Monday, January 9, 2017
Locard Cyber Security Summit Estambul 20 de Mayo
Locard Cyber Security Summit Estambul 20 de Mayo
![]() |
Figura 1: Locard - Istambul Ciber Security Summit |
Uno de sus propósitos es rotar anualmente un país invitado como partner, este primer año le toca inaugurar a España por lo que el equipo inicial que lo forma son: servidor, Deepak Daswani, David Meléndez, Juan Garrido, junto a la participación del Grupo de Delitos Telemáticos de la Guardia Civil de la mano del Teniente D. Marcos Hermoso y Chema Alonso de Eleven Paths.
España es y debe seguir siendo reconocida como una potencia importante en el conocimiento de la Ciberseguridad, transmitir este conocimiento al mundo y la región de EMEA nos permite afianzar lo indiscutible, que tenemos en este país a grandes expertos en esta compleja industria.
El evento también cuenta con un importante apoyo de Turk-Telekom siendo el sponsor estratégico del evento, su CEO Rami Aslan dará un acto de inauguración del evento, junto al resto de autoridades turcas, como el Ministro de Transportes y Comunicaciones Binali Yldirim, o el responsable de la Ciberpolicia Turca Halvasan, Ahmet Hamdi Atalay avalando la seriedad del congreso.
![]() |
Figura 2: Ponentes de LOCARD |
Por supuesto, Turquía dispone de buenos expertos en la materia de ciberseguridad como el conocido Ibrahim Balic, o Halil Ozturkci entre otros, como keynote especial Russell Hanson CEO de BrainBackups.com presentara su innovador proyecto que consiste en realizar copias de seguridad a nuestros cerebros, por lo que imaginarse un dump de un cerebro brillante para poder analizarlo puede ser más real de lo que parece.
El evento No se retrasmitirá en streaming en esta primera edición, por lo que aquellos que deseen asistir deberán de desplazarse a la ciudad de Estambul, pueden ampliar información de la agenda en Locard.org.
Autor: Igor Lukic (@igorlukic)
Sigue Un informático en el lado del mal - Google+ RSS 0xWord

Available link for download
Monday, November 21, 2016
Big Data Security Tales MongoDB Cassandra Level 101
Big Data Security Tales MongoDB Cassandra Level 101
![]() |
Figura 1: Big Data Security Tales: MongoDB & Cassandra (Level 101) |
Figura 2: Tecnologías de Big Data y CiberSeguridad
Por supuesto, el gran manejo de datos que es posible realizar hoy en día permite a las empresas capturar detalles, insignificantes a priori, de sus usuarios que llevan a un conocimiento tal de los mismos que la privacidad queda en serio riesgo. Exponente de este tipo son las tecnologías de WebBrowsing Fingerprinting que son capaces de llegar al mínimo detalle de los usuarios para saber quién es quién sin necesidad de que se lo diga. De esto hice una charla hace ya unos años.
Figura 3: Big Data y Privacidad
Otra de las caras del prisma en el que convergen la seguridad y el mundo del Big Data son los servicios de pentesting y auditoría de los mismos. No son nuevos los problemas con estos entornos, como ya vimos en el caso de los servidores MongoDB que podemos localizar por Internet sin ningún control de seguridad, y con todos los datos expuestos con solo hacer un poco de hacking con buscadores. Además, tampoco son inmunes a las técnicas de inyección de comandos, como ya vimos en el artículo de técnicas de MongoDB Injection.
![]() |
Figura 4: Bases de datos MongoDB accesibles sin autenticación |
Cassandras inseguros en Internet
![]() |
Figura 5: Casi 2.000 clusters de bases de datos Cassandra publicadas en Internet |
![]() |
Figura 6: Datastax OpsCenter abierto a Internet |
![]() |
Figura 7: Datastax OpsCenter indexados en Google |
![]() |
Figura 8: Paneles OpsCenter publicados en Internet |
![]() |
Figura 9: Agregar un cluster Cassandra a OpsCenter para administrarlo remotamente |
Sigue Un informático en el lado del mal - Google+ RSS 0xWord

Available link for download
Friday, October 21, 2016
Google Chrome Al final era Security Privacy Bug y no una Feature o un Issue
Google Chrome Al final era Security Privacy Bug y no una Feature o un Issue
![]() |
Figura 1: Google Chrome: Al final era "Security & Privacy Bug" y no una "Feature" o un "Issue" |
![]() |
Figura 2: Primera catalogación como Feature y se cierra como un "WordFix" |
![]() |
Figura 3: Tercera catalogación como Privacy & Security-UX Feature |
![]() |
Figura 4: Cuarta catalogación como Security & Privacy Bug |
Sigue Un informático en el lado del mal - Google+ RSS 0xWord

