conansysadmin, to Cybersecurity
@conansysadmin@mstdn.social avatar

The best defense for a castle wall is a one-way door hiding everything that lurks within. Warriors may venture out while bandits may not enter. https://cromwell-intl.com/networking/nat.html?s=mc

conansysadmin, to Cybersecurity
@conansysadmin@mstdn.social avatar

Kings wish to know all that is whispered within their realm. https://cromwell-intl.com/cybersecurity/surveillance.html?s=mc

conansysadmin, to Cybersecurity
@conansysadmin@mstdn.social avatar

Guilds offer #cybersecurity warrior badges. If you desire one, learn how to prove your identity at all caravanserais along the trade routes. https://cromwell-intl.com/cybersecurity/isc2-ccsp/applications.html?s=mc

conansysadmin, to Cybersecurity
@conansysadmin@mstdn.social avatar

The ancient cities of Halep and Palmyra are largely destroyed, but continues in their ruins. https://cromwell-intl.com/cybersecurity/cyberwar/syria.html?s=mc

conansysadmin, to Cybersecurity
@conansysadmin@mstdn.social avatar

The guild only gives badges to a warrior who understands threats and vulnerabilities, but the training can be arduous. https://cromwell-intl.com/cybersecurity/comptia/domain-1-answers.html?s=mc

83r71n, to Cybersecurity
@83r71n@ioc.exchange avatar

Google's passkeys, introduced in 2022, have become a popular and secure alternative to traditional passwords, being used over 1 billion times across 400 million-plus Google accounts. These passkeys, which rely on fingerprints, face scans, or PINs for authentication, are faster and more resistant to phishing than passwords. Google plans to integrate passkeys into its Advanced Protection Program, enhancing security for high-risk users. Additionally, third-party password managers like Dashlane and 1Password can now support passkeys, further expanding their use. The technology is supported by major companies like eBay, Uber, PayPal, and Amazon, indicating a shift towards passkey-based authentication as a more secure and efficient method.

https://blog.google/technology/safety-security/google-passkeys-update-april-2024/

lifeinstereo, to Matrix German
@lifeinstereo@bonn.social avatar

Mal so aus saspekten gefragt: Was ist sicherer: oder ? Oder kann man das so nicht sagen?
Bitte gern

MichaelPorter, to ontario
@MichaelPorter@ottawa.place avatar

and folks - My friend just got an email thanking her for getting vaccinated, with a link to click to access her vaccine certificate. She hasn't been vaccinated lately, so my alarm bells are ringing.

The link to click goes to the domain awstrack.me, which does not look like a legit domain for this kind of thing. On the other hand, the email is addressed to her personally (i.e. there is a salutation that uses her real name), with a minor capitalization typo that was in the definitely-legit emails she recevied previously. Those previous emails also have a link to click that goes to the TLD awstrack.me.

"awstrack” makes me think Amazon Web Services are involved, but that particular TLD is registered in Luxembourg, if I read the whois entry correctly. Why would our provincial health service be routing sensitive information through a European domain?

I suspected that maybe someone got vaccinated recently, and the OHIP number was entered wrong. But my friend checked the portal, and her last vax recorded was in last year, as expected.

kubikpixel, to security German
@kubikpixel@chaos.social avatar

EU plan to force messaging apps to scan for CSAM risks millions of false positives, experts warn.

A controversial push by European Union lawmakers to legally require messaging platforms to scan citizens’ private communications for child sexual abuse material could lead to millions of false positives per day, hundreds of security and privacy experts warned in an open letter Thursday.

