Google Search To Add Default Encryption
October 25, 2011 by admin
Filed under Around The Net
Comments Off on Google Search To Add Default Encryption
Google is implementing over the next few weeks default encryption using SSL on searches for users signing in with their accounts, the company said Tuesday.
The move comes over a year after Google made SSL the default setting for Gmail, and also unveiled an encrypted search service.
“As search becomes an increasingly customized experience, we recognize the growing importance of protecting the personalized search results we deliver,” Google’s product manager, Evelyn Kao said in a blog post on Tuesday.
The encryption is expected to be particularly useful for people using an unsecured Internet connection, such as a Wi-Fi hotspot in an Internet cafe, Kao added.
With Google search over SSL, users get an end-to-end encrypted search channel between their computer and Google. The secured channel helps protect search terms and search results pages from being intercepted by a third party, Google said in a description of SSL search.
Over the next few weeks, users will be redirected to a secure search site when they are signed in with their Google Account. The change encrypts search queries and Google’s
results page.
Users can also navigate directly to the secure search site if they are signed out or don’t have a Google Account.
Tool Created To Hack BlackBerry Passwords
October 7, 2011 by admin
Filed under Smartphones
Comments Off on Tool Created To Hack BlackBerry Passwords
A Russian security firm has upgraded a phone-password cracking software with the ability to figure out the master device password for Research in Motion’s BlackBerry devices.
Elcomsoft said on Thursday that before it developed the product, it was believed that there was no way to uncover a device password on a BlackBerry smartphone or PlayBook tablet. BlackBerry smartphones are configured to wipe all data on the phone if a password is typed incorrectly 10 times in a row, the company said.
Elcomsoft said it figured a way around the problem using a BlackBerry’s removable media card, but only if a user has configured their smartphone in a specific way. In order for Elcomsoft’s software to be successful, a user must have enabled the feature to encrypt data on the media card.
The feature is disabled by default, but Elcomsoft said around 30% of BlackBerry users have it enabled for extra security.
The company’s software can then analyze the encrypted media card and use a brute-force method to figure out a password, which involves trying millions of possible password combinations per second until one works.
Elcomsoft said it can recover a seven-character password in less than an hour if the password is all lower-case or all capital letters. The software does not need access to the actual BlackBerry device but just the encrypted media card.
India Wants To Monitor Twitter & Facebook
August 13, 2011 by admin
Filed under Around The Net
Comments Off on India Wants To Monitor Twitter & Facebook
India’s Communications Ministry has received a request from the Home Ministry to monitor social networking websites such as Twitter and Facebook amid fears that the services are being used by terrorists to organize attacks.
The request suggests that the Indian government is trying to expand the scope of its online surveillance for national security purposes.
Telecommunications service providers in India provide facilities for lawful interception and monitoring of communications on their network, including communications from social networking websites such as Facebook and Twitter, in accordance with their license agreements, Milind Deora, the minister of state for communications and IT, told Parliament, according to the country’s Press Information Bureau.
But there are certain communications which are encrypted, Deora said Friday.
The government did not provide details of what encrypted data they would like to have access to. A spokesman for the home ministry said on Monday that additional
information can only be provided in Parliament while it is in session.
Under new rules to the country’s IT Act that came into force earlier this year, websites and service providers are required to provide government security agencies with information on private accounts, including passwords, on request without a court order.
Most companies, however, are not willing to share information with law enforcement agencies unless they have a court order.
Twitter states in its guidelines for law enforcement that “non-public information about Twitter users is not released unless we have received a subpoena, court order, or other valid legal process document.”
RSA To Replace SecureID Tokens
June 10, 2011 by admin
Filed under Around The Net
Comments Off on RSA To Replace SecureID Tokens
In an acknowledgement of the severity of its recent systems breach, RSA Security said Monday that it will replace SecureID tokens for any customer that asks.
Customers have been left to ponder whether or not to trust RSA’s security tokens since March, when the company confirmed that it had been hacked and issued a vague warning to its customers. Then, two weeks ago, government contractor Lockheed Martin was reportedly forced to pull access to its virtual private network after hackers compromised the SecureID technology.
In a letter sent to customers Monday, RSA confirmed that the Lockheed Martin incident was related to SecureID. Information “taken from RSA in March had been used as an element of an attempted broader attack on Lockheed Martin,” RSA Executive Chairman Art Coviello stated in the letter.
Coviello said the company remains “highly confident in the RSA SecureID product,” but acknowledged that the recent Lockheed Martin attack and general concerns over hacking, “may reduce some customers’ overall risk tolerance.”
Dell To Unleash Microservers
Representatives from Dell stated that the PowerEdge C5125 and C5220 were built for businesses that want to set up cloud computing infrastructures. Dell’s Barton George wrote in his blog that the C5125 will utilize AMD processors and will ship next month and the C5220 which will have an Intel processor will ship in May. The PowerEdge eco-friendly servers will have a dense 3U infrastructure that has 12 one-socket servers that can be used for running one application. These types of servers use four times less rack space and cabling which makes data centers more efficient.
Conflicker Worm Still Wreaking Havoc
Comments Off on Conflicker Worm Still Wreaking Havoc
Security firm fighting the dreadful Conflicker worm claim that they have it on the ropes. The team of computer-security researchers said they managed to neutralize the worm’s impact by blocking its ability to communicate with its developer, who is still anonymous.
Unfortunately after years of trying fighting the Conflicker, security experts estimate the worm infects between five million to fifteen million computers. The Conficker worm, showed up in 2008. The worms intent is to disable a computer’s security measures, including Windows software updates and antivirus protection, leaving machines vulnerable to more malicious software. Read more….