суббота, 28 июля 2012 г.

MOBILE SECURITY ENGINEERS/HACKERS WANTED (IN A GOOD WAY)

viaForensics is an innovative digital forensics and security firm. We serve commercial clients as well many government agencies. viaForensics applies the science of forensics in a proactive manner in order to assist our customers manage sensitive data related issues.

Our primary focus is mobile security. Smartphones and tablets present unique security challenges as they are fully functional computers which are extremely mobile. They run complete operating systems and are wirelessly connected to the Internet and other networks via high speed connections. They also possess large amounts of storage and allow users to run sophisticated applications for personal or business use.
The mobile industry is relatively new, rapidly expanding and ever changing. New platforms and system updates are being rolled-out constantly. Additionally, applications are continually being developed for mobile devices as apps are the primary way to manage both consumer and corporate information. As a result, there is a tremendous need for highly specific and ever advancing security expertise. viaForensics leverages deep mobile expertise to assist companies and agencies protect critical information. Simultaneously, the same proficiency that makes us effective at securing data allows us to assist the law enforcement community with regards to data acquisition needs.

OPPORTUNITY

viaForensics is experiencing tremendous growth in both commercial and government markets. We work in a very exciting environment as the need for mobile security expertise is exploding and our expertise is highly sought after. As a result we are currently looking for a highly motivated, career oriented mobile security and forensics professionals to join the team.
The company was founded in 2009 and we have grown without outside investment. We are headquartered in the Chicago, IL area and have employees across the US as well as in the UK. Our current needs require individuals able to work from our headquarters or from the Washington D.C. area.

DESCRIPTION

The successful candidates will work as part of a team in order to:
  • Understand the strengths and weaknesses of data security related to applications.
  • Forensically acquire data stored on mobile devices.
  • Examine transmitted and stored data for personally identifiable information (PII) and/or mobile application artifacts.
  • Present specific intelligence on the data risk profile of applications when in actual use.
  • Utilize white hat hacking techniques and penetration testing to target mobile applications and test their security.
  • Upon establishment of vulnerabilities, work to identify key strategies for remediation.
  • Create technically sound and actionable reports for customers.
  • Continuously monitor the state of the mobile security industry with an eye towards innovation.
  • Work with R&D to assure continuous upgrades to existing offerings and the development of new cutting edge mobile security solutions.
  • Communicate effectively with customers to make sure all concerns are addressed and projects are delivered flawlessly.

EXPERIENCE REQUIRED/PREFERRED

  • Extensive IT security experience
  • 2+ years of experience in mobile security and/or secure mobile development
  • Government clearances a major plus
  • Experience with some or all of the following: Python, C/C++, Java, Objective C, Ruby, PHP, Assembly
  • Network, application and/or web pen testing experience a plus
  • Reverse engineering, especially mobile, a plus
  • Software development fundamentals (follow standards, proper design, source control)
  • Strong communication skills and a high level of professionalism
  • High integrity, no criminal history or drug use
  • Ability to work independently and with a team
  • Applicable Certifications include: CISSP, CISM, CFIP, CEH, GCFA, CCE, OSCP and related
These are permanent, full-time roles. An attractive compensation plan is in place which includes base salary, bonus potential and full benefits.
Please send resumes to:
Andy Wolkstein
Sr. Director of Business Services
+1 (312) 878-1100

О механизмах блокирования Android-устройств

О механизмах блокирования Android-устройств - I

Большинство существующих инструкций и процедур, предписывают строгое соблюдение правил при расследовании инцидентов в отношении мобильных устройств. Все они варьируются на основе функциональных особенностей таких устройств, связанных архитектурными подходами к управлению потоками данных, а также пользовательскими сценариями. Наиболее популярные пункты таких предписаний обычно гласят, что устройство должно быть переведено в состояние, при котором оно не сможет взаимодействовать с беспроводными сетями или же будет подключено к постоянному источнику питания, (стирание данных с устройства при отсутствии питания считается одной из практик обеспечения защиты информации). Несмотря на это, общие подходы к расследованию инцидентов очень сильно меняются от платформы к платформе, от очередного революционного GUI к другому. Тем более это актуально в условиях набора неизвестного ПО, которое может включать вредоносный код, например, удаляющий данные при отсутствии подключения к серверу управления. Данная статья рассматривает защитные механизмы Android-платформы по блокированию устройств, известные как «Password Lock Protection» и «Pattern Lock Protection», которые могут создавать препятствия при доступе к устройствам, и требуют специального подхода к ведению процесса расследования при соответствии процедурам.

 

 

 

Password Lock Protection

Данный защитный механизм известен давно и представляет собой защиту на основе пароля, введённого пользователем. Подобный механизм может осуществлять как обычную защиту от доступа к устройству, так и расширяться, увеличивая значимость обладания последним. Наиболее известные примеры приведены ниже: • блокирование по истечению определённого (заданного) временного интервала; • удаление данных после определённого (заданного) количества неудачных попыток ввода пароля; • шифрование файловой системы на основе ключей, сгенерированных на основе пароля. Пароли для Android-устройств создаются с применением буквенно-циферного множества символов в отличие от подвида, известного как «PIN Lock Protection», который ориентирован на применение только цифрового множества символов.

 

Pattern Lock Protection

Этот механизм блокирования устройств известен более высокой степенью адаптации под мобильные устройства (имеются в виду touch или multi-touch устройства, естественно) нежели парольная защита, т.к. ввод спецсимволов в купе с редуцированной клавиатурой понижают скорость разблокировки при частом блокировании экрана, а через некоторое время и само желание его блокировать. Последнее часто приводит, к тому, что пользователи начинают применять более простые пароли, не отвечающие требованиям безопасности (сложности). В данном механизме защиты для разблокирования пользователи «рисуют» шаблон (см. рисунок ниже), созданный ранее, и если он корректен, то процесс разблокировки является успешным

 

Способы противодействия

 

Поддержание активности устройства

Для Android-устройств разброс границ типичного временного интервала, по истечению которого устройство блокируется с использованием парольного механизма, обычно варьируется от нескольких секнд до 15 минут. Хоть это и довольно короткий промежуток времени, но его может вполне хватить для получения полного доступа к устройству без необходимости ввода пароля. Поэтому, если устройство находится в этом состоянии, и необходимо получить к нему доступ, то первым делом нужно увеличить временной интервал появления экрана блокировки. Типичное название раздела, где располагается подобная настройка, может иметь название «Display  Screen Timeout/Lock». В зависимости от локализации и модели телефона, оно может варьироваться, ровно также как и наличие элемента «Отключить тайм-аут», который может быть заменён на элемент, соответствующий максимальному временному значению. В этом случае, останется только периодически подвергать устройство минимальной активности, однако следует иметь в виду, что данная активность не должна влиять на запуск/остановку процессов и программ, это может привести к изменениям в системе, которые не смогут быть учтены и тем более отражены в протоколах. Учитывая, что последнее является обязательным пунктом, то, даже факт отключения записи времени блокирования, да и, в принципе, любая совершаемая активность должны протоколироваться. Также интересны опциональные настройки «Enable USB debugging» и «Stay awake», первая из которых позволяет получать доступ для извлечения данных, в то время как вторая, не позволит подключенной к зарядному устройству Android-платформе уходить в т.н. «спящим режим», препятствуя, таким образом, появлению экрана блокировки. Также первая настройка тесно связана с консольной утилитой «Android Debug Bridge (ADB)», которая позволяет производить установку и удаление приложений, копирование файлов с/на устройства(-о), а также извлечение дополнительной информации о логах или запущенных процессах.

