WhatsApp, the incredibly popular instant messaging service recently purchased by Facebook for almost $20 bilion, is offline at the moment. So, yeah, it's not just you. It's the WhatsApp servers. There's no word yet on how long the outage will last, so let us know in the comments whether it's working for you yet, and if not, when it starts working again!
Serious security flaw in OAuth, OpenID discovered
Serious security flaw in OAuth, OpenID discovered
Attackers can use the "Covert Redirect" vulnerability in both open-source login systems to steal your data and redirect you to unsafe sites.
Beware of links that ask you to log in through Facebook. The OAuth 2.0 and OpenID modules are vulnerable.iStockphoto
Following in the steps of the OpenSSL vulnerability Heartbleed, another major flaw has been found in popular open-source security software. This time, the holes have been found in the login tools OAuth and OpenID, used by many websites and tech titans including Google, Facebook, Microsoft, and LinkedIn, among others.
Wang Jing, a Ph.D student at the Nanyang Technological University in Singapore, discovered that the serious vulnerability "Covert Redirect" flaw can masquerade as a login popup based on an affected site's domain. Covert Redirect is based on a well-known exploit parameter.
For example, someone clicking on a malicious phishing link will get a popup window in Facebook, asking them to authorize the app. Instead of using a fake domain name that's similar to trick users, the Covert Redirect flaw uses the real site address for authentication.
If a user chooses to authorize the login, personal data (depending on what is being asked for) will be released to the attacker instead of to the legitimate website. This can range from email addresses, birth dates, contact lists and possibly even control of the account.
Regardless of whether the victim chooses to authorize the app, they will then get redirected to a website of the attacker's choice, which could potentially further compromise the victim.
Wang says he has already contacted Facebook and has reported the flaw, but was told that the company "understood the risks associated with OAuth 2.0," and that "short of forcing every single application on the platform to use a whitelist," fixing this bug was "something that can't be accomplished in the short term."
Facebook isn't the only site affected. Wang says he has reported this to Google, LinkedIn and Microsoft, who gave him various responses on how they would handle the matter.
A sample list of websites that are affected by the Covert Redirect vulnerability.Wang Jing
Google (which uses OpenID) told him that the problem was being tracked, while LinkedIn said that the company would publish a blog on the matter soon. Microsoft, on the other hand, said that an investigation had been done and that the vulnerability existed on a the domain of a third-party and not on its own sites.
"Patching this vulnerability is easier said than done. If all the third-party applications strictly adhere to using a whitelist, then there would be no room for attacks," said Wang.
"However, in the real world, a large number of third-party applications do not do this due to various reasons. This makes the systems based on OAuth 2.0 or OpenID highly vulnerable."
Jeremiah Grossman, founder and interim CEO at WhiteHat Security, a website security firm, agreed with Wang's findings after looking at the data.
"While I can't be 100 percent certain, I could have sworn I've seen a report of a very similar if not identical vulnerability in OAuth. It would appear this issue is essentially a known WONTFIX," Grossman said.
"This is to say, it's not easy to fix, and any effective remedies would negatively impact the user experience. Just another example that Web security is fundamentally broken and the powers that be have little incentive to address the inherent flaws."
Further corroborating Wang's findings is Chris Wysopal, CTO at programming code verification firm Veracode.
Wsyopal told CNET that it looks to be a "very real issue" and that OAuth 2.0 looks vulnerable to phishing and redirect attacks.
"Given the trust users put in Facebook and other major OAuth providers I think it will be easy for attackers to trick people into giving some access to their personal information stored on those service," he said.
Users who wish to avoid any potential loss of data should be careful about clicking links that immediately ask you to log in to Facebook or Google. Closing the tab immediately should prevent any redirection attacks.
While this issue isn't as severe as Heartbleed, it's relatively easy to do so unless the flaw gets patched, which according to Wang, is quite difficult to implement due to third-party sites having "little incentive" to fix the problem. Cost is a factor, as well as the view that the host company (such as Facebook) bears the responsibility for making the attacks appear more credible.
The Heartbleed Bug

Check if a website is affected Here:Click
What leaks in practice?
How to stop the leak?
As long as the vulnerable version of OpenSSL is in use it can be abused. Fixed OpenSSL has been released and now it has to be deployed. Operating system vendors and distribution, appliance vendors, independent software vendors have to adopt the fix and notify their users. Service providers and users have to install the fix as it becomes available for the operating systems, networked appliances and software they use.
