Elon Musk pulls brands from Facebook

Found on BBC News on Friday, 23 March 2018
Browse Internet

His followers challenged him to have his own companies' pages deleted, which he did within minutes.

Mr Musk said he "didn't realise" that his SpaceX brand had a Facebook page. "Literally never seen it even once," he wrote on Twitter. "Will be gone soon."

"Looks lame," he replied. Both profiles disappeared within minutes of his posts.

That are good Facebook-related news.

Facebook’s Mark Zuckerberg Promises Fixes After User Profile Breach

Found on eWEEK on Thursday, 22 March 2018
Browse Internet

That outrage had many users vowing to shut down or at least abandon their Facebook accounts, while a selloff in Facebook stock hacked as much as $35 billion from the company’s market capitalization by March 20.

“I've been working to understand exactly what happened and how to make sure this doesn't happen again,” Zuckerberg said in a statement released on Facebook.

Apparently the company is willing to wait until the next breach to fix whatever else turns up, rather than working to determine what weaknesses exist, and fixing them before they become a breach.

The only fix is to shut down Facebook itself. Their business model is selling userdata, so they have no incentive to change that. They share data with hundreds, maybe thousands of third parties, and even gave data about 57bn friendships to academic. They cannot change that, or their business will collapse. Simple as that.

'They'll squash you like a bug': how Silicon Valley keeps a lid on leakers

Found on The Guardian on Sunday, 18 March 2018
Browse Internet

“It’s horrifying how much they know,” he told the Guardian, on the condition of anonymity. “You go into Facebook and it has this warm, fuzzy feeling of ‘we’re changing the world’ and ‘we care about things’. But you get on their bad side and all of a sudden you are face to face with [Facebook CEO] Mark Zuckerberg’s secret police.”

It’s a similar story at Google. Staff use an internal version of Google Plus and thousands of mailing lists to discuss everything from homeownership to items for sale, as well as social issues like neoconservatism and diversity.

One European Facebook content moderator signed a contract, seen by the Guardian, which granted the company the right to monitor and record his social media activities, including his personal Facebook account, as well as emails, phone calls and internet use. He also agreed to random personal searches of his belongings including bags, briefcases and car while on company premises.

Just say no and don't work there.

Whois? More like WHOWAS: Domain database on verge of collapse over EU privacy

Found on The Register on Friday, 16 March 2018
Browse Internet

Industry insiders fear that, without agreement, the Whois service, which publicly lists full contact details of domain-name registrants, will effectively shut down in order to avoid fines and possible lawsuits under the Euro rules.

That would leave law enforcement and intellectual property lawyers, among others, unable to access registrant details, and potentially give cybercriminals a larger window to carry out crimes.

Criminals use their real identity to register domains? That is kinda hard to believe. The only thing you get from the whois is spam.

Google Chrome to Flag Untrusted Symantec Certificates as Unsafe

Found on eWEEK on Monday, 12 March 2018
Browse Internet

Starting with the April 17 release of Google's Chrome 66 browser, all SSL/TLS certificates that Symantec issued prior to June 1, 2016, will be flagged by Chrome as unsafe, as well as those issued by Symantec-owned brands such as Verisign, Thawte and Equifax.

Starting with Chrome 70, all websites with SSL/TLS certificates that Symantec issued after June 1, 2016, will be impacted in the same way. Google will release the First Canary of Chrome 70 on July 20.

That will hit a few webmasters who are not paying attention to their certificates.

WordPress is now 30 per cent of the web, daylight second

Found on The Register on Monday, 05 March 2018
Browse Internet

The firm put some context on that data by noting that 50.2 per cent of the world's web sites don't run a content management system (CMS) at all. That means WordPress has over 60 per cent share among web sites that do run a CMS.

WordPress' success can be attributed to its ease of use and extensibility. The tool takes mere minutes to learn and allows plug-ins that make it very customisable.

So 30 percent of the are at risk getting exploited.

23,000 HTTPS certificates axed after CEO emails private keys

Found on ArsTechnica on Friday, 02 March 2018
Browse Internet

The email was sent on Tuesday by the CEO of Trustico, a UK-based reseller of TLS certificates issued by the browser-trusted certificate authorities Comodo and, until recently, Symantec.

A CEO being able to attach the keys for 23,000 certificates to an email raises troubling concerns that those types of best practices weren't followed. (There's no indication the email was encrypted, either, although neither Trustico nor DigiCert provided that detail when responding to questions.)

Why on earth would Trustico have the private keys of the certificates they signed? A private key should never go out, as it is not required to get a certification request signed. That just undermines the entire security part of using such an encryption.

GitHub Survived the Biggest DDoS Attack Ever Recorded

Found on Wired on Thursday, 01 March 2018
Browse Internet

On Wednesday, at about 12:15pm ET, 1.35 terabits per second of traffic hit the developer platform GitHub all at once.

Within 10 minutes it had automatically called for help from its DDoS mitigation service, Akamai Prolexic. Prolexic took over as an intermediary, routing all the traffic coming into and out of GitHub, and sent the data through its scrubbing centers to weed out and block malicious packets. After eight minutes, attackers relented and the assault dropped off.

Now why someone would attack GitHub is a question that remainds to be answered. For just a few minutes of downtime the attacker only underlined the importance of secured systems.

Attackers Using Memcached Servers to Amplify DDoS Attacks

Found on eWEEK on Wednesday, 28 February 2018
Browse Internet

Akamai reported that it has seen multiple sets of memcached reflection attacks, with some that were approximately 190 Gbps of attack traffic. Arbor Networks reported that it is seeing memcached attacks that are even larger.

There are several things that can be done to help mitigate the risk of memcached reflection attacks. The most obvious thing that should be done is for organizations to not expose their memcached services to the public internet.

Why on earth would someone with a sane mind expose such services to the entire Internet? That's like opening up a database like MongoDB... Oh wait, nevermind.

Use of HTTPS among top sites is growing, but weirdly so is deprecated HTTP public key pinning

Found on The Register on Tuesday, 27 February 2018
Browse Internet

"The most surprising thing is probably the string growth in HPKP [HTTP public key pinning], a technology being abandoned by many and soon Google Chrome too," Helme told El Reg.

Experts including Helme and Ivan Ristic have criticised the technology as being both tricky to apply and potentially calamitous, if incorrectly set up.

HPKP has always been a risky and very dangerous idea that should not have made it past a concept status. Most likely, those so-called webmasters are faced with requests for more security and just use some copy&paste code from random howto-pages to implement what they consider an important feature without understanding it's possible consequences.