<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-3911105790299130851</id><updated>2026-03-18T20:59:17.300-05:00</updated><category term="Practical Security"/><category term="Small Word Security"/><category term="Digital Forensics"/><category term="Faith Family &amp; Fun"/><category term="Bugs and Vulnerabilities"/><category term="Cyber Crime"/><category term="Home Network Security"/><category term="Internet of Things"/><category term="Mobile Device Security"/><category term="Bank and Credit Card Security"/><category term="Password Management"/><category term="Hacking"/><category term="Identity Theft"/><category term="Financial Fraud"/><category term="Privacy"/><category term="Malware"/><category term="Social Engineering"/><category term="Parenting"/><category term="Social Networks"/><category term="Phishing"/><category term="Weekend Projects"/><category term="Encryption"/><category term="Awana and Kidmin"/><category term="Asus"/><category term="CSOonline"/><category term="Tech Tips"/><category term="Security Theater"/><category term="Transportation Authorities"/><title type='text'>Security for Real People</title><subtitle type='html'>A blog by David Longenecker: practical cyber security advice, digital forensics, and parenting in the digital age, with family and faith woven in.</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://www.securityforrealpeople.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3911105790299130851/posts/default?max-results=15'/><link rel='alternate' type='text/html' href='http://www.securityforrealpeople.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/3911105790299130851/posts/default?start-index=16&amp;max-results=15'/><author><name>David</name><uri>http://www.blogger.com/profile/10169777669998745001</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>256</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>15</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-3911105790299130851.post-4671422452561798560</id><published>2018-12-27T10:41:00.000-06:00</published><updated>2018-12-31T19:11:39.150-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Bugs and Vulnerabilities"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Identity Theft"/><category scheme="http://www.blogger.com/atom/ns#" term="Password Management"/><category scheme="http://www.blogger.com/atom/ns#" term="Practical Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Privacy"/><category scheme="http://www.blogger.com/atom/ns#" term="Social Networks"/><title type='text'>A band-aid for Twitter&#39;s horribly broken security</title><content type='html'>&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;i&gt;If you manage a high-value Twitter account, consider creating a second, &amp;quot;burner&amp;quot; account. After enabling multifactor authentication on the high-value account, add the same phone number to the burner account. This will turn off SMS access features for the high-value account, without breaking MFA on the same. &lt;/i&gt;&lt;/span&gt;&lt;/blockquote&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;b&gt;Updated December 31&lt;/b&gt;: Added a description of the variations between mobile app, mobile web UI, and desktop web UI, along with a &lt;a href=&quot;https://twitter.com/GossiTheDog/status/1079840403715735552&quot; target=&quot;_blank&quot;&gt;bug Kevin Beaumont pointed out&lt;/a&gt; (described at the end of this post).&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;On Christmas Eve, &lt;a href=&quot;https://twitter.com/antisocial_eng&quot; target=&quot;_blank&quot;&gt;Richard De Vere&lt;/a&gt; of The AntiSocial Engineer published a doozie of an article describing &lt;a href=&quot;https://theantisocialengineer.com/2018/12/24/twitter-is-broken&quot; target=&quot;_blank&quot;&gt;a serious flaw in Twitter’s security&lt;/a&gt;. In a nutshell, if a Twitter account has a phone number connected to it, Twitter accepts instructions via SMS from that phone number, with no additional authentication required.&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;It gets worse – far worse. Twitter requires a phone number be connected to an account in order to enable &lt;a href=&quot;https://www.securityforrealpeople.com/2014/03/do-twofa-2fa.html&quot; target=&quot;_blank&quot;&gt;multifactor authentication&lt;/a&gt;. Twitter does support using a mobile security app or a physical key for MFA, and allows you to turn off SMS-based 2FA, but requires a phone number to be connected to the account nonetheless. Removing the phone number also turns off &amp;quot;logon verification&amp;quot; (Twitter&amp;#39;s term for multifactor authentication).&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br&gt;&lt;/span&gt;
&lt;/span&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;img alt=&quot;Removing a phone number from Twitter also turns off multifactor authentication&quot; border=&quot;0&quot; data-original-height=&quot;333&quot; data-original-width=&quot;533&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgB4ZDIghhAu1Dia28KdrAPTbEVUntomym2t2DnAWrDWfJlJWhNvl9jP7KedH2_fGN7KCU5G6RymXXu_APAj-LnonAKiGoQ68Ozn0U6B5hKvCMjFz8kU0DT8wU7f1C7Qytaidpihb5-TNg/s1600/twitter-sms1.png&quot; title=&quot;Removing a phone number from Twitter also turns off multifactor authentication&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Meaning, a user security-aware enough to set up two-factor authentication to protect their Twitter account, is also opening a back door into their account, a back door that allows functions including follow, unfollow, tweet, retweet, like, DM, turn on or off push notifications, or remove the phone number from the account.&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;And since Twitter 2FA requires a phone number, sending a “stop” message to Twitter from (or spoofing) the number associated with an account, will disable 2FA on that account, with no notice to the rightful account owner.&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;That&amp;#39;s right: enabling 2FA on Twitter, explicitly enables an SMS back door to Twitter, which can be used to disable 2FA on Twitter, without you knowing that 2FA has been disabled.&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;a href=&quot;http://www.securityforrealpeople.com/2018/12/a-band-aid-for-twitters-horribly-broken.html#more&quot;&gt;Read more »&lt;/a&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3911105790299130851/posts/default/4671422452561798560'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3911105790299130851/posts/default/4671422452561798560'/><link rel='alternate' type='text/html' href='http://www.securityforrealpeople.com/2018/12/a-band-aid-for-twitters-horribly-broken.html' title='A band-aid for Twitter&#39;s horribly broken security'/><author><name>David</name><uri>http://www.blogger.com/profile/10169777669998745001</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgB4ZDIghhAu1Dia28KdrAPTbEVUntomym2t2DnAWrDWfJlJWhNvl9jP7KedH2_fGN7KCU5G6RymXXu_APAj-LnonAKiGoQ68Ozn0U6B5hKvCMjFz8kU0DT8wU7f1C7Qytaidpihb5-TNg/s72-c/twitter-sms1.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-3911105790299130851.post-8084975429939059225</id><published>2018-12-04T21:51:00.002-06:00</published><updated>2018-12-04T21:51:58.391-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Practical Security"/><title type='text'>The most challenging aspect of security</title><content type='html'>Ever wondered what is the most challenging aspect to security? It&#39;s not understanding the evolving threats and actors. Certainly those are important, but people smarter than me do a fine job of tracking and reporting on emerging threats.&lt;br /&gt;
&lt;br /&gt;
It&#39;s not the constant evolution of tools and blinky boxes. Sure, tools are part of the mix, and knowing what tools will benefit in what situations is a must, but a tool is a tool. Given the right tool with a suitable understanding of the problem, the right people can figure out the right way to use it.&lt;br /&gt;
&lt;br /&gt;
