Tag: Bypass

An app that let Chinese users bypass the Great Firewall and access Google, Facebook has disappeared

  • A web browser called Tuber, backed by Qihoo 360, allowed Chinese users to access foreign websites such as YouTube and Facebook.
  • Google, Facebook and Twitter are all blocked in China due to the country’s Great Firewall. They can usually only be accessed via virtual private networks or VPNs.
  • The Tuber browser has now disappeared from app stores and its website no longer works.



a close up of a sign: In this photo illustration a logo of the American multinational technology company and search engine Google is seen on an Android mobile device with People's Republic of China flag in the background.


© Provided by CNBC
In this photo illustration a logo of the American multinational technology company and search engine Google is seen on an Android mobile device with People’s Republic of China flag in the background.

GUANGZHOU, China — An app that briefly gave Chinese internet users access to foreign websites such as YouTube and Facebook — services that have long been blocked — has now disappeared.

The web browser called Tuber was backed by Qihoo 360, a Chinese cybersecurity giant. On Oct. 9, a journalist at

Read More

Chinese App Helps Users Bypass Great Firewall

(Bloomberg) — One Chinese app briefly gave the country’s internet users access to long-banned websites like Facebook Inc. and Google, setting off speculation about the future of Beijing’s censorship practices.



a close up of a light: Green lights illuminate cable terminals on the Sberbank and SberCloud Christofari supercomputer during an event to mark its launch into commercial operation inside the Sberbank PJSC data processing center (DPC) at the Skolkovo Innovation Center in Moscow, Russia, on Monday, Dec. 16, 2019. As Sberbank expands its technology offerings, the Kremlin is backing legislation aimed at keeping the country's largest internet companies under local control by limiting foreign ownership.


© Bloomberg
Green lights illuminate cable terminals on the Sberbank and SberCloud Christofari supercomputer during an event to mark its launch into commercial operation inside the Sberbank PJSC data processing center (DPC) at the Skolkovo Innovation Center in Moscow, Russia, on Monday, Dec. 16, 2019. As Sberbank expands its technology offerings, the Kremlin is backing legislation aimed at keeping the country’s largest internet companies under local control by limiting foreign ownership.

The Tuber browser, backed by Chinese cybersecurity giant 360 Security Technology Inc., appeared to provide the nation’s 904 million online users the ability to legally visit overseas websites and browse foreign social media. Chinese users hailed their newfound ability to peruse content from Youtube videos to Instagram photos without

Read More

App Removed After Helping Users Bypass China’s Great Firewall

(Bloomberg) — An app backed by Chinese cybersecurity giant 360 Security Technology Inc. that helped users vault over Beijing’s Great Firewall was blocked and removed from mobile stores Saturday.



a close up of a light: Green lights illuminate cable terminals on the Sberbank and SberCloud Christofari supercomputer during an event to mark its launch into commercial operation inside the Sberbank PJSC data processing center (DPC) at the Skolkovo Innovation Center in Moscow, Russia, on Monday, Dec. 16, 2019. As Sberbank expands its technology offerings, the Kremlin is backing legislation aimed at keeping the country's largest internet companies under local control by limiting foreign ownership.


© Bloomberg
Green lights illuminate cable terminals on the Sberbank and SberCloud Christofari supercomputer during an event to mark its launch into commercial operation inside the Sberbank PJSC data processing center (DPC) at the Skolkovo Innovation Center in Moscow, Russia, on Monday, Dec. 16, 2019. As Sberbank expands its technology offerings, the Kremlin is backing legislation aimed at keeping the country’s largest internet companies under local control by limiting foreign ownership.

The Tuber browser, which let mainland users visit blocked sites from Google to Facebook Inc., stopped functioning Saturday afternoon and could no longer be located on the app store run by Huawei Technologies Co. It was unclear which agency ordered its removal, which came after Chinese users on social media

Read More

PQ Bypass Completes Enrollment in DETOUR2 Percutaneous Femoral-Popliteal Bypass Pivotal Study for Patients With Complex Peripheral Arterial Disease

FDA-designated Breakthrough Device now one step closer to PMA submission

PQ Bypass, an innovative medical device company pioneering advancements in the treatment of complex peripheral artery disease (PAD), announces enrollment of the final subject in the company’s flagship IDE, the DETOUR2 clinical trial. This important milestone occurs only a month after the Detour System entered the U.S. Food and Drug Administration’s Breakthrough Device Program.

This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20201006005791/en/

An image of PQ Bypass’ completed Detour Procedure (Photo: Business Wire).

