Reporting Ransomware? If you don’t report it, you’re screwed. If you do report it, you’re still screwed. @MikePerryavatar Weird how Department of Homeland Security couldn’t secure the homeland from a myriad of attacks, to include hybridized warfare and cyber attacks. It’s as if the Patriot Act, and GWOT for that matter, were total bullshit and […]
General
ProtonMail? Not Worth an Electron!
People seem to automatically lump Security and Privacy into one single category. When it comes to Email, these are just spices added to the dish, like Salt and Pepper – too much is overbearing and too little is weak. So, I was just cruising around the web and came across this: Notes from ProtonMail’s meeting […]
Numb to it all
Wow. It has certainly been quite the ride the last few years. From endless SPECTRE and MELTDOWN bugs in the AMD and Intel microprocessors, the out-of-control ransomware variants, to the incessant breaches and release of otherwise private information. This is a mess. So, before you do something stupid and idiotic, let me remind you, SECURITY […]
Secure Your Amazon S3 Buckets
We all have S3 Buckets, don’t we? Dark Reading has a good tutorial on how to secure your bucket, including access AND encryption: https://www.darkreading.com/edge/theedge/how-to-prevent-an-aws-cloud-bucket-data-leak–/b/d-id/1337093
Tech Support Scams
So, in the first week in December, I got a call from a number listed as being from “Seattle, WA”. I was greeted by a gentleman with an East-Indian accent: Caller: “Hello. This is Samir from Microsoft Tech Support. I’m here to help you with your login problem.” Me: “I have no login problems.” Caller […]
Apple Fixes Critically Stupid Error in High Sierra
ZDnet broke a story about a critical error in macOS 10.13.0, 10.13.1 (current), and 10.13.2 Beta. The issue is that the system allows login of the “root” user, with no password. Simply wake up the Mac, go to the logon screen, and select “Other User”. Enter a username of “root” with a blank password. Enjoy the […]
Update Your Dahua NVR & IP Cameras
Positive Technologies has outdone themselves. They have discovered a critical vulnerability in Dahua IP Cameras and NVR systems and has documented it here. CERT has a good write-up available as well. I’ve always liked Dahua because for their relatively low cost and durability. Their cameras and NVRs are built like brick houses. There are software […]
Intel Inside? Better get it out!
Alas, poor Intel. What a mess you’ve made. On November 17, 2017 I wrote an article describing the work Positive Technologies had done in researching the Intel Management Engine and discovering the NSA’s HAP (High Assurance Program) boot mode. They found a bunch of flaws in the Intel architecture which has the industry buzzing. The […]
Hacking VoIP Phones
Business Insider has an interesting article on how they were able to attack and exploit Cisco VoIP phones. After all, as they point out, what is a VoIP phone? It’s a computer with a microphone! Their article can be viewed here: http://www.businessinsider.com/hackers-can-turn-office-phone-into-remote-listening-device-cybersecurity-hack-cisco-spying-tap-2017-11 Yes, your VoIP phones fall squarely into the category of Internet of Things. and […]
New VMware Vulnerabilities
VMware has fixed critical vulnerabilities, releasing these versions: Horizon View Client 4.6.1, Workstation Pro 12.5.8, Workstation Player 12.5.8, Fusion Pro / Fusion 8.5.9. These address issues ranging from Client O/S being able to run commands on the Host O/S, crashing Client VMs (Virtual Machines), and unprivileged users crashing their VMs. Note that Workstation 14.X and Fusion 10.X versions […]