14.1 C
London
Thursday, November 23, 2017
Home Tags Norwegian

Tag: Norwegian

Norwegian project exposes worrying lack of security Tests on smartwatches for children by security firm Mnemonic and the Norwegian Consumer Council have revealed them to be riddled with flaws.…
London, 16 October 2017 - State Secretary for the Ministry of Transport and Communications, Reynir Joacute;hannesson will open Datacloud Nordic in Oslo, Norway.

BroadGroup’s pioneering networking and business deal-making event for the data cente...
Changing temps may have impacted the ability to farm, leading to new economic strategies.
Companies team to build autonomous, zero-emission container "feeder ship."
For gaming, the iPhone sparked a gold rush and burst of creativity still felt today.
Earlier today, our products detected and successfully blocked a large number of ransomware attacks around the world.
In these attacks, data is encrypted with the extension “.WCRYrdquo; added to the filenames. Our analysis indicates the attack, dubbed “WannaCryrdquo;, is initiated through an SMBv2 remote code execution in Microsoft Windows.
Opera Reborn gets new design, VPN, and ad-blocking (except for Google's ads).
Fredrikstad - 9th February 2017. norxe, the Norwegian manufacturer of DLP projectors, will be exhibiting at ISE 2017.This exciting new startup will demonstrate two P1 projectors on a Partner booth in Hall 12, stand N-44.In addition, the company is delighted to announce the appointment of Iain Ambler as Head of Business Development for the UK.
Iain will be attending ISE along with the rest of the norxe team.
Iain‘s appointment is the latest in what... Source: RealWire
Specifically, Overlord is about fighting supernatural Nazi monsters in World War II.
Won't someone think of the children, literally? The Electronic Privacy Information Center (EPIC) and the European Consumer Organization (BEUC) are calling for US and EU data protection authorities to take action against insecure networked toys. Declaring that "My Friend Cayla," a Bluetooth-enabled doll released in 2014, and "i-Que," a connected robot released last year, "fail miserably when it comes to safeguarding basic consumer rights, security, and privacy," the BEUC on Tuesday presented findings about the device's shortcomings, based on an investigation by the Norwegian Consumer Council, a BEUC member. The BEUC argues that the toys violate the EU Unfair Contract Terms Directive and the EU Data Protection Directive. EPIC, also on Tuesday, filed a complaint with the Federal Trade Commission alleging that the toys violate US privacy law. The toys, manufactured by Genesis Toys and supported by speech recognition software from Nuance Communications, are designed to talk to children and to capture their speech, in conjunction with Android or iOS mobile apps. EPIC and BEUC contend the companies use collected data for purposes beyond interaction, specifically hidden marketing.

The BEUC says that the toys spout pre-programmed phrases that endorse commercial products. "For example, Cayla will happily talk about how much she loves different Disney movies, meanwhile, the app-provider also has a commercial relationship with Disney," the BEUC said. The BEUC also objects to the transference of speech data from EU-based children to Nuance, a US-based company. Moreover, it asserts the terms of service presented to customers are illegal because customers must agree that the terms can be changed without notice, that personal data can be used for advertising, and that information may be shared with undisclosed third parties. Finally, BEUC says the toys lack adequate security measures because, without much effort, they can be hijacked using a mobile phone. The EPIC complaint echoes those concerns: "The failure to employ basic security measures to protect children’s private conversations from covert eavesdropping by unauthorized parties and strangers creates a substantial risk of harm because children may be subject to predatory stalking or physical danger." Pen Test Partners, a UK-based security research group, came to the same conclusion last year when it published details about several security problems affecting "My Friend Cayla" and hacked the doll to make it swear. Genesis Toys, incorporated in Hong Kong and based in Los Angeles, was not immediately reachable for comment. A spokesperson for Nuance, in response to a query from The Register, pointed to a post by Richard Mack, VP of corporate marketing. "Nuance takes data privacy seriously," Mack said, omitting the "very" present in variants of the phrase offered by Facebook and Google in the past. Mack says Nuance has not received in inquiry from the FTC or other privacy authority. He stresses that the company's policy is that it doesn't use or sell voice data for marketing purposes and that it doesn't share voice data collected from one customer with another. "Upon learning of the consumer advocacy groups' concerns through media, we validated that we have adhered to our policy with respect to the voice data collected through the toys referred to in the complaint," he said. ® Sponsored: Want to know more about PAM? Visit The Register's hub
Musk's lot better get on this A smartphone app flaw has left Tesla vehicles vulnerable to being tracked, located, unlocked, and stolen. Security experts at Norwegian app security firm Promon were able to take full control of a Tesla vehicle, including finding where the car is parked, opening the door and enabling its keyless driving functionality.

