Potent malware that hid for six years spread through routers

Researchers have discovered malware so stealthy it remained hidden for six years despite infecting at least 100 computers worldwide.
Slingshot—which gets its name from text found inside some of the recovered malware samples—is among the most advanced attack platforms ever discovered, which means it was likely developed on behalf of a well-resourced country, researchers with Moscow-based Kaspersky Lab reported Friday. The sophistication of the malware rivals that of Regin—the advanced backdoor that infected Belgian telecom Belgacom and other high-profile targets for years—and Project Sauron, a separate piece of malware suspected of being developed by a nation-state that also remained hidden for years.

“The discovery of Slingshot reveals another complex ecosystem where multiple components work together in order to provide a very flexible and well-oiled cyber-espionage platform,” Kaspersky Lab researchers wrote in a 25-page report published Friday. “The malware is highly advanced, solving all sorts of problems from a technical perspective and often

Original URL: http://feedproxy.google.com/~r/feedsapi/BwPx/~3/OE2SVLj_ohk/

Original article

Synode: understanding and automatically preventing injection attacks on Node.js

Synode: understanding and automatically preventing injection attacks on Node.js Staicu et al., NDSS’18
If you’re using JavaScript on the server side (node.js), then you’ll want to understand the class of vulnerabilities described in this paper. JavaScript on the server side doesn’t enjoy some of the same protections as JavaScript running in a browser. In particular, Node.js modules can interact freely with the operating system without the benefit of a security sandbox. The bottom line is this:

We show that injection vulnerabilities are prevalent in practice, both due to eval, which was previously studied for browser code, and due to the powerful exec API introduced in Node.js. Our study suggests that thousands of modules may be vulnerable to command injection attacks and that fixing them takes a long time, even for popular projects.

The Synode tool developed by the authors combines static analysis with runtime protection to defend against such attacks. You can

Original URL: http://feedproxy.google.com/~r/feedsapi/BwPx/~3/ovZdWI89FJo/

Original article

Linux beats legal threat from one of its own developers

Video: Torvalds unimpressed with DRM, GPLv3

In a German court earlier this week, former Linux developer Patrick McHardy gave up on his Gnu General Public License version 2 (GPLv2) violation case against Geniatech Europe GmbH. Now, you may ask, “How can a Linux programmer dropping a case against a company that violates the GPL count as a win?” It’s complicated.First, anyone who knows the least thing about Linux’s legal infrastructure knows its licensed under the GPLv2. Many don’t know that anyone who has copyrighted code in the Linux kernel can take action against companies that violate the GPLv2. Usually, that’s a non-issue. People who find violations typically turn to organizations such as the Free Software Foundation, Software Freedom Conservancy (SFC), and the Software Freedom Law Center (SFLC) to approach violators. These organizations then try to convince violating companies to mend their ways and honor their GPLv2 legal requirements.

Original URL: http://feedproxy.google.com/~r/feedsapi/BwPx/~3/cx152kFEXqc/

Original article

Slack’s bait and switch

Slack has finally decided to close down their IRC and XMPP gateways.
True to form, you can only read their announcement if you already have a Slack
account and are logged in to a workspace.
Here’s the gist of their announcement:

As Slack has evolved over the years, we’ve built features and capabilities —
like Shared Channels, Threads, and emoji reactions (to name a few) — that the
IRC and XMPP gateways aren’t able to handle. Our priority is to provide a
secure and high-quality experience across all platforms, and so the time has
come to close the gateways.

They’re of course being economical with the truth here.
Perhaps their XMPP gateway can’t handle “Shared Channels” and “Threads”,
but that’s because they purposefully stopped working on it.
A “Shared Channel” simply means a chatroom which people from outside your
workspace can participate in. If a workspace is mapped to a members-only
chatroom, then making something a shared channel simply means updating the members
list or

Original URL: http://feedproxy.google.com/~r/feedsapi/BwPx/~3/hPMA6Wh8MAs/

Original article

Amazon’s Alexa Is Coming To an Office Near You

Amazon announced today that it’s bringing its voice assistant into a range of business settings, big and small, like hotels and co-working spaces. From a report: While people always think of Amazon as a consumer company, it has shown itself time and again to have larger ambitions. This move could help it expand tis business services beyond its already popular Amazon Web services. In an interview, Amazon CTO Werner Vogels said that exposure to the workplace will improve Alexa by exposing it to new types of conversations. “The kind of language we use in our offices is sometimes radically different from the more conversational things we do in our(homes),” he told Axios. Alexa “will greatly improve by being exposed to different kinds of statements or conversations.”

Read more of this story at Slashdot.

Original URL: http://rss.slashdot.org/~r/Slashdot/slashdot/~3/X3wBN3SRdJ8/amazons-alexa-is-coming-to-an-office-near-you

Original article

Proudly powered by WordPress | Theme: Baskerville 2 by Anders Noren.

Up ↑

%d bloggers like this: