Skip to main content

Home/ MOBIUS Libraries/ Group items tagged security

Rss Feed Group items tagged

anonymous

Survey Finds Secure Sites Not So Secure | threatpost - 0 views

  •  
    There is quite a bit of alarming data in what the project has gathered, and one of those pieces of information is that more than 148,000 of the sites surveyed are vulnerable to the BEAST attack, which was developed by researchers Juliano Rizzo and Thai Duong and disclosed last year. Their attack uses what's known as a chosen-plaintext attack against the AES implementation in the TLS 1.0 protocol and enables them to use a custom tool they wrote to steal and decrypt supposedly secure HTTPS cookies. The attacker can then hijack the victim's secure SSL session with a site such as an e-commerce site or online banking site.
anonymous

Adobe Introduces the Paid Security Fix - Slashdot - 0 views

  • "Adobe has posted a security bulletin for Photoshop CS5 for Windows and OSX. It seems there is a critical security hole that will allow attackers to execute arbitrary code in the context of the user running the affected application. Adobe's fix? You need to pay to upgrade to Photoshop CS6. For users who cannot upgrade to Adobe Photoshop CS6, Adobe recommends users follow security best practices and exercise caution when opening files from unknown or untrusted sources."
  •  
    Considering we own more than 1 copy of CS5, this is annoying.
anonymous

Generate and keep really secure passwords for free | ITworld - 0 views

  • Of course, they could look for a username that sounds like you in the list of 8 million LinkedIn and EHarmony logins and then just use the password published there, or the ones posted following the hack of 77 million user accounts at Sony or the 130 million credit-card accounts taken from the clearinghouse that processes your credit card payments, or tens of thousands lost by a New York electric utility or the California government services agency you thought was unquestionably trustworthy or the 24 million emails and user names swiped from Zappos or almost anywhere else.
  • you should use a different highly secure password at every site you use.
  • That way, no matter what web-site login database is breached next, your loss can be limited to only the information (or money) on that one site,
  • ...2 more annotations...
  • KeePass -- one of two apps with unquestioned leads; both come with Firefox and Internet Explorer extensions or web sites you can used independently; LastPass – the other of the two leaders. Both are stable, quick, reliable and free;
    • anonymous
       
      I've used LastPass. It's nice, but I prefer to have something local if possible. I'm not really concerned with their security, but it's nice to have your passwords offline.
  • KeePass;
    • anonymous
       
      This one doesn't have a browser integration but it can be kept on a usb key for portability
anonymous

Yahoo leaks its own private key via new Axis Chrome extension | Naked Security - 0 views

  •  
    Way to go Yahoo! At a time when most people have already forgotten your company still exists... release a security problem. Any press is good press, right?
adrienne_mobius

Syria has disappeared from the Internet. | LISNews: - 1 views

  •  
    Both Google and a Web security company called Umbrella Security Labs are indicating that the entire country of Syria was severed from the Internet on May 7 at 2:45 p.m.
anonymous

New Attack Breaks Confidentiality Model of SSL, Allows Theft of Encrypted Cookies | thr... - 0 views

    • anonymous
       
      It's worth noting that to execute this attack you have to be on the network of your target and have the ability to execute a man in the middle attack.
  •  
    Two researchers have developed a new attack on TLS 1.0/SSL 3.0 that enables them to decrypt client requests on the fly and hijack supposedly confidential sessions with sensitive sites such as online banking, e-commerce and payment sites. The attack breaks the confidentiality model of the protocol and is the first known exploitation of a long-known flaw in TLS, potentially affecting the security of transactions on millions of sites.
Justin Hopkins

Yahoo's password leak: What you need to know (FAQ) | Security & Privacy - CNET News - 1 views

  • All of which suggests that close to 300,000 people could have just seen their personal, non-Yahoo e-mail accounts compromised as well as their Yahoo accounts.
  • To be on the safe side, if you have a Yahoo ID, you should assume it's no longer secure and change its password. (I just did, and I've never visited Yahoo's contributor-network site until today.) Yahoo is also changing the passwords of affected users. You should, however, also change other passwords if: You've used the same password for any other major service -- particularly for sensitive accounts such as banking, investing, or e-mail. You've ever signed into Yahoo or Associated Content with a non-Yahoo e-mail address.
  •  
    Also mentioned in this article is the leak from a few months back of LinkedIn. If you have a LinkedIn account the same advice applies. Hopefully you were using a unique password for all of these services and have nothing to fear ;)
Justin Hopkins

