Warning: include(/home1/george/public_html/wp-content/advanced-cache.php): failed to open stream: No such file or directory in /home1/george/public_html/wp-settings.php on line 84

Warning: include(): Failed opening '/home1/george/public_html/wp-content/advanced-cache.php' for inclusion (include_path='.:/opt/cpanel/ea-php74/root/usr/share/pear') in /home1/george/public_html/wp-settings.php on line 84

Deprecated: Array and string offset access syntax with curly braces is deprecated in /home1/george/public_html/wp-includes/script-loader.php on line 706

Deprecated: Array and string offset access syntax with curly braces is deprecated in /home1/george/public_html/wp-includes/script-loader.php on line 706

Deprecated: Array and string offset access syntax with curly braces is deprecated in /home1/george/public_html/wp-includes/script-loader.php on line 707

Deprecated: Array and string offset access syntax with curly braces is deprecated in /home1/george/public_html/wp-includes/script-loader.php on line 707

Deprecated: Function get_magic_quotes_gpc() is deprecated in /home1/george/public_html/wp-includes/load.php on line 760
security – Tales from the bits http://talesfromthebits.com This is a blog about technology, computer science, software engineering and personal notes from these fields Fri, 17 Jun 2016 16:53:16 +0000 en-US hourly 1 https://wordpress.org/?v=5.1.16 Microsoft will patch 9 vulnerabilities on Tuesday http://talesfromthebits.com/2012/07/microsoft-will-patch-9-vulnerabilities-on-tuesday.html http://talesfromthebits.com/2012/07/microsoft-will-patch-9-vulnerabilities-on-tuesday.html#respond Fri, 06 Jul 2012 13:42:58 +0000 http://talesfromthebits.com/?p=468 Microsoft announced that will release a security update that will include 3 critical and 6 important security vulnerabilities on Tuesday July 11th.

One of the critical vulnerabilities include Internet Explorer 9.

Microsoft customers will have the opportunity to ask questions on the security bulletins in a web-cast  that will be held by Microsoft on July 11, 2012, at 11:00 AM Pacific Time (US & Canada).

As always, you should install the security updates as soon as they are available.

]]>
http://talesfromthebits.com/2012/07/microsoft-will-patch-9-vulnerabilities-on-tuesday.html/feed 0
VOIP and P2P privacy flaws http://talesfromthebits.com/2011/10/voip-and-p2p-privacy-flaws.html http://talesfromthebits.com/2011/10/voip-and-p2p-privacy-flaws.html#respond Sun, 30 Oct 2011 16:16:34 +0000 http://talesfromthebits.com/?p=209 Skype and other Internet-based phone systems have flaws that could potentially disclose the identities, locations and even digital files of the hundreds of millions of users of these systems.

The research was conducted by Chao Zhang and Keith Ross of NYU-Poly; Stevens Le Blond of the Max Planck Institute for Software Systems (MPI-SWS), Germany; and Arnaud Legout and Walid Dabbous of the French research institute I.N.R.I.A Sophia Antipolis.

It is important to mention that  even when a user blocks callers or connects from behind a Network Address Translation (NAT) , it does not prevent the privacy risk.

By using commercial geo-location mapping services, the researchers, found that they could construct a detailed account of a user’s daily activities even if the user had not turned on Skype for 72 hours. In one example, they accurately tracked one volunteer researcher from his visit at a New York university to a vacation in Chicago, a return to a New York university, lodging in Brooklyn, then to his home in France. “If we had followed the mobility of the Facebook friends of this user as well, we likely would have determined who he was visiting and when,” the authors said.

How do we value our privacy?

The researchers has informed Skype and Microsoft for these vulnerabilities.

]]>
http://talesfromthebits.com/2011/10/voip-and-p2p-privacy-flaws.html/feed 0
Quantum Cryptography Breached With Lasers http://talesfromthebits.com/2010/09/quantum-cryptography-breached-with-lasers.html http://talesfromthebits.com/2010/09/quantum-cryptography-breached-with-lasers.html#respond Sat, 18 Sep 2010 08:06:09 +0000 http://talesfromthebits.com/?p=185 InformationWeek

Up until recently quantum cryptography thought to be secure to transmit cryptographic keys. Any attempt to eavesdrop the transmission could be easily detected (based on Heisenberg uncertainty principle).  This was proved wrong by the team of researchers from the Norwegian University of Science and Technology (NTNU), the University of Erlangen-Nürnberg and the Max Planck Institute for the Science of Light in Erlangen. The team developed a quantum eavesdropping technique that remotely controls the photon detector.  The researchers wrote that someone “can attack the systems with off-the-shelf components, obtaining a perfect copy of the raw key without leaving any trace of her presence.”

Vadim Makarov, one of the researchers, said that  “The security loophole we have exposed is intrinsic to a whole class of single-photon detectors, regardless of their manufacturer and model.”

]]>
http://talesfromthebits.com/2010/09/quantum-cryptography-breached-with-lasers.html/feed 0
BitLocker or TrueCrypt? http://talesfromthebits.com/2010/01/bitlocker-or-truecrypt.html http://talesfromthebits.com/2010/01/bitlocker-or-truecrypt.html#comments Sun, 10 Jan 2010 14:40:25 +0000 http://talesfromthebits.com/?p=153 (Last updated May 31 ,2014)

Latest update: Truecrypt Shut Down. The sourceforge page informs Truecrypt users to migrate any data encrypted by TrueCrypt to encrypted disks or virtual disk images supported on your platform.