Available link for download
Friday, September 30, 2016
Enhancing App Security on Google Play
Enhancing App Security on Google Play
Posted by Eric Davis, Android Security Team
Were constantly investing in new tools and services to help developers build secure Android applications. This includes the application sandbox and Security APIs in the platform, Security APIs in Google Play Services, and even open source testing tools. Last year, Google Play also helped developers enhance the security of their applications by looking directly at the code theyve written and offering suggestions for improvements.
The Google Play App Security Improvement Program is the first of its kind. It has two core components: We provide developers with security tips to help them build more secure apps, and we help developers identify potential security enhancements when uploaded to Google Play. This week, to help educate developers, Kristian Monsen, one of our engineers, gave a presentation about security best practices at the Samsung Developer Conference. And in 2015, we worked with developers to improve the security of over 100,000 apps through the program.
How it works
Before any app is accepted into Google Play, it is scanned for safety and security, including potential security issues. We also continuously re-scan the over one million apps in Google Play for additional threats.
If your app is flagged for a potential security issue, you will be notified immediately to help you quickly address the issue and help keep your users safe. Well deliver alerts to you using both email and the Google Play Developer Console, with links to a support page with details about how to improve the app.

Typically, these notifications will include a timeline for delivering the improvement to users as quickly as possible. Applications may be required to make security improvements before any other app updates can be be published.
You can confirm that youve fully addressed the issue by uploading the new version of your app to the Google Play Developer Console. Be sure to increment the version number of the fixed app. After a few hours, check the Developer Console for the security alert; if its no longer there, youre all set!
The success of this program rests on our partnership with youthe developers of apps on Google Playand the security community. Were all responsible for providing safe, secure apps to our users. For feedback or questions, please reach out to us through the Google Play Developer Help Center. To report potential security issues in apps, please reach out to us at security+asi@android.com.
Available link for download
Thursday, September 15, 2016
Improving the Security and User Experience of your Google Sign In Implementation
Improving the Security and User Experience of your Google Sign In Implementation
We launched a fully revamped Sign-In API with Google Play services 8.3 providing a much more streamlined user experience and enabling easy server authentication and authorization. Weve heard from many developers that theyve found these APIs simple and less error prone to use. But when we look at applications in the Play Store, we see many that are still using legacy Plus.API / GoogleAuthUtil.getToken and do not follow best practices for authentication and authorization. Not following best practices can make your apps easily vulnerable to attack.
Its also worth noting that developers who dont want to worry about managing the security implications of different API flows or keeping up to date with the latest APIs can use Firebase Authentication to manage the entire authentication lifecycle.
Ensuring your apps are secure
Developers should ensure that their apps are not open to the following vulnerabilities:
- Email or user ID substitution attack After signing in with Google on Android, some apps directly send email or user ID in plain text to their backend server as the identity credential. These server endpoints enable a malicious attacker to easily forge a request and gain access to any users account by guessing their email / user ID.
We see a number of developers implement this anti-pattern by usinggetAccountName
orgetId
from the Plus.API and sending it to their backend.
Problematic implementations, DO NOT COPY
- Access token substitution attack After signing in with Google on Android, many apps send an access token obtained via GoogleAuthUtil.getToken to their backend server as the identity assertion. Access tokens are bearer tokens and backend servers cannot easily check if the token is issued to them. A malicious attacker can phish the user to sign-in on another application and use that different access token to forge a request to your backend.
Many developers implement this anti-pattern by using GoogleAuthUtil to retrieve an access token and sending it to their server to authenticate like in the following example:
Problematic implementation, DO NOT COPY

- Many developers who have built the above anti-patterns into their apps simply call our tokenInfo (www.googleapis.com/oauth2/v3/tokeninfo) which is debug-only or unnecessarily call the G+ (www.googleapis.com/plus/v1/people/me) endpoint for users profile information. These apps should instead implement our recommended ID token flow explained in this blog post. Check out migration guide to move to a both secure and efficient pattern.
- If your server needs access to other Google services, e.g. Drive, you should use server auth code flow. You can also check out this blogpost. Worth mentioning, you can also get an ID token using server auth code flow, from which you can retrieve user id / email / name / profile url without additional network call. Check out the migration guide.
Improving the user experience and performance of your apps
There are still many apps using GoogleAuthUtil for server auth and their users are losing out the improved user experience while the developers of those apps need to maintain a significantly more complicated implementation.
Here are some of the common problems that we see:
Requesting unnecessary permissions and displaying redundant user experience
Many apps request GET_ACCOUNTS permission and draw their own customized picker with all email addresses. After getting the email address, the app calls either GoogleAuthUtil or Plus.API to do OAuth consent for basic sign in. For those apps, users will see redundant user experience like:

