Security Week 22: two-second smart locks

Security Week 22: two-second smart locks The past week was marked by a couple of interesting news from the insecure world of Internet things, and the main event, of course, was the study of the smart lock Tapplock ( , News , Original report ). Researcher from Pen Test Partners Andrew Tierney did not just bypass the protection of the electronic lock, but rather discovered the complete absence of any security system in the "digital" part of the device.
 
Indiegogo , planning to collect 40 thousand dollars for bringing finished prototypes to ...
+ 0 -

Installing the certificate on the HTTP server Apache

Installing the certificate on the HTTP server Apache
 
This article offers step-by-step instructions for installing a certificate on an Apache HTTP server. Note that since Apache version 2.4.? the server configuration parameters have been changed.
 
account GlobalSign by pressing the
button.  
" Edit "To the left of the order number and having copied the certificate in PEM format. .
 
 
The private key for the certificate is created along with the certificate request (CSR), so the private key file can already be on your server. If the private key is lost, then the certificate must be reissued.
 
 
The intermediate certificate that you need ...
+ 0 -

"Those who are ready to exchange freedom for security are not worthy of either freedom or security" (original source)

"Those who are ready to exchange freedom for security are not worthy of either freedom or security" (original source)For the first time I heard this phrase when I was a violent revolutionary student from Major-General Petrov at the video lecture on DOTU (Sufficiently General Management Theory), since then I often use it as the "last argument of the king" in discussions of the affairs of the world. But since the world entered the active phase of post-truth and fake with metastases, I decided to dig up the original sources and understand the context in which this phrase was used by old Ben, and what he wanted to say /to prove to the reader.
 
 
I offer ...
+ 0 -

Release of the unofficial MTProto proxy in Python, features protocol

Release of the unofficial MTProto proxy in Python, features protocol

 
Recently, Telegram developers have laid out the source of a proxy server that uses the MTProto protocol. On the hub came out articles about features of its assembly and repackaging the container docker with it . The official proxy server, written in C, surprises with the amount of code - about 23 thousand lines. At the same time, and sometimes a little earlier, several alternative implementations came out, but none of them supported the possibility of advertising their channel.
 
 
In this article I would like to tell you about the little-known peculiarities of the proxy server communication ...
+ 0 -

Analysis of various methods of IT training

Many people are interested in the question of how best to train and why? Let's consider all the training options and choose the optimal one for this or that task
 
 
So, the main types of training in the IT field are the following:
 
 
 
Forums, conferences, free resources
 
Books
 
Remote self-study on the Internet
 
Webinars
 
Full-time education
 
 
Perhaps there are some other forms, but they are mostly similar to those that are already indicated. Let's now examine each form of training separately and identify the strengths and weaknesses.
 
 
[h3] Forums, conferences and free resources ...[/h]
+ 0 -

Cisco StealthWatch or classic corporate network protection (FW, IPS, ACL, NAC, AV, SIEM)?

Cisco StealthWatch or classic corporate network protection (FW, IPS, ACL, NAC, AV, SIEM)?
 
 
The structure of almost any IB system includes traditional systems (individually or in combination):
 
 
• Firewall
 
• Intrusion Prevention System (IPS)
 
• Access control lists (ACL)
 
• Network Access Control System (NAC)
 
• Antivirus systems (Antivirus /Antimalware)
 
• Management systems of the IB event (SIEM)
 
 
All these systems are good both individually for solving their problems, and in complex. However, there are various classes of tasks to provide IS, which the system data can not solve, alas. Moreover, the traditional network perimeter, where traditional means of protection in the modern ...
+ 0 -

What is Lazy FP State Restore: Intel has detected a new vulnerability

What is Lazy FP State Restore: Intel has detected a new vulnerability
 
 
Image:
Unsplash

 
 
In Intel processors was detected. a new vulnerability. The error affecting all models of the Intel Core family is called Lazy FP State Restore (CVE-2018-3665). the description of , the problem is related to the performance optimization feature of Lazy FPU context switching - it is used by operating systems to store and restore Floating Point Unit registers (FPUs). Vulnerability allows a process to access registers and data in them related to another process.
 
 
By the security bulletin of Red Hat...
+ 0 -

Building an extended anti-virus protection system for a small enterprise. Part 3

Building an extended anti-virus protection system for a small enterprise. Part 3
 
In this part, we will continue to describe the solution of multi-stage protection based on the USG Performance Series gateways, in particular, Zyxel USG40W. Previous parts: first and the second is . But in the beginning it is worth remembering the reasons that encourage system administrators, IT security specialists to use such devices.
 
 
Next, we turn to the description of Zyxel USG40W, taking as a basis both versions of the web-interface: "Simple Mode" and "Experienced User Mode".
 
Page of USG Performance Series ...
+ 0 -

Security Week 21: hundreds of vulnerabilities Adobe Flash

Security Week 21: hundreds of vulnerabilities Adobe Flash On June ? Adobe closed a critical vulnerability in Flash Player (3r3r3? news
, 3r3r3? company's announcement
). The CVE-2018-5002 vulnerability was discovered by several research teams from China at once - it's about remote execution of arbitrary code as a result of a buffer overflow error. This vulnerability is zero day: at the time of detection, it has already been used in targeted attacks in the Middle East. This rather serious problem is perceived as routine news simply because of the name of the affected product: well, who can already surprise RCE in the flush?
 
 
Only this year this is the second critical ...
+ 0 -

I can become an Apple, and you, too,

I can become an Apple, and you, too,


Public disclosure of the vulnerability in third-party verification of the Apple code signature


 
 
Unlike some previous works, this vulnerability does not require administrator rights, does not require a JIT code or memory corruption to bypass code signature verification. All you need is a properly formatted Fat /Universal file, and checking the code signature will show a valid result.
 
 

Summary


 
 
 
The found crawling of the API used by third-party developers to sign the code allows you to submit any code as signed by Apple.
 
All known vendors and open source projects are notified ...[/h][/h]
+ 0 -