Google Exec, Others Advise Tight Web Security After Writer Hack - 0 views

  •  
    If you don't already know what 2 factor authentication is - it's the use of a second out of band communication channel that is used in addition to your password. In the case of Google it means that when you go to log in they will send you a text message with a 6 digit numerical code that you'll type in as well. This means that would be hackers would need to not only know your password but also have physical access to your phone.  I've already enabled this feature for Google apps @mobiusconsortium.org - if you'd like to enable it for your account (it takes like 10 minutes to get set up and fix your applications) just let me know. 
Scott Peterson

Lebanon Library Torched, 78,000 Books Burned By Islamists - 0 views

  •  
    Ancient books in a historic library in the Lebanese city of Tripoli have been torched by Islamist, after a pamphlet purportedly insulting religion was found inside one of the books. Security sources say that up to 78,000 books, many irreplaceable ancient Muslim and Christian texts and manuscripts, are now unsalvageable, according to Agence France Press.
  •  
    Ancient books in a historic library in the Lebanese city of Tripoli have been torched by Islamist, after a pamphlet purportedly insulting religion was found inside one of the books. Security sources say that up to 78,000 books, many irreplaceable ancient Muslim and Christian texts and manuscripts, are now unsalvageable, according to Agence France Press.
Scott Peterson

Library thefts cost Austin more than $1 million in five years - 2 views

  •  
    A concerning article about the rate of theft at the Austin public library. Surprising is how only recently have borrowing limits been enacted and patrons required to renew their cards A collections agency is used for delinquent accounts, but there is little mention of a security system or how much is lost due to simple theft.
Scott Peterson

Security-State Creep: The Real NSA Scandal Is What's Legal - 0 views

  •  
    An interesting perspective on the unfolding NSA scandals, regarding how much of the massive surveillance is actually legal.
anonymous

Forget SOPA, You Should Be Worried About This Cybersecurity Bill | Techdirt - 0 views

  • However, the bill goes much further, permitting ISPs to funnel private communications and related information back to the government without adequate privacy protections and controls. The bill does not specify which agencies ISPs could disclose customer data to, but the structure and incentives in the bill raise a very real possibility that the National Security Agency or the DOD’s Cybercommand would be the primary recipient.
  • And what comes through loud and clear is that the Rogers-Ruppersberger CISPA bill will allow for much greater information sharing of companies sending private communication data to the government -- including the NSA, who has been trying very, very hard to get this data, not for cybersecurity reasons, but to spy on people.
  • handy dandy (scary) chart (pdf)
  • ...3 more annotations...
  • without adequate privacy protections and controls
  • However, the bill goes much further, permitting ISPs to funnel private communications and related information back to the government
  • The bill does not specify which agencies ISPs could disclose customer data to, but the structure and incentives in the bill raise a very real possibility that the National Security Agency or the DOD’s Cybercommand would be the primary recipient.
Justin Hopkins

How Apple and Amazon Security Flaws Led to My Epic Hacking | Gadget Lab | Wired.com - 0 views

  • They could have used my e-mail accounts to gain access to my online banking, or financial services. They could have used them to contact other people, and socially engineer them as well. As Ed Bott pointed out on TWiT.tv, my years as a technology journalist have put some very influential people in my address book. They could have been victimized too. Instead, the hackers just wanted to embarrass me, have some fun at my expense, and enrage my followers on Twitter by trolling.
  • I bought into the Apple account system originally to buy songs at 99 cents a pop, and over the years that same ID has evolved into a single point of entry that controls my phones, tablets, computers and data-driven life. With this AppleID, someone can make thousands of dollars of purchases in an instant, or do damage at a cost that you can’t put a price on.
  •  
    This is the rest of the story of the Wired.com writer who got hacked. It's really alarming how easily this was done and also the *why*. The hackers just liked his 3 character twitter user name (there obviously aren't a lot of short twitter user names) and were out to hijack it. Dude lost the photos of his kids first year and loads of other irreplaceable stuff when they remote wiped his phone and laptop to prevent him from taking his twitter account back.
adrienne_mobius

