Microsoft unveils ‘Minecraft’ edition Xbox One S

How devoted are you to Minecraft? Devoted enough that you want your console to be a living, breathing representation of the construction game? If so, you’re in luck. Microsoft has unveiled a limited edition Minecraft Xbox One S that drapes the entire console in Mojang’s blocky art style. There’s a grass block on the front, a transparent, redstone-laced bottom and a Creeper-themed green controller (there’s an optional pink, pig-themed gamepad). Naturally, it’ll include a copy of Minecraft (with the Better Together update).

The system arrives on October 3rd. Microsoft hasn’t detailed pricing or regional availability as we write this, but it’ll ship with a 1TB hard drive. We wouldn’t expect it to carry a significant premium over a plain Xbox One S with a bundled game, but don’t be surprised if this becomes the system to get among Minecraft players… well, those who don’t want to play in 4K, at least.

Source: Xbox Wire

Read the Full Article here: >Engadget

Sebi to chart out long term cyber security plans for markets

Sebi will deliberate with its board members next month on putting in place a long term cyber security framework for markets amid concerns over malicious software script targeting systems and possible data breaches. With technology-based platforms and high speed algorithmic systems becoming key fulcrums for trading activities, the regulatory focus is on bolstering the existing framework and ensure a robust firewall is in place to thwart possible cyber attacks.

Read the Full Article here: >Computer Security News

Hacking smartphones with malicious replacement parts

Smartphone users can now add a new entry to the list of things they need to worry about: their phones being compromised via replacement parts.

A group of researchers from Ben-Gurion University of the Negev has demonstrated that hardware replacements – e.g. touchscreens, NFC readers, wireless charging controllers, and so on – can be equipped with a chip that is capable of manipulating the device’s communication.

smartphones malicious replacement parts

And even though they haven’t gone through the trouble of doing so, they say that the whole setup can easily be made to be small enough to fit into the device, making it practically impossible for the user to discover that something is amiss.

In fact, even the person that repairs the device could be in the dark about the modification, as the replacement parts are often produced by third-party manufacturers, and are not usually checked for tampering before being installed.

Successful attacks

“Hardware replacement is traditionally considered a strong attack model, under which almost any attack is possible,” the researchers noted. But their research focused on the feasibility of attacks that depend on only one “malicious” component with an extremely limited hardware interface.

They tested three different attacks, using an experimental setup based on a low-cost micro-controller embedded in-line with the touch controller communication bus.

In the first one, they managed to impersonate the user by injecting touch events into the communication bus. This allows the installation of software, the modification of the device configuration, etc.

VIDEO

In the second one, they demonstrated that an attacker can log touch events related to sensitive operations (lock screen patterns, credentials, passwords).

In the third one, they proved that by sending crafted data to the phone over the touch controller in- terface, an attacker can exploit vulnerabilities within the device driver and gain kernel execution capabilities.

smartphones malicious replacement parts

They tested the attacks on a Huawei Nexus 6P smartphone and a LG G Pad 7.0 tablet (both running Android), but it’s likely that they would also work against devices running iOS.

Possible protection

The researchers believe that threat of a malicious peripheral existing inside consumer electronics should not be taken lightly.

“A well motivated adversary may be fully capable of mounting such attacks in a large scale or against specific targets. System designers should consider replacement components to be outside the phone’s trust boundary, and design their defenses accordingly.”

In this particular case (they tested the attacks by using a malicious replacement screen), a good way to prevent compromises would be a I2C interface proxy firewall – a low-cost, hardware-based solution.

“Such a firewall can monitor the communication of the I2C interfaces and protect the device from attacks originating from the malicious screen. Placing this device on the motherboard means that it will not be affected by malicious component replacement. The use of a hardware countermeasure allows for protection against both added malicious components and modified firmware attacks. It may also detect malicious behavior of firmware code that was modified by an insider and may be officially signed or encrypted,” they pointed out.

The final reason why it would be the perfect solution is that it does not require any changes on the CPU or component side.

Read the Full Article here: >Help Net Security – News

FBI reportedly advising companies to ditch Kaspersky apps

Kaspersky Lab’s tussle with the US government could have ramifications for its dealings with the private sector. A new report claims the FBI has been meeting with companies to warn them of the threat posed by the cybersecurity firm. The briefings are the latest chapter in an ongoing saga concerning the use of Kaspersky’s products by government agencies. Officials claim the company is a Russian stooge that can’t be trusted with protecting America’s critical infrastructure. The company denies these claims — its CEO Eugene Kaspersky has even offered up its source code in a bid to clear his firm’s name.

It appears that olive branch went unnoticed. Throughout the year, the FBI has been meeting with US firms to convince them to remove Kaspersky Lab’s tools from their systems, according to officials that spoke to CyberScoop. In view of the cyberattacks that crippled Ukraine’s power grid in 2016, the FBI has reportedly focussed its briefings on companies in the energy sector. Although, it has also supposedly met with major tech firms too.

