Are you the publisher? Claim or contact us about this channel


Embed this content in your HTML

Search

Report adult content:

click to rate:

Account: (login)

More Channels


Channel Catalog


Channel Description:

Hackers for hire

older | 1 | 2 | (Page 3)

    0 0

    A newly-developed encryption system by independent researcher Ari Juels and Thomas Ristenpart of the University of Wisconsin, has shown that trickery is an underexploited, but very effective tool in data protection.


    Dubbed ‘Honey Encryption’, this security method adds an extra layer of protection to encrypted data by returning fake data every time an incorrect password or encryption key is made. If the attacker does at some stage guess the correct combination, the sensitive data will be lost among spools of false data.


    Later this year, Juels and Ristenpart will present their Honey Encryption method and findings at the Eurocrypt cryptography conference.


    Since cybercriminals have been using decoys since the very beginning, it makes sense for use the same techniques to our advantage. Using deception as a defense mechanism against cyber attacks is not only delightfully ironic, but very effective.


    SA needs to shape up


    Despite ground-breaking security developments taking place internationally, SA is said to still lack the security awareness and understanding to ensure adequate data protection.


    A recent statement by Beza Belayneh, CEO of the SA Centre for Information Security (SACIS), suggests local organisations (outside the financial sector) often view cyber security awareness as sensationalism, resulting in what Belayneh terms "cyber security fatigue".


    "Organisations will process and store large amounts of personally identified information and most of their business processes such as HR, finance and legal, are fully computerised and digital. Institutions don't realise that cyber attacks constitute data theft and can interrupt business functions."


    According to the SACIS, local organisations are spending resources on cyber attack prevention, but throwing money at the problems will not help people understand the nature of threats and how to counter them effectively – a task which Belayneh says is never-ending. Instead,Belayneh believes the focus should shift to building resilient security frameworks.


    "Institutions must develop a holistic approach that responds effectively to attack since they are impossible to avoid," he says.


    Telspace is hiring!


    And on that note, Telspace Systems is looking to hire a security analyst in South Africa, preferably Gauteng. The ideal candidate should be should be competent in a combination of Web application security, attack and penetration testing, network security,source code reviews, and mobile security.


    For a more detailed description, please visit our job listing on LinkedIn or e-mail your CV to admin[at]telspace.co.za 



    0 0

    BetTech Gaming, the global provider of turnkey gaming solutions to market-dominating clients, has partnered with Telspace Systems to significantly boost its security operations.

    Telspace Systems has been awarded a multi-year contract to conduct round-the-clock attack and penetration testing and analysis. They will also run vulnerability assessments and source code reviews, handle large, complex transactional systems and provide training.


    The preventative measure will benefit all of BetTech’s betting and gaming operator customers, ensuring their players receive industry-leading protection against cyber crime.


    “Telspace Systems has an impeccable reputation,”said BetTech Gaming chief technology officer Ian Barnes.They make organisations as unattractive to online criminals as possible and keep all sensitive financial and client data safe.We have partnered with them to give the highest possible level of security to BetTech as well as our customers and their organisations.”


    Telspace Systems was established in 2002 and is based in Johannesburg, South Africa, with a presence in United Kingdom, Botswana, United Arab Emirates, and Brazil. It services high-profile casinos and banks, and telecommunications, petroleum, and insurance companies around the world.


    Chief executive officer Dino Covotsos commented: “There is no room for complacency when it comes to online security. New software vulnerabilities are found daily and attacks can immobilise a business – the potential financial costs are huge so it is always best to take the strongest possible precautions.”

    0 0
  • 04/01/14--04:01: The iPhone on trial
  • Recent local events have dramatically highlighted security issues among users of the iPhone. There have been reports of high-tech equipment used to recover data and crack phone encryption – as well as obtaining login details of websites used to manage the phone – and these have raised concerns that personal data is simply not safe.


    So how much can someone who has your phone and / or the right tools learn about you?


    A common question among Apple users is whether the phone manufacturer pre-installs ‘backdoors’ or some kind of ‘hidden access’ into the handset to be used to gather information for law enforcement.


