STE WILLIAMS

BadNews not so bad, says Google

Free whitepaper – Customer Success Testimonial: Recovery is Everything

Google has broken its six-week silence on the BadNews malware, telling a US security conference that while it was justified in removing infected apps from Google Play, it had no evidence that BadNews was playing a part in the distribution of SMS-borne frauds.

Announcing its discovery of the malware, security company Lookout claimed BadNews started by behaving as a legitimate advertising network, but later would push the AlphaSMS SMS fraud malware to infected devices.


The Security Ledger is now reporting that Google Android security engineer Adrian Ludwig has cast doubt on that claim, speaking to an FTC event in Washington DC.

“We have observed the app and we’ve reviewed all the logs we have access to,” TSL quotes Ludwig as saying, and “we haven’t seen a single instance of abusive SMS applications being downloaded as a result of BadNews.”

Ludwig agreed with Lookout that the 32 BadNews-carrying apps found on Google Play had downloads in the “low millions”, adding that Google had removed the apps because they violated the Android developer agreement.

Take-downs, he added, can happen for reasons other than the inclusion of malware: “removal doesn’t necessarily mean [an] application is bad … we rarely confirm the reasons.”

The Register has asked Lookout Mobile Security to respond to Ludwig’s comments. We would also note that it’s feasible that zero logs of AlphaSMS downloads could indicate that users are simply ignoring messages inviting them to click on a link in an SMS. ®

Free whitepaper – Steps to Take Before Choosing a Business Continuity Partner

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/06/11/badnews_not_so_bad_says_google/

BIND 9 patched against remote crash vuln

Free whitepaper – Customer Success Testimonial: Recovery is Everything

Time to get patching, sys admins: ISC (the Internet Systems Consortium) has issued a fix for a BIND 9 denial of service vulnerability.

The defect and patch, published last week, “allows an attacker to crash a BIND 9 recursive resolver with a RUNTIME_CHECK error in resolver.c”, the ISC says in its announcement.


CVE-2013-3919 says BIND 9.6-ESV-R9, 9.8.5 and 9.9.3 are affected by the bug. While older versions aren’t affected, ISC notes that they’re also unsupported and could be carrying other unpatched vulnerabilities.

“At the time of this advisory no intentional exploitation of this bug has been observed in the wild. However, the existence of the issue has been disclosed on an open mailing list with enough accompanying detail to reverse engineer an attack and ISC is therefore treating this as a Type II (publicly disclosed) vulnerability, in accordance with our Phased Disclosure Process”, the ISC announcement says.

The ISC notes that while it hasn’t observed any exploits in the wild, it has been discussed on mailing lists “with enough accompanying detail to reverse engineer an attack.”

Upgraded versions can be downloaded here. ®

Free whitepaper – Steps to Take Before Choosing a Business Continuity Partner

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/06/11/bind_9_patched_against_remote_crash_vuln/

Microsoft borks botnet takedown in Citadel snafu

Free whitepaper – Cloud storage: Lower cost and increase uptime

Security researchers are complaining about collateral damage from the latest botnet take-down efforts by Microsoft and its partners.

The Windows 8 giant worked with financial service organisations, other technology firms and the Federal Bureau of Investigation to disrupt more than a thousand botnets.


The botnets in question were using Citadel malware to run cybercrime scams blamed for more than $500m in fraud. The action, authorised by a federal court ruling and carried out last week, involved raids at server-hosting facilities in the US to seize evidence related to the malware.

The takedown – codenamed Operation b54 – is the latest in an ongoing campaign against various zombie networks spearheaded by Microsoft.

In a blog post, Microsoft described its seventh zombie network takedown as its “most aggressive botnet operation to date”.

However, this time round Redmond appears to have stepped on the toes of security researchers, killing off honeypot systems monitoring the activities of cybercrooks as well as decapitating systems linked to ongoing fraud.

Microsoft seized more than 4,000 domain names and pointed them to a server operated by them, a technique known as “sinkholing”. The technique isn’t new and has been previously applied in attempts to seize control of the infamous Conficker botnet, for example.

