More stories

  • in

    Bugs in Chrome's JavaScript engine can lead to powerful exploits. This project aims to stop them

    A new project hopes to beef up the security of V8, a part of the Chrome browser that most users aren’t aware of but that hackers increasingly see as a juicy target.JavaScript makes the web go around and Google has had to patch multiple zero-day or previously unknown flaws in Chrome’s V8 JavaScript engine this year. In April, Google admitted a high severity bug in V8 tracked as CVE-2021-21224 was being exploited in the wild. Chrome has over two billion users, so when zero-day exploits strike Chrome, it’s a big deal. V8, an open source Google project, is a powerful JavaScript engine for Chrome that’s helped advance the web and web applications. V8 also powers the server-side runtime Node.js.    Now Samuel Groß, a member of the Google Project Zero security researchers team, has detailed a V8 sandbox proposal to help protect its memory from nastier bugs in the engine using virtual machine and sandboxing technologies. “V8 bugs typically allow for the construction of unusually powerful exploits. Furthermore, these bugs are unlikely to be mitigated by memory safe languages or upcoming hardware-assisted security features such as MTE or CFI,” explains Groß, referring to security technologies like Microsoft’s Control-flow integrity (CFI) and Intel’s control-flow enforcement technologies (CET). ” As a result, V8 is especially attractive for real-world attackers.”Groß’s comments suggest that even adopting a memory-safe language like Rust — which Google has adopted for new Android code — wouldn’t immediately solve the security problems faced by V8, which is written in C++.  

    He also outlines the broad design objectives but, signaling the size of the project, stresses that this sandbox project is in its infancy and that there are some big hurdles to overcome. But V8 is a Google-led open source project and given that V8 has been the source of security vulnerabilities in Chrome, there is a chance that member of GPZ’s proposal could make it across the line.The issues affect how browser software interacts with hardware beyond the operating system and aims to prevent future flaws in V8 from corrupting a computer’s memory outside of the V8 heap. This would allow an attacker to execute malicious code. One consideration for the additional security protections for V8 is the impact on hardware performance. Groß estimates his proposal would cause an overhead of about “1% overall on real-world workloads”. Groß explains the problem with V8 that stems from JIT compilers that can be used trick a machine into emitting machine code that corrupts memory at runtime. “Many V8 vulnerabilities exploited by real-world attackers are effectively 2nd order vulnerabilities: the root-cause is often a logic issue in one of the JIT compilers, which can then be exploited to generate vulnerable machine code (e.g. code that is missing a runtime safety check). The generated code can then in turn be exploited to cause memory corruption at runtime.”He also highlights the shortcomings of the latest security technologies, including hardware-based mitigations, that will make V8 an attractive target for years to come and hence is why V8 may need a sandbox approach. These include:The attacker has a great amount of control over the memory corruption primitive and can often turn these bugs into highly reliable and fast exploitsMemory safe languages will not protect from these issues as they are fundamentally logic bugsDue to CPU side-channels and the potency of V8 vulnerabilities, upcoming hardware security features such as memory tagging will likely be bypassable most of the timeDespite downplaying the likelihood of the new V8 sandbox actually being adopted, the researcher seems upbeat about its prospects for doing its intended job by requiring an attacker chain together two separate vulnerabilities in order to execute code of their choice. “With this sandbox, attackers are assumed to be able to corrupt memory inside the virtual memory cage arbitrarily and from multiple threads, and will now require an additional vulnerability to corrupt memory outside of it, and thus to execute arbitrary code,” he wrote. More

  • in

    Marvell acquires networking component provider Innovium for $1.1 billion

    Marvell Technologies said Tuesday that it has entered an agreement to acquire networking component provider Innovium in an all-stock deal valued at $1.1 billion. Marvell’s key interest in Innovium revolves around its switching architecture for cloud and edge data centers, which Marvell intends to use to bolster its networking portfolio for cloud computing customers.