The worst thing is the GET_ACCOUNTS permission. On Marshmallow and above, this permission is displayed to the user as Contacts. Many users are unwilling to grant access to this runtime permission.
Solution
Switch to our new Auth.GOOGLE_SIGN_IN_API for a streamlined user consent experience by providing an intuitive one-tap interface to provide your app with the users name, email address and profile picture. Your app receives an OAuth grant when the user selects an account, making it easier to sign the user in on other devices. Learn more

Figure 4. New streamlined, one-tap sign-in experience
Getting ID Token from GoogleAuthUtil for your backend
Before we released revamped Sign-In API, GoogleAuthUtil.getToken was the previously recommended way to retrieve an ID token via a magic string.
Wrong pattern, DO NOT COPY

GoogleAuthUtil.getToken needs to take an email address, which usually leads to the undesirable user experience in Figure 3. Also, users profile information like name, profile picture url is valuable information to store in your server. The ID token obtained via Auth.GOOGLE_SIGN_IN_API will contain profile information and your server wont need additional network calls to retrieve them.
Solution Switch to the ID token flow using the new Auth.GOOGLE_SIGN_IN_API and get the one-tap experience. You can also check out this blogpost and the migration guide for more details.
Getting auth code from GoogleAuthUtil for your backend
We once recommended using GoogleAuthUtil.getToken to retrieve a server auth code via another magic string.
Wrong pattern, DO NOT COPY

In addition to the possible redundant user experience in Figure 3, another problem with this implementation was that if a user had signed in to your application in the past and then switched to a new device, they would likely see this confusing dialog:

Figure 5. Confusing consent dialog for returned user if using GoogleAuthUtil.getToken for auth code
Solution
To easily avoid this Have offline access consent dialog, you should switch to server auth code flow using the new Auth.GOOGLE_SIGN_IN_API . We will issue you an auth code silently for a previously signed-in user. You can also check out this blogpost and migration guide for more info.
Should I ever use GoogleAuthUtil.getToken?
In general, you should NOT use GoogleAuthUtil.getToken, unless you are making REST API call on Android client. Use Auth.GOOGLE_SIGN_IN_API instead. Whenever possible, use native Android API in Google Play services SDK. You can check out those APIs at Google APIs for Android.
And starting from Google Play services SDK 9.0, you will need to include -auth SDK split to use GoogleAuthUtil.getToken and related classes
AccountChangeEvent/AccountChangeEventsRequest/AccountChangeEventsResponse.
dependencies { compile com.google.android.gms:play-services-auth:9.0.0 }
Available link for download
Monday, September 12, 2016
How To Update Galaxy S6 SM G920F to Marshmallow 6 0 1 July 2016 G920FXXS4DPG2 Enhanced Features Security Patch
How To Update Galaxy S6 SM G920F to Marshmallow 6 0 1 July 2016 G920FXXS4DPG2 Enhanced Features Security Patch
Today Samsung Currently Pushing July G920FXXS4DPG2 Update to the Galaxy S6 - SM-G920F on its network (UK/ Ireland) that includes a security update, as well as now displaying which security patch your phone has and bug fixes. It is recommended you keep your device updated to the latest software so that you dont experience any flaws or drops in reliability.

G920FXXS4DPG2 is based on the latest Marshmallow 6.0.1 for the Samsung Galaxy S6 - SM-G920F.
Follow our guide below to download the update and install it yourself.
The Update brings the following changes:
The security of your device has been improved.
Device stability improvements, bug fixes.
New and / or enhanced features.
Further improvements to performance.
Model | SM-G920F |
Model name | Galaxy S6 |
Country | United Kingdom / Ireland |
Version | Android 6.0.1 |
Changelist | 7884513 |
Build date | Mon, 04 Jul 2016 02:04:47 +0000 |
Security Patch Level | 2016-07-01 |
Product code | XEU |
PDA | G920FXXS4DPG2 |
CSC | G920FXEU3DPD2 |
*Disclaimer:
Custom ROM fix ® provide various Firmware Updates and Rooting process along with Custom ROM,Modes,file are all belong to their owners/developers. The autor of this site or the developers are not responsible, if you damage or brick your device.Do it on your own risk and follow the instruction properly.
* Important:
Backup important files stored on your device before proceeding with the steps below, so that in case something goes wrong youll have backup of all your important files.