🙄 https://techcrunch.com/2024/05/02/eu-csam-scanning-council-proposal-flaws/


conansysadmin, to Cybersecurity
@conansysadmin@mstdn.social avatar

When many bandits try your defenses, their patterns are hard to see. You might find your way with some #cybersecurity wizardry with colors, like a lotus-induced dream. https://cromwell-intl.com/networking/logs-in-color.html?s=mc

ai6yr, (edited ) to random
@ai6yr@m.ai6yr.org avatar

LOL. Bluetooth enabled toothbrush somewhere in the neighborhood! It would be great if this has vulnerabilities.

evawolfangel, to Cybersecurity German
@evawolfangel@chaos.social avatar

Ich habe die letzten Tage sehr viel über die Bundeswehr gelernt - nicht alles wurde freiwillig mit mir geteilt. 😜
(Thread folgt später)

https://www.zeit.de/digital/datenschutz/2024-05/bundeswehr-webex-sicherheitsluecke-it-sicherheit/komplettansicht

evawolfangel,
@evawolfangel@chaos.social avatar

Doch auch allein die Titel, Hosts und Themen von zehntausenden Meetings allein enthalten viele Informationen. Diese automatisch zu crawlen und mit OCR zu sortieren/auszuwerten, hätte ein enormes Potential für Spione. 248.000 Bundeswehrangehörige haben einen Webex-Account, monatlich werden rund 45.000 Meetings abgehalten, sagte mir die Bundeswehr auf meine Anfrage. Da kommt einiges an Stoff zusammen.
#Cybersecurity #taurus #bundeswehr

evawolfangel,
@evawolfangel@chaos.social avatar

Gefunden hat die Schwachstelle die @netzbegruenung - vielen Dank für den Spürsinn und die gute Zusammenarbeit!
https://www.zeit.de/digital/datenschutz/2024-05/bundeswehr-webex-sicherheitsluecke-it-sicherheit/komplettansicht

#Cybersecurity #bundeswehr

helma, (edited ) to Cybersecurity Dutch
@helma@mastodon.social avatar

WICCON is a not-for-profit, English-speaking, two-day, single-track information security conference, taking place on the 31st of October and the 1st of November in The Netherlands. The speaker line-up is all-women. Workshops are explicitly open to other genders as well.

https://hsnl.social/@Dany/112365039309445773

conansysadmin, to Cybersecurity
@conansysadmin@mstdn.social avatar

A cautious warrior may wish to modify his equipment. 'Or,' adds Sonya, 'hers.' https://cromwell-intl.com/cybersecurity/stack-hardening.html?s=mc

conansysadmin, to Cybersecurity
@conansysadmin@mstdn.social avatar

Guilds offer #cybersecurity warrior badges. If you desire one from the realm of the clouds, read this. https://cromwell-intl.com/cybersecurity/isc2-ccsp/?s=mc

conansysadmin, to Cybersecurity
@conansysadmin@mstdn.social avatar
chiefgyk3d, to homelab
@chiefgyk3d@social.chiefgyk3d.com avatar

Well fuck me I changed credit cards a few months ago and forgot to update my Wasabi account for my S3 buckets to backup my NAS. So they suspended the account so I had to make a whole new one, and now just restarted my NAS backup on the Synology box. Well this is probably going to take about a week for the first backup as it’s a couple terabytes.

#homelab #infosec #cybersecurity

video/mp4

mttaggart, to infosec

Your periodic reminder that a Content-Security-Policy that includes cdn.jsdelivr.net is not safe. Any GitHub repo can be loaded via that CDN, so if you find it on a test, prove the point.

Here, have a payload.

symfonystation, (edited ) to Symfony
@symfonystation@newsletter.mobileatom.net avatar
mobileatom, (edited ) to Symfony
@mobileatom@me.dm avatar

Explore today's @SymfonyStation Communiqué of Symfony, Drupal, PHP, Fediverse, and Cybersecurity news. https://symfonystation.mobileatom.net/Symfony-Station-Communique-03-May-2024 🇺🇦

froyed, to security
@froyed@mastodon.social avatar

Many video game anti-cheats act essentially like malware.

This is because they are given Kernal level permissions which allows the software to monitor the system.

Many popular online games use anti-cheat. Be aware.

