Information Security News
One of the more intriguing revelations in the most recent leak of NSA documents is the prospect the spy agency is using browser cookies from the Google-owned DoubleClick ad network, Yahoo, or Hotmail to decloak users of the Tor anonymity service.
One slide from a June 2012 presentation titled "Tor Stinks" carried the heading "Analytics: Cookie Leakage" followed by the words "DoubleclickID seen on Tor and nonTor IPs." The somewhat cryptic slide led to rampant speculation on Twitter and elsewhere that the NSA and its British counterpart, the Government Communications Headquarters (GCHQ), are able to bypass Tor protections by somehow manipulating the cookies Google uses to track people who have viewed DoubleClick ads. Principal volunteers with the Tor Project believe such a scenario is "plausible" but only in limited cases. Before explaining why, it helps to discuss how such an attack might work.
As documented elsewhere in the "Tor Stinks" presentation, the spy agencies sometimes use secret servers that are located on the Internet backbone to redirect some targets to another set of secret servers that impersonate the websites the targets intended to visit. Given their privileged location, the secret backbone nodes dubbed Quantum are able to respond to the requests faster than the intended server, allowing them to win a "race condition." Government spies can't track cookies within the Tor network because traffic is encrypted during its circuitous route through three different relays. But if the spies can watch the Internet backbone, they may be able to grab or manipulate cookies once the data exits Tor and heads toward its final destination.
AnubisNetworks marca presença nos eventos Infosec Week e JoinSec
A AnubisNetworks vai marcar presença nos eventos Infosec Week, em Lisboa (a decorrer entre 7 a 11 de Outubro) e JoinSec, em Londres (17 e 18 de Outubro). Com o objectivo de debater e analisar as principais tendências nacionais e internacionais sobre ...
CSOs face ongoing paradoxical challenges, according to report
IDG News Service
Equally unhelpful is the fact that a very small percentage of InfoSec professionals even have the certification for secure software development. The scarcity of people with the skill set for app security "is also a problem," explained Julie Peeler ...
Portugal susceptible to cyber attacks - study
Portugal is susceptible to cyber attacks and has no adequate legislation, according to a study by Dognaedis, a spin-off of the University of Coimbra. It detailed the findings at InfoSec Week, an event organized by ShadowSec during the European ...
Posted by InfoSec News on Oct 07http://www.informationweek.com/security/attacks/stratfor-hacker-fbi-entrapment-shaped-my/240162199
Posted by InfoSec News on Oct 07http://www.darkreading.com/services/at-interop-plethora-of-new-services-leav/240162229
Posted by InfoSec News on Oct 07http://healthitsecurity.com/2013/10/03/healthcare-cloud-security-staying-current-with-baas-slas/
Posted by InfoSec News on Oct 07http://www.washingtonpost.com/world/national-security/dual-leadership-role-at-nsa-and-cyber-command-stirs-debate/2013/10/06/ffb2ac40-2c59-11e3-97a3-ff2758228523_story.html
Posted by InfoSec News on Oct 07http://www.startribune.com/local/minneapolis/226665421.html
How to establish trust in the cloud
Help Net Security
A troubling example was recently brought to light by WNC Infosec (Western North Carolina InfoSec Community), which found that the Dropbox file sharing service opens certain files after they are uploaded. While it may be fine for individuals to trust ...