<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0" xml:base="https://news.hitb.org/">
  <channel>
    <title>HITB2013KUL</title>
    <link>https://news.hitb.org/</link>
    <description/>
    <language>en</language>
    
    <item>
  <title>HITB Throwback Thursday: Look At Me - I’m The Captain Now </title>
  <link>https://news.hitb.org/content/hitb-throwback-thursday-look-me-im-captain-now</link>
  <description>    &lt;article data-history-node-id="56298" role="article" class="node article teaser clearfix UTF-8"&gt;&lt;header&gt;&lt;h2 class="title text-center"&gt;&lt;a href="https://news.hitb.org/content/hitb-throwback-thursday-look-me-im-captain-now" rel="bookmark"&gt;&lt;span&gt;HITB Throwback Thursday: Look At Me - I’m The Captain Now &lt;/span&gt;
&lt;/a&gt;&lt;/h2&gt;
       
      &lt;div class="meta submit clearfix"&gt;
        &lt;div class="date text-right"&gt;
          &lt;span class="lowercase"&gt;posted on&lt;/span&gt;October 29, 2020
        &lt;/div&gt;
        &lt;div class="author"&gt;
                            
          &lt;span class="lowercase"&gt;by&lt;/span&gt; &lt;span&gt;&lt;span&gt;l33tdawg&lt;/span&gt;&lt;/span&gt;

        &lt;/div&gt;
      &lt;/div&gt;      
    &lt;/header&gt;&lt;div class="image-default"&gt;
        
            &lt;div&gt;  &lt;a href="https://news.hitb.org/content/hitb-throwback-thursday-look-me-im-captain-now" hreflang="en"&gt;&lt;img loading="lazy" src="https://news.hitb.org/sites/default/files/styles/medium/public/2020-10/hitb-marco_0.png?itok=bEqmfAj2" width="220" height="146" alt="HITBSecConf2013 - Malaysia" /&gt;&lt;/a&gt;
&lt;/div&gt;
      &lt;div class="image-credit"&gt;
        &lt;strong&gt;Credit:&lt;/strong&gt;
                  HITBSecConf2013 - Malaysia
              &lt;/div&gt;
      
      &lt;/div&gt;
     
    &lt;div class="content"&gt;
      
            &lt;div&gt;&lt;p&gt;&lt;strong&gt;By:&lt;/strong&gt; Weixien Toh&lt;/p&gt;&lt;/div&gt;
      
    &lt;/div&gt;    
    &lt;div class="meta link clearfix"&gt;
      &lt;div class="comment"&gt;
                  &lt;span class="lowercase"&gt;no&lt;/span&gt;comment
                    
      &lt;/div&gt;
              &lt;div class="share text-center show-for-medium"&gt;
          &lt;span class="a2a_kit a2a_kit_size_16 addtoany_list" data-a2a-url="https://news.hitb.org/content/hitb-throwback-thursday-look-me-im-captain-now" data-a2a-title="HITB Throwback Thursday: Look At Me - I’m The Captain Now "&gt;&lt;a class="a2a_button_facebook"&gt;&lt;span class="fa fa-facebook"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_twitter"&gt;&lt;span class="fa fa-twitter"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_linkedin"&gt;&lt;span class="fa fa-linkedin"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_email"&gt;&lt;span class="fa fa-envelope"&gt;&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;
        &lt;/div&gt;
            &lt;div class="read-more"&gt;&lt;a href="https://news.hitb.org/content/hitb-throwback-thursday-look-me-im-captain-now"&gt;&lt;span class="lowercase"&gt;→&lt;/span&gt;READ MORE&lt;/a&gt;&lt;/div&gt; 
    &lt;/div&gt;
  &lt;/article&gt;</description>
  <pubDate>Thu, 29 Oct 2020 10:29:20 +0000</pubDate>
    <dc:creator>l33tdawg</dc:creator>
    <guid isPermaLink="false">56298 at https://news.hitb.org</guid>
    </item>
<item>
  <title>Picture Perfect Hack of a Canon EOS 80D DSLR</title>
  <link>https://news.hitb.org/content/picture-perfect-hack-canon-eos-80d-dslr</link>
  <description>    &lt;article data-history-node-id="55560" role="article" class="node article teaser clearfix UTF-8"&gt;&lt;header&gt;&lt;h2 class="title text-center"&gt;&lt;a href="https://news.hitb.org/content/picture-perfect-hack-canon-eos-80d-dslr" rel="bookmark"&gt;&lt;span&gt;Picture Perfect Hack of a Canon EOS 80D DSLR&lt;/span&gt;
&lt;/a&gt;&lt;/h2&gt;
       
      &lt;div class="meta submit clearfix"&gt;
        &lt;div class="date text-right"&gt;
          &lt;span class="lowercase"&gt;posted on&lt;/span&gt;August 14, 2019
        &lt;/div&gt;
        &lt;div class="author"&gt;
                            
          &lt;span class="lowercase"&gt;by&lt;/span&gt; &lt;span&gt;&lt;span&gt;l33tdawg&lt;/span&gt;&lt;/span&gt;

        &lt;/div&gt;
      &lt;/div&gt;      
    &lt;/header&gt;&lt;div class="image-default"&gt;
        
            &lt;div&gt;  &lt;a href="https://news.hitb.org/content/picture-perfect-hack-canon-eos-80d-dslr" hreflang="en"&gt;&lt;img loading="lazy" src="https://news.hitb.org/sites/default/files/styles/medium/public/2019-08/DSLR-Camera-Bug.jpg?itok=7Gy9Idcn" width="220" height="147" alt="Threat Post" /&gt;&lt;/a&gt;
&lt;/div&gt;
      &lt;div class="image-credit"&gt;
        &lt;strong&gt;Credit:&lt;/strong&gt;
                  Threat Post
              &lt;/div&gt;
      
