Chaves privadas roubadas à Opera

A notícia fala de certificados mas obviamente refere-se às chaves privadas usadas para assinar software:

"Hackers penetrated network servers belonging to Opera Software, stole at least one digital certificate, and then used it to distribute malware that incorrectly appeared to be published by the browser maker."

http://arstechnica.com/security/2013/06/attackers-sign-malware-using-crypto-certificate-stolen-from-opera-software/

Microsoft paga por vulnerabilidades

Microsoft on Wednesday announced it will launch a "bug bounty" program, designed to stamp out security vulnerabilities in its software before and after its products are launched.

The software giant has previously offered as much as $250,000 for security vulnerabilities disclosed as part of its BlueHat prize during contests, but the company had yet to offer a long-term, ongoing bug bounty program to encourage researchers to find flaws in its products.

(...)

But the twist in the tale is that these bug bounty programs will specifically include the company's pre-release software, such as Internet Explorer 11 preview, which will be included with Windows 8.1 ("Blue") on June 26, helping Microsoft stamp out bugs before its products are released into the wider population.

(...)

notícia completa na ZDnet

Obad.a, malware sofisticado para Android

The most sophisticated Android Trojan
Roman Unuchek
Kaspersky Lab Expert

Recently, an Android application came to us for analysis. At a glance, we knew this one was special. All strings in the DEX file were encrypted, and the code was obfuscated.

The file turned out to be a multi-functional Trojan, capable of the following: sending SMS to premium-rate numbers; downloading other malware programs, installing them on the infected device and/or sending them further via Bluetooth; and remotely performing commands in the console. Now, Kaspersky Lab’s products detect this malicious program as Backdoor.AndroidOS.Obad.a.

Malware writers typically try to make the codes in their creations as complicated as possible, to make life more difficult for anti-malware experts. However, it is rare to see concealment as advanced as Odad.a’s in mobile malware. Moreover, this complete code obfuscation was not the only odd thing about the new Trojan.


Programa PRISM

do Público:

"A Agência de Segurança Nacional (NSA) e o FBI têm tido acesso directo aos servidores de nove gigantes tecnológicos como a Microsoft, Google, Apple, YouTube ou Facebook. Acederam assim a informação e contactos dos utilizadores, segundo um documento secreto a que os jornais The Washington Post e The Guardian tiveram acesso.

O programa de recolha de dados, com o nome de código PRISM, começou em 2007, na Presidência Bush, e prosseguiu na Administração Obama.

As informações sobre o acesso aos servidores surge depois de divulgado o controlo pela Administração norte-americana de registos de milhares de chamadas da telefónica Verizon e revela novas práticas de vigilância dos Estados Unidos.

O programa secreto abrange nove importantes empresas tecnológicas – Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, You Tube e Apple. O documento citado pelos dois diários indica que as empresas cooperaram no programa, o que é por elas negado.

O Guardian diz ter verificado a atenticidade do documento em que o PRISM é descrito. Trata-se, escreve o jornal, de Power Point de 41 slides usado para treinar operacionais dos serviços de espionagem.

“Os membros do Congresso que conheciam o programa estavam obrigados por juramento a não revelar a sua existência”, escreve o Washington Post. O PRISM “permite à NSA copiar o conteúdo dos emails, dos arquivos enviados e das conversas nos chats”, refere o Guardian. O Post diz que também áudios, vídeos e fotografias são elementos susceptíveis de serem investigados."

NSA Prism program taps in to user data of Apple, Google and others (Guardian)

NSA slides explain the PRISM data-collection program (Washington Post)



NetTraveler

da ZDnet:

A group of security researchers have uncovered the presence of NetTraveler in a cyberespionage campaign that has successfully infiltrated high-profile targets worldwide.

Security experts at Kaspersky Lab have been keeping tabs on the campaign over the past few years. In a blog post Tuesday published by the antivirus provider, security researchers said that over 350 high profile victims in 40 countries have been affected by the NetTraveler tool -- a program used for subtle computer surveillance.

"NetTraveler" is named as such due to an internal string which was present in early versions. The earliest references towards the malicious program stem from 2004, although the largest number of samples found were created between 2010 and 2013.

Targets of the program include activist in Tibet and Uyghur, oil industry companies, scientific research centers and institutes, universities, private companies, governments and governmental institutions, embassies and military contractors. Most recently, NetTraveler has been used in attacks focused on cyberespionage campaigns around space exploration, nanotechnology, energy production, nuclear power, lasers, medicine and communications.

(...)

"Based on collected intelligence, we estimate the group size to about 50 individuals, most of which speak Chinese natively and have working knowledge of the English language NetTraveler is designed to steal sensitive data as well as log keystrokes, and retrieve file system listings and various Office or PDF documents."

2nd International Workshop on Dependability Issues in Cloud Computing (DISCCO) - Braga, 30 Set. 2013

Second International Workshop on Dependability Issues in Cloud Computing
(DISCCO 2013)

To be held in conjunction with the 32nd IEEE International Symposium on Reliable Distributed Systems (SRDS)

Location: Braga, Portugal
Date: September 30, 2013

IMPORTANT DATES:

Submission Deadline: June 15th, 2013
Acceptance/Rejection Notification: July 15th, 2013
Camera-Ready Papers: July 31st, 2013

The best papers of the workshop will appear in the ACM SIGOPS Operating Systems Review journal.


Cloud computing has recently emerged as a new and popular paradigm for deploying, managing and delivering a variety of services through a shared infrastructure. The services offered through clouds can range from simple data storage to end-to-end management of business processes. However, the broad, complex and dynamic nature of cloud computing environments makes it very challenging to provide resilience against design faults, unforeseen failures, unexpected operating conditions, and adversarial attacks. The widespread failure of Amazon's cloud computing infrastructure last year adversely affected thousands of Amazon's customers, and underscores the importance of providing reliability for cloud computing services.

The objective of this workshop is to bring together researchers and practitioners from academia, industry and government organizations to foster discussion and share ideas, problems and solutions related to dependability issues in cloud computing. We solicit stimulating, original, previously unpublished ideas on completed work, position papers, and/or work-in-progress papers.

web page