Security-Portal.cz je internetový portál zaměřený na počítačovou bezpečnost, hacking, anonymitu, počítačové sítě, programování, šifrování, exploity, Linux a BSD systémy. Provozuje spoustu zajímavých služeb a podporuje příznivce v zajímavých projektech.

Kategorie

Phishing Scam Cloaks Malware With Fake Google reCAPTCHA

Threatpost - 22 Únor, 2019 - 22:29
Phishing emails target a bank's users with malware - and make their landing page look more legitimate with fake Google reCAPTCHAs.
Kategorie: Hacking & Security

Reddit Gold: Alice and Bob, Caught in a Web of Lies

Threatpost - 22 Únor, 2019 - 22:23
There was a shocking turn of events in crypto-world.
Kategorie: Hacking & Security

Android Pie à la mode: Security & Privacy

Google Security Blog - 22 Únor, 2019 - 20:39
Posted by Vikrant Nanda and René Mayrhofer, Android Security & Privacy Team

[Cross-posted from the Android Developers Blog]


There is no better time to talk about Android dessert releases than the holidays because who doesn't love dessert? And what is one of our favorite desserts during the holiday season? Well, pie of course.

In all seriousness, pie is a great analogy because of how the various ingredients turn into multiple layers of goodness: right from the software crust on top to the hardware layer at the bottom. Read on for a summary of security and privacy features introduced in Android Pie this year.
Platform hardening
With Android Pie, we updated File-Based Encryption to support external storage media (such as, expandable storage cards). We also introduced support for metadata encryption where hardware support is present. With filesystem metadata encryption, a single key present at boot time encrypts whatever content is not encrypted by file-based encryption (such as, directory layouts, file sizes, permissions, and creation/modification times).

Android Pie also introduced a BiometricPrompt API that apps can use to provide biometric authentication dialogs (such as, fingerprint prompt) on a device in a modality-agnostic fashion. This functionality creates a standardized look, feel, and placement for the dialog. This kind of standardization gives users more confidence that they're authenticating against a trusted biometric credential checker.

New protections and test cases for the Application Sandbox help ensure all non-privileged apps targeting Android Pie (and all future releases of Android) run in stronger SELinux sandboxes. By providing per-app cryptographic authentication to the sandbox, this protection improves app separation, prevents overriding safe defaults, and (most significantly) prevents apps from making their data widely accessible.
Anti-exploitation improvements
With Android Pie, we expanded our compiler-based security mitigations, which instrument runtime operations to fail safely when undefined behavior occurs.

Control Flow Integrity (CFI) is a security mechanism that disallows changes to the original control flow graph of compiled code. In Android Pie, it has been enabled by default within the media frameworks and other security-critical components, such as for Near Field Communication (NFC) and Bluetooth protocols. We also implemented support for CFI in the Android common kernel, continuing our efforts to harden the kernel in previous Android releases.

Integer Overflow Sanitization is a security technique used to mitigate memory corruption and information disclosure vulnerabilities caused by integer operations. We've expanded our use of Integer Overflow sanitizers by enabling their use in libraries where complex untrusted input is processed or where security vulnerabilities have been reported.
Continued investment in hardware-backed security

One of the highlights of Android Pie is Android Protected Confirmation, the first major mobile OS API that leverages a hardware-protected user interface (Trusted UI) to perform critical transactions completely outside the main mobile operating system. Developers can use this API to display a trusted UI prompt to the user, requesting approval via a physical protected input (such as, a button on the device). The resulting cryptographically signed statement allows the relying party to reaffirm that the user would like to complete a sensitive transaction through their app.

We also introduced support for a new Keystore type that provides stronger protection for private keys by leveraging tamper-resistant hardware with dedicated CPU, RAM, and flash memory. StrongBox Keymaster is an implementation of the Keymaster hardware abstraction layer (HAL) that resides in a hardware security module. This module is designed and required to have its own processor, secure storage, True Random Number Generator (TRNG), side-channel resistance, and tamper-resistant packaging.

