{"id":19024,"date":"2019-08-11T05:59:12","date_gmt":"2019-08-11T19:59:12","guid":{"rendered":"https:\/\/www.podfeet.com\/blog\/?p=19024"},"modified":"2019-08-11T14:09:00","modified_gmt":"2019-08-11T21:09:00","slug":"sb-2019-08-10","status":"publish","type":"post","link":"https:\/\/www.podfeet.com\/blog\/2019\/08\/sb-2019-08-10\/","title":{"rendered":"Security Bits \u2013 10 August 2019"},"content":{"rendered":"<h3>Security Medium 1 \u2014 Human Review of Voice Assistant Recordings<\/h3>\n<p>The Guardian newspaper started what turned out to be a far-ranging controversy be reporting that when Apple said they kept anonymised Siri recordings for analysis, that analysis included <em>grading<\/em> by human beings. Specifically, by outside contractors.<br \/>\n<!--more--><br \/>\nOne of the types of problematic interaction the reviewers were helping Apple deal with was accidental triggers. In other words, they were reviewing snippets of content from those times when Siri would just randomly wake up when you didn&#8217;t intentionally trigger the feature by saying the wake-word.<\/p>\n<p>Contractors described hearing deeply personal information while reviewing snippets including medical discussions, legal advice, and even possible criminal conspiracies in the making.<\/p>\n<p>Technically speaking Apple did not violate their privacy policy or public statements, but we all seem to have assumed that the <em>analysis<\/em> we knew was happening was being done by computers, not humans, and we definitely didn&#8217;t assume it was being done by humans who don&#8217;t work directly for Apple.<\/p>\n<p>The story soon grew legs, and it became clear this is not just an Apple thing, but that all the major voice assistants use humans (we&#8217;d known Amazon did this before, and that there were horrible abuses going on with those recordings). It also seems this is bigger than just voice assistants, Skype&#8217;s real-time translation service also apparently relies on human review of clips, as may Cortana.<\/p>\n<p>The end-result is that all the major voice assistants (Apple, Google &amp; Amazon) have suspended their human review programs. Apple have said that they will add a setting to allow users to use Siri but opt out of human review. (I&#8217;ve found no further details on the situation with Skype\/Cortana so I presume human review continues at Microsoft.)<\/p>\n<p>In the end, we&#8217;ve ended up with a better future for Siri, and I&#8217;m sure Google and Amazon will follow suit before they un-suspend their review services too.<\/p>\n<h4>Links<\/h4>\n<ul>\n<li>The original report: <a href=\"https:\/\/www.theguardian.com\/technology\/2019\/jul\/26\/apple-contractors-regularly-hear-confidential-details-on-siri-recordings\">Apple contractors &#8216;regularly hear confidential details&#8217; on Siri recordings \u2014 www.theguardian.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.imore.com\/accidental-siri-recordings-may-reveal-your-private-information\">Accidental Siri recordings may reveal your private information \u2014 www.imore.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/arstechnica.com\/?p=1542479\">Siri records fights, doctor\u2019s appointments, and sex (and contractors hear it) \u2014 arstechnica.com<\/a><\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/07\/30\/listening-in-humans-hear-the-private-info-siri-accidentally-records\/\">Listening in: Humans hear the private info Siri accidentally records \u2013 Naked Security \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.macobserver.com\/news\/germany-google-stop-voice\/\">Germany Orders Google to Stop Human Review of Voice Recordings \u2014 www.macobserver.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.imore.com\/apple-suspends-siri-voice-grading-future-update-will-allow-users-choose\">Apple suspends Siri voice grading, future update will allow users to choose \u2014 www.imore.