It&#39;s not understanding the technologies and solutions I&#39;m tasked with defending. Of course that is crucial, but 20 years in the field have taught me a great bit about operating systems, applications, networking, business, and the way systems work, break, and can be fixed.&lt;br /&gt;
&lt;br /&gt;
The biggest challenge? It&#39;s not threats, blinky boxes, or foundational knowledge. It&#39;s the context switching. It&#39;s being eyeball deep into a topic when something else demands attention. It&#39;s the interrupt-driven pace of work, always at the mercy of the next unscheduled threat.&lt;br /&gt;
&lt;br /&gt;
What techniques do you use to carve out dedicated time for strategic work? How do you avoid the pitfall of perpetual firefighting? Comment below or join the discussion on &lt;a href=&quot;https://twitter.com/dnlongen/status/1068293270021816320&quot; target=&quot;_blank&quot;&gt;Twitter.&lt;/a&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3911105790299130851/posts/default/8084975429939059225'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3911105790299130851/posts/default/8084975429939059225'/><link rel='alternate' type='text/html' href='http://www.securityforrealpeople.com/2018/12/the-most-challenging-aspect-of-security.html' title='The most challenging aspect of security'/><author><name>David</name><uri>http://www.blogger.com/profile/10169777669998745001</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-3911105790299130851.post-1111089295151811262</id><published>2018-08-07T19:45:00.001-05:00</published><updated>2019-02-10T20:05:11.416-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Faith Family &amp; Fun"/><category scheme="http://www.blogger.com/atom/ns#" term="Parenting"/><category scheme="http://www.blogger.com/atom/ns#" term="Practical Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Social Networks"/><title type='text'>On teaching kids to make good security and privacy choices themselves</title><content type='html'>&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;i&gt;February 10, 2019: Since writing the below post, I&#39;ve learned of a technique that is used to get around Instagram&#39;s obscuring unsolicited direct messages.&amp;nbsp;&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;i&gt;Instagram in general will blur DM&#39;ed images from strangers, with a message asking if the recipient wants to accept the message. It&#39;s a simple and sometimes-effective way to reduce unwanted sexual images (more often than not sent to female accounts). To get around that, some lowlifes will begin a DM conversation benignly, engaging their mark in innocent conversation. After the target has accepted the (so-far above-board) DM, the abuser sends obscene images that are not obscured because the sender is now &quot;known.&quot;&amp;nbsp;&lt;/i&gt;&lt;/span&gt;&lt;i style=&quot;font-family: &amp;quot;helvetica neue&amp;quot;, arial, helvetica, sans-serif;&quot;&gt;The abuser keeps a clean &quot;public&quot; profile an&lt;/i&gt;&lt;i style=&quot;font-family: &amp;quot;helvetica neue&amp;quot;, arial, helvetica, sans-serif;&quot;&gt;d only engages in abusive behavior through DM; since the abusive content is sent by DM, Instagram staff either cannot or will not (it&#39;s unclear which) view the content to act on abuse reports.&lt;/i&gt;&lt;br /&gt;
&lt;i style=&quot;font-family: &amp;quot;helvetica neue&amp;quot;, arial, helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/i&gt;
&lt;i style=&quot;font-family: &amp;quot;helvetica neue&amp;quot;, arial, helvetica, sans-serif;&quot;&gt;Educate your children that even if the conversation seems innocuous, you never really know who is on the other end of an Internet conversation.&lt;/i&gt;&lt;br /&gt;
&lt;i style=&quot;font-family: &amp;quot;helvetica neue&amp;quot;, arial, helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/i&gt;
&lt;i style=&quot;font-family: &amp;quot;helvetica neue&amp;quot;, arial, helvetica, sans-serif;&quot;&gt;If you or your child have received such unsolicited obscene material, you can report it to the FBI&#39;s Internet Crime Complaint Center (IC3) at&amp;nbsp;&lt;/i&gt;&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;i&gt;&lt;a href=&quot;https://www.ic3.gov/complaint/default.aspx/&quot; target=&quot;_blank&quot;&gt;https://www.ic3.gov/complaint/default.aspx/&lt;/a&gt;&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;i&gt;If the recipient is under the age of 16, you can also report it to the National Center for Missing and Exploited Children (NCMEC) at&amp;nbsp;&lt;a href=&quot;https://report.cybertip.org/&quot;&gt;https://report.cybertip.org/&lt;/a&gt;&amp;nbsp;&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;i&gt;In both cases, a screen capture of the obscene DM that includes the sender&#39;s name and/or profile alias will help preserve evidence if the abuser later deletes the DM.&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/span&gt;
&lt;hr /&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Over the years I&#39;ve written several posts on raising security-conscious kids. &lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.securityforrealpeople.com/2016/04/four-commandments-from-cyberparent.html&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Four Commandments From a Cyberparent&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.securityforrealpeople.com/2013/06/security-savvy-kids.html&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Security Savvy Kids&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;a href=&quot;https://www.securityforrealpeople.com/2014/10/snapchat-what-every-parent-needs-to.html&quot;&gt;Snapchat: What every parent needs to know (and teach&lt;/a&gt;)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;a href=&quot;http://www.csoonline.com/article/3011533/internet-of-things/your-childs-privacy-is-eroding.html&quot;&gt;Your child&#39;s privacy is eroding&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.securityforrealpeople.com/2014/08/11-cyber-security-tips-for-back-to.html&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;11 cyber security tips for back to school&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;A trend in my writing, as well as in my parenting, has been that as they grow up, my approach has evolved from technical controls to educating them to make good choices themselves. A recent conversation with my high school daughter highlights why that is. &lt;br /&gt;&lt;br /&gt;My middle daughter maintains an active Instagram account. A household rule is, if your social media account is public, don&#39;t post anything personally identifiable; if you want to post personal stuff, keep your account private. This is a rule that gradually loosens as they grow older and can make informed decisions. As my daughter has gradually shifted from private to somewhat public, she recently was asked if she would be a &quot;brand ambassador&quot; for a company.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;We discussed some of the dangers and abuses a teenage girl would face as her exposure grew (abuses I have little first-hand experience with, but that I am well aware of through conversations with many of you). Her response was both shocking and encouraging:&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;i&gt;&quot;Dad, I already deal with all of that. I just block and report them. Besides, Instagram obscures DM&#39;ed photos unless I accept the request.&quot;&lt;/i&gt;&lt;/span&gt;&lt;/blockquote&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;While not the response I expected, and not a topic I would have ever thought relevant in the not-too-distant past, I have to admit that&#39;s a pretty mature response.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;The moral?&amp;nbsp;Technical controls can only go so far; as kids grow into teenagers and fledgling adults, they need the tools and skills to look after themselves.