Author Archives: infosec

Regin, new computer spying bug

Symantec says it has discovered one of the most sophisticated pieces of malicious software ever seen.

Symantec says the bug, named Regin, was probably created by a government and has been used for six years against a range of targets around the world.

Researchers say the sophistication of the software indicates that it is a cyber-espionage tool developed by a nation state.

Symantec has drawn parallels with Stuxnet, a computer worm thought to have been developed by the US and Israel to target Iran’s nuclear program.

Read more here

Beta Version of Access Control Policy Tool (ACPT)

Ανακοινώθηκε η νέα έκδοση του εργαλείου ACPT του οργανισμού NIST, η οποία ενσωματώνει, μεταξύ άλλων, το αποτέλεσμα της μέχρι στιγμής συνεργασίας με την ερευνητική ομάδα InfoSec του Πανεπιστημίου Μακεδονίας.

H νέα έκδοση βρίσκεται σε στάδιο Beta και περιλαμβάνει ένα συνοπτικό οδηγό χρήσης, παραδείγματα και κώδικα Java. Για περισσότερες πληροοφορίες δείτε εδώ. Μπορείτε να αποκτήσετε την τελευταία έκδοση του εργαλείου  ACPT απο εδώ, καθώς και τον πηγαίο κώδικα από εδώ. Για για να αποκτήσετε το συνθηματικό του συμπιεσμένου αρχείου επικοινωνήστε με: Vincent Hu, vhu@nist.gov

Το εργαλείο ACPT ενσωματώνει μοντέλα πολιτικών ελέγχου πρόσβασης, όπως RBAC, RBAC, MLS, Work-Flow. Μπορείτε να ενημερωθείτε σχετικά απο την παρουσίαση, καθώς και απο τον σχετικό ιστότοπο

Gradually sunsetting SHA-1

SHA-1’s use on the Internet has been deprecated since 2011, when the CA/Browser Forum, an industry group of leading web browsers and certificate authorities (CAs) working together to establish basic security requirements for SSL certificates, published their Baseline Requirements for SSL. These Requirements recommended that all CAs transition away from SHA-1 as soon as possible, and followed similar events in other industries and sectors, such as NIST deprecating SHA-1 for government use in 2010.

That’s why Chrome will start the process of sunsetting SHA-1 (as used in certificate signatures for HTTPS) with Chrome 39 in November. HTTPS sites whose certificate chains use SHA-1 and are valid past 1 January 2017 will no longer appear to be fully trustworthy in Chrome’s user interface.

More info here

Poodle Security Breach

Poodle is a vulnerability in the design of SSL version 3.0. This vulnerability allows the plaintext of secure connections to be calculated by a network attacker.
SSL 3.0 is nearly 18 years old, but support for it remains widespread. Most importantly, nearly all browsers support it and, in order to work around bugs in HTTPS servers, browsers will retry failed connections with older protocol versions, including SSL 3.0. Because a network attacker can cause connection failures, they can trigger the use of SSL 3.0 and then exploit this issue.

More information here

Related Links
Poodle Is A Very Different Sort Of Security Breach

European Cyber Security Month 2014

Europe Code Week 2014

Heidelberg Laurate Forum 2014

Shellshock GNU Bash Vulnerability

Sorry, this entry is only available in Greek.

(Greek) «Η χρήση του TrueCrypt δεν είναι ασφαλής» – το τέλος της ανάπτυξης του TrueCrypt

Sorry, this entry is only available in Greek.

(English) Heartbleed