Redmond and its partners allegedly erred by seizing more than 300 Citadel domains that were sinkholed by abuse.ch (home of the Swiss Security Blog), as well as many hundreds of similar domains controlled by other security researchers, critics complain.

“Microsoft seized not only malicious domain names operated by cybercriminals to control computers infected with Citadel, but also Citadel botnet domain names that had already been sinkholed by abuse.ch awhile ago,” a researcher at abuse.ch complains.

Security bods suffer deja-vu

Something similar happened with a ZeuS takedown operation by Microsoft last year, when thousands of ZeuS botnet domains were seized, including several hundred domain names that were already sinkholed by abuse.ch. Previously Redmond had the reasonable excuse that there was no easy way to distinguish between domains run by crooks and domains run by security researchers.

However, the latest action comes after abuse.ch set up a (non-public) Sinkhole Registry for law enforcement and security organisations to avoid similar mixups.

“I had hoped that Microsoft had learned their lesson, but apparently nothing has changed and my efforts didn’t change anything,” the unnamed researcher at abuse.ch laments.

“Since Citadel domain names previously sinkholed by abuse.ch have been grabbed by Microsoft, Shadowserver will not be able to report the IP addresses of infected clients calling home to these domains to the network owners any more,” he added.

The issue is not limited to abuse.ch, as several other sinkhole operators have also been hit: “Calculating the numbers together, I can say that nearly 1,000 domain names out of the 4,000 domain names seized by Microsoft had already been sinkholed by security researchers. In fact these 1k domain names did no longer present a threat to internet users [sic], but were actually used to help to make the internet a better place.”

Microsoft is sending out valid Citadel configuration files to the connecting bots. This configuration file causes the block on accessing anti-virus vendors’ websites to be removed from infected machines, as well as getting the fall-back (backup) CC domains to be overwritten by servers operated by Microsoft (microsoftinternetsafety.net).

Although well-intentioned, sending out valid configuration files changes the settings of a computer without the consent or knowledge of the user; a potentially illegal move in many jurisdictions, according to the unimpressed security researcher at abuse.ch, who warns that crooks are inevitably going to attempt to try to seize back control of the botnet.

Other security researchers backed up the criticisms.

The Citadel malware targeted via the takedown had been used to build more than 1,400 botnets affecting more than five million people in 90 countries, according to figures from email security firm Agari, which worked with Microsoft and other on the operation.

Once infected, the victim’s keystrokes were monitored and recorded, allowing crooks to siphon off banking login credentials and other personal information for subsequent fraud. As part of the FBI operation, communication has been cut off between 1,462 Citadel botnets and the millions of infected computers under their control.

Unplugging botnet command and control servers renders a zombie network inert, but does nothing to clean-up infected hosts, which remain contaminated with malware. Microsoft plans to use intelligence gained in Operation b54 to work with ISPs and Computer Emergency Response Teams (CERTs) around the world to quickly and efficiently clean as many computers as possible. ®

Bootnote

Abuse.ch was set up by Swiss security researcher Roman Hüssy, and played a key role in setting up sites to track the activities of malicious activity associated with the ZeuS and SpyEye families of banking Trojans. The Shadowserver Foundation is a collaborative net security effort that tracks and reports on malware, botnet activity and cybercrime. The volunteer-staffed foundation takes data supplied by abuse.ch and many others.

Free whitepaper – Magic Quadrant for Enterprise Backup/Recovery

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/06/10/citadel_botnet_takedown_own_goal_by_microsoft/

NSA PRISM-gate: Relax, GCHQ spooks ‘keep us safe’, says Cameron

Free whitepaper – What you need to know about cloud backup

British intelligence agencies have broken no laws and are subject to “proper” parliamentary scrutiny, Prime Minister David Cameron insisted today as the NSA PRISM scandal reached Blighty.

He was forced to defend Brit spooks following allegations that UK eavesdropping nerve-centre GCHQ had access to the Americans’ controversial PRISM project, which gathers emails, chat logs and other private information about folks from internet giants. It is alleged such access allowed GCHQ to circumvent the law and the need to obtain a court order when snooping on people.