The law enforcement agency has apparently been sharing its threat assessment with the companies, including Kaspersky Lab’s alleged deep ties with Russian intelligence. However, the meetings have reportedly yielded mixed results. Whereas firms in the energy sector have been quick to cooperate, tech giants have resisted taking swift action, claims CyberScoop.

The revelations follow a wave of allegations against Kaspersky Lab by the US government. As recently as June, a draft version of a Senate bill proposed barring the Defense Department from doing business with the company. Then, in July, a Congressional panel ordered multiple government agencies to hand over their documents and communications about the cybersecurity software provider.

In a statement released last month, the firm said: "Kaspersky Lab, and its executives, do not have inappropriate ties with any government." It’s a stance the company has reiterated multiple times to no avail.

Source: CyberScoop

Read the Full Article here: >Engadget

Taking aim at China, India tightens power grid, telecom rules

NEW DELHI: India is tightening the rules for businesses entering its power transmission sector and making stringent checks on both power and telecoms equipment for malware – moves that government and industry officials say aim to check China’s advance into sensitive sectors. Chinese firms such as Harbin Electric, Dongfang Electronics, Shanghai Electric and Sifang Automation either supply equipment or manage power distribution networks in 18 cities in India.

Read the Full Article here: >Computer Security News

World’s biggest shipper: cyberattack cost up to $300 million

The June cyberattack that paralyzed the computer systems in companies around the world is estimated to have cost the world’s biggest container shipping line between $200 million and $300 million, A.P. Moller-Maersk said Wednesday. The Copenhagen-based group, which was particularly severely affected by the attack, says the impact will first be reflected in its third quarter results as revenue was mainly lost in July.

Read the Full Article here: >Computer Security News

Unpatchable Flaw in Modern Cars Allows Hackers to Disable Safety Features

Today, many automobiles companies are offering vehicles that run on the mostly drive-by-wire system, which means a majority of car’s functions—from instrument cluster to steering, brakes, and accelerator—are electronically controlled.

No doubt these auto-control systems make your driving experience much better, but at the same time, they also increase the risk of getting hacked.

Car Hacking is a hot topic, though it is not new for security researchers who hack cars. A few of them have already demonstrated how to hijack a car remotely, how to disable car’s crucial functions like airbags, and even how to remotely steal cars.

Now, security researchers have discovered a new hacking trick that can allow attackers to disable airbags and other safety systems of the connected cars, affecting a large number of vendors and vehicle models.

A team of researchers from Trend Micro’s Forward-looking Threat Research (FTR) team, in collaboration with Politecnico di Milano and Linklayer Labs, discovered a critical security vulnerability in the CAN (controller area network) protocol that car components use to communicate to one another within the car’s network.

Hackers Can Remotely Take Control of Smart Cars

Initially developed in 1983 and put into production in 1989, the CAN standard manages the majority of the electrical subsystems and control units found in a significant number of modern smart cars.

If exploited, the vulnerability could eventually allow attackers to turn off crucial safety functions of a vehicle, such as airbags, power-steering, parking sensors, and the anti-lock brakes—or almost any computerised component that’s connected to the car’s CAN bus.

Since the CAN standard is being used in “practically every light-duty vehicle currently in circulation today,” the fundamental security flaw affects all modern, internet-connected vehicles, rather than just a particular vendor.

How Your Smart Car Can Get Hacked?

The hack particularly targets the messaging system in CAN, in which messages, including errors, are called “frames.”

“Our attack focuses on how CAN handles errors. Errors arise when a device reads values that do not correspond to the original expected value on a frame,” Trend Micro researcher Federico Maggi writes in a blog post.

“When a device detects such an event, it writes an error message onto the CAN bus in order to “recall” the errant frame and notify the other devices to entirely ignore the recalled frame.”

By overloading the system with error messages, attackers can make a device to go into a Bus Off state, cutting it off from the greater CAN system and making it inoperable.

This, in turn, allows attackers to deactivate essential systems like the airbag system or the anti-lock braking system, which could result in dangerous and even fatal situations.

The attack requires a “

specially-crafted attack device

” to be introduced via local access, which is only possible if the attacker has access to your vehicle.

However, researchers believe that current transportation trends like ride-sharing, carpooling, and car renting have made the scenario much easier.

It’s a Design Flaw — Can’t Be Patched!

Since the vulnerability exists in the design of the CAN bus messaging protocol used in CAN controller chips, the issue can not be directly patched with an OTA (on-the-air) upgrade or dealer recall.

Patching this design flaw requires changes in the CAN standards and an entire generation of vehicles using this specification. So, unfortunately, there is no remedy to the problem yet.