&lt;/span&gt;&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3911105790299130851/posts/default/1111089295151811262'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3911105790299130851/posts/default/1111089295151811262'/><link rel='alternate' type='text/html' href='http://www.securityforrealpeople.com/2018/08/on-teaching-kids-to-make-good-security.html' title='On teaching kids to make good security and privacy choices themselves'/><author><name>David</name><uri>http://www.blogger.com/profile/10169777669998745001</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-3911105790299130851.post-453833040802962523</id><published>2018-02-12T22:19:00.000-06:00</published><updated>2018-02-12T22:19:09.768-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Digital Forensics"/><title type='text'>Using malware&#39;s own behavior against it</title><content type='html'>&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;A quick read for a Monday night.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;Last week while investigating some noisy events in my security monitoring system, I noticed two competing Windows features filling up event logs: link-local multicast name resolution (LLMNR) put lots of name resolution requests onto the local network segment, which Windows firewall promptly blocked.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;LLMNR is the successor to NetBIOS Name Service. Both serve the same purpose: if a computer cannot resolve a name through &lt;a href=&quot;https://www.securityforrealpeople.com/2015/10/dns-simple-way-to-stop-malicious-web.html&quot; target=&quot;_blank&quot;&gt;DNS&lt;/a&gt;, it essentially yells out on the local network &quot;hey, anyone know an address for xyzzy?&quot;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;This sounds like a reasonable solution, but it invites abuse. If an adversary has a foothold on my network, they can either listen for and reply to common typos, or can actively interrupt the legitimate DNS and instead give their own answers. In either case, the adversary can provide fake addresses for servers and websites, &lt;a href=&quot;https://www.sternsecurity.com/blog/local-network-attacks-llmnr-and-nbt-ns-poisoning&quot; target=&quot;_blank&quot;&gt;directing users to malicious places&lt;/a&gt; (and possibly stealing usernames and passwords along the way).&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;Generally speaking, I recommend turning off LLMNR and NBNS, as well as using a &lt;a href=&quot;https://github.com/codeexpress/respounder&quot; target=&quot;_blank&quot;&gt;trusted DNS provider&lt;/a&gt; that prevents access to known-malicious websites.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;Today I came across a slick way to use such malware&#39;s own behavior against it. LLMNR &quot;responder&quot; malware replies to requests with a bogus address, so they generally respond to *any* request. So &lt;a href=&quot;https://github.com/codeexpress/respounder&quot; target=&quot;_blank&quot;&gt;Respounder&lt;/a&gt; spits out bogus name requests and looks for responses.&lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3911105790299130851/posts/default/453833040802962523'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3911105790299130851/posts/default/453833040802962523'/><link rel='alternate' type='text/html' href='http://www.securityforrealpeople.com/2018/02/using-malwares-own-behavior-against-it.html' title='Using malware&#39;s own behavior against it'/><author><name>David</name><uri>http://www.blogger.com/profile/10169777669998745001</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-3911105790299130851.post-8158211737768883529</id><published>2018-01-24T22:12:00.002-06:00</published><updated>2018-01-24T22:12:38.344-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Faith Family &amp; Fun"/><category scheme="http://www.blogger.com/atom/ns#" term="Parenting"/><category scheme="http://www.blogger.com/atom/ns#" term="Practical Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Privacy"/><category scheme="http://www.blogger.com/atom/ns#" term="Social Networks"/><title type='text'>Seeing isn&#39;t believing: the rise of fake porn</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;The following may be disturbing to readers, but I feel it is important to write for several reasons. The first is, to stay a step ahead of cyberbullies that could use this technology to humiliate others. The second is to give readers - especially parents and teens - information to consider when deciding what to share publicly, privately, or at all.&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;In late 2016, software maker Adobe showcased an &lt;a href=&quot;https://thenextweb.com/apps/2016/11/04/adobes-upcoming-audio-tool-lets-you-synthesize-speech-in-anyones-voice/&quot; target=&quot;_blank&quot;&gt;audio-editing tool&lt;/a&gt; that could, given a speech sample, create a natural-sounding &lt;a href=&quot;https://www.theverge.com/2016/11/3/13514088/adobe-photoshop-audio-project-voco&quot; target=&quot;_blank&quot;&gt;recording of that person&lt;/a&gt;. This capability could come in very handy for editing podcasts or narrations, allowing a producer or sound engineer to edit the spoken text instead of re-recording.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;Last summer, a University of Washington &lt;a href=&quot;http://grail.cs.washington.edu/projects/AudioToObama/&quot; target=&quot;_blank&quot;&gt;research project&lt;/a&gt; demonstrated the next logical step. They were able to take a video recording of a public speech, replace the audio portion with a recording saying something else entirely, and &lt;a href=&quot;https://www.theregister.co.uk/2017/07/12/ai_transforms_audio_into_lipsynched_videos/&quot; target=&quot;_blank&quot;&gt;manipulate the video&lt;/a&gt; so the speaker&#39;s face and mouth movements matches the new audio.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;Faking someone&#39;s spoken words is one thing. But technology publication Motherboard wrote today of a new and disturbing practice gaining steam in the last six weeks or so: so-called &quot;face-swap&quot; porn, an artificial intelligence-aided merging of celebrity faces onto the bodies of porn actors, to create convincing videos that appear to be of that celebrity.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;In the&amp;nbsp;&lt;a href=&quot;https://motherboard.vice.com/en_us/article/bjye8a/reddit-fake-porn-app-daisy-ridley&quot; target=&quot;_blank&quot;&gt;article&lt;/a&gt;&amp;nbsp;(warning: NSFW, and unsettling content) Motherboard writes of individuals taking benign video from celebrities&#39; public Instagram stories, and transferring the faces onto nude Snapchats posted by others. Using freely available software and step-by-step instructions, the technique can be accomplished by even a novice computer user.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;My fear is that it won&#39;t stop with celebrities. The thought of someone taking video from my daughter&#39;s Instagram, and creating a believable fake video with which to humiliate her, shakes me to the core, as it should any parent.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;So why write this?&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;The first reason is to counter would-be cyberbullies. My hope is that a fake video - even an extremely convincing fake - might be less traumatic if it is widely known that such fakes are no longer fantasy.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;The second reason is to give you food for thought when it comes to privacy decisions. What you (or your child) post publicly, may be seen by - or downloaded and abused by - anyone.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;There is no one-size-fits-all solution when it comes to privacy and safety, but I&#39;ll share how I have approached this with my kids. When my children first began using social media, our household rule was that a social media account could be either public, or personal, but never both.