History
In April 2014, Neel Mehta of Google's security team reported a bug in all versions of OpenSSL in the 1.0.1 series released since March 14, 2012. The bug entailed a severe memory handling error in the implementation of the Transport Layer Security (TLS) Heartbeat Extension. This defect could be used to reveal up to 64 kilobytes of the application's memory with every heartbeat.The bug is registered in the Common Vulnerabilities and Exposures system as CVE-2014-0160. The bug is exercised by sending a malformed heartbeat request to the server in order to elicit the server's response, which normally consists of the same data buffer that was received. Due to a lack of bounds checking, the affected versions of OpenSSL did not verify the validity of the heartbeat request size, permitting attackers to read an arbitrary size of server memory.
The vulnerability has existed since December 31, 2011 and the vulnerable code has been in widespread use since the release of OpenSSL version 1.0.1 on March 14, 2012.It was submitted by a German Ph.D. student at the University of Duisburg-Essen
The bug was named by an engineer at the firm Codenomicon, a Finnish cybersecurity company, which also created the bleeding heart logo, and launched the domainHeartbleed.com to explain the bug to the public.[20] According to Codenomicon, Neel Mehta of Google's security team first reported the bug to OpenSSL, but both Google and Codenomicon discovered it independently. Mehta also congratulated Codenomicon, without going into detail.
What is the CVE-2014-0160?
Why it is called the Heartbleed Bug?
What makes the Heartbleed Bug unique?
Is this a design flaw in SSL/TLS protocol specification?
What is being leaked?
What is leaked primary key material and how to recover?
What is leaked secondary key material and how to recover?
What is leaked protected content and how to recover?
What is leaked collateral and how to recover?
Recovery sounds laborious, is there a short cut?
How revocation and reissuing of certificates works in practice?
Am I affected by the bug?
How widespread is this?
What versions of the OpenSSL are affected?
- OpenSSL 1.0.1 through 1.0.1f (inclusive) are vulnerable
- OpenSSL 1.0.1g is NOT vulnerable
- OpenSSL 1.0.0 branch is NOT vulnerable
- OpenSSL 0.9.8 branch is NOT vulnerable
How common are the vulnerable OpenSSL versions?
How about operating systems?
- Debian Wheezy (stable), OpenSSL 1.0.1e-2+deb7u4
- Ubuntu 12.04.4 LTS, OpenSSL 1.0.1-4ubuntu5.11
- CentOS 6.5, OpenSSL 1.0.1e-15
- Fedora 18, OpenSSL 1.0.1e-4
- OpenBSD 5.3 (OpenSSL 1.0.1c 10 May 2012) and 5.4 (OpenSSL 1.0.1c 10 May 2012)
- FreeBSD 10.0 - OpenSSL 1.0.1e 11 Feb 2013
- NetBSD 5.0.2 (OpenSSL 1.0.1e)
- OpenSUSE 12.2 (OpenSSL 1.0.1c)
- Debian Squeeze (oldstable), OpenSSL 0.9.8o-4squeeze14
- SUSE Linux Enterprise Server
- FreeBSD 8.4 - OpenSSL 0.9.8y 5 Feb 2013
- FreeBSD 9.2 - OpenSSL 0.9.8y 5 Feb 2013
- FreeBSD 10.0p1 - OpenSSL 1.0.1g (At 8 Apr 18:27:46 2014 UTC)
- FreeBSD Ports - OpenSSL 1.0.1g (At 7 Apr 21:46:40 2014 UTC)
How can OpenSSL be fixed?
-DOPENSSL_NO_HEARTBEATS
.Should heartbeat be removed to aid in detection of vulnerable services?
Can I detect if someone has exploited this against me?
Can IDS/IPS detect or block this attack?
Has this been abused in the wild?
Can attacker access only 64k of the memory?
Is this a MITM bug like Apple's goto fail bug was?
Does TLS client certificate authentication mitigate this?
Does OpenSSL's FIPS mode mitigate this?
Does Perfect Forward Secrecy (PFS) mitigate this?
Can heartbeat extension be disabled during the TLS handshake?
Who found the Heartbleed Bug?
What is the Defensics SafeGuard?
Who coordinates response to this vulnerability?
Is there a bright side to all this?
Where to find more information?
Lose Weight Naturally
SapnaVyas Patel Weight Loss and Fitness Expert
I can help you lose weight, just like I did.
I lost 33 kg in 1 year without any pills, surgery or crash dieting and now I am helping others to do the same. I have helped more than 10000 people to lose weight without charging money and I can help you too - for real..
This isn't a fad diet, it's a realistic way to eat better
No need to 'Stay Hungry' or do 'Fruit Days' anymore
Learn what to eat, when to eat and how much to eat
Here's how you can lose weight, just like I did
You just need to do six things... That's it.