      &lt;/div&gt;
     
    &lt;div class="content"&gt;
      
            &lt;div&gt;&lt;p&gt;Multiple vulnerabilities in Canon’s DSLR camera firmware could allow an attacker to plant malware on devices and ransom images from users. The bugs, outlined in a session here at DEF CON, open the door to a range of hacks via a Wi-Fi network or a PC’s USB connection to a camera.&lt;/p&gt;&lt;/div&gt;
      
    &lt;/div&gt;    
    &lt;div class="meta link clearfix"&gt;
      &lt;div class="comment"&gt;
                  &lt;span class="lowercase"&gt;no&lt;/span&gt;comment
                    
      &lt;/div&gt;
              &lt;div class="share text-center show-for-medium"&gt;
          &lt;span class="a2a_kit a2a_kit_size_16 addtoany_list" data-a2a-url="https://news.hitb.org/content/picture-perfect-hack-canon-eos-80d-dslr" data-a2a-title="Picture Perfect Hack of a Canon EOS 80D DSLR"&gt;&lt;a class="a2a_button_facebook"&gt;&lt;span class="fa fa-facebook"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_twitter"&gt;&lt;span class="fa fa-twitter"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_linkedin"&gt;&lt;span class="fa fa-linkedin"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_email"&gt;&lt;span class="fa fa-envelope"&gt;&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;
        &lt;/div&gt;
            &lt;div class="read-more"&gt;&lt;a href="https://news.hitb.org/content/picture-perfect-hack-canon-eos-80d-dslr"&gt;&lt;span class="lowercase"&gt;→&lt;/span&gt;READ MORE&lt;/a&gt;&lt;/div&gt; 
    &lt;/div&gt;
  &lt;/article&gt;</description>
  <pubDate>Wed, 14 Aug 2019 00:11:44 +0000</pubDate>
    <dc:creator>l33tdawg</dc:creator>
    <guid isPermaLink="false">55560 at https://news.hitb.org</guid>
    </item>
<item>
  <title>Apple's Two Factor Authentication Doesn't Protect iCloud Backups Or Photo Streams</title>
  <link>https://news.hitb.org/content/apples-two-factor-authentication-doesnt-protect-icloud-backups-or-photo-streams</link>
  <description>    &lt;article data-history-node-id="49973" role="article" class="node article teaser clearfix UTF-8"&gt;&lt;header&gt;&lt;h2 class="title text-center"&gt;&lt;a href="https://news.hitb.org/content/apples-two-factor-authentication-doesnt-protect-icloud-backups-or-photo-streams" rel="bookmark"&gt;&lt;span&gt;Apple's Two Factor Authentication Doesn't Protect iCloud Backups Or Photo Streams&lt;/span&gt;
&lt;/a&gt;&lt;/h2&gt;
       
      &lt;div class="meta submit clearfix"&gt;
        &lt;div class="date text-right"&gt;
          &lt;span class="lowercase"&gt;posted on&lt;/span&gt;September 3, 2014
        &lt;/div&gt;
        &lt;div class="author"&gt;
                            
          &lt;span class="lowercase"&gt;by&lt;/span&gt; &lt;span&gt;&lt;span&gt;l33tdawg&lt;/span&gt;&lt;/span&gt;

        &lt;/div&gt;
      &lt;/div&gt;      
    &lt;/header&gt;&lt;div class="image-default"&gt;
        
            &lt;div&gt;  &lt;a href="https://news.hitb.org/content/apples-two-factor-authentication-doesnt-protect-icloud-backups-or-photo-streams" hreflang="en"&gt;&lt;img loading="lazy" src="https://news.hitb.org/sites/default/files/styles/medium/public/field/image/IMG_8467.jpg?itok=KJNmaHBp" width="220" height="147" alt="http://photos.hackinthebox.org/index.php/2013-AMS-KUL/HITB2013KUL/CONFERENCE-DAY-2/Next-door-Vladimir-Katalov-co-founder-of-Elcomsoft-was-busy-cracking-Apple-s-iCloud-protocol" title="Credit: HITBSecPhotos" /&gt;&lt;/a&gt;
&lt;/div&gt;
      &lt;div class="image-credit"&gt;
        &lt;strong&gt;Credit:&lt;/strong&gt;
                  &lt;a href="http://photos.hackinthebox.org/index.php/2013-AMS-KUL/HITB2013KUL/CONFERENCE-DAY-2/Next-door-Vladimir-Katalov-co-founder-of-Elcomsoft-was-busy-cracking-Apple-s-iCloud-protocol" target="_blank"&gt;http://photos.hackinthebox.org/index.php/2013-AMS-KUL/HITB2013KUL/CONFERENCE-DAY-2/Next-door-Vladimir-Katalov-co-founder-of-Elcomsoft-was-busy-cracking-Apple-s-iCloud-protocol&lt;/a&gt;
              &lt;/div&gt;
      
      &lt;/div&gt;
     
    &lt;div class="content"&gt;
      
            &lt;div&gt;&lt;p&gt;&lt;em&gt;&lt;strong&gt;L33tdawg:&lt;/strong&gt; Hate to say we told you so, but well, &lt;a href="http://conference.hitb.org/hitbsecconf2013kul/vladimir-katalov/" target="_blank"&gt;Vladimir Katalov&lt;/a&gt; did - last year at that! Take a look at &lt;a href="http://conference.hackinthebox.org/hitbsecconf2013kul/materials/D2T2%20-%20Vladimir%20Katalov%20-%20Cracking%20and%20Analyzing%20Apple%27s%20iCloud%20Protocol.pdf" target="_blank"&gt;his presentation slides&lt;/a&gt; (PDF) if you haven't already&lt;br /&gt;&lt;/em&gt;&lt;/p&gt;&lt;/div&gt;
      
    &lt;/div&gt;    
    &lt;div class="meta link clearfix"&gt;
      &lt;div class="comment"&gt;
                  &lt;span class="lowercase"&gt;no&lt;/span&gt;comment
                    
      &lt;/div&gt;
              &lt;div class="share text-center show-for-medium"&gt;
          &lt;span class="a2a_kit a2a_kit_size_16 addtoany_list" data-a2a-url="https://news.hitb.org/content/apples-two-factor-authentication-doesnt-protect-icloud-backups-or-photo-streams" data-a2a-title="Apple's Two Factor Authentication Doesn't Protect iCloud Backups Or Photo Streams"&gt;&lt;a class="a2a_button_facebook"&gt;&lt;span class="fa fa-facebook"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_twitter"&gt;&lt;span class="fa fa-twitter"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_linkedin"&gt;&lt;span class="fa fa-linkedin"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_email"&gt;&lt;span class="fa fa-envelope"&gt;&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;
        &lt;/div&gt;
            &lt;div class="read-more"&gt;&lt;a href="https://news.hitb.org/content/apples-two-factor-authentication-doesnt-protect-icloud-backups-or-photo-streams"&gt;&lt;span class="lowercase"&gt;→&lt;/span&gt;READ MORE&lt;/a&gt;&lt;/div&gt; 
    &lt;/div&gt;
  &lt;/article&gt;</description>
  <pubDate>Wed, 03 Sep 2014 15:31:23 +0000</pubDate>
    <dc:creator>l33tdawg</dc:creator>
    <guid isPermaLink="false">49973 at https://news.hitb.org</guid>
    </item>
<item>
  <title>Phantom Ships Expose Weakness in Vessel-Tracking System</title>
  <link>https://news.hitb.org/content/phantom-ships-expose-weakness-vessel-tracking-system</link>
  <description>    &lt;article data-history-node-id="48354" role="article" class="node article teaser clearfix UTF-8"&gt;&lt;header&gt;&lt;h2 class="title text-center"&gt;&lt;a href="https://news.hitb.org/content/phantom-ships-expose-weakness-vessel-tracking-system" rel="bookmark"&gt;&lt;span&gt;Phantom Ships Expose Weakness in Vessel-Tracking System&lt;/span&gt;
&lt;/a&gt;&lt;/h2&gt;
       
      &lt;div class="meta submit clearfix"&gt;
        &lt;div class="date text-right"&gt;
          &lt;span class="lowercase"&gt;posted on&lt;/span&gt;October 29, 2013
        &lt;/div&gt;
        &lt;div class="author"&gt;
                            
          &lt;span class="lowercase"&gt;by&lt;/span&gt; &lt;span&gt;&lt;span&gt;l33tdawg&lt;/span&gt;&lt;/span&gt;

        &lt;/div&gt;
      &lt;/div&gt;      
    &lt;/header&gt;&lt;div class="image-default"&gt;
        
            &lt;div&gt;  &lt;a href="https://news.hitb.org/content/phantom-ships-expose-weakness-vessel-tracking-system" hreflang="en"&gt;&lt;img loading="lazy" src="https://news.hitb.org/sites/default/files/styles/medium/public/field/image/3388235393_19bccfc11b_z.jpg?itok=iSVYwdyh" width="220" height="165" alt="http://www.flickr.com/photos/garyhymes/3388235393/" title="Credit: Gary Hymes (Flickr) " /&gt;&lt;/a&gt;
&lt;/div&gt;
      &lt;div class="image-credit"&gt;
        &lt;strong&gt;Credit:&lt;/strong&gt;
                  &lt;a href="http://www.flickr.com/photos/garyhymes/3388235393/" target="_blank"&gt;http://www.flickr.com/photos/garyhymes/3388235393/&lt;/a&gt;
              &lt;/div&gt;
      
      &lt;/div&gt;
     
    &lt;div class="content"&gt;
      
            &lt;div&gt;&lt;p&gt;Shippers, traders and researchers monitoring global vessel traffic in the past six months might have seen an imaginary U.S. ferry sail to North Korea, a tugboat go from the Mississippi River to a Dallas lake in two minutes and the path of a fake Italian yacht spelling out PWNED -- hacker slang for “defeated.”&lt;/p&gt;&lt;/div&gt;
      
    &lt;/div&gt;    
    &lt;div class="meta link clearfix"&gt;
      &lt;div class="comment"&gt;
                  &lt;span class="lowercase"&gt;no&lt;/span&gt;comment
                    
