Archive for August, 2015


A Dubious Deal with the NSA

Das Bundesamt für Verfassungsschutz in Köln

Internal documents show that Germany’s domestic intelligence agency, the BfV, received the coveted software program XKeyscore from the NSA – and promised data from Germany in return. Continue reading

Document pertaining to the agreement between the NSA and Germany’s domestic intelligence agency BfV

Continue reading

A way to potentially reprogram cancer cells back to normalcy has been discovered by researchers on Mayo Clinic’s Florida campus. The finding, published in Nature Cell Biology, represents “an unexpected new biology that provides the code, the software for turning off cancer,” says the study’s senior investigator, Panos Anastasiadis, Ph.D., chair of the Department of Cancer Biology on Mayo Clinic’s Florida campus. Continue reading

A new biologically inspired “injectable cryogel whole-cell cancer vaccine” combines patient-specific harvested cancer cells and immune-stimulating chemicals or biological molecules to help the body attack cancer. It has been developed by scientists at Harvard’s Wyss Institute and Dana-Farber Cancer Institute. Continue reading

OU astrophysicist and collaborators find supermassive black holes in quasar nearest Earth

Astronomers using NASA’s Hubble Space Telescope have found that Markarian 231 (Mrk 231), the nearest galaxy to Earth that hosts a quasar, is powered by two central black holes furiously whirling about each other.

Continue reading

googleplay

Most Android malware samples can be found clinging to some sort of knockoff to a legitimate application. Hiding in plain sight like that, sometimes they find their way into Google Play or any one of the dozens of less-patrolled Android markets. Continue reading

Our initial implementation of asynchronous offline messaging in Bleep[1] used an encryption scheme which provided authentication and confidentiality, but not forward secrecy[2]. This meant that if the private key of Alice or Bob was compromised, Eve could use the key to decrypt any of their offline messages she had previously captured. Continue reading

image00

On July 1st, 2015, the security team at BitTorrent received a report [1] from Florian Adamsky about Distributed Reflective Denial of Service (DRDoS) vulnerabilities affecting several BitTorrent products making use of UDP-based [2] protocols. uTorrent, BitTorrent and BitTorrent Sync use the Micro Transport Protocol (µTP) [3] implementation in libuTP [4] as the preferred transport backend running on top of UDP.  Continue reading

DoS attacks continue to become increasingly devastating, despite widespread adoption of mechanisms to circumvent IP spoofing1 . In 2013, CloudFlare registered a DDoS bandwidth record by an attack which generated nearly 300 Gbps traffic [36]. A year later, a new record was established by a DDoS attack that generated 400 Gbps [37]. Both these record-setting attacks belonged to a category of DoS attacks where the attacker does not send traffic directly to the victim; traffic is instead sent to reflectors (with spoofed source IP of the victim) which in turn flood the victim with responses.

Continue reading