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/arstechnica.com\/?p=1545149\">Apple and Google temporarily stop listening to Siri and OK Google queries \u2014 arstechnica.com<\/a><\/li>\n<li><a href=\"https:\/\/www.theverge.com\/2019\/8\/2\/20752418\/amazon-alexa-human-review-recordings-opt-out-eu\">Amazon will let you opt out of human review of Alexa recordings \u2014 www.theverge.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/08\/09\/your-skype-translator-calls-may-be-heard-by-humans\/\">Your Skype Translator calls may be heard by humans \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.imore.com\/how-delete-your-data-siri\">How to delete your data from Siri on your iPhone, iPad, and Mac \u2014 www.imore.com\/\u2026<\/a><\/li>\n<li>&#x1f3a7; <a href=\"https:\/\/overcast.fm\/+K8liCulCI\">Vector with Rene Ritchie: Why People Are Freaking Out Over Siri Privacy \u2014 overcast.fm\/\u2026<\/a><\/li>\n<\/ul>\n<h3>Security Medium 2 \u2014 Beware of Privacy-Invading Browser Plugins<\/h3>\n<p>A major report by the Washington Post in conjunction with security researchers have shone a light on a long-standing avenue of abuse \u2014 browser plugins.<\/p>\n<p>JavaScript within web pages is sandboxed. It can&#8217;t interact with the underlying OS, its interactions with the browser are extremely limited, and it can&#8217;t access information in tabs from other websites that are open at the same time.<\/p>\n<p>Browser plugins are different. They are still sandboxed very heavily, but in a much larger playground! They can have some interaction with the underlying OS, though that&#8217;s very tightly controlled. What&#8217;s much more important to understand is that they have a lot of free rein within the browser. The whole point of a plugin is to add new functionality to the browser, so this is not just sensible, it&#8217;s essential. This is absolutely a feature, and definitely not a bug!<\/p>\n<p>Browser plugins can see all the tabs you have open, and can see into them and interact with the HTML, CSS &amp; JavaScript within them. Browser plugins can also make their own network connections, so they can communicate directly with servers on the internet. Again, if plugins couldn&#8217;t do this they wouldn&#8217;t be able to do their thing! Imagine if the 1Password plugin couldn&#8217;t use a local socket to talk to the master 1Password app to access usernames and passwords, and if it couldn&#8217;t interact with web pages to write the usernames and passwords into the text boxes. What use would it be? What use would any plugin be if it couldn&#8217;t interact with the contents of your tabs?<\/p>\n<p>1Password is using the access plugins have as users expect. It does what it promises to do, and nothing more. There is of course nothing stopping less scrupulous developers adding code to their plugins that does things users are not expecting!<\/p>\n<p>What this means is that installing a plugin is an act of trust. You are trusting that the developer who wrote the plugin has your best interests at heart, and that they&#8217;re being completely honest in the plugin&#8217;s description.<\/p>\n<p>Unsurprisingly, it turns out many are not &#x1f641;<\/p>\n<p>This is yet another <em>follow the money<\/em> story. The existence of free plugins from for-profit companies should raise red flags in all our minds. How are they making money from these plugins?<\/p>\n<p>Well, one of the ways developers can monetise their plugins is to collect and sell browsing data. Plugins can see every URL you go to, how long you stay there, and how actively you interact with each page. They even know what buttons and links you pushed while on the page. This is a positive gold-mine for the ad industry, so of course there is a market for this information &#x1f641;<\/p>\n<p>What the Washington Post found is that this type of privacy abuse is absolutely rampant, affecting millions of users every day, and that this kind of bad behaviour is not limited to obscure developers, but affects many popular free plugins.<\/p>\n<p>The bottom line is very simple \u2014 every time you install a plugin, you are trusting the author, so be conscious of that, and only install plugins you have a good reason to trust. Perhaps they are by a developer you trust, or, perhaps they have been recommended by a person or site you trust.