Kaspersky Concerns: Kaspersky's exit from the U.S. raises concerns about personal data security after a major leak, highlighting the need for improved cyber safety and awareness of technological changes.
Kaspersky's recent exit from the U.S. market raises concerns about cyber security, especially as personal information from over 106 million Americans was leaked online. This unsettling incident highlights the importance of securing sensitive data and staying informed about technological advancements. Additionally, topics like past keys, Linux security vulnerabilities, and updates in endpoint security were discussed, indicating ongoing challenges in the tech landscape. As we navigate a world where data breaches are becoming more common, individuals and companies must prioritize security measures. Staying educated on these topics, along with advancements in training programs like ITPro, can help ensure safer online experiences. Meanwhile, innovations such as remote code execution awareness and potential new features in vehicle technology pose questions about privacy and personal data as well.
Manipulated Explosives: Hezbollah's pagers exploded due to malicious manipulation, leading to significant casualties. Investigations point to intelligence services, possibly Israeli, behind these deadly modifications, raising concerns about vulnerabilities in communication technologies used in sensitive operations.
A significant incident occurred when thousands of pagers, primarily used by Hezbollah, exploded simultaneously after receiving a malicious message, resulting in many casualties. Investigations suggest that intelligence services, possibly Israeli, may have manipulated the pagers along their supply chain, embedding explosives in them. The attacks targeted Hezbollah's communications for security reasons, exploiting their reliance on manipulated devices. Additionally, handheld radios also unexpectedly detonated with similar explosive modifications. This alarming event highlights the vulnerabilities within communication technologies, particularly when used for sensitive operations, and raises concerns about how intelligence agencies might exploit such weaknesses to achieve strategic objectives.
Supply Chain Attack: A sophisticated attack on Hezbollah using modified pagers highlights vulnerabilities in technology and espionage tactics. Years of planning and custom tech were involved, raising concerns about the security of everyday devices and how they can be exploited.
A sophisticated supply chain attack involving modified pagers shows how intelligence operations can be deeply infiltrated, as seen in a recent incident with Hezbollah. This operation required years of planning and specialized technology, including custom firmware. Despite the harsh effectiveness of this tactic in crippling enemy communications, it raises concerns about the safety of everyday devices. The attack illustrates the lengths some organizations will go to for strategic advantages, highlighting the effectiveness of blending technology and espionage. It serves as a reminder of vulnerabilities in our technology and how they can be exposed for malicious purposes. The focus on infiltrating communication methods signifies a shift in tactics to avoid detection, emphasizing a growing dependence on advanced gadgets which might not be as secure as people believe. This serves to remind us all of the potential risks involved with our technology, emphasizing vigilance in our day-to-day lives.
Ad-Driven Vehicles: Ford's new patent suggests cars could serve personalized ads based on passenger conversations, raising privacy concerns about data collection while integrating advertising into the driving experience.
Recent advancements in vehicle technology could allow cars to monitor conversations among passengers and deliver targeted advertisements based on their discussions and trip purposes. While Ford’s patent application outlines a system for personalized ads in vehicles, concerns about privacy and data security remain prevalent. Despite Ford stating that they prioritize customer interests, the implications of tracking driver behaviors and preferences for ad monetization raise important questions about personal privacy and the potential for misuse of collected data. This shift towards advertising in vehicles mirrors trends seen in digital platforms, where ads are becoming increasingly integrated into user experiences, prompting a broader discussion on the future of privacy in an ad-saturated environment.
Security Insights: Thinks Canary offers vital security for detecting network intrusions, while recent breaches underline the need for data protection. Google is also improving security with passkeys, promoting a passwordless and safer online experience.
Using security tools like Thinks Canary is crucial for organizations to promptly detect attackers on their networks. For a reasonable annual fee, they provide a smart honeypot that alerts users when intrusions are detected. Furthermore, recent data breaches emphasize the importance of safeguarding personal data, as sensitive information can be exposed easily, sometimes even without secure encryption. Companies dealing with personal data, like MC2 Data, have faced severe security lapses, further raising alarm over privacy. On a brighter note, Google is making strides towards a passwordless future with its new passkey feature, enabling secure and easy access across devices. This will not only enhance security but also streamline login processes, aiming to protect users from the threats posed by insufficient password security.
Security Insights: Chrome's new passkey feature improves security but locks users into Google services. Meanwhile, a serious vulnerability in Linux systems has been found that may lead to remote code execution, raising the need for better developer responses to security issues.
Chrome has introduced a built-in passkey feature that enhances security by using synchronized passkeys with an option for an additional pin or passphrase, improving user convenience. However, the reliance on Google’s ecosystem means users are somewhat locked in. At the same time, a critical vulnerability affecting Linux systems has emerged, with a researcher revealing an unauthenticated remote code execution flaw that could be severe. This vulnerability, disclosed by Simone Margueritelli, has raised concerns due to its potential impact across various versions of Linux and BSD systems. While the vulnerability's full implications are still unclear, it highlights a significant security concern that has existed for years without resolution. Clear communication and prompt action from developers are crucial in addressing such vulnerabilities, which reflect on the broader issue of software responsibility in the tech community.
Data Security Insights: Big ID provides advanced solutions for data security management, benefiting organizations like the US Army. In Canada, credit freezes vary by province, urging citizens to advocate for better protections from credit bureaus to ensure personal data security.
