Side-Channel PoC Attack Lifts Private RSA Keys from Mobile Phones

Side-Channel PoC Attack Lifts Private RSA Keys from Mobile Phones

Researchers launched a Proof-of-Concept attack on two Android mobile phones and an embedded system board. Researchers have developed a proof-of-concept side-channel attack that allows them to pull encryption keys from a single decryption for a modern version of OpenSSL. The attack impacts mobile devices — without physical access to the handsets. A group of researchers…

Vulnerability in US Oil & Gas Infrastructure: FBI Eyes Plethora of Mississippi River & South Louisiana Infrastructure-Related Threats

Vulnerability in US Oil & Gas Infrastructure: FBI Eyes Plethora of Mississippi River & South Louisiana Infrastructure-Related Threats

NEW ORLEANS (AP) — Giant cranes loading and unloading gargantuan barges. Oil tankers, supply vessels and pipelines serving a vital energy industry. Flood control structures. Chemical plants. Cruise ships. Drinking water sources. All computer-reliant and tied in some way to the internet. All of them vulnerable to cyber thieves, hackers and terrorists. Roughly nine months…

A Guided Tour of the Asian Dark Web

A Guided Tour of the Asian Dark Web

The Asian dark web is not well known. Most people just think of Russia when thinking about underground hacking forums. To gain a better understanding of Asian onion sites and black markets, researchers from IntSights embarked on a six-month long investigation and analysis. The results, published this week at Black Hat, show a diverse, culturally…

[UPDATED] SIM Swap Fraud: AT&T Sued for $224 Million After Phone Hackers’ $24 Million Crypto Hack

[UPDATED] SIM Swap Fraud: AT&T Sued for $224 Million After Phone Hackers’ $24 Million Crypto Hack

“law enforcement has even confirmed that AT&T employees profited from working directly with cyber terrorists and thieves in SIM swap frauds“ [UPDATED 22 AUG 2018 – ARREST MADE … scroll down]   Michael Terpin is suing AT&T [aka formerly SBC], claiming the company’s failure to protect his cellphone data led to hackers stealing $24 million…

SatCom Hacks: Hundreds of Planes Exposed to Remote Attacks

SatCom Hacks: Hundreds of Planes Exposed to Remote Attacks

“the astonishing fact is that this botnet was, inadvertently, performing brute-force attacks against SATCOM modems located onboard an in-flight aircraft”   A researcher has discovered that hundreds of airplanes from several airlines could have been hacked remotely from the ground through vulnerabilities in satellite communications systems. Back in 2014, IOActive Principal Security Consultant Ruben Santamarta…

Foreshadow and L1 Terminal Fault (L1TF): New Vulnerabilities Affecting Intel CPUs

Foreshadow and L1 Terminal Fault (L1TF): New Vulnerabilities Affecting Intel CPUs

Foreshadow: New Speculative Execution Flaws Found in Intel CPUs Researchers and several major tech companies on Tuesday disclosed the details of three new speculative execution side-channel vulnerabilities affecting Intel processors. The flaws, tracked as Foreshadow and L1 Terminal Fault (L1TF), were discovered independently by two research teams, who reported their findings to Intel in January,…

China Expands Surveillance of Sewage to Police Illegal Drug Use

China Expands Surveillance of Sewage to Police Illegal Drug Use

Chinese officers destroy seized drugs in June, 2018   Privacy concerns, cultural differences fuel skepticism about this approach in other settings Dozens of cities across China are applying an unusual forensic technique to monitor illegal drug use: chemically analysing sewage for traces of drugs, or their telltale metabolites, excreted in urine. One southern city, Zhongshan,…

First Look at DEF CON 26 Official Badge

First Look at DEF CON 26 Official Badge

To the delight of everyone, this year’s official DEF CON badge is an electronic badge chock full of entertainment. Of course there is blinky, the board is artistic, and everyone hopefully maybe gets one (it’s rumored 27,000+ were manufactured) if they don’t run out. But the badge contest at DEF CON is legendary — solve…

Honeypot Highlights Danger to ICS Systems From Criminal Hackers

Honeypot Highlights Danger to ICS Systems From Criminal Hackers

Nation-state attacks against the critical infrastructure of an adversary state are effectively military operations; and military operations are planned with incredible detail.   A security firm established a sophisticated honeypot masquerading as a power transmission substation for a major electricity provider. The purpose was to attract attackers and analyze how they operate against the energy…

West Virginia USA Offers Overseas Military Members Blockchain Voting Option for Midterm Elections

West Virginia USA Offers Overseas Military Members Blockchain Voting Option for Midterm Elections

U.S. troops serving overseas will be able to use a smartphone app based on blockchain technology for casting federal election ballots in West Virginia this November, CNN reports August 6. The mobile voting platform, Voatz, employes facial recognition software to ensure that each voter matches their government-issued identification. CNN notes that the West Virginia will…

Machine Learning Analysis: New Open Source Tools Help Find Large Twitter Botnets Using Twitter’s API

Machine Learning Analysis: New Open Source Tools Help Find Large Twitter Botnets Using Twitter’s API

Researchers have uncovered a huge botnet that mimics legitimate accounts on Twitter to spread a cryptocurrency “giveaway” scam. As reported by ITPro, the discovery was made during a research effort by Duo Security that looked at 88 million Twitter accounts from May to July and used machine learning to identify bots, malicious or otherwise, on the social…