      &lt;/div&gt;
              &lt;div class="share text-center show-for-medium"&gt;
          &lt;span class="a2a_kit a2a_kit_size_16 addtoany_list" data-a2a-url="https://news.hitb.org/content/phantom-ships-expose-weakness-vessel-tracking-system" data-a2a-title="Phantom Ships Expose Weakness in Vessel-Tracking System"&gt;&lt;a class="a2a_button_facebook"&gt;&lt;span class="fa fa-facebook"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_twitter"&gt;&lt;span class="fa fa-twitter"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_linkedin"&gt;&lt;span class="fa fa-linkedin"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_email"&gt;&lt;span class="fa fa-envelope"&gt;&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;
        &lt;/div&gt;
            &lt;div class="read-more"&gt;&lt;a href="https://news.hitb.org/content/phantom-ships-expose-weakness-vessel-tracking-system"&gt;&lt;span class="lowercase"&gt;→&lt;/span&gt;READ MORE&lt;/a&gt;&lt;/div&gt; 
    &lt;/div&gt;
  &lt;/article&gt;</description>
  <pubDate>Tue, 29 Oct 2013 01:38:33 +0000</pubDate>
    <dc:creator>l33tdawg</dc:creator>
    <guid isPermaLink="false">48354 at https://news.hitb.org</guid>
    </item>
<item>
  <title>Lack of two-factor authentication allows remote iCloud data download</title>
  <link>https://news.hitb.org/content/lack-two-factor-authentication-allows-remote-icloud-data-download</link>
  <description>    &lt;article data-history-node-id="48325" role="article" class="node article teaser clearfix UTF-8"&gt;&lt;header&gt;&lt;h2 class="title text-center"&gt;&lt;a href="https://news.hitb.org/content/lack-two-factor-authentication-allows-remote-icloud-data-download" rel="bookmark"&gt;&lt;span&gt;Lack of two-factor authentication allows remote iCloud data download&lt;/span&gt;
&lt;/a&gt;&lt;/h2&gt;
       
      &lt;div class="meta submit clearfix"&gt;
        &lt;div class="date text-right"&gt;
          &lt;span class="lowercase"&gt;posted on&lt;/span&gt;October 24, 2013
        &lt;/div&gt;
        &lt;div class="author"&gt;
                            
          &lt;span class="lowercase"&gt;by&lt;/span&gt; &lt;span&gt;&lt;span&gt;l33tdawg&lt;/span&gt;&lt;/span&gt;

        &lt;/div&gt;
      &lt;/div&gt;      
    &lt;/header&gt;&lt;div class="image-default"&gt;
        
            &lt;div&gt;  &lt;a href="https://news.hitb.org/content/lack-two-factor-authentication-allows-remote-icloud-data-download" hreflang="en"&gt;&lt;img loading="lazy" src="https://news.hitb.org/sites/default/files/styles/medium/public/field/image/dsc04465-620x413.jpg?itok=9-U5XGUh" width="220" height="147" alt="http://cdn-static.zdnet.com/i/r/story/70/00/022196/dsc04465-620x413.jpg?hash=MJR5AmZ4AQ&amp;upscale=1" title="Credit: ZDNet" /&gt;&lt;/a&gt;
&lt;/div&gt;
      &lt;div class="image-credit"&gt;
        &lt;strong&gt;Credit:&lt;/strong&gt;
                  &lt;a href="http://cdn-static.zdnet.com/i/r/story/70/00/022196/dsc04465-620x413.jpg?hash=MJR5AmZ4AQ&amp;upscale=1" target="_blank"&gt;http://cdn-static.zdnet.com/i/r/story/70/00/022196/dsc04465-620x413.jpg?hash=MJR5AmZ4AQ&amp;upscale=1&lt;/a&gt;
              &lt;/div&gt;
      
      &lt;/div&gt;
     
    &lt;div class="content"&gt;
      
            &lt;div&gt;&lt;p&gt;Russian security researcher &lt;a href="https://twitter.com/vkatalov"&gt;Vladimir Katalov&lt;/a&gt; analyzed Apple's secretive iCloud and Find My Phone protocols to discover that neither are protected by two-factor authentication, and iCloud data can be downloaded remotely without a user ever knowing.&lt;/p&gt;&lt;/div&gt;
      
    &lt;/div&gt;    
    &lt;div class="meta link clearfix"&gt;
      &lt;div class="comment"&gt;
                  &lt;span class="lowercase"&gt;no&lt;/span&gt;comment
                    
      &lt;/div&gt;
              &lt;div class="share text-center show-for-medium"&gt;
          &lt;span class="a2a_kit a2a_kit_size_16 addtoany_list" data-a2a-url="https://news.hitb.org/content/lack-two-factor-authentication-allows-remote-icloud-data-download" data-a2a-title="Lack of two-factor authentication allows remote iCloud data download"&gt;&lt;a class="a2a_button_facebook"&gt;&lt;span class="fa fa-facebook"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_twitter"&gt;&lt;span class="fa fa-twitter"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_linkedin"&gt;&lt;span class="fa fa-linkedin"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_email"&gt;&lt;span class="fa fa-envelope"&gt;&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;
        &lt;/div&gt;
            &lt;div class="read-more"&gt;&lt;a href="https://news.hitb.org/content/lack-two-factor-authentication-allows-remote-icloud-data-download"&gt;&lt;span class="lowercase"&gt;→&lt;/span&gt;READ MORE&lt;/a&gt;&lt;/div&gt; 
    &lt;/div&gt;
  &lt;/article&gt;</description>
  <pubDate>Thu, 24 Oct 2013 00:32:06 +0000</pubDate>
    <dc:creator>l33tdawg</dc:creator>
    <guid isPermaLink="false">48325 at https://news.hitb.org</guid>
    </item>
<item>
  <title>Vietnamese and Indonesian hackers claim top spots in #HITB2013KUL CTF contest</title>
  <link>https://news.hitb.org/content/vietnamese-and-indonesian-hackers-claim-top-spots-hitb2013kul-ctf-contest</link>
  <description>    &lt;article data-history-node-id="48323" role="article" class="node article teaser clearfix UTF-8"&gt;&lt;header&gt;&lt;h2 class="title text-center"&gt;&lt;a href="https://news.hitb.org/content/vietnamese-and-indonesian-hackers-claim-top-spots-hitb2013kul-ctf-contest" rel="bookmark"&gt;&lt;span&gt;Vietnamese and Indonesian hackers claim top spots in #HITB2013KUL CTF contest&lt;/span&gt;
&lt;/a&gt;&lt;/h2&gt;
       
