Security NEWS Bytes
Bhavna Kulshrestha
 From April 8 2014, technical
assistance for Windows XP will
no longer be available, including
automatic updates.
 2.2 million ATMs worldwide, 95%
of them still using Win XP.
 A bit of a reprieve: ATMs using
Windows XP Embedded, support
lasts until early 2016.
Support is ending soon!!
 An Israeli security startup that uses
smartphones & high-frequency
sounds for identity verification.
 A password replacement or Two-
Factor authentication layer on top of
traditional password.
 The Idea : Visit SlickLogin enabled
site, tap login button, hold your
phone close to laptop & Your IN..!!!
 How it works: Uses protocols to
verify your phone’s position (Wi-Fi,
NFC, GPS, Bluetooth)
SlickLogin joins Google
 Entry into the system was through a refrigeration, heating &
cooling company in Pennsylvania.
 Large retail operations have a team that routinely monitors
energy consumption & temperatures in stores to save on costs.
 To support this solution, vendors need to be able to remote into
the system .
 Target estimates say that the breach exposed approx 40 million
debit and credit card accounts between Nov. 27 & Dec. 15, 2013.
“Target” Hackers broke in through
HVAC Vendor
 Sentient Hyper-Optimized Data Access
Network, is the "Google for hackers."
 A search engine for servers, routers, load
balancers, PCs & collects info on over 500
million devices every month.
 Identifies by scanning the Internet for
ports typically associated with HTTP, FTP,
SSH and Telnet.
 A new way to browse the Shodan in the
form of an add-on: “Shodan Maps."
Scariest Search Engine on the
Internet Just Got Scarier…
 Tinder connects to Facebook profiles
& offers matches based on proximity
 A vulnerability allowed the attacker to
potentially pinpoint the exact location
to within 100 feet.
 Using GPS data collected by
Smartphone, one could determine a
user’s location (latitude, longitude)
simply by entering a member's Tinder
identification number.
Tinder App Allowed Users to
Precisely Locate Others
 Brought key decision makers and
thought leaders from the industry
and government.
 Well known for its speakers & talks
where new vulnerabilities are
responsibly disclosed along with
their prevention mechanisms.
 Highlights of Nullcon 2014 include:
Nullcon BlackShield, Nullcon Ammo,
Nullcon 2014 Exhibition, Nullcon Job
Fair, Nullcon Training
India's most popular security
conference returns for the fifth year
 Two security researchers developed a home-made
gadget called 'CAN Hacking Tools (CHT)’
 Capable to give away the entire control of your car to an attacker from
windows & headlights to its steering & brakes.
 Device uses the Controller Area Network (CAN) ports that are built into cars
for computer-system checks.
 Injecting a malicious code to CAN ports allows to send wireless commands
remotely from a computer.
Hacking a Car remotely with iPhone
sized Device
 Security researchers at the University of Liverpool, Britain have
demonstrated a WiFi virus that can spread between computer networks.
 Named as 'Chameleon', it self-propagates over WiFi networks from AP to
AP but doesn’t affect working of AP.
 POC: Replaces the firmware of the vulnerable (AP) with a virus-loaded
version  Propagates to next victim in network
 Research shows that this kind of attack is undetectable to any Antivirus
and Wireless Intrusion Detection System (IDS).
 However, this is created for demo purpose in research lab only.
Chameleon virus that spreads
across Wi-Fi APs
 Hacker gained access to thousands of
passports of law enforcement and
military officials.
 EC-Council says its servers have not
been compromised.
 Domain redirection was done at the
DNS Registrar & traffic was re-routed
from Authentic EC-Council Servers to a
Host in Finland known for hosting
other illegal websites.
EC-Council Web Site Hacked, Defaced
3 Lakh Android devices infected by
Premium SMS sending malware
 Panda Labs has identified malicious Android apps that sign up users for
Premium SMS services without their permission.
 Four malicious apps found free in the app store : "Easy Hairdos", "Abs Diets",
"Workout Routines" and "Cupcake Recipes”.
 App gets phone number of the device, connects to a webpage and registers
to premium service.
 Average scammed user gets charged $20 by these apps &
around 300,000 plus users downloaded them. Scammers have
made $6 million from unsuspecting users.
Thank You..!!

More Related Content

PDF
10940 img sytr12_mobile_malware
PDF
Security News bytes October 2013
PDF
Infographic: The High Cost of BYOD
PDF
Spy android malware - eScan
PPTX
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020
PPTX
Tips and Tricks on Securing your Android Devices
PDF
Domain 5 of the CEH: Web Application Hacking
PDF
The state of mobile app security
10940 img sytr12_mobile_malware
Security News bytes October 2013
Infographic: The High Cost of BYOD
Spy android malware - eScan
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020
Tips and Tricks on Securing your Android Devices
Domain 5 of the CEH: Web Application Hacking
The state of mobile app security

What's hot (20)

