Skip to main content

Security

Anatomy of an iTunes phish - tips to avoid getting caught out

posted onJuly 29, 2014
by l33tdawg

Do you know how to ride a bicycle? It's easy, isn't it?

But do you remember how hard it turned out to be when you first tried? Who would have thought?

We often forget that many things are "obvious" only with experience, meaning, in fact, that they're not really obvious at all. That's why we do phishing walkthroughs fairly regularly on Naked Security. The idea is to step you through a typical email phish, pointing out the telltale warning signs in the original email and the web pages that follow, so you know what to look for in future.

Firm says vulnerability in Tails contained in I2P component

posted onJuly 24, 2014
by l33tdawg

A vulnerability broker published a video demonstrating one of several flaws it has found in the privacy-focused Tails operating system, which is used by those seeking to make their Web browser harder to trace.

Exodus Intelligence of Austin, Texas, said its short clip shows how the real IP address of a Tails user can be revealed using the flaw. The company said it hoped publicizing its findings would serve as a warning to users about putting "unconditional trust" in a software platform.

StubHub: Hackers Hijacked 1,000 Accounts

posted onJuly 24, 2014
by l33tdawg

The Associated Press reports that hackers were able to access more than 1,000 StubHub accounts. The hackers were then able to use those accounts to buy tickets from the online reseller. The company claims its own security wasn’t actually compromised. Instead, cyber thieves got their hands on user info through other sites before entering using that same account info on StubHub.

Is Hiding Your Wireless SSID Really More Secure?

posted onJuly 24, 2014
by l33tdawg

Seems like every guide to securing your wireless network tells you to keep your SSID from broadcasting to make your network more secure, but is that really worthwhile? Let’s take a look at one of the silliest myths out there.

This myth has been around for a very long time, and we aren’t expecting everybody to receive this news with happy agreement. You’re welcome to state your case in the comments for why hidden wireless networks are a great idea, but we think if you keep reading, you’ll realize that it’s just not a security feature.

Mozilla Firefox 31 Fixes Three Critical Vulnerabilities

posted onJuly 23, 2014
by l33tdawg

On July 22, Mozilla officially released the stable version for Firefox 31 for all supported platforms, integrating 11 security fixes, three of them being marked as critical.

One of the major vulnerabilities corrected would allow exploitation of a WebGL crash with Cesium JavaScript library. Details about this glitch are not available at the moment, but Mozilla notes that it cannot be leveraged through email in the Thunderbird client because scripting is disabled.

Edward Snowden's preferred OS has a major security flaw

posted onJuly 23, 2014
by l33tdawg

Think you're safe from spies because you're using Tails, the same Linux distribution that Edward Snowden uses to remain anonymous?

Unfortunately, you'll still have to be on your guard. Security firm Exodus Intelligence has revealed that the latest version of the OS, 1.1, is vulnerable to attacks that could be used to unmask your identity. The researchers say they won't publish details of the exploit until there's a patch, but the Tails team will have to wait up to a week before it gets a report it can use to whip up an emergency fix.

Black Hat presentation on TOR cancelled

posted onJuly 23, 2014
by l33tdawg

A presentation on a low-budget method to unmask users of a popular online privacy tool, TOR, will no longer go ahead at the Black Hat security conference early next month.

The talk was nixed by the legal counsel with Carnegie Mellon’s Software Engineering Institute after a finding that materials from researcher Alexander Volynkin were not approved for public release, according to a notice on the conference’s website.