The OwnStar attack that hacker Samy Kamkar revealed late last month can be used against not only GM vehicles, but cars manufactured by Mercedes-Benz, BMW, and Chrysler, as well. The attack allows Kamkar to intercept the traffic from nearby mobile phones that have specific apps open that control safety and security features on their vehicles. […]
Monthly Archives: August 2015
Zero Day In Android's Google Admin App Can Bypass Sandbox
Let's School The Presidential Hopefuls On Cybersecurity
Car Immobiliser Easy To Crack, Say Researchers
Stagefright Patch Fails 950 Million Android Devices
Dismantling Megamos Crypto: Wirelessly Lockpicking A Vehicle Immobilizer
The Megamos Crypto transponder is used in one of the most widely deployed electronic vehicle immobilizers. It is used among others in most Audi, Fiat, Honda, Volkswagen and Volvo cars. Such an immobilizer is an anti-theft device which prevents the engine of the vehicle from starting when the corresponding transponder is not present. This transponder is a passive RFID tag which is embedded in the key of the vehicle. In this paper, the authors have reverse-engineered all proprietary security mechanisms of the transponder, including the cipher and the authentication protocol which we publish here in full detail. This article reveals several weaknesses in the design of the cipher, the authentication protocol and also in their implementation.
Signatures, product testing, and the lingering death of AV
Is it time to revalue the role of anti-malware? Maybe, but uninformed or intentionally misleading mutterings about signatures are not where to start.
The post Signatures, product testing, and the lingering death of AV appeared first on We Live Security.
![]()
Kaspersky Lab Names the Best Startups of its First Acceleration Program
CVE-2015-2441 (internet_explorer)
Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka “Memory Corruption Vulnerability,” a different vulnerability than CVE-2015-2452.
CVE-2015-2442 (internet_explorer)
Microsoft Internet Explorer 8 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka “Memory Corruption Vulnerability,” a different vulnerability than CVE-2015-2444.