 

Легальное блокирование

Около года назад исследователь по информационной безопасности Thomas Cannon [http://goo.gl/skVol], разработал механизм, который легально позволяет блокировать появление экрана блокировки, и основан на использовании стандартного API, доступного для разработчиков. Он же применяется и для отключения возможности блокировки экрана при наступлении таких событий, как входящие или исходящие звонки.

 

Разблокировка посредством Google-аккаунта

Данный механизм создавался на случай превышения лимита (как правило, 10) неудачных попыток ввода пароля/пина на устройстве. При наступлении такого события появляется диалог, который запрашивает почтовый логин и пароль, с которых было зарегистрировано устройство, с целью сброса текущего способа блокировки. Интересно, что данный механизм не требует подключения к сети, поскольку Android-устройства кэшируют эти данные и, соответственно, сравнивают их с введёнными без обращения в сеть. Разблокировка при наступлении «особого» события Как правило, таким событием может быть постановление суда, обязующее корпорацию Google разблокировать устройство. Несмотря на высокую вероятность данного события, Google требует онлайн-присутствия устройства, что может повлечь за собой определённые риски, стирания или модификации хранимых данных. Здесь правильным с точки зрения методик, принятых в криминалистике, будет использование WiFi канала вместо EDGE/3G. Это позволит технически прибегнуть к протоколированию трафика с применением утилит, типа сниффер, с целью организационно отметить факт происходящих изменений в процессе разблокировки либо последующего изучения полученных данных.

 

Отпечатки пальцев

Известна научная работа ряда авторов - Adam J. Aviv, Katherine Gibson, Evan Mossop, Matt Blaze, and Jonathan M. Smith - «Smudge Attacks on Smartphone Touch Screens» [http://goo.gl/XvULn], согласно которой были проведены эксперименты по изучению экранов Android-устройств в трёх состояниях: 1. «из коробки»; 2. после некоторого количества использования механизма разблокирования «Pattern Lock Protection»; 3. после попыток удаления следов пользования данным механизмом. Данный эксперимент представляет собой идеализированную модель, т.к. не была оценена степень влияния клавиатуры как неотъемлемого элемента использования устройства. На практике это может привести к неточному извлечению результатов в определении направлений пользовательского рисунка при разблокировании устройства (механизм «Pattern Lock Protection»). Основная модель атаки подразумевает собой вариант фотографирования экрана с повышенной контрастностью. Также работа отмечает, что попытки удаления следов пальцев эффективно противодействуют данной модели атаки.

 

 

 

О механизмах блокирования Android-устройств - II

 

Предыдущая статья о механизмах блокирования Android-устройств содержала анализ механизмов блокирования, характерных для платформы Android. Механизмы, известные как «Pattern Lock» и «Password Lock» были также рассмотрены в статье Forensics Focus. Оба механизма могут быть использованы в качестве способов обойти защитные механизмы Android-устройств при криминалистическом исследовании.

 

Механизм блокировки «Pattern Lock» представляет собой множество жестов, которые обладатель устройства может совершить для его разблокировки. Такое множество содержит 895824 комбинаций возможных жестов. Как было сказано в прошлой статье, набор перемещений между 9 точками при создании пароля-жеста, всего лишь представляет числовую комбинацию, но все же лучше, чем 4-значный PIN-механизм. Эта числовая комбинация программно обычно выглядит как строковая комбинация «1→2→3→4→5→6→7» с отсчётом от нуля в шестнадцатеричном (hex) виде, т.е. «0х00→0х01→0х02→0х03→0х04→0х05→0х06». Однако, при хранении этой комбинации используется hash-значение от hex-представления, получаемое при применении алгоритма SHA1, например «0×82 0×79 0x0A 0xD0 0xAD 0xEB 0×07 0xAC 0x2A 0×78 0xAC 0×07 0×03 0x8B 0xC9 0x3A 0×26 0×69 0x1F 0×12». Итоговый результат (хеш-значение) хранится в файле «/data/system/gesture.key».

 

Механизм блокировки «Password Lock», в отличие от предыдущего, основан на применении пользователем символов, состоящих из набора цифр, букв и специальных символов, количество комбинаций которых на порядки больше, чем предыдущее, поэтому создание словаря может не дать эффективного решения задачи обхода механизма. Здесь подход со стороны платформы к хранению и размещению пользовательского парольного файла ничем не отличается от описанного выше способа хранения: Итоговый результат (хеш-значение), полученный от применения алгоритма SHA1, хранится в файле «/data/system/pc.key».

 

Так как указанный файл расположен во внутреннем хранилище устройства (не на карте памяти), в папке «data/system», то по умолчанию к нему нет прямого доступа. Чтобы к нему добраться, потребуется утилита ADB, права root на доступ к файловой системе и активированная опция «USB Debugging mode». Получив возможность взаимодействовать с обоими файлами «gesture.key» и «pc.key», можно осуществлять подмену файлов на заранее заготовленный файл с известным паролем или набором жестов, либо же удалить эти файлы, сняв таким образом защиту устройства.

 

 

Специалистами Forensic Focus было потрачено всего несколько минут, чтобы получить словарь всех комбинаций для обхода механизма «Pattern Lock» от 1234 до 987654321. Сам словарь можно скачать по ссылке.

Опубликовано [http://advancedmonitoring.ru/article]

 

GoogleSharing :: A Special Kind Of Proxy

http://www.googlesharing.net/

GoogleSharing is a special kind of anonymizing proxy service, designed for a very specific threat. It ultimately aims to provide a level of anonymity that will prevent Google from tracking your searches, movements, and what websites you visit. GoogleSharing is not a full proxy service designed to anonymize all your traffic, but rather something designed exclusively for your communication with Google. Our system is totally transparent, with no special "alternative" websites to visit. Your normal work flow should be exactly the same.

