Anatomy of a change – Google announces it will double its SSL key sizes

A posting from Naked Security on Google announces it will double its SSL key sizes:

Google just announced that its HTTPS web pages will be ditching 1024-bit RSA keys in favour of 2048 bits.

“Pah,” I hear you say. “I have one or two questions about that – three questions, in fact.”

  1. How is this newsworthy when many other web properties have already made the switch to 2048 bits? (Kim “Big Fella” Dotcom’s mega.com.nz, for example.)
  2. Why switch if 1024 bits is much bigger than the largest RSA key yet known to have been cracked, at 768 bits?
  3. Why the fuss about 1024 bits anyway, if just 128 bits is considered more than enough for other encryption algorithms, such as AES?

Let’s start at the end: why thousands of bits of RSA key but only hundreds for AES?

To read more click here: 

Phishers try flattery with Facebook Page owners

An interesting article in Naked Security on Phishers try flattery with Facebook Page owners:

Beware, fanboys and fangirls: phishers are targeting Facebook Page owners with a bogus message supposedly sent from Facebook Security.

According to Hoax-Slayer, the scam claims that Facebook is rolling out a new security feature to protect Page owners.

This supposed new security feature is dubbed the “Fan Page Verification Program”.

It does a nice job of flattering suck-up to entice victims into coughing up their Facebook login details, telling targets that they’ve had ever so many stolen Pages lately, and they simply can’t think of what to do about it except just, well, throw up their hands and Delete them all – yes, Delete those bad, bad Pages, with a capital “D”.

 

To read more click here: 

Focused Black Hat 2013 Trainings Examine Incident Response, Malware

A posting from Dark Reading In there  Security  management section:

Verizon’s 2013 DBIR indicates that 40% of breaches involved malware, and rapid analysis often falls to incident responders. Malware Analysis: Black Hat Edition provides a rapid intro to the tools and methodologies of Windows malware analysis. Attendees will learn how to observe malware’s actions through disassembly and debugging, extract host and network-based indicators, and zeroing in on the Windows APIs most used by malware authors. Hands-on labs will abound, and everyone will receive a copy of Mike Sikorski’s “Practical Malware Analysis.”

Despite the staggering number of reported breaches in the past year, the typical IT staffer lacks the necessary and specialized training to properly respond. Digital Forensics and Incident Response takes up that slack, offering attendees both the theory behind digital forensics and hands-on experience with real-life situations and evidence. Upon the Training’s completion, students will be able to effectively preserve and analyze a large number of digital evidence sources, skills that are immediately useful in a number of investigative scenarios.

To read more click here: 

BIOS Bummer: New Malware Can Bypass BIOS Security

A posting from Dark Reading in there Vulnerability and Threat section:

As more hardware vendors seek to implement the new NIST 800-155 specification that was designed to make the start-up BIOS firmware on our PCs and laptops more secure, they may need to rethink the security assumptions upon which the standard depends. A trio of researchers from The MITRE Corp. say that the current approach relies too heavily on access control mechanisms that can easily be bypassed.

The researchers are taking their message to Black Hat USA later this summer in a talk where they plan to unveil new malware proofs-of-concept that can trick an endpoint’s Trusted Platform Module (TPM) chip into thinking the BIOS firmware is clean and can persist infecting the BIOS after it has been flashed, or reset, or even after it has been updated.

 

To read more click here: 

10,000 Facebook accounts hacked by Hackers through distributed Malicious links

An interesting Facebook related post by our content partners at HackersNewsBulletin.com:

Hackers always in search for some tricks to hijack social media accounts but now hackers pointed out a city in INDIA (Jaipur City).
 
Hackers managed to distribute a malicious link on facebook in the Jaipur city and according to experts this malicious link has targeted more than 10,000 users on Facebook.
 
The Malicious link hackers circulating in the city contains Trojan Horse and after a click on that will execute itself in background and will steal all the juicy information from the System
 
According to an Indian News Website, some users clicked that Malicious link because they think that was a song, after that their system got infected.
The the rest at their site here.