The claims, which are yet to be flat-out denied by Whitehall, were made late last week by ex-CIA techie Edward Snowden.

The allegations led to the chairman of Parliament’s Intelligence and Security Committee, Malcolm Rifkind, hastily announcing before the weekend that his panel of MPs expect a full report from GCHQ about PRISM imminently.

He said that the committee would “decide what further action needs to be taken as soon as it receives that information”.

At lunchtime today, meanwhile, the PM insisted that UK spooks “operate within the law”. His defensive remarks came after a difficult weekend for the US government as it attempted to shrug off Snowden’s leak by downplaying PRISM’s significance: officials said there were inaccuracies in news reports about the programme and that the project was being used to target foreigners rather than American citizens.

President Barack Obama – who appeared to have widened the scope of internet surveillance after PRISM was brought in by his predecessor George W Bush in 2007 – characterised the web-snooping programme as a “modest encroachment” on individuals’ privacy.

Cameron declined today to comment on what he knew about PRISM, prior to Snowden’s leak.

“Let us be clear. We cannot give a running commentary on the intelligence services,” the prime minister said. “I am satisfied that the intelligence services, who do a fantastically important job to keep us safe, operate within the law and within a legal framework and they also operate within a proper framework of scrutiny by the intelligence and security committee.”

He added: “We do live in a dangerous world and live in a world of terror and terrorism. I do think it is right we have well-funded and well-organised intelligence services to keep us safe.”

Home Secretary Theresa May, who has fought to secure more internet snooping powers for Britain’s security services with her failed Communications Data Bill, told MPs this afternoon that “at all times GCHQ has operated within a fully legal framework”, but added that she welcomed the intelligence committee’s urgent probing of PRISM.

Committee chairman Rifkind told BBC’s Radio 4 that the current law about intercepting communications was “quite clear”.

“If the British intelligence agencies are seeking to know the content of emails about people living in the United Kingdom, then they have to get authority. That means ministerial authority,” he said.

UK Foreign Secretary William Hague said on Sunday that law-abiding Brits had “nothing to fear”.

And he told the House of Commons that “the [British] government deplores the leaking of any classified information wherever it occurs” and added that “to intercept content of any individual’s communications in the UK requires a warrant signed by me or the Home Secretary”.

He further insisted “any data obtained by us from the US involving UK nationals is subject to proper UK statutory controls and safeguards”, adding that accusations of GCHQ circumventing UK law by using the PRISM spy programme were “baseless”. ®

Free whitepaper – Cloud based data management

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/06/10/david_cameron_defends_uk_spooks_as_prism_fallout_continues/

Hacker who helped find Steubenville rapists threatened with decade in prison

Free whitepaper – What you need to know about cloud backup

A security consultant who helped uncover evidence of the repeated rape of an Ohio teenager has been raided by the FBI and charged with offenses that could see him spend 10 years in prison.

Last year, a 16 year-old girl from Steubenville, Ohio was repeatedly assaulted by members of the local football team, dubbed Big Red, after she passed out drunk at a party. Despite photos on Twitter of the unconscious girl being carried from house, to house the local police decided there was not enough evidence to investigate the popular sports team’s members.

After crime blogger and one-time Steubenville resident Alexandria Goddard started writing about the case, a group of hackers operating under the Anonymous brand decided to get busy and soon found plenty of evidence, including a sickening 12-minute video of one team member joking about having witnessed the attack. The hackers gained control of the Big Red fan site and posted the information there.

The case and subsequent hacking caught the national news media’s attention and the local police decided that they did have enough evidence to investigate after all. In March, two teenagers, Trent Mays and Ma’lik Richmond, were convicted of sexual assault and distributing naked images of a minor and sentenced to a minimum of a year in juvenile detention, or a maximum of four years.

