security bytes - july 2013

17
n|u –The Open Security Community Trivandrum Chapter Security Bytes – July 2013 By Pranav ([email protected]) 1

Upload: nu-the-open-security-community

Post on 18-May-2015

2.007 views

Category:

Education


1 download

DESCRIPTION

null Trivandrum Chapter - July 2013 Meet

TRANSCRIPT

Page 1: Security Bytes -  July 2013

n|u –The Open Security Community

Trivandrum Chapter

Security Bytes – July 2013

By

Pranav ([email protected])

1

Page 2: Security Bytes -  July 2013

“Edward Snowden files” has blueprint of NSA surveillance programs

• Edward Snowden has enough information to cause more damage to the US government in a minute alone than anyone else has ever had in the history of the United States, but he has insisted that they not be mage public, including the blue prints of NSA surveillance program. Glenn Greenwald, the Guardian Journalist , who was the first to report this, says Snowden has an "instruction manual for how the NSA built"

2

Page 3: Security Bytes -  July 2013

And got nominated for Nobel Prize !!!

• Edward Snowden has helped to make the world a little

better and safer. A Swedish professor of sociology has

nominated NSA whistle-blower Edward Snowden for the

2014 Nobel Price.

• In his letter to the Nobel Committee, Sociology Professor

Stefan Svallfors recommended Snowden, for his "heroic

effort at a great personal cost" shedding light on the

expansive cyber spying conducted by the NSA.

3

Page 4: Security Bytes -  July 2013

New Anonimizing Tool - Tortilla

• Tortilla provides a secure,

anonymous means of routing

TCP and DNS traffic through

Tor regardless of client

software and without the

need for a VPN or secure

tunnel.

4

Page 5: Security Bytes -  July 2013

New Anonimizing Tool - Tortilla

• Redeems the bad aspects of Tor

• No additional hardware or VM to support SOCKS proxy

• Unveiling at ‘Black Hat’ Las Vegas in two weeks

• Releasing as Open Source Tool

5

Page 6: Security Bytes -  July 2013

Signal Booster into Mobile Hacking Machine

• A group of hackers from Security

firm iSEC tapped into Verizon

wireless cell phones using a signal-

boosting devices made by

Samsung to Verizon and cost about

$250.

6

Page 7: Security Bytes -  July 2013

• The network Extender turns into miniature cell phone tower.

• Fits inside a backpack.

• Capable of capturing and intercepting calls, texts and data

• Declined to disclose how they modified the software.

• Plans to give demos in various hacking cons this year.

7

Signal Booster into Mobile Hacking Machine

Page 8: Security Bytes -  July 2013

True Caller Hacked by Syrian Electronic Army

• True Caller, a popular app, the

world's largest collaborative

phone directory compromised

by Syrian Electronic Army

hackers.

8

Page 9: Security Bytes -  July 2013

• Was running an outdated Version of WordPress(3.5.1)

• Contains millions of access codes of Facebook, Twitter, Linkedin, Gmail

accounts.

• Hackers downloaded 7 databases of 450GB in size.

• True Caller website still under maintenance.

• Stop Using such Apps which harvest our data and violates our privacy.

9

True Caller Hacked by Syrian Electronic Army

Page 10: Security Bytes -  July 2013

Anonymous hackers expose U.S FEMA contractors

• Anonymous hackers broken into Federal

Emergency Management Agency(FEMA)

servers and leaked the database includes

names, addresses and other information of

FEMA contractors, federal agents and local

authorities.

10

Page 11: Security Bytes -  July 2013

• In their message anonymous said " This is a message to FEMA, to various world

governments and to their complicit corporate lackeys as to the 2.5 regular

people who use the internet and have found that their right to privacy has

been utterly destroyed"

• They stated : “This leak is dedicated to our fallen comrades, allies and those

who fight for the same causes as us. For Jeremy Hammond, for weev, for

Edward Snowden, for everyone who has risked and continues to risk their

freedom for their belief in a world free from constant, invasive surveillance.”

11

Anonymous hackers expose U.S FEMA contractors

Page 12: Security Bytes -  July 2013

Hacking Google Glass with Malicious QR code

• Researchers at mobile security firm Lookout discovered

a security flaw in Google Glass which allowed them to

capture data without user's Knowledge, when the user

merely took a photo that captured a malicious QR code.

• The problem was that Google could be told to execute a

QR code without the user having to give permission.

Because of Glass's limited user interface. Google set up

the device's camera to automatically process any QR

code in a photograph. 12

Page 13: Security Bytes -  July 2013

13

Hacking Google Glass with Malicious QR code

Page 14: Security Bytes -  July 2013

Tango website hacked by Syrian Electronic Army

• Syrian Electronic Army hacked into Tango.me and compromised more than 1.5 TB

Daily backup of the servers.The databases is reportedly contains more than millions

of the Application users phone numbers and contacts and their emails.

• "Sorry @TangoMe, We needed your database too, thank you for it! http://tango.me

#SEA #SyrianElectronicArmy" The tweet posted by Syrian Electronic Army.

• The Hackers breached the Tango.me with same method- The outdated Wordpress

CMS allowed them to gain unauthorized access to the database server.

14

Page 15: Security Bytes -  July 2013

E-Hack 2013

• E-HACK, will be the largest ever workshop

on Information Security on 27-28th July .

• You’ll be on The Indian Book of Records,

The Asian Book of Records and The

Guinness Book of World Records

• Workshop

• Capturing The Flag(CTF)

15

Page 16: Security Bytes -  July 2013

Sources :

• www.thehackernews.com

• www.ehackingnews.com

• www.news.cnet.com/security/

16

Page 17: Security Bytes -  July 2013

17