Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Submission + - Old MS Office feature can be exploited to deliver, execute malware (net-security.org)

Errorcod3 writes: A Microsoft Office functionality that has been in use since the early 1990s can be exploited to deliver malicious, executable files to users without triggering widely used security software, claims security researcher Kevin Beaumont.

  The feature in question is the OLE Packager, which allows content (even executable content such as .exe or .js files) to be embedded in Office documents.

  Beaumont says he contacted Microsoft about this in March and shared with them that threat actors were experimenting with it in the wild (he doesn't say how he found that out).

  "At the time they asked me not to post information about the problem online. They have not addressed the problem, and believe it is a feature of Office," he noted, and presumably finally decided to disclose the existence of the problem with the wider public.

  He also provided several PoC document files that take advantage of the feature to perform actions like locking the users' Windows workstation and swaping their mouse button functions.

  "These documents are clean for all antivirus providers, and tested to pass Messagelabs, etc (other cloud based email security providers are available). I have also tested these documents on Malwarebytes Anti-Exploit and a leading behavioral endpoint product (under NDA so cannot name) — both fail to spot it," he claims.

  "Additionally, it is not flagged by Cuckoo Sandbox or Palo-Alto Wildfire sandbox. Through months of testing it has become clear that security solutions simply do not touch this issue."

  The OLE Packager cannot be disabled, he says. "If you have Microsoft EMET already deployed, add a rule for Excel, Winword (sic) and Powerpoint — it needs to be an ASR rule which denies packager.dll. Because you cannot control this on a document-by-document basis, you may break legitimate OLE Packager usage (e.g. embedding Excel documents in PowerPoint)," he advised.

  Beaumont notes that Microsoft has tried to mitigate the issue in the past by making warning messages popping up when users opened risky file types, but that it hasn't kept the list updated over the years. Also, he noted, the warning messages can be clicked through, and this is what most users usually do.

Submission + - Extreme Reduction Gearing Device Offers an Amazing Gear Ratio of 11 Million to 1 (3dprint.com)

ErnieKey writes: The 3D printed extreme reduction gearing device, created by long-time puzzle maker M. Oskar van Deventer, may leave you puzzled for its obvious applications, but the coaxial cranking mechanism offers potential in a variety of real-world applications with multi-colored gears that move in opposite directions at a ratio of 11,373,076 : 1. This 3D printed reduction gearing device is compact and multi-colored, and looks deceivingly simple at first glance. Developed through a complex algorithm, it could possibly offer potential as parts for machines like 3D printers, aerospace and automotive components, as well as perhaps robotics and a variety of motors.
United States

Japanese and US Piloted Robots To Brawl For National Pride 107

jfruh writes: Japan may have just lost the Women's World Cup to the U.S., but the country is hoping for a comeback in another competition: a battle between giant robots. Suidobashi Heavy Industry has agreed to a challenge from Boston-based MegaBots that would involve titanic armored robots developed by each startup, the first of its kind involving piloted machines that are roughly 4 meters tall. "We can't let another country win this," Kogoro Kurata, who is CEO of Suidobashi, said in a video posted to YouTube. "Giant robots are Japanese culture."
Transportation

Google's Waze Jumps Into the Ride-Sharing Business 90

An anonymous reader writes: Waze, the online mapping company owned by Google, is testing a ride-sharing service in Israel called RideWith. The service will allow commuters to pay drivers for rides to and from work. This is a hard limit — drivers can give no more than two rides per day. If the restriction remains after the initial test, it could be a simple way to avoid pseudo-professional drivers, and all the taxi-related legal problems that go with them (see: Uber). "RideWith calculates a cost based on the anticipated fuel consumption and 'depreciation' based on mileage, and the driver is free to accept or decline the ride accordingly." One can't help but speculate about future involvement with Google's autonomous car project.

Submission + - The battle between Washington and Silicon Valley over encryption (csmonitor.com)

An anonymous reader writes: The American business community worries a back door policy, if enacted, would threaten the competitiveness of their businesses. Many companies are already trying to estimate the high cost of dealing with any regulation that would mandate access to encryption — including potential losses in revenue and the tougher-to-measure consumer trust. As such, some are already contemplating how to find loopholes and other ways around any new US rules to build back doors, including by taking business overseas.

