El Xiaomi Mi 9 pasa por las primeras pruebas de resistencia: duro como una roca

El Xiaomi Mi 9 es uno de esos terminales que ahora mismo está en boca de todos debido a que, como cada año, su buena relación calidad precio nos hace plantearnos si realmente merece la pena apostar por un flagship tradicional o si bien lo mejor es comprar el buque insignia de Xiaomi. Como suele hacer con todos los topes de gama, JerryRigEverything ha llevado el Xiaomi Mi 9 a

Entra en Andro4all para leer el artículo completo

Puedes unirte a nosotros en Twitter, Facebook o en Google+

¡Suscríbete a nuestro canal de YouTube!

Publicado recientemente en Andro4all

from Andro4all https://ift.tt/2HAEsaR
via IFTTT

How China’s Ban On Importing Waste Has Stalled Global Recycling


How China’s Ban On Importing Waste Has Stalled Global Recycling
China’s decision to no longer be the dumping ground for the world’s recycled waste has left municipalities and waste companies from Australia to the US scrambling for alternatives. But experts say it offers an opportunity to develop better solutions for a growing throwaway culture.

March 13, 2019 at 03:30PM
via Digg https://ift.tt/2HjF8lj

EXT4 y Btrfs tendrán nuevos parches en Linux 5.1

Linux 5.0 ya ha sido lanzado, es el primero de esta nueva numeración desde que se haya abandonado el 4.x en 2019 y ya tenemos incluso un Linux 5.0.1 con actualizaciones en la kernel.org. Pero eso solo es un paso más en el desarrollo del kernel, y el bullicio por mejorar el proyecto open-source continúa con los trabajos en los próximos Release Cadidates del Linux 5.1 que vendrá pronto. De hecho, ya conocemos algunas de las mejoras que se incluirán en ese nuevo kernel.

Entre ellas tendremos importantes cambios en lo que se refiere a los sistemas de archivos o FS como son EXT4 y también para Btrfs, dos de los FS más empelados en el mundo Linux, como sabrás. Concretamente habrá parches para corregir algunas cuestiones de estos sistemas en el futuro kernel. No van a ofrecer grandes cambios en cuanto a características, pero sí que se comprometen a mejorar el actual sistema y también corregir algunos bugs y hacer algunas optimizaciones.

La única nueva característica para EXT4 en Linux 5.1 sería el atributo /sys/fs/ext4/[disco]/journal_task para exponer el sistema de diario del sistema de ficheros, algo que puede ser bueno para los desarrolladores y administradores que contrán con otras posibilidades para moverlo a cgroup o para propósitos de tracing. Eso lo hemos sabido gracias a Ted Ts’o, que así lo ha confirmado, y por otra parte, el desarrollador Dave Sterba ha sido el encargado de Btrfs.

Sobre este otro FS conocemos que habrá algunos cámbios para él, incluido la posibilidad de configurar la compresión Zstd. Eso sería una gran y notable característica para usuarios finales. Además de eso, también se parchearán algunos bugs encontrados que afectan a algunas extensiones, algunso puntos muertos y otros errores menores que ahora se sufren si contamos con los actuales kernels y este sistema de ficheros en nuestras distribucines favoritas.

El artículo EXT4 y Btrfs tendrán nuevos parches en Linux 5.1 ha sido originalmente publicado en Linux Adictos.

from Linux Adictos https://ift.tt/2F9J1qU
via IFTTT

Ad Network Sizmek Probes Account Breach

Online advertising firm Sizmek Inc. [NASDAQ: SZMK] says it is investigating a security incident in which a hacker was reselling access to a user account with the ability to modify ads and analytics for a number of big-name advertisers.

In a recent posting to a Russian-language cybercrime forum, an individual who’s been known to sell access to hacked online accounts kicked off an auction for “the admin panel of a big American ad platform.”

“You can add new users to the ad system, edit existing ones and ad offers,” the seller wrote. The starting bid was $800.

The seller included several screen shots of the ad company’s user panel. A few minutes on LinkedIn showed that many of these people are current or former employees of Sizmek.

The seller also shared a screenshot of the ad network’s Alexa site rankings:

A screenshot of the Alexa ranking for the “big American ad network,” access to which was sold on a cybercrime forum.

