Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Submission + - Research Finds Shoddy Security on Connected Home Gateways (securityledger.com)

chicksdaddy writes: Connected home products are the new rage. But how do you connect your Nest thermostat, your DropCam surveillance device and your Chamberlin MyQ "smart" garage door opener? An IoT hub, of course. But not so fast: a report from the firm Veracode (https://info.veracode.com/whitepaper-the-internet-of-things-poses-cybersecurity-risk.html ) may make you think twice about deploying one of these IoT gateways in your home.

As The Security Ledger reports (https://securityledger.com/2015/04/research-iot-hubs-expose-connected-homes-to-hackers/), Veracode researchers found significant security vulnerabilities in each of six IoT gateways they tested, suggesting that manufacturers are giving short shrift to security considerations during design and testing.

The flaws discovered ranged from weak authentication schemes (pretty common) to improper validation of TLS and SSL certificates, to gateways that shipped with exposed debugging interfaces that would allow an attacker on the same wireless network as the device to upload and run malicious code. Many of the worst lapses seem to be evidence of insecure design and lax testing of devices before they were released to the public, Brandon Creighton, Veracode’s research architect, told The Security Ledger.

This isn't the first report to raise alarms about IoT hubs. In October, the firm Xipiter published a blog post (http://www.xipiter.com/musings) describing research into a similar hub by the firm VeraLite. Xipiter discovered that, among other things, the VeraLite device shipped with embedded SSH private keys stored in immutable areas of the firmware used on all devices.

Submission + - Data centers face embedded systems threat (datacenterdynamics.com)

judgecorp writes: Remember the danger from embedded systems in power stations and other infrastructure — controlled by insecure protocols such as SCADA? The problem could also affect data centers, according to Singapore-based critical systems expert Ed Ansett. The IT kit in data centers may be secure — but it is placed in a building whose heating and power systems, installed by non-IT people, may include unsecured embedded network access. In these sites, the data may be secure, but the systems could be shut down by attackers interfering with temperature controls or power supplies, Ansett warns.

Comment Re:Opposite? (Score 1) 42

But when you submit data to it, the browser will automatically switch on-the-fly to an alternate, encrypted route, so the data is sent encrypted to a alternate destination handling encryption.

What benefit does that have over regular HTTPs? Why is this different from just having the submit URL be HTTPs? And wouldn't a security-aware user refuse to click submit when they saw the page wasn't encrypted?

Thanks for the explanation. I've been reading about this since I saw the Slashdot headline a few days ago and I'm just not getting it.

Submission + - TrueCrypt Alternatives Step Up Post-Cryptanalysis (threatpost.com) 1

msm1267 writes: What's next for TrueCrypt now that a two-phase audit of the code and its cryptography uncovered a few critical vulnerabilities, but no backdoors? Two alternative open source encryption projects forked TrueCrypt once its developers decided to abandon the project in early 2014, giving rise to VeraCrypt and CipherShed--and both are ready to accelerate growth, compatibility and functionality now that the TrueCrypt code has been given a relative clean bill of health.

Comment Re:Related to the Boston Marathon how? (Score 3, Informative) 246

The Boston Marathon is on April 20th. So a hostage situation on April 5th would be unrelated. It would be like saying "Armed robbery at Pizza parlor within sight of the Statue of Liberty" knowing that the Statue of Liberty can be seen for miles away. Or maybe "Armed robbery at Pizza parlor visited by Barack Obama" when Barack Obama was there last year.

Submission + - Hacking your 3D printer to make an air hockey robot! (robohub.org)

Hallie Siegel writes: JJROBOT loves hacking – i.e. modifying everyday items you already have at home or that can be purchased easily. And his daughter loves air hockey! This fun project combines standard RepRap 3D printer parts (NEMA17 stepper motors, drivers, Arduino Mega, RAMPS, belts, bearings, rods, printed pieces ) with video detection and motor control to make an air hockey robot that you can play against. Open source.

Submission + - Comcast planning a 2Gbps service (pcmag.com)

joemite writes: There's been a lot of talk about Google's 1Gbps "gigabit" Internet service, but Comcast said today that it is planning a 2Gbps service, beginning in Atlanta.

Submitter note: All of the ISPs seem to be "out-doing" each other in terms of offering faster and faster service, but why can't they compete on reasonable rates for "slower" speeds? My 5Mbit service from Comcast is currently costing me $50/month, about what it was 10 years ago. Seems that if they can push a 2 Gigs for a few hundred dollars, I could get at least get 50Mbit for what I'm paying now.

Submission + - Einstein and Schrödinger didn't believe in quantum indeterminism

StartsWithABang writes: When it comes to the very nature of quantum mechanics — about the inherent uncertainty and indeterminism to reality — it’s one of the most difficult things to accept. Perhaps, you imagine, there’s some underlying cause, some hidden reality beneath what’s visible that actually is deterministic. After all, a cat can’t simultaneously be dead and alive until someone looks can it? That’s one of the problems that both Einstein and Schrödinger wrestled with during their lives. An investigation of that story, their work on that front, and their friendship that ensued as both pursued that same end is thoroughly investigated here by physicist Paul Halpern.

Submission + - Firefox 37 Adds Opportunistic Encryption for HTTP

Trailrunner7 writes: Mozilla has released Firefox 37, and along with the promised addition of the OneCRL certificate revocation list, the company has included a feature that enables opportunistic encryption on connections for servers that don’t support HTTPS.

The new feature gives users a new defense against some forms of monitoring and doesn’t require any setup from users. When Web servers are configured correctly to provide a specific response header, Firefox will begin sending requests to the indicated encrypted port rather than in cleartext to port 80. Opportunistic encryption isn’t a replacement for SSL, as it’s not authenticated, but it can provide a alternative for organizations that can’t migrate fully to HTTPS for one reason or another.

“OE provides unauthenticated encryption over TLS for data that would otherwise be carried via clear text. This creates some confidentiality in the face of passive eavesdropping, and also provides you much better integrity protection for your data than raw TCP does when dealing with random network noise. The server setup for it is trivial,” Patrick McManus of Mozilla wrote in a post explaining the new feature.

Submission + - Verizon Subscribers Can Now Opt Out Of 'Supercookies' (itworld.com)

itwbennett writes: Verizon said in January that it would allow subscribers to opt out of having a unique identifier placed on their phones that critics have labelled a ‘supercookie’ because it’s almost impossible to remove, but it didn’t say when. On Tuesday, Verizon said the identifier won’t be inserted for customers who opt out of its mobile advertising program: 'Verizon Wireless has updated its systems so that we will stop inserting the UIDH after a customer opts out of the relevant mobile advertising program or activates a line that is ineligible for the advertising program,” such as as a government or business line,' Verizon said in a change to its policies Tuesday.

Submission + - Amazon Moves "Buy Now" Into the Physical World, With the Dash Button (gizmag.com)

Zothecula writes: The Amazon Dash Button is a small device that you can stick to walls or a variety of household appliances. Each button is associated with a certain brand or product, and when you set it up (via smartphone) you associate the button with a specific size or quantity (like, say, two 12-packs of Starbucks K-cups or one 2-pack of 50 oz. Tide detergent) and shipping speed. When you start to get low on said product, mash the button and Amazon takes care of the rest.

Slashdot Top Deals

One good reason why computers can do more work than people is that they never have to stop and answer the phone.

Working...