FBI says it can't unlock 8,000 encrypted devices, demands backdoors for America's 'public safety'

Found on The Register on Tuesday, 09 January 2018
Browse Internet

Speaking at the International Conference on Cyber Security in New York today, Wray complained that in the past year the Feds have seized 7,775 devices that they can't unlock and decrypt. He said the situation was ridiculous, and called on the technology industry to find a solution.

What Wray wants is a secure form of encryption that contains a flaw that only law enforcement can find and exploit. Trouble is, scumbags will no doubt find and leverage it, too.

Good luck with that. That's not how it works, and a "flaw" like that will never exist.

WhatsApp rings in the New Year with global outage

Found on Venturebeat on Monday, 01 January 2018
Browse Internet

The crowdsourced website DownDetector found the largest concentration of outages in portions of England, Germany, and virtually all of the Netherlands, as well as parts of Italy, Spain, and Central Europe.

Outages were also reported in many major cities around the world, from Rio de Janeiro to Kuala Lumpur, Tel Aviv, Dubai, Mumbai, and Toronto.

A really good start for 2018.

Web Trackers Exploit Flaw in Browser Login Managers to Steal Usernames

Found on Bleeping Computer on Thursday, 28 December 2017
Browse Internet

This type of abusive behavior is possible because of a design flaw in the login managers included with all browsers, login managers that allow browsers to remember a user's username and password for specific sites and auto-insert it in login fields when the user visits that site again.

Princeton researchers say they recently found two web tracking services that utilize hidden login forms to collect login information.

Letting the browser store all your passwords has never been a good idea because it opens you to all sorts of attacks, not to mention that, in case you mess up your profile, you're in a world of tears. The first thing to do after a browser install is to disable its password manager so you are not at the risk of being tracked and having your login information stolen.

How Email Open Tracking Quietly Took Over the Web

Found on Wired on Monday, 11 December 2017
Browse Internet

The tech is pretty simple. Tracking clients embed a line of code in the body of an email—usually in a 1x1 pixel image, so tiny it's invisible, but also in elements like hyperlinks and custom fonts. When a recipient opens the email, the tracking client recognizes that pixel has been downloaded, as well as where and on what device.

According to OMC's data, a full 19 percent of all “conversational” email is now tracked. That’s one in five of the emails you get from your friends. And you probably never noticed.

Every email client should block the loading of remote content by default; it has been abused by spammers for well over a decade now. Displaying email as plain text rather than ugly html also serves its purpose.

Keylogger Found on Nearly 5,500 Infected WordPress Sites

Found on Bleeping Computer on Thursday, 07 December 2017
Browse Internet

The malicious script is being loaded from the "cloudflare.solutions" domain, which is not affiliated with Cloudflare in any way, and logs anything that users type inside form fields as soon as the user switches away from an input field.

The script is also dangerous when left to run on the frontend. While on most WordPress sites the only place it could steal user data is from comment fields, some WordPress sites are configured to run as online stores. In these instances, attackers can log credit card data and personal user details.

It does not appear to be much different than those other plugins which send all your interaction to remote servers, so some marketing companies can replay your browser session,

WebAssembly Will Finally Let You Run High-Performance Applications in Your Browser

Found on IEEE on Sunday, 03 December 2017
Browse Internet

Imagine that all your programs and data were stored in the cloud and that even computationally intensive applications like multimedia editing ran just as well in your browser as they would if they had been installed locally.

Looking back to the original dream of allowing the Web to run all manner of programs just as well as if they had been installed locally, my colleagues and I can see there is still a lot of work left to do. But with WebAssembly, we’re happy to be one giant step closer to that goal.

Javascript is already bad enough because naturally, it is abused to shovel all sorts of malware and advertisments onto the user's browser. Many websites load noteably faster with Javascript disabled (and are even better to navigate). Now imagine unsigned, random binaries running inside your browser. At least for now there are solutions like javascript.options.wasm and javascript.enabled.

Facebook’s New Captcha Test: 'Upload A Clear Photo of Your Face'

Found on Wired on Wednesday, 29 November 2017
Browse Internet

According to a screenshot of the identity test shared on Twitter on Tuesday and verified by Facebook, the prompt says: “Please upload a photo of yourself that clearly shows your face. We’ll check it and then permanently delete it from our servers.”

“You Can’t Log In Right Now. We’ll get in touch with you after we’ve reviewed your photo. You’ll now be logged out of Facebook as a security precaution.”

Just about three weeks ago, the same company asked users to upload their private porn; and now they want clear shots of your face. What a "coincidence"...

Imgur just learned 1.7M accounts got exposed in 2014 hack

Found on CNet News on Sunday, 26 November 2017
Browse Internet

Imgur said Friday it first learned of the years-old hack on Thursday from a security researcher.

Imgur said the hack is still under investigation but believes an older password encryption system in use at the time of the hack allowed hackers to breach the system using a brute force attack. The company said it updated its algorithm last year.

These days 1.7M isn't even worth mentioning more it seems.

No boundaries: Exfiltration of personal data by session-replay scripts

Found on Freedom to Tinker on Tuesday, 21 November 2017
Browse Internet

More and more sites use “session replay” scripts. These scripts record your keystrokes, mouse movements, and scrolling behavior, along with the entire contents of the pages you visit, and send them to third-party servers. Unlike typical analytics services that provide aggregate statistics, these scripts are intended for the recording and playback of individual browsing sessions, as if someone is looking over your shoulder.

Collection of page content by third-party replay scripts may cause sensitive information such as medical conditions, credit card details and other personal information displayed on a page to leak to the third-party as part of the recording. This may expose users to identity theft, online scams, and other unwanted behavior.

That sounds like a very very grey area, and in some countries this sort of data collection would be flat out illegal.

YouTube to crack down on inappropriate content masked as kids’ cartoons

Found on Ars Technica on Friday, 10 November 2017
Browse Internet

YouTube will implement a new policy in an attempt to make the whole of YouTube safer: it will age-restrict inappropriate videos masquerading as children's content in the main YouTube app.

Even though the new policy is geared toward making YouTube Kids a safer place, it does have implications for audiences of the main YouTube site as well.

Where are the timed where parents actually took care of their kids instead of insisting that the rest of the world turns into a "suitable for 13 or younger" place?