    Marvell’s purchase of Innovium marks its second acquisition on less than a year that’s focused on the networking space. In October, Marvell bought Inphi, a developer of optical networking chips used in cloud data centers and by wired and wireless carrier networks for 5G infrastructure, in a $10 billion deal that signaled further consolidation in the semiconductor industry. Marvell said its acquisition of Inphi would create a semiconductor “powerhouse” with an enterprise value of roughly $40 billion. Technologically, Marvell planned to combine its storage, networking, processor, and security portfolio, with Inphi’s electro-optics interconnect platform. Going forward, Marvell plans to integrate Innovium and Inphi products to develop performance optimized switch silicon for use in hyperscale data centers. Marvell also announced that Innovium was chosen as a key technology supplier by a Tier 1 cloud customer, and that the deal will spur a significant revenue ramp in calendar 2022.Innovium is also in talks with several other cloud data center customers in building out their future network architectures, Marvell said.”Our acquisition of Innovium and its complementary offerings further extends Marvell’s leadership in the cloud, and I am excited that Innovium has secured significant share at a marquee cloud customer,” said Marvell CEO Matt Murphy. “Innovium has established itself as a strong cloud data center merchant switch silicon provider with a proven platform, and we look forward to working with their talented team who have a strong track record in the industry for delivering multiple generations of highly successful products.”

    Marvell expects the acquisition of Innovium to add approximately $150 million in incremental revenue next fiscal year.  More

  • in

    Google Cloud Security joins Exabeam-led cybersecurity alliance

    Exabeam and seven other cybersecurity companies announced the creation of the XDR Alliance on Tuesday, touting the effort as a way to help downstream SecOps teams. Google Cloud Security, Mimecast, Netskope, SentinelOne, Armis, Expel and ExtraHop joined Exabeam in founding the alliance centered on XDR — short for extended detection and response framework and architecture. The companies said the end goal of the partnership is to “enable organizations everywhere to protect themselves against the growing number of cyber attacks, breaches, and intrusions” by helping security teams evolve and ensuring interoperability across the XDR security vendor solutions set.The alliance will also work together on campaigns to popularize XDR and assist SecOps teams in integrating “new and evolving applications and technologies.”Gorka Sadowski, chief strategy officer at Exabeam and founder of the XDR Alliance, said the XDR Alliance “brings together the most forward thinking names in cybersecurity to collaborate on building an XDR framework that is open and will make it easier for security operations teams to protect and secure their organizations.””History will look back and declare how well the cybersecurity industry succeeded in putting collaboration above competition to help protect our organizations and institutions,” Sadowski said. “We are at an inflection point with an extremely fragmented industry that requires all of us in the vendor community to come together to strengthen organizations’ SOCs.”The alliance created a three-tier model that focuses on the core components of the XDR technology stack. The three tiers include data sources/control points, XDR Engine, and content.

    “Data sources/control points refers to the security tooling that generates telemetry, logs and alerts, and that act as control points for response. The XDR Engine tier is the engine that ingests all the collected data and performs broad threat detection, investigation and response for SOC operations,” the alliance said in a statement.  “The Content tier includes the pre-packaged content and workflows that allow security organizations to deliver on required use cases with maximum efficiency and automation.”Part of what drew the cybersecurity companies to the alliance is that each represents one of the subcategories under SecOps, which include network detection and response, security information and event management, security analytics, identity management and more.Sunil Potti, Google Cloud VP and GM of Cloud Security, explained that security operations teams are demanding more from their tools as the threat landscape continues to grow. Organizations now need a platform to cost effectively store and analyze all of their security data in one place and investigate and detect threats with speed and scale, Potti said, adding that enterprises now need the ability to store vast amounts of data, analyze and correlate the data from siloed solutions in order to adequately detect and respond to emerging threats within their environments.”We are looking forward to joining the XDR Alliance to help build an inclusive and open XDR framework that gives our joint customers a pathway to the best-in-class Security Operations Centers (SOCs) in the Cloud,” Potti said. There is an XDR Alliance member application page for organizations interested in joining. Exabeam CEO Michael DeCesare added that many of the companies share customers and are looking to improve the SOC experience. The emergence of “covert AI and automated attacks” as well as other threats prompted the companies to unite, DeCesare explained.  More

  • in

    Raccoon stealer-as-a-service will now try to grab your cryptocurrency

    Raccoon Stealer has been upgraded by its developer in order to steal cryptocurrency alongside financial information. 