Barely a month later, a dozen armed FBI agents raided the home of one of those suspected of the hacking that uncovered evidence of the rape, Kentucky IT security consultant Deric Lostutter – also known as KYAnonymous. Lostutter, his brother, and his sibling’s girlfriend were all arrested, computers in the house were confiscated, and the trio was warned not to discuss the case or face charges of “tampering with evidence.”

Ohio rape

Doing this gets you a year, uncovering it gets you 10 years

“They want to make an example of me, saying, ‘You don’t fucking come after us. Don’t question us,'” he told Mother Jones.

Lostutter does admit that he helped organize a protest meeting in the town about the lack of police action and appeared on CNN wearing a Guy Fawkes mask to talk about the case. But he denies any hacking charges, saying that someone else has already admitted hijacking the football team’s fan site.

That hacker, who operates under the name Batcat, told the local Ohio Herald-Star newspaper in February that he had got into the account by the simplest of means, namely guessing that the answer to the password reset question of the person who owned the fan site would be “Big Red.”

Batcat remains at large, but Lostutter now faces computer crime charges that could see him spending ten years in a federal prison, as well as suffering ongoing disruption to his day-to-day consultancy business and facing potentially huge legal fees. A donation site has already raised over $30,000 for his defense.

“I was always raised to stick up for people who are getting bullied,” Lostutter said. “I’d do it again.”

While El Reg doesn’t condone criminal hacking or cracking, it does seem somewhat ridiculous that a person can face such a light sentence for sexual assault (the victim’s attackers are due to be moved to a no-bars rehabilitation center next week) while someone who may have helped expose the crime faces ten years hard time. ®

Free whitepaper – Cloud storage: Lower cost and increase uptime

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/06/10/steubenville_rape_hackerfaces_decade_in_prison/

Ex-CIA techie Edward Snowden: I am the NSA PRISM deepthroat

Free whitepaper – SaaS data loss: The problem you didn’t know you had

A former CIA technician has broken cover to reveal himself as the mole who leaked information about PRISM – the US government’s massive web surveillance programme.

Edward Snowden, 29, outed himself as the source of revelations that the National Security Agency (NSA) has tapped up American internet giants for data on foreigners’ online activities. He made the claims during interviews with the Guardian.


Snowden told the newspaper: “The NSA has built an infrastructure that allows it to intercept almost everything. With this capability, the vast majority of human communications are automatically ingested without targeting. If I wanted to see your emails or your wife’s phone, all I have to do is use intercepts. I can get your emails, passwords, phone records, credit cards.

“I don’t want to live in a society that does these sort of things … I do not want to live in a world where everything I do and say is recorded. That is not something I am willing to support or live under.”

The US Foreign Intelligence Surveillance Act forces internet giants, such as Google and Facebook, to share their users’ data with government agents and forbids those companies from talking about it. Both aforementioned cloud-powered companies denied over the weekend that they allow US spooks direct access to their systems. It was further alleged over the weekend that the NSA PRISM project shared some of its gathered data with Britain’s eavesdropping nerve centre, GCHQ, although the British government denies any suggestion that data was obtained unlawfully.

Snowden maintained network security for the CIA and, until he leaked files detailing the NSA programme, was employed by “strategy and technology consulting” firm Booz Allen Hamilton, which is understood to serve as a contractor for the US National Security Agency (NSA). Snowden is now on the run and hiding out at a hotel in Hong Kong, where he hopes to apply for asylum in Iceland in a bid to avoid the wrath of the American government.

“I don’t want public attention because I don’t want the story to be about me. I want it to be about what the US government is doing,” he said.

“I really want the focus to be on these documents and the debate which I hope this will trigger among citizens around the globe about what kind of world we want to live in.”

He added: “My sole motive is to inform the public as to that which is done in their name and that which is done against them.”

He now fears for his life, warning: “If they want to get you, over time they will.”

The extent of the NSA’s surveillance was revealed last Wednesday, when it emerged that a secret US court issued an order requiring mobile network Verizon to hand over metadata on millions of US citizens’ phone calls, although no actual phone recordings were obtained.

