New attack steals SSNs, e-mail addresses, and more from HTTPS pages

Approach exploits how HTTPS responses are delivered over transmission control protocol.

Enlarge / A demo planned for Wednesday will show how an ad hosted on nytimes.com could attack other HTTPS-protected sites. (credit: Vanhoef, Van Goethem)

The HTTPS cryptographic scheme protecting millions of websites is vulnerable to a newly revived attack that exposes encrypted e-mail addresses, social security numbers, and other sensitive data even when attackers don't have the ability to monitor a targeted end user's Internet connection.

The exploit is notable because it doesn't require a man-in-the-middle position. Instead, an end user need only encounter an innocuous-looking JavaScript file hidden in an Web advertisement or hosted directly on a webpage. The malicious code can then query a variety of pages protected by the secure sockets layer or transport layer security protocols and measure the precise file sizes of the encrypted data they transmit. As its name suggests, the HEIST technique—short for HTTP Encrypted Information can be Stolen Through TCP-Windows—works by exploiting the way HTTPS responses are delivered over the transmission control protocol, one of the Internet's most basic building blocks.

Once attackers know the size of an encrypted response, they are free to use one of two previously devised exploits to ferret out the plaintext contained inside it. Both the BREACH and the CRIME exploits are able to decrypt payloads by manipulating the file compression that sites use to make pages load more quickly. HEIST will be demonstrated for the first time on Wednesday at the Black Hat security conference in Las Vegas.

Read 12 remaining paragraphs | Comments

BlackBerry launches Hub+ suite of apps for Android

BlackBerry launches Hub+ suite of apps for Android

BlackBerry’s last two smartphones have been Android-powered devices featuring a suite of BlackBerry apps for communication, security, time management, and other functions. Now you don’t need a BlackBerry phone to use some of those apps anymore.

The company has released BlackBerry Hub+ for Android, which brings BlackBerry’s unified messaging app as well as its calendar and Password Keeper apps to any phone running Android 6.0 or later.

To use the apps, you just need to download and install BlackBerry Hub and BlackBerry Services from the Google Play Store.

Continue reading BlackBerry launches Hub+ suite of apps for Android at Liliputing.

BlackBerry launches Hub+ suite of apps for Android

BlackBerry’s last two smartphones have been Android-powered devices featuring a suite of BlackBerry apps for communication, security, time management, and other functions. Now you don’t need a BlackBerry phone to use some of those apps anymore.

The company has released BlackBerry Hub+ for Android, which brings BlackBerry’s unified messaging app as well as its calendar and Password Keeper apps to any phone running Android 6.0 or later.

To use the apps, you just need to download and install BlackBerry Hub and BlackBerry Services from the Google Play Store.

Continue reading BlackBerry launches Hub+ suite of apps for Android at Liliputing.

Two recent court decisions make climate scientists’ e-mails public

Groups rejecting climate science see some success in FOIA efforts.

(credit: Laura Bittner)

In the past, we’ve covered attempts by some political groups (or politicians) to access climate scientists’ e-mails. The idea is generally to trawl through them for anything that can be used to bolster the claim that climate science is somehow fraudulent—hypothetically vindicating those who have refused to acknowledge the scientific consensus for decades.

A long-time target of these activists has been researcher Michael Mann, whose work on tree ring climate records resulted in “the hockey stick,” a graph of the last millennium of climate history that shows rapid warming at the end of a gradual cooling trend. Although that record has been extended and replicated many times now, some still believe Mann must have somehow distorted the data to produce the appearance of sudden warming. As a result, Mann has been involved in court cases for years over demands for his e-mails from a conservative advocacy group and then Virginia Attorney General Ken Cuccinelli. More recently, Mann has been involved in a countersuit against those who publicly accused him of fraud.

Well, having failed to get access to Mann’s e-mails through the Virginia courts, the same opposition group (now called the Energy & Environment Legal Institute) decided to go after one of Mann’s colleagues since he worked in a different state. The University of Arizona rebuffed a very broad 2011 Freedom of Information Act request for the e-mails of Malcolm Hughes, part of the “hockey stick” team, and James Overpeck, a coordinating lead author of the 2007 IPCC report’s chapter on paleoclimate.

Read 18 remaining paragraphs | Comments

Neurons position their parts for rapid communication

Neurons that talk to each other have proteins that mirror each other.

A cartoon representing neurotransmitters crossing a synapse. (credit: University of Connecticut)

Neurons communicate by sending chemical signals called neurotransmitters across synapses, specialized connections between two individual cells. This communication requires a delicate and intricate molecular architecture. A recent paper published in Nature has now shown that the structure of this intercellular space is more complicated than previously thought, and it probably helps boost the efficiency of the signaling.

The authors of this paper imaged three proteins found in the cell that start the signaling process. (Generically called presynaptic proteins, the ones looked at here are RIM1, RIM2, Munc13, and bassoon.) Each of these proteins was specifically tagged, and the authors plotted the density of their distribution across the active zones of the synapse.

The team then developed an algorithm that allowed it to identify small clusters of proteins based on their local density. These nanoclusters were more likely to be located near the center of each synapse than near the synaptic edges. This wasn’t true of all the proteins, but at least two were tightly restricted and a third less so (bassoon was almost uniform throughout the synapse).