However, the researchers recommended car manufacturers to adopt some network countermeasures, which would mitigate such attacks, but not entirely.


“Car manufacturers can only mitigate the attack we demonstrated by adopting specific network countermeasures, but cannot eliminate it entirely,” the researchers said.


“To eliminate the risk entirely, an updated CAN standard should be proposed, adopted, and implemented. This whole process would likely require another generation of vehicles.”

Researchers also suggest car makers even to consider adding a layer of encryption to the CAN bus protocol that will make messages harder to mimic, as part of a long-term security solution.

Read the Full Article here: >The Hacker News [ THN ]

FrontRow is the latest wearable livestreaming camera

The latest wearable camera to hit the market comes from mesh WiFi product maker Ubiquiti Networks. The FrontRow camera is a small device that can be worn on a lanyard around the neck or clipped on and it can snap photographs and livestream video.

FrontRow has a touchscreen display and because it’s Android based, it can run a number of apps, including native ones like a compass or third-party apps like Spotify. On standby mode, the device can last for 50 hours and it can record or livestream for around two hours before needing to recharge. FrontRow also has a story mode that snaps pictures every few seconds and compiles them into a time-lapse video. It can run on story mode for up to 16 hours.

There are two cameras on the device. The main camera is 8-megapixels with a 148 degree field of view and 1080p resolution. The second camera has the same resolution, a smaller field of view and is 5-megapixels.

FrontRow also comes with 2GB of RAM and 32GB of storage. It allows you to livestream through YouTube, Twitter or Facebook and you can upload photographs and videos to your phone via BlueTooth or WiFi through the FrontRow mobile app.

FrontRow is obviously not the first product of this type. Other iterations include the Beoncam, Narrative Clip, and of course Snapchat’s Spectacles. And while this device does offer pretty decent specs, apparent ease of use and non-intrusive design, it also comes with a pretty hefty price tag, at least in comparison to similar devices on the market. FrontRow will set you back $399, but if you’re willing to shell that out, you can order the jet black version from Amazon now. The rose shade is coming soon.

Via: CNET

Source: FrontRow

Read the Full Article here: >Engadget

What is Amazon Chime?

Amazon Chime is a new communication service by Amazon that supports video conferencing, calls, chat, and the sharing of content.

The product is available for devices running Windows and Mac OS X, and for the mobile operating systems Android and iOS, and as an online version that you can use device-independent.

Data is automatically synced regardless of device that you are using to access Amazon Chime.

Amazon users may sign in to the application using their account, or separate their Amazon shopping account from Amazon Chime if they prefer to do so.

It is furthermore possible to join meetings without an account by entering the meeting ID in the Amazon Chime application.

amazon chime

Amazon Chime is on AWS. Amazon notes that content — messages, voice, video and other data — is encrypted using AES 256-bit encryption.

Amazon Chime Features

As far as features are concerned, there are plenty available right now:

  • Online Meetings — Create or join online meetings from any supported device or the online version. The interface highlights the participants, and anyone has options to mute noise. Meetings can be locked so that only authenticated users may join.
  • Video Conferencing — You may join video conferences with up to 16 people on the desktop, and up to 8 people on mobile devices. High quality audio and high definition video is supported.
  • Chat — Message people inside and outside your organization. Chime displays notifications when you receive new chat messages, and you may chat with individuals or with groups. The chat history is searchable, and synced across devices automatically.
  • Chat Rooms — You may create chat rooms in Amazon Chime to bring people together. This may be a chat room for a project group for instance. File sharing is supported, and the chat history is searchable and available on all devices as well.
  • File Sharing — You may use Chime to attach files to meetings, chats, or chat rooms.
  • Microsoft Active Directory — Chime supports Microsoft Active Directory to authenticate users. This means that employees may sign in using company usernames and passwords, and that policies for user credentials apply to Amazon Chime as well.
  • Administration — Chime offers an administration console that reveals usage reports, allows admins to add or remove users from subscriptions, and run support related tasks such as assigning meeting Pins.

Chime apps are supported on the following operating systems officially:

  • Microsoft Windows 7, Windows 8, and Windows 10
  • Apple Mac OS X, version 10.10 and above
  • Apple iOS, version 8.0 and above
  • Android, version 5.0 and above

Check out the getting started help page for information on making your first steps in Chime.

Amazon Chime Pricing

Amazon Chime offers three different plans. The Basic plan is free, while Plus and Pro are both subscription based.