This was followed by the exposure of PRISM, a scheme which allowed spies to request access to information on non-Americans from the servers of nine of the world’s biggest internet companies.

Although the companies named in the leaked documents, including Microsoft, Facebook and Google, deny giving NSA agents automatic access to their data, the Guardian reported that PRISM allows spies to intercept email and instant messaging conversations, tap audio and video on Skype calls, and to snoop on various other forms of web-based communication. Such surveillance is entirely possible, with or without the internet giants’ help, at the network level by tapping into the US’s internet backbone.

Booz Allen Hamilton, issued the following statement:

Booz Allen can confirm that Edward Snowden, 29, has been an employee of our firm for less than 3 months, assigned to a team in Hawaii. News reports that this individual has claimed to have leaked classified information are shocking, and if accurate, this action represents a grave violation of the code of conduct and core values of our firm. We will work closely with our clients and authorities in their investigation of this matter.

James Clapper, the US director of national intelligence, said the leaks were “literally gut-wrenching”. He added: “I hope we’re able to track down whoever’s doing this, because it is extremely damaging to, and it affects the safety and security of this country.”

It certainly does “affect people’s safety and security”, but perhaps not in the way Clapper wants that phrase to be understood. ®

Free whitepaper – Cloud based data management

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/06/10/prism_source_named_as_techie_edward_snowden/

CIA-funded upstart: THE TRUTH about Prism and NSA’s web snooping

Free whitepaper – SaaS data loss: The problem you didn’t know you had

Palantir Technologies has denied its Prism software is related to the NSA’s controversial and massive PRISM web surveillance system.

The Big Data startup, backed in its early stages by the the CIA’s In-Q-Tel venture capital arm, has insisted that its data-mining Prism software in question is for banks, not governments. Palantir’s legal counsel, Matt Long, supplied Forbes with a more detailed denial along the same lines.


Meanwhile, PRISM is America’s computer system for snooping on foreigners’ online activities by tapping internet giants for their records, as revealed last week.

“Palantir’s Prism platform is completely unrelated to any US government program of the same name. Prism is Palantir’s name for a data integration technology used in the Palantir Metropolis platform (formerly branded as Palantir Finance). This software has been licensed to banks and hedge funds for quantitative analysis and research,” Long said.

An overview of Plantir’s Prism software by the company itself provides graphs and examples illustrating its financial analysis applications without, perhaps, excluding other potential applications of the tool.

Y Combinator partner Garry Tan backed up Palantir’s denial of spooky iterations of Prism in a Twitter update:

Palantir’s data analysis platform technology grew from software originally developed at PayPal in order to detect fraudulent activity. The security upstart is nonetheless known for its governmental and national security work. This, and the naming coincidence, inevitably led to early speculation by Business Insider and others, since denied.

The NSA’s PRISM system allows the Feds to tap “directly into the central servers” of the nine largest internet companies to extract audio, photographs, emails, documents, and connection logs to allow intelligence analysts to track foreign targets, the Washington Post reported on Thursday. Blighty’s GCHQ may also have had access to this system, The Guardian added on Friday.

US director of national intelligence James R. Clapper has confirmed the existence of PRISM, while decrying unspecified inaccuracies in media reports.

The tech firms whose data is harvested by PRISM – Google (Gmail, YouTube, etc), Facebook, Microsoft (Hotmail, Skype, etc.), Apple, Yahoo, PalTalk and AOL – have denied providing government with direct access to their servers or a backdoor.

It may be that the original direct access claims, which came from a leaked PowerPoint deck, are technically inaccurate and PRISM actually involves direct access to a Dropbox-like system (potentially hosted by Amazon) which fulfils wiretapping requests made by spooks under the US Foreign Intelligence Surveillance Act (FISA).

We don’t know how much data is sucked into these systems, how long it is retained, or how many people are affected but earlier revelations about a secret court order to harvest call data (but not content) of all Verizon customers suggest a possible obtain everything, analyse later approach. On the other hand a leaked budget of $20 million a year points to a much more modest system, or an incredible elegant and efficient Panopticon.

