Zum Inhalt der Seite gehen

Suche

Beiträge, die mit SECURITY getaggt sind


Donnerstag: Recht auf Reparatur von Xbox-Konsolen und John-Deere-Landmaschinen

Microsoft-Ersatzteile für Xbox + Klage gegen Traktorhersteller + Digitale Souveränität gefordert + IT-Sicherheit für Klinken + DJI ohne Geofencing + #heiseshow

https://www.heise.de/news/Donnerstag-Recht-auf-Reparatur-von-Xbox-Konsolen-und-John-Deere-Landmaschinen-10244540.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&utm_source=mastodon

#Bitkom #DonaldTrump #Drohnen #EU #Gesundheit #hoDaily #Landwirtschaft #Microsoft #Reparatur #Security #Xbox #news


Greenland should decide on its own independence – POLITICO https://www.byteseu.com/655857/ #China #Denmark #DonaldTrump #GREENLAND #Media #MetteFrederiksen #MiddleEast #Military #poll #Security #SocialMedia #trade #Ukraine #UnitedStates
Greenland should decide on its own independence – POLITICO


The rsync utility in Linux, *BSD, and Unix-like systems are vulnerable to multiple security issues, including arbitrary code execution, arbitrary file upload, information disclosure, and privilege escalation. Hence, you must patch the system ASAP https://www.cyberciti.biz/linux-news/cve-2024-12084-rsyn-security-urgent-update-needed-on-unix-bsd-systems/

#infosec #security #linux #unix
A critical vulnerability (CVE-2024-12084 and five others) requires immediate patching on Linux, *BSD, macOS, and Unix-like systems to protect your systems from attacks. Update Rsync now!


#CalyxOS has released its January #security update. It hit all of our Pixel 6a phones yesterday. The changelog was pretty short and just reads:

Changelog
- CalyxOS 6.3.0
- Android 15, January 2025 Security update
- Chromium: 131.0.6778.260
- Update all included apps

You can read more about it here:

Link: https://calyxos.org/news/2025/01/08/15-january-security-update/

#Android


😮
This voice phishing gang calls the actual Apple customer support phone number 800-275-2273 and tricks that system into sending the alert below to your phone.

A great read, feels like a hole in Apple's security, no?

https://krebsonsecurity.com/2025/01/a-day-in-the-life-of-a-prolific-voice-phishing-crew/Applee #Security
Photo by Dave Mark on January 13, 2025. Ist möglicherweise ein Bild von Telefon und Text.


Excellent rollup from @mjtsai on the pros and cons of passkeys.

My short (uninformed) take: Passkeys have great potential, but the implementation is often flawed.

If you care about passwords vs passkeys, this is an interesting read, filled with useful links.

https://mjtsai.com/blog/2025/01/10/passkey-usability/
Apple #Security


Over 3 Million Mail Servers without Encryption exposed to Sniffing Attacks.

As scans from the IT-security threat monitoring platform Shadowserver show, 3.3 million hosts are running POP3/IMAP services without TLS encryption enabled and expose usernames & passwords in plain text when transmitted over the Internet.

https://www.shadowserver.org/what-we-do/network-reporting/vulnerable-pop3-report/

#pop3 #imap #mailservers #exposed #sniffing #tls #it #security #privacy #engineer #media #tech #news
ShadowServer is now notifying mail server operators that their POP3/IMAP servers do not have TLS enabled, exposing users unencrypted usernames and passwords to sniffing attacks.

"This means that passwords used for mail access may be intercepted by a network sniffer. Additionally, service exposure may enable password guessing attacks against the server," Shadowserver said. "If you receive this report from us, please enable TLS support for IMAP as well as consider whether the service needs to be enabled at all or moved behind a VPN."

The original TLS 1.0 specification and its successor, TLS 1.1, have been used for nearly two decades, with TLS 1.0 being introduced in 1999 and TLS 1.1 in 2006. After extensive discussions and the development of 28 protocol drafts, the Internet Engineering Task Force (IETF) approved TLS 1.3, the next major version of the TLS protocol, in March 2018.

In a coordinated announcement in October 2018, Microsoft, Google, Apple and Mozilla said they would retire the insecure TLS 1.0 and TLS 1.1 protocols in the first half of 2020. Microsoft began enabling the latest version, TLS 1.3, by default with Windows 11.
[ImageSource: ShadowServer]

The map shows IMAP and POP3 mail servers without TLS.

