World Bulletin / News Desk
A hacking expert has launched a $200 password-cracking tool that makes it easy to decipher Internet traffic sent through a widely used method for securing businesses communications.
Moxie Marlinspike, one of the world's top encryption experts, unveiled the tool on Saturday during a presentation at the Def Con hacking conference in Las Vegas.
Marlinspike said he developed the service, CloudCracker.com, by taking advantage of a vulnerability he discovered in a widely used virtual private network technology known as point-to-point tunneling protocol.
Virtual private networks, or VPNs, scramble traffic as it travels between a PC and its final destination so that the data is useless to hackers if they eavesdrop on those communications.
But Marlinspike provides clients with a tool that analyzes captured data streams and creates a data file that they upload to his website. He then runs that through code-cracking computer programs that figure out a password that will unscramble the protected communications. He delivers that to clients within 24 hours.
With access to web traffic, hackers could potentially steal passwords to financial accounts, read business emails and learn business secrets.
Marlinspike said he will not screen clients to determine whether they are using CloudCracker for illegal purposes, although his ultimate intent is help computer users by pressuring operating systems makers to make their software safer.
"What we're trying to do is force people to use more secure VPN technology in the products they are building," he said.
Marlinspike said that small to mid-sized businesses and consumers typically use VPN software with the point-to-point tunneling protocol.
Large corporations typically supply their employees with VPN software from Cisco Systems Inc, whose communications cannot be cracked by CloudCracker.com, he said.
Marlinspike has worked for Twitter since the end of last year when the mobile blogging service acquired a company he co-founded, Whisper Systems. Marlinspike said that CloudCracker.com was a personal project and has nothing to do with Twitter.
Hackers and security experts present research on a wide range of vulnerabilities in products ranging from computers and networking equipment to locks, drones and air-traffic control systems at the annual Def Con gathering.
They often publicize their work in an effort to warn the public about security risks and pressure manufacturers to address the problems.
The two-day fair showcases products like control and surveillance equipment; mine and bomb detectors and aviation security.
Scientists hope to use information about how the organisms fare in the highly radioactive and extreme temperatures of space to devise life-detection techniques for future robotic Mars missions.
The congress will bring together more than 200 of the world's global digital and tech leaders.
Asteroid 1950 DA could hit the Earth on 16 March, 2880.
Anonymous had its account suspended after leaking the name of a police officer accused of shooting dead a black teenager.
Mirzakhani was recognised for her work in understanding the symmetry of curved surfaces, according to the Stanford site.
The cargo includes a European-built electromagnetic levitator, which will be used to suspend and heat metal samples in weightlessness with the goal of improving industrial casting processes
The site, called BrownList (http://www.brownlist.com/), carries the motto "It's payback time."
Last year, China launched a campaign to clamp down on online rumour mongering and 'clean up' the internet.
In May 2014, a court in the US found that both companies had infringed on one another's patents, putting Samsung on the hook for $119.6 million, and Apple down for a mere $158,400.
“We are attacking the government of Israel more .. Israel you're weak! :(” one online activist AnonymousGlobo said a tweet upon the attack, which the group called #OpSaveGaza.
In theory, a hacker could use a plane's onboard WiFi signal or inflight entertainment system to hack into its avionics equipment, potentially disrupting or modifying satellite communications
Local authorities have warned that the water could be carcinogenic or radioactive, as it has already turned murky green with algae despite starting off a crystalline blue.
Tor Project leader Roger Dingledine said the service had identified computers on its network that had been quietly altering Tor traffic for five months in an attempt to unmask users connecting to what are known as "hidden services."
Teeth can reveal whether a person spent formative years in the United States versus Europe, South America, Australia or other broad regions.
Apple denied creating any “back doors” for intelligence agencies.