SPYRUS NEWS : Providing Very Strong Security In This Insecure World , Grab The Security Now.

SPYRUS SEMS provides a very strong security and productivity solution for any organization deploying SPYRUS encrypting secure storage drives and/or our Microsoft certified bootable Windows  To Go Live Drives. While these drives provide the strongest Data-at-Rest protection when used by the mobile workforce, organizations are faced with another challenge that is the management, audit and policy enforcement of these high capacity, small form factor devices. SEMS solves that problem. SEMS was designed to operate on the Windows server ecosystem on premise or on Microsoft Azure with ability to scale from proof of concept with a small number of devices to deployments with tens of thousands of devices under management.

SEMS extends a true end-to-end security approach to mobile users to protect data at rest; in transit and enabling the enterprise to comply with government regulations. With SEMS device management, enterprise administrators can centrally register, block/unblock, revoke, set policies, audit, and “kill” the SPYRUS hardware encrypted devices.

SPYRUS delivers innovative encryption solutions that offer the strongest protection for data in motion, data at rest and data at work. For over 20 years, SPYRUS has delivered leading hardware-based encryption, authentication, and digital content security products to government, financial, and healthcare enterprises. To prevent the insertion of untrusted components, patented Secured by SPYRUS security technology is proudly designed, engineered, and manufactured in the USA to meet FIPS 140-2 Level 3 standards. SPYRUS has collaborated closely with Microsoft to deliver certified portable platforms for Windows 7, Windows 8, Window 8.1. and Windows 10. SPYRUS is headquartered in San Jose, California. See for more information.


Grab Your USB Drive now and be a part of the best secure cyber security world.

Anyone Can Find Your Aadhar Data Due To Vulnerability Claims French Security Researcher.

Vulnerability in mAadhaar Android app allows anyone to steal your Aadhaar data, finds French security researcher

Vulnerability in mAadhaar Android app allows anyone to steal your...
After an investigation by a leading English news daily in India discovered how Aadhaar details of the entire country were being sold at Rs 500, a French security researcher found yet another massive loophole that allows anyone with basic programming knowledge to break into the mAadhaar Android app and steal user data.
The French-researcher alias Eliot Alderson who goes by the handle @fs0c131y on Twitter revealed in a thread of Tweets how the password to the local database which the mAadhaar app uses to store sensitive information like your biometric preferences, KYC profile data, and user passwords, can be easily acquired. Essentially, if someone has access to your phone, your Mobile Aadhaar PIN can be compromised with ease.
Also Read : mAadhar Hardcoded PassWord - Hacker Ritz
We reached out to the researcher who said that the mAadhaar app uses a local database on the phone to store information like your password, app preferences and the likes. It’s a common practice by developers to do so. That local database is protected by a password which is randomly generated. However, @fs0c131y found that the way to generate this password randomly is poorly written.

The app is saving your biometric settings in a local database which is protected with a password. To generate the password they used a random number with 123456789 as seed and a hardcoded string db_password_123 🤦‍♂️

Essentially, the password is generated using a random number with the seed as “123456789” and a hardcoded string “db_password_123” which remains the same for every phone. Using this, anyone with access to your phone can break into the app and get your user password and basically, get access to all your demographic and biometric details.

A lot of people asking me how bad is the generation of the local database password in the .

I published a small POC here: 

If you start the application multiple times you will see that the generated password are always the same

The researcher even made a proof-of-concept on Github to demonstrate the flaw. He made an application with the same code so that if you run it multiple times, it will give you the same password over and over again instead of the randomised password the app is supposed to generate. 

Storing data in a local database is a common practise in the world.

In the app they store:
- user password data (hash)
- notification
- Ki value
- EKYC Profile Data
- Biometric Prefs
- Bio Lock Timeout
- App Configuration

The mAadhaar app, @fs0c131y found, stores your photograph on the local database, which is a biometric information by itself, apart from your eKYC profile data, and more. Furthermore, the eKYC profile data stores the user ID, the Aadhaar ID, your name, date of birth, gender, address and your photograph.
The researcher uses an alias Elias Alderson, which is the name of the protagonist of Mr. Robot, a popular TV series about cyber security and hacking. He had earlier found a backdoor on OnePlus devices which granted hackers with root access and other sensitive information with ease.
The researcher even shared the information with UIDAI that supervises the Aadhaar project in the country. However, the last time a reporter tried to inform the authority about a breach in the Aadhaar system, the regulatory body filed an FIR against her. It remains to be seen how UIDAI handles the new revelation and more importantly, what steps the authority takes to remedy the issue and make the app secure.
The mAadhar Hardcoded PassWord - Hacker Ritz can be get from here - Special report from One Of The World's Best Cyber Security News Editor.
via Digit

Feedspot ranked Top 40 Cyber Security News Websites And Hacker Ritz Is In The List ! Celebration Time !

Few days back, Feedspot ranked Top 40 Cyber Security News Websites/Blogs out of thousands of blogs from all over the World.
Feedspot  is a Modern RSS Reader. If you're trying to keep up with news and content on multiple web sites, you're faced with the never ending task of visiting those sites to check for new content. Feedspot allows you to put all of your reading in one location.

In the previous listing of Feedspot of Top 100 Infosec Blogs we secured #95 position.
Our Blog Hacker Ritz is also in the list of Top 100 Infosec Blog all over the World with a ranking of #96.

and now Feedspot again make a listing of Top 40 Cyber Security News Website and here we are awarded with a rank of #33 across the globe.

