Under the Hood: Banking Malware

After 48 hours (and two all-nighters in a row) I logged onto the (now really REALLY) infected computer, complete with shiny new malware updates. I surfed to Bank of America’s web page, and found what I was looking for– a Man-In-The-Browser attack in action!

via Under the Hood: Banking Malware » LMG Security Blog.

We cover malware network forensics, web proxies and flow analysis during Days 3-4 of the Network Forensics class. We’ll be teaching next at Black Hat USA, July 27-30. Seats are limited, so sign up soon!

White House effort targets ‘patent trolls’

President Barack Obama spoke about the problem of patent litigation at a recent Google+ hangout, saying that patent trolls “don’t actually produce anything themselves” and instead develop a business model “to essentially leverage and hijack somebody else’s idea and see if they can extort some money out of them.”

via White House effort targets ‘patent trolls’ – Michelle Quinn – POLITICO.com.

BSA Study Demonstrates Open Source’s Economic Advantage

So what this all boils down to is that the fundamental premise of the latest BSA study – that licensed proprietary software is better in many ways than pirated copies – actually applies to open source software even more strongly, with the added virtues that the software is free to try, to use and to modify. That means the potential economic impact of free software is also even greater than that offered by both licensed and unlicensed proprietary software. It’s yet another reason for governments around the world to promote the use of open source in their countries by everyone at every level.

via BSA Study Demonstrates Open Source’s Economic Advantage – Open Enterprise.

Robert McNamara and the Dangers of Big Data at Ford and in the Vietnam War

The use, abuse, and misuse of data by the U.S. military during the Vietnam War is a troubling lesson about the limitations of information as the world hurls toward the big-data era. The underlying data can be of poor quality. It can be biased. It can be misanalyzed or used misleadingly. And even more damning, data can fail to capture what it purports to quantify.

via Robert McNamara and the Dangers of Big Data at Ford and in the Vietnam War | MIT Technology Review.

Apple, betrayed by its own law firm

FlatWorld Interactives sued Apple in April 2012, naming just about every gadget in Apple’s arsenal as a product that infringed its two related patents, said to cover swiping gestures on a touch screen. Over the next three months, the company filed similar lawsuits against LG Electronics and Samsung, against a wide array of smartphones made by those companies.

via Apple, betrayed by its own law firm | Ars Technica.

Haswell is here: we detail Intel’s first 4th-generation Core CPUs

This time around, Intel is actually much more interested in telling us about that lowered power consumption, as is evident in the use of phrases like “biggest [generation-to-generation] battery life increase in Intel history.” By the company’s measurements, a laptop based on Haswell should in some circumstances be able to get as much as a third more battery life than the same laptop based on Ivy Bridge.

via Haswell is here: we detail Intel’s first 4th-generation Core CPUs | Ars Technica.

Haswell is the sort of CPU upgrade we’ve come to expect from Intel: a whole bunch of incremental improvements over last year’s model, all delivered basically on-time and as promised. Again, we’ll need to have test systems in hand to verify all of the lofty claims that the company is making here, but at least on paper Haswell looks like a big push in the right directions. It increases GPU power to fight off Nvidia and AMD, and it decreases overall power consumption to better battle ARM.

Rackspace Adds Brocade’s vRouter

The vRouter is a software-based router that runs on server hardware, so it can do other things — routing (duh) or acting as a virtual private network (VPN) gateway, for instance. The attraction to the firewall piece is that cloud customers previously had been building things like firewalls out of Linux components, says John Engates, Rackspace’s CTO.

via Light Reading – Rackspace Adds Brocade’s vRouter.