    On Tuesday, Sophos released new research into the stealer-as-a-service, a bolt-on for threat actors to use as an additional tool for data theft and revenue. In a new campaign tracked by the team, the malware was spread not through spam emails — the usual initial attack vector linked to Raccoon Stealer — but, instead, droppers disguised as installers for cracked and pirated software.  Samples obtained by Sophos revealed that the stealer is being bundled with malware including malicious browser extensions, cryptocurrency miners, the Djvu/Stop consumer ransomware strain, and click-fraud bots targeting YouTube sessions.  Raccoon Stealer is able to monitor for and collect account credentials, cookies, website “autofill” text, and financial information that may be stored on an infected machine. However, the upgraded stealer also has a “clipper” for cryptocurrency-based theft. Wallets, and their credentials, in particular, are targeted by the QuilClipper tool, as well as Steam-based transaction data. “QuilClipper steals cryptocurrency and Steam transactions by continuously monitoring the system clipboard of Windows devices it infects, watching for cryptocurrency wallet addresses and Steam trade offers by running clipboard contents through a matrix of regular expressions to identify them,” the researchers noted. 

    The stealer operates through a Tor-based command-and-control (C2) server to handle data exfiltration and victim management. Each Raccoon executable is tied with a signature specific to each client.  “If a sample of their malware shows up on VirusTotal or other malware sites, they can trace it back to the customer who may have leaked it,” Sophos says.  Raccoon is offered as a stealer-for-hire, with the developers behind the malware offering their creation to other cybercriminals for a fee. In return, the malware is frequently updated.  Usually found in Russian underground forums, Raccoon has also been spotted for the last few years in English language forums, too — for as little as $75 for a weekly subscription. According to the researchers, over a six-month period, the malware was used to steal at least $13,000 in cryptocurrency from its victims, and when bundled with miners, a further $2,900 was stolen.  The developer earned roughly $1200 in subscription fees, together with a cut of their user’s proceeds.  “It’s these kinds of economics that make this type of cybercrime so attractive — and pernicious,” Sophos says. “Multiplied over tens or hundreds of individual Raccoon actors, it generates a livelihood for Raccoon’s developers and a host of other supporting malicious service providers that allows them to continue to improve and expand their criminal offerings.” Previous and related coverage Have a tip? Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0 More

  • in

    Get a lifetime VPN subscription and 10TB of cloud backup for under $65

    These are dangerous times for our data. We not only need to protect our files from our own carelessness but also our sensitive information from being stolen online. The Lifetime Backup & Security Subscription Bundle covers all of that, so we never need to worry about it again.

    As always, we need to be careful about backing up our files, to avoid the chaos that would result from losing them. And the easier that chore is, the more likely we are to perform it. Degoo Premium: Lifetime 10TB Backup Plan not only provides high-speed data transfers with the ultimate security of 256-bit AES encryption, but it duplicates your backup even as you are performing it, giving you twice the amount of protection against data loss. Best of all, the generous 10TB storage will save you from the frustration of constantly having to purge files because you’re running out of space.Degoo has a 4.4 out of 5-star rating among more than 595,000 reviews on Google Play and a rating of 4.5 out of 5 stars from 6,500 reviewers on the App Store.The second part of this bundle is KeepSolid VPN Unlimited: Lifetime Subscription (5 Devices). KeepSolid is the bestselling VPN of all time for good reason. It has no limits on speed or bandwidth and offers access to over 500 servers in more than 80 locations around the world, plus the utmost security and privacy. You get military-grade encryption, a kill switch, and a strict zero-logging policy.KeepSolid VPN is well-loved by both users and reviewers. The service has over 10 million customers worldwide, PCMag named it Top VPN and Laptop Review Pro awarded it “Best VPN for Laptop”. Tech.Co explains why: “From its simple interface to its genuinely practical features, VPN Unlimited has plenty to recommend it.”The services in this would normally cost $3,799. For a limited time only, get The Lifetime Backup & Security Subscription Bundle for $62.99 with code ANNUAL30.