All this leaves how PRISM works and its architecture as open questions.

Alex Stamos, CTO of Artemis Internet, has put together a taxonomy of PRISM possibilities here. Meanwhile, Robert Graham of Errata Security has put together more ideas on what PRISM might mean, based in part on his own experience with the old Carnivore email surveillance system, on the Errata Security blog. ®

Bootnote

Palantir and HBGary Federal worked together to develop a strategy for Bank of America to deal with the threatened exposure of secret documents from the bank. HBGary Federal proposed a smear campaign against journalist Glenn Greenwald as part of these proposals, a move Palantir repudiated and said was solely HBGary’s idea. They severed their links with HBGary Federal in February 2011, soon after the infamous LulzSec pwnage of HBGary Federal and its chief exec, Aaron Barr.

Two years later Greenwald worked together with a source, revealed over the weekend as NSA contractor Edward Snowden, to expose secret information about PRISM and secret a court order requiring Verizon to supply call log data on all of its customers on a daily basis.

Free whitepaper – Cloud based data management

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/06/10/palantir_denies_powering_prism_spy_system/

US chief spook: Look, we only want to spy on 6.66 BEELLLION of you

Free whitepaper – Cloud based data management

US spy-boss James Clapper has once again emerged from the shadows to insist that America’s clandestine web surveillance programme is lawful and only targets foreigners.

On Friday, director of national intelligence James Clapper said the NSA’s PRISM project, which taps up internet giants for private emails, chat logs and other data on their users, was misunderstood and needed to fight terrorism. The following day he said those who had leaked details of PRISM that week were “reckless”.


And in an attempt to quell public anger over allegations that the government had deep access to servers operated by nine of the internet’s biggest companies, Clapper ordered the release of a dossier entitled: “Facts on the collection of intelligence pursuant to section 702 of the Foreign Intelligence Surveillance Act.”

Although it omitted some classified information for fear of giving enemies a “playbook” on how American spies carry out operations, it provides a detailed rebuttal of claims that intelligence agencies have a backdoor into firms such as Google, Facebook and Microsoft, a move that would allow them to spy on American citizens.

Spooks were alleged to have access to pictures, videos, instant chat messages and emails, enabling them to pry deep into the lives of ordinary people as well as terrorist suspects.

But the dossier, released by the Director of National Intelligence’s office, claimed: “PRISM is not an undisclosed collection or data mining programme. It is an internal government computer system used to facilitate the government’s statutorily authorized collection of foreign intelligence information from electronic communication service providers under court supervision, as authorised by Section 702 of the Foreign Intelligence Surveillance Act.”

According to the director, the US government cannot use PRISM to harvest data on American citizens (of which there are 313 million), only on foreign “targets” located outside the US (of which there are 6.6 billion).

Rather than leaving their backdoors open for spies to walk in whenever they want, internet companies only give spies access to their data when “lawfully required to do so”, according to the director’s denials.

The director also insisted that any use of Prism or similar methods is reviewed and overseen by the “executive, legislative and judicial” branches of government. The Congress reauthorised the use of Section 702 in December 2012 and there are regular inspections of the use of Prism by people at the very top of the government.

In a canned statement, Clapper said: “The surveillance activities published in The Guardian and The Washington Post are lawful and conducted under authorities widely known and discussed, and fully debated and authorized by Congress. Their purpose is to obtain foreign intelligence information, including information necessary to thwart terrorist and cyber attacks against the United States and its allies.

“Our ability to discuss these activities is limited by our need to protect intelligence sources and methods. Disclosing information about the specific methods the government uses to collect communications can obviously give our enemies a “playbook” of how to avoid detection. Nonetheless, Section 702 has proven vital to keeping the nation and our allies safe. It continues to be one of our most important tools for the protection of the nation’s security.” ®

Free whitepaper – Magic Quadrant for Enterprise Backup/Recovery

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/06/10/chief_spy_america_relax/

New Android plan: Gurn at your phone to unlock it

Free whitepaper – What you need to know about cloud backup

Google has filed a patent for a new method for controlling computers and other devices by pulling funny faces.

