Encryption flaw opened Android and Apple smartphones to online drive-by attacks

Ninety-five per cent of the world's smartphones in use today have been wide open to a decade-old flaw that would have enabled attackers to steal passwords and other sensitive data.

The security flaw, dubbed "Freak", would have exposed visitors to US government websites - and possibly many more - to drive-by attacks. The websites that exploited the flaw included Whitehouse.gov, NSA.gov and FBI.gov.

News of the flaw was made public when internet company Akamai revealed in a corporate blog for customers that it was working to provide a fix. The flaw was discovered following last year's discovery of a catastrophic flaw in OpenSSL.

"The problem is that, until CVE 2015-0204 was raised - and fixed - an OpenSSL client using strong ciphers (anything other than export) could be tricked into accepting such a weak key. An attacker connects to the web server with an export cipher and gets a message signed with the weak RSA key, wrote Akamai's Rich Salz.

He continued: "He then cracks that key. The following day, for future connections from innocent browsers, he can act as a man in the middle. The attacker will use the cracked key to connect to clients, who will accept it. The attacker will then have access to all communication between the client and server. A server that does not support the export ciphers will never use the export RSA key and never send it to a client. A client that has the CVE fixed will never accept such a key."

The security flaw was found by a team of researchers from Microsoft and IT security organisations in the US, France and Spain. It was the result of a ban on US exports of "strong" encryption until the late 1990s, which saw much weaker security standards adopted in widely used software instead. The use of that software continued as a result of inertia in the IT industry, even after the US export ban was lifted.

"Researchers discovered in recent weeks that they could force browsers to use the old export-grade encryption then crack it over the course of just a few hours. Once cracked, hackers could steal passwords and other personal information and potentially launch a broader attack on the Web sites themselves by taking over elements on a page, such as a Facebook 'Like' button," reported the Washington Post.

John Hopkins University cryptographer Matthew Green, one of the researchers who helped uncover the flaw, said that it demonstrated the folly of governments attempt to mandate backdoors into secure software so that they could eavesdrop on people's online and communications activities.

Weakening security, he said, added complexity that attackers with nefarious intent could - and would - exploit. "When we say this is going to make things weaker, we're saying this for a reason."

The name "Freak" stands for "factoring related attack on RSA keys" and describes how the attack works against the Data Encryption Standard (DES) when one system authenticates with another.

See more here:
Encryption flaw opened Android and Apple smartphones to online drive-by attacks

Will HIPAA Require Encryption?

By Megan Williams, contributing writer

You and your healthcare IT clients could be facing even more legislation around healthcare data, and this time, its about encryption.

Currently, the Health Insurance Portability and Accountability Act (HIPAA) and the Health Information Technology for Economic and Clinical Health (HITECH) Act do not contain mandates around encryption, but that may soon change. The Senate Health, Education, Labor, and Pensions committee is rethinking its approach to encryption in their efforts to revisit HIPAA, according to FierceHealthIT.

The legislation is coming up on its 20-year anniversary, and many in the industry feel regulations around encryption dont properly address the new security threats that are becoming so common in the healthcare sector.

HITECH

The answer to HIPAAs lack of focus on encryption came in 2009 in the form of the HITECH Act, which, much like todays Meaningful Use initiatives, placed incentives around encryption, and avoided imposing a rigid solution across the industry. Indiana University law professor, Nicolas Terry told the AP, that it seemed like a reasonable balance at the time, but that recent events may have proven the compromise unworkable.

Basically, the industry hasnt gone for the incentives in big enough ways. Over 40 percent of healthcare employees arent using full-disk, or file-level encryption devices at work, according to a Forrester research report, leaving huge segments of the industry vulnerable, just as attacks are increasing, and growth in security-testing concepts like the Internet of Things are taking off.

The current chair of the HIMSS Privacy And Security Policy Task Force doesnt believe much will happen, though, before the next presidential election.

On a smaller level, states like New Jersey have taken the lead, and enacted legislation requiring health insurance companies to encrypt patient information, according to NJ.com. All insurance companies using data containing personal information must either protect that data by encryption, or by any other method or technology rendering it unreadable, undecipherable, or otherwise unusable by an unauthorized person.

Where Encryption Falls Short

See the original post:
Will HIPAA Require Encryption?

IoT-based sensors for detecting pesticide residues likely

Thiruvananthapuram, March 3:

The International Centre for Free and Open Source Software here has completed the first batch of training in Internet of Things (IoT) hardware.