The Basic Problem

Google thrives where privacy does not. If you're like most internet users, Google knows more about you than you might be comfortable with. Whether you were logged in to a Google account or not, they know everything you've ever searched for, what search results you clicked on, what news you read, and every place you've ever gotten directions to. Most of the time, thanks to things like Google Analytics, they even know which websites you visited that you didn't reach through Google. If you use Gmail, they know the content of every email you've ever sent or received, whether you've deleted it or not.

They know who your friends are, where you live, where you work, and where you spend your free time. They know about your health, your love life, and your political leanings. These days they are even branching out into collecting your realtime GPS location and your DNS lookups. In short, not only do they know a lot about what you're doing, they also have significant insight into what you're thinking.

Where GoogleSharing Comes In

GoogleSharing is a system that mixes the requests of many different users together, such that Google is not capable of telling what is coming from whom. GoogleSharing aims to do a few very specific things:

  1. Provide a system that will prevent Google from collecting information about you from services which don't require a login.
  2. Make this system completely transparent to the user. No special websites, no change to your work flow.
  3. Leave your non-Google traffic completely untouched, unredirected, and unaffected.

The GoogleSharing system consists of a custom proxy and a Firefox Addon. The proxy works by generating a pool of GoogleSharing "identities," each of which contains a cookie issued by Google and an arbitrary User-Agent for one of several popular browsers. The Firefox Addon watches for requests to Google services from your browser, and when enabled will transparently redirect all of them (except for things like Gmail) to a GoogleSharing proxy. There your request is stripped of all identifying information and replaced with the information from a GoogleSharing identity.

This "GoogleShared" request is then forwarded on to Google, and the response is proxied back to you. Your next request will get a different identity, and the one you were using before will be assigned to someone else. By "sharing" these identities, all of our traffic gets mixed together and is very difficult to analyze.

The result is that you can transparently use Google search, images, maps, products, news, etc... without Google being able to track you by IP address, Cookie, or any other identifying HTTP headers. And only your Google traffic is redirected. Everything else from your browser goes directly to its destination.

GoogleSharing Privacy

With all of your Google traffic being redirected to GoogleSharing for anonymization, there is the risk thatwe could become the ones who monitor, record, and track users. While our privacy policy is that we do not record, monitor, or log any user traffic, and while all of the source code for the GoogleSharing addon and proxy are open source, it is no longer necessary to trust that we (or any other GoogleSharing proxy operator) is behaving appropriately.

With Google's introduction of SSL support for search requests (encrypted.google.com), the GoogleSharing system now allows clients to checkout GoogleSharing identities and route encryptedtraffic through GoogleSharing to Google. So while client requests are anonymized by GoogleSharing, the actual traffic that the GoogleSharing proxy sees is encrypted to Google, and hence can not be monitored.

The result is that Google knows what is being searched for, but doesn't know where the requests are coming from. The GoogleSharing proxy can tell where requests are coming from, but can't tell what the content of the requests is. And the user can avail themselves of Google services without having to trust either Google or GoogleSharing.

GoogleSharing Transport

For the services where Google has still failed to provide universal HTTPS support, we have. All requests to a GoogleSharing proxy are sent via HTTPS. These eventually have to be proxied out as HTTP from GoogleSharing to Google, but your traffic is encrypted on the first path.

Running A GoogleSharing Proxy

We've made the proxy code available so that anyone can run a GoogleSharing proxy instance in addition to the one that we're running.

It Works

Just Like That

Malware Evolution (infographic)

Why You Shouldn't Train Employees for Security Awareness

If there's one myth in the information security field that just won't die, it's that an organization's security posture can be substantially improved by regularly training employees in honot to infect the company. [Editor's note: See Joe Ferrara's recent article 10 commandments for effective security training.]
You can see the reasoning behind it, of course. RSA got hacked from a Word document with an embedded Flash vulnerability. A few days later the entire company's SecureID franchise was at risk of being irrelevant once the attackers had gone off with the private keys that ruled the system.
But do phishing attacks like RSA prove that employee training is a must, or just the opposite? If employees and/or executives at RSA, Google, eBay, Adobe, Facebook, Oak Ridge National Laboratory and other technologically sophisticated organizations can be phished, doesn't that suggest that even knowledgeable and trained people still fall victim to attacks?
One of the best examples ever of the limitations of training is West Point's 2004 phishing experiment called "Carronade." Cadets were sent phishing emails to test their security. Even after undergoing four hours of computer security training, 90 percent of cadets still clicked on the embedded link.
Fundamentally what IT professionals are saying when they ask for a training program for their users is, "It's not our fault." But this is false--a user has no responsibility over the network, and they don't have the ability to recognize or protect against modern information security threats any more than a teller can protect a bank. After all, is an employee really any match against an Operation Shady RAT, Operation Aurora or Night Dragon? Blaming a high infection rate on users is misguided-- particularly given the advanced level of many attacks.
I'll admit, it's hard to find broad statistical evidence that supports this point-of-view--not surprisingly, security firms don't typically share data on how successful or unsuccessful training is to an organizational body, the way West Point did. But I can share a few anecdotes from my company's own consulting work that should shed some light on this problem.
The clients we typically consult with are large enterprises in financial services or manufacturing. All of them have sophisticated employee awareness and security training programs in place--and yet even with these programs, they still have an average click-through rate on client-side attacks of at least 5 to 10 percent.
We also frequently conduct social engineering attacks against help desks and other corporate phone banks for customers. While each of the personnel in these security sensitive rolls has extensive training and are warned against social engineering attacks, the only thing that stops our testers are technical measures. In other words, if a help desk employee can technically change your password without getting a valid answer from you about your mother's maiden name, then a company like Immunity will find a way to convince them to do so.
We've also found glaring flaws--like SQL injection, cross-site scripting, authentication, etc.--in the training software used by many clients. This is more humorous than dangerous, but it adds irony to the otherwise large waste of time these applications represent.
Instead of spending time, money and human resources on trying to teach employees to be secure, companies should focus on securing the environment and segmenting the network. It's a much better corporate IT philosophy that employees should be able to click on any link, open any attachment, without risk of harming the organization. Because they're going to do so anyway, so you might as well plan for it. It's the job of the CSO, CISO, or IT security manager to make sure that threats are stopped before reaching an employee--and if these measures fail, that the network is properly segmented to limit the infection's spread.
Here's what organizations should do instead of wasting time on employee training:
Audit Your Periphery -- Websites, back-end databases, servers and networks should be thoroughly audited on a regular basis for vulnerabilities&msdash;both by internal security personnel and external pen-testers. They should be rigorously tested against current and most likely attacks. Had Citigroup's website been tested for basic web application flaws, it could have avoided the June 2011 attack that compromised 200,000 customer accounts. This is both cheap and easy to take off the table.
Perimeter Defense/Monitoring -- Robust perimeter defenses should be in place, and regularly tested. These should be protecting the network from both intrusions and data exfiltration. Data exfiltration monitoring should also be ongoing.
Isolate & Protect Critical Data -- What valuable information does your business store in online databases? Classifying business data should be near the top of the CSO/CISO's to-do list. He or she should thoroughly examine the information stored online and locate critical data offline or behind strict network segmentation.
Segment the Network -- Segment your networks and information so that a successful cyber attack cannot spread laterally across the entire network. Had RSA done this, it might have prevented the theft of its SecurID tokens. If one employee's PC is infected it shouldn't be able to spread laterally through the entire system.
Access Creep --What level of access does each employee have to the network and critical data? How well is this monitored? Limiting unnecessary access is another key element of an effective security posture.
Incident Response -- Proactively examine important boxes for rootkits. You'll be amazed at what you find. And finding is the first step to actually building a defense against "Advanced Persistent Threats."
Strong Security Leadership -- For a company to have a CSO/CISO isn't enough. The chief security executive should have meaningful authority too. He or she should have "kill switch" authority over projects that fail to properly account for security, and real say over security's percentage of the budget. A strong security program should have at least the same budget as the marketing department.
There's a lot of money and good feeling in running employee training programs, but organizations will be much better off if the CSO/CISO focuses instead on preventing network threats and limiting their potential range. Employees can't be expected to keep the company safe; in fact it is just the opposite. Security training will lead to confusion more than anything else.
By following an offensive security program, companies can keep their networks, and employees, protected.
Dave Aitel, CEO of Immunity Inc., is a former 'computer scientist' for the National Security Agency. His firm specializes in offensive security and consults for large financial institutions and Fortune/Global 500s. www.immunityinc.com
Copyright © 2011 CSO.

