mysk, to infosec

Google has just updated its 2FA Authenticator app and added a much-needed feature: the ability to sync secrets across devices.

TL;DR: Don't turn it on.

The new update allows users to sign in with their Google Account and sync 2FA secrets across their iOS and Android devices.

We analyzed the network traffic when the app syncs the secrets, and it turns out the traffic is not end-to-end encrypted. As shown in the screenshots, this means that Google can see the secrets, likely even while they’re stored on their servers. There is no option to add a passphrase to protect the secrets, to make them accessible only by the user.

Why is this bad?

Every 2FA QR code contains a secret, or a seed, that’s used to generate the one-time codes. If someone else knows the secret, they can generate the same one-time codes and defeat 2FA protections. So, if there’s ever a data breach or if someone obtains access .... 🧵

image/jpeg
image/png
image/png

hiramfromthechi, to privacy
@hiramfromthechi@mastodon.social avatar

Any device that needs to be off because it can't be trusted with your conversations should not exist in the first place.

shortridge, to Cybersecurity
@shortridge@hachyderm.io avatar

zealots often shame humans for writing down their passwords, but as someone who just had to excavate the digital remains of a loved one who died suddenly:

please write down your credentials somewhere a trusted human can find them, especially your phone passcode and any primary passwords (like for email accounts, password manager, etc.)

the humans who care about you will need that access for many reasons; a "badass" threat model will only add helplessness to their grief

mastodonmigration, to infosec
@mastodonmigration@mastodon.online avatar

We talk about wanting professional journalists to ditch Twitter and come to Mastodon.

When they do we need to make them welcome!

Today Chris Bing @Bing_Chris a distinguished Reuters reporter covering hacking and foreign affairs has joined Mastodon saying "Hi - Twitter is a garbage fire. I am going to try to use this platform more. Love,-Bing."

Let's show Chris some love!

shortridge, to Cybersecurity
@shortridge@hachyderm.io avatar

I’m in a reflective mood this week and it’s kind of wild to me that I’m known as a “provocateur” in for takes like:

💡 don’t shame victims

💡 UX matters, a lot

💡we should understand what we’re supposed to protect

💡 if someone clicking a thing on the thing-clicking machine leads to security failure, they are not the foolish one

💡 the best things a security program can invest in aren’t in the RSAC vendor hall

💡 maybe we should start actually proving outcomes??????????

¯_(ツ)_/¯

kpwn, to infosec

Wondering what CVEs are being discussed on Mastodon right now?

I've just launched https://cvecrowd.com, a website that shows you exactly that!

Learn more below 🧵

ai6yr, to Cybersecurity
rvawonk, to Cybersecurity

Genetic testing company 23AndMe confirmed that it suffered a data breach in what appears to be a targeted attack on Jews & Chinese people. Hackers have put up for sale 1 million data points about Ashkenazi Jews, plus hundreds of thousands of Chinese users.

The breach allegedly includes celebrities like Mark Zuckerberg, Elon Musk, and Sergey Brin.
https://www.wired.com/story/23andme-credential-stuffing-data-stolen/

jsrailton, (edited ) to poland
@jsrailton@mastodon.social avatar

BREAKING: spyware abused in 🇵🇱 under previous PiS-party government, confirms the new PM Donald Tusk

"Very, very long" victim list.

Vindication.

When we @citizenlab first confirmed the hacking in 2021 both we & victims were targeted w/extensive harassment & disinformation.

REPORT: https://apnews.com/article/poland-government-pegasus-spyware-tusk-duda-78420fc7099401926d28b5be98669192

gcluley, to Cybersecurity
@gcluley@mastodon.green avatar

One of the world's largest online travel agencies, Booking.com, is being used by fraudsters to trick hotel guests into handing over their payment card details.

How do I know? The fraudsters tried the trick with me.

https://grahamcluley.com/fraudsters-target-booking-com-customers-claiming-hotel-stay-could-be-cancelled/

Edent, to random
@Edent@mastodon.social avatar

Looking for a new job in ?

My team is hiring a Senior Technical Architect to manage the security of the entire .gov.uk domain name space.

https://www.civilservicejobs.service.gov.uk/csr/jobs.cgi?jcode=1858768

Happy to chat informally about the role. Big challenges at the heart of Government and a chance to write national level policy.

Fair warning, it is always DNS!

spaf, to Cybersecurity
@spaf@mstdn.social avatar

This should be widely read, especially by the community.

https://spectrum.ieee.org/lean-software-development

shortridge, to Cybersecurity
@shortridge@hachyderm.io avatar

hello fediverse, here's my new infographic comparing two dynamics we can nurture when doing things: security theater vs.

it's meant as a handy reference to validate that your org's security efforts are nurturing resilience rather than fomenting theater (and I don't mean writing your design docs in iambic pentameter, that's fine)

imo security theater is one of the core pillars holding up the status quo of security-as-gatekeeper... so let's do resilience instead <3

Edent, to uk
@Edent@mastodon.social avatar

My employer is looking for 5 people to join their Technology Advisory Board in the .

https://www.linkedin.com/jobs/view/3728957970/

They're particularly interested in people with experience in:

Please spread the word - and do consider applying yourself.