    To answer that, we need to consider what security the iPhone has, and why it has it. When Apple designed the phone’s built-in security (locking, securing data etc.), they did so under the premise that the user requires his/her data protected in the event of loss or theft. Apple would not operate under the impression that its users would need to hide something from law enforcement, or not have their phone used as evidence in a court of law. Regardless, Apple has used high levels of encryption on the iPhone, improving it with each new version of its operating system (iOS).


    Various experts in the industry (such as Charlie Miller) have often reiterated that they do not believe Apple actually keeps your passcode on their servers. Apple themselves states the same thing.


    Whether or not this is true, we don’t know for sure. But it appears, given the time and effort required by law enforcement officials (even in other countries) to crack encryption on an iPhone, that they are not working with a passcode simply handed to them by Apple.


    The fancy tools available to extract data from iPhones rely on well-known exploits, default configurations or other entry points into the phone. Some can try to brute-force passwords on the phone using methods that do not trigger the built-in protection, or that simply cater for such. Law enforcement officials also rely on simple user mistakes or inexperience to gain access. How many people use their birthday as their iPhone pin? Or use 1234 or 1111 because its easy to type in?


    Encryption


    With regards to data encryption on the iPhone, keep in mind that not all data is encrypted. Due in part to the access required by certain applications, it can be deduced that some photos, for instance, are not encrypted. Chat programs such as WhatsApp can also implement their own encryption – in which case Apple may have no insight into how this data is protected, nor who has the keys used for decryption.


    Could Touch ID, a fingerprint recognition feature devised by Apple, solve these issues? Probably not. Touch ID adds convenience but not necessarily extra strength in cryptography. Remember you still need to enter a PIN code to enable Touch ID, and therefore its highly likely the iPhone is still using the PIN code as part of the key generation for encryption – much like iPhones without Touch ID.


    Apple would not have relied solely only on a fingerprint to generate encryption keys because if the print stops working, access to data is lost. Besides, users can simply enter their PIN to bypass the Touch ID requirement. Keep in mind, this is not a failure on Apple’s part since they do not sell Touch ID as an upgrade to your phone’s encryption capabilities.


    Solution


    Should we be worried then? Yes and no. Apple has put a lot of work and research into iOS and the iPhone itself. Compared to other operating systems, iOS also maintains a relatively good stance on security and lack of critical security flaws.


    However, there will always be a way around something, and given enough time and resources someone will find vulnerabilities, a flaw, or an “undocumented feature”.


    Switching to Android, BlackberryOS or Windows will not make you any more secure against law enforcement officials, or highly skilled malicious users.


    There are, however, some steps you can take to make it more difficult to do so:


    1. Set a random, and strong PIN. Avoid duplicate digits and sequences and definitely avoid anything personal such as your postal code, birthday etc.
    2. Set your iPhone to auto-lock after a reasonably short time. If it is stolen or lands up in unwanted hands you want it to be locked before it can be accessed.
    3. Activate the find-my-iPhone feature on the device. Not only is this useful to know where  it is if you lose it, but you can also request the device to wipe itself remotely as well.  Remember however, the phone keeps a track of where you’ve been, and this info can be  retrieved from the device via the right tools.
    4. If your phone is lost/stolen or in the hands of a malicious person, immediately change  any e-mail, Facebook, and other passwords on the applicable websites. That way, no  further updates can make their way to the phone.
    5. Finally, as a general rule, if you don’t want something to ever be used against you –  don’t say it via text or e-mail. That not only applies to anything related to the law but  even in general life circumstances. Remember, you can’t take back what you typed.

    By Dimitri Fousekis, Security Analyst / Team Lead, Telspace Systems



    0 0

    Every so often, vulnerabilities are found which turn the information security industry upside down, both from a positive and negative sense. The recent OpenSSL vulnerability is no exception. Having surfaced a short time back, it sent social media into a spin, websites and toolsets having being updated to explain, dissect and help exploit the vulnerability have popped-up everywhere. As have the theories that governments may have been using this vulnerability since as early as 2011.


    Heartbleed, so aptly named because it is the Heartbeat functionality in OpenSSL that “bleeds” sensitive information, has launched itself into the limelight. Raising concerns amongst professionals, business persons and the general public alike.