DETOUR2 is led by National Co-Principal Investigators Sean Lyden, MD, Professor and Chairman of the Department of Vascular Surgery at the Cleveland Clinic, and Jihad Mustapha, MD, President, CEO and Director of Endovascular Interventions at Advanced Cardiac and Vascular Centers. Both National Co-PI’s receive compensation for their duties in this role.

“The speed with which we were able to enroll DETOUR2 in 2020 speaks

Read More

Epic’s decision to bypass Apple’s App Store policies were dishonest, says US judge

A US judge hearing arguments in Epic’s antitrust lawsuit against Apple has criticized the game developer’s decision to breach its contract with the iPhone maker by pushing a version of Fortnite with a custom payment system onto the App Store. The decision resulted in Apple removing Fortnite from the App Store.

During a hearing on Monday with both companies, Judge Yvonne Gonzalez Rogers of the United States District Court for the Northern District of California expressed skepticism about Epic’s arguments, particularly its claim that it did not pose a security threat to Apple because it is a well-established company and partner.

“You did something, you lied about it by omission, by not being forthcoming. That’s the security issue. That’s the security issue!” Rogers told Epic, according to a report from CNN. “There are a lot of people in the public who consider you guys heroes for what you guys

Read More

You can bypass TikTok’s MFA by logging in via a browser

tiktok.png

A month after TikTok rolled out multi-factor authentication (MFA) for its users, a ZDNet reader discovered that the company’s new security feature was only enabled for the mobile app but not its website.

This lapse in TikTok’s MFA implementation opens the door for scenarios where a malicious threat actor could bypass MFA by logging into an account with compromised credentials via its website, rather than the mobile app.

Reached out for comment on the ZDNet reader’s findings, a TikTok spokesperson said the company plans to expand MFA to cover its official website in the coming future.

In the meantime, users who have enabled MFA for their TikTok account for security reasons should not be lowering their guard and reuse passwords from other accounts, thinking MFA blocks all attackers. These users should continue to use complex and hard-to-guess passwords.

TikTok web dashboard has limited features

However, while this is technically an

Read More

New BlindSide attack uses speculative execution to bypass ASLR

blindside.png

Academics have developed a new technique for attacking secure computer systems by abusing speculative execution, a CPU mechanism that’s normally used for performance optimizations.

The technique, named BlindSide, was detailed in a paper [PDF] published last week by a team of academics from the Stevens Institute of Technology in New Jersey, ETH Zurich, and the Vrije University in Amsterdam.

Researchers say that BlindSide can be used to craft exploits that bypass ASLR (Address Space Layout Randomization) on modern operating systems.

BlindSide can bypass ASLR

Memory addresses are important for an attacker. If an attacker knows where an app executes its code inside the memory, a hacker can fine-tune exploits that attack particular applications and steal sensitive information. As its name hints, ASLR works by randomizing the location where code executes inside memory, effectively neutralizing attacks until attackers find a way around ASLR.

To bypass ASLR, an attacker typically needs

Read More

Big Tech’s India Plans Can’t Seem to Bypass Asia’s Richest Man

(Bloomberg) — Big Tech is clamoring for a larger piece of India’s booming internet space, but that increasingly seems to mean going through the country’s richest man, Mukesh Ambani.

Loading...

Load Error

Ambani’s Reliance Industries Ltd. is said to be offering to sell a stake of about $20 billion in its retail business to Amazon.com Inc., Bloomberg News reported last week. If Ambani succeeds in pulling off such a deal, it would mark another victory for the billionaire, who in recent months has secured $20 billion of investment in his digital unit from marquee names including Facebook Inc. and Google Inc.

The mere possibility of an Amazon investment reveals not only Ambani’s market clout, but also how India’s business climate is changing as Prime Minister Narendra Modi cranks up nationalist rhetoric while the nation hurtles toward the first annual economic contraction in 40 years. Having seen multiple regulatory roadblocks thrown in

Read More

Malware gang uses .NET library to generate Excel docs that bypass security checks

Microsoft Excel

A newly discovered malware gang is using a clever trick to create malicious Excel files that have low detection rates and a higher chance of evading security systems.

Discovered by security researchers from NVISO Labs, this malware gang — which they named Epic Manchego — has been active since June, targeting companies all over the world with phishing emails that carry a malicious Excel document.

But NVISO said these weren’t your standard Excel spreadsheets. The malicious Excel files were bypassing security scanners and had low detection rates.

Malicious Excel files were compiled with EPPlus

According to NVISO, this was because the documents weren’t compiled in the standard Microsoft Office software, but with a .NET library called EPPlus.

Developers typically use this library part of their applications to add “Export as Excel” or “Save as spreadsheet” functions. The library can be used to generate files in a wide variety of spreadsheet

Read More