Speakers: Kyle 'Kos' Osborn Application Security Specialist, WhiteHat Security | Matt Johanson Application Security Specialist, WhiteHat Security Google recently announced Chrome OS powered computers, called Chromebooks, at Google I/O and the company is getting ready to market them to businesses as well as consumers. What's different about Chrome OS and Chromebooks, other than the entire user-experience taking place exclusively in a Web browser (Google Chrome), is everything takes place in the cloud. Email, document writing, calendaring, social networking - everything. From a security perspective this means that all website and Web browser attack techniques, such as like Cross-Site Scripting, Cross-Site Request, and Clickjacking, have the potential of circumventing Chrome OS's security protections and exposing all the users data. Two members of the WhiteHat Security's Threat Research Center, Matt Johansen and Kyle Osborn, have spent months hacking away on Google's Cr-48 prototype laptops. They discovered a slew of serious and fundamental security design flaws that with no more than a single mouse-click may victimize users by: • Exposing of all user email, contacts, and saved documents. • Conduct high speed scans their intranet work and revealing active host IP addresses. • Spoofing messaging in their Google Voice account. • Taking over their Google account by stealing session cookies, and in some case do the same on other visited domains. While Chrome OS and Chromebooks ...
Friday, January 18, 2013
DEFCON 19: Hacking Google Chrome OS (w speaker)
DEFCON 19: Hacking Google Chrome OS (w speaker) Video Clips. Duration : 45.82 Mins.
Speakers: Kyle 'Kos' Osborn Application Security Specialist, WhiteHat Security | Matt Johanson Application Security Specialist, WhiteHat Security Google recently announced Chrome OS powered computers, called Chromebooks, at Google I/O and the company is getting ready to market them to businesses as well as consumers. What's different about Chrome OS and Chromebooks, other than the entire user-experience taking place exclusively in a Web browser (Google Chrome), is everything takes place in the cloud. Email, document writing, calendaring, social networking - everything. From a security perspective this means that all website and Web browser attack techniques, such as like Cross-Site Scripting, Cross-Site Request, and Clickjacking, have the potential of circumventing Chrome OS's security protections and exposing all the users data. Two members of the WhiteHat Security's Threat Research Center, Matt Johansen and Kyle Osborn, have spent months hacking away on Google's Cr-48 prototype laptops. They discovered a slew of serious and fundamental security design flaws that with no more than a single mouse-click may victimize users by: • Exposing of all user email, contacts, and saved documents. • Conduct high speed scans their intranet work and revealing active host IP addresses. • Spoofing messaging in their Google Voice account. • Taking over their Google account by stealing session cookies, and in some case do the same on other visited domains. While Chrome OS and Chromebooks ...
Speakers: Kyle 'Kos' Osborn Application Security Specialist, WhiteHat Security | Matt Johanson Application Security Specialist, WhiteHat Security Google recently announced Chrome OS powered computers, called Chromebooks, at Google I/O and the company is getting ready to market them to businesses as well as consumers. What's different about Chrome OS and Chromebooks, other than the entire user-experience taking place exclusively in a Web browser (Google Chrome), is everything takes place in the cloud. Email, document writing, calendaring, social networking - everything. From a security perspective this means that all website and Web browser attack techniques, such as like Cross-Site Scripting, Cross-Site Request, and Clickjacking, have the potential of circumventing Chrome OS's security protections and exposing all the users data. Two members of the WhiteHat Security's Threat Research Center, Matt Johansen and Kyle Osborn, have spent months hacking away on Google's Cr-48 prototype laptops. They discovered a slew of serious and fundamental security design flaws that with no more than a single mouse-click may victimize users by: • Exposing of all user email, contacts, and saved documents. • Conduct high speed scans their intranet work and revealing active host IP addresses. • Spoofing messaging in their Google Voice account. • Taking over their Google account by stealing session cookies, and in some case do the same on other visited domains. While Chrome OS and Chromebooks ...
Subscribe to:
Post Comments (Atom)
Search
Blog Archive
-
▼
2013
(234)
-
▼
January
(99)
- TEDxCaltech - S. George Djorgovski - Evolving Scie...
- TEDxAsheville - Joyce Roush - The power of one
- Stereo Design Paradigm Studio CC-690 v.5 Center Sp...
- TEDxWomen -- Tan Le
- Basement Home Theater in HD
- Samsung Galaxy S2 i9100 repair PART 2
- EXO Car Audio Updates: Custom Center Console w/ Ta...
- Volkswagen GTI Stock vs. Magnaflow Exhaust by WIND...
- TEDxBlue - Daniel J. Siegel, MD - 10/18/09
- Creative Sound Blaster X-Fi Go! Pro USB Sound Card...
- TEDxBuenosAires 2011 - Victor Chan - 40 años con e...
- Shark Evoline 2 ST Helmet Review at RevZilla.com
- TEDxChapmanU -- Yossie Hollander -- Ending Our Oil...
- DOHA Debates - The Pro Israel Lobby (AIPAC)
- Speaker Repair Foam Edge Styles and Sizes for Spea...
- Nonviolent Communication Part 1 Marshall Rosenberg
- Supercharged Cadillac Rezcalade EXT 10000 Watt ZAP...
