Skip to main content

Search

Items tagged with: infosec


Microsoft Authenticator prompts the user to accept sharing analytics during the first launch. The prompt only dismisses when the user taps on "Accept." In fact, the app starts sending analytics even before accepting the privacy statement.πŸ€¦β€β™‚οΈ

In this video, we downloaded the authenticator app from the App Store and we opened it as we monitored the iPhone network traffic. While the app was showing the permission prompt, we captured at least 3 calls made by the app sending diagnostics to Microsoft. The app sent 14 KB of analytics even before accepting the prompt.

The message on the prompt actually says that Microsoft needs to collect diagnostic data in order to keep Authenticator secure and up to date. πŸ˜΅β€πŸ’«

#Privacy #Cybersecurity #2FA #InfoSec #Security #Microsoft

https://youtu.be/r5456XXG6v0


Many iPhone users are asking us to recommend safe authenticator apps. Well, the App Store is making it useless to recommend any app. No matter what you search for, the top hit is almost always an ad for a scam app.

#Apple #AppStore #2FA #InfoSec


Please boost! We are *hiring* for *two* jobs in information security! Come work with our amazing team building solutions for the security have-nots in our world!

Red Queen Dynamics needs 1) a leader for engineering/cloud infrastructure, and 2) a product designer. We are a remote-first security company and we welcome people from all backgrounds and life journeys. #infosec #infosecjobs #hiring #cybersecurity

You can apply here! Tech Lead: https://www.linkedin.com/jobs/view/3475289250/

Product Designer: https://www.linkedin.com/jobs/view/3475289426/

Or stay up to date with all our job postings on our website: https://rqdn.io/career-opportunities


I know there is a lot going on at Twitter right now, but here's one more thing. Twitter is ignoring #GDPR requests from people to delete their DMs.

At the moment, when you press delete on a Twitter DM (an individual message or conversation) the DM isn't actually deleted from Twitter's servers, just your inbox view.

So people in Europe have been making requests for Twitter to blitz all their messages. It hasn't properly answered them. And now regulators are looking at it

Full story here: https://www.wired.com/story/delete-twitter-dms-gdpr/

#Twitter #gdpr #infosec #technology #news #wired


It's trivial to determine the real IP of a Mastodon server behind Cloudflare. All it takes is one well-crafted request:

https://gist.github.com/cutiful/4f36da3ed37b24f9a7106064393f5e7f

I wonder how many instance admins using Cloudflare know about this? My hunch is most do not, because the primary justification I see for using Cloudflare here is DDoS protection.

Cloudflare won't help if the attacker knows your origin IP, and you can't hide that with Cloudflare alone, due to the nature of ActivityPub.

#MastoAdmin #InfoSec


People following my account for a while probably noticed me talking about South Korea every now and then. I’ve hinted towards doing some important research, and now the time has finally come for the first disclosures.

But first I need to do a bunch of explaining because most people (my past self from a few months ago included) are largely unfamiliar with the Korean software landscape. See: they have those β€œsecurity” applications that everyone has to install if they want to use online banking for example.

What could possibly go wrong with applications developed by private vendors without any kind of security vetting and that everyone in a country has to install, whether they like it or not? A lot of course.

In this first blog post I explain how in my limited understanding the current situation came about, show why the companies lack incentive to really invest in security and give you a first slight idea of the disastrous consequences.

No, I’m not exaggerating. The next blog post is scheduled for January 9th, and it will be about a specific application. I submitted seven vulnerability reports for this one. It took a real issue and claimed to have solved it – by making matters considerably worse than they were.

https://palant.info/2023/01/02/south-koreas-online-security-dead-end/

#infosec #ApplicationSecurity #privacy #korea


Compromised PyTorch-nightly dependency chain between December 25th and December 30th, 2022.

Steals all your SSH keys!

"If you installed PyTorch-nightly on Linux via pip between December 25, 2022 and December 30, 2022, please uninstall it and torchtriton immediately, and use the latest nightly binaries (newer than Dec 30th 2022)."

#infosec #machinelearning #deeplearning

https://pytorch.org/blog/compromised-nightly-dependency/

https://news.ycombinator.com/item?id=34202836


πŸ”“ Like good neocolonizers, #humanitarian organizations & #nonprofits, like militaries, also collect vast amounts of #biometric & other private information about people with reckless disregard for basic #privacy and #security concepts.

✊🏽 We must hold them accountable for the risks and damages their actions cause: it's unacceptable to allow society to continue this way.

:pesthorn: Thanks to #CCC for helping expose the dangerous truth.

#SurevillanceCapitalism #infosec

https://web.archive.org/web/20221227125216/https://www.nytimes.com/2022/12/27/technology/for-sale-on-ebay-a-military-database-of-fingerprints-and-iris-scans.html


People wonder why I am always so harsh on #LastPass. Thing is, I’ve been watching them ignore security risks for years. Yes, things that they are being warned about again and again, yet they choose not to address them.

You think unencrypted URLs are bad? Take a look at this seven years old presentation by Martin Vigo and Alberto Garcia Illera: https://www.blackhat.com/docs/eu-15/materials/eu-15-Vigo-Even-The-Lastpass-Will-Be-Stolen-deal-with-it.pdf. Starting with page 69 it explains how the custom_js feature could be abused to extract users’ passwords.

Guess what, this feature is still present and used on PayPal for example. Still no encryption and nothing to protect the users. No change whatsoever in at least seven years that LastPass was made aware of this issue.