I checked Sizmek’s Alexa page and at the time it almost mirrored the statistics shown in the screenshot above. Sizmek’s own marketing boilerplate says the company operates its ad platform in more than 70 countries, connecting more than 20,000 advertisers and 3,600 agencies to audiences around the world. The company is listed by market analysis firm Datanyze.com as the world third-largest ad server network.

After reaching out to a number of folks at Sizmek, I heard back from George Pappachen, the company’s general counsel.

Pappachen said the account being resold on the dark web is a regular user account (not a all-powerful administrator account, despite the seller’s claim) for its Sizmek Advertising Suite (SAS). Pappachen described Sizmek’s SAS product line as “a sizable and important one” for the company and a relatively new platform that has hundreds of users.

He acknowledged that the purloined account had the ability to add or modify the advertising creatives that get run on customer ad campaigns. And Sizmek is used in ad campaigns for some of the biggest brands out there. Some of the companies shown in the screenshot of the panel shared by the dark web seller include PR firm Fleishman-Hillard, media giants Fox Broadcasting, Gannett, and Hearst Digital, as well as Kohler, and Pandora.

A screenshot shared by the dark web seller. Portions of this panel — access to a Sizmek user account — was likely translated by the Chrome Web browser, which has a built-in page translate function. As seen here, that function tends to translate items in the frame of the panel, but it leaves untouched the data inside those frames.

Crooks who exploited this access could hijack existing ad campaigns running on some of the world’s top online properties, by inserting malicious scripts into the HTML code of ads that run on popular sites. Or they could hijack referral commissions destined for others and otherwise siphon ad profits from the system.

“Or someone who is looking to sabotage our systems in a bigger way or allow malicious code to enter our systems,” Pappachen offered.

Pappachen said Sizmek forced a password reset on all internal employees (“a few hundred”), and that the company is scrubbing its SAS user database for departed employees, partners and vendors whose accounts may have been hijacked.

“We’re now doing some level of screening to see if there’s been any kind of intrusion we can detect,” Pappachen said. “It seemed like [the screenshots were accounts from] past employees. I think there were even a couple of vendors that had access to the system previously.”

The Sizmek incident carries a few lessons. For starters, it seems like an awful lot of people at Sizmek had access to sensitive controls and data a good deal longer than they should have. User inventory and management is a sometimes painful but very necessary ongoing security process at any mature organization.

Best practices in this space call for actively monitoring all accounts — users and admins — for signs of misuse or unauthorized access. And when employees or vendors sever business ties, terminate their access immediately.

Pappachen asked KrebsOnSecurity what else could have prevented this. I suggested some form of mobile-based multi-factor authentication option would prevent stolen credentials from turning into instant access. He said the company does use app/mobile based authentication for several of its new products and some internal programs, but allowed that “the legacy ones probably did not have this feature.”

PASSWORD SPRAYING

It’s not clear how this miscreant got access to Sizmek’s systems. But it is clear that attackers have moved rapidly of late toward targeting employees at key roles in companies they’d like to infiltrate, and they’re automating the guessing of passwords for employee accounts. One popular version of this attack involves what’s known as “password spraying,” which attempts to access a large number of accounts (usernames/email addresses) with a few commonly used passwords.

There are technologies like CAPTCHAs — requiring the user to solve an image challenge or retype squiggly letters — which try to weed out automated bot programs from humans. Then again, password spraying attacks often are conducted “low and slow” to help evade these types of bot challenges.

Password spraying was suspected in a compromise reported last week at Citrix, which said it heard from the FBI on March 6 that attackers had successfully compromised multiple Citrix employee accounts. A little-known security company Resecurity claimed it had evidence that Iranian hackers were responsible, had been in Citrix’s network for years, and had offloaded terabytes of data.

Resecurity drew criticism from many in the security community for not sharing enough evidence of the attacks. But earlier this week the company updated its blog post to include several Internet addresses and proxies it says the attackers used in the Citrix campaign. The update stated the attackers had gained access to nearly 32,000 Citrix accounts through password spraying.

Resecurity also presented evidence that it notified Citrix of the breach as early as Dec. 28, 2018. Citrix initially denied that claim, but has since acknowledged that it did receive a notification from Resecurity on Dec. 28. Citrix has declined to comment further beyond saying it is still investigating the matter.

BRUTE-FORCE LIGHT

If anything, password spraying is a fairly crude, if sometimes marginally effective attack tool. But what we’ve started to see more of over the past year has been what one might call “brute-force light” attacks on accounts. A source who has visibility into a botnet of Internet of Things devices that is being mostly used for credential stuffing attacks said he’s seeing the attackers use distributed, hacked systems like routers, security cameras and digital video recorders to anonymize their repeated queries.