<\/p>\n<p>The days of just installing any plugin on a whim are over, or at least they should be!<\/p>\n<h4>Links<\/h4>\n<ul>\n<li>The original Washington Post report: <a href=\"https:\/\/www.washingtonpost.com\/technology\/2019\/07\/18\/i-found-your-data-its-sale\/\">I found your data. It\u2019s for sale. \u2014 www.washingtonpost.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/07\/26\/browser-plug-ins-peddled-personal-data-from-over-4m-browsers\/\">Browser plug-ins peddled personal data from over 4m browsers \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<\/ul>\n<h3>Security Medium 3 \u2014 &#x1f1fa;&#x1f1f8; &#x1f1e8;&#x1f1e6; The Capital One Breach<\/h3>\n<p>Capital One announced that their systems have been hacked and that attackers accessed customer data and data on people who merely applied for credit cards from Capital One.<\/p>\n<p>According to their official FAQ, 100M Americans and 6M Canadians are affected. The data accessed does not include credit card details, though in about 1% of cases it included Social Security Numbers\/Social Insurance Numbers (about 140K in the US and 1M in Canada). In general the data included <em>&#8220;names, addresses, zip codes\/postal codes, phone numbers, email addresses, dates of birth, and self-reported income&#8221;<\/em>. For customers the data also included <em>&#8220;credit scores, credit limits, balances, payment history [&amp;] contact information&#8221;<\/em> as well as <em>&#8220;fragments of transaction data from a total of 23 days during 2016, 2017 and 2018&#8221;<\/em>, and even <em>&#8220;about 80,000 linked bank account numbers&#8221;<\/em>.<\/p>\n<h4>Links<\/h4>\n<ul>\n<li>The Official US FAQ \u2014 <a href=\"https:\/\/www.capitalone.com\/facts2019\/\">www.capitalone.com\/\u2026<\/a><\/li>\n<li>The Official Canadian FAQ \u2014 <a href=\"https:\/\/www.capitalone.ca\/facts2019\/\">www.capitalone.ca\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/krebsonsecurity.com\/2019\/07\/capital-one-data-theft-impacts-106m-people\/\">Capital One Data Theft Impacts 106M People \u2014 krebsonsecurity.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/07\/30\/capital-one-breach-100-million-users-data-stolen\/\">Capital One breach \u2013 100 million users\u2019 data stolen \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.macobserver.com\/tips\/quick-tip\/capital-one-hack-know-do\/\">Capital One Hack: What We Know and What You Can Do \u2014 www.macobserver.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/techcrunch.com\/2019\/07\/31\/capital-one-breach-vodafone-ford-researchers\/\">Capital One breach also hit other major companies, say researchers \u2014 techcrunch.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/08\/06\/github-encourages-hacking-says-lawsuit-following-capital-one-breach\/\">GitHub \u2018encourages\u2019 hacking, says lawsuit following Capital One breach \u2013 Naked Security \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/krebsonsecurity.com\/2019\/08\/what-we-can-learn-from-the-capital-one-hack\/\">What We Can Learn from the Capital One Hack \u2014 krebsonsecurity.com\/\u2026<\/a><\/li>\n<\/ul>\n<h3>Notable Security Updates<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.macobserver.com\/news\/product-news\/apple-macos-mojave-10-14-6-supplemental-update\/\">Apple Releases macOS Mojave 10.14.6 Supplemental Update for Sleep Issue \u2014 www.macobserver.com\/\u2026<\/a><\/li>\n<li>Google have released the August Android patches, and they include particularly important fixes for a collection of bugs named <em>QualPwn<\/em> which affect Android Devices with Qualcomm SOCs (mostly higher-end phones like Samsung Galaxies and Google Pixels) \u2014 <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/08\/07\/latest-android-patches-fix-critical-qualpwn-wi-fi-flaws\/\">nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li>FileZilla have release a critical