STE WILLIAMS

House Passes Bill to Renew NSA’s Warrantless Surveillance Program

The bill passed without an amendment which would require a warrant to analyze Americans’ incidentally collected data.

The US House of Representatives passed a bill, Thursday, renewing the warrantless Internet surveillance program conducted by the National Security Agency (NSA). The legislation, which passed 256-164, faced objections from privacy and civil liberties advocates.

The NSA’s surveillance program was initially created in secret after Sept. 11, 2001 and was later made legal by Section 702 of the Foreign Intelligence Surveillance Act (FISA). This bill would extend the program for six years with minimal changes, Reuters reports.

Democrats and some Republicans fought to include more privacy protections in the bill, specifically an amendment which would require intelligence agencies to obtain a warrant to analyze communications from an American whose information was incidentally collected. The bill ultimately failed to include this amendment and many believe it grants the NSA even more surveillance power.

This marks a setback for privacy supporters who posed the question of what might happen to the information of Americans whose data was collected as part of the program. Most lawmakers expect the bill to become law. It still requires approval from the Senate and from President Trump.

Read more details here.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/endpoint/house-passes-bill-to-renew-nsas-warrantless-surveillance-program/d/d-id/1330815?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Police give out infected USBs as prizes in cybersecurity quiz

So ironic. You work hard to win a cybersecurity award, and what do you get? A USB drive stuffed with creepy-crawly nasty, that’s what.

The Taiwanese government last month celebrated its crackdown on cyber crime. The national police – the Criminal Investigation Bureau (CBI) – picked up 250 blank USB drives, each with an 8G capacity, to give out as prizes at the data security expo, hosted by the Presidential Office on 11-15 December.

According to the Tapei Times, an employee at a New Taipei City-based contractor, Shawo Hwa Industries Co., first tested the drives by plopping an operating system on them and testing their storage capacity… from his infected work station.

Oops! the CBI said after investigating the infection, which wound up on 54 of the drives that were handed out to winners of a quiz about cybersecurity knowledge. “Winners of a quiz about cybersecurity knowledge,” as in, “people who hopefully know enough not to plug in random USB drives conveniently scattered throughout the parking lot but not necessarily those handed on a silver platter at a security expo.”

According to the CBI, the 54 drives picked up an executable malware file that goes by the name of XtbSeDuA.exe. The CBI said that the malware was designed, years ago, to suck up personal data and transmit it to a Poland-based IP address that would then bounce the information to unidentified servers.

Back in 2015, the malware was being used by an electronic fraud ring uncovered by Europol, according to the CBI, though I couldn’t find record of any such malware with that name.

At any rate, the CBI reportedly said that only older, 32-bit computers are susceptible to the malware and that common anti-virus software can successfully detect and quarantine it. Although some of the thumb drives – they were sourced from multiple vendors – were made in China, the CBI ruled out Chinese espionage.

The malware-as-a-party-favor came to light after expo participants complained that their anti-virus programs had flagged the drives as containing malware. The CBI retrieved 20 of the drives, leaving 34 of the drives wandering around in the wild.

The CBI said that the server set up to receive data from the malware has been shut down.

An anonymous source told the Taipei Times that the Presidential Office was not particularly pleased that one of its events – an event to celebrate its cyber security work, mind you – had been compromised.

In fact, in spite of the CBI’s investigation showing that the malware came from a government contractor working at a government contractor’s computer, the office has demanded that the bureau launch another probe.


Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/I-pncvalszY/

Brace yourselves for the ‘terabyte (sic) of death’, warns US army IT boss

The outgoing head of the Defense Information Systems Agency, which handles computer security for the US Department of Defense, has warned a massive cyber-attack is “looming” at the American military’s door.

Over lunch on Thursday, Army Lieutenant General Alan Lynn, who retires in a few months, told the Armed Forces Communications and Electronics Association’s Washington chapter that a few years ago, just one or two “gigabytes” – we’re assuming he meant gigabits or gigabytes per second – of junk network traffic would be thrown at the military’s internet gateways by miscreants, but those days are long gone. Now the tsunamis of duff packets to overwhelm servers are a lot bigger.