How To Update Galaxy S6 - SM-G920F to Marshmallow 6.0.1 July 2016 G920FXXS4DPG2 [Enhanced Features/Security Patch.]
Download Samsung Galaxy S6 - SM-G920F G920FXXS4DPG2 Firmware .
1- Extract (unzip) the firmware file
2- Download Odin v3.11.1
3- Extract Odin ZIP file
4- Open Odin v.3.11.1
5- Reboot Phone in Download Mode (press and hold Home + Power + Volume Down buttons)
6- Connect phone and wait until you get a blue sign in Odin
7- Add the firmware file to AP / PDA
Make sure re-partition is NOT ticked
8- Click the start button, sit back and wait few minutes.
Thats it! Your Samsung Galaxy S6 - SM-G920F should now have Marshmallow 6.0.1 July security patch on your phone! Go to Settings > About phone to verify.
For More Samsung Galaxy S6 - SM-G920F Updates Keep Checking Android Custom ROM Fix ®
Thats all. We hope this guide serves you well. If theres anything youd like to be added/changed on this page, PLZ Use the comment box below to contribute more ideas & Suggestions .
Like this post? PLZ Hit the share buttons below to share this article with your friends on Facebook, Google + and Twitter.
Want the latest Updates Sign up for our newsletters!
PLZ Follow Us On Flipboard 4 More Latest Updates.
Best Regards.
G920FXXS4DPG2
Available link for download
Sunday, September 11, 2016
Moto Z and Moto Z Force will receive security patches Moto confirms
Moto Z and Moto Z Force will receive security patches Moto confirms

Over the past year or so, security updates have become a major focus on Android, with Google and several device makers pledging to release monthly security u
from PhoneDog.com - Latest videos, reviews, articles, news and posts http://ift.tt/29XEDP3
via IFTTT
Available link for download
Thursday, September 8, 2016
AT T June Security Patch
AT T June Security Patch
Anybody else have this problem? And more importantly, does anybody have a solution?
from xda-developers http://ift.tt/2a1uEEk
via IFTTT
Available link for download
Friday, September 2, 2016
How to Update Verizon Galaxy S7 SM G930V Marshmallow 6 0 1 June Security Patch Enhanced Features
How to Update Verizon Galaxy S7 SM G930V Marshmallow 6 0 1 June Security Patch Enhanced Features
Today Samsung Currently Pushing VRU2APE1 Update to the Verizon Galaxy S7 SM-G930V on its network (USA) that includes a security update, as well as now displaying which security patch your phone has and bug fixes. It is recommended you keep your device updated to the latest software so that you dont experience any flaws or drops in reliability.

VRU2APE1 is based on the latest Marshmallow 6.0.1 for the Verizon Galaxy S7 SM-G930V.
Follow our guide below to download the update and install it yourself.
The Update brings the following changes:
The security of your device has been improved.
Device stability improvements, bug fixes.
New and / or enhanced features.
Further improvements to performance.
Model | SM-G930V |
Model name | |
Country | USA (Verizon) |
Version | Android 6.0.1 |
Changelist | 7722939 |
Build date | Tue, 24 May 2016 08:21:41 +0000 |
Security Patch Level | 2016-06-01 |
Product code | VZW |
PDA | G930VVRU2APE1 |
CSC | G930VVZW2APE1 |
*Disclaimer:
Custom ROM fix ® provide various Firmware Updates and Rooting process along with Custom ROM,Modes,file are all belong to their owners/developers. The autor of this site or the developers are not responsible, if you damage or brick your device.Do it on your own risk and follow the instruction properly.
* Important:
Backup important files stored on your device before proceeding with the steps below, so that in case something goes wrong youll have backup of all your important files.

How To Update Verizon Galaxy S7 SM-G930V to Marshmallow 6.0.1 Stock Firmware VRU2APE1 [Security Patches / Bug Fixes]
Download Samsung Galaxy S7 SM-G930VUV VRU2APE1 Firmware .
1- Extract (unzip) the firmware file
2- Download Odin v3.11.1
3- Extract Odin ZIP file
4- Open Odin v.3.11.1
5- Reboot Phone in Download Mode (press and hold Home + Power + Volume Down buttons)
6- Connect phone and wait until you get a blue sign in Odin
7- Add the firmware file to AP / PDA
Make sure re-partition is NOT ticked
8- Click the start button, sit back and wait few minutes.

Thats it! Your Verizon Galaxy S7 SM-G930V should now have Marshmallow 6.0.1 on your phone! Go to Settings > About phone to verify.
Like this post? PLZ Hit the share buttons below to share this article with your friends on Facebook, Google + and Twitter.
PLZ Follow Us On Flipboard 4 More Galaxy Note 7 - SM-G935T Latest Updates.
PLZ Use the comment box below to contribute more ideas & Suggestions .
Best Regards.
Available link for download