security update for their open source SFTP client. Interestingly this patch fixes bugs found through the EU&#8217;s bug bounty program for important open source products \u2014 <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/08\/05\/filezilla-fixes-show-how-far-weve-come-since-heartbleed\/\">nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/08\/06\/nvidia-patches-bugs-in-gpu-drivers-shield\/\">NVIDIA patches high-severity bugs in Windows GPUs and SHIELD \u2013 Naked Security \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<\/ul>\n<h3>Notable News<\/h3>\n<ul>\n<li>It&#8217;s important that you apply the recent security updates for iOS because we now know they patched 6 <em>&#8216;interactionless&#8217;<\/em> remote code execution bugs which could be triggered via iMessage. One of the six bugs is only partially patched, so security researchers are keeping the details of that bug back for now, but they&#8217;re published the details on the other five \u2014 <a href=\"https:\/\/www.zdnet.com\/article\/google-researchers-disclose-vulnerabilities-for-interactionless-ios-attacks\/\">www.zdnet.com\/\u2026<\/a>, <a href=\"https:\/\/www.imore.com\/google-discovered-six-ios-vulnerabilities-and-one-still-not-patched\">www.imore.com\/\u2026<\/a>, <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/07\/31\/google-reveals-data-slurping-imessage-bug\/\">nakedsecurity.sophos.com\/\u2026<\/a> &amp; <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/08\/08\/update-your-iphone-remote-control-holes-revealed\/\">nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li>Security researchers have published details of three bugs in WhatsApp that allow manipulation and unexpected publication of private messages. All three bugs were responsibly disclosed to Facebook a year ago, but only a bug that allowed users to be tricked into sending a public message when they thought they were sending a private message has been fixed. The other two bugs which allow attackers to alter the content of quoted messages and to the reword other users responses, making it look like users said things they did not within group chats, remain un-patched today. In other words, you can&#8217;t trust that anything in a WhatsApp group conversation was actually said by the apparent author \u2014 <a href=\"https:\/\/thenextweb.com\/security\/2019\/08\/08\/whatsapps-chat-manipulation-exploit-remains-unresolved-even-after-a-year\/\">thenextweb.com\/\u2026<\/a><\/li>\n<li>Security researchers have found that many popular robocall blocking apps like TrapCall, Truecaller &amp; Hiya are monetising themselves by selling users&#8217; private information (<strong>Editorial by Bart:<\/strong> yet another example of why it&#8217;s important to <em>follow the money<\/em>, though in some cases it&#8217;s even worse with companies charging a fee <strong>and<\/strong> selling users data!) \u2014 <a href=\"https:\/\/techcrunch.com\/2019\/08\/09\/many-robocall-blocking-apps-send-your-private-data-without-permission\/\">techcrunch.com\/\u2026<\/a><\/li>\n<li>&#x1f9ef;Security researchers have found a way to bypass the <em>liveness detection<\/em> security enhancement in Apple&#8217;s FaceID. In its default configuration, FaceID will not unlock a devices until it both recognises the face, and their <em>gaze detection<\/em> algorithms report that the user is looking at the device. Researchers have found that it&#8217;s possible to use black and white tape and a pair of glasses to bypass the second of these conditions (and <strong>only<\/strong> the second). This means the attack only works if you have a difficult to make 3D model of the person&#8217;s head, or, the unconscious person themselves and their phone under your control at the same time. This is an interesting development in the eternal security can-and-mouse game, but absolutely no need for panic! This simply isn&#8217;t a realistic real-world attack \u2014 <a href=\"https:\/\/www.imore.com\/researchers-devise-way-bypass-apples-face-id-using-modified-glasses\">www.imore.com\/\u2026<\/a> &amp; <a