      &lt;div class="meta submit clearfix"&gt;
        &lt;div class="date text-right"&gt;
          &lt;span class="lowercase"&gt;posted on&lt;/span&gt;October 23, 2013
        &lt;/div&gt;
        &lt;div class="author"&gt;
                            
          &lt;span class="lowercase"&gt;by&lt;/span&gt; &lt;span&gt;&lt;span&gt;l33tdawg&lt;/span&gt;&lt;/span&gt;

        &lt;/div&gt;
      &lt;/div&gt;      
    &lt;/header&gt;&lt;div class="image-default"&gt;
        
            &lt;div&gt;  &lt;a href="https://news.hitb.org/content/vietnamese-and-indonesian-hackers-claim-top-spots-hitb2013kul-ctf-contest" hreflang="en"&gt;&lt;img loading="lazy" src="https://news.hitb.org/sites/default/files/styles/medium/public/field/image/ctf1.jpg?itok=3pIi1cL4" width="165" height="131" alt="http://conference.hitb.org/hitbsecconf2013kul/event/capture-the-flag/" title="Credit: HITBSecConf2013 - Malaysia" /&gt;&lt;/a&gt;
&lt;/div&gt;
      &lt;div class="image-credit"&gt;
        &lt;strong&gt;Credit:&lt;/strong&gt;
                  &lt;a href="http://conference.hitb.org/hitbsecconf2013kul/event/capture-the-flag/" target="_blank"&gt;http://conference.hitb.org/hitbsecconf2013kul/event/capture-the-flag/&lt;/a&gt;
              &lt;/div&gt;
      
      &lt;/div&gt;
     
    &lt;div class="content"&gt;
      
            &lt;div&gt;&lt;p&gt;Indonesian hackers were crowned third-placed winners in "Capture The Flag" contest held last week in Kuala Lumpur, Malaysia.&lt;/p&gt;
&lt;p&gt;The international hacking competition involved 10 teams from seven countries is an annual event hosted by Hack In The Box (HITB), reported news portal DetikINET. Team Vietnam lifted the trophies for first and second positions in the show which also saw participants from Japan, Malaysia, the Netherlands, Singapore, South Korean, and Malaysia.&lt;/p&gt;&lt;/div&gt;
      
    &lt;/div&gt;    
    &lt;div class="meta link clearfix"&gt;
      &lt;div class="comment"&gt;
                  &lt;span class="lowercase"&gt;no&lt;/span&gt;comment
                    
      &lt;/div&gt;
              &lt;div class="share text-center show-for-medium"&gt;
          &lt;span class="a2a_kit a2a_kit_size_16 addtoany_list" data-a2a-url="https://news.hitb.org/content/vietnamese-and-indonesian-hackers-claim-top-spots-hitb2013kul-ctf-contest" data-a2a-title="Vietnamese and Indonesian hackers claim top spots in #HITB2013KUL CTF contest"&gt;&lt;a class="a2a_button_facebook"&gt;&lt;span class="fa fa-facebook"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_twitter"&gt;&lt;span class="fa fa-twitter"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_linkedin"&gt;&lt;span class="fa fa-linkedin"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_email"&gt;&lt;span class="fa fa-envelope"&gt;&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;
        &lt;/div&gt;
            &lt;div class="read-more"&gt;&lt;a href="https://news.hitb.org/content/vietnamese-and-indonesian-hackers-claim-top-spots-hitb2013kul-ctf-contest"&gt;&lt;span class="lowercase"&gt;→&lt;/span&gt;READ MORE&lt;/a&gt;&lt;/div&gt; 
    &lt;/div&gt;
  &lt;/article&gt;</description>
  <pubDate>Wed, 23 Oct 2013 23:25:01 +0000</pubDate>
    <dc:creator>l33tdawg</dc:creator>
    <guid isPermaLink="false">48323 at https://news.hitb.org</guid>
    </item>
<item>
  <title>Facebook data mining tool uncovers your life</title>
  <link>https://news.hitb.org/content/facebook-data-mining-tool-uncovers-your-life</link>
  <description>    &lt;article data-history-node-id="48309" role="article" class="node article teaser clearfix UTF-8"&gt;&lt;header&gt;&lt;h2 class="title text-center"&gt;&lt;a href="https://news.hitb.org/content/facebook-data-mining-tool-uncovers-your-life" rel="bookmark"&gt;&lt;span&gt;Facebook data mining tool uncovers your life&lt;/span&gt;
&lt;/a&gt;&lt;/h2&gt;
       
      &lt;div class="meta submit clearfix"&gt;
        &lt;div class="date text-right"&gt;
          &lt;span class="lowercase"&gt;posted on&lt;/span&gt;October 22, 2013
        &lt;/div&gt;
        &lt;div class="author"&gt;
                            
          &lt;span class="lowercase"&gt;by&lt;/span&gt; &lt;span&gt;&lt;span&gt;l33tdawg&lt;/span&gt;&lt;/span&gt;

        &lt;/div&gt;
      &lt;/div&gt;      
    &lt;/header&gt;&lt;div class="image-default"&gt;
        