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;If the child wanted to share publicly, it had to be under a pseudonym and never include pictures of them, their family members, pets, or home. If the child wanted to identify themselves, the account had to be private and only shared with friends they (and we) knew in real life.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;As they and their situational awareness have grown, we have given them more discretion, but you can bet this development is the subject of discussion in our home.&lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3911105790299130851/posts/default/8158211737768883529'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3911105790299130851/posts/default/8158211737768883529'/><link rel='alternate' type='text/html' href='http://www.securityforrealpeople.com/2018/01/seeing-isnt-believing-rise-of-fake-porn.html' title='Seeing isn&#39;t believing: the rise of fake porn'/><author><name>David</name><uri>http://www.blogger.com/profile/10169777669998745001</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-3911105790299130851.post-3423847843504650725</id><published>2018-01-12T16:21:00.000-06:00</published><updated>2018-01-12T16:21:01.113-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cyber Crime"/><category scheme="http://www.blogger.com/atom/ns#" term="Financial Fraud"/><category scheme="http://www.blogger.com/atom/ns#" term="Identity Theft"/><category scheme="http://www.blogger.com/atom/ns#" term="Practical Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Small Word Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Social Engineering"/><title type='text'>It&#39;s W2 scam season</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img border=&quot;0&quot; data-original-height=&quot;489&quot; data-original-width=&quot;743&quot; height=&quot;420&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-5RaiRTRb1rSgU9tRSxe58n9P3t3bsH2XOo3DwBUJsNFscdT_GB9nXr8VHEkGEBNPWhbTF8cHX_TvwK_LhSkA8Qyp8ol0idXZR559wfkMkDAVRfMpDfgK7C_ZoPjmPd4D9TPNQ7oYWL4/s640/w2.png&quot; width=&quot;640&quot; /&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;Time for a short Friday afternoon social engineering‍ discussion. If you work in HR / finance / benefits, you&#39;ll want to stick with me.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;It&#39;s January, the beginning of tax season in the US (and I presume, other countries as well). Employers in the US are required to provide W2 statements documenting pay and tax to their employees by the end of his month.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;Scammers know this, and love to exploit this annual ritual. The common schemes I see are an email or phone call pretending to be from either a company executive (often the CEO or CFO), or from the taxing authority, with an urgent request for employee records.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;Urgent because, a sense of urgency can short-circuit skepticism and get an employee to respond before thinking.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;Oddly, even though employers must provide this data by January 31, W2 scams have tended to peak around March for the last few years. Perhaps there&#39;s a psychological element since individual tax returns are due by April 15 so it remains top of mind for the HR/finance/benefits/payroll employee.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;If you work in HR / finance / payroll / benefits, or otherwise have access to employee personal data, stay vigilant over the next 90 days or so. Be suspicious of any request for employee records, especially if it comes in an unusual manner.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;Take the time to verify the request through a trusted channel. Depending on your organization size, that might mean in person, over the phone, or via an established business process.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;b&gt;DON&#39;T&lt;/b&gt; ship a CSV or XLS of employee data simply because someone - even the CEO - sends an email requesting such.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;If you own or manage a business, or manage those that have access to employee records, be sure they know how employee records are handled, and know the appropriate process for requesting and approving transfer of that data.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;If there is no established process for handling employee records - make one, and stick to it.&lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3911105790299130851/posts/default/3423847843504650725'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3911105790299130851/posts/default/3423847843504650725'/><link rel='alternate' type='text/html' href='http://www.securityforrealpeople.com/2018/01/its-w2-scam-season.html' title='It&#39;s W2 scam season'/><author><name>David</name><uri>http://www.blogger.com/profile/10169777669998745001</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-5RaiRTRb1rSgU9tRSxe58n9P3t3bsH2XOo3DwBUJsNFscdT_GB9nXr8VHEkGEBNPWhbTF8cHX_TvwK_LhSkA8Qyp8ol0idXZR559wfkMkDAVRfMpDfgK7C_ZoPjmPd4D9TPNQ7oYWL4/s72-c/w2.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-3911105790299130851.post-1228892765970374557</id><published>2017-12-20T20:23:00.004-06:00</published><updated>2017-12-20T20:23:53.228-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tech Tips"/><title type='text'>A handy trick for proxying HSTS sites in Chrome</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;679&quot; data-original-width=&quot;861&quot; height=&quot;504&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhsf7lyevXeXSP3XqMIlwslL2AEw2e-2bh8ETHxsmFgsXhtUpcYAR1RAHQdEXW8uy7x9bChbf61wjj9ZdJcQ67TSfhHmaqBxCNTZ2V5-M01rXuwQWy3OC8r7B2oy_Qc-d4VgPm90IibPSU/s640/badidea.jpg&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;TL;DR: Chrome has a nifty undocumented trick that makes proxying so much more useful when testing sites using HSTS or pinned certs: where the security warning screen doesn&#39;t give you an option to ignore, type &quot;&lt;b&gt;badidea&lt;/b&gt;&quot; to continue anyway.&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;Browser makers have been &lt;a href=&quot;https://www.troyhunt.com/life-is-about-to-get-harder-for-websites-without-https/&quot; target=&quot;_blank&quot;&gt;raising the bar&lt;/a&gt; when it comes to website security, gradually moving toward a state where insecure websites stand out like a sore thumb. The result has been a steady increase in the proportion of websites that safeguard your private information while in transit between you and the web server. Google&#39;s Chrome in particular makes it especially challenging to use badly secured websites, with a variety of warning messages such as the image above.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;In the example above, the website in question has enabled HTTP Strict Transport Security, or HSTS, which tells browsers&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;, Arial, Helvetica, sans-serif;&quot;&gt;that it should only be accessed over a secure channel, and so to always use HTTPS.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;, Arial, Helvetica, sans-serif;&quot;&gt;Essentially, the website tells browsers&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;, Arial, Helvetica, sans-serif;&quot;&gt;&quot;don&#39;t ever come here again except over HTTPS.&quot;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;In this case, the warning is slightly misleading: I am browsing to the site over HTTPS, but using a proxy to inspect what I am sending to the website. The proxy feature of &lt;a href=&quot;https://portswigger.net/burp/communitydownload/&quot; target=&quot;_blank&quot;&gt;Burp Suite&lt;/a&gt; allows me to send information to a secure website, but to catch and decrypt it before it leaves my computer, to see exactly what my browser is sending.&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;As a penetration tester or vulnerability researcher, it is very handy for making sure an application is not sending more data than I intend. It is also very handy for probing an application for data leaks and weaknesses.