Abode is adding HomeKit support to its Smart Security kit, a DIY home security system featuring a gateway, motion sensor, and more.
Security
Security Friday! – TMO Daily Observations 2020-02-07
Andrew Orr joins host Kelly Guimont to discuss the latest security headlines and some tips for avoiding malware and viruses on your Mac.
WhatsApp Security Flaw Found on Desktop Version
A flaw found in the desktop version of WhatsApp lets third-parties access your file system on macOS and Windows.
Huawei Equipment Backdoor Found in HiSilicon Chips
Hardware researcher Vladislav Yarmak found a Huawei equipment backdoor used in video recorders and security cameras.
To be clear, this security vulnerability is said to be present in the software HiSilicon provides with its system-on-chips to customers. These components, backdoor and all, are then used by an untold number of manufacturers in network-connected recorders and cameras.
It’s not a major threat, or anything people need to fret about, it’s just another indicator of Huawei’s piss-poor approach to security.
AKA do not let Huawei build your 5G infrastructure.
Anonymized Data May Be Less Anonymous Than You Thought
Students at Harvard built a tool to analyze datasets from data breaches. They could identify an individual despite promises of anonymized data from companies.
‘Sudo’ Flaw Found and Patched in macOS Terminal
A flaw with the Sudo command used in macOS Terminal let non-privileged users and programs run commands as Root.
Lindsey Graham’s Draft Bill Punishes Companies Using End-to-End Encryption
Senator Lindsey Graham is drafting a bill [PDF] that could penalize companies using end-to-end encryption.
Although the measure doesn’t directly mention encryption, it would require that companies work with law enforcement to identify, remove, report and preserve evidence related to child exploitation — which critics said would be impossible to do for services such as WhatsApp that are encrypted from end-to-end.
If technology companies don’t certify that they are following the best practices set by the 15-member commission, they would lose the legal immunity they currently enjoy under Section 230 relating to child exploitation and abuse laws. That would open the door to lawsuits for “reckless” violations of those laws, a lower standard than contained in current statutes.
Of all the dumb things this administration has done, attacking encryption is a doozy. It’s not clear how much this would impact Apple, since the company does in fact scan for child abuse images. But iMessage and a few other services are end-to-end encrypted.
WebKit Team Proposes a Way to Secure SMS Two-Factor Authentication
Apple’s WebKit team has a proposal to standardize and secure SMS two-factor authentication codes with URLs.
Changing Apple Hiring, More Phone Hack Info – TMO Daily Observations 2020-01-27
Charlotte Henry and John Martellaro join host Kelly Guimont to discuss Apple’s new hiring page and the new info about Jeff Bezos’ iPhone.
SE2 Rumor Redux, Security Friday – TMO Daily Observations 2020-01-24
John Martellaro and Andrew Orr join host Kelly Guimont to discuss the SE2 rumors coming back (again), and this week’s Security Friday.
Google Finds Intelligent Tracking Prevention Flaws in Safari
Google’s Project Zero security team found multiple Intelligent Tracking Prevention flaws in Safari that let users be tracked anyway.
iPhone Cracking Lab, Two Quick Tips – TMO Daily Observations 2020-01-22
Andrew Orr and John Martellaro join host Kelly Guimont to discuss the tech lab built by SDNY, and Andrew’s Apple Card and AirPods tips.
A $10 Million New York Lab Tries to Brute Force iOS Devices
Inside a lab in New York worth US$10 million, specialists are trying to brute force their way into iPhones and iPads.
What’s going on in the isolation room is important, if silent, forensic work. All of the phones are hooked up to two powerful computers that generate random numbers in an attempt to guess the passcode that locked each device. At night, technicians can enlist other computers in the office, harnessing their unused processing power to create a local supercomputer network.
Apple and the FBI – TMO Daily Observations 2020-01-21
Bryan Chaffin and Andrew Orr join host Kelly Guimont to discuss Apple’s decision not to encrypt backups, and what data Apple can share.