            &lt;div&gt;  &lt;a href="https://news.hitb.org/content/facebook-data-mining-tool-uncovers-your-life" hreflang="en"&gt;&lt;img loading="lazy" src="https://news.hitb.org/sites/default/files/styles/medium/public/field/image/hitb2013kul-trustwave.jpg?itok=auO18c7S" width="220" height="143" alt="http://www.net-security.org/images/articles/hitb2013kul-trustwave.jpg" title="Credit: HNS " /&gt;&lt;/a&gt;
&lt;/div&gt;
      &lt;div class="image-credit"&gt;
        &lt;strong&gt;Credit:&lt;/strong&gt;
                  &lt;a href="http://www.net-security.org/images/articles/hitb2013kul-trustwave.jpg" target="_blank"&gt;http://www.net-security.org/images/articles/hitb2013kul-trustwave.jpg&lt;/a&gt;
              &lt;/div&gt;
      
      &lt;/div&gt;
     
    &lt;div class="content"&gt;
      
            &lt;div&gt;&lt;p&gt;You know you shouldn't post potentially damaging data on Facebook, but more often that not, your friends don't think twice about it, and this can impact you even more than you think. At the Hack In The Box conference in Kuala Lumpur, security consultants Keith Lee and Jonathan Werrett from SpiderLabs revealed how a simple tool can enable anyone to find a comprehensive amount of data on any user.&lt;/p&gt;&lt;/div&gt;
      
    &lt;/div&gt;    
    &lt;div class="meta link clearfix"&gt;
      &lt;div class="comment"&gt;
                  &lt;span class="lowercase"&gt;no&lt;/span&gt;comment
                    
      &lt;/div&gt;
              &lt;div class="share text-center show-for-medium"&gt;
          &lt;span class="a2a_kit a2a_kit_size_16 addtoany_list" data-a2a-url="https://news.hitb.org/content/facebook-data-mining-tool-uncovers-your-life" data-a2a-title="Facebook data mining tool uncovers your life"&gt;&lt;a class="a2a_button_facebook"&gt;&lt;span class="fa fa-facebook"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_twitter"&gt;&lt;span class="fa fa-twitter"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_linkedin"&gt;&lt;span class="fa fa-linkedin"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_email"&gt;&lt;span class="fa fa-envelope"&gt;&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;
        &lt;/div&gt;
            &lt;div class="read-more"&gt;&lt;a href="https://news.hitb.org/content/facebook-data-mining-tool-uncovers-your-life"&gt;&lt;span class="lowercase"&gt;→&lt;/span&gt;READ MORE&lt;/a&gt;&lt;/div&gt; 
    &lt;/div&gt;
  &lt;/article&gt;</description>
  <pubDate>Tue, 22 Oct 2013 01:30:02 +0000</pubDate>
    <dc:creator>l33tdawg</dc:creator>
    <guid isPermaLink="false">48309 at https://news.hitb.org</guid>
    </item>
<item>
  <title>Of Course iMessages Isn't Perfectly Secure - Nothing Is</title>
  <link>https://news.hitb.org/content/course-imessages-isnt-perfectly-secure-nothing</link>
  <description>    &lt;article data-history-node-id="48304" role="article" class="node article teaser clearfix UTF-8"&gt;&lt;header&gt;&lt;h2 class="title text-center"&gt;&lt;a href="https://news.hitb.org/content/course-imessages-isnt-perfectly-secure-nothing" rel="bookmark"&gt;&lt;span&gt;Of Course iMessages Isn't Perfectly Secure - Nothing Is&lt;/span&gt;
&lt;/a&gt;&lt;/h2&gt;
       
      &lt;div class="meta submit clearfix"&gt;
        &lt;div class="date text-right"&gt;
          &lt;span class="lowercase"&gt;posted on&lt;/span&gt;October 21, 2013
        &lt;/div&gt;
        &lt;div class="author"&gt;
                            
          &lt;span class="lowercase"&gt;by&lt;/span&gt; &lt;span&gt;&lt;span&gt;l33tdawg&lt;/span&gt;&lt;/span&gt;

        &lt;/div&gt;
      &lt;/div&gt;      
    &lt;/header&gt;&lt;div class="image-default"&gt;
        
            &lt;div&gt;  &lt;a href="https://news.hitb.org/content/course-imessages-isnt-perfectly-secure-nothing" hreflang="en"&gt;&lt;img loading="lazy" src="https://news.hitb.org/sites/default/files/styles/medium/public/field/image/300px-Apple-logo.svg__1.png?itok=Orm0GFnx" width="180" height="220" alt="http://en.wikipedia.org/wiki/Apple_Inc." title="Credit: Wikipedia" /&gt;&lt;/a&gt;
&lt;/div&gt;
      &lt;div class="image-credit"&gt;
        &lt;strong&gt;Credit:&lt;/strong&gt;
                  &lt;a href="http://en.wikipedia.org/wiki/Apple_Inc." target="_blank"&gt;http://en.wikipedia.org/wiki/Apple_Inc.&lt;/a&gt;
              &lt;/div&gt;
      
      &lt;/div&gt;
     
    &lt;div class="content"&gt;
      
            &lt;div&gt;&lt;p&gt;iMessage is supposed to be bulletproof. Apple claims its end-to-end encrypted messaging service, as well as its video messaging app FaceTime, are so secure that even it lacks the means to decrypt the data sent between sender and receiver. No backdoors, no workarounds, nothing.&lt;/p&gt;&lt;/div&gt;
      
