A newly discovered keystroke side-channel attack has been discovered in Israel, at Ben-Grion University of the Negev. Monikered 'Malboard', the group comprised of Nitzan Farhi, Dr. Yuval Elovici, Ph.D. and led by Dr. Nir Nissim, Ph.D., Director of the David and Janet Polak Family Malware Lab at BGU has published a well-wrought paper at ScienceDirect (Paywall). Today's Information Security MustRead.
Seemingly yearly, we see new printer vectored network attacks due to slovely written code in the printer or the offending machine's drives. Here's the latest debacle courtesy of Hacker Noon on their Medium blog.
'Hacking unsecured printers is easy. Unfortunately, according to a Spiceworks survey only 16% of IT industry respondents think printers are at high risk of a security breach! 43% of surveyed companies ignore printers in their endpoint security approach. Well, what adminstrators don’t know will hurt them. Corporations invest in securing their computing devices. Why not printers?' - via Hacker Noon on Medium
Felix Krause, well-known founder of fastlane, has discovered a procedural + programmatic heretofore undiscussed attack vector of rather gaping proportions... Namely, the capability of any Mac application to leverage connectivity to the desktop screen grab routine (presumably the CGImageRef routine, as reported by Mr. Krause). Bad news for all users of Apple Hardware and software. Indeed. Read Mr. Krause's Open Radar (rdar://37423927) entry. Listen up Apple Inc...
Today's Must Read - Ira Winkler's 'How to Hack a Navel Vessel' - Ira's well-crafted, on-target and plausible thought piece discussing the potential for electronic systems intrusion utilizing a Denial of Service modus related to the four reported damage incidents and the tragic loss of life of our Navy personnel and fellow citizens while United States Navy Vessels were underway.
"To exploit the vulnerability, a criminal would need to pose as the control server, which is possible via ARP spoofing, or by simply connecting the ATM to a criminal-controlled network connection," said Georgy Zaytsev, a researcher with Positive Technologies. "During the process of generating the public key for traffic encryption, the rogue server can cause a buffer overflow on the ATM due to failure on the client side to limit the length of response parameters and send a command for remote code execution." - via John Leyden, at El Reg