Edition Basic Plus Pro
Calls & meetings
1:1 Video calls X X X
1:1 Voice calls X X X
Outlook plugin X X X
Screen sharing X X
Remote Desktop Control X X
Schedule and host meetings (attendees are always free) X
Record meetings X
Personalized meeting URLs X
Conference room video systems X
Join meetings using a standard phone line*
Maximum attendees 2 2 100
Chat
1:1 Chat  X  X  X
Chat rooms  X  X  X
IT Administration
User management  X  X
Usage reports  X  X
Active Directory integration  X  X
Message history 30 days Up to 1GB/user Up to 1GB/user

The free plan is limited to one on one chats, voice calls and video calls, and the message history is only kept for a maximum of 30 days.

Amazon Chime Plus is available for $2.50 per month per user. It adds screen sharing and remote desktop control to Chime, IT administrative features, and up to 1 Gigabyte of storage for a user’s message history.

Amazon Chime Pro can be tried for free for 30 days. Chime users may then subscribe to Plus or Pro plans, or use the free Basic plan instead.

Closing Words

Is Amazon Chime a Skype competitor? It surely looks like it is. There is a free version that should be sufficient for many home use scenarios, and two subscription versions for corporations who require more functionality.

Now You: What is your initial opinion of Amazon Chime?

Ghacks needs you. You can find out how to support us here or support the site directly by becoming a Patreon. Thank you for being a Ghacks reader.

The post What is Amazon Chime? appeared first on gHacks Technology News.

via https://ift.tt/2kOUOR4

Fileless Memory-Based Malware Plagues 140 Banks, Enterprises

Attackers have been using well-known, standard utilities to carry out attacks on organizations around the world, and covering their tracks by wiping their activity from the machine’s memory before its rebooted.

The attackers, who may be connected to the GCMAN and Carbanak groups, aren’t using signature-based malware to carry out their attackers, instead they’re using fileless malware hidden in the memory of the affected servers.

Researchers with Kaspersky Lab’s Global Research and Analysis Team described the attacks Wednesday in a blog post on Securelist.

More than 140 enterprises–primarily banks, government organizations, and telecommunications firms in 40 countries, including the U.S., France, and Ecuador–have been affected, according to Kaspersky.

Researchers uncovered the attacks after banks in the Commonwealth of Independent States found Meterpreter, an extensible payload component used by Metasploit, inside the physical memory of a domain controller. Researchers with Kaspersky Lab found the software had been combined with PowerShell scripts in order to invisibly siphon up the passwords of system administrators.

Once they got this information, the researchers claim the attackers essentially had remote access to the machines. They were also spotted using another legitimate utility, Microsoft’s command-line scripting utility NETSH, to funnel traffic from the victim’s host to the attacker’s command and control system.

Researchers believe attackers used Mimikatz, an open-source, post-exploit utility, to grab credentials for service accounts with admin privileges. After achieving admin privileges, they could use NETSH and another Microsoft utility, SC, and carry out the usage of malicious PowerShell scripts.

While researchers were able to determine the techniques used in the attacks; narrowing down who exactly carried them out is difficult given they were carried out with everyday tools and how skilled the attackers are at evading detection.

“The determination of attackers to hide their activity and make detection and incident response increasingly difficult explains the latest trend of anti-forensic techniques and memory-based malware,” Sergey Golovanov, Principal Security Researcher at Kaspersky Lab said Wednesday.

“That is why memory forensics is becoming critical to the analysis of malware and its functions. In these particular incidents, the attackers used every conceivable anti-forensic technique; demonstrating how no malware files are needed for the successful exfiltration of data from a network, and how the use of legitimate and open source utilities makes attribution almost impossible.”

It’s unclear how victim enterprises had their servers hacked in the first place. According to researchers, the attackers used a known exploit for an unpatched vulnerability.

Golovanov and Igor Soumenkov, another researcher with the company’s GReAT team plan to present additional details around the operation – including a second part, how attackers extracted money from banks via ATMs – in April, at the Kaspersky Lab Security Analyst Summit.

While researchers claim they’re unsure who’s behind the attacks, they said their approaches do bear a resemblance to groups previously uncovered by Kaspersky Lab, such as GCMAN and Carbanak.

Like these attacks, GCMAN, a group the firm described at the Security Analyst Summit last year, used legitimate pen-testing tools, like Meterpreter, to target banks. Once inside a network, they pivoted, bouncing around from machine to machine until they could transfer money from a bank computer to e-currency services. Attackers managed in one instance to transfer $200 payments per minute to a money-mule account without the bank being any the wiser.

Details around the Carbanak gang, a group of attackers who purportedly stole $1 billion from 100 banks, emerged at the Security Analyst Summit in 2015. In that campaign attackers used a one-two punch of a spear-phishing email and a backdoor to manipulate access to banking networks and steal money.

Over the last few months the group has reemerged and been seen shifting its gears, in November 2016 it began targeting the hospitality and restaurant industry. Last month it was learned the group was using Google hosted services for its command and control channels.

via https://ift.tt/2kUmrbX