Daily NCSC-FI news followup 2020-11-29

Hacker Lexicon: What Is the Signal Encryption Protocol?

www.wired.com/story/signal-encryption-protocol-hacker-lexicon/ LAST WEEK, WITH little fanfare, Google announced a change that could soon make its 2 billion Android users worldwide far harder to surveil: The tech giant says it’s rolling out a beta version of its Android messaging app that will now use end-to-end encryption by default. That level of encryption, while limited to one-on-one conversations, is designed to prevent anyone else from eavesdroppingnot phone carriers, not intelligence agencies, not a hacker who has taken over the local Wi-Fi router, not even Google itself will have the keys to decrypt and read those billions of messages.. The news isn’t just a win for global privacy. It’s also a win for one particular encryption system: the Signal protocol, which is well on its way to accounting for a majority of the world’s real-time text conversations.

Älypuhelimeen saa ujutettua haittaohjelman tavalla, jota useimmat eivät tule ajatelleeksi

www.is.fi/digitoday/tietoturva/art-2000007646405.html Älypuhelimen kameralla skannattavat qr-koodit, eli neliönmuotoiset hieroglyfit ovat yleinen tapa avata esimerkiksi verkkosivu puhelimen selaimessa. Tämän tietävät myös rikolliset, tietoturvayhtiö Check Point varoittaa. On muistettava, ettei qr-koodi ole muuta kuin nopea ja kätevä tapa käyttää nettipalveluja. Emme voi olla varmoja, että koodi on aito ennen kuin olemme jo skannanneet sen ja silloin hyökkäys on jo voinut käynnistyä, toteaa Check Point Softwaren Suomen maajohtaja Sampo Vehkaoja tiedotteessa.

Quick Tip: Using JARM With a SOCKS Proxy

isc.sans.edu/forums/diary/Quick+Tip+Using+JARM+With+a+SOCKS+Proxy/26834/ Rik talked about JARM yesterday “Threat Hunting with JARM”. JARM is a tool to fingerprint TLS servers. I made some changes to the JARM code to support a SOCKS proxy.

The Top 20 Cybersecurity Startups To Watch In 2021 Based On Crunchbase

www.forbes.com/sites/louiscolumbus/2020/11/29/the-top-20-cybersecurity-startups-to-watch-in-2021-based-on-crunchbase/ Today, 797 cybersecurity, privacy and security startups have received a total of $10.73 billion so far this year, with $4.6 million being the median funding round and $17.5 million the average funding round for a startup. The number of startups receiving funding this year, funding amounts and the methodology to find the top 25 cybersecurity startups are all based on Crunchbase Pro analysis done today. New startups and established vendors are attracting record levels of investment as all organizations look to thwart increasingly complex, costly and unpredictable cyberattacks.

HS: Kansainvälinen sijoitushuijausverkosto vienyt suomalaisilta kymmeniätuhansia euroja

yle.fi/uutiset/3-11671748? Sadat suomalaiset ovat menettäneet merkittäviä summia rahaa bitcoin-sijoitushuijausverkoston uhreina. Näin kertoo Helsingin Sanomat, joka on selvittänyt asiaa kansainvälisen toimittajaryhmän kanssa. HS:n lainaamien viranomaisarvioiden mukaan suomalaisten menetykset nousevat kymmeniintuhansiin euroihin. Maailmanlaajuisesti huijauksen uhreilta on kiskottu vuosittain miljardeja euroja.

Pennsylvania county pays 500K ransom to DoppelPaymer ransomware

www.bleepingcomputer.com/news/security/pennsylvania-county-pays-500k-ransom-to-doppelpaymer-ransomware/ Delaware County, Pennsylvania has paid a $500,000 ransom after their systems were hit by the DoppelPaymer ransomware last weekend. On Monday, Delaware County disclosed that they had taken portions of their computer network offline after discovering that their network was compromised. “The County of Delaware recently discovered a disruption to portions of its computer network. We commenced an immediate investigation that included taking certain systems offline and working with computer forensic specialists to determine the nature and scope of the event. We are working diligently to restore the functionality of our systems,” the Delaware County alert stated.

You might be interested in …

Daily NCSC-FI news followup 2020-09-07

Windows 10 low-effort zero-day in Hyper-V / Windows Sandbox enabled computers www.bleepingcomputer.com/news/security/windows-10-sandbox-activation-enables-zero-day-vulnerability/ A reverse engineer discovered a new zero-day vulnerability in most Windows 10 editions, which allows creating files in restricted areas of the operating system – e.g. under system32. The researcher told BleepingComputer that the vulnerable component is ‘storvsp.sys’ (Storage VSP – Virtualization Service […]

Read More

Daily NCSC-FI news followup 2019-11-15

Clampdown on US border device searches not such a big deal www.zdnet.com/article/clampdown-on-us-border-device-searches-not-such-a-big-deal/#ftag=RSSbaffb68 Alasaad v. Mcaleenan acknowledges the intrusiveness of digital searches, but it’s only about “contraband” and falls short of requiring a warrant. It’s time for SCOTUS and Congress to dig deeper, say experts. New Emotet Report Details Threats From One of the Worlds Most […]

Read More

Daily NCSC-FI news followup 2019-11-24

CNAME Cloaking, the dangerous disguise of third-party trackers medium.com/nextdns/cname-cloaking-the-dangerous-disguise-of-third-party-trackers-195205dc522a What has started to happen in the last few months in the world of third-party tracking is having a major impact on peoples privacy, and it all stayed pretty much under the radar. How to Avoid Black Friday Scams Online www.wired.com/story/how-to-avoid-black-friday-scams-online/ Black Friday attracts crowds, and […]

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.