This will help students get started on programming for this emerging domain, said Satish Babu, Director of the centre.

The international centre started work on IoT and open hardware in 2012 with prototypes using technologies such as Arduino and Raspberry Pi.

It now plans to continue the work with sensors, including for applications such as sensor-based pesticide residue detection in vegetables and sensor clusters for macro- and micro-nutrients in soil and air quality monitoring, Babu added.

The hands-on training on IoT introduced 20 participants to the MicroHOPE controller board, a low-cost programmable controller developed by the Inter University Accelerator Centre, New Delhi.

The participants were students drawn from engineering colleges from across Kerala. The skills learnt would enable them to take up further work on their own, particularly in developing new applications using the controller and free software-based tools as part of the main project in their curriculum.

IoT is the third generation Internet application that aims to connect the physical world to the cyber world through a combination of sensors and sensor networks, actuators, cloud-based repositories and analytics and decision-support systems.

Much of the emerging innovations today are centred on IoT, and it is largely in the domain of free and open source software.

The market for IoT is expected to cross $7 trillion by 2020, Babu said.

Follow this link:
IoT-based sensors for detecting pesticide residues likely

IoT-based apps for detecting pesticide residue likely

THIRUVANANTHAPURAM, MAR 3:

The International Centre for Free and Open Source Software here has completed the first batch of training for Internet of Things (IoT) hardware.

This would help students get started on programming for this emerging domain, said Satish Babu, director of the centre.

STUDENT PARTICIPANTS

The international centre started work on IoT and open hardware in 2012 with prototypes using technologies such as Arduino and Raspberry Pi.

It now plans to continue the work with sensors, including for applications such as sensor-based pesticide residue detection in vegetables and sensor clusters for macro- and micro-nutrients in soil and air quality monitoring, Babu added.

The hands-on training on IoT introduced 20 participants to the MicroHOPE controller board, a low-cost programmable controller developed by the Inter University Accelerator Centre, New Delhi.

The participants were students from engineering colleges from across Kerala. The skills learnt would enable them to take up further work on their own, particularly in developing new applications using the controller and free software-based tools as part of the main project in their curriculum.

EMERGING INNOVATIONS

IoT is the third-generation Internet that aims to connect the physical world to the cyber world through a combination of sensors and sensor networks, actuators, cloud-based repositories and analytics and decision-support systems.

Read more:
IoT-based apps for detecting pesticide residue likely

WikiLeaks: Inside Julian Assange’s War on Secrecy …

WikiLeaks: Inside Julian Assange's War on Secrecy is a 2011 book by British journalists David Leigh and Luke Harding. It tells the story of Julian Assange, WikiLeaks, and the leak by Chelsea Manning (then known as Bradley) of classified material to the website in 2010. It was published by Guardian Books in February 2011.[1]

The book describes Assange's childhood and details about his work creating and expanding WikiLeaks. It explains how his surname comes from his stepfather, a "touring puppet theater owner", and not his biological father, a choice that Assange made himself.[2]

After the release of the book, Assange threatened to sue The Guardian, making a Twitter post on the WikiLeaks account saying, "The Guardian book serialisation contains malicious libels. We will be taking legal action." The Hindu writer, Hasan Suroor, said Assange's concern is that the book is "critical of [Assange's] robust style and his alleged tendency to be a 'control freak'".[3] One of the points of disagreement is that the book said he had initially refused to remove the names of Afghan informants from the Afghan war logs; the book reports him as saying they would "deserve it" if they were killed.[4]

In the book, Leigh mentioned the password to a set of unredacted classified US State Department cables. WikiLeaks had earlier distributed multiple copies of files containing all these cables, and others had mirrored their files with BitTorrent. WikiLeaks blamed Leigh and The Guardian for unnecessarily disclosing the password.[5] In response The Guardian said "It's nonsense to suggest the Guardian's WikiLeaks book has compromised security in any way." According to The Guardian, WikiLeaks had indicated that the password was temporary and that WikiLeaks had seven months to take action to protect the files it had subsequently decided to post online.[6] Wikileaks replied that others posted the files online, and as they were publicly available, the password was still useful. The cables contained in the file had their original form and thus they did have all the names that were erased for the safety of the informants. Specifically, the book mentions about the password:

Assange wrote down on a scrap of paper: ACollectionOfHistorySince_1966_ToThe_PresentDay#. Thats the password, he said. But you have to add one extra word when you type it in. You have to put in the word Diplomatic before the word History. Can you remember that?

