Why Did A Security Firm Mysteriously Ditch a ‘Privacy’ Product?

A posting from Forbes by Yael Grauer titled “Why Did A Security Firm Mysteriously Ditch a ‘Privacy’ Product?” :

 

Two weeks after Ben Caudill announced that he’d built a $200 hardware proxy which allows Internet users to mask their location, the Rhino Labs owner shut down his project. His much anticipated August appearance at DEF CON, the annual hacker convention in Las Vegas where he planned on selling the device at cost, was cancelled as well.

“People are always going to speculate despite what I say and don’t say,” Caudill told me when I asked him about the theory that he cancelled the project and talk for media attention. Although he repeatedly declined to offer details on the circumstances surrounding the cancellation, he pointed out that not all press is good press, and that the company had invested time and resources into the project. “The actual result of cancelling was for more negative than going through with it would have been,” he added, pointing out that a lot of time and energy and material costs were put into the project, which he worked on with a small team for about a year.

 

to read more click here:

Did Firefox listen to Facebook and just kill Flash? (No, but there’s another patch!)

A posting from NakedSecurity by Paul Ducklin titled “Did Firefox listen to Facebook and just kill Flash? (No, but there’s another patch!)”

it seems that Flash exploit stories come along in bunches, too, like those pesky buses you wait for.

No sooner had we written about Facebook’s new CSO’s weekend “Death to Flash” tweet

…than an eagle-eyed Naked Security reader pointed us at a tweet from someone going by @MarkSchimdty, who seems to be something of a anti-Flash hacktivist, considering the photo accompanying his tweet:

BIG NEWS!! All versions of Flash are blocked by default in Firefox as of now.

Not in my Flash in my Firefox, as it happens – with Flash set to “Always ask,” Firefox asked and then used Flash if I agreed.

But the facts behind the histrionics seemed to sort themselves out when I tried Abobe’s own Flash Tester (yes, I used click-to-play):

to read more click here:

Dark Reading Radio: Firewall Smackdown

A posting from dark reading by  Marilyn Cohodas  titled firwall smackdown:

 

Is there a future for the venerable firewall? Join us for a debate between security CEOs Asaf Cidon of Sookasa and Jody Brazil of FireMon. Show time is Wednesday, July 15, 1:00 PM New York/10:00 AM San Francisco.

In today’s  BYOD world there is probably no question that sparks greater controversy than what to do about the increasingly obscure network  perimeter — and what that means for the ubiquitous firewall. Some experts argue that the perimeter is dead, and along with it, the stalwart firewall. Others contend that the firewall will continue to play a role in the command center of enterprise defense for a long time to come.

To read more click here:

Flash zero-day leaks out from “Hacking Team” hack, patch expected Real Soon Now

An informative article by paul duckin titled  ” flash zero-day leak out from hacking team  hack, patch expected real soon”

Wouldn’t you just know it!

Last night we wrote about how Flash troubles come in threes, like those proverbial buses:

Stop the presses!

Make that four buses that just arrived at once.

Earlier this week, a Italian company with the unequivocal name of Hacking Team…

…got hacked, to put not too fine a point on it.

Hacking Team is, indeed, into hacking – controversially, as it happens, because its main line of business is selling hacking and interception capabilities at a country level.

You might therefore expect a company of that sort to have had some vulnerabilities and exploits up its sleeve.

Apparently, that turns out to have been correct, though we say “to have had” because they’re no longer “up its sleeve.”

Thanks to a giant data dump published by the hackers who hacked the hackers, the zero-day cat is out of the bag.

Adobe emergency bulletin

to read more click here:

Cybercriminal Group Spying On US, European Businesses For Profit

An informative article by  kelly jackson higgins  at dark reading   titled “Cybercriminal Group Spying On US, European Businesses For Profit”

Symantec, Kaspersky Lab spot Morpho’ hacking team that hit Apple, Microsoft, Facebook and Twitter expanding its targets to lucrative industries for possible illegal trading purposes.

A team of attackers tied to previous hacks of Apple, Facebook, Microsoft, and Twitter, has quietly expanded its cyber espionage operation to snooping on and stealing intellectual property from multi-billion dollar firms in the pharmaceutical, software, Internet, oil and metal mining commodities sectors in the US, Europe, and Canada.

But unlike most cyber espionage groups, this is no nation state-sponsored hacking operation. According to researchers at Symantec who have been investigating the so-called Morpho organization for the past two years, this cyberspying operation appears to be run by an organized crime ring with possible US ties. Some 49 different organizations across 20 nations, most in the US, have been hit by the Morpho group, which mainly has set its sights on the victim organizations’ Microsoft Exchange and Lotus Domino email servers to spy on corporate correspondence or possibly insert phony emails.

to read more click here:

Leaked Emails: How Hacking Team And US Government Want To Break Web Encryption Together

An informative article by Thomas fox-brewster  about “Why China Wants Your Sensitive Data”:

Get ready America: one of the most notorious surveillance providers on the planet, Hacking Team TISI NaN%, is expanding in earnest on US shores. And, if it hasn’t collapsed as a result of a hugely embarrassing attack on its servers, the likes of the FBI, Drug Enforcement Agency and a slew of other US government departments will welcome the controversial company with open arms as they seek to break common encryption across mobiles and desktops. In response to the demand, Hacking Team is promising capabilities to crack Apple AAPL -1.08%iPhones, Google GOOGL -0.91% Android devices, and the encrypted anonymising network Tor, whilst poking at the security of mobile apps such as Wickr.

This is all according to leaked emails seen by FORBES today, the result of a hack on Hacking Team, a Milan-based outfit that has been criticised for selling to regimes with questionable human rights records, from Sudan to Bahrain to Egypt and beyond. The messages came from the email account of Eric Rabe, Hacking Team’s communications chief, who was unavailable for comment at the time of publication.

Rabe details a close working relationship between Hacking Team and the US government in his emails, talking up its previously-reported work with the DEA. An email from 20 May indicated that the formation of Hacking Team USA, likely to arrive this summer if the hack hasn’t derailed the plans, would not change the working relationship with the DEA, which includes intensive training operations in Bogota, Columbia.

to read more click here: