Viry a Červi

Clock blocker: Woman sues bosses over fingerprint clock-in tech

The Register - Anti-Virus - 4 Červen, 2018 - 21:46
Worker time-keeping system at center of biometric privacy legal battle in the US

A former employee at a nursing home is alleging the company and its equipment provider violated the US state of Illinois' biometric privacy laws with a fingerprint-scanning time clock system.…

Kategorie: Viry a Červi

Cloudflare Gets Transparent on DNS Resolver Outage

VirusList.com - 4 Červen, 2018 - 21:17
It’s a cautionary tale for those coding the complex algorithms that go into automated mitigation.
Kategorie: Viry a Červi

Facebook Defends Against Device-Integrated APIs Policy, But Concerns Remain

VirusList.com - 4 Červen, 2018 - 19:17
Facebook is again in hot water after an article alleged it struck deals with device-makers to access users' data.
Kategorie: Viry a Červi

FIFA public Wi-Fi guide: which host cities have the most secure networks?

Kaspersky Securelist - 4 Červen, 2018 - 13:11

We all know how easy it is for users to connect to open Wi-Fi networks in public places. Well, it is equally straightforward for criminals to position themselves near poorly protected access points – where they can intercept network traffic and compromise user data.

A lack of essential traffic encryption for Wi-Fi networks where official and global activities are taking place – such as at locations around the forthcoming FIFA World Cup 2018 – offers especially fertile ground for criminals.

With this in mind, can football fans feel digitally safe in host cities? How does the situation with Wi-Fi access differ from town to town? To answer these questions, we have analyzed existing reliable and unreliable access points in 11 FIFA World Cup host cities – Saransk, Samara, Nizhny Novgorod, Kazan, Volgograd, Moscow, Ekaterinburg, Sochi, Rostov, Kaliningrad, and Saint Petersburg.

The main feature of the research is telemetry, which aims to secure users’ Wi-Fi connections and turn on VPNs when needed. Statistics were generated from users who voluntarily agreed to having their data collected. For the research, we only evaluated the security of public Wi-Fi spots. Even with relatively few public Wi-Fi spots in small towns, we still obtained a sufficient base for analysis – almost 32,000 Wi-Fi hotspots. While checking encryption and authentication algorithms, we counted the number of WPA2 and open networks, as well as their share among all the access points.

Security of Wireless Networks in FIFA World Cup host cities

Using the methodology described above, we have evaluated the security of Wi-Fi access points in 11 FIFA World Cup 2018 host cities.

Encryption types used in public Wi-Fi hotspots in FIFA World Cup host cities

Over a fifth (22.4%) of Wi-Fi hotspots in FIFA World Cup 2018 host cities use unreliable networks. This means that criminals simply need to be located near an access point to grab the traffic and get their hands on user data.

Around three quarters of all access points use encryption based on the Wi-Fi Protected Access (WPA/WPA2) protocol family, which is considered to be one of the most secure. The level of protection mostly depends on the settings, such as the strength of the password set by the hotspot owner. The complicated encryption key can take years to successfully hack.

It should also be noted that even reliable networks, like WPA2, cannot be automatically considered as totally secure. They still give in to brute-force, dictionary, and key reinstallation attacks, of which there are a large number of tutorials and open source tools available online. Any attempt to intercept traffic from WPA Wi-Fi in public access points can also be made by penetrating the gap between the access point and the device at the beginning of the session.

Geography of Unsecured Wi-Fi Access Points

Encryption types used in public Wi-Fi hotspots in FIFA World Cup host cities

The safest city (in terms of public Wi-Fi) turned out to be Saransk, with 72% of access points secured by WPA/WPA2 protocol encryption.

The top-three cities with the highest proportion of unsecured connections are Saint Petersburg (48% of Wi-Fi access points are unsecured), Kaliningrad (47%) and Rostov (44%).

Again, the relativity of the results should be noted. Even a WPA2 connection in a cafe couldn’t be considered as secure, if the password is visible to everyone. Nevertheless, we believe that the methodology used represents the Wi-Fi hot-spot security situation in the host cities, with a fair degree of accuracy.

The results of this research show that the security of Wi-Fi connections in FIFA World Cup hosts cities varies. Therefore. We therefore recommend that users follow some key safety rules.

Recommendations for Users

If you are going to visit any of the FIFA World Cup 2018 host cities and use open Wi-Fi networks while you are there, remember to follow these simple rules to help protect your personal data:

  • Whenever possible, connect via a Virtual Private Network (VPN). With a VPN, encrypted traffic is transmitted over a protected tunnel, meaning that criminals won’t be able to read your data, even if they gain access to it. For example, the Kaspersky Secure Connection VPN solution can switch on automatically when a connection is not safe.
  • Do not trust networks that are not password-protected, or have easy-to-guess or easy-to-find passwords.
  • Even if a network requests a strong password, you should remain vigilant. Fraudsters can find out the network password at a coffee shop, for example, and then create a fake connection using the same password. This allows them to easily steal personal user data. You should only trust network names and passwords given to you by the employees of an establishment.
  • To maximize your protection, turn off your Wi-Fi connection whenever you are not using it. This will also save your battery life. We recommend you also disable automatic connections to existing Wi-Fi networks.
  • If you are not 100% sure that the wireless network you are using is secure, but you still need to connect to the Internet, try to limit yourself to basic user actions such as searching for information. You should refrain from entering your login details for social networks or mail services, and definitely do not perform any online banking operations or enter your bank card details anywhere. This will avoid situations where your sensitive data or passwords are intercepted and then used for malicious purposes later on.
  • To avoid becoming a cybercriminal target, you should enable the “Always use a secure connection” (HTTPS) option in your device settings. Enabling this option is recommended when visiting any websites you think may lack the necessary protection.

One example of a dedicated solution is the Secure Connection tool included in the latest versions of Kaspersky Internet Security and Kaspersky Total Security. This module protects users who are connected to Wi-Fi networks by providing them with a secure encrypted connection channel. Secure Connection can be launched manually or, depending on the settings, activated automatically when connecting to public Wi-Fi networks, when navigating to online banking and payment systems or online stores, and when communicating online (via mail services, social networks, etc.).

Apple lifts two-month ban on Telegram updates in iOS store

Sophos Naked Security - 4 Červen, 2018 - 13:01
Apple was blocking updates globally since Russian authorities ordered the company to remove the encrypted messaging app from the App Store.

Cloudflare mistakes own 1.1.1.1 DNS for DDoS attack

Sophos Naked Security - 4 Červen, 2018 - 12:49
When is a DDoS attack not a DDoS attack? When it's caused by your own recently-launched DNS service.

Facebook faces furious shareholders at annual meeting

Sophos Naked Security - 4 Červen, 2018 - 12:42
They accused execs of human rights violations, compared Zuckerberg to Vladimir Putin, and challenged his "corporate dictatorship."

'Tesco probably knows more about me than GCHQ': Infosec boffins on surveillance capitalism

The Register - Anti-Virus - 4 Červen, 2018 - 12:11
Cambridge Uni powwow broods on Facebook, Wannacry

Privacy of medical data and the machinations of surveillance capitalism were under the spotlight at a Cambridge University symposium last week.…

Kategorie: Viry a Červi

Going to Infosec Europe? Grab yourself a goody bag

Sophos Naked Security - 4 Červen, 2018 - 11:01
Use the phrase that pays and grab a bag of goodies for free!

Monday review – the hot 20 stories of the week

Sophos Naked Security - 4 Červen, 2018 - 10:50
From Android apps sending unencrypted data and the 1 good reason to get the iOS 11.4 update to Wayback Machine ‘unarchives’ spying website, and more!

'Moore's Revenge' is upon us and will make the world weird

The Register - Anti-Virus - 4 Červen, 2018 - 09:29
When everything's smart, the potential for dumb mistakes becomes enormous

Earlier this year I lamented the inevitable death of Moore's Law - crushed between process node failures and exploits attacking execution efficiencies. Yet that top line failure of Moore's Law hides the fact that chips in general are now cheap.…

Kategorie: Viry a Červi

G Suite admins need to RTFM – thousands expose internal emails

The Register - Anti-Virus - 4 Červen, 2018 - 07:55
The manual is confusing, to be fair, but a third of users read it wrong and are dangling data

If you're sysadmin of an organisation using Google Groups and G Suite, you need to revisit your configuration to make sure you aren't leaking internal information.…

Kategorie: Viry a Červi

A Spectre flaw solution, Cloudflare blips, a bank cyber-heist in Canada, and more in infosec land

The Register - Anti-Virus - 2 Červen, 2018 - 02:24
Also, the SEC takes aim at another shady ICO

Roundup  While we were busy chasing SpamCannibals, jailing Yahoo hackers, and blaming North Korea for everything else, there was some interesting security news going on.…

Kategorie: Viry a Červi

A Spectre solution, a (very) brief Cloudflare outage, and a bank heist in Canada

The Register - Anti-Virus - 2 Červen, 2018 - 02:24
Also, the SEC takes aim at another shady ICO

Roundup  While we were busy chasing SpamCannibals, jailing Yahoo hackers, and blaming North Korea for everything else, there was some interesting security news going on.…

Kategorie: Viry a Červi

Researchers Warn of Microsoft Zero-Day RCE Bug

VirusList.com - 1 Červen, 2018 - 23:24
A Microsoft Windows vulnerability enables remote attackers to execute arbitrary code – and there’s no patch yet.
Kategorie: Viry a Červi

Browser Side-Channel Flaw De-Anonymizes Facebook Data

VirusList.com - 1 Červen, 2018 - 22:47
An attacker can pick up the profile picture, username and the "likes" of unsuspecting visitors who find themselves landing on a malicious website.
Kategorie: Viry a Červi

Stingray phone stalker tech used near White House, SS7 abused to steal US citizens' data – just Friday things

The Register - Anti-Virus - 1 Červen, 2018 - 22:38
Second worst stingray in history (RIP Steve Irwin)

Someone may have spied on smartphones in or near the White House using a fake cellphone tower – and miscreants are said to have abused SS7 weaknesses to swipe US citizens' private information, it emerged this week.…

Kategorie: Viry a Červi

DHS: Stingray slurper and SS7 hacking found near the White House

The Register - Anti-Virus - 1 Červen, 2018 - 22:38
Wyden probing into shaky state of US smartphone security

The Department of Homelands Security has confirmed the use of stingray smartphone surveillance devices in the US capital and widespread communications hacking using the SS7 vulnerability.…

Kategorie: Viry a Červi

Public Google Groups Leaking Sensitive Data at Thousands of Orgs

VirusList.com - 1 Červen, 2018 - 21:24
The exposed information includes accounts payable and invoice data, customer support emails, password-recovery mails, links to employee manuals, staffing schedules and other internal resources.
Kategorie: Viry a Červi

OMG, that's downright Wicked: Botnet authors twist corpse of Mirai into new threats

The Register - Anti-Virus - 1 Červen, 2018 - 18:04
Infamous IoT menace lives on in its hellspawn

Cybercrooks are using the infamous Mirai IoT botnet as a framework to quickly add in new exploits and functionalities, it has emerged.…

Kategorie: Viry a Červi
Syndikovat obsah