Instead, when disclosing #LastPassBreach they again lie that they don’t have access to your passwords. But they do. Anyone with access to their server does. NSA could order them to extract your passwords. Hackers who gain access to their server could abuse this to get your passwords. Or just to run their JavaScript code on any website, and then they don’t even need your passwords.

And that’s only one out of the many documented backdoors that LastPass chooses to ignore, both in terms of implementation and their public communication.

#infosec #ApplicationSecurity


Apparently some dickhead (or dickheads, as the case may be) uploaded malware into an issue on Codeberg and shared links to it and managed to get Codeberg onto a number of block lists so some folks can’t access the site now because their ISPs are blocking it.

If you know the folks who run these lists and can help remove Codeberg from them, I’d appreciate it.

More details: https://codeberg.org/Codeberg/Community/issues/850

CC @Codeberg

#codeberg #infosec #foss #freeSoftware


Tutanota: U2F support is now also available on #Android and #iOS

U2F keys are now supported on all @Tutanota clients.

(Tutanota is also an avoidthehack recommended encrypted email provider).

#mfa #2fa #privacy #cybersecurity #infosec #infosecurity

https://tutanota.com/blog/posts/app-update


Content warning: fediblock and raspberry pi (we knew thee well)


a vulnerability in hyundai vehicles equipped with sirius xm from 2015 onwards allows them to be unlocked and started remotely by unauthorized third-parties #infosec https://blog.koddos.net/bug-on-hyundai-app-allows-hackers-to-unlock-and-start-cars-remotely/


This is an old project, but by some miracle it's still working and I woke up this morning wanting to celebrate the things I love more.

This Inkplate e-ink screen shows Conway's Game of Life, seeded from tarpits I have on the Internet. The tarpits are programs on my computer that superficially look like insecure Telnet and Remote Desktop services, but actually exist to respond super slowly and make bots scanning the Internet 'get stuck'.

When a bot connects to the tarpit, the data it sends gets squished into a 5x5 grid and 'stamped' onto a Game of Life board. Data from a bot at the IP address 1.1.x.x will get stamped on the top left corner, data from a bot at 254.254.x.x will get stamped on the bottom right corner.

Conway's Game of Life, a set of simple rules that govern whether cells should turn on or off, updates the display once per second. The result is that bot attacks end up appearing as distinct 'creatures', that get bigger and more angry looking over time (as their centre is updated with new data). After the attack finishes, the 'creature' eventually burns itself out.

Despite that description, it's a really chill piece of art that doesn't draw too much attention but I can happily watch for a long time.

Credit for the idea goes to @_mattata, I had been wanting to make a real-life version of XKCD #350 for years before seeing his Botnet Fishbowl project.

#projects #inkplate #esp32 #eink #infosec #tarpit


See our good friend and frequent guest, @kyle, discuss supply chain security in this CNBC piece on manufacturing consumer electronics in the USA. We're excited to see @purism in the news!

https://youtu.be/YdbA7Z8Ae4w

#security #supplyChain #infosec #manufacturing #electronics #hardware #phones #teamKyle


I was interviewed about supply chain security (around 15 min mark) in a longer CNBC feature about manufacturing phones in the USA. In short, it's less about trust concerns with any particular country/govt., and more about reducing the links in the supply chain to reduce the opportunities to tamper with hardware.

Our Made-in-USA-electronics Librem 5 USA phone also got a number of shout-outs. Pretty neat!

https://youtu.be/YdbA7Z8Ae4w #security #supplychain #infosec #manufacturing


To learn more about #MLS and why this protocol exists in the first place when we already have Signal's, here is a great podcast on the topic: https://www.cryptography.fm/7.

#Privacy #Security #Crytology #Cryptography #InfoSec


β€œHertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86”
https://www.hertzbleed.com/

When constant-time crypto code doesn’t run in constant time…

#


Content warning: Tweeted. No content guarantees.


#

A: Social Engineering
B: Physical Access
C: Vuln Exploitation
D: Lateral Movement
E: Supply Chain Attack

What am I missing?


β€œiPhones Vulnerable to Attack Even When Turned Off”
https://threatpost.com/iphones-attack-turned-off/179641/

β€œEvil Never Sleeps: When Wireless Malware Stays On After Turning Off iPhone”
https://arxiv.org/pdf/2205.06114.pdf

#


HIRING: Cyber Engineer / Dulles, Virginia, United States https://infosec-jobs.com/J12184/ # # # # # # # # # # # # #


I never did an #!

Hi, I'm Max. I live in # and do # at PCMag where I cover #, #, and #. I also write reviews of # and professionally complain about #. I'm the Unit Chair of the ZDCG # and moonlight as a # organizer. If you want to learn about how to unionize your workplace, plz DM me. I play # badly and think about # literature. I'm spending too much money on #.


Content warning: abandon x86 forever! Spectre, academic paper from 1995 w/ link


As we are a # community, I thought it would be a good idea to ask: Who is #?

Looking for a new challenge.

I am really good at:

- # marketing
- #
- #
- #
- # (#)

Hoping to bypass the HR filter. If you are # at a humane company that respects & values employees, please reach out!

#

(++ to anyone who picks up on my good/excessive hashtag usage)


My #:

I did two years of engineering school and two years of journalism. I'm a geek who loves to tell a story.

I make #, # & #. I do a lot of # work, kids books (#), and speculative #.

I've spent about 15 years in the world of # (thank you, day job!) and I do a lot of writing and podcasting in this field. I'm not an expert but I am a nerd for # and #.

Links are all in my profile if you want to learn more. I'm not gonna spam you.

This is not my first time on Mastodon but I'm trying to consolidate a bunch of my older profiles right here.

⇧