Over three million POP3 and IMAP mail servers without TLS encryption are currently exposed on the Internet and vulnerable to network sniffing attacks. Almost 900,000 are based in the U.S., another 560,000 and 380,000 in Germany and Poland, the organization found and adding: “We see around 3.3M such cases with POP3 & a similar amount with IMAP (most overlap). It's time to retire those!” You can check out vulnerability reports for both POP3 email servers and IMAP email hosts on the Shadowserver Foundation site.

IMAP and POP3 are two methods for accessing email on mail servers. IMAP is recommended for checking emails from multiple devices, such as phones and laptops because it keeps your messages on the server and synchronizes them between devices. POP3, on the other hand, downloads emails from the server, making them accessible only from the device where they were downloaded.

The TLS secure communication protocol helps secure users information while exchanging and accessing their emails over the Internet through client/server applications. However, when TLS encryption is not enabled, their messages contents and credentials are sent in clear text, exposing them to eavesdropping network sniffing attacks.

ShadowServer advised all email users to check with their email service provider to be sure that TLS is enabled and the latest version of the protocol is being used.


‘Protect Our People’: Armed Syrian Volunteers Watch Over Damascus https://www.byteseu.com/632202/ #Conflict #Conflicts #Security #SYND #Syria
EU 'Strongly Condemns' Attack At Turkey Defence Firm


In 2025, Israel’s Gaza Campaign Is Not Over https://www.byteseu.com/631251/ #Conflicts #Gaza #Hamas #hostages #IDF #Israel #Security
In 2025, Israel’s Gaza Campaign Is Not Over


https://www.europesays.com/1748051/ The Future of Iran’s Foreign Policy in the Complex Geopolitics of the Post-Assad Middle East #Conflicts #Front #geopolitics #Hezbollah #Iran #Israel #Kurds #security #Syria #USA
The Future of Iran's Foreign Policy in the Complex Geopolitics of the Post-Assad Middle East


Since I more or less follow the news in #privacy and #cybersecurity a lot and already curate specific news items here, I figured I would round them up and post them on the website weekly. I’ll still post some items here, especially the ones that generate more buzz throughout the community.

One of my goals for 2025 is to publish more regularly on the site, but the catch is I don’t always have things I want to blog about week after week. So, enter the Privacy Roundup.

Note: people who subscribe to the RSS feed and/or the newsletter get it hot off the press usually. 😇

#privacymatters #security #blog

https://avoidthehack.com/privacy-week1-2025

Newsletter, hosted by @buttondown, can be found at: https://buttondown.email/avoidthehack

The RSS feed is at: https://avoidthehack.com/home.rss


Windows 11 Installation Media Bug causes Security Update Failures. :microsoft:

Microsoft is warning of an issue when using a media support to install Windows 11 [version 24H2], that causes the operating system to not accept further security updates.

http://learn.microsoft.com/en-us/windows/release-health/status-windows-11-24h2#issues-might-occur-with-media-which-installs-the-october-or-november-update

#microsoft #windows #update #failures #it #security #privacy #engineer #media #tech #news
"When using media to install Windows 11, version 24H2, the device might remain in a state where it cannot accept further Windows security updates," Microsoft is warning. "This occurs only when the media is created to include the October 2024, or November 2024, security updates as part of the installation," the company also explains.

The bug does not impact security updates applied via Windows Update or the Microsoft Update Catalog website and does not occur when the latest December 2024 security update is used.

Microsoft is currently working on a permanent fix and recommends that media-based Windows 11 24H2 installations use the December 2024 security update, released on December 10, to avoid encountering subsequent updating problems.

The installation media issue is added to a long string of problems that impacts 24H2, the latest major feature update for Microsoft's operating system, which was released earlier this year to offer enhanced security, usability and performance.


16 Chrome Extensions attacked in Large-Scale Credential Theft Scheme.

A attack campaign has compromised at least 16 Chrome browser extensions, exposing over 600k users to data & credential theft. This targeted extension publishers through phishing emails that mimicked official communications from the Chrome Web Store.

https://www.cyberhaven.com/blog/cyberhavens-chrome-extension-security-incident-and-what-were-doing-about-it

#google #chrome #it #security #privacy #engineer #media #tech #news
Cyberhaven, a IT-security firm specializing in data loss prevention, was among the impacted firms and the first to publicly disclose its compromise. The attack occurred on December 24 and involved phishing a company employee to gain access to their Chrome Web Store admin credentials. 

