GPS News  
Google "gadgets" called gateways for hackers

Hackers can resort to a tactic of luring people to websites that trick people into installing applications in iGoogle home pages. A hacker can remotely control a victim's computer as long as the iGoogle page is open.
by Staff Writers
Las Vegas, Nevada (AFP) Aug 8, 2008
Hackers turned computer security specialists accuse Google of setting users up for online disasters by letting them personalize home pages with applications that could be tainted.

Software that hackers can trick people into installing on "iGoogle" home pages can track users' activities and control their machines, SecTheory chief executive Robert Hansen showed AFP on Friday.

"I could force you to download child porn or send subversive material to China," Hansen said. "The exploitation is almost limitless. Google has to fix it."

Google lets people customize iGoogle home pages with mini-software programs called "gadgets" such as to-do lists, news feeds, currency converters, and calendars.

Hackers can program malicious code into proffered gadgets or break into systems hosted by engineers providing legitimate mini-programs.

"It turns out a lot of people who develop these things aren't good at security," Hansen said, citing research he and Cenzic security analyst Tom Stracener shared at a notorious annual DefCon hacker gathering in Las Vegas.

"We pretty much break into anything we try."

Hackers can resort to a tactic of luring people to websites that trick people into installing applications in iGoogle home pages. A hacker can remotely control a victim's computer as long as the iGoogle page is open.

Gmail users face danger from the same "hole" in security, according to Hansen, whose hacker name is "RSnake."

"We've been telling Google about these vulnerabilities for years and they have not made corrective actions," Hansen said.

"They chose to open the doors and insomuch put a lot of consumers at risk."

Google says it checks gadgets for malicious code, rarely finding any, and that it removes tainted programs.

Typos can bedevil online political campaigns
Las Vegas (AFP) Aug 7 - Typos can bedevil online political campaigns by letting evil software wizards or crafty king-makers turn misspellings into opportunities for sabotage or theft, a security specialist warned Thursday.

In a practice referred to as "typo squatting" people not connected to campaigns can buy rights to Internet addresses with candidates' names misspelled and use them to malign, mock or steal from contenders.

"You can guarantee that more of these will become common in future elections," Oliver Friedrichs, director of emerging technologies at Symantec's security response unit, said while detailing such attacks at a premier Black Hat conference in Las Vegas.

"More than likely the people who do this are the extremists or people who are in it for a profit. Campaigns need to become more aware of these kinds of attacks."

For example, a Symantec check in February revealed that 47 out of 160 variations on "www.barackobama.com" were being "typo-squatted."

Ironically, one squatter's web page featured a legitimate Obama ad.

"Obama is paying for advertisements, through Google, on a site that is a typo-squatter on a domain name the Obama campaign should own in the first place," Freidrichs said.

"Campaigns are spending a lot on online advertising and some of this money is really being misspent and going to typo-squatters."

Some typo-squatters use the web pages to mock or deride candidates. A "hillaryclingon.com" website poked fun at her and other candidates by depicting them as characters from "Star Trek" films and television shows.

"Typoed" web pages can be used to spread false announcements, such as a candidate withdrawing from a race, or tell stories of scandals that don't exist.

A candidate who has dropped out of the US presidential race was accused of being an animal killer on a typo-squatted website.

Malicious software secretly planted in computers of people who visit squatted websites could reveal where they go online or even take control of machines.

"If I want to attack supporters of a particular campaign I can easily put malware on my site," Freidrichs said of typo-squatters.

"You can target candidates, cause confusion, pop-up ads, or re-direct computers when they try to log on to a candidate's website."

Typo-squatters can create realistic looking campaign websites and take donations, keeping the cash and using credit card information for further fraud.

Online donations intended for one candidate could be routed to an opponent without donors knowing.

Once someone owns a website based on a typo, they can also intercept and redirect similarly misaddressed emails.

Campaign emails containing speech drafts, contributions, or strategy notes could be intercepted due to errant keystrokes while typing addresses, according to Freidrichs.

"This is a serious problem that spans not only campaigns but every company with email," Freidrichs said.

"Even more scary, we went and looked at defense contractors and found a typoed domain routed to India and another routed to China."

Related Links
Cyberwar - Internet Security News - Systems and Policy Issues



Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News


French reporters booted from US computer security conference
Las Vegas, Nevada (AFP) Aug 7, 2008
Reporters from an online French magazine were booted from the world's premier computer security conference Thursday after reportedly hacking a press room network and stealing peers' passwords.







  • NASA evaluates new wing sensor
  • Russia And China May Co-Design New Passenger Plane
  • China Southern Airlines managers take paycut due to oil prices
  • British PM blasts polluting 'ghost' flights

  • Compressed air cars eyed by industry
  • GM to export hybrid SUV to Europe, China, Middle East
  • Nissan Motor unveils new prototype electric car
  • Monash Fuels Next Gen Hybrid Cars

  • Boeing Awarded E-6B Upgrade Contract
  • Defense Support Program Satellite Decommissioned
  • Raytheon Bids For USAF Command And Control Contract
  • Northrop Grumman Demonstrates Multi-Function Electronic Warfare System

  • LockMart Team Completes Testing Of Propulsion Component On MKV-L
  • BMD Focus: Offshore Scud threat
  • US considers deploying missile defense radar to Israel
  • Outside View: BMD deal lessons -- Part 2

  • Ethical coffee helps save Peruvian rainforest
  • No Evidence To Support Organic Is Best
  • TAU Researchers Root Out New And Efficient Crop Plants
  • No-Tillage Plus

  • Teacher sent to labour camp for China quake photos
  • Over 600,000 evacuated as tropical storm hits China: reports
  • China insurers expect 1.5 bln dlrs in snow, quake claims: officials
  • Japanese say careful preparations saved them from quake

  • Researchers Analyze Material With Colossal Ionic Conductivity
  • Argonne Scientists Discover New Class Of Glassy Material
  • Satgate Contracts Four Transponders At New SES ASTRA Orbital Position
  • Scientist says feathers are future of Asia construction

  • Robo-relationships are virtually assured: British experts
  • Europe And Japan Join Forces To Map Out Future Of Intelligent Robots
  • NASA Robots Perform Well During Arctic Ice Deployment Testing
  • Eight Teams Taking Up ESA's Lunar Robotics Challenge

  • The content herein, unless otherwise known to be public domain, are Copyright Space.TV Corporation. AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space.TV Corp on any Web page published or hosted by Space.TV Corp. Privacy Statement