thewayne: (Default)
Tesla is a sponsor this year and gamely threw their hat/car into the ring. And were hacked twice by the same team of security researchers.

The first hack involved the charging system, and enabled them to open the doors and the frunk (front trunk). They were awarded the car for this particular hack. The second hack was through the infotainment system. Either hack was enough to render the car unsafe.

One of the key elements of this competition is the teams reveal all their hacking techniques for this attack to the system owners so they can improve the security of their systems. And the teams are pretty well compensated for their work.

This is nothing new with Tesla, their cars have been hacked before, and I just posted the article about the two guys parking side by side and driving away with each other's cars.

https://gizmodo.com/tesla-hack-hackers-model-3-elon-musk-hackathon-1850263319
thewayne: (Cyranose)
Whee!

A security researcher had a thought: what could you build that would be dangerous/deadly/destructive based on materials that you could buy inside the security barrier of an airport, using a multitool that was approved by the TSA?

The results are not pleasant: a blunderbuss shotgun, nunchucks, a spiked mace, and a suitcase bomb that took one and a half fire extinguishers to put out. He notified the TSA on four occasions before publishing and was thanked, but they never said they were doing anything. He was visited by some FBI agents and had a pleasant discussion, and that was about that.

http://www.wired.com/design/2013/12/terminal-cornucopia/?viewall=true
thewayne: (You're a Dick)
Let's say you use your laptop to access the internet at Starbuck's, though why you'd pay to use their service I don't know. The SSID (name) of all of their access points are called T-Mobile after their provider. Your laptop remembers the SSID, and the next time you start it up, it tries to associate with it.

So here's the hack. I create an access point named T-Mobile. Your computer boots and says "Look! There's T-Mobile! I wonder if it will be my friend?" Your laptop is now associated with my access point and is now a little bit on the vulnerable side.

First solution: firewall. Don't use the Window's firewall, get something like Zone Alarm Pro. Second, NEVER associate to ad hoc networks. Always have your card to only associate with infrastructure networks. Apparently new laptops that have built-in wireless have a button to turn the card off. They recommend using said card when networking is not in use.

Anyway, Here's The Fine Article on Slashdot that includes a link to the source story.

Important stuff if you're a Windows user who does wireless networking!
thewayne: (Headbanger)
THIS IS IMPORTANT: THIS FLAW EXISTS IN EVERY VERSION OF WINDOWS FROM 98 TO XP!

http://www.wired.com/news/technology/0,69953-0.html?tw=wn_tophead_8

Microsoft publicly announced last week -- after security firms had already scooped the software maker -- yet another Windows vulnerability for which the company has yet to release security patches. But this bug is a lot more lethal than your typical buffer overflow.

Redmond acknowledges that attackers can gain complete control of your PC using a layer of Windows the company designed more than a decade ago. According to a company statement, Microsoft will release an update Jan. 10 to protect your PC, but between now and then you're potentially vulnerable if you're running virtually any version of Windows, from 98 to XP.

However, there are proactive steps you can take so that a black-hat hacker does not take complete control of your PC while you're waiting for the patch.
What is the vulnerability?

There is a flaw in the way that Windows processes Microsoft Windows Meta File, or WMF, images. Attackers can craft special image files that, if viewed, give them carte blanche to access and control your PC.

Attackers are already taking advantage of the vulnerability in a number of ways, including spamming out e-mail messages that contain links to malicious websites that exploit the bug. Many legitimate websites have also been hacked and comprised to deliver the attack, according to Websense Security Labs, which was first to warn of the vulnerability. Websense says the WMF code also is being exploited through third-party banner ads on mainstream websites. And, like traditional Windows threats, the bug can always be exploited by a malicious e-mail attachment.
Did Microsoft design this vulnerability on purpose?

Microsoft first allowed .wmf file extensions to carry executable code at least as far back as Windows 3.0, Websense says. This was to enable Windows to cancel print jobs using the file format, and the developers in that simpler era apparently didn't imagine it would be used for anything more malicious.

A layer of backward compatibility folded into modern Windows kept the security hole alive below the surface of the operating system. Now anyone can use WMF files to do anything they want to your system, such as copying or destroying data, or installing backdoors to allow re-entry later. They can also cancel your print jobs.
What steps can be taken to protect your PC?

You can stop accessing the internet until Jan. 10, when Microsoft says it will have security updates. More realistically, there are some measures you can take to protect your system now.

Firstly, follow the IT department mantra of never opening an attachment or clicking on a web link in an e-mail from an unknown user (or an odd or unexpected e-mail from a friend). Microsoft says updated versions of antivirus software from Symantec, Computer Associates, McAfee and others also can block exploitation of this vulnerability.

But your best bet may be a nifty unofficial patch created by programmer Ilfak Guilfanov and available for download from The SANS Institute.

To see if your PC has already been infected, Microsoft's Windows AntiSpyware beta works reasonably well.
Can't I neutralize the exploit using Windows commands?

Microsoft and numerous security websites suggest a workaround that prevents Windows Picture and Fax Viewer from opening image files, including the vulnerable WMF format. This reduces your exposure, but doesn't fix the underlying vulnerability.

Under Windows XP, access the Run command and type "regsvr32 -u %windir%\system32\shimgvw.dll." Then click OK.

For maximum effect, SANS suggests a double-fisted approach of implementing this workaround and installing Guilfanov's patch until Microsoft comes out with an official fix.

May 2025

S M T W T F S
    1 23
45678910
1112 131415 1617
18 19 20 212223 24
25262728 2930 31

Syndicate

RSS Atom

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags
Page generated Jun. 1st, 2025 02:35 pm
Powered by Dreamwidth Studios