Other Keystore features (as part of Keymaster 4) include Keyguard-bound keys, Secure Key Import, 3DES support, and version binding. Keyguard-bound keys enable use restriction so as to protect sensitive information. Secure Key Import facilitates secure key use while protecting key material from the application or operating system. You can read more about these features in our recent blog post as well as the accompanying release notes.
Enhancing user privacy

User privacy has been boosted with several behavior changes, such as limiting the access background apps have to the camera, microphone, and device sensors. New permission rules and permission groups have been created for phone calls, phone state, and Wi-Fi scans, as well as restrictions around information retrieved from Wi-Fi scans. We have also added associated MAC address randomization, so that a device can use a different network address when connecting to a Wi-Fi network.

On top of that, Android Pie added support for encrypting Android backups with the user's screen lock secret (that is, PIN, pattern, or password). By design, this means that an attacker would not be able to access a user's backed-up application data without specifically knowing their passcode. Auto backup for apps has been enhanced by providing developers a way to specify conditions under which their app's data is excluded from auto backup. For example, Android Pie introduces a new flag to determine whether a user's backup is client-side encrypted.

As part of a larger effort to move all web traffic away from cleartext (unencrypted HTTP) and towards being secured with TLS (HTTPS), we changed the defaults for Network Security Configuration to block all cleartext traffic. We're protecting users with TLS by default, unless you explicitly opt-in to cleartext for specific domains. Android Pie also adds built-in support for DNS over TLS, automatically upgrading DNS queries to TLS if a network's DNS server supports it. This protects information about IP addresses visited from being sniffed or intercepted on the network level.


We believe that the features described in this post advance the security and privacy posture of Android, but you don't have to take our word for it. Year after year our continued efforts are demonstrably resulting in better protection as evidenced by increasing exploit difficulty and independent mobile security ratings. Now go and enjoy some actual pie while we get back to preparing the next Android dessert release!

Making Android more secure requires a combination of hardening the platform and advancing anti-exploitation techniques.


Acknowledgements: This post leveraged contributions from Chad Brubaker, Janis Danisevskis, Giles Hogben, Troy Kensinger, Ivan Lozano, Vishwath Mohan, Frank Salim, Sami Tolvanen, Lilian Young, and Shawn Willden.
Kategorie: Hacking & Security

Video: HackerOne CEO on the Evolving Bug Bounty Landscape

Threatpost - 22 Únor, 2019 - 19:53
Threatpost talks to HackerOne CEO Marten Mickos on the EU's funding of open source bug bounty programs, how a company can start a program, and the next generation of bounty hunters.
Kategorie: Hacking & Security

Data Breaches of the Week: Tales of PoS Malware, Latrine Status

Threatpost - 22 Únor, 2019 - 19:32
U.S. and subcontinent consumers were the most affected by this week's exposure revelations.
Kategorie: Hacking & Security

Threatpost News Wrap Podcast For Feb. 22

Threatpost - 22 Únor, 2019 - 18:21
From password manager vulnerabilities to 19-year-old flaws, the Threatpost team broke down this week's biggest news stories.
Kategorie: Hacking & Security

How to Stop Facebook App From Tracking Your Location In the Background

The Hacker News - 22 Únor, 2019 - 16:56
Every app installed on your smartphone with permission to access location service "can" continually collect your real-time location secretly, even in the background when you do not use them. Do you know? — Installing the Facebook app on your Android and iOS smartphones automatically gives the social media company your rightful consent to collect the history of your precise location. If you
Kategorie: Hacking & Security

Facebook lets Android users block location tracking

Sophos Naked Security - 22 Únor, 2019 - 15:44
Facebook announced it's tweaking its Android version, which was tracking your location even when the app wasn't in use.