Beware of cybercrime – cyber risks and costs to businesses (infographic)

cybercrime

пятница, 27 июля 2012 г.

The Exploit Magazine!

 

Dear Readers, we would like to warmly welcome you in the new magazine devoted totally, as its name suggests, to exploits. In August we have prepared many surprises for you. Get ready for our free, promotional issues that are about to be published in August.

  • Metasploit Framework Console Exploits

  • LAN Security for PMI,

  • Security flaws on WSDL, SOAP,

  • DoS Attacks

    • Now, we have prepared unique surprise for you. Register as a free user and read the articles on:

  • Metasploit

  • Pentesting in CMS

  • For free! Just follow the link:

    Please spread the word about Hakin9. Hakin9 team wish you good reading!
    en@hakin9.org 
    Hakin9.org 
    Click here to unsubscribe 

    Email marketing by

    The Exploit Magazine

    четверг, 26 июля 2012 г.

    Security Writer Offer from eForensics Magazine

    We are looking for practical articles that will meet the needs of other digital forensics professionals and enthusiasts who are looking for real-life solutions and want to observe the market. That kind of publication is a great chance for self-promotion among digital forensic community. Are you interested in details? Mail me back if so.  kacper.bancerz@software.com.pl

    Job Offer from SDJ (Software Developer's Journal)

    If you would like to cooperate with Software Developer's Journal Magazine we have a special job offer for you:Software Developer's Journal is an online Magazine useful for everyone interested in programming, management, testing, development – both professionals (developers, testers, managers) and hobbyists.To satisfy our readers, we present the latest solutions, as well as older, proven technologies. We understand that the key question is 'how', so all the theoretical issues are illustrated with clear, practical examples and complete projects.We would like to make our Magazine well recognised and to reach as many people as possible so that more and more people know us and read our Magazines.We're looking for those of you who can help us to find people who might be interested in reading our Magazines on the forums, social networks, services and blogs.Would you like to work with us?If you like the challenges and you would like to try your marketing skills and earn money this job offer is for you!For more details contact: Angelika Gucwa angelika.gucwa@software.com.pl

    суббота, 21 июля 2012 г.

    Without Social Media, 18% Of Teens Would ‘Stop Communicating’

    I renew my publication portfolio

    Siri like functionality in latest BlackBerry 10 Dev Alpha update

    Anti – Android Network Toolkit and 7″ Tablet make a $99 Pentesting Platform

    Every once in a while you run into a product that just makes you sit back and say – “Wow!”
    I just picked up a 7? Polaroid tablet for $99 and was stunned at how good it works. The screen quality, how smooth it ran and how responsive it was. In some functions it works better than my trusty iPad that cost a whole lot more.
    Well, I wanted to see how well the Android Tablet could work as a pentesting platform and found “Anti” the Android Network Toolkit by zImperium. I was stunned.
    I just used the “Free” version, and within seconds I was looking at a network map of all the machines on my network. Anti runs nmap scans, including an intrusive scan to detect device Operating Systems and vulnerabilities. Once the scan is done, it can take a while, you can click on individual systems and are presented with a tool option menu. These options include:
    Attack, DoS, Cracker, Replace Image, Spy, Man in the Middle
    Some of the more advanced tools require you to purchase “Anti credits” to run them. But with the free version, you can view available networks, and run scans against them.
    I ran it on my wireless network and was able to view a wired system. For a short period of time, I could see a text list of what websites the computer was visiting, and even images from the visited websites. The options even included “View Passwords”, but this did not seem to be enabled in the free version. Obviously it was working in some sort of Man-in-the-Middle mode to be able grab the information off of a wired lan system connected to a switch. Very interesting.
    And this was just the free version, the paid versions reportedly includes remote exploit capability.
    Anti also includes a reporting feature so you can keep a track of vulnerable systems found during your pentest. Using Anti on a cheap $99 Android tablet really opens up a lot of possibilities for pentesters.



    Microsoft Sidebar a Serious Security Vulnerability

    Windows Flag logo
    Microsoft has released a security advisory detailing the vulnerabilities in the windows Sidebar that could potentially be a gateway for remote arbitrary code execution when running insecure Gadgets.  The Sidebar is an application on computers that run Vista and some versions of Windows7 and can show realtime updates of news, weather, RSS feeds and more, but also included games and puzzles and even dashboards to show how your computer is running – all according to which widget you download or purchase to customize the sidebar.   Apparently if the current user is logged on with administrative user rights, an attacker could take complete control of the affected system.  Programs could be installed; data viewed, changed, or deleted; and new accounts created with full user rights.
    Microsoft, in response, has issued a quick deactivation for the sidebar and has removed the ‘Desktop Gadgets‘ application.  According to the old gadgets page “gadgets installed from untrusted sources can harm your computer and can access your computer’s files, show you objectionable content, or change their behavior at any time”.
    Microsoft has been in the spotlight a lot recently in regards to ignoring best security practices and leaving a lot of vulnerabilities.  The most notable of these is the Flame Malware.  Attackers decrypted the Message-Digest Algorithm (MD5), (proven vulnerable since at least 1996 and now obsolete) that Microsoft was using, to forge Microsoft Certificates and plant the malware as security updates.  Quite a large security oversight.
    If you have a Windows Sidebar please visit this page and click on the relevant “Fix it” link.  If you have had any security issues due to your Sidebar or Gadgets, or have any thing else to add, then please post a comment.