    ZDNet Recommends More

  • in

    Supply chain attacks are getting worse, and you are not ready for them

    The European Union Agency for Cybersecurity (ENISA) has analyzed 24 recent software supply chain attacks and concluded that strong security protection is no longer enough. Recent supply chain attacks in its analysis include those through SolarWinds Orion software, CDN provider Mimecast, developer tool Codecov, and enterprise IT management firm Kaseya. ENISA focuses on Advanced Persistent Threat (APT) supply chain attacks and notes that while the code, exploits and malware was not considered “advanced”, the planning, staging, and execution were complex tasks. It notes 11 of the supply chain attacks were conducted by known APT groups. 

    “These distinctions are crucial to understand that an organization could be vulnerable to a supply chain attack even when its own defences are quite good and therefore the attackers are trying to explore new potential highways to infiltrate them by moving to their suppliers and making a target out of them,” ENISA notes in the report. SEE: Network security policy (TechRepublic Premium)The agency expects supply chain attacks to get a lot worse: “This is why novel protective measures to prevent and respond to potential supply chain attacks in the future while mitigating their impact need to be introduced urgently,” it said.ENISA’s analysis found that attackers focused on the suppliers’ code in about 66% of reported incidents. The same proportion of vendors were not aware of the attack before it was disclosed. 

    “This shows that organisations should focus their efforts on validating third-party code and software before using them to ensure these were not tampered with or manipulated,” ENISA said, although this is something easier said than done.As the Linux Foundation highlighted in the wake of the SolarWinds disclosure, even reviewing source code – for both open source and unaudited proprietary software – probably wouldn’t have prevented that attack. ENISA is calling for coordinated action at an EU level and has outlined nine recommendations that customers and vendors should take. Recommendations for customers include:identifying and documenting suppliers and service providers;defining risk criteria for different types of suppliers and services such as supplier and customer dependencies, critical software dependencies, single points of failure;monitoring of supply chain risks and threats;managing suppliers over the whole lifecycle of a product or service, including procedures to handle end-of-life products or components;classifying of assets and information shared with or accessible to suppliers, and defining relevant procedures for accessing and handling them.ENISA recommends suppliers:ensure that the infrastructure used to design, develop, manufacture, and deliver products, components and services follows cybersecurity practices;implement a product development, maintenance and support process that is consistent with commonly accepted product development processes;monitor security vulnerabilities reported by internal and external sources, including third-party components;maintain an inventory of assets that includes patch-relevant information.The SolarWinds attack for example rattled Microsoft whose president Brad Smith said it was the “largest and most sophisticated attack the world has ever seen” and that it probably took 1,000 engineers to pull off. Alleged Russian intelligence hackers compromised SolarWinds’ software build system for Orion to plant a backdoor that was distributed as a software to several US cybersecurity firms and multiple federal agencies. SEE: The cybersecurity jobs crisis is getting worse, and companies are making basic mistakes with hiringThe US Department of Justice (DoJ) revealed last week that 27 districts’ Microsoft Office 365 email systems were compromised for at least six months beginning in May 2020.The rise of state-sponsored supply chain attacks and criminal ransomware attacks that combine supply chain attacks, such as the Kaseya incident, has shifted the focus of discussions between the US and Russia. US president Joe Biden last week said a major cyberattack would be the likely cause of the US entering a “real shooting war” with another superpower.  More

  • in

    Can AI improve your pickup lines?