David Leigh, WikiLeaks: Inside Julian Assange's War on Secrecy[7][8]

Visit link:
WikiLeaks: Inside Julian Assange's War on Secrecy ...

Fugitive ex-U.S. spy Snowden in talks on returning home …

MOSCOW Tue Mar 3, 2015 4:29pm EST

Former U.S. National Security Agency contractor Edward Snowden appears live via video during a student organized world affairs conference at the Upper Canada College private high school in Toronto, in this file photo taken February 2, 2015.

Credit: Reuters/Mark Blinch

MOSCOW (Reuters) - A Russian lawyer for Edward Snowden said on Tuesday the fugitive former U.S. spy agency contractor who leaked details of the government's mass surveillance programs was working with American and German lawyers to return home.

In Washington, U.S. officials said they would welcome Snowden's return to the United States but he would have to face criminal charges which have been filed against him.

Snowden's lawyer, Anatoly Kucherena, who has links to the Kremlin, was speaking at a news conference to present a book he has written about his client. Moscow granted Snowden asylum in 2013, straining already tense ties with Washington.

"I won't keep it secret that he... wants to return back home. And we are doing everything possible now to solve this issue. There is a group of U.S. lawyers, there is also a group of German lawyers and I'm dealing with it on the Russian side."

The United States wants Snowden to stand trial for leaking extensive secrets of electronic surveillance programs by the National Security Agency (NSA). Russia has repeatedly refused to extradite him.

Snowden has said in the past he would like to return home if he was assured he would be given a fair trial.

A deeply divisive figure, he is praised by some as a civil rights campaigner and whistleblower and condemned by others as a traitor who compromised U.S. security. Kucherena said in August Snowden had been given a three-year Russian residence permit.

Read the original here:
Fugitive ex-U.S. spy Snowden in talks on returning home ...

Joseph Gordon-Levitt in Oliver Stone’s ‘Snowden’: First Look

Edward Snowden became a polarizing political figure after leaking thousands of U.S. government documents that exposed top-secret surveillance programs. A former employee of the National Security Agency, he was assailed as a traitor and celebrated as a hero for his actions, and now lives in Russia to avoid American legal authorities.

Laura Poitras Oscar-winning documentary, Citizenfour, captured Snowden at the intimate and pivotal moments when he decided to act, shaking the D.C. power structure and impacting the U.S.s relationships with friends and foes alike, and Hollywood didnt waited long to mount its own version of the story.Oliver Stone is currently directing Joseph Gordon-Levitt in Snowden, which Open Road Films will open on Dec. 25. In the first-look image, Gordon-Levitt wears Snowdens glasses, but hes also in uniform, a soldier. Before he was a whistle-blower, Edward was an ordinary man who unquestioningly served his country, Open Road says in a promotional statement.

Before working for the CIA and the NSA, Snowden joined the United States Army Reserve in 2004with hopes of joining Special Forces in Iraq. He was discharged after breaking both his legs in a training accident.

Link:
Joseph Gordon-Levitt in Oliver Stone's 'Snowden': First Look

Snowden files expose NZ’s part in America’s spy network

Edward Snowden. Photo by NZ Herald.

The Herald -- with investigative journalist Nicky Hager -- is working on stories based on files from the United States National Security Agency (NSA), taken by whistleblower Edward Snowden in the biggest intelligence breach in history.

Internationally, the information obtained by Snowden has sparked concerns about the behaviour of the intelligence agencies in the grouping of Five Eyes nations, of which New Zealand is a member.

Fierce debate has raged over diplomatic breaches, the intrusion into citizens' privacy and a shift towards a "collect it all" policy.

Hager obtained access to files from the Snowden trove through a partnership with the news site The Intercept, set up by campaigning journalist Glenn Greenwald after he revealed Snowden as a whistleblower who took a vast number of files from his former employer because he was concerned by the extent of the agency's actions and reach.

Hager said the information would show New Zealand was "far more involved than most people realise".

"The discussion about GCSB [Government Communications Security Bureau] in New Zealand has always been about GCSB spying on New Zealanders. What this is going to be about is all the other countries New Zealand spies on.

"Some of that won't be a surprise and some of it will be a great surprise."

Hager said the information would not only surprise the public but also "people all through the foreign policy and intelligence bureaucracy who will know much more about this subject at the end of these revelations than they did before.

"When I read through this material and see that New Zealand is doing these things, it seems bizarre to me -- like it is from another era."

View original post here:
Snowden files expose NZ's part in America's spy network