XKeyscore: NSA tool collects 'nearly everything a user does on the internet' | World ne... - 0 views

  •  
    "A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden."
Megan Durham

Texas School District Reportedly Threatening Students Who Refuse Tracking ID, Can't Vot... - 1 views

  •  
    I posted something about this a couple weeks ago and then found this. Very interesting. We'll see how it plays out, but feels very 1984.
Megan Durham

As Libraries Go Digital, Sharing of Data Is at Odds With Tradition of Privacy - 0 views

  •  
    Harvard librarians learned that lesson when they set up Twitter feeds broadcasting titles of books being checked out from campus libraries. It seemed harmless enough-a typical tweet read, "Reconstructing American Law by Bruce A. Ackerman," with a link to the book's library catalog entry-but the social-media experiment turned out to be more provocative than library staffers imagined.
Megan Durham

Santa Monica College library workers' 'diversion' saved lives - 1 views

http://articles.latimes.com/2013/jun/14/local/la-me-santa-monica-library-20130615

Professional Development library security

started by Megan Durham on 24 Jun 13 no follow-up yet
anonymous

Religious Websites Are Worse for Your Computer than Porn Sites - 1 views

  • Religious sites had and average of 115 software threats, while porn sites only had 25. The religious sites were mostly full of fake anti-virus software, which sounds relatively harmless, but it can leave an unsuspecting user's computer totally vulnerable. Symantec wasn't able to come up with a good explanation for why the religious were such a popular target for the fake software.
  •  
    OH THANK GOODNESS
  •  
    I admit that between the title and Justin's response, I laughed.
anonymous

(2) Scams: Why are e-mail scams written in broken English? - Quora - 0 views

  • ike everyone else, I, too, always assumed that it was because either they were idiots or non-native English speakers. But I have very recently learned that is not the case. Indeed, the real answer is one of the more astonishing (at least to me) things I've heard in quite some time!It turns out that the dead giveaways of "spamese" are completely deliberate and carefully calibrated. Huh? Why? Because very few people of the type who frequent Quora would be fooled for ten seconds by these things. And guess what? Quora readers are the ANTI-audience for them!Instead, the obvious giveaways are used as a *pre-qualifier*, to ensure with the least possible effort that the ONLY people who respond to the scammers' initial mass mailings (and therefore have to be brought along individually during the later stages) are the absolutely most gullible, ignorant, susceptible, suckers they can find.Think of it this way: if you were running this as a business, which would make more sense: developing a highly believable pitch and sending it to 1,000 Quorans, knowing that 500 of them would eventually figure it out and call the cops? or writing a completely obvious scam and sending it automatically to 1,000,000 people, knowing that 999,990 will simply laugh and trash it...but the other ten have a very high likelihood of sending you thousands of bucks, with no one calling the cops?
  • According to one website: "Experienced scammers expect a 'strike rate' of 1 or 2 replies per 1,000 messages emailed; ... One scammer boasted 'When you get a reply it's 70% sure you'll get the money.'"
anonymous

Passfault Demo: Password Evaluation - 0 views

  •  
    What's really cool about this thing is the level of analysis that it does of the password. Most "password strength meters" are just looking at length and inclusion of things like lowercase/uppercase special characters. This thing does so much more and rather than just saying "weak", "very strong" it tells you how long it'd take to crack it. Even cooler is that you can choose 'Show Options' and change the hardware of the imaginary attacker and the type of encryption your password is stored as. This is via: http://nakedsecurity.sophos.com/2012/05/25/how-long-would-it-take-to-crack-your-password/ Worth reading as it also calls into question the idea of regularly changing your passwords. Obviously it's much better to just use separate passwords for everything and only change them if you have a reason to think your password was compromised.
1 - 20 of 25 Next ›
Showing 20 items per page