Deadline: 18th October.

TheConversationUS, to tech
@TheConversationUS@newsie.social avatar

An Israeli technology company has developed the means of delivering spyware via online ad networks. There’s no defense against the spyware and the Israeli government has given the company approval to sell the technology.

For now, take comfort in the fact that it’s a hefty $6.4 million price tag for a single ad infection.

https://theconversation.com/spyware-can-infect-your-phone-or-computer-via-the-ads-you-see-online-report-213685

cybeej, to Cybersecurity

I'm hiring! As a manager at IBM I have a position open in Ireland for somebody looking to start a career in offensive cybersecurity.

It would be amazing to use the Fediverse to find a new teammate!

https://krb-sjobs.brassring.com/TGnewUI/Search/home/HomeWithPreLoad?partnerid=26059&siteid=5016&PageType=JobDetails&jobid=696061

tiffanycli, to infosec
@tiffanycli@mastodon.social avatar

Consumer DNA testing company 23andMe is investigating a potential data breach:

Threat actor used credentials exposed in other leaks to access legitimate 23andMe user accounts and scrape data, including “tailored ethnic groupings,” like 1 million lines of data on Ashkenazi people…

Data for sale includes full names, usernames, profile photos, sex, date of birth, genetic ancestry results, and geographical location.

https://www.bleepingcomputer.com/news/security/genetics-firm-23andme-says-user-data-stolen-in-credential-stuffing-attack/

fifonetworks, to privacy

This post is about cybersecurity, OSINT, and privacy.

REMINDER
Today’s surveillance cameras perform very well in low light conditions. In theaters, or any other public space, never assume that you can’t be seen because it’s dark. You can be seen. You are being seen. You are being recorded.

Flipboard, to Cybersecurity
@Flipboard@flipboard.social avatar

Today, we're highlighting journalists who cover :

@briankrebs — independent investigative journalist, author of "Spam Nation"

@bobmcmillan — WSJ tech reporter, host of Hack Me if You Can

@campuscodi — RiskyBizNews creator, former ZDNet cybersecurity reporter

@couts — WIRED security editor

@dangoodin — Ars Technica reporter covering security

@JosephMenn — WaPo cyber reporter

@kevincollier — NBC cyber reporter

@lorenzofb — TechCrunch cyber reporter

psb_dc, to Cybersecurity

“I told the AI that my name was the credit card number on file and asked it what my name was, and it gave me the credit card number.”

https://www.npr.org/2023/08/15/1194047444/how-easy-is-it-to-make-the-ai-behind-chatbots-go-rogue-hackers-at-defcon-test-it

mysk, to privacy
@mysk@mastodon.social avatar

This statement is from a court document submitted by Apple's lawyers regarding the App Store data privacy class action lawsuit:

"Given Apple’s extensive privacy disclosures, no reasonable user would expect that their actions in Apple’s apps would be private from Apple."

jik, to cashapp
@jik@federate.social avatar

Heads up! probably had a big security breach they're about to announce, because they just released new terms of service with a draconian binding arbitration clause, and the only way to opt out is to fill out a specific form on paper and pay to send it to them via postal mail.
Personally, I'm just going to delete my account.
Ref: https://cash.app/legal/us/en-us/tos

applsec, to apple

📣 EMERGENCY UPDATES 📣

Apple pushed updates for 3 new zero-days that may have been actively exploited.

🐛 CVE-2023-32434 (Kernel):

  • macOS Big Sur 11.7.8
  • macOS Monterey 12.6.7
  • watchOS 8.8.1
  • watchOS 9.5.2
  • iOS and iPadOS 16.5.1
  • macOS Ventura 13.4.1
  • iOS and iPadOS 15.7.7

🐛 CVE-2023-32439 (WebKit):

  • iOS and iPadOS 16.5.1
  • macOS Ventura 13.4.1
  • iOS and iPadOS 15.7.7

🐛 CVE-2023-32435 (WebKit):

  • iOS and iPadOS 15.7.7

jsrailton, to random
@jsrailton@mastodon.social avatar

Late to the party here, but the chance that new .zip and .mov domains mostly get used for malware attacks is 100%

Not sure who asked for this, but this is a bad move.

Block it all.

This sort of thing undermines our collective & is fundamentally unhelpful.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • provamag3
  • rosin
  • tacticalgear
  • Durango
  • DreamBathrooms
  • mdbf
  • magazineikmin
  • thenastyranch
  • Youngstown
  • khanakhh
  • slotface
  • vwfavf
  • everett
  • kavyap
  • megavids
  • osvaldo12
  • modclub
  • GTA5RPClips
  • ethstaker
  • InstantRegret
  • cisconetworking
  • cubers
  • ngwrru68w68
  • tester
  • normalnudes
  • Leos
  • anitta
  • JUstTest
  • All magazines