    One avenue that has not however been focused on too greatly (although mentioned before) is how many “embedded” and/or “appliance” devices are running the vulnerable version of OpenSSL? These usually have much longer and more fragmented patch updates than commercial web-servers and operating systems, especially when firmware is only obtainable from the manufacturer.


    We conducted research into an avenue that is not often mentioned as a risk for the Heartbleed vulnerability –ADSL/DSL users. Using legitimate and non-intrusive means of identifying hosts with the Heartbleed vulnerability, we ascertained that there are many such devices, falling into the following categories:


    Network-Attached Storage Devices (multiple brands)

    Routers/UTM Devices (multiple brands)

    CCTV Camera NVRs (multiple brands)

    Small-Business Firewalls (multiple brands)

    Voice-Over-IP (VOICE) Devices (multiple brands)


    (it was not in the scope of this article to name the manufacturers of these devices)


    The devices above are not estimated to be available and vulnerable – they are online, and are vulnerable. This raises much concern around the data that is exposed to would-be attackers trying to compromise these systems.


    Keep in mind that the Heartbleed vulnerability allows one to obtain pieces of memory from the SSL process that may contain usernames, passwords and authentication cookies. In our internal lab experiments, we found this to be easily obtainable in almost 90% of the tests done.


    It’s a disquieting thought, not only that so many devices with sensitive data (even hard disks!) are exposed to the Internet, but also it becomes even more important when we consider that these devices are now vulnerable – most without even new firmware on their manufacturers websites.


    Embedded and appliance-like devices may be the answer for out-of-the-box and affordable solutions for many services, but in the case of this article one has to ask – Is your internet-connected appliance bleeding your confidential data?



    0 0

    The ITWeb Security Summit is just around the corner, and speakers, exhibitors and visitors alike are finalising their plans.


    We expect this year to be filled with excellent talks, presentations and exhibits to help South Africans in all industries and environments benefit from what has been learnt the past year, as well as what we need to do going forward to ensure the security of our people and systems.


    This year Telspace will host a security challenge at the summit. The goal of the challenge is to test the skills of information security enthusiasts at the summit. Contestants are required to attempt to hack into a test environment, hosted on a Wi-Fi network, and obtain a flag from the competition server. The first two contestants that are able to explain how they obtained the flag, as well as present it, will be awarded with a Pebble watch.

    The challenge aims for contestants to think out of the box, to think logically about how the system is put together, and how it can be exploited. 
Automated tools and exploits will be of little help and what seems to be secure may turn out not to be. The challenge is designed to be both fun and challenging at the same time. Do you have what it takes?

    Try out your skills and techniques on the Telspace challenge while you are at the summit – you might walk away with a prize. Be sure to visit our stand often as we might drop a clue or two as the summit progresses.


    Details on how to gain access to the system will be provided at the Telspace Systems stand in the exhibition hall, as well as on the coupon in the ITWeb Security Summit booklet. We look forward to seeing you there!



    Please note that the challenge is not open to staff of companies exhibiting at the summit, or their immediate families.


    0 0
  • 05/20/14--09:03: We are hiring! Again!
  • Telspace Systems is expanding rapidly and looking to hire an additional security analyst in South Africa, preferably Gauteng as the office is based in JHB. The analyst should be competent in a combination of the following skills:

    - Web application security,
    - Attack and penetration testing,
    - Network security,
    - Source code reviews,
    - Mobile security.

    Along with these penetration tests and security assessments, you'll be conducting regular security audits from both a logical/theoretical standpoint and a technical/hands-on standpoint.

    If you are interested applying, email us your cv(admin[at]telspace.co.za) or get in touch via www.telspace.co.za ! 


    Tasks include:

    · Performing application penetration testing and application source code review against software applications

    · Conduct vulnerability assessments and penetration testing on Internet-facing and internal client systems
    · Exploit known and unknown vulnerabilities and discover logic flaws.
    · Document technical issues identified during security assessments.
    · Assist with building recommendations for hardening, and maintaining systems used for penetration testing
    · Research cutting edge security topics and new attack vectors

    Desired Skills & Experience:


    · At least 1-2 years experience as a security analyst or relevant experience as a penetration tester.
    - Bsc, Bcom or B degree, preferably MSC.
    · Good technical, analytical, interpersonal, communication and writing skills.
    · Good understanding of attack and defence techniques
    · Excellent self management skills
    · Ability to work both independently and as team lead on individual assessments.
    - Additional information security certifications beneficial (CREST/CISSP/ETC).