Advertisers flee YouTube after video comments get even more disgusting

Sophos Naked Security - 22 Únor, 2019 - 14:18
Can YouTube ever keep video comments under control, or it is time to kill off comments altogether?

Hacking Virtual Reality – Researchers Exploit Popular Bigscreen VR App

The Hacker News - 22 Únor, 2019 - 14:17
A team of cybersecurity researchers from the University of New Haven yesterday released a video demonstrating how vulnerabilities that most programmers often underestimate could have allowed hackers to evade privacy and security of your virtual reality experience as well as the real world. According to the researchers—Ibrahim Baggili, Peter Casey and Martin Vondráček—the underlying
Kategorie: Hacking & Security

Microsoft fixes web server DDoS bug

Sophos Naked Security - 22 Únor, 2019 - 13:51
Overzealous use of HTTP/2 flow control settings in IIS could have brought servers to their knees.

Flash “security bypass” list hidden in Microsoft Edge browser

Sophos Naked Security - 22 Únor, 2019 - 13:20
Until this month, the Edge browser could bypass its own warnings about Flash content on 58 websites, thanks to a hidden list.

The Current State of Artificial Intelligence in Cybersecurity — CyberSpeak Podcast

InfoSec Institute Resources - 22 Únor, 2019 - 13:17

On this episode of the CyberSpeak with InfoSec Institute podcast, Eric Stevens, vice president of engineering and principal architect at ProtectWise, discusses the current state of artificial intelligence in cybersecurity and the company’s recent report on the topic, “The State of AI in Cybersecurity.” In the podcast, Stevens and host Chris Sienko discuss: – How […]

The post The Current State of Artificial Intelligence in Cybersecurity — CyberSpeak Podcast appeared first on InfoSec Resources.

The Current State of Artificial Intelligence in Cybersecurity — CyberSpeak Podcast was first posted on February 22, 2019 at 6:17 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Threatpost Poll: Are Password Managers Too Risky?

Threatpost - 22 Únor, 2019 - 13:11
Weigh in on password managers with our Threatpost poll.
Kategorie: Hacking & Security

20 Popular Wireless Hacking Tools [Updated for 2019]

InfoSec Institute Resources - 22 Únor, 2019 - 13:00

Last year, I wrote an article covering popular wireless hacking tools to crack or recover password of wireless network. We added 13 tools in that article which were popular and work great. Now I am updating that post to add few more in that list. I will not explain about wireless security and WPA/WEP. You […]

The post 20 Popular Wireless Hacking Tools [Updated for 2019] appeared first on InfoSec Resources.

20 Popular Wireless Hacking Tools [Updated for 2019] was first posted on February 22, 2019 at 6:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Bluetooth “gas station” warning on Facebook – truth or hoax? [VIDEO]

Sophos Naked Security - 22 Únor, 2019 - 02:19
Can your phone reliably detect card skimmers using Bluetooth alone? Find out in the latest Naked Security Live video...

ThreatList: Porn-Focused Malware Triples, Dark Web Loves It

Threatpost - 21 Únor, 2019 - 20:01
Premium-access credentials to porn sites are hot in the cyber-underground, as credential-harvesting malware proliferates.
Kategorie: Hacking & Security

Adobe Re-Patches Critical Acrobat Reader Flaw

Threatpost - 21 Únor, 2019 - 18:05
Adobe has issued yet another patch for a critical vulnerability in its Acrobat Reader - a week after the original fix.
Kategorie: Hacking & Security

Highly Critical Drupal RCE Flaw Affects Millions of Websites

Threatpost - 21 Únor, 2019 - 16:54
Admins should update immediately to fix a remote code-execution vulnerability.
Kategorie: Hacking & Security

Password managers leaking data in memory, but you should still use one

Sophos Naked Security - 21 Únor, 2019 - 16:26
Several popular password managers appear to do a weak job at scrubbing passwords from memory once they are no longer being used.
Syndikovat obsah