#security #privacy #crypto #monero #password #breach #tips #cybersecurity #infosec #opsec #data #bitcoin #news #cryptonews #cryptocurrency #2fa #gaming #tech

Edent, to Cybersecurity
@Edent@mastodon.social avatar

🆕 blog! “Bank scammers using genuine push notifications to trick their victims”

You receive a call on your phone. The polite call centre worker on the line asks for you by name, and gives the name of your bank. They say they're calling from your bank's fraud department. "Yeah, right!" You think. Obvious scam, isn't it?…

👀 Read more: https://shkspr.mobi/blog/2024/05/bank-scammers-using-genuine-push-notifications-to-trick-their-victims/

blog, to Cybersecurity
@blog@shkspr.mobi avatar

Bank scammers using genuine push notifications to trick their victims
https://shkspr.mobi/blog/2024/05/bank-scammers-using-genuine-push-notifications-to-trick-their-victims/

You receive a call on your phone. The polite call centre worker on the line asks for you by name, and gives the name of your bank. They say they're calling from your bank's fraud department.

"Yeah, right!" You think. Obvious scam, isn't it? You tell the caller to do unmentionable things to a goat. They sigh.

"I can assure you I'm calling from Chase bank. I understand you're sceptical. I'll send a push notification through the app so you can see this is a genuine call."

Your phone buzzes. You tap the notification and this pops up on screen:

https://shkspr.mobi/blog/wp-content/uploads/2024/05/chase-fs8.png

This is obviously a genuine caller! This is a genuine pop-up, from the genuine app, which is protected by your genuine fingerprint. You tap the "Yes" button.

Why wouldn't you? The caller knows your name and bank and they have sent you an in-app notification. Surely that can only be done by the bank. Right?

Right!

This is a genuine notification. It was sent by the bank.

You proceed to do as the fraud department asks. You give them more details. You move your money into a safe account. You're told you'll hear from them in the morning.

Congratulations. You just got played. Scammers have stolen your life savings.

How the scam works

This is reasonably sophisticated, and it is easy to see why people fall for it.

  1. The scammer calls you up. They keep you on the phone while...
  2. The scammer's accomplice calls your bank. They pretend to be you. So...
  3. The bank sends you an in-app alert.
  4. You confirm the alert.
  5. The scammer on the phone to your bank now has control of your account.

Look closer at what that pop is actually asking you to confirm.

We need to check it is you on the phone to us.

It isn't saying "This is us calling you - it is quite the opposite!

This pop-up is a security disaster. It should say something like:

Did you call us?
If someone has called you claiming to be from us hang up now
[Yes, I am calling Chase] - [No, someone called me]

I dare say most people would fall for this. Oh, not you! You're far too clever and sceptical. You'd hang up and call the number on your card. You'd spend a terrifying 30 minute wait on hold to the fraud department, while hoping fraudsters haven't already drained your account.

But even if you were constantly packet sniffing the Internet connection on your phone, you'd see that this was a genuine pop-up from your genuine app. Would that bypass your defences? I reckon so.

Criminals are getting increasingly good at this. Banks are letting down customers by having vaguely worded security pop-up which they know their customers don't read properly.

And, yes, customers can sometimes be a little gullible. But it is hard to be constantly on the defensive.

Further reading

You can read the original story from the victim on Reddit. See more comments on Mastodon.

https://shkspr.mobi/blog/2024/05/bank-scammers-using-genuine-push-notifications-to-trick-their-victims/

  • All
  • Subscribed
  • Moderated
  • Favorites
  • Leos
  • kavyap
  • PowerRangers
  • Durango
  • magazineikmin
  • hgfsjryuu7
  • rosin
  • everett
  • Youngstown
  • slotface
  • vwfavf
  • thenastyranch
  • mdbf
  • DreamBathrooms
  • anitta
  • cisconetworking
  • tester
  • GTA5RPClips
  • InstantRegret
  • khanakhh
  • osvaldo12
  • tacticalgear
  • ngwrru68w68
  • normalnudes
  • modclub
  • ethstaker
  • cubers
  • provamag3
  • All magazines