    Can AI help people enhance their online dating game? Would you trust a computer with your digital pickup lines?A team at Medzino, a digital health and wellness clinic, had some fun prompting OpenAI’s GPT-3 language prediction model to generate dating advice for different situations. For good or ill, we’re seeing a lot of these “research” applications of GPT-3, which are decidedly unscientific but do gesture at some of novel uses of AI waiting for us just down the road. it’s also a good illustration of the severe limitations of a context-based text predictor that scrapes the internet to come up with the most probable answer.  The team surveyed over 700 singles to see how well the AI did with pickup lines and general dating tactics and decorum. The results were … interesting. One takeaway: Coffee is still king when asking someone out. A study of 5.5 million dating app users confirmed coffee is the most popular first date option. In the Medzino research, both women and men found lines generated by GPT-3 asking a prospective romantic interest out for coffee to be effective. Even with the safe bet of a house brew, however, the more presumptuous of the lines scored poorly.Things get a little more complex when relying on GPT-3 for advice on post hookup tactics. One of the AI’s suggestions for your post hookup text was a message indicating how much you want to see your partner again. That suggestion ranked low with surveyed female respondents, with only 25% of women thinking it was a good move. By contrast, 40% of men thought it was a good tactic. OpenAI has been careful to root out bias in its public-facing app, but it’s entirely possible the data set, which is essentially all the text on the internet, makes bias inevitable, as this disparity seems to indicate.The possibility that AI will help humans find new entry points into the philosophical questions that have long vexed us has long intrigued futurists. Whether soulmates exist or not rise to the level of Cartesian dualism, but the GPT-3’s answer is still interesting:”In my opinion, it is a myth that the right person will come along at the right time. You have to create the right situation for you and your partner. It may not be the same situation as your friends and your family, but it is what works for you. If you are happy, then you can be a better parent or friend to others.”

    Notably, only 8% of women and 10% of men agreed with all of that statement, though the majority of respondents agreed with most or some of it.And that, in a nutshell, is why these research projects, however entertaining they may be, probably aren’t all that illuminating. GPT-3 plays it right down the middle, prioritizing the most probable answer to given questions. The responses, therefore, should fall into the sweet spot of the bell curve for any survey. In other words, there’s little chance of a surprise when you ask GPT-3 a question. That consistency may be helpful for some, but as in all things, mastery in love ought to come with a flare for the unexpected. More

  • in

    Best Houston internet providers 2021: Top ISP options

    Houston is a big city, home to Beyoncé, NASA, the Astrodome, and a population of more than two million. Because of its size, Houston has attracted a wide variety of internet providers, and residents may even find a fair amount of hard-to-come-by fiber-optic service options. We’ve spent months researching the nation’s largest providers and found four of the most popular and reliable options for internet in Houston. You’ll likely have a few internet options for your address, but particulars will depend on your exact location. The best internet for you will depend on the internet speed you need, and how you prioritize package perks and customer service.

    Best customer service

    Shutterstock

    One of AT&T’s strongest coverage regions is in Houston. Its DSL service has nearly 100% availability in the city, and its fiber-optic service even has about 40% availability in Houston. Both connection types offer impressive speeds, but DSL will work best for smaller households and mild internet activity. Be aware, though, for some addresses, you can’t get more than 25 Mbps on a DSL plan — not really enough if you like to stream 4K video, stream on multiple screens, or transfer large files. AT&T’s fiber-optic service, on the other hand, can offer up to 1,000 Mbps of internet speed — fast enough to support a house full of smart tech, streamers, and online gaming. AT&T plans come with a generous data cap too: 1TB (1,000 GB), which is a lot of data — enough to stream 6 hours of 4K video every day. AT&T also has a stellar reputation for customer service, often winning awards from J.D. Power and topping the American Customer Satisfaction Index rankings. New customers may also receive promotions like free Wi-Fi equipment and no installation fees.

    View Now at AT&T

    Fastest max speeds

    Shutterstock

    With 93% availability in Houston, Xfinity is likely one of your options for internet service. The provider uniquely offers an extensive range of package options — you can find speeds as slow as 10 Mbps for some simple web browsing or as fast as 200 Mbps for streaming HD video. And even more importantly, Xfinity has a track record of delivering those speeds: Both Speed Test and Netflix ranked it as one of the fastest providers. You can also easily bundle your internet with a variety of TV service packages, often starting at $5. Though Xfinity doesn’t have the best reputation for customer service, it’s far from the worst out there. In J.D. Power’s internet study, Comcast placed above Cox Communications, Optimum, Spectrum, and Frontier Communications in the East region.