    0 0
  • 07/10/14--05:36: CTF - SkyTower 1



  • During the ITWeb Security Summit 2014 and BSides Cape Town 2014 we decided to host a CTF competition whereby the winner could win a pebble watch if they grabbed the correct flag.

    It was a popular challenge during the conferences with many groups of people collaborating to try solve the CTF. At the end of the ITWeb Security Summit we had no winners of the CTF and we therefore rolled it over to BSides in Cape Town. We were lucky enough to have a winner of the CTF in Cape Town (Todor). 



    We were then asked to upload it to VulnHub, so that attendees could look at it at a later date and gain something from the CTF long term.

    Therefore we have released SkyTower 1, you can download it and give it a try at:

    http://vulnhub.com/entry/skytower-1,96/

    If you need some assistance or help getting through the CTF, there are multiple walkthroughs available by the community already - they are in great detail and we are grateful that everyone is enjoying the challenge and interacting with one another to solve problems.

    Please enjoy the CTF and happy hacking!

    You can view walkthroughs by various people at:


    0 0

    This year, Telspace Systems will be speaking at PasswordsCon 14 in Las Vegas, USA.

    PasswordsCon is a place where people from all backgrounds including researchers, specialists, password crackers and security experts gather to discuss and learn about all things Password related. A simple term; “Password” carries a very large impact to humans in today’s world. We use a password to access a wide variety of systems, communication, documents, email and more. With so much advancement in technology and user education one would think that the humble “Password” is now a perfected art amongst people. However it is not as can be seen repeatedly by the breaches occurring throughout the world. When password crackers obtain the plain text to the hashed passwords leaked from websites, it becomes apparent that passwords like “12345”, “Password”, “Password123” and others like it are still very much in use. Raising the questions; Why is it like that? How can we get more secure passwords? Why do people choose insecure passwords? 

    Telspace Systems’s talk at PasswordsCon will answer those questions in the context of one of the most critical areas of impact – The Enterprise. How do large corporates ensure their passwords are secure? How do they ensure their staff choose strong passwords? What about SOA Architecture and Cloud Computing? A large enterprise and corporate IT environment is not only critical but highly complex. We will show you what challenges are faced, how to overcome them and how some companies have both succeeded and failed to do so. We will additionally also cover technical aspects such as what algorithms should corporates use for their systems, and why choosing certain ones can be highly secure but also a pitfall of note. 

    The presentation outline is as follows:

    1. Introduction to Presentation, Speaker BIO and Purpose of the
    Presentation. 
    2. Why is an Enterprise an entirely different scenario to other
    entities that use Passwords? 
    3. Top 5 points of failure - Where do Enterprises make the biggest
    mistakes with their Password usage? 
    4. SOA (Server Oriented Architecture) - When good ideas get bad
    passwords. Discussion into why and what happens? 
    5. Server Administrators in the Enterprise - Friend or Foe? 
    6. Doing it the right way - Simple points to make Passwords in your
    Enterprise a positive security aspect. Is your password policy
    working? 
    7. Q&A & Concluding Comments. 


    Don’t miss this talk on a critical aspect of your company’s security. Presented by our in-house password specialist Dimitri Fousekis. Stick around for the Q&A to ask your questions to both Dimitri and other industry password experts. Additionally look out for us at the Vegas 2.0 gathering where you will have more time to engage in high-level, technical and specific information about passwords and security. 

    0 0

    Telspace Systems’ will offer Wireless Hacking 101 as a certification class to teach information security professionals how to ensure their wireless infrastructures are secure. Hacker Halted will be taking place during October 2014 in Atlanta, USA.


    Due to the explosion of “always-connected” devices, sensitive and classified information have become lucrative targets for exploitation. Wherever you look, people are using laptops, tablets and smartphones, both for personal and business reasons. This opens up massive opportunities for wireless hackers and other types of cybercrime.