    &lt;/div&gt;    
    &lt;div class="meta link clearfix"&gt;
      &lt;div class="comment"&gt;
                  &lt;span class="lowercase"&gt;no&lt;/span&gt;comment
                    
      &lt;/div&gt;
              &lt;div class="share text-center show-for-medium"&gt;
          &lt;span class="a2a_kit a2a_kit_size_16 addtoany_list" data-a2a-url="https://news.hitb.org/content/course-imessages-isnt-perfectly-secure-nothing" data-a2a-title="Of Course iMessages Isn't Perfectly Secure - Nothing Is"&gt;&lt;a class="a2a_button_facebook"&gt;&lt;span class="fa fa-facebook"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_twitter"&gt;&lt;span class="fa fa-twitter"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_linkedin"&gt;&lt;span class="fa fa-linkedin"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_email"&gt;&lt;span class="fa fa-envelope"&gt;&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;
        &lt;/div&gt;
            &lt;div class="read-more"&gt;&lt;a href="https://news.hitb.org/content/course-imessages-isnt-perfectly-secure-nothing"&gt;&lt;span class="lowercase"&gt;→&lt;/span&gt;READ MORE&lt;/a&gt;&lt;/div&gt; 
    &lt;/div&gt;
  &lt;/article&gt;</description>
  <pubDate>Mon, 21 Oct 2013 01:22:48 +0000</pubDate>
    <dc:creator>l33tdawg</dc:creator>
    <guid isPermaLink="false">48304 at https://news.hitb.org</guid>
    </item>
<item>
  <title>Hackers: Here's video of how Apple's iMessage surveillance flaw works</title>
  <link>https://news.hitb.org/content/hackers-heres-video-how-apples-imessage-surveillance-flaw-works</link>
  <description>    &lt;article data-history-node-id="48295" role="article" class="node article teaser clearfix UTF-8"&gt;&lt;header&gt;&lt;h2 class="title text-center"&gt;&lt;a href="https://news.hitb.org/content/hackers-heres-video-how-apples-imessage-surveillance-flaw-works" rel="bookmark"&gt;&lt;span&gt;Hackers: Here's video of how Apple's iMessage surveillance flaw works&lt;/span&gt;
&lt;/a&gt;&lt;/h2&gt;
       
      &lt;div class="meta submit clearfix"&gt;
        &lt;div class="date text-right"&gt;
          &lt;span class="lowercase"&gt;posted on&lt;/span&gt;October 18, 2013
        &lt;/div&gt;
        &lt;div class="author"&gt;
                            
          &lt;span class="lowercase"&gt;by&lt;/span&gt; &lt;span&gt;&lt;span&gt;l33tdawg&lt;/span&gt;&lt;/span&gt;

        &lt;/div&gt;
      &lt;/div&gt;      
    &lt;/header&gt;&lt;div class="image-default"&gt;
        
            &lt;div&gt;  &lt;a href="https://news.hitb.org/content/hackers-heres-video-how-apples-imessage-surveillance-flaw-works" hreflang="en"&gt;&lt;img loading="lazy" src="https://news.hitb.org/sites/default/files/styles/medium/public/field/image/Screen%20Shot%202013-10-19%20at%2012.30.32%20AM.png?itok=UBmcz6gS" width="220" height="168" alt="http://youtu.be/EbqZnTKDVU0" title="Credit: YouTube" /&gt;&lt;/a&gt;
&lt;/div&gt;
      &lt;div class="image-credit"&gt;
        &lt;strong&gt;Credit:&lt;/strong&gt;
                  &lt;a href="http://youtu.be/EbqZnTKDVU0" target="_blank"&gt;http://youtu.be/EbqZnTKDVU0&lt;/a&gt;
              &lt;/div&gt;
      
      &lt;/div&gt;
     
    &lt;div class="content"&gt;
      
            &lt;div&gt;&lt;p&gt;Hackers this week showed security conference attendees findings and demonstrations directly contradicting Apple's public claim that it can't read iMessages.&lt;/p&gt;
&lt;p&gt;Even though the messages are encrypted end-to-end as Apple claims, according to &lt;a href="http://quarkslab.com/"&gt;QuarksLab&lt;/a&gt; researchers showed a packed room at &lt;a href="http://conference.hitb.org/hitbsecconf2013kul/"&gt;Hack In The Box Kuala Lumpur&lt;/a&gt;, due to the lack of certificate pinning, "Apple can technically read your iMessages whenever they want."&lt;/p&gt;&lt;/div&gt;
      
    &lt;/div&gt;    
    &lt;div class="meta link clearfix"&gt;
      &lt;div class="comment"&gt;
                  &lt;span class="lowercase"&gt;no&lt;/span&gt;comment
                    