“The level of attacks that we’ve seen actually was really truly surprising, and it still continues to surprise me just how robust the attacks have become,” he said.

floppies

US nuke arsenal runs on 1970s IBM ‘puter waving 8-inch floppies

READ MORE

“Now, we get 600-gig attacks on the internet access points and unique, different ways of attacking that we hadn’t thought of before. There’s now, we would call it the ‘terabyte of death’ – there is a terabyte of death that is looming outside the door. We’re prepared for it, so we know it’s coming.”

By terabyte, we’re pretty sure he meant a terabit-a-second, or possibly a terabyte-a-second. Which is a lot. French web hosting biz OVH was dinged by a 990Gbps denial-of-service attack in 2016, an assault described as the largest ever reported of its kind.

With 3.2 million Dept of Defense staff to manage, Lynn said he faced huge challenges on a day-to-day basis. It was tough finding technology products to handle the volume of network traffic and meet computer security requirements. Military IT admins largely took off-the-shelf commercial kit, toughened it up, and deployed it.

New military equipment was also a challenge for The Green Machine’s ranks of BOFHs. He gave the example of the F-35, which he called the “flying mega-computer,” that requires secure data stream to send information and receive commands from ground controllers and defense systems. Lynn also said his agency had developed systems that allowed fighters on the ground to watch live video streams from drones on mobile phones.

“It’s pretty cool to watch,” he enthused, although reminded the attendees to stay focused on the military’s prime objective: killing. “At the end of the day, it’s about lethality,” he said.

We’re trying to get the Department of Defense to clarify what Lynn meant when he said “terabyte” and “600-gig.” We will let you know if there’s any movement on that. ®

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/01/12/us_military_ddos_warning/

Intel’s Meltdown fix freaked out some Broadwells, Haswells

Intel’s warned that the fix for its Meltdown and Spectre woes might have made PCs and servers less stable.

Chipzilla’s slipped out a statement to the effect that “We have received reports from a few customers of higher system reboots after applying firmware updates.” The problems have hit “Broadwell and Haswell CPUs for both client and data center.”

Intel’s said that if it needs to create a new fix, it will.

If new code is needed, Intel will need to get it right: the company already faces numerous class action lawsuits. Data centre operators already scrambling to conduct unplanned maintenance will not be happy about the fix reducing stability.

Intel can take some small measure of comfort from the fact it is not alone with having ongoing Meltdown/Spectre worries to handle, as AMD on Thursday confirmed that it’s kit is vulnerable to Spectre.

The x86 challenger is, happily, immune to meltdown. The company’s said that operating system patches alone will address the Spectre bounds check bypass bug. Fixing Spectre’s branch target injection flaw will require firmware fixes that AMD’s said will start to arrive for Ryzen and EPYC CPUs this week.

The Register has also asked other server vendors how they’re addressing the bugs. Oracle’s patched its Linux, but has told us it has “No comment/statement on this as of now” in response to our query about its x86 systems, x86 cloud, Linux and Solaris on x86. The no comment regarding Linux is odd as fixes for Oracle Linux landed here on January 9th.

SPARC-using Fujitsu, meanwhile, has published advice (PDF) revealing how it will address the twin bugs in its servers and PCs, and also saying its SPARC systems are “under investigation”.

We’ve asked Oracle and Fujitsu for more information and will update this story if they send more information. ®

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/01/12/intel_warns_meltdown_spectre_fixes_make_broadwells_haswells_unstable/

Privacy: The Dark Side of the Internet of Things

Before letting an IoT device into your business or home, consider what data is being collected and where it is going.

There’s a lot of buzz about the Internet of Things (IoT), but people aren’t quite sure what to think of it. Back in fall 2016, there was a big attack on an Internet service provider in which a bunch of IoT devices became a botnet and made much of the Internet unavailable. It was a big moment that made people question the security of IoT. And although security risks are getting the headlines right now, and should certainly be considered, the bigger risk with IoT is privacy.