href=\"https:\/\/threatpost.com\/researchers-bypass-apple-faceid-using-biometrics-achilles-heel\/147109\/\">threatpost.com\/\u2026<\/a><\/li>\n<li>&#x1f9ef;Security researchers have found that Apple&#8217;s AirDrop and password sharing features can leak some identifiers including MAC addresses and even cell phone numbers via Bluetooth LE packets. Apple have done their best to obscure the information by hashing it, but with enough time an effort security researchers have proven they can break the hashes and recover the information. Because the data is leaked over Bluetooth LE, and only while using the features, the danger is very short-lived and localised, but it&#8217;s something to be aware of. Perhaps best not to use these features in public spaces! \u2014 <a href=\"https:\/\/arstechnica.com\/?p=1544215\">arstechnica.com\/\u2026<\/a> &amp; <a href=\"https:\/\/www.imore.com\/airdrop-vulnerability-can-shows-your-phone-number-and-passwords-malicious-third-parties\">www.imore.com\/\u2026<\/a><\/li>\n<li>At this year&#8217;s BlackHat security conference Apple launched some welcome new initiatives to help security researchers discover bugs, and encourage them to disclose them responsibly: (<a href=\"https:\/\/www.imore.com\/apple-supply-security-researchers-special-iphones\">www.imore.com\/\u2026<\/a> &amp; <a href=\"https:\/\/9to5mac.com\/2019\/08\/08\/apple-vastly-expands-bug-bounty-program\/\">9to5mac.com\/\u2026<\/a>)\n<ul>\n<li>Apple will supply security researchers with special iPhones with extra debug tools including things like root shell and SSH access.<\/li>\n<li>Apple have expanded their bug bounty program to cover all their OSes, and, increased the maximum payout to $1M for a <em>&#8216;zero-click kernel code execution with persistence&#8217;<\/em>.<\/li>\n<\/ul>\n<\/li>\n<li>&#x1f1ea;&#x1f1fa; The ECJ (Court of Justice of the European Union) has ruled that websites that embed Facebook <em>Like<\/em> buttons are joint data controller with Facebook under the GDPR. This means they are responsible for getting the appropriate user consents etc under the GDPR \u2014 <a href=\"https:\/\/www.reuters.com\/article\/us-eu-facebook-dataprotection\/companies-using-facebook-like-button-liable-for-data-eu-court-idUSKCN1UO1B4\">www.reuters.com\/\u2026<\/a><\/li>\n<\/ul>\n<h3>Suggested Reading<\/h3>\n<ul>\n<li>PSAs, Tips &amp; Advice\n<ul>\n<li>&#x2b50;&#xfe0f; Even if you have 2FA\/MFA enabled, never use a weak password on a banking site. It turns out many banks have by-passes for 2FA\/MFA to facilitate financial apps and services like Mint, Plaid, Yodlee &amp; YNAB \u2014 <a href=\"https:\/\/krebsonsecurity.com\/2019\/08\/the-risk-of-weak-online-banking-passwords\/\">krebsonsecurity.com\/\u2026<\/a><\/li>\n<li>&#x2b50;&#xfe0f;If you have a NAS exposed to the internet, be sure to set a strong password on it: <a href=\"https:\/\/www.zdnet.com\/article\/ransomware-crooks-hit-synology-nas-devices-with-brute-force-password-attacks\/\">Ransomware crooks hit Synology NAS devices with brute-force password attacks \u2014 www.zdnet.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.imore.com\/icloud-keychain\">Everything you need to know about iCloud Keychain \u2014 www.imore.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/08\/07\/dont-let-the-crooks-borrow-your-home-router-as-a-hacking-server\/\">Don\u2019t let the crooks \u2018borrow\u2019 your home router as a hacking server \u2013 Naked Security \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Notable Breaches &amp; Privacy Violations\n<ul>\n<li>&#x2b50;&#xfe0f; &#x1f1fa;&#x1f1f8; It turns out that due to some nasty fine-print you probably want to opt for credit monitoring rather than cash if you&#8217;re affected by the Equifax breach: <a href=\"https:\/\/tidbits.com\/2019\/08\/05\/equifax-cash-settlement-backtracking-leaves-a-bad-taste\/\">Equifax Cash Settlement Backtracking Leaves a Bad Taste \u2014 tidbits.com\/\u2026<\/a>\n<ul>\n<li><strong>Related:<\/strong> <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/08\/07\/dont-fall-for-fake-equifax-settlement-sites-warns-ftc\/\">Don\u2019t