      &lt;/div&gt;
              &lt;div class="share text-center show-for-medium"&gt;
          &lt;span class="a2a_kit a2a_kit_size_16 addtoany_list" data-a2a-url="https://news.hitb.org/content/hackers-heres-video-how-apples-imessage-surveillance-flaw-works" data-a2a-title="Hackers: Here's video of how Apple's iMessage surveillance flaw works"&gt;&lt;a class="a2a_button_facebook"&gt;&lt;span class="fa fa-facebook"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_twitter"&gt;&lt;span class="fa fa-twitter"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_linkedin"&gt;&lt;span class="fa fa-linkedin"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_email"&gt;&lt;span class="fa fa-envelope"&gt;&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;
        &lt;/div&gt;
            &lt;div class="read-more"&gt;&lt;a href="https://news.hitb.org/content/hackers-heres-video-how-apples-imessage-surveillance-flaw-works"&gt;&lt;span class="lowercase"&gt;→&lt;/span&gt;READ MORE&lt;/a&gt;&lt;/div&gt; 
    &lt;/div&gt;
  &lt;/article&gt;</description>
  <pubDate>Fri, 18 Oct 2013 16:16:36 +0000</pubDate>
    <dc:creator>l33tdawg</dc:creator>
    <guid isPermaLink="false">48295 at https://news.hitb.org</guid>
    </item>
<item>
  <title>Experts: Yes, Apple and the NSA Can Read Your iMessages</title>
  <link>https://news.hitb.org/content/experts-yes-apple-and-nsa-can-read-your-imessages</link>
  <description>    &lt;article data-history-node-id="48294" role="article" class="node article teaser clearfix UTF-8"&gt;&lt;header&gt;&lt;h2 class="title text-center"&gt;&lt;a href="https://news.hitb.org/content/experts-yes-apple-and-nsa-can-read-your-imessages" rel="bookmark"&gt;&lt;span&gt;Experts: Yes, Apple and the NSA Can Read Your iMessages&lt;/span&gt;
&lt;/a&gt;&lt;/h2&gt;
       
      &lt;div class="meta submit clearfix"&gt;
        &lt;div class="date text-right"&gt;
          &lt;span class="lowercase"&gt;posted on&lt;/span&gt;October 18, 2013
        &lt;/div&gt;
        &lt;div class="author"&gt;
                            
          &lt;span class="lowercase"&gt;by&lt;/span&gt; &lt;span&gt;&lt;span&gt;l33tdawg&lt;/span&gt;&lt;/span&gt;

        &lt;/div&gt;
      &lt;/div&gt;      
    &lt;/header&gt;&lt;div class="image-default"&gt;
        
            &lt;div&gt;  &lt;a href="https://news.hitb.org/content/experts-yes-apple-and-nsa-can-read-your-imessages" hreflang="en"&gt;&lt;img loading="lazy" src="https://news.hitb.org/sites/default/files/styles/medium/public/field/image/iMessage.jpg?itok=XBpzfjwV" width="220" height="124" alt="http://rack.3.mshcdn.com/media/ZgkyMDEzLzEwLzE4LzgzL2lNZXNzYWdlLmMxOWU4LmpwZwpwCXRodW1iCTk1MHg1MzQjCmUJanBn/abddaf89/c62/iMessage.jpg" title="Credit: Mashable" /&gt;&lt;/a&gt;
&lt;/div&gt;
      &lt;div class="image-credit"&gt;
        &lt;strong&gt;Credit:&lt;/strong&gt;
                  &lt;a href="http://rack.3.mshcdn.com/media/ZgkyMDEzLzEwLzE4LzgzL2lNZXNzYWdlLmMxOWU4LmpwZwpwCXRodW1iCTk1MHg1MzQjCmUJanBn/abddaf89/c62/iMessage.jpg" target="_blank"&gt;http://rack.3.mshcdn.com/media/ZgkyMDEzLzEwLzE4LzgzL2lNZXNzYWdlLmMxOWU4LmpwZwpwCXRodW1iCTk1MHg1MzQjCmUJanBn/abddaf89/c62/iMessage.jpg&lt;/a&gt;
              &lt;/div&gt;
      
      &lt;/div&gt;
     
    &lt;div class="content"&gt;
      
            &lt;div&gt;&lt;p&gt;Security experts have long suspected that iMessage is not as safe and impenetrable as Apple claims. But a group of researchers says it has proof that Apple can indeed eavesdrop on your iMessages — and the NSA can, too.&lt;/p&gt;
&lt;p&gt;The researchers, through a careful and thorough study of the iMessage protocol, conclude that Apple has the ability to intercept and decrypt iMessages. Even though the messages are encrypted end-to-end, Apple manages the keys needed to encrypt and exchange the messages, the researchers found.&lt;/p&gt;&lt;/div&gt;
      
    &lt;/div&gt;    
    &lt;div class="meta link clearfix"&gt;
      &lt;div class="comment"&gt;
                  &lt;span class="lowercase"&gt;no&lt;/span&gt;comment
                    
      &lt;/div&gt;
              &lt;div class="share text-center show-for-medium"&gt;
          &lt;span class="a2a_kit a2a_kit_size_16 addtoany_list" data-a2a-url="https://news.hitb.org/content/experts-yes-apple-and-nsa-can-read-your-imessages" data-a2a-title="Experts: Yes, Apple and the NSA Can Read Your iMessages"&gt;&lt;a class="a2a_button_facebook"&gt;&lt;span class="fa fa-facebook"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_twitter"&gt;&lt;span class="fa fa-twitter"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_linkedin"&gt;&lt;span class="fa fa-linkedin"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="a2a_button_email"&gt;&lt;span class="fa fa-envelope"&gt;&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;
        &lt;/div&gt;
            &lt;div class="read-more"&gt;&lt;a href="https://news.hitb.org/content/experts-yes-apple-and-nsa-can-read-your-imessages"&gt;&lt;span class="lowercase"&gt;→&lt;/span&gt;READ MORE&lt;/a&gt;&lt;/div&gt; 
    &lt;/div&gt;
  &lt;/article&gt;</description>
  <pubDate>Fri, 18 Oct 2013 14:50:11 +0000</pubDate>
    <dc:creator>l33tdawg</dc:creator>
    <guid isPermaLink="false">48294 at https://news.hitb.org</guid>
    </item>

  </channel>
</rss>