It is going to be so cheap and so easy for manufacturers to put Wi-Fi-connected chips into practically every device we use in our homes and businesses that IoT will become hard to avoid. Combine low costs with the incentives that companies have to collect data on user behavior, and things start to feel creepy. For example, imagine your oven, your refrigerator, or your microwave has data-collecting chips in it, purporting to provide a benefit to you if the device is connected to the Internet (your incentive). The cost is next to nothing for the manufacturer to collect the usage data, from the time of day you use it to how long you use it or what’s being prepared, and combine it with information you may have voluntarily provided when you signed up, such as what city you live in and your household income. People aren’t going to take notice of this until something bad happens — and I predict that it will.

While these connected devices are collecting all this data without you knowing it, or how it’s being used, most people are thinking about features and colors. People aren’t thinking about the privacy component, and that’s a problem.

The Risk to Business
The potential risk is even greater for businesses that bring IoT devices into their companies. Consumers might get creeped out to think about their personal devices monitoring them and listening to their conversations, but businesses aren’t really thinking about the risks from this perspective. Before deploying connected devices within your organization, pause and think about what kind of data is being collected and where it is going. For businesses that value their privacy, this can be a real liability. 

The owners of the corner coffee shop are purchasing home-security-grade devices to better monitor and protect their business. Almost instantly, the system is connected to their Wi-Fi network. But the business owners aren’t thinking about the potential ramifications should they lose control over that device, if it isn’t secure. If the device is hacked, cybercriminals can monitor customer traffic and flow, and even zoom in on credit card numbers if the camera is near the cash register.

The risk doesn’t end with small businesses. From the midsize perspective, these businesses are utilizing things such as smart TVs. Often smart TVs are connected to a Wi-Fi network to display analytics and statistics, but you’d be surprised at how often those TVs are connecting back to their manufacturers to gather advertising information and your usage statistics. Some of the new TVs have webcams on them with incorporated microphones. And then there are cameras in the lobby. All this private business data about when and where people are coming and going and what they are doing is being recorded in the cloud, protected only by a password.

Think First
I am not saying that you shouldn’t let IoT devices into your home or business. I’m point is that people need to think about a few things first before they invite these devices into their lives, and make a conscious, risk-aware decision.

Weigh the benefits against the risks when it comes to purchasing Internet-connected devices. Is the risk worth it if the data got into the wrong hands? If the data is stored in the cloud, make sure you are using long and strong passphrases and enable two-factor authentication everywhere you can. Keep the devices secure, keep their software updated, and protect the data they produce (if you can).

Lastly, be aware of what information you are giving away, by reading the privacy policies of the manufacturers of the IoT device. If they are collecting your data, they legally have to disclose it.

The prospects of IoT are undeniably vast. No one knows where the industry is going to go or what is going to happen. My advice? Venture into this exciting new world with eyes wide open.

Related Content:

Ryan Barrett, VP of Security and Privacy at Intermedia, has more than a decade of experience in data security and IT leadership. Prior to Intermedia, Barrett has been integral in security with enterprises such as Qualys and WebEx, where he helped build out the original … View Full Bio

Article source: https://www.darkreading.com/endpoint/privacy-the-dark-side-of-the-internet-of-things/a/d-id/1330772?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Responding to the Rise of Fileless Attacks

Fileless attacks, easier to conduct and more effective than traditional malware-based threats, pose a growing challenge to enterprise targets.

Cybercriminals take the path of least resistance — which is why more of them are adopting fileless attacks to target their victims. The threat is poised to grow as attackers recognize the ease of this method and more employees rely on mobile and cloud to do their jobs.

Fileless, or non-malware, attacks let threat actors skip the steps involved with traditional malware-based attacks. They don’t need to create payloads; they can simply use trusted programs to exploit in-memory access. In 2017, fileless malware attacks leveraging PowerShell or Windows Management Instrumentation tools made up 52% of all attacks for the year.

Yet businesses still aren’t paying attention.

