Um novo tipo de ataque de phishing

Foi baptizado como tabnabbing e é o mais recente tipo de ataque de phishing.

Imagine se, de repente, uma das suas milhentas tabs do browser mutasse e ficasse com o aspecto do gmail. Será que, ao voltar a essa tab, se lembraria que inicialmente não era o gmail que lá estava?

Mais detalhes sobre o ataque em:
http://www.azarask.in/blog/post/a-new-type-of-phishing-attack/

(com agradecimentos ao Fábio Souto)

Privacidade é capa da Time

Por conta do Facebook:




o início do artigo:

"Sometime in the next few weeks, Facebook will officially log its 500 millionth active citizen. If the website were granted terra firma, it would be the world's third largest country by population, two-thirds bigger than the U.S. More than 1 in 4 people who browse the Internet not only have a Facebook account but have returned to the site within the past 30 days."

versão web do artigo

Segurança automóvel

How Secure Is Your New Car? About the Same as Your PC

This week at the 31st IEEE Symposium on Security & Privacy, a paper will be presented by researchers from the Center for Automotive Embedded Systems Security (CAESS) titled, "Experimental Security Analysis of a Modern Automobile" that says they have demonstrated:

"that an attacker who is able to infiltrate virtually any Electronic Control Unit (ECU) can leverage this ability to completely circumvent a broad array of safety-critical systems. Over a range of experiments, both in the lab and in road tests, we demonstrate the ability to adversarially control a wide range of automotive functions and completely ignore driver input— including disabling the brakes, selectively braking individual wheels on demand, stopping the engine, and so on."

Building Security In Maturity Model (BSIMM) 2

Um artigo interessante sobre o tema:

Software [In]security: BSIMM2
By Gary McGraw, Brian Chess, Sammy Migues, Elizabeth Nichols
May 12, 2010

resumo:

"The Building Security In Maturity Model (BSIMM, pronounced "bee simm") is an observation-based scientific model directly describing the collective software security activities of thirty software security initiatives. (...)

BSIMM2 is the second iteration of the BSIMM project. The original BSIMM described the software security initiatives underway in nine firms. Since the release of the original model in March 2009, the size of the study has tripled.

BSIMM2 can be used as a measuring stick for software security. As such, it is useful for comparing software security activities observed in a target firm to those activities observed among the thirty firms (or various subsets of the thirty firms). A direct comparison using the BSIMM is an excellent tool for devising a software security strategy.

(...)

Aprender segurança de aplicações web com aplicações vulneráveis


Na FCUL já há anos que usamos o WebGoat, uma aplicação web super-vulnerável do projecto OWASP, para ensinar segurança de aplicações web. Agora a Google lançou a Jarlsberg com o mesmo objectivo.

Privacidade e máquinas de fotocópias

As máquinas de fotocópias (aka xerox no Brasil) mais recentes gravam os documentos copiados num disco. Quando vendidas uma quantidade imensa de informação confidencial vai para parte incerta... Um documentário assustador da CBS:


KHOBE - fim dos anti-virus em Windows?

O título é exagerado mas a ideia pode de facto afectar a fiabilidade dos anti-virus e outro software de segurança em Windows:

The method, developed by software security researchers at matousec.com, works by exploiting the driver hooks the anti-virus programs bury deep inside the Windows operating system. In essence, it works by sending them a sample of benign code that passes their security checks and then, before it's executed, swaps it out with a malicious payload.

The exploit has to be timed just right so the benign code isn't switched too soon or too late. But for systems running on multicore processors, matousec's "argument-switch" attack is fairly reliable because one thread is often unable to keep track of other simultaneously running threads. As a result, the vast majority of malware protection offered for Windows PCs can be tricked into allowing malicious code that under normal conditions would be blocked.

All that's required is that the AV software use SSDT, or System Service Descriptor Table, hooks to modify parts of the OS kernel.

http://www.matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php

[com agradecimentos ao Mário Calha]