- Lautsprecher Teufel - LT3 Power Edition "Out of th...
- DIY Speaker Stands for Audioengine A5 Speakers
- Be Great!: Juliet Doherty at TEDxABQ
- Painfully LOUD Mids & Highs & Clean Car Audio Inst...
- TEDxSydney - David Chalmers - The Extended Mind
- Logitech Surround Sound Speakers Z506
- GTA Car Kits - Lexus GS 2006-2011 install of iPhon...
- MacEwan University - Student Business Conference
- Definitive Technology Tech Video - Bass Radiators
- Behind The Build Porsche 997 Carerra Alpine INE-Z9...
- RS Components Raspberry Pi Powered XBMC Media Center
- Laura Decrescenzo (pt.2) - Ex-Scientologists Speak...
- Oakland Approves Mass Production Cannabis Farms
- Pioneer VSX-820-K 5.1 Home Theater A/V Receiver Black
- TEDxLahore - Arif Hasan - Building Better Cities
- An amazing alternative to expensive name brand sou...
- Nancy Many (pt.1) - Ex-Scientologists Speak Out [1...
- Best Gaming Room Tour PC, XBOX 360, Racing Simulat...
- NT Wright Responds to John Piper 9
- TEDxCaltech - Nadine Dabby - Programming Molecular...
- TEDxBerkeley - Neha Sangwan - The Communication Cure
- Rick Rigsby - National FFA Convention Part 1
- How to install a new radio in a 2004 Honda Civic 1...
- ROCKTRON REACTION SHOOT-OUT : DISTORTION I vs II -...
- HOW TO: Setting Up A Basic PA System
- GTA Car Kits - Nissan Murano 2003-2008 install of ...
- Marc Headley (pt.2) - Ex-Scientologists Speak Out ...
- DEFCON 19: Hacking Google Chrome OS (w speaker)
- Martin Logan Electro Motion ESL Speaker System
- Jason Dorsey: Gen Y and Millennials Keynote Speake...
- TEDxPhilly - Philly Youth Poetry Movement - Youth ...
- Iasca Audio and Car Show 06-20-09 Bradenton, FL
- Your Hand In Mine - Explosions In The Sky [HD] (Co...
- Quake 4 Walkthrough - Air Defence Bunker - Level 1
- An Imperfect Instrument: Jennifer Stumm @ TEDxAlde...
- Neil Young - Field of Opportunity - Farm Aid 2006
- TEDxSanJoseCA - Adam Gazzaley, MD, PhD - Brain: Me...
- TEDxRiverCity - Robert Stickgold - Sleep, Memory a...
- 10 year old intellect, Dalton Sherman's keynote sp...
- Asus Xonar DX Sound
- Emily Bazelon at TEDxWomen 2012
- Practicing English with Yourself - Part 1
- Anita Sarkeesian at TEDxWomen 2012
- Unboxing: AKG K 271 MK II Studio Headphones
- Ultimate Mac Mini Media Center / HTPC
- FORGET Yesterday, FOCUS on Tomorrow- Bishop GE Pat...
- Insane Subwoofer Demo w/ Jareds 4 15" Subs | 2 NS1...
- Salmaan Sana "Compassion for Care"
- 92-95 CIVC HATCH PAT BLACK DESIGN TAIL GATE SPEAKE...
- Rusko - Whistle Crew
- NEW 2012 MacBook Pro with Retina display review in HD
- Dr. Murray Banks - How To Live With Yourself (Part 2)
- Co-Teaching & Other Collaborative Projects for Eng...
- Community Health Centers (08/09/2010 Webchat)
- The Undergraduate Lecture: Four Teaching Styles
- Desk Audio Setup and Tour
- Commencement Keynote 2012
- AKAI MPC-5000 Sampler
- KEF Q900
- Eve Ensler TEDxWomen 2012
- Rusko - Be Free
- How To Install Replace Door Panel Silverado Sierra...
- Six Big Ideas and One Little One | The New School
- Purity Ring :: Lofticries LIVE
- TEDxSalem - Durga Jagadish - Vernacular Architecture
- "I Go Back" in a Dallas Rainstorm
- My home theater
- Double vison: Ryan and Trevor Oakes at TEDxCooperU...
- Lepai LP-2020A+ Tripath Class T Mini Amplifier - T...
- Lexus IS-F Speaker Box - 15" SMD Woofer - Fibergla...
- TEDxCincy - Jeff Edmondson - The Key to Educationa...
- Walk With Me Lord - Bishop GE Patterson, "Singing ...
- Custom Amd Nvidia Powered Gaming Pc(OLD RIG)
- On Resilience: Michaela Murphy at TEDxBarnardColle...
- Chris Urteaga Choreography - Carly Rae Jepsen "Cal...
- China's New Resource Diplomacy
- TEDxMaastricht - Lawrence Sherman - "Turning medic...
- Telling the Story in 1/60th of a Second: David Hum...
- iO Tillett Wright at TEDxWomen 2012
- IT Style (Gangnam Style Parody)
- Five Finger Death Punch-The Bleeding(LIVE)Opera Ho...
- Ellie Goulding- Lights (Bassnectar Remix) [NEW] 10...
-
▼
January
(99)
Powered by Blogger.
No comments:
Post a Comment