“Our focus in this industry is still on traditional attack vectors we’ve been dealing with for most of our careers,” says Heath Renfrow, CISO at Leo Cyber Security.

It’s time for businesses to take a closer look at how these threats work, how they can be detected, why they’re predicted to grow, and the steps they can take to protect themselves.

The Evolution of Modern Fileless Attacks

Fileless attacks are not new, but they have changed over time, says BluVector CEO Kris Lovejoy.

“What’s different about today is not the fact of fileless — both Code Red and Slammer used this — it’s the fact that the bulk of the attack chain, the steps of the attack, are all fileless,” she says. “If they do involve a payload it often looks legitimate and therefore, it’s very hard to detect.”

The growth of fileless malware attacks can be attributed to ease of use and improved tools for endpoint detection and response (EDR), says Adlumin CEO Robert Johnston, who led the investigation into the DNC hack during his previous role as a CrowdStrike consultant.

“Within a network, what’s breaking the backs of organizations is the theft of usernames and passwords,” he explains. “It’s not the malware that’s doing the trick.”

Threat actors use domain accounts and IP administrator passwords to traverse around target networks and steal information. Their activity takes multiple forms; for example, it’s oftentimes more valuable to access someone’s Office 365 or Amazon Web Services login, Johnston says.

All attackers have to break in somehow, meaning credential theft is the first step to an attack. Local admin credentials are always the first to go because nobody pays much attention to them and they’re not tied to a specific person, Johnston explains. This is generally the norm because it makes administration easier. Service account credentials are also vulnerable. Once they have system access, attackers use privilege escalation techniques to increase their capabilities.

Why You’re Vulnerable

Organizations fail to understand the complexity of their IT environments, a shortcoming that makes them vulnerable when they can’t monitor their full ecosystem. Many are “drowning in data” and are unable to bring account and user activity into a single place for analysis.

“If they can’t track it, they can’t understand which accounts have access to what,” Johnston explains. “They have no way to visualize, and no way to track and scale, all of these different identities that don’t always line up to a human.”

The challenge escalates when employees don’t adopt basic security practices. Lovejoy points out that phishing attacks are a popular means of delivering attacks and obtaining credentials.

Hackers are targeting workers personally and going after login credentials for Amazon, Gmail, PayPal, and other common services, says Arun Buduri, cofounder and chief product officer at Pixm. They know people use the same usernames and passwords across services.

“What hackers are doing is trying to get into personal accounts, and using that to get into corporate,” Buduri explains. Many threat actors target low-level employees with the idea that once they’re in, they can monitor email activity to learn the addresses of high-ranking workers.

Poised to Grow

Renfrow says fileless attacks will grow as workers are increasingly mobile and reliant on cloud. Teleworking “significantly increases the risk to the infrastructure,” he notes. As the CISO at United States Army Medicine, a position he held until November 2017, Renfrow says anyone who brought a device in from the field had to undergo a new image and scanning before logging back into the local network.

Mobile devices have become especially prominent in healthcare, he notes, and cloud has grown across industries. “Think about a cloud environment,” he says. “How much insight does a CISO have into who’s logging in and where?” Most people assume the cloud is safe, but Renfrow points out that the cloud contains a lot of credentials that have fallen out of use and should have been decommissioned — legitimate creds within attackers’ reach. 

While financially motivated attackers will always be out there, Lovejoy anticipates more threats will aim to cause damage. “The sad reality is we’re seeing an increase in the number of destructive attacks that are being leveraged,” she points out.

What Can You Do About It?

Protecting against phishing starts with employee education. “Trick them, test them, teach them,” says Lovejoy. “The goal is to immunize enough people so the disease can’t take hold.” Employees should also have a means to report activity they feel is suspicious.

“Always enact the policy ‘If you see something, say something,'” she adds.

On top of this, businesses should take a close look at activity in their ecosystems.

“One thing we did in Army Med was bring in a toolset to map out all of the credentials across our infrastructure,” says Renfrow. “It was eye-opening … we had more credentials running through our infrastructure than we had people.”