This source noticed that the automated system used by the IoT botmasters typically will try several dozen variations on a password that each target had previously used at another site — adding a “1” or an exclamation point at the end of a password, or capitalizing the first letter of whole words in previous passwords, and so on.

The idea behind this method to snare not only users who are wholesale re-using the same password across multiple sites, but to also catch users who may just be re-using slight variations on the same password.

This form of credential stuffing is brilliant from the attacker’s perspective because it probably nets him quite a few more correct guesses than normal password spraying techniques.

It’s also smart because it borrows from human nature. Let’s say your average password re-user is in the habit of recycling the password “monkeybutt.” But then he gets to a site that wants him to use capitalization in his password to create an account. So what does this user pick? Yes, “Monkeybutt.” Or “Monkeybutt1”. You get the picture.

There’s an old saying in security: “Everyone gets penetration tested, whether or not they pay someone for the pleasure.” It’s kind of like that with companies and their users and passwords. How would your organization hold up to a password spraying or brute-force light attack? If you don’t know, you should probably find out, and then act on the results accordingly. I guarantee you the bad guys are going to find out even if you don’t.

from Krebs on Security https://ift.tt/2Ci0pIf
via IFTTT

Android Q Beta 1: TODAS las novedades

La primera beta de Android Q ya está entre nosotros, y no podíamos hacer otra cosa que no fuera lanzarnos de cabeza a instalarla en nuestros dispositivos fuesen cuales fuesen las consecuencias. Por suerte, ninguno de nuestros dispositivos ha resultado herido –de momento–, y ya hemos podido probar algunas de las muchas novedades que traerá consigo la gran actualización del sistema que llegará durante el tercer trimestre de este año.

Entra en Andro4all para leer el artículo completo

Puedes unirte a nosotros en Twitter, Facebook o en Google+

¡Suscríbete a nuestro canal de YouTube!

Publicado recientemente en Andro4all

from Andro4all https://ift.tt/2u6Dkn6
via IFTTT

Los 31 mejores juegos para Android de pago que hoy puedes conseguir gratis o con descuento, ¡date prisa!

El pasado lunes ya seleccionamos 51 ofertas en Google Play, categorizadas entre aplicaciones, juegos y herramientas de personalización de pago para Android. Pero como nunca son suficientes los chollos que los desarrolladores nos ofrecen cada semana, aquí estamos otra vez, con los mejores juegos de pago para Android que, durante las próximas horas, se van a poder conseguir totalmente gratis o con descuento. Esta vez, son XX los juegos que

Entra en Andro4all para leer el artículo completo

Puedes unirte a nosotros en Twitter, Facebook o en Google+

¡Suscríbete a nuestro canal de YouTube!

Publicado recientemente en Andro4all

from Andro4all https://ift.tt/2UAamrx
via IFTTT

Este es el calendario de actualizaciones de Android Q

Google ha lanzado la primera previa para desarrolladores de Android Q, y ya estamos probando las novedades que incluye esta primera versión de la que será la próxima gran actualización del sistema operativo. La beta, disponible para instalar en los dispositivos de las tres generaciones distintas de la serie Pixel, ha llegado por sorpresa después de varios días de espera, y las principales novedades están orientadas a que los desarrolladores

Entra en Andro4all para leer el artículo completo

Puedes unirte a nosotros en Twitter, Facebook o en Google+

¡Suscríbete a nuestro canal de YouTube!

Publicado recientemente en Andro4all

from Andro4all https://ift.tt/2JdZ4b9
via IFTTT

Cómo instalar Android Q Developer Preview 1 en un móvil compatible

Tal y como estaba previsto, Google ha hecho oficial Android Q Developer Preview 1, la primera entrega de la que, en verano de este año, se convertirá en la próxima gran actualización del sistema operativo móvil más usado en el planeta, y cuyas primeras novedades ya hemos podido examinar a fondo. Desde hoy, tanto desarrolladores como aquellos usuarios que deseen probar las últimas novedades implementadas por Google en el sistema

Entra en Andro4all para leer el artículo completo

Puedes unirte a nosotros en Twitter, Facebook o en Google+

¡Suscríbete a nuestro canal de YouTube!

Publicado recientemente en Andro4all

from Andro4all https://ift.tt/2CiC0C9
via IFTTT