Home Tags Flavors

Tag: Flavors

Stack Clash flaws blow local root holes in loads of top...

We knew about this in 2005.

And 2010.

And people are still building without -fstack-check Powerful programs run daily by users of Linux and other flavors of Unix are riddled with holes that can be exploited by logged-in miscreants to gain root privileges, researchers at Qualys have warned.…

Audi’s A5 and S5 Sportback: A performance-minded detour from the SUV

Kiss the sub-$30,000 tier goodbye in Audi's latest niche-specific sportback.

What Interests Children Online

As part of this report, we analyze the collected data in our quest for the answer to the question of what interests the current generation of children online.

IDG Contributor Network: Linux: Is Lubuntu better than Xubuntu?

Lubuntu versus Xubuntu Ubuntu has a number of different flavors, including Lubuntu and Xubuntu.

Both of these Ubuntu flavors offer lightweight desktops, but which one is better?A writer at Linux and Ubuntu recently weighed the pros and cons of Lubun...

The PicoBrew Pico: Getting closer to a counter-top beer-making machine

The Zymatic was an ambitious opening preceding an even more ambitious appliance.

IDG Contributor Network: Ubuntu Linux: Which flavor is the best?

Which Ubuntu flavor is the best? Ubuntu comes in a number of different flavors, and each has its advantages and disadvantages. Which one is best for you? A writer at Linux.com recently delved into the various flavors of Ubuntu and considered what th...

Learning the rules of antibiotics to make old drugs work on...

A newly developed list of criteria may aid in finding and making effective drugs.

DSC Sport’s clever algorithms transform the Porsche Cayman GT4

DSC Sport’s controller is like a PhD for a car’s suspension.

BMW’s all-new 2017 5 series stirs up a technology tsunami

In four flavors at first, with 248hp all the way to 456hp and a plug-in hybrid model.

Azure Security Center Now Guards Windows Server 2016 VMs

Microsoft has added Windows Server 2016, its latest server operating system, to the roster of virtual machines supported by its Azure Monitoring Agent cloud-based threat protection offering. With the holidays out of the way, Microsoft has returned to r...

Los Angeles: Warm weather, movie stars — and 100 million monthly...

Los Angeles is famous for its warm weather and movie stars.

But what may not be as well known is that it’s also one of the largest targets for cyber attacks in the world. The city’s infrastructure in highways, water and power — and all the data behind it — supports 4 million residents in the nation’s second largest city.

The city also collects data about Los Angeles International Airport as well as about the largest shipping port in the western hemisphere, where 43 percent of imported goods enter the U.S.

The city government is even responsible for data related to elections, including yesterday’s national election. It’s not difficult to see the enormity of the city’s security challenge, which includes protecting the personal data of city workers and residents. City of Los Angeles Ted Ross, CIO for the city of Los Angeles, heads the city’s Information Technology Agency, managing its $90 million annual budget and 450 IT workers. “We receive a massive amount of automated cyber attacks every month, about 100 million,” said L.A.

CIO Ted Ross in an interview.

Even so, “we’ve made tremendous improvements in cyber security in the last two years under Mayor Eric Garcetti’s directive.” Ross heads up the Information Technology Agency, one of 38 city departments.

The agency has a $90 million annual budget and employs 450 IT workers. The most obvious security-related improvement was construction of a $1.8 million Integrated Security Operations Center, which opened in late 2015 in a location Ross wouldn’t disclose.

The ISOC consolidates threat intelligence from what previously was carried out in four different locations. From that single ISOC location, working around-the-clock, eight cyber threat analysts on each shift monitor 240 million security-related daily logs from sensors and other endpoints located inside critical infrastructure.

The ISOC consolidation has helped speed up threat response and coordination, according to IT executives. “We get situational awareness from one single pane of glass,” said Timothy Lee, chief information security officer for L.A.

