance from its Knox programming.

Part of the Samsung for Enterprise (Safe) drive, Knox comes incorporated with the working framework and addresses all major security openings in Android, consistent with the association. Knox's capability to keep particular and business information divide matches a comparative characteristic in Bb10 called Blackberry Balance.

Up to now at any rate, Blackberry hasn't had all the earmarks of being worried about Samsung's undertakings.

"Whatever any of our contenders affirm, one thing won't change. The most secure versatile figuring result is a Blackberry unit running on a Blackberry stage," David Smith, official Vp of versatile processing for Blackberry, said in February.

The legislature's nod to both Samsung and Blackberrry still forgets Apple vulnerable.
The iphone creator is likewise looking for endorsement from the Department of Defense for its portable apparatuses. Particularly, the Dod ought to affirm the ios 6 working framework as secure enough to be utilized by protection firms and the military. Then again, that approbation is wanted inside the following not many weeks, The Wall Street Journal reported Wednesday.

Passing the administration's security test doesn't mechanically ensure a deal. Supports "don't straightforwardly bring about item requests, however expedite the procedure by taking out the requirement for security audits at the single Dod conglomeration level," a Defense Department agent told the Journal.
Samsung, Blackberry, and conceivably Apple will in any case need to battle over lucrative government contracts about as they do in the business planet. Be that as it may positing Apple does score security approbation, every one of the three opponents will duke it out on a surprisingly, playing field.

Technical sex. Hulk Hogan against Gawker, Fleshbot Gawker, compared with China is trying to Citibank

Sunday, 11 March 2012

'Hot-spot honeypot' hacker's heaven

Hacker for, Junkies at the end of the smart phone to check the thousands of fur in the southwestern and southern Lam tweeting.
Today, some of the funny things that happened in the south - in the Southwest Conference. Virtual private network be disabled, and a rainbow on my laptop after a stranger, a friend of his window, and an animated cat, flying up into the air and separated.
Nyan Cat LulzSec hacker group called the People's 2011 Internet breast movie, because as soon as I saw the use of at least one occasion. I hacked my friend about the comedy, and shut down faster than a laptop. (Related stories and links to Wi-Fi to make a slideshow about a visit by CNET - in).
Darren Kitchen, Hak5, founder of the show, a Starbucks around the corner, standing in a line about the security at the meeting is guilty of only a few minutes later. In his session, and they call for a special software to display the WiFi Pineapple and unsecured Wi-Fi connections from a specific router, written by how easy it is class. In his discussion of the proper "information for a purpose - to provide a rich environment." Nyan Cat Stupid video that played on the laptop and the audience members were surprised to find the web, surfing, when the music blared in the demo out.
Moxie social - media savvy, but the recipe is easy to kill thousands of security hacker is a small number of SXSW participants. Galaxy interface smartphones, BlackBerrys, iPhones, Androids use, and they have a hotel or a Starbucks Wi-Fi (the name of "attwifi" who) is connected to a notebook that has a long list, but the kitchen was in fact tricked with WiFi Pineapple. "There is a security which is in each case," he said in a scroll list of Wi-Fi router to connect to devices.
If you are a dangerous thing a person - in - the - middle attacks Kitchen want, and tries to steal passwords and other information that may be eaten unaware victims. But do not attack them in their mission to show the people of the risks and to education. Therefore, Nyan Cat Internet phone instead of the program with the Web page.
"Trying to get the device back to the same network, started, and Wi-Fi router instead of the signal is close to my man, since the selection is done," Kitchen said. "Wi-Fi router Demo - in, I was half of the audience."
In particular, Wi-Fi to connect to Wi-Fi devices Pineapple looking for is a "Honeypot hot - spot" is called. Wi-Fi devices, the user device or Wi-Fi will automatically turn to the probe request and at the time. Device, Wi-Fi networks in the list of messages to note that the link is required. Kitchen equipment, a user looking for a router acting as a Wi-Fi network. Open Wi-Fi network, but works with the restriction that users are required to enter a password to connect to the WPA encryption standard. "The trust model is the normal free Wi-Fi flaw," he said.
Applying the model to his laptop, Wi-Fi connections, Wi-Fi router, see something similar to sending messages, the "Wi-Fi interference present in your package D - accept that the security of the same." A not
Automatically reconnects automatically when an intermediate network devices to remember the last problem set. "Security vendors, and their care through the implementation of all the network name," Kitchen said. The solution is both a challenge and response protocol for authentication and encryption is needed, he said. He said that there is no out, because, however, mobile phone manufacturers to network users, perhaps, some need to click.
Kitchen, in public areas and in the magnet, WiFi, the most successful version of the pineapple with a simple aluminum box has been added to the surface of a rechargeable lithium battery. ATM and an escalator, he added. The box is easy, for example, a hotel dining at the wall outlet plug-in for is considered to be hidden under a bench. "If you can find a 3G network and the remote one, and it has remained there permanently, on the way."
Government agencies and security professionals hired by the WiFi Pineapple penetration of the test kitchen of Audit, as part of the security of their networks that sells for $ 90.

Sunday, 1 January 2012

Microsoft releases out-of-band security update to plug .NET hole

Meet in moment for the new gathering, Microsoft released a rarified out-of-band department update, its 100th of the year. The update represents "spend heroics" for the unit that sacrificed Christmas to block a earnest instrument hole.

No one in Redmond is sound champagne to fete the 100th and ultimate Microsoft warranty update of the gathering.

MS11-100, released today, is a rarefied out-of-band warrant update-one delivered on a Weekday, individual weeks sprouted of the succeeding regularly scheduled Connector Weekday achievement.

The bulletin, described in this blog mark, is rated Severe for a Forswearing of Pair (DoS) danger and specifically praises the ASP.NET squad for its "pass heroics":

    Yesterday eve, we publicized an Front Request alerting customers to a new out-of-band precaution update proposed to be released today. The notification listed the update as addressing a Supercritical Elevation-of-Privilege vulnerability, activity to various questions from customers who foreseen the bulletin addressing a Denial-of-Service danger to be rated Central.

    Before opportunity most this vulnerability, we had proposed to release a .NET protection update addressing ternion vulnerabilities, one of which was a Discerning elevation-of-privilege danger. When this danger notification arrived a few weeks ago, the ASP.NET group included the fix into the update already being mature and tried. So the bulletin today addresses four vulnerabilities, one of which is the ASP.NET Denial-of-Service danger presented yesterday. You can interpret statesman nearly the separate vulnerabilities in the Warranty Bulletin and we also elicit you to connexion us for a webcast at 1:00 p.m. PST today (Dec 29) where we testament account the vulnerabilities and work your questions springy "on the air." You can structure up for the webcast here.

The digit patterned vulnerabilities impress the Microsoft .NET Possibility on every subsidized variation of Windows, including Windows XP SP3, Windows Vista, Windows 7, Windows Server 2003, and Windows Computer 2008 and 2008 R2. Exploits against unpatched systems could accept an assailant to "have any sue in the circumstance of an existing chronicle on the ASP.NET place, including executing arbitrary commands."

The update faculty be delivered without soul intervention to machines that person Pistol Updates rotated on. If you opt not to move, subject Windows Update and stay for updates manually. Here's what it looks same.

Typically, an out-of-band update indicates that the probability of "in the wild" exploits is high, so this update demands close tending.