Apple Cancels iCloud Encryption Plan Due to FBI
Apple had plans to introduce end-to-end encryption for iCloud backups, but canceled it two years ago after the FBI complained.
Forsaking Safari, Security Friday Debut – TMO Daily Observations 2020-01-17
Charlotte Henry and Andrew Orr join host Kelly Guimont to discuss Charlotte’s move (back) to Google Chrome, and the first Security Friday!
Hackers Dump 70,000 Tinder Photos of Women
Over 70,000 Tinder photos of women have been dumped in an online forum for cybercrime.
Contextual clues, including particular phone models like the iPhone X seen in the photographs, as well as limited metadata, suggest that many of the (mostly) selfies were taken in recent years. Some of the photos, in fact, contain timestamps dated as recent as October 2019.
Tinder also noted that all of the photos are public and can be viewed by others through regular use of the app; although, obviously, the app is not designed to help a single person amass such a massive quantity of images. The app can also only be used to view the profiles of other users within 100 miles.
Emphasis mine.
Scotland Police to Use ‘Cyber Kiosks’ to Extract Smartphone Data
Starting January 20, 2020 Scotland police will use devices called cyber kiosks to analyze the contents of smartphones during investigations.
Police Scotland will only examine a digital device where there is a legal basis and where it is necessary, justified and proportionate to the incident or crime under investigation.
Cyber kiosks used by Police Scotland will not be enabled to store data from digital devices. Once an examination is complete, all device data is securely deleted from the cyber kiosk.
Google’s iPhone Security App Keeps You in its Ecosystem
Google updated its Smart Lock app on iOS to let iPhones be used for two-factor authentication. But it will only work inside Chrome. Now your only choices for Google two-factor authentication are this Smart Lock app, or a phone number (an insecure method). You can also use a physical security key but not an app like Authy.
After installing the update, users are asked to select a Google account to set up their phone’s built-in security key. According to a Google cryptographer, the feature makes use of Apple’s Secure Enclave hardware, which securely stores Touch ID, Face ID, and other cryptographic data on iOS devices.
Update. So I made a mistake and you can use an app like Authy, but you first have to surrender your phone number to Google. Which I’m obviously loathe to do so I use a disposable number.
Cellebrite’s Acquisition Adds Computer Forensics to its Portfolio
Cellebrite, a company specializing in hacking smartphones for law enforcement, has acquired BlackBag Technologies, a company specializing in hacking computers for law enforcement. This will let Cellebrite offer law enforcement an “all-in-one” forensic solution to cover smartphones, laptops, desktops, and cloud data.
It also means offering a broad array of field acquisition capabilities including consent-based evidence collection along with an integrated solution set that provides access, insight and evidence management to facilitate and control large-scale deployments and orchestrate the entire digital intelligence operation.
Cellebrite offers all of these capabilities to law enforcement, but the FBI still wants Apple to create a backdoored version of iOS.
Reality Converter App, Online Scam Avoidance – TMO Daily Observations 2020-01-14
Bryan Chaffin and Andrew Orr join host Kelly Guimont to discuss Battery Case Replacements, the AR Converter app, and avoiding online scams.
How to Avoid Online Scams With This Guide
Emily Long put together a guide on how to avoid online scams, like not clicking links in emails, not sharing passwords, and more.
The basic rule for surviving internet scams is simple: If it sounds too good to be true, it probably is. A little common sense goes a long way to realizing that you aren’t going to suddenly win the Spanish National Lottery when you didn’t even know you had a ticket.
A useful guide.
‘Cable Haunt’ Flaw Leaves Millions of Modems Vulnerable
A flaw in cable modems called “Cable Haunt’ puts hundreds of millions at risk from hackers. It requires a patch from ISPs.
Trade In Values, Cryptocurrency Attacks – TMO Daily Observations 2020-01-10
Charlotte Henry and Bryan Chaffin join host Kelly Guimont to discuss trade-in values dropping in Apple Stores, and a new malware attack.