According to Cyberhaven, the attackers compromised the “single admin account for the Google Chrome Store” and managed to publish a malicious update to their popular Chrome extension. This update, deployed on Christmas Day, was designed to steal sensitive user data, including passwords, session tokens, Facebook account credentials and cookies.

The malicious extension, version 24.10.4, remained active for over 31 hours before being detected and removed from the Chrome Web Store. “Our security team detected this compromise at 11:54 PM UTC on December 25 and removed the malicious package within 60 minutes,” the company’s disclosure read.

Cyberhaven immediately released a legitimate update (version 24.10.5), hired Mandiant to develop an incident response plan and also notified federal law enforcement agencies for investigation. The company has confirmed that its systems, including CI/CD processes and code signing keys, were not compromised.


38C3: Lawsuits are Temporary [Glory is Forever].

The last year, 37C3 covered how a group of hackers discovered code that allegedly bricked public trains in Poland when they went into service at a competitor’s workshop. This year, the same group is back with tales of success, lawsuits and appearances in the Polish Parliament.

https://media.ccc.de/v/38c3-we-ve-not-been-trained-for-this-life-after-the-newag-drm-disclosure

#polish #trains #bricked #it #security #engineer #media #tech #38c3 #news
You’re not going to believe this, but it’s hilarious.

The short version of the story is that [Mr. Tick], [q3k] and [Redford] became minor stars in Poland, have caused criminal investigations to begin against the train company, and even made the front page of the New York Times. Newag, the train manufacturer in question has opened several lawsuits against them.

The lawsuit alleges the team is infringing on a Newag copyright — by publishing the code that locked the trains, no less! If that’s not enough, Newag goes on to claim that the white hat hackers are defaming the company.
[ImageSource: media.ccc.de]

What I found fantastically refreshing was how the three take all of this in stride, as the ridiculous but incredibly inconvenient consequences of daring to tell the truth. Along the way they’ve used their platform to speak out for open-sourcing publicly funded code, and the right to repair — not just for consumers but also for large rail companies. They are truly fighting the good fight here, and it’s inspirational to see that they’re doing so with humor and dignity.

If you missed their initial, more technical, talk last year, go check it out on media.ccc.de. And if you ever find yourself in their shoes, don’t be afraid to do the right thing. Just get a good lawyer.


The Kurds Are America’s Best Bet In Syria https://www.byteseu.com/608662/ #Conflicts #IslamicState #Israel #kurds #SDF #Security #Syria #Turkey
The Kurds Are America’s Best Bet In Syria


Customer Data from 800,000 Electric Cars and Owners exposed Online.

Terabytes of Volkswagen customer details in Amazon cloud storage remained unprotected for months, allowing anyone with little technical knowledge to track drivers movement or gather personal information.

https://www.ccc.de/de/updates/2024/wir-wissen-wo-dein-auto-steht

#volkswagen #electric #car #amazon #cloud #cariad #exposed #data #it #security #privacy #engineer #ccc #media #technology #38c3 #news
Volkswagen’s automotive software company [Cariad], exposed data collected from around 800,000 electric cars. The info could be linked to drivers names and reveal precise vehicle locations [for some of them being as precise as a few centimeters]. The exposed databases include details for VW, Seat, Audi and Skoda vehicles.

Cariad was informed on November 26 of the issue by the Chaos Computer Club (CCC), the largest organization of ethical hackers in Europe that for more than 30 years has promoted security, privacy, and free access to information.

<https://www.ccc.de/en/>

Access to the car data was possible due to Cariad’s incorrect configuration in two IT applications, a company representative said.

The CCC hackers could access the data only after bypassing several security mechanisms that required significant time and technical expertise. Additionally, because individual vehicle data was pseudonymized for privacy purposes, the CCC hackers had to combine different data sets to associate the details with a particular user.
A Cariad representative said that the exposed data affected only vehicles connected to the internet and had been registered for online services. From the nearly 800,000 vehicles exposed, the researchers found geo-location data for 460,000 cars, for some of them with an accuracy of ten centimeters.