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;, Arial, Helvetica, sans-serif;&quot;&gt;In this scenario, Chrome&#39;s helpful protection is less, well, helpful.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;Thankfully, Google developers included an undocumented Easter Egg: typing the phrase &quot;&lt;b&gt;badidea&lt;/b&gt;&quot; while that warning is on the screen, will clear the warning and proceed to the website.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;A note to readers: this is a handy trick for researchers and penetration testers. Generally though, that warning is there for a reason. If you unexpectedly see a warning that your connection is not private - &lt;b&gt;your connection is not private.&lt;/b&gt;&amp;nbsp;If you are not intentionally man-in-the-middling your connection, the warning likely means either the website or your network is compromised. The technique I use for testing web applications is the same technique used by malicious hackers to eavesdrop when you connect to an &quot;evil twin&quot; hotspot mimicking the legitimate connection provided by your coffee shop or airport.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;The moral? Unless you know what you are doing, bypassing Chrome&#39;s privacy warning is, well, a bad idea.&lt;/span&gt;&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3911105790299130851/posts/default/1228892765970374557'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3911105790299130851/posts/default/1228892765970374557'/><link rel='alternate' type='text/html' href='http://www.securityforrealpeople.com/2017/12/a-handy-trick-for-proxying-hsts-sites.html' title='A handy trick for proxying HSTS sites in Chrome'/><author><name>David</name><uri>http://www.blogger.com/profile/10169777669998745001</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhsf7lyevXeXSP3XqMIlwslL2AEw2e-2bh8ETHxsmFgsXhtUpcYAR1RAHQdEXW8uy7x9bChbf61wjj9ZdJcQ67TSfhHmaqBxCNTZ2V5-M01rXuwQWy3OC8r7B2oy_Qc-d4VgPm90IibPSU/s72-c/badidea.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-3911105790299130851.post-3713119669784490503</id><published>2017-11-30T21:03:00.000-06:00</published><updated>2017-12-01T20:12:45.912-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Identity Theft"/><category scheme="http://www.blogger.com/atom/ns#" term="Practical Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Small Word Security"/><title type='text'>Private data in public places</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;217&quot; data-original-width=&quot;640&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEaqI84vSCytz7BFBeGi75k8UQgomZ9YMLLvUMy0qcjWeSYagOVk4tRpebJzwDMsgGvwCngluNU2hspsm1vxa6zcOL4X5iUvlZsaqvbUxN0t-Flaw2OwmpnvvcZCjw0OZaOgFI6Z7lxfg/s1600/resume.png&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Professional social engineer and open source intelligence expert Stephanie &amp;quot;&lt;a href=&quot;https://twitter.com/_sn0ww&quot; target=&quot;_blank&quot;&gt;@_sn0ww&lt;/a&gt;&amp;quot; Carruthers makes a living out of (mis)using what people and companies share publicly, so when she talks I listen. &lt;a href=&quot;https://schd.ws/hosted_files/lascon2017/c2/LASCON-Snow-PhysicalSecurity%20Presentation.pdf&quot; target=&quot;_blank&quot;&gt;Her talk&lt;/a&gt; at the Lonestar Application Security conference in October was captivating in showing how such information can be used to infiltrate a business (in her case, for the purposes of showing the business their weaknesses and how to defend themselves against someone with actual malicious intent). She made an observation this week that sparked some lively discussion:&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br&gt;&lt;/span&gt;


&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;a href=&quot;https://twitter.com/_sn0ww/status/935561965203685381&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;Don&amp;#39;t leave your resume public on google docs.&quot; border=&quot;0&quot; data-original-height=&quot;87&quot; data-original-width=&quot;581&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgr5IOY8Rd8unYjY-UrLYFm_T7q2Z74UQoZ7qf83-4E1jHZ73TQEASL4bZ3-WSxuH2ArIWYNCwCkAVpAdm3GxCX_VxtW5diZFWTV6Vp0BDu0nuYbXgNjazEACgWewtuI4rdyLdE0LdtBJk/s1600/resume1.png&quot; title=&quot;Don&amp;#39;t leave your resume public on google docs.&quot;&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;/span&gt;
&lt;a href=&quot;http://www.securityforrealpeople.com/2017/11/private-data-in-public-places.html#more&quot;&gt;Read more »&lt;/a&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3911105790299130851/posts/default/3713119669784490503'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3911105790299130851/posts/default/3713119669784490503'/><link rel='alternate' type='text/html' href='http://www.securityforrealpeople.com/2017/11/private-data-in-public-places.html' title='Private data in public places'/><author><name>David</name><uri>http://www.blogger.com/profile/10169777669998745001</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEaqI84vSCytz7BFBeGi75k8UQgomZ9YMLLvUMy0qcjWeSYagOVk4tRpebJzwDMsgGvwCngluNU2hspsm1vxa6zcOL4X5iUvlZsaqvbUxN0t-Flaw2OwmpnvvcZCjw0OZaOgFI6Z7lxfg/s72-c/resume.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-3911105790299130851.post-4526214136684887806</id><published>2017-11-27T20:18:00.001-06:00</published><updated>2017-11-28T09:08:28.960-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Internet of Things"/><category scheme="http://www.blogger.com/atom/ns#" term="Practical Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Small Word Security"/><title type='text'>Be sure to deregister Amazon devices purchased as gifts</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8J_Wp7WvKvHHO_7qVze9R26L4qzxl-JHGNP9dGkSZ1w3qKfheWXSD81Kg8hVFS4wFMkTFlX99SZ0D3ZZ4dNbaCi_FoNlZC0_-_VYL3kYMtRTcOunFOzy-g5tFD834ICxjUxNPtS8cYQ8/s1600/FireTVStick.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;img alt=&quot;Buying Amazon devices as holiday gifts? Be sure to deregister them from your account!&quot; border=&quot;0&quot; data-original-height=&quot;180&quot; data-original-width=&quot;270&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8J_Wp7WvKvHHO_7qVze9R26L4qzxl-JHGNP9dGkSZ1w3qKfheWXSD81Kg8hVFS4wFMkTFlX99SZ0D3ZZ4dNbaCi_FoNlZC0_-_VYL3kYMtRTcOunFOzy-g5tFD834ICxjUxNPtS8cYQ8/s1600/FireTVStick.png&quot; title=&quot;Buying Amazon devices as holiday gifts? Be sure to deregister them from your account!&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Now that post-Thanksgiving shopping is in full swing, here&#39;s a brief tip for those purchasing Amazon gadgets as Christmas gifts: if you are giving an Amazon Device to someone outside your household, take a moment to&amp;nbsp;&lt;a href=&quot;https://www.amazon.com/gp/help/customer/display.html?nodeId=201357520&amp;amp;ref_=pe_2242090_260844020_deveng_qs_tk_dereg&quot; target=&quot;_blank&quot;&gt;deregister&lt;/a&gt; the device from your Amazon account. Otherwise you may inadvertently give more gift than you bargained for.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Amazon devices ship pre-connected to the purchaser&#39;s account -- and thus to the purchaser&#39;s payment settings. This is the the case for Fire TV devices; it may also be true for Fire tablets and Echo voice control devices. Straight out of the box, an Amazon Fire TV device can purchase digital media and games, billed to the original purchaser of the device.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;I actually like this user experience decision: it is quite consumer-friendly, making it simple to unbox it, plug it in, and immediately start using it. Sure there&#39;s a potential abuse case here: a device stolen out of the mailbox could be abused to make digital purchases billed to the rightful owner - but those purchases are still tied to your account, not to the device, so there&#39;s no transferable value to the thief*. On top of that the purchaser gets a notification as soon as the device is first activated, limiting the window to make fraudulent purchases. And of course fraudulent purchases can be disputed and reversed.