PDF
Domain 4 of CEH V11: Network and Perimeter Hacking
PDF
Top 6-Security-Threats-on-iOS
PPT
Cyber crime
PDF
Mobile security mobile malware countermeasure academic csirt
PDF
I.G.N. Mantra - Mobile Security, Mobile Malware,and Countermeasure
PPTX
Gartner IAM Summit 2017 | Critical Insight: How Device Insight Drives Dynami...
PDF
Techvorm com-android-security-issues-solutions
PPTX
Rajan Raj Pant
PDF
2012 nq mobile_security_report
PDF
Ijiret siri-hp-a-remote-phone-access-for-smartphone-events
PDF
Evolutionand impactofhiddenmobilethreats wandera
DOCX
Report of android hacking
PDF
Antikeylogger
PPT
How BYOD Will Shape Wireless Network Security in 2012
PDF
Smartphone Smart Card 061013
PDF
4 mobile security threats companies must look out for
PDF
Malware detection techniques for mobile devices
PDF
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES
PPT
Smart phone and mobile device security
 
PDF
Rpt repeating-history
Domain 4 of CEH V11: Network and Perimeter Hacking
Top 6-Security-Threats-on-iOS
Cyber crime
Mobile security mobile malware countermeasure academic csirt
I.G.N. Mantra - Mobile Security, Mobile Malware,and Countermeasure
Gartner IAM Summit 2017 | Critical Insight: How Device Insight Drives Dynami...
Techvorm com-android-security-issues-solutions
Rajan Raj Pant
2012 nq mobile_security_report
Ijiret siri-hp-a-remote-phone-access-for-smartphone-events
Evolutionand impactofhiddenmobilethreats wandera
Report of android hacking
Antikeylogger
How BYOD Will Shape Wireless Network Security in 2012
Smartphone Smart Card 061013
4 mobile security threats companies must look out for
Malware detection techniques for mobile devices
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES
Smart phone and mobile device security
 
Rpt repeating-history
Ad

Viewers also liked (6)

PDF
Security bytes - null mumbai
PPTX
Security News Bytes Null Dec Meet Bangalore
PDF
The Seven Deadly Sins of Incident Response
PPTX
Identifying XSS Vulnerabilities
PPTX
Security bytes - null mumbai
Security News Bytes Null Dec Meet Bangalore
The Seven Deadly Sins of Incident Response
Identifying XSS Vulnerabilities
Ad

Similar to Null pune 1st March-news bytes (20)

PPT
Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...
PDF
Trojan horseofbyod2
PPTX
Smartphone
PDF
RSA Monthly Online Fraud Report -- February 2014
 
DOCX
8 threats that even antivirus cannot catch
DOCX
HinDroid
PDF
Sholove cyren web security - technical datasheet2
PPTX
Computer and network security
PPTX
IQT 2010 - The App Does That!?
PDF
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
PDF
A Joint Study by National University of Singapore and IDC
PDF
I haz you and pwn your maal whitepaper
PDF
IBM Xforce Q4 2014
PPTX
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
PPTX
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
PDF
A Study on Modern Methods for Detecting Mobile Malware
PPTX
News bytes Sept-2011
PDF
Mobile Malwares Analysis - Garvit Arya
PDF
Ce hv8 module 17 evading ids, firewalls, and honeypots
PPTX
beware of Thing Bot
Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...
Trojan horseofbyod2
Smartphone
RSA Monthly Online Fraud Report -- February 2014
 
8 threats that even antivirus cannot catch
HinDroid
Sholove cyren web security - technical datasheet2
Computer and network security
IQT 2010 - The App Does That!?
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
A Joint Study by National University of Singapore and IDC
I haz you and pwn your maal whitepaper
IBM Xforce Q4 2014
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
A Study on Modern Methods for Detecting Mobile Malware
News bytes Sept-2011
Mobile Malwares Analysis - Garvit Arya
Ce hv8 module 17 evading ids, firewalls, and honeypots
beware of Thing Bot

More from n|u - The Open Security Community (20)

PDF
Hardware security testing 101 (Null - Delhi Chapter)
PPTX
SSRF exploit the trust relationship
PDF
PDF
Api security-testing
PDF
Introduction to TLS 1.3
PDF
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
PDF
Talking About SSRF,CRLF
PPTX
Building active directory lab for red teaming
PPTX
Owning a company through their logs
PPTX
Introduction to shodan
PDF
Detecting persistence in windows
PPTX
Frida - Objection Tool Usage
PDF
OSQuery - Monitoring System Process
PDF
DevSecOps Jenkins Pipeline -Security
PDF
Extensible markup language attacks
PPTX
PDF
Hardware security testing 101 (Null - Delhi Chapter)
SSRF exploit the trust relationship
Api security-testing
Introduction to TLS 1.3
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Talking About SSRF,CRLF
Building active directory lab for red teaming
Owning a company through their logs
Introduction to shodan
Detecting persistence in windows
Frida - Objection Tool Usage
OSQuery - Monitoring System Process
DevSecOps Jenkins Pipeline -Security
Extensible markup language attacks

Recently uploaded (20)