    Calling all Security Writers!

    Are you a security expert, network/web admin, teacher or student who knows a thing or two about security and wants to share your knowledge? Working on a security project and want an excellent platform to get the news out? Love the latest security topics and want to write about them?
    Now is your chance!
    CyberArms is working with the hyper popular international security magazine “Hakin9” to create a new magazine called “ExploitMag”! This cutting edge security magazine will focus on:
    • Metasploit Framework Console Exploits
    • LAN Security for PMI
    • Security flaws on WSDL, SOAP
    • and DoS Attacks
    We are looking for volunteer authors who want to help create the first 4 free promotional issues. For consideration, articles should be about 3500 words in length and have at least 3 pictures.
    Please e-mail me as soon as possible at cyberarms (at) live.com if you are interested in this ground breaking opportunity.
    reblogged from [http://cyberarms.wordpress.com/2012/07/20/calling-all-security-writers/]

    четверг, 19 июля 2012 г.

    Web browser Forensics

    Internet History Examination Tools

    Forensics from the sausage factory: Internet History Examination Tools - you generally get what you pay for
    My digital Life of Grime case and another ongoing case have caused me to look more closely at the tools we use to analyse internet histor...

    Recovering Safari browser history from unallocated

    Forensics from the sausage factory: Recovering Safari browser history from unallocated
    One of my cases involves the examination of an Apple Mac running Mac OSX 10.5.6 Leopard . The primary web browser in use is Safari versio...

    Safari browser cache - examination of Cache.db

    Forensics from the sausage factory: Safari browser cache - examination of Cache.db
    Following on from my post about Safari browser history I want to touch upon Safari cache. My suspect is running Mac OSX 10.5.6 Leopard an...

    Safari History - spotlight webhistory artefacts

    Forensics from the sausage factory: Safari History - spotlight webhistory artefacts
    June is Safari month here in the Sausage Factory and this post is the third in the series. Just imagine having an observation point in th...

    Never mind the cookies lets carve the crumbs - Safari Cookie stuff

    Forensics from the sausage factory: Never mind the cookies lets carve the crumbs - Safari Cookie stuff
    Safari versions 3, 4 and 5 amalgamates Cookie data into one large file Cookies.plist stored at the path ~/Library/Cookies. This plist is ...

    Safari Internet History round up

    Forensics from the sausage factory: Safari Internet History round up
    The last few posts all concern the recovery of internet history created by the Safari browser. I like to think of internet history in the...

    Big Brother Forensics: Device Tracking Using Browser-Based Artifacts (Part 1)

    Big Brother Forensics: Device Tracking Using Browser-Based Artifacts (Part 1) | Forensic Methods
    Geo-location artifacts have been a frequent focus of my research, and I am amazed at how quickly they are permeating operating systems, a...

    Big Brother Forensics: Device Tracking Using Browser-Based Artifacts (Part 2)

    Big Brother Forensics: Device Tracking Using Browser-Based Artifacts (Part 2) | Forensic Methods
    Understanding Browser Artifacts Geo-location artifacts demonstrate an interesting concept with regard to browser-based evidence. Among th...

    Big Brother Forensics: Device Tracking Using Browser-Based Artifacts (Part 3)

    Big Brother Forensics: Device Tracking Using Browser-Based Artifacts (Part 3) | Forensic Methods
    Application Specific Geo-location Web applications can often leave their own geo-location clues similar to those found via the mapping se...

    Windows Forensics Shadow Copy

    Microsoft Office 2013 preview: details, screenshots and impressions


    It's been about three years since Microsoft unveiled a new version of Office, and particularly with Windows 8 just months away from dropping, the software has been well overdue for an upgrade. Today, Redmond unveiled the latest edition -- Office 2013 (aka Office 15) -- which the company will be showing in a preview stage until the final version goes on sale (hit up the source link if you want to download it for yourself).
    Perhaps the biggest news isn't any single feature Microsoft's added to Word (hello, easy YouTube embeds!), but how and where you'll access your files. With this version, the company is moving to a subscription-based model wherein your Office files are tied to your Microsoft ID. Once you sign up, you can download the various desktop apps to a certain number of devices and, as with Windows 8, your settings, SkyDrive files and even the place where you left off in a document will follow you from device to device. (It's telling, we think, that files now save to the cloud by default.) As you'd expect, too, this version is also more tablet-friendly than editions past, with a touch mode that widens the spacing between onscreen objects and flattens menus. In Word and PowerPoint, you'll also find a read-only mode that turns documents into full-screen editions, whose pages you can swipe through as you would an e-book or digital magazine.
    Of course, Microsoft included plenty of granular updates like PDF editing and a behind-the-scenes Presenter View in PowerPoint. Fortunately for you, curious power users, we've been spending the better part of a week testing the software on a Samsung Series 7 Slate loaded up with Windows 8. So join us past the break where we'll give you a detailed breakdown of what's new, along with screenshots and detailed first impressions.


    Overview

    General look and feel
    For those of you who thought Microsoft would completely overhaul Office ahead of the Windows 8 release, let's put it this way: if you could survive the transition to Ribbon menus in Office 2007, you'll quickly feel at home here. The Ribbon is, indeed, still the cornerstone of the Office experience, the visual metaphor permeating Word, Excel, Outlook and every other application in the suite.
    Nonetheless, Microsoft has made some subtle changes to the UI, and they're all quite important. For starters, no matter what app you're using, you'll find your name and Microsoft account photo in the upper-right corner -- a reminder that the cloud is now the linchpin to the Office experience. From there, you can click the photo to adjust your account settings, swap in a new picture or even switch accounts.
    Cloud integration
    DNP EMBARGO Microsoft Office 15 Preview details, screenshots and impressions
    Being able to save to the cloud is hardly a new feature in Office, but for the first time saving to SkyDrive is the default, not the C drive. (SkyDrive Pro support is coming as well, says Microsoft.) And when you do hit save, you'll even see a progress bar on the bottom of the screen, confirming your latest draft made it safely to the cloud. As you'd expect, of course, the built-in options for saving to the cloud are limited to Microsoft's own services (SkyDrive and SharePoint). If you want to upload to Dropbox or Google Drive, you'll have to do it outside Office.
    And since your files are stored online by default, it's fairly easy to share them on the web as well. Throughout these various Office apps, you can share your work with someone by sending them a URL, allowing them to follow along in a browser even if they don't happen to have Office installed on their local machine. To do this, just hit File, Share and choose either "Get link" or "Invite people," if you want them to have editing privileges. If, for some reason, the version fails to upload, you'll see a banner stretching across the top of the screen, prompting you to try that save again. From the same sharing menu, you can also post your work to a social network or email a document as an attachment, but that last bit isn't new.
    Another perk: a feature called Resume Reading allows you pick up exactly where you left off, even if you resume editing on another device. (Okay, okay, Amazon's Kindle, for one, already bookmarks e-books this way, but isn't it a relief not to lose your place in a 44-item slide deck?) Though this feature doesn't apply to most apps in the Office family, you will see it in Word as well as PowerPoint.
    Lastly, in various Office apps it's now easier to toss in a photo you found online. For example, Word is now integrated with Facebook and Flickr so that you pull pictures straight from there, instead of having to download it and then manually insert it into the doc. Obviously the only caveat is that you need an internet connection, so maybe save a Disney World photo or two on your desktop for offline emergencies.
    Touch mode

    Microsoft has made some subtle changes to the UI, and they're all quite important.