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;This leads to another tip: where possible use a low-limit credit card, or a prepaid debit card, for any online accounts. That way any fraud is with the bank&#39;s money and not yours.&amp;nbsp;A debit card is tied directly to your bank account, meaning fraud immediately hits your cash balance. Sure, you&#39;ll get fraudulent transactions reversed and the money back. Eventually. But eventually doesn&#39;t help if the rent is due today.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;i&gt;*Digital media is not transferable. However, some apps feature in-app shopping, suggesting it may be possible for a mail thief to plug in a Fire TV and purchase physical items for delivery. Alexa voice commands theoretically would allow for purchasing hard goods independent of any app features.&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3911105790299130851/posts/default/4526214136684887806'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3911105790299130851/posts/default/4526214136684887806'/><link rel='alternate' type='text/html' href='http://www.securityforrealpeople.com/2017/11/be-sure-to-deregister-amazon-devices.html' title='Be sure to deregister Amazon devices purchased as gifts'/><author><name>David</name><uri>http://www.blogger.com/profile/10169777669998745001</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8J_Wp7WvKvHHO_7qVze9R26L4qzxl-JHGNP9dGkSZ1w3qKfheWXSD81Kg8hVFS4wFMkTFlX99SZ0D3ZZ4dNbaCi_FoNlZC0_-_VYL3kYMtRTcOunFOzy-g5tFD834ICxjUxNPtS8cYQ8/s72-c/FireTVStick.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-3911105790299130851.post-2228047809314456853</id><published>2017-11-09T21:14:00.000-06:00</published><updated>2017-11-09T21:14:53.095-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Digital Forensics"/><category scheme="http://www.blogger.com/atom/ns#" term="Tech Tips"/><category scheme="http://www.blogger.com/atom/ns#" term="Weekend Projects"/><title type='text'>IR Toolkit</title><content type='html'>&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;In 20 years of systems administration and incident response, there are a handful of tools I find myself coming back to over and over again. Naturally, the SysInternals suite is on the list, along with Wireshark and Didier Stevens PDF tools. I&#39;ve also included portable installations of Python Some are useful for examining a system, others are useful for examining a suspicious file or attachment. So... I started a GitHub project to document my favorite free and/or open-source tools.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;I&#39;ll bet my readers have some of their own favorites: by all means, please comment below, or submit a pull request on GitHub, and I&#39;ll update the list!&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif; font-size: large;&quot;&gt;&lt;a href=&quot;https://github.com/dnlongen/IR-Toolkit&quot;&gt;https://github.com/dnlongen/IR-Toolkit&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3911105790299130851/posts/default/2228047809314456853'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3911105790299130851/posts/default/2228047809314456853'/><link rel='alternate' type='text/html' href='http://www.securityforrealpeople.com/2017/11/ir-toolkit.html' title='IR Toolkit'/><author><name>David</name><uri>http://www.blogger.com/profile/10169777669998745001</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-3911105790299130851.post-1218583275466807819</id><published>2017-10-10T16:21:00.000-05:00</published><updated>2017-10-20T15:46:57.001-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Bugs and Vulnerabilities"/><category scheme="http://www.blogger.com/atom/ns#" term="Digital Forensics"/><category scheme="http://www.blogger.com/atom/ns#" term="Malware"/><title type='text'>Exploiting Office native functionality: Word DDE edition</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img alt=&quot;Sensepost researchers show a way to exploit DDE to run code from Word, without macros or buffer overflows. Here&amp;#39;s how to detect it.&quot; border=&quot;0&quot; data-original-height=&quot;406&quot; data-original-width=&quot;640&quot; height=&quot;406&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9ryzE0KI-fQyWQAKU8gAUfmE4vAkr3IayZ285vNtGgDJtS562QCaKqHb9jVNqnj6fEzuvoqka_gUQEiCK47U-PjoK4_5ECV0d2JCsLsCjLPPbW1HGQuCZSWkCQeGhXLF1jETHqVqrik0/s640/DDE-main.png&quot; title=&quot;Sensepost researchers show a way to exploit DDE to run code from Word, without macros or buffer overflows. Here&amp;#39;s how to detect it.&quot; width=&quot;640&quot;&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;i&gt;&lt;b&gt;Updated 20 October:&lt;/b&gt; Added a note regarding enabling full command line logging for process creation events; added a note clarifying that &amp;quot;Creator Process Name&amp;quot; is only recorded in Windows 10 and Windows Server 2016. Older versions of Windows record the creator process ID but not the process name; added references to a variety of exploitation techniques found by other researchers or seen in the wild.&lt;/i&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;i&gt;&lt;br&gt;&lt;/i&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;i&gt;&lt;b&gt;Updated 11 October&lt;/b&gt;: I originally wrote that this exploit technique bypassed both disabled macros, and Protected View. That is incorrect: this technique will work if macros are disabled, but the code does not trigger while in Protected View. Thanks to Matt Nelson (&lt;a href=&quot;https://twitter.com/enigma0x3&quot; target=&quot;_blank&quot;&gt;@enigma0x3&lt;/a&gt;) for pointing out my mistake.&lt;/i&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;I love reading exploit techniques that rely on native features of the operating system or common applications. As an attacker, I find it diabolically clever to abuse features the target fully expects to be used and cannot turn off without disrupting business. As a defender, I am intrigued by the challenge of detecting malicious use of perfectly legitimate features.&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Researchers Etienne Stalmans and Saif El-Shereisuch of Sensepost wrote of a slick way to execute code on a target computer using Microsoft Word - but &lt;a href=&quot;https://sensepost.com/blog/2017/macro-less-code-exec-in-msword/&quot;&gt;without the macros or buffer overflows&lt;/a&gt; usually exploited to this end. Instead, they use dynamic data exchange, or DDE - an older technology once used for coding and automation within MS Office applications. This is particularly clever because it works even with macros disabled - because it&amp;#39;s not using the macro subsystem.&lt;/span&gt;&lt;br&gt;