    Among these threats, is a rise in ransomware infecting mobile phones, as a recent claim by McAfee reiterates. The interception of data between a wireless device and the website or application the user is using is also lucrative for farming usernames and passwords or attempting to hijack user sessions. Additionally, simply “grabbing” whatever comes through the air to look for interesting files, photos and data is increasingly common.


    Telspace Systems’ Wireless Hacking 101 will be offered as a certification class to teach information security professionals how to ensure their wireless infrastructures are secure. The course will run from 14th-15th October 2014, and will be taking place at the Georgia World Congress Center.  Telspace Systems will be running a two-day course addressing wireless hacking issues ahead of, and in conjunction with, the Hacker Halted IT Security conference.


    The new culture of Bring Your Own Device (BYOD) brings additional security issues to the fore, as businesses have to protect their critical company information on user-controlled devices. Companies are now faced with the problem of personnel bringing in personal cellular access points, often bypassing company security policies and transmitting sensitive data over an unsecured, out-of-band channels. This adds to the list of vectors an attacker could pursue. Since BYOD hardware often contains company sensitive information, it is too a target for attackers either directly or via Wi-Fi attacks.


    This course covers one of the most widely used forms of data transmission available to mankind today – wireless. Wireless Hacking 101 will provide real world, hands-on instruction on not only how to attach wireless, but also how to defend against attacks.


    Students will leave equipped with the knowledge of how to analyze wireless networks, enumerate them, and then attack them. The course is not all theory. After covering the basics and fundamentals of how Wi-Fi works, how encryption works and how clients associate with wireless access points, the course will then examine how to attack them. With in-depth and hands-on instruction, the students will learn to competently hack their way through a wireless network. Challenging assessments, and a “capture-the-flag” examination will ensure students are immersed in this highly technical, but highly rewarding course. Subjects covered will include; Wi-Fi enumeration, WEP and WPA1/2 hacking, obtaining passwords, spoofing and attacking wireless clients and defending against wireless attacks.



    0 0

    Telspace Systems is happy to announce that we will be presenting at the 5th edition of Alligator Security Conference [1] on the 19th and 20th of September 2014. 


    AlligatorCon is an independent and "invite only" Information Security Conference held in Recife, Brazil [2]. 


    Our analyst Marcos Álvares (Head Of Research) will be talking about relations between Source Code Complexity and historical vulnerability data. Marcos will be performing a live demonstration of the proposed technique over the whole Linux Device Drivers source code database! 


    Not much more can be disclosed about the talk as it is a invite only conference, so you'll have to be invited to see the full talk.



    Good luck Marcos!



    0 0
  • 09/23/14--02:37: August tops attack list
  • The number of hacks, breaches and threats worldwide last month was record-breaking - and a clear indication that businesses are still not doing enough to safeguard themselves against cybercriminals.


    itgovernance.co.uk published a list of attacks on their website and claimed August’s list of cyberattacks to be the most lengthy it has seen in a long time.


    According to Dimitri Fousekis, Security Analyst and Team Lead at Telspace Systems, “We at Telspace are not surprised at the surge of cyberattacks in August. Cybercrime is increasing exponentially, and even though a large majority of the attacks culminated overseas, South Africa is far from immune.”


    Fousekis says the escalating number of cyberthreats will only start to decrease once there is enough awareness. “Sure, people know what cybercrime is, and have read about the devastating effects it may have on a company. But it is only after business decision-makers understand how cybercrime can cripple the very foundation of their own operations, and realise that security is a business enabler, will they start to see the urgency of having a strong security framework in place.” 


    According to the website, some of the more prominent cyberattacks for August, included:


    Data Breaches:



    Payment Information:



    Social Media:



    DDoS:



    Other:



    From the above list it is evident that cybercrime is a reality and only set to increase - if businesses let it. It is the responsibility of every organisation to ensure that they are well protected from threats and cybercriminal activity. Practicing ignorance and maintaining a “it won’t happen to me” attitude is no longer acceptable in today’s ever-increasing threat landscape. 


older | 1 | 2 | (Page 3)