fall for fake Equifax settlement sites, warns FTC \u2013 Naked Security \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li>&#x2b50;&#xfe0f; &#x1f1ec;&#x1f1e7; UK internet-only bank Monzo accidentally logged PINs, they are contacting affected customers and asking everyone to update their app \u2014 <a href=\"https:\/\/www.macobserver.com\/news\/monzo-stored-card-pins\/\">www.macobserver.com\/\u2026<\/a>, <a href=\"https:\/\/www.macobserver.com\/analysis\/monzo-bank-stored-my-pin-number-incorrectly\/\">www.macobserver.com\/\u2026<\/a> &amp; <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/08\/07\/monzo-sticks-a-pin-in-cybersecurity-slip-up\/\">nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li>&#x2b50;&#xfe0f; <a href=\"https:\/\/www.vice.com\/en_us\/article\/mb88za\/amazon-requires-police-to-shill-surveillance-cameras-in-secret-agreement\">Amazon Requires Police to Shill Surveillance Cameras in Secret Agreement \u2014 www.vice.com\/\u2026<\/a> &amp; <a href=\"https:\/\/www.imore.com\/deal-amazon-lets-local-police-request-ring-footage-without-warrant\">A deal with Amazon lets local police request Ring footage directly from home owners \u2014 www.imore.com\/\u2026<\/a><\/li>\n<li>&#x2b50;&#xfe0f; Two Twitter bugs resulted in some users data being in appropriately shared: (<a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/08\/08\/twitter-may-have-shared-your-data-with-its-ad-partners-without-your-permission\/\">nakedsecurity.sophos.com\/\u2026<\/a>)\n<ol>\n<li>Clicking on some ads may have resulted in some information about your interaction including your OS, the app you were using, and your country code, being shared with <em>partners<\/em> like Google&#8217;s Double-Click ad network. The bug was introduced in March 2018 and Twitter don&#8217;t know how many users were affected.<\/li>\n<li>Device-specific ads were shown to users who had explicitly opted out of that (like me!). This bug was introduced in September 2018.<\/li>\n<\/ol>\n<\/li>\n<li>&#x1f1fa;&#x1f1f8; <a href=\"https:\/\/calmatters.org\/commentary\/library-privacy\/\">LinkedIn Learning policy violates library patrons&#8217; privacy \u2014 calmatters.org\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/08\/02\/club-penguin-rewritten-breach-caused-by-rogue-admin-backdoor\/\">4 million Club Penguin Rewritten accounts exposed in breach \u2013 Naked Security \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Notable IoT Vulnerabilities\n<ul>\n<li>&#x2b50;&#xfe0f; <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/08\/09\/parents-its-time-to-delete-pet-chat-from-your-childs-leappad\/\">Parents, it\u2019s time to delete Pet Chat from your child\u2019s LeapPad \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li>News\n<ul>\n<li>&#x2b50;&#xfe0f; &#x1f525; <em>&#8220;Urgent\/11&#8221;<\/em> is the catchy name given to 11 critical vulnerabilities in an OS you&#8217;ve probably never heard of, but which is powering a staggering amount of devices in our every day lives (including AirPort routers, hence them getting a security update recently). The OS is VxWorks, which is one of the most widely used Real Time OSes (RTOSes) in use today. Literally millions if not billions of IoT devices will need security updates, but many won&#8217;t get them. This bug will be with us for a very long time, and other than applying patches as and when they become available, there&#8217;s not much we can do to protect ourselves. Since this OS is embedded deep within devices, we can&#8217;t even tell if our devices are vulnerable &#x1f641; \u2014 <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/07\/31\/urgent-11-flaws-affect-200-million-devices-from-routers-to-elevators\/\">nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li>&#x2b50;&#xfe0f; <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/07\/28\/wannacry-hero-gets-off-lightly-avoids-prison-was-justice-done\/\">WannaCry hero avoids prison \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li>&#x2b50;&#xfe0f; &#x1f1fa;&#x1f1f8; <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/07\/29\/russia-targeted-all-50-states-in-2016-election-senate-report-says\/\">Russia targeted all 50 states in 2016 election, Senate report says \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li>&#x2b50;&#xfe0f; Yet more evidence of why you should only install apps you have a reason to trust: <a href=\"https:\/\/thenextweb.com\/apps\/2019\/08\/01\/google-play-android-malware\/\">Google Play hosted 205 harmful apps with over 32M installs last month alone \u2014 thenextweb.com\/\u2026<\/a><\/li>\n<li>&#x2b50;&#xfe0f; Recent takeovers of the Telegram accounts of high-profile Brazilian politicians highlight the importance of setting a password on your voicemail. Services that rely on cellphone numbers for authentication are only as secure as access to the information sent to that number, including access to that number&#8217;s voicemail box \u2014 <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/07\/30\/hackers-target-telegram-accounts-through-voicemail-backdoor\/\">nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.macobserver.com\/link\/cloudflare-ends-8chan-service\/\">Cloudflare Ends 8Chan Service in Wake of Recent U.S. Shootings \u2014 www.macobserver.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.imore.com\/apple-joins-google-and-facebook-data-transfer-project\">Apple joins Google and Facebook in Data Transfer Project \u2014 www.imore.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/07\/29\/online-harassment-affects-one-in-four-gamers\/\">Three quarters of gamers suffer hate and harassment online \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li>&#x1f1fa;&#x1f1f8; <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/08\/05\/hackers-exploit-sms-gateways-to-text-millions-of-us-numbers\/\">Hackers exploit SMS gateways to text millions of US numbers \u2013 Naked Security \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li>Developments in the on-going war on privacy:\n<ul>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/08\/01\/five-eyes-nations-demand-access-to-encrypted-messaging\/\">Five Eyes nations demand access to encrypted messaging \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/tidbits.com\/2019\/07\/30\/here-we-go-again-gchqs-ghost-user-proposal-to-circumvent-encryption\/\">Here We Go Again: GCHQ\u2019s Ghost User Proposal to Circumvent Encryption \u2014 tidbits.com\/\u2026<\/a><\/li>\n<li>&#x2b50;&#xfe0f; A four-part series from the ACLU detailing their objections to the UK GCHQ&#8217;s so-called <em>&#8216;ghost user&#8217;<\/em> proposal (recommended by NosillaCastaway @gaudior on Twitter) \u2014 <a href=\"https:\/\/www.aclu.org\/issues\/privacy-technology\/internet-privacy\/protecting-our-secured-communications\">www.aclu.org\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li>Opinion &amp; Analysis\n<ul>\n<li>&#x2b50;&#xfe0f; <a href=\"https:\/\/appleinsider.com\/articles\/19\/07\/29\/what-apples-t2-chip-does-in-your-new-macbook-air-or-macbook-pro\/\">What Apple&#8217;s T2 chip does in your new MacBook Air or MacBook Pro \u2014 appleinsider.com\/\u2026<\/a><\/li>\n<li>&#x2b50;&#xfe0f; <a href=\"https:\/\/krebsonsecurity.com\/2019\/07\/the-unsexy-threat-to-election-security\/\">The Unsexy Threat to Election Security \u2014 krebsonsecurity.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/eclecticlight.co\/2019\/08\/09\/firewalls-phoning-home-and-whitelists\/\">Firewalls, phoning home and whitelists \u2014 eclecticlight.co\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/07\/31\/cyberattacks-on-connected-cars-could-gridlock-entire-cities\/\">Cyberattacks on connected cars could gridlock entire cities \u2013 Naked Security \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li>&#x1f1fa;&#x1f1f8; <a href=\"https:\/\/www.vice.com\/en_us\/article\/d3naek\/how-to-make-a-phone-farm\">America\u2019s DIY Phone Farmers \u2014 www.vice.