The system uses artificial intelligence to recognize attacks and which critical system is under attack. “We identify the source, how critical it is and how to restore the system.” City of Los Angeles Timothy Lee is chief information security officer for the city of Los Angeles. Lee and Ross didn’t want to divulge all the cyber security tools the city uses, but Lee said L.A. does rely on Amazon Web Services’ GovCloud to share approaches with other governments and does business with FireEye, a company offering a wide array of cyber security products and services. Last February, analysts at ISOC were able to identify 16 ransomware attacks in five city departments. “We identified the attacks across the departments, segmented them off, didn’t lose any data and didn’t pay any ransom,” Lee said.

The city determined the ransomware attacks were zero-day events, Lee explained. “There is constant coordination and information sharing performed by ISOC across the city departments and with the broader network of federal and other local governments,” Ross added. “This is only possible with ISOC and didn’t exist before.
ISOC was directly involved in identifying the ransomware in February.” L.A. shares its findings about attacks with the FBI, Homeland Security and the Secret Service.
In all, that sharing reaches up to 2 million cyber professionals, Lee said. “We’re not only trying to up our game around cyber defenses,” Ross said. “We’re in a position now where we’re truly unified with other governments in a cyber watch and cyber defense effort.” Even though there are new flavors of cyber attacks every week, Ross said his biggest worry these days is still ransomware. “Ransomware is just so ubiquitous and the delivery system is so innocuous.
Someone can attack a personal machine or shared drive. With 48,000 city employees we have a lot of ports, so we need to be that much better than the attackers.” To combat ransomware, the agency bangs out the common drumbeat: “If you don’t know where you got a link or an email or a download, don’t click on it,” Ross said. “The average person doesn’t realize they could launch something very powerful by opening that email. Human beings are often the weakest link in the chain.” Ross and Lee said they feel confident about the security behind their internet of things infrastructure, which is protected by frequent password updates and patches on endpoints.
In a recent Distributed Denial of Service attack on DNS provider Dyn that made major websites inaccessible, the Mirai botnet was deployed, perhaps by amateurs, to insecure IoT devices, including consumer devices like internet cameras. “DDoS attacks are certainly a big concern,” Ross said. However, Lee said Los Angeles does deploy vulnerability management software and endpoint protection, including antivirus software — using both behavior-based and signature-based techniques. “At least with a DDoS attack, it takes a [relatively] long time to develop and gives us some time to react,” Lee said.

The city also relies on frequent penetration testing to check for vulnerabilities. “Even though government gets a rap for being old fashioned and paper-driven, certainly large cities like L.A. have been very progressive,” Ross said. “We see how dramatically fast the cyber landscape is changing. We see how cities are stewards of assets that nobody else has. “Government may have been able to get away with slow processes in the past, but the stakes are very high in these areas and, generally speaking, government has come around to taking things seriously,” Ross added.” The cyber security problem is an immense one, but security is like insurance.
If an attack happens, you are a genius for preparing, but if you did nothing, you’d be responsible. We do not have a false sense of security.” This story, "Los Angeles: Warm weather, movie stars -- and 100 million monthly cyber attacks" was originally published by Computerworld.

Physical RAM attack can root Android and possibly other devices

Researchers have devised a new way to compromise Android devices without exploiting any software vulnerabilities and instead taking advantage of a physical design weakness in RAM chips.