Follow My Exercise Tutorials
Start doing exercise with the help of step-by-step guide.Choose Your Meal Plan
Select a diet plan which suits your lifestyle and follow it.Make Smart Choices
Learn - What, When and How much to eat at restaurantsLearn Portion Control
Learn the portion control technique (using your hand)Maintain Good Posture
Check out the visual guide to good postureCultivate Healthy Habits
Follow my easy-to-understand, simple-to-follow guidelines.
Weight loss is no rocket science. You can enjoy your life and lose those extra pounds. If I can do it, you can do it too…!!
Facebook Redesigned
Facebook Graph Search
On January 15th at Palo Alto Facebook CEO Mark Zuckerberg held a press conference to announce the unveiling of "Graph Search" - A search engine that will allow people using Facebook to more quickly find answers to questions about friends in their Social Graph. "This is one of the coolest things we've done in a while," Zuckerberg said.
Introduction to Graph Search
With graph search you can look up anything shared with you on Facebook, and others can find stuff you’ve shared with them. Each person sees unique results. One example demonstrated was a very specific search for "Friends of my friends who are single male San Francisco,Calif." That refined query returned a select group of people who fit the criteria. Apart from personal use cases, Graph Search can be used for dating and recruiting purposes, which could make the product a potential challenger to LinkedIn and various dating sites that incorporate social network profiles.
.jpg)
How Graph search works by Mark Zuckerberg
The Graph search is being opened to all English (US) speaking users in the coming months. You can get on the waiting list.
The Moving Rocks of Death Valley
Moving rocks refer to a geological phenomenon where rocks move in long tracks along a smooth valley floor without human or animal intervention. They have been recorded and studied in a number of places around Racetrack Playa, Death Valley.
The force behind their movement is not confirmed and is the subject of research for which several hypotheses exist.For years, people have been puzzled by a peculiar phenomenon in Racetrack Playa, a desolate section of California's Death Valley. Big and small rocks seem to move spontaneously, gliding across the flat landscape and leaving behind trails. Some travel in pairs, tracking each other so precisely that they leave marks that appear to have been made by car tires. Others wander back and forth alone, covering the length of several football fields.
Some move in strainght line ,taking turns at after
Moving Rock |
What Makes Death Valley Rocks Move by Themselves?
Are They Moved by People or Animals?
The shape of trails behind the rocks suggest that they move during times when the floor of Racetrack Playa is covered with a very soft mud. A lack of disturbed mud around the rock trails eliminates the possibility of a human or animal pushing or assisting the motion of the rocks.
Another theory is that the rocks are moved by powerful winds that rage through the desert at night. In the 1950s, a researcher tried to simulate this effect with an airplane but was unable to move any rocks very far. In the late 1960s and early 1970s, California Institute of Technology geologist Robert P. Sharp built upon the wind theory by suggesting that the rocks required precise environmental conditions to move. The Playa floor is moistened by meltwater from adjacent mountains. Sharp theorized that it had to be saturated with a quarter to three-eighths of an inch of water, just enough to make the surface slick but not enough to make it soggy.
Sharp attempted to track the movements of rocks, which has never been observed in real time. He and a colleague from UCLA placed stakes near 25 rocks of various sizes and gave them names such as "Mary Ann" and "Irene."
As this 1977 Associated Press article details, Sharp found that from 1968 to 1975, all but one of the 25 rocks moved, including seven that moved more than 300 feet.
Are They Moved by Ice?
A few people have reported seeing Racetrack Playa covered by a thin layer of ice. One idea is that water freezes around the rocks and then wind, blowing across the top of the ice, drags the ice sheet with its embedded rocks across the surface of the playa.
Some researchers have found highly congruent trails on multiple rocks that strongly support this movement theory. However, the transport of a large ice sheet might be expected to mark the playa surface in other ways - these marks have not been found.
Other researchers experimented with stakes that would be disturbed by ice sheets. The rocks moved without disturbing the stakes. The evidence for ice-sheet transport is not consistent.
Wind is the Favored Mover!
All of the best explanations involve wind as the energy source behind the movement of the rocks. The question remains is do they slide while encased in an ice sheet or do they simply side over the surface of the mud? Perhaps each of these methods is responsible for some rock movement?
Perhaps this story will remain more interesting if the real answer is never discovered!
NASA Studies on Sliding Rocks
NASA sent a team of interns and mentors to Racetrack Playa during Summer 2010. They made observations, performed tests, compiled data and developed some ideas about how the rocks might move.Check out their report and photos.
In 1976 Dr Robert Sharp of the geology department of the California Institute of Technology wrote in the Bulletin of Geological Society of America and stated that:
The secret is to catch the play of wind and water at precisely the right moment.
Not everybody is convinced of this though… Two years after the results were published, there was a severe frost after a week of heavy rain. Surely this would ‘glue’ the rocks in place? In the morning they found that several rocks had moved.
If its not nature, what then can be the secret of these rocks?