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Propellor Beanie Territory\n<ul>\n<li>&#x2b50;&#xfe0f; <a href=\"https:\/\/www.us-cert.gov\/ncas\/current-activity\/2019\/08\/01\/nist-publishes-multifactor-authentication-practice-guide\">NIST Publishes Multi-factor Authentication Practice Guide \u2014 www.us-cert.gov\/\u2026<\/a> (some light bed-time reading for Allison &#x1f609;)<\/li>\n<li><a href=\"https:\/\/www.imore.com\/ios-13-changing-voip-apis-preventing-apps-facebook-messenger-collecting-data-background\">iOS 13 is changing VoIP APIs preventing apps like WhatsApp from collecting background data \u2014 www.imore.com\/\u2026<\/a> &amp; <a href=\"https:\/\/arstechnica.com\/?p=1547123\">iOS 13 privacy feature will force total overhaul for Facebook apps \u2014 arstechnica.com<\/a><\/li>\n<li><a href=\"https:\/\/www.fastcompany.com\/90386781\/ios-13s-new-bluetooth-privacy-feature-is-important-but-confusing\">iOS 13\u2019s new Bluetooth privacy feature is important\u2014but confusing \u2014 www.fastcompany.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/08\/08\/microsoft-puts-another-nail-in-vbscript-coffin\/\">Microsoft puts another nail in VBScript coffin \u2013 Naked Security \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/08\/06\/baldr-malware-unpicked-with-a-little-help-from-crooks-bad-opsec\/\">Baldr malware unpicked with a little help from crooks\u2019 bad opsec \u2013 Naked Security \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>Palate Cleansers<\/h3>\n<ul>\n<li>Celebrating National Sysadmin Appreciation Day:\n<ul>\n<li>(nerdily humours and yet interesting) \u2014 <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/07\/26\/sysadmins-need-to-know-how-do-you-pronounce-sudo\/\">Sysadmins need to know \u2013 how DO you pronounce \u201csudo\u201d? \u2013 Naked Security \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li><img decoding=\"async\" src=\"https:\/\/imgs.xkcd.com\/comics\/devotion_to_duty.png\" alt=\"The weird sense of duty really good sysadmins have can border on the sociopathic, but it's nice to know that it stands between the forces of darkness and your cat blog's servers.\" \/> <a href=\"https:\/\/xkcd.com\/705\/\">xkcd.com\/705<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><em><strong>Note:<\/strong> When the textual description of a link is part of the link it is the title of the page being linked to, when the text describing a link is not part of the link it is a description written by Bart.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security Medium 1 \u2014 Human Review of Voice Assistant Recordings The Guardian newspaper started what turned out to be a far-ranging controversy be reporting that when Apple said they kept anonymised Siri recordings for analysis, that analysis included grading by human beings. Specifically, by outside contractors.<\/p>\n","protected":false},"author":4,"featured_media":19030,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[147,214],"tags":[221,2650,3532,3533,2133,3531,50,569,1115],"class_list":["post-19024","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-posts","category-security-bits","tag-alexa","tag-breach","tag-browser-plugins","tag-capital-one","tag-google-assistant","tag-human-review-voice-assistants","tag-security","tag-security-bits","tag-siri"],"jetpack_featured_media_url":"https:\/\/www.podfeet.com\/blog\/wp-content\/uploads\/2019\/08\/security_bits_logo_400px_no_alpha.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/19024","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/comments?post=19024"}],"version-history":[{"count":3,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/19024\/revisions"}],"predecessor-version":[{"id":19031,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/19024\/revisions\/19031"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/media\/19030"}],"wp:attachment":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/media?parent=19024"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/categories?post=19024"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/tags?post=19024"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}