In the future, Chocolate Factory fans might be able to unlock their gizmos by sticking out their tongue, rather than by having to remember passwords, according to a new patent.


Android users can currently use a system called Face Unlock to access their phones, but the new tech purports to be more reliable because it can’t be fooled by photographs. Google introduced a system called “liveness” last year which requires users to flutter their eyelashes to prove they are alive and not just a photo, but researchers managed to fool it using image editing software to create a photo that appears to show the subject blinking. All a hacker would need to do is show the original photograph followed by the edited one.

The new patent includes aspects of this research, but goes further by introducing a range of gestures, including smiling with the mouth open, frowning and wrinkling the forehead or nose. It also recognises when a person does a “tongue protrusion”.

The system would be more effective, because it could ask for any of the gestures, raising the prospect that anyone looking to send a text on their mobe would have to spend goodness-knows how long pulling silly faces in public before being allowed to send it.

Like the current Liveness tech, Google’s new facial recognition software would take two photographs of an individual and then compare them using details on “facial landmarks” from each snap. These images could then be analysed to make sure that the person in front of the camera had pulled the correct expression.

Other “anti-spoofing” systems introduced in the patent could send light beams towards the subject, which are then detected when they reflect off the cornea. The exact colour of the light could be different each time, ensuring that access is not granted to someone waving a photo around.

However, facial recognition software is not an entirely reliable way of securing your telephone or computer just yet.

“The problem with biometrics in the past has been that you have always been able to find a way to work round the requests to deliver what’s needed,” Prof Alan Woodward, chief technology officer at the consultancy Charteris, said in an interview.

“It sounds like Google is thinking about how try and counter this with randomness and movement.

“But there’s a long way between writing a patent about an idea and delivering it as a reliable security measure. I would expect people will still use traditional passwords for some time to come.”

A Google spokeperson said that some ideas “later mature into real products or services, some don’t”.

“Prospective product announcements should not necessarily be inferred from our patent applications,” he added.

It wasn’t clear how the system might work on one well-known Android platform, the wearable computer Google Glass. ®

Free whitepaper – Cloud storage: Lower cost and increase uptime

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/06/10/forgotten_your_password_just_get_gurning_says_google/

Telefonica’s new offering: We will penetrate you by surprise, every day

Free whitepaper – What you need to know about cloud backup

Mobile network giant Telefonica has launched new business unit Eleven Paths, which promises unprovoked attacks on customers every day, in the interests of greater security.

Eleven Paths will be semi-autonomous within Telefonica, and will provide ongoing penetration testing to subscribing customers (think businesses, not mobile phone owners) – using the latest tools and vulnerabilities to attack their networks, just as the hackers do, then telling them how it was done.


The unit comes out of Telefonica Digital, the arm of the telecommunications giant charged with finding a sustainable business model beyond phone calls. It’s supposed to be new, but is really comprised of an established business acquired by Telefonica, Informatica 64.

Informatica 64 created the (free) FOCA toolkit, an open source tool used to analyse documents hosted on a web site in order to chart the network architecture hidden behind the corporate firewall.

Metadata in Office documents can map network shares and printer names, EXIF data can reveal paths and patterns, all of which is invaluable to the external attacker.

Informatica 64 also sells “MetaShield”, an application for stripping such data before the files leave the safety of the office, for companies concerned about the existence of FOCA.

But now they’re with Telefonica the 25 Informatica staff will be known as Eleven Paths, and focused on a subscription-based approach to security. Just as Inspector Clouseau was kept vigilant by his servant Cato’s daily attacks so Eleven Paths – like any decent penetration-testing outfit – will keep companies alert.

That’s for the moment, but Eleven Paths has mobile security in its sights too. CEO Chema Alonso refused to say much about those plans, only that the mobile security market was underserved and that Eleven Paths would seek to address that too. ®

Free whitepaper – Cloud storage: Lower cost and increase uptime

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/06/10/telefonica_offers_to_penetrate_you_daily/