After evaluating this, the team dug into the who, what, where, and how of what these credentials were doing. Anything outside the normal login location would trigger an alert. Given the massive size of Army Medicine’s infrastructure, he says automation was necessary for this.

He advises organizations to go back to the “old-school” method of looking at their traditional identity and access management. From there, if they’re mature enough, they can consider toolsets designed to automate access management to learn the who, how, where, and what of network logins.

“I think it would be eye-opening for any organization,” Renfrow says.

Related Content:

Kelly Sheridan is Associate Editor at Dark Reading. She started her career in business tech journalism at Insurance Technology and most recently reported for InformationWeek, where she covered Microsoft and business IT. Sheridan earned her BA at Villanova University. View Full Bio

Article source: https://www.darkreading.com/endpoint/responding-to-the-rise-of-fileless-attacks/d/d-id/1330810?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Microsoft Launches ‘Private Conversations’ in Skype

New feature uses Signal Protocol for strong encryption.

Microsoft’s Skype is rolling out a new feature called Private Conversations, which uses end-to-end encryption via a partnership with Signal.

The software giant’s VoIP service will be powered by Signal Protocol’s strong encryption technologies, which are designed to secure communication, Signal announced Thursday. Google, Facebook, and WhatsApp are other technology titans that use the open source Signal Protocol in their messaging platform.

The move by Microsoft to incorporate strong encryption into Skype comes at a time when FBI Director Christopher Wray is calling for “thoughtfully designed” information security programs, such as strong encryption.

The FBI chief this week noted such programs should not undermine law enforcement investigations and its ability to access devices and electronic communications.

Read more about Microsoft’s Signal partnership here.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/endpoint/microsoft-launches-private-conversations-in-skype/d/d-id/1330811?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Survey Suggests Many Are Still Waiting for Spectre, Meltdown Windows Updates

Microsoft’s insistence on a specific registry key setting for offering the updates on systems appears to be the issue, security vendor Barkly says.

The results of a small survey suggest that many organizations could still be waiting to receive updates for patching their Windows systems against the critical Spectre and Meltdown microprocessor vulnerabilities disclosed last week.

The vulnerabilities affect a wide set of products and give attackers a way to read sensitive data in system memory, including encryption keys and passwords.

Security vendor Barkly this week surveyed 75 IT pros responsible for managing security updates at their organizations and found more than half said they had received updates for barely 25% of their vulnerable Windows systems. A surprising 26% said that none of their Windows systems had received an update even one week after Microsoft rushed them out in an out-of-cycle patch release.

The reason for the delay appears to be Microsoft’s insistence that all vendors of antivirus products set a specific registry key on customer devices after they have verified their products to be compatible in order to avoid potential patch compatibility issues, Barkly said.

According to Microsoft, when AV products make unsupported calls to Windows kernel memory, the updates could cause computers to crash as a result, so it will not offer updates on computers without the required registry key. Systems that have not received the security updates are likely running incompatible AV products, and users should consult with their vendors directly on addressing the problem in such instances, Microsoft has said.

The compatibility issues add to concerns that fixes for Spectre and Meltdown could severely degrade system performance — in some cases by up to 30%.

“During tests, Microsoft discovered that their new [update] was creating instability with other low-level system management and protection products, notably some antivirus technologies,” says Barkly co-founder and CTO Jack Danahy.

To address this, Microsoft has made delivery of the Windows security updates contingent on the presence of a special registry key. “It has recommended that AV vendors add this key to customer devices only after they’ve confirmed their products are compatible,” Danahy says.

The problem is that AV vendors have taken different approaches to addressing Microsoft’s requirement. Some have taken it upon themselves to set the required key — even if their AV software itself is compatible. Others have recommended that users add the registry key themselves manually. Twenty-five percent of the respondents in the Barkly survey, for instance, said their AV vendor had made the change, while 20% said their vendor recommended they do it themselves manually.