    View Now at Xfinity

    Best for cheap internet

    Shutterstock

    About 50% of Houston neighborhoods have Frontier as an option for their internet service. Frontier offers both fiber-optic and DSL connections, although most addresses won’t have access to both. Most of Houston will be offered DSL connections of around 6 Mbps to 15 Mbps — all with unlimited data usage. Those speeds aren’t the highest in the area, but all of Frontier’s plans come with no-contract and a two-year price lock. This means you get two years of service at the same price, without being locked into a contract. Most providers charge extra for contract-free plans. Frontier has a pretty poor customer service reputation, but if you can handle a few frustrating phone calls, there’s surprising value in its packages. If you’re looking for some bargain internet service, Frontier offers a great deal and simple speeds.

    View Now at Frontier Communications

    Popular regional provider

    Shutterstock

    EarthLink is the largest DSL provider in the United States and services nearly 60% of Houston. The actual speed offerings vary by address. Some areas have access to fiber-optic speeds as fast as 1,000 Mbps, while others max out at 12 Mbps with DSL. No matter the speed plan, all of EarthLink’s packages come without a data cap, meaning you can stream, game, and download without worry. Its customer service is pretty hit or miss, so we recommend asking neighbors or friends who use EarthLink about their experience. EarthLink also doesn’t have TV service, so you won’t find any bundling deals and will have to get separate TV service from another provider. Be advised that EarthLink doesn’t score very high for convenience: You’ll have to call to order service and get details on your options, which means a bit more legwork when you’re shopping around.

    View Now at EarthLink

    What are the key differences between Houston’s best internet providers?

    AT&TXfinityFrontierEarthlinkConnection typeFiber-optic, DSLCableFiber-optic, DSLFiber-optic, DSLDownload speeds (Mbps)DSL: 50-100 Fiber: 100-1,000Cable: 10-350DSL: 24-45 Fiber: 500DSL: 15-80 Fiber: 100-1,000Prices starting at$40/mo.$30/mo.$20/mo.$50/mo.Contract length1 year, 2 yearsMonth to month 1 year 2 yearsNone1 yearData cap1 TB1 TBNoneNoneJ.D. Power Customer Satisfaction Score5/53/52/5N/A

    How did we choose the best internet providers in Houston?

    There are a few key features we considered when searching for the best internet provider.Coverage. There’s a fair chance you won’t have many options when choosing an internet provider. The Institute for Local Self-Reliance reported that about 39% of Americans have access to only one broadband internet provider. We generally favored providers with a wider range of coverage and a chance of serving you. For Houston in particular, we looked at the providers that covered the largest percentage of the city.Value. We researched each provider’s offerings and the value they offer consumers. This includes the range of speeds, additional package perks, contract lengths, and data caps. The best internet provider will come with reliable speeds, fair prices, generous data caps, and clear contracts.Customer Satisfaction. Internet providers are some of the most notorious services for having poor customer care. We used customer satisfaction ratings from the American Customer Satisfaction Index (ACSI) and J.D. Power to gauge each company’s reputation. Higher scoring companies were favored for their proven ability to satisfy customers in metrics like reliability, billing, communication, and value. While most providers didn’t exactly score highly, we looked to see which providers were above the industry average.You can read more about the search in our full methodology page.

    Can you get fiber internet in Houston?

    Fiber-optic internet is expensive to build out and not many providers have invested in expanding the technology. Luckily, Houston is a big city and has attracted a fair number of fiber providers. You’ll need to check with your specific address, but both AT&T and Frontier offer some fiber-optic internet access in Houston.

    How much does internet cost in Houston?

    There are a lot of factors that influence the price of your internet plan — the speed you choose, your location, current promotions, etc. Many internet packages in Houston start around $30 and can be as expensive as $100+ depending on the plan you choose.

    What should you look for when shopping for internet?

    You can read more about shopping for internet providers in our guide.

    ZDNet Recommends More