    Across the various apps, too, you can use a new touch mode to make the software a little more finger-friendly. To expose this option, click on that small arrow in the upper-left corner of the screen -- you know, the one you already use to customize which icons are visible and which ones are hidden. Once you select touch mode, the icon that appears should look like a circle with a dotted line around it.
    It's easy to imagine that, with the press of a button, Office would somehow take on more of a Metro-inspired look, with large, finger-friendly icons and -- dare we say it -- a more dumbed-down interface. Actually, the adjustments Office makes in touch mode are far more subtle. In short, enabling this mode widens the spacing between onscreen objects, making it less likely that you'll tap the wrong thing. This mode also causes various menus to flatten so that you can see options with less finger input involved. Again, that doesn't mean the objects on screen suddenly become larger to accommodate finger input, but this mechanism at least cuts down on the amount of tapping you'll end up doing.
    Etc.
    Spend enough time in Office 2013 and you'll notice dozens of visual flourishes that serve to give the software that extra bit of spit and polish. Office comes bearing glossy new icons, for one. Different apps like Word and PowerPoint have improved alignment guides, which become visible when you're inserting tables and other objects (we first noticed this while inserting a YouTube clip).
    Also, animated transitions are everywhere: a slide of the screen when you hit the File tab, Excel charts growing before your eyes. As a Microsoft rep explained it, the idea is to offer some visual feedback to new users, who might not totally know their way around yet. Whether you require that kind of babying is debatable, but we're sure of this much: the animations are slick -- pretty, even -- and everything about the suite feels fast: fluid, brisk and refreshingly devoid of bugs.

    Getting started

    This isn't your old-school software installation, kids. The beauty of Office 2013's software-as-a-service model is that you get automatic updates and all that jazz you've come to expect from the other web-based services in your life. So it's fitting, then, that the installation begins not with a software download, but by selecting your preview version and then signing in with your Microsoft / Windows Live ID. Wait a few minutes for the setup to unfold, and then download Office to your various devices. (Take note: Office 2013 will run on Windows 7 and the Win8 Release Preview; it's not compatible with Vista, and it won't work with earlier builds of Windows 8, such as the Consumer Preview.) Armed with a speedy WiFi connection, we were up and running in five minutes and, again, the experience was smooth and crash-free.
    This might be a good time to clarify the minimum hardware requirements. So long as you have 3.5GB of free disk space and an X86 or X64 system clocked at 1GHz or higher, you should be good to go. DirectX10 graphics are required, along with a minimum resolution of 1024 x 576. Microsoft also recommends 1GB of RAM for 32-bit systems, and 2GB for 64-bit machines.


    Word

    Look and feel
    DNP EMBARGO Microsoft Office 15 Preview details, screenshots and impressions

    When you open Word for the first time, you'll notice some changes to that introductory start page. Now, the left-hand pane shows recent documents, while the area to the right showcases templates, some of them new. Of course, the thing you'll probably want most – a blank document – is still sitting in an easy-to-spot corner, toward the top of the screen.
    Head on into a blank document and you'll see the Ribbon UI has made room for a new Design tab, which claims to let you make all your design changes in one place. Options include things like fonts, paragraph spacing, themes and adding watermarks to documents. Thankfully, though, Microsoft kept the feature where if you highlight text and then hover over it with your mouse, you'll see some pop-up controls right there, allowing you to change the font color and make other simple tweaks.

    Tracking changes
    DNP EMBARGO Microsoft Office 15 Preview details, screenshots and impressions
    Of all the new features in Office 2013, this is the one we Engadget editors hold dearest to our hearts. With this version of Office, tracking changes has been tweaked so that unless you're actively reading through changes and comments, all that noise simply shows up as a bunch of red lines. When you're ready to focus on editing, just click the line to expand the thread. And we do mean threads. Now, if you get into a back-and-forth with another editor ("Can we call this phone a Galaxy Note clone?" "No"), those comments will appear in a single conversation that flows alongside the page, in the margins. If you've ever used track changes to collaborate on a document, you know that previously such an inane exchange would mean seeing a separate comment bubble for each person's response, even if they were all addressing the same issue.
    And control freaks, rejoice: you can now lock tracking, which means someone needs to enter a password to make Word stop tracking changes. The point being, unless that person knows the password, he or she can't make any changes without you knowing.
    Live Layout and adding online video
    DNP EMBARGO Microsoft Office 15 Preview details, screenshots and impressions
    It's not like you couldn't previously add online video to an Office document, but it was a pain -- hardly a beginner-level move. Now, Word allows you to insert clips directly from YouTube, Bing Video or any other site, so long as you have the HTML embed code handy. Just click the Insert tab in the Ribbon, then click – you guessed it – "Online Video." Again, if we wanted we could paste in some code from Viddler, Engadget's hosting site, and insert a review video we had already uploaded. For the purposes of this walkthrough, though, we'll pretend we're searching for something on YouTube.
    When you search, the results appear in a small pop-up that obscures the screen (not a browser pop-up, but a dialog box within Word). All of the search results appear as small thumbnails, and if you hover over them, you can see the title of the video (how else are you supposed to know if you've got the auto-tune remix?). Helpfully, you can also see how long a video is, so if you were looking for a music video, say, you might have an easier time weeding out the 50-second ones that obviously aren't complete. You can also preview the video first so that you don't go through the hassle of embedding it only to realize it's not what you wanted.
    Once you insert the video, it's easy to resize it by dragging the corners or sides. There are also little pop-up tabs next to the frame, which you can click to select a layout option (e.g., in line with the text) or do things like cut or copy it. In theory, you can also watch a video from inside Word, without having to open up the browser. It doesn't bode well, though, that the first video we inserted had its permissions set in such a way that we had to visit YouTube if we were going to watch. Unfortunately, there's no way of clarifying that before you insert a video.
    Also, in a new feature called Live Layout, the text will automatically wrap itself around a video, chart or anything else you insert into the text. And that happens in real time, even as you drag the object around. This is what we mean when we talk about Office's solid performance: as impressive as these new features are, they feel remarkably lightweight and nimble.
    Editing PDFs
    DNP EMBARGO Microsoft Office 15 Preview details, screenshots and impressions
    For a while now, Word has allowed users to save finished docs as PDF files. But until now, doing the opposite -- editing a PDF -- has required additional software, much of it not free. Here, though, when you open a PDF you can edit it as you would a Word document, and then you can either save it as such, or save it as another PDF file. We had no problem taking a PDF email attachment, typing in additional material, saving it as a PDF and then viewing it in Windows Reader. Okay, depending on who you are this might not be the most exciting new features in Office 2013, but it is certainly one of the most useful.
    Reading mode
    DNP EMBARGO Microsoft Office 15 Preview details, screenshots and impressions
    Now here's a feature Microsoft might not have bothered to include if it didn't imagine people using Office on tablets. The company's added a new reading mode -- a full-screen, read-only view that mimics the experience of reading an e-book on a tablet. To enter it, just go to the View tab in the Ribbon and find "Read Mode" all the way on the left. (Psst: This works in PowerPoint, too.)
    Once you're in, the document takes up the whole screen, save for the Windows taskbar at the bottom. Like an e-book -- but very much unlike a Word document -- the pages scroll from side to side by default, instead of top-to-bottom. (If you like, you can switch to a so-called page view with vertical scrolling.) All told, it's very intuitive to find your way around: there are onscreen left and right arrows, which you can click, but you can also just swipe the screen to advance to the next page. You can also adjust the color of the text: it's black-on-white by default, but you can also choose white-on-black or a sepia theme.
    Lastly, when you're in reading mode, there's a separate feature called Object Zoom, which allows you to expand a photo or table within the text by double clicking or tapping it. Like any good e-reader app, you can also search for specific words in the text, or perform a search (in this case, with Bing).
    Onscreen keyboard
    Sticking with this tablet theme for a moment, Microsoft built in the same well-spaced touchscreen keyboard you'll find in Windows 8. We especially appreciate that the apostrophe is to the right of the "L" key, as it is on a physical keyboard. There's also a visible Ctrl key so that you can press Ctrl + S to save your work. Lastly, we had a good experience with the predictive spelling, which presents suggestions in the form of small, unobtrusive pop-ups.