Compounding the situation is the fact that many organizations do not appear to be aware of Microsoft’s stipulation. Forty-six of the respondents in the survey did not know about the need for a specific registry key, making it unlikely they would contact their AV vendor about it. And many AV vendors themselves do not appear to have been very proactive in informing customers of what’s going on. Only 42% of respondents in the Barkly survey said their AV vendor had notified them regarding their product’s compatibility with the patch.

“There is an added risk here that organizations running multiple AV products, or running varying versions of AV products, may find themselves adding the key universally and causing these stability problems to surface on mismatched versions,” Danahy says.

Issues with patch updates are certainly not new. Even with critical vulnerabilities such as Meltdown and Spectre, enterprises often adopt a make-haste-slowly approach to deploying patches for fear of disrupting their systems. If patches are not tested properly, they can often break systems and cause more problems for organizations than if the patches had not been deployed at all.

Even so, concerns about attackers exploiting unpatched vulnerabilities have pushed enterprises to patch more quickly these days. A new survey by Tripwire and Dimensional Research released this week shows that a majority of organizations — 78% — patch all detected vulnerabilities on their network within 30 days of discovery. About four in 10 do it in less than 15 days, while 46% said they’d probably not wait more than seven days in order to start patching vulnerabilities.

“Some organizations are very prompt, automatically acquiring and applying patches as soon as they are available,” while others lag, Danahy says. With the updates for Spectre and Meltdown, organizations appear to be more inclined to patch quickly, he notes.

“I think that we are seeing a much more responsive community to this particular patch,” he says. “But it is an 80/20 proposition, where 80% are being even more prompt that they ordinarily would be, but the other 20% is probably going to lag behind by an even longer testing interval.”

Related content:

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year … View Full Bio

Article source: https://www.darkreading.com/vulnerabilities---threats/survey-suggests-many-are-still-waiting-for-spectre-meltdown-windows-updates/d/d-id/1330812?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Warbiking in Perth – how does Wi-Fi security stack up these days?

At the end of 2017, my colleague John Shier and I had the opportunity to measure Wi-Fi security in Perth, Western Australia – on bicycles, in the summer sunshine!

TL;DR, we observed some of the best security we have seen in any city we’ve surveyed.

But even though Wi-Fi security has improve dramatically over the years, that doesn’t mean we can rest on our laurels.

The results

In Perth, just under 6% of access points (APs) were left unencrypted.

This could look bad if you forget that nearly every access point that is intended as public service – for example, those provided by municipalities, hotels, cafes and public transit – is by nature an unprotected Wi-Fi network.

This is down from between 14% and 28% in other cities we’ve measured in the past, suggesting that we have largely eliminated networks that are open by mistake, and that openness is due to generosity and purposeful sharing.

Approximately one third of one percent of APs surveyed (3 in 1000) utilized WEP.

This is very bad news for those 25 access points: using WEP is about the same as running an unprotected AP, because WEP can be cracked automatically in seconds, but it implies that the person running the AP actually wanted their communications to be private.

Just over two thirds of the APs were offering the latest and greatest protection, WPA2/CCMP, also known as WPA2/AES, because it’s based around the AES encyption algorithm.

Excellent news indeed, but 25% of the APs also supported older cryptographic standards such as WPA/TKIP, also known as WPA/RC4, after the outdated RC4 algorithm it uses for encryption.

Whether you’re an ISP, a business or a home user, don’t forget to disable old protocols that are no longer considered secure, including anything with WEP, TKIP or RC4 in its name.

Even if you also support the newer, more secure protocol versions, you need to protect against downgrade attacks, where someone in range of your network could trick one of your users into asking for a less secure connection – why allow insecure connections at all if you think they are insecure?

The manufacturers

We also looked at the manufacturers of the Wi-Fi chipsets in the APs we scanned. We found a mixed bag.

The good news?

We observed more than 125 different manufacturers, which means a lot of diversity; this makes it unlikely that a single flaw would make every device vulnerable to the same attack.

The bad news?

We observed more than 125 different manufacturers, which means a lot of diversity; this makes it difficult to study, research and disclose flaws to improve the security of Wi-Fi devices in general. (We didn’t try uncover the current state of the device firmware, because that could have put us on the wrong side of the law.)

We observed that most home access points were provided by Western Australia’s major internet providers and that they appear to ship their devices so that they are laergely secure by default.

Devices provided by Telstra, iiNet, Optus, Belong and others all had encryption enabled out of the box.

Unlike previous surveys, we also saw a lot more devices just randomly listening for Wi-Fi connections.

This included cars from Audi and Ford, printers from HP and Canon, Playstation 3 and 4 game consoles, Roku and Chromecast TV devices, Sonos speakers, and GoPro cameras.

One manufacturer, HP, seems to enable an ad-hoc WiFi connection by default, a questionable policy that saw 262 HP devices just randomly listening for connections, nearly 4% of the APs we discovered.

What next?

The most important thing to remember is that Wi-Fi encryption is only one part of online safety.

A wireless password protects you against eavesdroppers within radio range of your home and devices, but it does not protect you on public Wi-Fi, or when your information is traversing the greater internet.

In particular, even with WPA2/CCMP Personal (that’s where you have a network password, known as the PSK or pre-shared key, shared by all users), anyone who is already connected to a Wi-Fi network when you join it can sniff out your session setup data and then decrpyt all your future traffic.

Make sure you stick to websites that use HTTPS (the padlock in your browser) while you’re on Wi-Fi, adding another level of security against having your communications stolen, surveilled, or sneakily modified.

As we recently saw with the KRACK vulnerability, we cannot rely on any given layer in our security to be 100% flawless.

Defence-in-depth still wins the day.

Watch the video

Here’s a video we made of our outing:


Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/6qGuAIao-Ss/

Drunk droning could cost you jail time in New Jersey

There are things that mix well with alcohol.

Tonic water. Seltzer. Limes.

Drones are not one of those things.

That hasn’t stopped drunk Norwegians from bugging moose who are just minding their own business, other drone operators from annoying alligators that would just as soon eat the contraptions, and that guy whose drunken drone flight ended with crashing his friend’s quadcopter onto the White House lawn.

For clearly good reasons, it’s already illegal per Federal Aviation Administration (FAA) rules to operate an unmanned aerial vehicle (UAV) while inebriated by drugs or alcohol.

And as of Monday, New Jersey has moved one step closer to becoming the first US state to institute a statewide drone law that would outlaw getting high or drunk before operating a drone.

The bill, S3370, would make inebriated droning a disorderly person’s offense, putting the blood alcohol concentration at 0.08% or more (that’s twice the level of FAA rules). Violating the rules would be punishable with a jail sentence of up to six months, a fine of up to $1,000, or both.

The law would impose a range of restrictions on operating drones, including barring people from harming or endangering humans, grabbing animals, or putting drones in the line of fire when people are lawfully hunting. It would also impose stiffer penalties for interfering with correctional facilities or emergency personnel, and it would bar people with domestic violence restraining orders from flying drones close enough to violate those orders.

The bill was sponsored by state Sen. Paul Sarlo (D-Bergen), the chairman of the Senate budget committee. He told NJ.com that the popularity of drones is racing ahead of legislation to keep their operation safe:

The use of drones has increased dramatically in recent years for a variety of purposes. There are many benefits for commercial and recreational purposes, but they can also pose threats to safety, security and privacy. The technology has outpaced regulations.

The committee unanimously approved the bill on Monday, but it’s not clear when or if it might actually become law. It’s now awaiting a vote from the full 80-member house. And as Gizmodo reports, Gov. Chris Christie hasn’t commented on the bill, but he’s pocket-vetoed prior legislation to regulate use of drones by law enforcement.

Christie’s term expires on 16 January, so the bill might get pushed into the new legislative session, after which it would be up to Democratic governor-elect Phil Murphy to sign if it passes again.

Last week, Reuters quoted John Sullivan, a drone operator and aerial cinematographer, who said the law makes plenty of sense, given that operating a drone is something like flying a blender: a potentially choppy venture.

If I had like one drink, I’d be hesitant to even fly it.


Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/pgoqPekoUsM/