<https://www.carscoops.com/2024/12/vw-group-data-breach-exposed-location-info-for-800000-evs/>

Most of the affected vehicles, 300,000 of them, were in Germany but the researchers also found details about cars in Norway (80,000), Sweden (68,000), the United Kingdom (63,000), the Netherlands (61,000), France (53,000), Belgium (68,000) and Denmark (35,000).

Cariad said that its security team reacted quickly to fix the problem and closed access the same day the CCC sent them the report. CCC representatives confirmed that Cariad’s “technical team responded quickly, thoroughly and responsibly” and that the company reacted within hours of receiving the technical details.

Based on the results of its investigation, Cariad has no evidence suggesting that other parties, except the CCC hackers, had access to the exposed vehicle data or that the information had been misused by a third party.


“A food apocalypse is coming: There is no plan to feed Britain in a crisis”

by James Redbanks in UnHerd

“A lot of people assume that somewhere in Britain there are sheds full of food that we’d distribute in a disaster. Surely there is a grain or butter mountain somewhere? Surely the UK govt has a plan for such a crisis?

Nope. No sheds. No stores. No mountains of food. No plan.”

https://unherd.com/2024/12/a-food-apocalypse-is-coming/

#Press #UK #Food #Security #Crisis #Resilience #War #Pandemic #ClimateCrisis #Farming


It's the holiday slump, and you have some time on your hands. If you're a journalist, lawyer, filmmaker, educator, business owner, or anyone who needs to accept anonymous disclosures, take 5 minutes to set up a Hush Line account.

Our tip line platform is free, open-source, anonymous, and end-to-end encrypted. We work seamlessly with @protonprivacy Mail and any webmail when you use @mailvelope.

https://hushline.app

#journalism #business #product #security #privacy #anonymous
This image showcases a web platform and mobile interface for “Hush Line,” a service connecting whistleblowers with trusted professionals. The design is displayed on two smartphone screens and a desktop browser window, all featuring a purple-themed user interface.

The left smartphone screen shows a “Tips” submission page with an illustration of a cheerful, purple lockbox labeled “TIPS” and the text, “Nothing to see here… No messages yet.” The center screen shows a form to submit a message to “Science & Design, Inc.,” a non-profit organization. The form includes fields for anonymous contact and links for secure communication methods like Signal and Mastodon. The desktop view highlights a “User Directory,” where verified users are listed, including “Hush Line Admin.”

The platform encourages anonymity and secure communication, with a clean and approachable design.


Iran Update, December 23, 2024 https://www.byteseu.com/588529/ #Afghanistan #Conflicts #Institute #InstituteForTheStudyOfWar #Iran #IranProject #Iraq #ISW #Libya #MiddleEast #ORBAT #report #Security #Study #Syria #War
Iran Update, December 23, 2024


Un cybercriminel membre du célèbre gang de hackers Lockbit se cachait en Israël
https://www.numerama.com/cyberguerre/1869958-un-cybercriminel-membre-du-celebre-gang-de-hackers-lockbit-se-cachait-en-israel.html

#Infosec #Security #Cybersecurity #CeptBiro #Cybercriminel #Lockbit #Israel


Researchers find Security Flaws in Skoda Cars that may let Threat Actors remotely track them.

IT-Security researchers have discovered multiple vulnerabilities in the infotainment units used in some Skoda cars that could allow malicious actors to remotely trigger certain controls and track the car’s location in real time.

https://pcautomotive.com/vulnerabilities-in-skoda-and-volkswagen-vehicles

#skoda #mib3 #vulnerabilities #car #it #security #privacy #engineering #media #tech #news
PCAutomotive, a cybersecurity firm specializing in the automotive sector, unveiled 12 new security vulnerabilities impacting the latest model of the Skoda Superb III sedan. This comes a year after the organization disclosed 9 other vulnerabilities affecting the same model. Skoda is a car brand owned by German automobile giant Volkswagen.

The vulnerabilities, discovered in the vehicle’s MIB3 infotainment unit, could allow attackers to achieve unrestricted code execution and run malicious code every time the unit starts. This could let an attacker obtain live vehicle GPS coordinates and speed data, record conversations via the in-car microphone, take screenshots of the infotainment display and play arbitrary sounds in the car.

The researchers noted that the vulnerable MIB3 units are used in multiple Volkswagen and Skoda models, and based on public sales data, estimates there are potentially more than 1.4 million vulnerable vehicles out there.