At a macro level, companies are concerned about the global implications if other countries seek their own channels to access customers’ data using the US policy as a precedent. How the most powerful government in the world decides to proceed on encryption will have a profound effect not just on development of consumer technologies but the rights of Internet users in the future, they say. And the encryption debate comes at a time when the US government and the American tech sector need each other more than ever as advanced computing and digital security become increasingly key for the country’s economy and national defense. The squabble over encryption, however, may end up standing in the way — and the principles each side decides to fight for could set the tone for the future of the Surveillance Age.

Google

YouTube Algorithm Can Decide Your Channel URL Now Belongs To Someone Else 272

An anonymous reader writes: In 2005, blogger Matthew Lush registered "Lush" as his account on the then-nascent YouTube service, receiving www.youtube.com/lush as the URL for his channel. He went on to use this address on his marketing materials and merchandise. Now, YouTube has taken the URL and reassigned it to the Lush cosmetics brand. Google states that an algorithm determined the URL should belong to the cosmetics firm rather than its current owner, and insists that it is not possible to reverse the unrequested change. Although Lush cosmetics has the option of changing away from their newly-received URL and thereby freeing it up for Mr. Lush's use, they state that they have not decided whether they will. Google has offered to pay for some of Mr. Lush's marketing expenses as compensation.
Microsoft

Microsoft Attempts To Clarify the Windows 10 For Everyone Rumor 96

Ammalgam writes: Over the weekend, Microsoft caused a web explosion by seeming to imply that they were going to relax their licensing rules and offer Windows 10 for free to everyone. This caused an uproar of controversy online that Microsoft had to address. The company issued a statement in an attempt to clarify the Windows 10 licensing situation. The language is still a little confusing so on Windows10update.com, Onuora Amobi tries to simplify the language and sort out the distinction between users on the Windows Insider Program and non Windows Insiders.

Submission + - Lawsuit fights Uber's user location tracking plans (betanews.com)

Mark Wilson writes: Uber has faced numerous complaints since its inception in 2010, including suggestions that drivers are not properly vetted. Now the taxi service is facing legal action over plans to track the location of its customers whether the app is running in the foreground or background on their phones.

The new policy is due to come into force on July 15, but the Electronic Privacy Information Center (EPIC) has filed a complaint with the FTC saying that the policy change is unfair and should be investigated by the commission. It will be possible to opt out of this location tracking, but EPIC feels this is unreasonable.

Referring to previous allegations about Uber, EPIC says that the company "regularly abuses its access to customer location data". But it is the proposed changes to user tracking that is now causing concerns.

Security

Cyberattack Grounds Planes In Poland 40

itwbennett writes: While the alleged hacking of in-flight systems has been much discussed recently, "there are many more areas of vulnerability to address in the aviation industry," says Tim Erlin of security firm Tripwire. "Like most industries today, aviation relies on a wide variety of interconnected systems, from air traffic control to reservations systems." Case in point: LOT Polish Airlines was forced to cancel 10 flights scheduled to depart from Warsaw's Chopin airport on Sunday after hackers attacked its ground computer systems.
Cellphones

Political Polls Become Less Reliable As We Head Into 2016 Presidential Election 292

HughPickens.com writes: Cliff Zukin writes in the NY Times that those paying close attention to the 2016 election should exercise caution as they read the polls — election polling is in near crisis as statisticians say polls are becoming less reliable. According to Zukin, two trends are driving the increasing unreliability of election and other polling in the United States: the growth of cellphones and the decline in people willing to answer surveys. Coupled, they have made high-quality research much more expensive to do, so there is less of it. This has opened the door for less scientifically-based, less well-tested techniques.

To top it off, a perennial election polling problem, how to identify "likely voters," has become even thornier. Today, a majority of people are difficult or impossible to reach on landline phones. One problem is that the 1991 Telephone Consumer Protection Act has been interpreted by the Federal Communications Commission to prohibit the calling of cellphones through automatic dialers, in which calls are passed to live interviewers only after a person picks up the phone. To complete a 1,000-person survey, it's not unusual to have to dial more than 20,000 random numbers, most of which do not go to actual working telephone numbers.

The second unsettling trend is rapidly declining response rates, reaching levels once considered unimaginable. In the late 1970s, pollsters considered an 80 percent response rate acceptable, but by 2014 the response rate has fallen to 8 percent. "Our old paradigm has broken down, and we haven't figured out how to replace it," concludes Zukin. "In short, polls and pollsters are going to be less reliable. We may not even know when we're off base. What this means for 2016 is anybody's guess."

