Paper: Security Analysis of a Full-Body Scanner
Advanced imaging technologies are a new class of peoplescreening systems used at airports and other sensitiveenvironments to detect metallic as well as nonmetalliccontraband. We present the first...
View ArticleOld attacks on new TLS implementations - or how a tiny side channel can break...
This week at USENIX Security my colleague Chris Meyer will present our latest research paper on TLS attacks: "Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks" (written...
View ArticlePaper: Gyrophone: Recognizing Speech From Gyroscope Signals
We show that the MEMS gyroscopes found on modern smart phones are sufficiently sensitive to measure acoustic signals in the vicinity of the phone. The resulting signals contain only very low-frequency...
View ArticleSnowshoe Spam Attack Comes and Goes in a Flurry
Every so often, we observe certain spam campaigns that catch our interest. On August 15, we observed a particular spam campaign that caught our attention because it was using “snowshoe” spam techniques...
View ArticleGetting Started with Android Forensics
This article introduces Android forensics and the techniques used to perform Android forensic investigations. We will discuss Android file systems, data acquisition, analysis, and various tools...
View Article"El Machete"
Some time ago, a Kaspersky Lab customer in Latin America contacted us to say he had visited China and suspected his machine was infected with an unknown, undetected malware. While assisting the...
View ArticleHPKA 0.1
HPKA (acronym for HTTP Public Key Authentication) is an extension of the HTTP protocol that aims to authenticate users through public key authentication.It has some features that are useful when you...
View ArticleThe UPS Store Compromise
The UPS Store, Inc. recently received a government bulletin regarding a broad-based malware intrusion targeting retailers in the United States. The UPS Store takes seriously its responsibility to...
View ArticlePaper: Green Lights Forever: Analyzing the Security of Traffic Infrastructure
AbstractThe safety critical nature of traffic infrastructure requiresthat it be secure against computer-based attacks, but thisis not always the case. We investigate a networked trafficsignal system...
View ArticleTech Support scammers rip big brand security software with fake warnings
Just when we thought we had seen it all, scammers come out with an elaborate and clever scheme to trick users into calling for bogus tech support. If you are looking to download one of the popular...
View ArticleMyBB 1.8 Beta 3 - Multiple Vulnerabilities
# Title: MyBB 1.8 Beta 3 - Cross Site Scripting & SQL Injection# Google Dork: intext:"Powered By MyBB"# Date: 15.08.2014# Author: DemoLisH# Vendor Homepage: http://www.mybb.com/# Software Link:...
View ArticleAnnouncing CERT Tapioca for MITM Analysis
Hi folks, it's Will. Recently I have been investigating man-in-the-middle (MITM) techniques for analyzing network traffic generated by an application. In particular, I'm looking at web (HTTP and HTTPS)...
View ArticlePaper: A Large-Scale Empirical Analysis of Chinese Web Passwords
Abstract:Users speaking different languages may prefer different patterns in creating their passwords, and thus knowledge on English passwords cannot help to guess passwords from other languages well....
View ArticleRTFM 0day in iOS apps: G+, Gmail, FB Messenger, etc.
Normal people spend their nights watching movies, reading articles, socializing or (yes, I know it's odd) sleeping.I spend my nights reading RFCs and pentesting various applications/services.One night...
View ArticleReverse Engineering NAND Flash Memory – POS device case study (part 1/3)
Modern life wouldn’t be quite so modern without NAND Flash memory. It is used everywhere - from USB sticks and smart phones to security cameras and the Internet of Things (IoT). I’ve spent some time...
View ArticleDoS attacks (ICMPv6-based) resulting from IPv6 EH drops
Ten days ago or so we published this I-D:<http://www.ietf.org/internet-drafts/draft-gont-v6ops-ipv6-ehs-in-real-world-00.txt>Section 5.2 of the I-D discusses a possible attack vector based on...
View ArticleHacking Gmail with 92 percent success
A team of researchers, including an assistant professor at the University of California, Riverside Bourns College of Engineering, have identified a weakness believed to exist in Android, Windows and...
View ArticleBinary diffing for Reverse Engineering
Yesterday, a new feature was pushed to radare2: offset-based function diffing. We'd like to take this opportunity to write a bit about radare2's diffing features before showing the shiny new one.more...
View ArticleWhat does a pointer look like, anyway?
In Adobe’s August 2014 Flash Player security update, we see: These updates resolve memory leakage vulnerabilities that could be used to bypass memory address randomization (CVE-2014-0540,...
View ArticleCartero
A simple Phishing Framework Library with a CLI tool. The project was born out of necessity on projects. Even though there are many projects out there, we were not able to find a suitable solution that...
View Article