&lt;a href=&quot;http://www.securityforrealpeople.com/2017/10/exploiting-office-native-functionality.html#more&quot;&gt;Read more »&lt;/a&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3911105790299130851/posts/default/1218583275466807819'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3911105790299130851/posts/default/1218583275466807819'/><link rel='alternate' type='text/html' href='http://www.securityforrealpeople.com/2017/10/exploiting-office-native-functionality.html' title='Exploiting Office native functionality: Word DDE edition'/><author><name>David</name><uri>http://www.blogger.com/profile/10169777669998745001</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9ryzE0KI-fQyWQAKU8gAUfmE4vAkr3IayZ285vNtGgDJtS562QCaKqHb9jVNqnj6fEzuvoqka_gUQEiCK47U-PjoK4_5ECV0d2JCsLsCjLPPbW1HGQuCZSWkCQeGhXLF1jETHqVqrik0/s72-c/DDE-main.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-3911105790299130851.post-7152290308782002762</id><published>2017-10-05T08:57:00.002-05:00</published><updated>2017-10-05T08:57:37.825-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Bank and Credit Card Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Cyber Crime"/><category scheme="http://www.blogger.com/atom/ns#" term="Password Management"/><category scheme="http://www.blogger.com/atom/ns#" term="Phishing"/><category scheme="http://www.blogger.com/atom/ns#" term="Practical Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Small Word Security"/><title type='text'>Enable two-factor on your Yahoo account... if you can</title><content type='html'>&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;274&quot; data-original-width=&quot;640&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjOFgpI4FFzD7h53IN1po1xtCkKGewIkR_tJJhVfJocQKbGdEgr3iK4CPizfOYhbLRVqts0cpMX4m0XCeG8_NDqS74WmtDxImsdwz00Jl3ooPdccL0F2HLyu1rKquJJusqq1vkixxPzmX4/s1600/yahoo_both_ways.png&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;Yahoo! accounts have very different security options depending on their origin.&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;span style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;, Arial, Helvetica, sans-serif;&quot;&gt;Unless you&amp;#39;ve been living under a rock, you know by now that Yahoo! suffered a massive data breach in 2013. The number of accounts reportedly affected changed a number of times, until this week it announced that &lt;/span&gt;&lt;i style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;, Arial, Helvetica, sans-serif;&quot;&gt;every single account&lt;/i&gt;&lt;span style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;, Arial, Helvetica, sans-serif;&quot;&gt; had been compromised. &lt;/span&gt;&lt;a href=&quot;https://www.wsj.com/articles/yahoo-triples-estimate-of-breached-accounts-to-3-billion-1507062804&quot; style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;, Arial, Helvetica, sans-serif;&quot; target=&quot;_blank&quot;&gt;All 3 billion of them&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;, Arial, Helvetica, sans-serif;&quot;&gt;.&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;Zack Whittaker, security editor for ZDNet, had this to say:&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br&gt;&lt;/span&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://twitter.com/zackwhittaker/status/915384240627503110&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;img alt=&quot;Secure your Yahoo account with 2FA, but do not delete it. Deleting it will recycle your account after 30 days — and anyone can hijack it.&quot; border=&quot;0&quot; data-original-height=&quot;247&quot; data-original-width=&quot;578&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjsNRhsvIfJOnMnQswm9SSFUzZBK6wOYmCx6ROYD23Trfx_8X32R99FxuNgwvb0FhQCcXhwz2fO2KAq-QZJTju9do1qCSZhZpfIaFIU1C59NTRQa9N91_xvuT8NNK_55yZD5VNffegPuI0/s1600/zack_whittaker_yahoo.png&quot; title=&quot;Secure your Yahoo account with 2FA, but do not delete it. Deleting it will recycle your account after 30 days — and anyone can hijack it.&quot;&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;That&amp;#39;s good advice - if you can. Many cannot.&lt;/span&gt;&lt;br&gt;
&lt;a href=&quot;http://www.securityforrealpeople.com/2017/10/enable-two-factor-on-your-yahoo-account.html#more&quot;&gt;Read more »&lt;/a&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3911105790299130851/posts/default/7152290308782002762'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3911105790299130851/posts/default/7152290308782002762'/><link rel='alternate' type='text/html' href='http://www.securityforrealpeople.com/2017/10/enable-two-factor-on-your-yahoo-account.html' title='Enable two-factor on your Yahoo account... if you can'/><author><name>David</name><uri>http://www.blogger.com/profile/10169777669998745001</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjOFgpI4FFzD7h53IN1po1xtCkKGewIkR_tJJhVfJocQKbGdEgr3iK4CPizfOYhbLRVqts0cpMX4m0XCeG8_NDqS74WmtDxImsdwz00Jl3ooPdccL0F2HLyu1rKquJJusqq1vkixxPzmX4/s72-c/yahoo_both_ways.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-3911105790299130851.post-7385327156785850872</id><published>2017-10-02T21:22:00.002-05:00</published><updated>2017-10-02T21:22:48.994-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Bank and Credit Card Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Cyber Crime"/><category scheme="http://www.blogger.com/atom/ns#" term="Financial Fraud"/><category scheme="http://www.blogger.com/atom/ns#" term="Identity Theft"/><category scheme="http://www.blogger.com/atom/ns#" term="Practical Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Small Word Security"/><title type='text'>Seven steps to minimize your risk of financial identity fraud</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;img alt=&quot;Credit Card Fraud spelled out using Scrabble tiles&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgqm4V8gV1iiJvx7qfvczHi8dolBjuhJquUzoA3ITnT65_-umPo6tqIolznqr8-_Bc6Y0emp4Z955DKO_Kl-tto1j735PmVv4mB_YTFDNge-6QgbM3ExIszvcFzOsLmYnDlBWIvkxe7Jpw/s1600/credit_card_fraud_tiles.jpg&quot; style=&quot;text-align: center;&quot; title=&quot;Credit Card Fraud&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br&gt;
&lt;br&gt;
&lt;i style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;, Arial, Helvetica, sans-serif;&quot;&gt;This is one of a few &lt;/i&gt;&lt;span style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;, Arial, Helvetica, sans-serif;&quot;&gt;Security for Real People&lt;/span&gt;&lt;i style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;, Arial, Helvetica, sans-serif;&quot;&gt; blog posts routinely updated once or twice a year, to offer up-to-date advice to consumers and small businesses as threats evolve over time. The recent &lt;a href=&quot;https://www.securityforrealpeople.com/2017/09/equifax-breach-exposes-143-million-to.html&quot;&gt;Equifax breach&lt;/a&gt; has put most Americans at a higher risk of identity fraud and is a good reason for an update.&lt;/i&gt;&lt;br&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;How many times have you replaced your credit or debit card after the number was stolen?&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;Now how many of those times did you suffer actual harm due to the fraud?&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;Credit card fraud is frequently in the news - perhaps less now than it was a few years ago, but it still remains a hot topic. Between &lt;a href=&quot;https://krebsonsecurity.com/2017/09/breach-at-sonic-drive-in-may-have-impacted-millions-of-credit-debit-cards/&quot;&gt;Sonic&lt;/a&gt;, &lt;a href=&quot;https://www.forbes.com/sites/leemathews/2017/07/06/travel-giant-sabre-confirms-its-reservation-system-was-hacked/#7214bf294b20&quot;&gt;Sabre&lt;/a&gt;, &lt;a href=&quot;https://www.securityforrealpeople.com/2014/02/been-targeted.html&quot;&gt;Target&lt;/a&gt;, &lt;a href=&quot;https://www.sans.org/reading-room/whitepapers/breaches/case-study-home-depot-data-breach-36367&quot;&gt;The Home Depot&lt;/a&gt;, &lt;a href=&quot;https://www.nbcnews.com/tech/security/kmart-credit-card-breach-what-you-need-know-n767161&quot;&gt;Sears/Kmart&lt;/a&gt;, &lt;a href=&quot;https://www.securityforrealpeople.com/2014/10/another-day-another-breach.html&quot;&gt;Dairy Queen&lt;/a&gt;, &lt;a href=&quot;https://krebsonsecurity.com/2016/01/wendys-probes-reports-of-credit-card-breach/&quot;&gt;Wendy&amp;#39;s&lt;/a&gt;, &lt;a href=&quot;https://krebsonsecurity.com/2016/07/cicis-pizza-card-breach-at-130-locations/&quot;&gt;Cici&amp;#39;s Pizza&lt;/a&gt;, &lt;a href=&quot;https://threatpost.com/pos-service-confirms-goodwill-breach-lasted-18-months/108346/&quot;&gt;Goodwill&lt;/a&gt; - the list of businesses whose payment systems were breached to steal card numbers goes on and on.&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;In a widely-circulated news story in late 2016, researchers at UK&amp;#39;s Newcastle University discovered a way to collect Visa card numbers without breaching a merchant. Generally speaking, a card number cannot be used online without also knowing the expiration date and the 3- or 4-digit code on the back. Visa&amp;#39;s payment network will block repeated attempts to guess the expiration and security code coming from a merchant - but does not detect guessing attempts spread out across many merchants.&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;The result is, by automatically and systematically generating different versions of security data for a card number, and trying the different combinations across thousands of merchant websites, a malicious hacker can successfully guess the correct combination of account number, expiration date, and security code in just a few seconds.&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;So what can you do to take credit card fraud off the top of your list of worries?&lt;/span&gt;&lt;br&gt;