BitLocker and TrueCrypt are data encryption software packages. The question is which one to use and why? BitLocker comes with Windows 7 Ultimate edition. It is also  available in Windows 8.1 Pro, Windows 8.1 Enterprise editions and Windows Server 2012 R2. TrueCrypt is free open source software. As of this last update, TrueCrypt does not support Windows 8. You can find the supported operating systems here.

Michael Pietroforte at 4SYSOPS has two very interesting articles. In the first article he comparesTrueCrypt 5 vs. Bitlocker. There are no significant speed differences between the two programs.  The second article is a discussion about Windows 7 BitLocker. Good news is that with Windows 7 using BitLocker is much easier comparing with Windows Vista.

With BitLocker if your computer does not have a Trusted Platform Module chip the start up key in a USB stick. On the other hand TrueCrypt wants to only to memorize a pass phrase.

Which one to use?

BitLocker:

  • Can be used in a whole Windows environment
  • Allows storage of startup key in USB stick
  • Allows IT Administrators to enforce Group policy

TrueCrypt:

  • Can be used with many operating systems including Microsoft and Linux
  • It is free and open source.
  • It does not require to store a start up key to any device. You must remember the pass phrase. Of course you can store your pass phrase in any storage media at your own risk.

From the above discussion, I believe that for large corporations the preferred solution would be BitLocker. For smaller businesses or for your personal computer or laptop TrueCrypt offers a really great solution.

For the security perspective there is the ‘Evil Maid’ attack that can be used to TrueCrypt to acquire the pass phrase. BitLocker uses trusted boot that can be attacked too.  So, what is the ‘Evil Maid’ attack? In a nutshell the attack is as follows:

  • You leave your laptop into your hotel room and you go for breakfast.
  • An evil maid (enemy) enters your room and changes the boot-loader.
  • Next time you will operate your computer and enter your key it will be transmitted to the eavesdropper.

The attack, along with the software is explained by Joanna Rutkowska.  There is also a very interesting discussion about “Evil Maid’  in Bruce Schneier’s blog.

As a conclusion, both BitLocker and TrueCrypt are excellent programs that can encrypt data. Now that you know the pros and cons of the programs and also the attack methods I hope it is easier to select the appropriate one for your needs.

My personal preference is TrueCrypt for the simple reason that is open source. Being open source makes it very difficult to add a backdoor. The code is visible, anyone can spot it. This might not be the same with commercial products.

(Update April 2014) US consultancy iSEC has completed on April 2014  a detailed two – person code audit of the software seeking security holes. The audit has turned up a dozen bugs in the code that is TrueCrypt, but not signs of backdoors or other critical security holes. You can access the full report in pdf fprmat here.

]]>
http://talesfromthebits.com/2010/01/bitlocker-or-truecrypt.html/feed 2
Insecure US drones are hacked with the 26$ SkyGrabber software http://talesfromthebits.com/2009/12/insecure-us-drones-are-hacked-with-the-26-skygrabber-software.html http://talesfromthebits.com/2009/12/insecure-us-drones-are-hacked-with-the-26-skygrabber-software.html#respond Fri, 18 Dec 2009 12:56:00 +0000 http://talesfromthebits.com/2009/12/insecure-us-drones-are-hacked-with-the-26-skygrabber-software.html Wall Steet Journal: Iraq militants used SkyGrabber a 26$ software to intercepted live video feeds from U.S Predator drones. The U.S. military personnel in Iraq discovered the problem when they found a laptop of a Shiite militant which contained files of intercepted drone video feeds.
The capture of the feed was possible because the downlink between the unmanned craft and ground control in unencrypted. The solution is to add encryption to the system. The problems of adding encryption include a price increase on the drones and also interoperability problems between sharing of time-sensitive data within the U.S. military and with allies.

My comment is that this is a good security lesson to those that believe that unprotected data will be difficult to be discovered or that it is difficult to steal sensitive data which is transmitted without encryption.

]]>
http://talesfromthebits.com/2009/12/insecure-us-drones-are-hacked-with-the-26-skygrabber-software.html/feed 0
Details of major DNS flow http://talesfromthebits.com/2008/07/details-of-major-dns-flow.html http://talesfromthebits.com/2008/07/details-of-major-dns-flow.html#comments Thu, 24 Jul 2008 09:53:00 +0000 http://talesfromthebits.com/2008/07/details-of-major-dns-flow.html On July 21, Zynamics.com CEO Thomas Dullien (aka Halvar Flake) made a guess about the bug, admitting that he knew very little about DNS, but his findings were quickly confirmed by Matasano Security, a vendor that had been briefed on the issue.[2] According to Matasano Security, which briefly published the details of the security hole in its blog, an attacker with a fast internet connection would only need 10 seconds to carry out such an attack. The blog entry has since been removed – even from the Google cache. [1]
“The cat is out of the bag. Yes, Halvar Flake figured out the flaw Dan Kaminsky will announce at Black Hat.” Matasano said in a blog posting that was removed within five minutes. You can find the original post here.
An attacker could use a fast Internet connection to launch what is known as a DNS cache poisoning attack against a Domain Name server and succeed, for example, in redirecting traffic to malicious Web sites within about 10 seconds. [2]

References
[1] http://www.heise.de/english/newsticker/news/113228
[2] Robert McMillan, 2008, Details of major Internet flaw posted by accident Available at: http://www.computerworld.com/action/article.do?command=viewArticleBasic&taxonomyName=spam__malware_and_vulnerabilities&articleId=9110418&taxonomyId=85

]]>
http://talesfromthebits.com/2008/07/details-of-major-dns-flow.html/feed 1