A lack of security in the Tesla smartphone app opened the door to all manner of exploits, as explained in a blog post here.

The cyber-attack unearthed by Promon provides additional functionality to that exposed by Keen Security Labs in a different hack in late September. Tom Lysemose Hansen, founder and CTO at Promon, said: "Keen Security Labs' recent research exploited flaws in the CAN bus systems of Tesla vehicles, enabling them to take control of a limited number of functions of the car. Our test is the first one to use the Tesla app as an entry point, and goes a step further by showing that a compromised app can lead directly to the theft of a car." One way for the hack to work is for cybercriminals to set up a Wi-Fi hotspot, likely close to a public Tesla charging point. When Tesla users log in and visit a page, an advert targeting car owners appears, offering an incentive such as a free meal or coffee. When clicking this link and downloading the accompanying app, hackers can gain access to the user's mobile device, allowing them to attack the Tesla app and obtain usernames and passwords. Youtube Video In an update, Promon outlines the many and varied security shortcomings of Tesla's app. This attack is not Tesla specific, and can in generalised form be used against any app. However, the Tesla app did not offer any kind of resistance which would require time-consuming effort to exploit. One thing that stood out was that the OAuth token is stored in plain text – absolutely no attempts have been made to encrypt it, or otherwise protect it.

Getting access to this one piece of data alone will get you the location of the car, ability to track the car and being able to unlock the car. Driving off with the car requires the username and password in addition, which was very easy to do since the application did not detect that it had been modified to add malware-like behaviour that would send the credentials out of the app to a server. "If Tesla had followed best practice in security (e.g. as recommended by the Open Web Application Security Project), including applying self-protecting capabilities inside the app, it would have required much higher technical skills – and much more effort – to perform such an attack," according to Promon.

The Norwegian app security firm said that it was in "close dialogue with Tesla" in order to address these app security issues. A Tesla spokesperson said "Tesla has never received a report of any car being stolen through a compromised app" and offered the statement below. The report and video do not demonstrate any Tesla-specific vulnerabilities.

This demonstration shows what most people intuitively know – if a phone is hacked, the applications on that phone may no longer be secure.

The researchers showed that known social engineering techniques could be employed to trick people into installing malware on their Android devices, compromising their entire phone and all apps, which also includes their Tesla app.

Tesla recommends users run the latest version of their mobile operating system. John Smith, principal solutions architect at app security firm Veracode, commented: "With Tesla just recently remediating a vulnerability which allowed the car to be exploited remotely, this new security flaw leaves the car vulnerable to theft and highlights the plethora of challenges that car manufacturers now face as they introduce internet-connected services into the car.
Vulnerable software is one of the most significant challenges faced by the automotive industry, with findings from a recent IDC report indicating that there could be a lag of up to three years before car security systems are protected from hackers. "There are over 200 million lines of code in today's connected car, not to mention smartphone apps linked to the car.
So it is essential that car manufacturers put security at the heart of the development strategy, rather than as an afterthought." ® Sponsored: Customer Identity and Access Management
Magnus Carlsen is worried Russia will steal his chess data and hand it to his opponent. The name Magnus Carlsen may not mean anything to you, unless of course you're a chess fan.

The 25-year-old Norwegian is the reigning World Chess Champion, achieve...