    Excel

    Flash Fill
    DNP EMBARGO Microsoft Office 15 Preview details, screenshots and impressions
    We can remember a time when Sparklines, those charts-within-cells, were the marquee new feature for Excel. This year, though, you'll notice that many of the major new additions don't necessarily aim to jazz up spreadsheets so much as take the tedium out of the number-crunching. Exhibit A: Flash Fill. It's a feature that recognizes your data patterns to the point where it should be able to predict what belongs in the remaining blank cells and fill them in for you. For example, if you were to make a spreadsheet detailing on what days different departments were using the main conference room, Excel would eventually pick up on the fact that every marketing executive has a meeting there Tuesday, while the publicity people are due there on Thursday.
    In theory, you just have to enter some of that data and then go to the Data tab, where you press the Flash Fill button to make it fill in the rest. For instance, in a demo spreadsheet provided by Microsoft, one column shows a list of company email addresses, each of which follow the format "firstname.lastname." After typing two first names in the blank "First name" column, Excel filled in the rest. Ditto when we added a column for last names.
    In our own testing, we enjoyed similar success, but discovered that Flash Fill doesn't make sense of alldata -- for example, it doesn't recognize "yes" and "no" as values. So, there might well be times when Excel won't be able to survey your data set and pick up on the patterns within.

    Suggestions for visuals
    DNP EMBARGO Microsoft Office 15 Preview details, screenshots and impressions
    Fortunately, Excel includes some new features that prove to be a little more intelligent than Flash Fill. These include recommendations for so-called PivotTables as well as charts. Using the data we just talked about (employees, their departments and their health insurance status) the Recommended PivotTable feature (located under the Insert tab) came up with a few logical options: employee count by department, and a count of insured versus uninsured workers. Sounds right to us. Likewise, the Recommended Charts feature (also in the Insert section) offered up the same ideas, only represented in pretty bar graph form.
    Timeline Slicer
    DNP EMBARGO Microsoft Office 15 Preview details, screenshots and impressions
    A new addition to Office's collection of so-called Slicers, Timeline allows you to filter data by certain time periods (think: sales data for 2011).
    Quick Analysis
    DNP EMBARGO Microsoft Office 15 Preview details, screenshots and impressions
    Though the name would suggest otherwise, this feature isn't so much a shortcut for making sense of your data as it is a way to preview different visuals. As you can see in that screenshot above, once you click on the corresponding Quick Analysis icon you'll see various formatting options, and as you hover over them you'll see the document change accordingly, giving you a glimpse of what you'll see if you end up selecting that option.

    PowerPoint

    Presenter View
    DNP EMBARGO Microsoft Office 15 Preview details, screenshots and impressions
    So no fancy new charts in Excel, but lots of ways to make sifting through your data a little more efficient. It's a similar story with PowerPoint: even more than animated transitions, Microsoft is focusing on behind-the-scenes features designed to take some of the anxiety out of presentations. For starters, when you plug in a projector, Windows will automatically extend your desktop onto that larger screen so that you don't have to fiddle with the setup in front of your audience.
    Once you're plugged in and ready to start your talk, you'll have the option of using a new presenter view, visible only on the screen you're using (press Alt + F5 to bring it up). Not unlike the presenter screen in Apple's Keynote software, this shows you the time elapsed, as well as any notes you may have written yourself. You can also enlarge text, teleprompter-style and pinch the slider to see the full slide deck -- very similar to how you can pinch to get a bird's eye view of your Windows 8 Start screen. The idea, says Microsoft, is to be able to nimbly skip forward a few slides if someone in the audience asks a question about some topic you haven't gotten to yet. If you do rearrange the slide, it won't be visible to the audience on the big screen. None of the behind-the-scenes stuff will be.

    As ever, you can also scribble, or "ink," on slides using either a pen or your finger. (You'll have to tap an icon first to enable this.) You'll see this as an option under the Review tab when you're marking up slides, but you can also do it during your presentation, from the Presenter View screen.
    Miscellaneous
    The rest of the new PowerPoint features are a motley bunch. You can merge shapes to create custom ones. In addition to using an eyedropper to select colors, you can also match a color to an accompanying photo. Music playback has also been improved so that you can now play a track in the background across multiple slides or the whole presentation. Additionally, Microsoft has expanded its list of supported media file types to include .MP4 files, meaning you can export to .MP4 as well as play such files natively without having to install QuickTime.