The attack technique could also affect other ARM and x86-based devices and computers. The attack stems from the push over the past decade to pack more DRAM (dynamic random-access memory) capacity onto increasingly smaller chips, which can lead to memory cells on adjacent rows leaking electric charges to one another under certain conditions. For example, repeated and rapid accessing of physical memory locations -- an action now dubbed "hammering" -- can cause the bit values from adjacent locations to flip from 0 to 1 or the other way around. While such electrical interference has been known for a while and has been studied by vendors from a reliability standpoint -- because memory corruption can lead to system crashes -- researchers have shown that it can also have serious security implications when triggered in a controlled manner. In March 2015, researchers from Google's Project Zero presented two privilege escalation exploits based on this memory "row hammer" effect on the x86-64 CPU architecture. One of the exploits allowed code to escape the Google Chrome sandbox and be executed directly on the OS and the other gained kernel-level privileges on a Linux machine. Since then, other researchers have further investigated the problem and have shown that it could be exploited from websites through JavaScript or could affect virtualized servers running in cloud environments. However, there have been doubts about whether the technique would also work on the significantly different ARM architecture used in smartphones and other mobile devices. But now, a team of researchers from the VUSec Group at Vrije Universiteit Amsterdam in the Netherlands, the Graz University of Technology in Austria, and the University of California in Santa Barbara has demonstrated not only are Rowhammer attacks possible on ARM, but they're even easier to pull off than on x86. The researchers dubbed their new attack Drammer, which stands for deterministic Rowhammer, and plan to present it Wednesday at the 23rd ACM Conference on Computer and Communications Security in Vienna.

The attack builds upon previous Rowhammer techniques devised and demonstrated in the past. The VUSec researchers have created a malicious Android application that doesn't require any permissions and gains root privileges when it is executed by using undetectable memory bit flipping. The researchers tested 27 Android devices from different manufacturers, 21 using ARMv7 (32-bit) and six using ARMv8 (64-bit) architectures.

They managed to flip bits on 17 of the ARMv7 devices and one of the ARMv8 devices, indicating they are vulnerable to the attack. Furthermore, Drammer can be combined with other Android vulnerabilities such as Stagefright or BAndroid to build remote attacks that don't require users to manually download the malicious app. Google is aware of this type of attack. "After researchers reported this issue to our Vulnerability Rewards Program, we worked closely with them to deeply understand it in order to better secure our users," a Google representative said in an emailed statement. "We’ve developed a mitigation which we will include in our upcoming November security bulletin.” Google's mitigation complicates the attack, but it doesn't fix the underlying problem, according to the VUSec researchers. In fact, fixing what is essentially a hardware issue in software is impossible. Hardware vendors are investigating the problem and may be able to fix it in future memory chips, but chips present in existing devices will likely remain vulnerable. Even worse, it's hard to say which devices are affected because there are many factors that come into play and haven't yet been fully investigated, the researchers said. For example, a memory controller might behave differently when the device battery level is under a certain threshold, so a device that doesn't appear to be vulnerable under a full charge might be vulnerable when its battery is low, the researchers explained. Also, there's an adage in cybersecurity: Attacks always get better, they never get worse. Rowhammer attacks have grown from theoretical to practical but probabilistic and now to practical and deterministic.

This means that a device that does not appear to be affected today could be proven vulnerable to an improved Rowhammer technique tomorrow. Drammer was demonstrated on Android because the researchers wanted to investigate the impact on ARM-based devices, but the underlying technique likely applies to all architectures and operating systems.

The new attack is also a vast improvement over past techniques that required either luck or special features that are present only on certain platforms and easily disabled. Drammer relies on DMA (direct memory access) buffers used by many hardware subsystems, including graphics, network, and sound. While Drammer is implemented using Android's ION memory allocator, APIs and methods to allocate DMA buffers are present in all operating systems, and this warning is one of the paper's major contributions. "For the very first time, we show that we can do targeted, fully reliable and deterministic Rowhammer without any special feature," said Cristiano Giuffrida, one of the VUSec researchers. "The memory massaging part is not even Android specific.
It will work on any Linux platform -- and we suspect also on other operating systems -- because it exploits the inherent properties of the memory management inside the OS kernel." "I expect that we're going to see many other flavors of this attack on different platforms," added Herbert Bos, a professor at Vrije Universiteit Amsterdam and leader of the VUSec Systems Security research group. Along with their paper, the researchers have released an Android app that can test if an Android device is vulnerable to Rowhammer -- at least to the currently known techniques.

The app is not yet available on Google Play but can be downloaded from the VUSec Drammer website to be installed manually.

An open-source Rowhammer simulator that can help other researchers investigate this issue further is also available.