PDF
sbt 2.0: go big (Scala Days 2025 edition)
PPT
Geologic Time for studying geology for geologist
PDF
Five Habits of High-Impact Board Members
PPTX
Microsoft Excel 365/2024 Beginner's training
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
Abstractive summarization using multilingual text-to-text transfer transforme...
PPTX
Chapter 5: Probability Theory and Statistics
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
PDF
Flame analysis and combustion estimation using large language and vision assi...
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
sbt 2.0: go big (Scala Days 2025 edition)
Geologic Time for studying geology for geologist
Five Habits of High-Impact Board Members
Microsoft Excel 365/2024 Beginner's training
Final SEM Unit 1 for mit wpu at pune .pptx
Convolutional neural network based encoder-decoder for efficient real-time ob...
sustainability-14-14877-v2.pddhzftheheeeee
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Getting started with AI Agents and Multi-Agent Systems
Hindi spoken digit analysis for native and non-native speakers
Abstractive summarization using multilingual text-to-text transfer transforme...
Chapter 5: Probability Theory and Statistics
Module 1.ppt Iot fundamentals and Architecture
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
Flame analysis and combustion estimation using large language and vision assi...
A comparative study of natural language inference in Swahili using monolingua...
The influence of sentiment analysis in enhancing early warning system model f...
1 - Historical Antecedents, Social Consideration.pdf
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor

Null pune 1st March-news bytes

  • 2.  From April 8 2014, technical assistance for Windows XP will no longer be available, including automatic updates.  2.2 million ATMs worldwide, 95% of them still using Win XP.  A bit of a reprieve: ATMs using Windows XP Embedded, support lasts until early 2016. Support is ending soon!!
  • 3.  An Israeli security startup that uses smartphones & high-frequency sounds for identity verification.  A password replacement or Two- Factor authentication layer on top of traditional password.  The Idea : Visit SlickLogin enabled site, tap login button, hold your phone close to laptop & Your IN..!!!  How it works: Uses protocols to verify your phone’s position (Wi-Fi, NFC, GPS, Bluetooth) SlickLogin joins Google
  • 4.  Entry into the system was through a refrigeration, heating & cooling company in Pennsylvania.  Large retail operations have a team that routinely monitors energy consumption & temperatures in stores to save on costs.  To support this solution, vendors need to be able to remote into the system .  Target estimates say that the breach exposed approx 40 million debit and credit card accounts between Nov. 27 & Dec. 15, 2013. “Target” Hackers broke in through HVAC Vendor
  • 5.  Sentient Hyper-Optimized Data Access Network, is the "Google for hackers."  A search engine for servers, routers, load balancers, PCs & collects info on over 500 million devices every month.  Identifies by scanning the Internet for ports typically associated with HTTP, FTP, SSH and Telnet.  A new way to browse the Shodan in the form of an add-on: “Shodan Maps." Scariest Search Engine on the Internet Just Got Scarier…
  • 6.  Tinder connects to Facebook profiles & offers matches based on proximity  A vulnerability allowed the attacker to potentially pinpoint the exact location to within 100 feet.  Using GPS data collected by Smartphone, one could determine a user’s location (latitude, longitude) simply by entering a member's Tinder identification number. Tinder App Allowed Users to Precisely Locate Others
  • 7.  Brought key decision makers and thought leaders from the industry and government.  Well known for its speakers & talks where new vulnerabilities are responsibly disclosed along with their prevention mechanisms.  Highlights of Nullcon 2014 include: Nullcon BlackShield, Nullcon Ammo, Nullcon 2014 Exhibition, Nullcon Job Fair, Nullcon Training India's most popular security conference returns for the fifth year
  • 8.  Two security researchers developed a home-made gadget called 'CAN Hacking Tools (CHT)’  Capable to give away the entire control of your car to an attacker from windows & headlights to its steering & brakes.  Device uses the Controller Area Network (CAN) ports that are built into cars for computer-system checks.  Injecting a malicious code to CAN ports allows to send wireless commands remotely from a computer. Hacking a Car remotely with iPhone sized Device
  • 9.  Security researchers at the University of Liverpool, Britain have demonstrated a WiFi virus that can spread between computer networks.  Named as 'Chameleon', it self-propagates over WiFi networks from AP to AP but doesn’t affect working of AP.  POC: Replaces the firmware of the vulnerable (AP) with a virus-loaded version  Propagates to next victim in network  Research shows that this kind of attack is undetectable to any Antivirus and Wireless Intrusion Detection System (IDS).  However, this is created for demo purpose in research lab only. Chameleon virus that spreads across Wi-Fi APs
  • 10.  Hacker gained access to thousands of passports of law enforcement and military officials.  EC-Council says its servers have not been compromised.  Domain redirection was done at the DNS Registrar & traffic was re-routed from Authentic EC-Council Servers to a Host in Finland known for hosting other illegal websites. EC-Council Web Site Hacked, Defaced
  • 11. 3 Lakh Android devices infected by Premium SMS sending malware  Panda Labs has identified malicious Android apps that sign up users for Premium SMS services without their permission.  Four malicious apps found free in the app store : "Easy Hairdos", "Abs Diets", "Workout Routines" and "Cupcake Recipes”.  App gets phone number of the device, connects to a webpage and registers to premium service.  Average scammed user gets charged $20 by these apps & around 300,000 plus users downloaded them. Scammers have made $6 million from unsuspecting users.