Submission + - Report: Open Source Components To Blame for Massively Buggy Software

itwbennett writes: The problem isn't new, but a report released Tuesday by Sonatype, the company that manages one of the largest repositories of open-source Java components, sheds some light on poor inventory practices that are all-too-common in software development. To wit: 'Sonatype has determined that over 6 percent of the download requests from the Central Repository in 2014 were for component versions that included known vulnerabilities and the company’s review of over 1,500 applications showed that by the time they were developed and released each of them had an average of 24 severe or critical flaws inherited from their components.'

Submission + - So much for Whatsapp's "end-to-end encryption" - Belgium Arrests Two in Probe (bloomberg.com) 3

Errorcod3 writes: Belgian arrested two suspects and issued arrest warrants against three others following anti-terror raids Monday.

Police said earlier that they simultaneously raided 21 locations as part of two probes into jihadist Chechen groups, the country’s federal prosecutors’ office said in a statement. Prosecutors said the arrests were based on police information concerning a wounded man who had returned to Belgium after taking part in the jihad in Syria.

Authorities said they had to let go four other people detained earlier on Monday as part of a separate probe into the participation of a Chechen group based in the Belgian city of Leuven in the preparation of a possible terrorist attack in the country.

European law enforcement agencies have grappled with the threat of a domestic terrorism as extremist groups have encouraged followers to carry out attacks on home soil rather than try to travel to the Middle East. Two suspected terrorists were killed in January in a shootout that Belgian police said foiled a possible “major” attack.

Investigators said earlier they had detained 16 people in the anti-terror raids after working with U.S. authorities to monitor suspects’ communications on WhatsApp Inc.’s messaging service.

Submission + - Undetectable NSA-linked hybrid malware hits Intel Security radar (theregister.co.uk) 1

Errorcod3 writes: CTB Locker ransomware attacks rose 165 per cent in the first three months of 2015.

More than a third (35 per cent) of victims were based in Europe, McAfee Labs reported. CTB Locker encrypts files and holds them hostage until the ransom is paid. As such, the crimeware is picking up the baton that dropped with the takedown of the infamous CryptoLocker ransomware scam in May last year.

The latest edition of Intel Security's report, released on Tuesday, reports attacks on firmware for the first time. More specifically, the report details "persistent and virtually undetectable attacks" by the so-called Equation Group that reprogram hard disk drives and solid state drive firmware.

McAfee Labs assessed the reprogramming modules exposed in February and found that they could be used to reprogram the firmware in SSDs in addition to the previously-reported HDD reprogramming capability.
Once reprogrammed, the HDD and SSD firmware can reload associated malware each time infected systems boot and the malware persists even if the drives are reformatted or the operating system is reinstalled.

Once infected, security software cannot detect the associated malware stored in a hidden area of the drive.

Submission + - 5G is coming...in five years...and maybe not from U.S. (computerworld.com)

CarlottaHapsburg writes: Ericson and Nokia are leading the pack but there are aspects to 5G we can't imagine. Flexible architecture, functioning key standards, the US's lethargy in expanding mmWave and even the definition of what 5G is and can do are at stake. The FCC's Tom Wheeler says 5G is different for every manufacturer, like a Picasso painting. It should be an exciting five years of further developments and definitions — and, hopefully, American preparedness.
Space

Pluto's Outer Moons Orbit Chaotically, With Unpredictable Sunrises and Sunsets 92

StartsWithABang writes: Few things in this world are as regular as sunrise and sunset. With the application of a little physics, you can predict exactly where and when the sun will rise or set from any location on Earth. Thus far, every world in our Solar System — planet, moon and asteroid — has had the exact same experience as us. But out in the Kuiper belt, Pluto is different. The only known world in the Solar System where a significant fraction of the system's mass is not in a single component, the outer moons of the Pluto-Charon system provide a unique environment to study how planets might behave in orbit around binary stars. The amazing takeaway? The rotational part of the orbit is chaotic; the worlds tumble, and hence sunrises and sunsets are no longer predictable.

Slashdot Top Deals

The key elements in human thinking are not numbers but labels of fuzzy sets. -- L. Zadeh

Working...