    Outlook

    Look and feel
    In its current incarnation, Outlook still looks like, well, Outlook, but you'll notice that many of the options aren't immediately visible. Much like there's no fixed Start button in Windows 8, the flags in Outlook only appear if you hover next to a message with your mouse. Also new with this version: a weather bar stretching across the top of your calendar. You can manually change the location, but by default, Office shows only one set of weather forecasts at a time. Another, more miscellaneous change: if you've begun to respond to an email, but saved it as a draft, the word "Draft" will appear in red in your inbox, next to the message (yes, just like Gmail).
    Peeks
    DNP EMBARGO Microsoft Office 15 Preview details, screenshots and impressions
    With this version, the company is also introducing fly-over menus called Peeks, which show things like calendar appointments, to-do items and information about your contacts. To find these, look for the icons stacked on top of each other in the lower left corner of the screen. Mouse over the calendar icon, for instance, and you'll see a live, pop-up window that allows you to glance at your agenda without having to toggle between tabs to check your schedule. If you're wide open, you'll see a message saying you have no appointments; if you are booked, it'll tell you when.

    Social connectors
    DNP EMBARGO Microsoft Office 15 Preview details, screenshots and impressions
    Continuing this theme of showing as much information in one place as possible (without you having to click to a different screen): if you're reading an email from someone, you can click an arrow at the bottom of the screen to pull up the People Pane. While this pane isn't new (you could previously see your meetings with that person and also your email history), you can now glance at that person's social networking goings-on. For now, Outlook natively integrates with Facebook and LinkedIn, but not Twitter, for whatever reason. (There is, however, an API that makes this possible.)
    As we quickly learned, this feature is worthwhile mainly if you're on Facebook and also friends with the people you're conversing with. Obviously, you won't see updates from a business associate you aren't connected to on Facebook. At the same time, the LinkedIn integration is fairly useless unless someone is super active on that site; you'll only see recent activity, and even then, the tidbits tend to be uninteresting. After all, do you really need to know if someone just added someone else to their network? Really, Twitter integration would make this new feature so much more valuable: people are nosy enough to care about other people's tweets and fortunately, most of us don't bother to lock our accounts.
    SharePoint integration
    In news that will matter most to the IT guys reading this, Microsoft has improved the integration between Outlook and SharePoint so that SharePoint groups now have their own mailboxes. From here, you see documents stored on SharePoint without leaving Outlook. (To edit them, of course, you'll need to open the corresponding Office app.) We also appreciate that the reverse is also possible: you can drag and drop attachments into the docs folder for SharePoint and they'll upload to your team's site.

    OneNote

    DNP EMBARGO Microsoft Office 15 Preview details, screenshots and impressions
    The biggest news here is that OneNote, that receptacle for random thoughts and musings, will be available as a standalone, Metro-styled Windows 8 app. Though we caught a glimpse of it in an advance meeting with Microsoft, it wasn't available for testing during our preview period, so our impressions are more limited here. Rounding out the list, OneNote is also getting a full-screen view, auto-save, improved table tools, enhanced scribbling (nay, inking) functionality, integration with Outlook calendars, more efficient search and the ability to record audio alongside notes.



    Business apps

    Since most of our readers aren't suit-wearing business travelers so much as exceptionally well-informed consumers, we're not going to delve into the new enterprise-grade features in nearly as much detail as Word, Outlook and other core apps. If corporate software rings your bell, though, we've got a quick rundown below of what's new:

    • Lync: Microsoft's messaging and video chatting client can now show up to five video streams simultaneously (previously, it could only handle multiple voices at once). By default, the active speaker will be promoted to the top. If more than five people are speaking, you can set Lync to prioritize whose video stream is being shown (those not featured will have photo thumbnails instead of a video stream). If you like, of course, you can also cherry pick whose video you're seeing.
    • Publisher: With Publisher, you can now import all your pictures to a single canvas, making it easy to experiment with possible images. Microsoft has also added text, shape and picture effects; a Mailings tab in the Ribbon; and the ability to use your own photos as page backgrounds. As with other apps we've talked about, you can share a URL with people where they can view your work in the browser. The new feature for easily adding photos from online sources applies here, too.
    • Visio: Office's standalone diagram creator gets updated shapes, as well as easier workflows for creating organizational charts and tweaking diagrams. Microsoft has also revised the app so that if you change shapes, you won't affect the entire diagram layout you've been working on.

    Versions and subscription plans

    So far, Microsoft hasn't revealed any pricing information for Office 2013, though it has outlined the different forms Office will take. There will, of course, be the web-based service Office 365 along with the desktop Office 2013 suite. Additionally, Office will be available on ARM-based tablets running Windows RT -- albeit, with Word, Excel, PowerPoint and OneNote only. Finally, enterprises can purchase a server-specific version capable of hosting Exchange, SharePoint, Project and Lync. In cases such as those, businesses can choose cloud hosting, local servers or a combination of the two.
    Oh, and if you're wondering about Office for Mac, that will be available too, but Microsoft isn't ready to give the public a preview just yet.
    All told, here are the specific products Microsoft is previewing right now:
    • Office 365 Home Premium: Can be installed on up to five devices; users get an extra 20GB of SkyDrive storage; Word, PowerPoint, Excel, Outlook, OneNote, Access and Publisher are included.
    • Office 365 Small Business Preview: Can be issued to up to 10 users, with five installations each; adds "professional mail, shared documents and HD videoconferencing."
    • Office 365 ProPlus Preview: Can be issued to up to 25 users, with five installations each; includes Word, PowerPoint, Excel, Outlook, OneNote, Access, Publisher, InfoPath and Lync.
    • Office 365 Enterprise Preview: In addition to the above applications, this version includes SharePoint online and Lync Online.

    Wrap-up

    DNP EMBARGO Microsoft Office 15 Preview details, screenshots and impressions
    Sometimes it's the little things, like saving documents to SkyDrive, that charm us most. Even more than any actual feature in Office 2013, what left us most enchanted during our testing period was the moment we powered down our Series 7 tablet, turned it back on, launched Word and found the cursor exactly where we left it. The best thing about Office is not what it does better than Office 2010, but how much more nimble it is in following you from device to device, from shut-down to start-up again. Beyond that, no one single feature of Office 2013 is dazzling, per se, but it doesn't matter: everything here, from YouTube embeds to the chart generator in Excel, works as promised and is intuitive to use. At the same time, the interface doesn't mark a radical departure from previous versions, so even casual users with no use for PivotTables should be able to find their way around.
    The one caveat we feel compelled to offer is that although Office 2013 has been updated to keep pace with Windows 8, this is not some sort of magic bullet that will suddenly make Office a pleasure to use on tablet devices: while reading mode is fantastic and touch mode is a step in the right direction, we still wouldn't want to work with spreadsheets without the help of a mouse. That disclaimer aside, we've found very few faults with Office 2013 -- it's fast, polished and painless to use.
    Download here http://www.microsoft.com/office/preview/en