&lt;a href=&quot;http://www.securityforrealpeople.com/2017/10/seven-steps-to-minimize-your-risk-of.html#more&quot;&gt;Read more »&lt;/a&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3911105790299130851/posts/default/7385327156785850872'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3911105790299130851/posts/default/7385327156785850872'/><link rel='alternate' type='text/html' href='http://www.securityforrealpeople.com/2017/10/seven-steps-to-minimize-your-risk-of.html' title='Seven steps to minimize your risk of financial identity fraud'/><author><name>David</name><uri>http://www.blogger.com/profile/10169777669998745001</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgqm4V8gV1iiJvx7qfvczHi8dolBjuhJquUzoA3ITnT65_-umPo6tqIolznqr8-_Bc6Y0emp4Z955DKO_Kl-tto1j735PmVv4mB_YTFDNge-6QgbM3ExIszvcFzOsLmYnDlBWIvkxe7Jpw/s72-c/credit_card_fraud_tiles.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-3911105790299130851.post-4997075006143971324</id><published>2017-09-19T13:45:00.000-05:00</published><updated>2017-09-19T13:54:24.759-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Mobile Device Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Practical Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Small Word Security"/><title type='text'>Incremental wins: iOS11 strengthens the idea of Trust</title><content type='html'>&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Two years ago, a friend &lt;a href=&quot;https://www.securityforrealpeople.com/2015/09/whats-hiding-in-your-childs-calculator.html&quot;&gt;piqued my curiosity&lt;/a&gt; with a question about a iPhone / iPad app teenagers were using to hide content from nosy peers (and parents). This person wondered whether the app was more than &amp;quot;security by obscurity&amp;quot; - did the app actually protect and encrypt the hidden data, or did it merely hide it out of obvious sight?&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;The answer turned out to be the latter, but along the way I noticed a curious oversight in the iOS security model.&lt;/span&gt;&lt;br&gt;
&lt;a href=&quot;http://www.securityforrealpeople.com/2017/09/incremental-wins-ios11-strengthens-idea.html#more&quot;&gt;Read more »&lt;/a&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3911105790299130851/posts/default/4997075006143971324'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3911105790299130851/posts/default/4997075006143971324'/><link rel='alternate' type='text/html' href='http://www.securityforrealpeople.com/2017/09/incremental-wins-ios11-strengthens-idea.html' title='Incremental wins: iOS11 strengthens the idea of Trust'/><author><name>David</name><uri>http://www.blogger.com/profile/10169777669998745001</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJ_lIS7lZE8xYaCTj7JXNjnU-mfocIsjA5Jefj8wHFjfQ_ozgKJfqE56LIM6KiGzUAtNgaASwKksJTN2q8oU3t2W34FyCmkBsyJDEGGX23GRP44y0xZ4xEd8EOq3jYVy9whtvPeJezOZM/s72-c/iTunes-trust.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-3911105790299130851.post-6386086072695910375</id><published>2017-09-18T12:32:00.000-05:00</published><updated>2017-09-18T12:32:16.548-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cyber Crime"/><category scheme="http://www.blogger.com/atom/ns#" term="Malware"/><category scheme="http://www.blogger.com/atom/ns#" term="Practical Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Small Word Security"/><title type='text'>Avast download site compromised to host a malicious CCleaner</title><content type='html'>&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;If you downloaded &quot;CCleaner&quot; software from antivirus company Avast between August 15 and September 12, you have a problem. Cisco&#39;s Talos threat research group discovered that company&#39;s software download page was compromised to &lt;a href=&quot;http://blog.talosintelligence.com/2017/09/avast-distributes-malware.html&quot; target=&quot;_blank&quot;&gt;host a malicious version&lt;/a&gt; of CCleaner that contains malware.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;Computers that downloaded and ran that software became part of a botnet, a network of computers under the control of whomever is behind that malware.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;Those that follow my advice to use the &lt;a href=&quot;https://www.securityforrealpeople.com/2015/10/dns-simple-way-to-stop-malicious-web.html&quot; target=&quot;_blank&quot;&gt;free OpenDNS service&lt;/a&gt; for their home networks are partially protected - your computer would still download and install the malware, but would be prevented from accessing the command and control servers the criminals use to deliver instructions to your computer.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;If you use CCleaner, check your antivirus software to be sure it is completely up-to-date, and run a full system scan. Now that the malware is known, most commercial antivirus programs will begin to detect it (with varying degrees of success).&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;I have long recommended&amp;nbsp;automatically updating software with the latest available patches and updates, as a core tenet of basic security for individuals and small businesses. After a Ukranian software company was hacked to &lt;a href=&quot;https://www.securityforrealpeople.com/2017/06/to-patchnya-or-not-to-patchnya.html&quot;&gt;deliver malware to taxpayers&lt;/a&gt; in that country, I wrote up an analysis of why I still held that recommendation.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;I said then:&lt;/span&gt;&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;i&gt;In over twenty years as a systems administrator and security professional - much of that time overseeing patching for a Fortune 100 company with a quarter million systems to update - I can count on one hand the number of catastrophic failures caused by patching, and still have fingers left over. Conversely, hardly a month goes by that I don&#39;t see malware and criminals exploit vulnerabilities in Windows, browsers, office productivity software, mobile apps, building automation systems, industrial control systems, and other computing software&lt;/i&gt;.&lt;/span&gt;&lt;/blockquote&gt;
&lt;span style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;, Arial, Helvetica, sans-serif;&quot;&gt;It is becoming increasingly difficult to maintain that position...&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;, Arial, Helvetica, sans-serif;&quot;&gt;I suspect I am up to two hands now,&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;, Arial, Helvetica, sans-serif;&quot;&gt;but for the time being, I still find quickly updating is less risky than not patching.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Helvetica Neue, Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3911105790299130851/posts/default/6386086072695910375'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3911105790299130851/posts/default/6386086072695910375'/><link rel='alternate' type='text/html' href='http://www.securityforrealpeople.com/2017/09/avast-download-site-compromised-to-host.html' title='Avast download site compromised to host a malicious CCleaner'/><author><name>David</name><uri>http://www.blogger.com/profile/10169777669998745001</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry></feed>