Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Submission + - Researcher Finds Hidden Data-Dumping Services in iOS

Trailrunner7 writes: There are a number of undocumented and hidden features and services in Apple iOS that can be used to bypass the backup encryption on iOS devices and remove large amounts of users’ personal data. Several of these features began as benign services but have evolved in recent years to become powerful tools for acquiring user data.

Jonathan Zdziarski, a forensic scientist and researcher who has worked extensively with law enforcement and intelligence agencies, has spent quite a bit of time looking at the capabilities and services available in iOS for data acquisition and found that some of the services have no real reason to be on these devices and that several have the ability to bypass the iOS backup encryption. One of the services in iOS, called mobile file_relay, can be accessed remotely or through a USB connection can be used to bypass the backup encryption. If the device has not been rebooted since the last time the user entered the PIN, all of the data encrypted via data protection can be accessed, whether by an attacker or law enforcement, Zdziarski said.

Zdziarski discussed his findings in a talk at the HOPE X conference recently and published the slides and paper, as well. The file_relay service has been in iOS for some time and originally was benign, but Zdziarski said that in recent versions it has turned into a tool that can dump loads of user data on command. The file_relay tool can dump a list of the email and social media accounts, the address book, the user cache folder, which contains screenshots, offline content, copy/paste data, keyboard typing cache and other personal data. The tool can also provide a log of periodic location snapshots from the device.

Submission + - What do WhiteHouse.gov and YouPorn.com have in common? (propublica.org)

An anonymous reader writes: Both sites use a new, extremely persistent type of online tracking called "canvas fingerprinting" that can't be blocked by standard Web browser privacy settings or even anti-tracking tools such as AdBlock Plus.

Companies are looking to this method to replace cookies as Web users increasingly rely on more sophisticated ad-blocking software.

Submission + - Stop DRIP: What The Data Retention and Investigatory Powers Bill Actually Means

concertina226 writes: David Cameron has decided to rush through new emergency legislation known as the Data Retention and Investigatory Powers Bill (DRIP) into law this week, saying that there is an urgent need for better legislation since the European Court of Justice (ECJ) overturned the EU Data Retention Directive in April.

Some of the changes from the 2009 Data Retention Regulations potentially give the UK government more powers for monitoring our data, from allowing the UK government to give warrants to non-UK companies to issuing warrants to forum owners, online storage services like Dropbox and webmail providers.

Submission + - Prevalence of offshoring in the Information Security industry

sundarvenkata writes: After having been a regular (C# .NET, C++) code monkey in the US for 6 years now with readily offshoreable skills, I feel like I am fighting an uphill battle against third world wages. While I am not prepared for a drastic career change that will be completely incompatible with my Computer Science background, I was wondering if investing money and resources in getting a degree in Information Security would be worthwhile to get a job that can't easily be offshored.

I would welcome insights from the industry insiders on the level of offshoring that they have witnessed in this industry (in the US) and the barriers-to-entry for someone with an undergrad in Computer Science.

Submission + - 10000 year old drawings of aliens and UFOs found in caves of India (indiatimes.com)

An anonymous reader writes: The archeological department of the Indian state of Chattisgarh has found some interesting paintings in caves. They are now asking NASA, ISRO and other archeologists for help for more research into this. According to the folklore among the villages, the small sized aliens, who used to land from sky in a round shaped flying object and take away one or two persons of village who never returned.
Full story at
http://timesofindia.indiatimes...

Submission + - Comcast Customer Service Rep Just Won't Take No For An Answer

RevWaldo writes: The Verge and other sources post how AOL's Ryan Block ultimately succeeded in cancelling his Comcast account over the phone, but not before the customer service representative pressed him for eight solid minutes (audio) to explain his reasoning for leaving "the number one provider of TV and internet service in the country" in a manner that would cause a character in Glengarry Glen Ross to blanch. Comcast has as of now issued an apology.

Submission + - Mozilla Releases Mozjpeg 2.0, Facebook Backs The JPEG Encoder With $60,000

An anonymous reader writes: Mozilla today announced the release of mozjpeg version 2.0. The JPEG encoder is now capable of reducing the size of both baseline and progressive JPEGs by 5 percent on average (compared to those produced by the standard JPEG library libjpeg-turbo upon which mozjpeg is based). Mozilla today also revealed that Facebook is testing mozjpeg 2.0 to see whether it can be used to improve the compression of images on Facebook.com. The company has even donated $60,000 to contribute to the ongoing development of the technology.

Submission + - CISA, SIFMA, and the public-private cyber war council

Presto Vivace writes: CISA: The Banks Want Immunity and a Public-Private War Council

A group of privacy and security organizations have just sent President Obama a letter (PDF) asking him to issue a veto threat over the Cybersecurity Information Sharing Act passed out of the Senate Intelligence Committee last week. It’s a great explanation of why this bill sucks, and doesn’t do what it needs to to make us safer from cyberattacks. It argues that CISA’s exclusive focus on information sharing — and not on communications security more generally — isn’t going to keep us safe.

It seems that Keith Alexander has convinced SIFMA to demand a public-private cyber war council, involving all the stars of revolving door fearmongering for profit.

This is not — contrary to what people like Dianne Feinstein are pretending — protecting the millions who had their credit card data stolen because Target was not using the cyberdefenses it put into place. Rather, this is about doing the banksters’ bidding, setting up a public-private war council, without first requiring them to do basic things — like limiting High Frequency Trading — to make their industry more resilient to all kinds of attacks, from even themselves.

If you oppose CISA, now would be a good time to contact your senators and tell them so. Some of them are up for reelection this year, so you might be able to catch them on the road.

Submission + - Court Fines French Blogger $3,400 For Her Negative Review Of Local Restaurant (techdirt.com) 1

An anonymous reader writes: Here's yet another business that, when confronted with a negative review, thought to itself, "Why not deter EVEN MORE potential patrons from ever considering setting foot in our establishment?" There are many ways to react to criticism, and Il Giardino, an Italian restaurant located in France, opted for "catastrophic."

        A food blogger in France has been fined 1500 euros ($2,040 USD) for writing a negative review of a restaurant. According to Arret Sur Images (translated), Caroline Doudet wrote an unflattering review of Il Giardino, an Italian restaurant in Cap-Ferret, France in August of 2013 on her blog Les Chroniques Culturelles. She was brought to court six months later by the restaurant.

Doudet's review is actually a blog post, one that would require readers to do a little digging to get past the normal review sites. As far as I can tell from the translation, Doudet portrayed the lousy service she encountered in a far more humorous fashion than most negative reviews, all the while clearly pointing out the deficiencies she encountered.

So, rather than address the issues, or simply disregard the single voice complaining about the three waitpersons apparently needed to acquire a single round of beverages (not to mention quality issues with the food [and service] past that point), Il Giardino decided to make its mégot mal a full-blown legal affair.

Slashdot Top Deals

Thus spake the master programmer: "After three days without programming, life becomes meaningless." -- Geoffrey James, "The Tao of Programming"

Working...