Crypto Mining Crackdown By China Threatens Bitcoin's Future

With its price dropping, sky-high transaction fees, growing tractionamong competitors, and regulatory agencies taking action in several countries, Bitcoin is starved for good news. Today marked another blow against dominant cryptocurrency: China is working to rid itself of bitcoin mining companies.

As Reports:
Chinese authorities outlined proposals this week to discourage bitcoin mining — the computing process that makes transactions with the cryptocurrency possible. Officials plan to limit the industry’s power use and have asked local governments to guide miners toward an “orderly” exit from the business, people familiar with the matter said [...] Miners have until recently flocked to China because of the country’s inexpensive electricity, local chipmaking factories and cheap labor. They now have little choice but to look elsewhere.
Mining is the process by which sets of bitcoin transactions—called blocks—are verified and added to the blockchain ledger. That verification relies on having powerful computers solve difficult math problems—with a correctly solved block netting a payout in bitcoin.
Always-on hardware performing intensive computations has steered the trend in mining over Bitcoin’s nine years away from individuals with dedicated laptops and towards syndicates using specialized hardware (called ASICs) in countries with cheap electricity. The confluence of those needs has thus far been met largely in China.
There’s another problem, and it’s one that’s baked into how Bitcoin functions. When it first debuted, the reward for mining a block was 50 BTC. Today it stands at 12.5, having gone down by half in November of 2012, and again in July of 2016. It’s expected to fall to 6.25 BTC in June of 2020.
That’s further complicated by another feature of Bitcoin: the difficulty of those problems thousands of ASICs are humming away to solve generally increases every 2016 blocks.
Around five years ago, it no longer made financial sense for individual Bitcoin enthusiasts to invest in mining. The probability of successfully solving a block was past parity with the cost of running the firetrap hobbyist equipment required to play. With China divesting itself of the mining industry, the enormous amount of electricity soaked up by professional hardware and diminishing return on investment suggests the margins these companies operate on will be razor thin—and trending towards nonexistent.
And without miners to validate bitcoin transactions, the “future of money” is dead in the water.

Hackers Can Steal All Your Passwords Through The Pre-Installed Password Manager On Windows 10

Hackers Can Steal All Your Passwords Through The Pre-Installed Password Manager On Windows 10 

If you are running Windows 10 on your PC, then there are chances that your computer contains a pre-installed 3rd-party password manager app that lets attackers steal all your credentials remotely.

Starting from Windows 10 Anniversary Update (Version 1607), Microsoft added a new feature called Content Delivery Manager that silently installs new "suggested apps" without asking for users’ permission.

According to a blog post published Friday on Chromium Blog, Google Project Zero researcher Tavis Ormandy said he found a pre-installed famous password manager, called "Keeper," on his freshly installed Windows 10 system which he downloaded directly from the Microsoft Developer Network.

Ormandy was not the only one who noticed the Keeper Password Manager. Some Reddit users complainedabout the hidden password manager about six months ago, one of which reported Keeper being installed on a virtual machine created with Windows 10 Pro.

Critical Flaw In Keeper Password Manager

Knowing that a third-party password manager now comes installed by default on Windows 10, Ormandy started testing the software and took no longer to discover a critical vulnerability that leads to "complete compromise of Keeper security, allowing any website to steal any password."

"I don't want to hear about how even a password manager with a trivial remote root that shares all your passwords with every website is better than nothing. People really tell me this," Ormandy tweeted.

The security vulnerability in the Keeper Password Manager was almost identical to the one Ormandy discovered and reported in the non-bundled version of the same Keeper plugin in August 2016 that enabled malicious websites to steal passwords.

"I checked and, they're doing the same thing again with this version. I think I'm being generous considering this a new issue that qualifies for a ninety day disclosure, as I literally just changed the selectors and the same attack works," Ormandy said.

To explain the severity of the bug, Ormandy also provided a working proof-of-concept (PoC) exploit that steals a user's Twitter password if it is stored in the Keeper app.

Install Updated Keeper Password Manager

Ormandy reported the vulnerability to the Keeper developers, who acknowledged the issue and released a fix in the just released version 11.4 on Friday by removing the vulnerable "add to existing" functionality.

Since the vulnerability only affects version 11 of the Keeper app, which was released on December 6 as a major browser extension update, the vulnerability is different from the one Ormandy reported six months ago.

Keeper has also added that the company has not noticed any attack using this security vulnerability in the wild.

As for Windows 10 users, Ormandy said users wouldn’t be vulnerable to the password theft unless they open Keeper password manager and enable the software to store their passwords.

However, Microsoft still needs to explain how the Keeper password manager gets installed on the users' computers without their knowledge.

Meanwhile, users can use this registry tweak to disable Content Delivery Manager in order to prevent Microsoft from installing unwanted apps silently on their PCs.

© [Ritik banger] and [Hacker ritz], [2017]. Unauthorized use and/or duplication of this material without express and written permission from this blog’s author and/or owner is strictly prohibited. Excerpts and links may be used, provided that full and clear credit is given to [Ritik banger] and [Hacker ritz] with appropriate and specific direction to the original content.
Designed by Ritik Banger . All rights reserved . Powered by Blogger.
© Copyright 2017. Website by Hacker Ritz