Read 7 remaining paragraphs | Comments

Civilization 6 angespielt: Gipfeltreffen mit Victoria und den alten Ägyptern

Vom Dorf bis zu den Pyramiden: In Civilization 6 kämpfen wir uns erneut durch die Geschichte – aber sehen dank neuer Funktionen mehr davon. Golem.de hat eine frühe Version des Strategiespiels ausprobiert. (Civilization, Games)

Vom Dorf bis zu den Pyramiden: In Civilization 6 kämpfen wir uns erneut durch die Geschichte - aber sehen dank neuer Funktionen mehr davon. Golem.de hat eine frühe Version des Strategiespiels ausprobiert. (Civilization, Games)

Projekt CSX: ZTE will mobiles Gerät von Nutzern entwerfen lassen

Mit dem Projekt CSX will ZTE seine Nutzer in den Produktionsprozess eines neuen mobilen Devices einbinden. CSX steht dabei für “Crowd Sourced X” – wobei das X für alles stehen kann, was ZTE realistisch gesehen produzieren kann. 2017 soll das Gerät auf den Markt kommen. (ZTE, Smartphone)

Mit dem Projekt CSX will ZTE seine Nutzer in den Produktionsprozess eines neuen mobilen Devices einbinden. CSX steht dabei für "Crowd Sourced X" - wobei das X für alles stehen kann, was ZTE realistisch gesehen produzieren kann. 2017 soll das Gerät auf den Markt kommen. (ZTE, Smartphone)

Document Foundation: Libreoffice 5.2 unterstützt geheime Dokumente

Die aktuelle Version 5.2 der freien Officesuite Libreoffice unterstützt den TSCP-Standard für Geheimhaltungsstufen. Verbessert hat das Team zudem die Interoperabilität und die Arbeit mit Dokumenten soll dank einer kleineren Werkzeugleiste leichter sein. (Libreoffice, Document Foundation)

Die aktuelle Version 5.2 der freien Officesuite Libreoffice unterstützt den TSCP-Standard für Geheimhaltungsstufen. Verbessert hat das Team zudem die Interoperabilität und die Arbeit mit Dokumenten soll dank einer kleineren Werkzeugleiste leichter sein. (Libreoffice, Document Foundation)

Bitcoin value falls off cliff after $77M stolen in Hong Kong exchange hack

Many investors holding BTC sell holdings in wake of Bitfinex hack.

The value of bitcoins plummeted 20 percent after almost 120,000 units of the digital currency were stolen from Bitfinex, a major Bitcoin exchange.

The Hong Kong-based exchange said it had discovered a security breach late Tuesday, and has suspended all transactions.

“We are investigating the breach to determine what happened, but we know that some of our users have had their Bitcoins stolen. We are undertaking a review to determine which users have been affected by the breach. While we conduct this initial investigation and secure our environment, bitfinex.com will be taken down and the maintenance page will be left up,” said the company on its website.

Read 7 remaining paragraphs | Comments

Rücknahme von Altgeräten: Umwelthilfe wirft Amazon Gesetzesverstöße vor

Die Deutsche Umwelthilfe findet die Rücksendung von Elektroaltgeräten per Post nicht besonders umweltfreundlich. Dennoch kritisiert sie die Praxis von Amazon scharf, die Kunden über dieses neue Recht falsch zu informieren. (Recycling, Amazon)

Die Deutsche Umwelthilfe findet die Rücksendung von Elektroaltgeräten per Post nicht besonders umweltfreundlich. Dennoch kritisiert sie die Praxis von Amazon scharf, die Kunden über dieses neue Recht falsch zu informieren. (Recycling, Amazon)

ZTE launches Project CSX: will release a crowdsourced phone in 2017

ZTE launches Project CSX: will release a crowdsourced phone in 2017

Earlier this year ZTE announced plans to launch a crowdsourced smartphone. Now the Chinese phone maker is kicking things off by launching Project CSX, a community forum where potential customers will be able to share their ideas for a smartphone that ZTE hopes to bring to market in 2017.

Anyone can join the community by visiting community.zteusa.com to sign up.

ZTE says it Projcet CSX is “a new method for developing products that engages directly with consumers at every step of the development process.”

Uses will be invited to submit ideas and then vote on their favorites.

Continue reading ZTE launches Project CSX: will release a crowdsourced phone in 2017 at Liliputing.

ZTE launches Project CSX: will release a crowdsourced phone in 2017

Earlier this year ZTE announced plans to launch a crowdsourced smartphone. Now the Chinese phone maker is kicking things off by launching Project CSX, a community forum where potential customers will be able to share their ideas for a smartphone that ZTE hopes to bring to market in 2017.

Anyone can join the community by visiting community.zteusa.com to sign up.

ZTE says it Projcet CSX is “a new method for developing products that engages directly with consumers at every step of the development process.”

Uses will be invited to submit ideas and then vote on their favorites.

Continue reading ZTE launches Project CSX: will release a crowdsourced phone in 2017 at Liliputing.