Big ID offers a powerful solution for managing data security, known as DSPM, which helps organizations integrate seamlessly with their existing systems, uncover hidden data, and address security risks effectively. Their AI capabilities enhance visibility and control over data, benefiting even large entities like the US Army. However, in Canada, there are challenges with credit freezes as regulations can vary significantly by province. It highlights the importance of proactive measures in both data security and personal credit protection, especially in light of potential breaches. Consumers are encouraged to voice their concerns to local lawmakers to push for changes that protect their credit rights, as well as to ensure credit bureaus prioritize security and accuracy in handling personal information. We must demand accountability and proper practices from these institutions to prevent errors and unauthorized access to sensitive information, reinforcing the idea that personal data protection should be prioritized everywhere.
Data Trust: Nile is considering whether to trust his Drobo 5N due to Drobo's closure. Leo shares his positive Synology experience, endorsing reliable backups and secure file synchronization with SyncThing, while still valuing their existing Drobo units for specific uses.
Nile is weighing whether to keep his Drobo 5N or switch to another Synology, especially since Drobo is no longer in business. Leo shares his experience of moving from Drobo to Synology and highlights the reliability of Synology over time. They recommend using SyncThing for secure file synchronization, making backups from older devices easier. Both express contentment with their Synology setups, though still valuing the functionality of their working Drobo units, especially for specific uses. They emphasize the importance of having reliable backups and the need to consider security and data management in their networked storage choices.
Email Management: Maintaining a clean email list is vital for successful communication. Bounced emails can lead ISPs to flag future messages as spam, so ongoing management and user feedback are essential for improving email deliverability and engagement.
Sending bulk emails can be challenging, especially when there are many bouncing addresses. As ISPs like Google and Apple monitor these bounces, they may mark future emails as spam, affecting deliverability. Maintaining a clean, updated email list is crucial for better communication, and feedback from recipients helps improve services. New tools can enhance email management, reducing issues with reputation and unwanted spam filtering. It's essential for senders to adjust their strategies and be patient as they refine their emailing practices to avoid these pitfalls. Addressing bouncing emails improves reputation, ensuring successful future correspondence and keeps the communication channels open. Although spam remains a significant problem, better filtering and organization can lead to improved interactions with audiences and customers.
Public Wi-Fi Security: Using a VPN like ExpressVPN greatly enhances security when connecting to public Wi-Fi, making it safer to access the internet even without a password. However, complete anonymity isn’t guaranteed as traffic can still be monitored after exiting the VPN.
Using public Wi-Fi without a password can pose security risks, but using a reputable VPN like ExpressVPN helps mitigate these risks by encrypting your online traffic. While public networks have made strides in security over the years, the safest option still is to use a VPN when accessing them. Even when a network has a captive portal, it doesn’t necessarily mean it’s more secure. It’s important to remember that while VPNs are helpful, they don’t guarantee complete anonymity on the internet. If your data goes through a known provider's server, there’s the potential for monitoring. Therefore, using a VPN improves your security significantly when using public Wi-Fi, especially if you keep personal information private. In today’s always-on, connected world, staying aware of your security while accessing public networks is crucial for protecting your sensitive data.
Cybersecurity Transition: Kaspersky Lab, a trusted cybersecurity provider, faces a forced transition to UltraAV for U.S. users, raising concerns about user consent and data handling, despite its long history of improving cybersecurity.
Kaspersky Lab has played a crucial role in enhancing cybersecurity since its founding in 1997, earning a strong reputation and trust from its users. However, due to geopolitical issues, Kaspersky's software is being replaced by UltraAV in the U.S., raising concerns over an abrupt transition without proper user consent or information. This situation highlights the importance of clear communication when changing security software, as users deserve to know their options thoroughly. Despite these challenges, Kaspersky has a history of proactive contributions to cybersecurity, successfully identifying sophisticated threats and working with major companies like Microsoft. This ongoing legacy establishes them as a trustworthy provider, but the forced switch to UltraAV leaves many customers uncertain about their security and the handling of their personal data.
Trust Issues: Growing nationalism is leading to distrust in technology, pressuring governments to limit foreign software use, which could stifle global cooperation and opportunities as we shift towards a zero-trust approach.
Nationalism and mistrust are reshaping the technology landscape, pushing countries to reconsider reliance on foreign software and hardware. As seen with Kaspersky's ejection from the U.S. market, fears of cyber risks are driving governments to enforce stricter policies. This shift towards isolation could lead to lost opportunities and technological stagnation. The reliance on interconnected technology heightens concerns about security, prompting calls for a more cautious, zero-trust approach in consumer technology. Trust has always been essential for society to function, but as technology evolves, so do the risks associated with it. The challenges we face require innovative solutions to ensure that technology remains accessible and safe while retaining an open global network that fosters cooperation and growth.
Tech Security Insights: Steve Gibson is a reliable voice in tech security, providing resources to help users protect their networks through GRC.com, while also engaging the audience with diverse formats and interactive content.
Steve Gibson is a trusted figure in technology discussions, offering valuable insights on complex security topics. His platform, GRC.com, provides various resources, including paid and free tools for network security like SpinRite and ShieldsUP. Listeners can access the show in multiple formats, including audio and video, which enhances the experience by allowing them to see visual content that complements the discussions. The show is streamed across different platforms, and membership through Club Twit helps support these informative broadcasts, ensuring quality content is consistently available. Upcoming events such as Facebook's VR/AR keynote are teased, showcasing the show's relevance in current tech trends.
SN 993: Kaspersky exits the U.S. - Exploding Pagers, Passkeys in Chrome
Security Now (Audio)
10 Episodes
Recent Episodes from Security Now (Audio)
SN 995: uBlock Origin & Manifest V3 - DDoS Record, N. Korean Workers, Vitamin D
- Facebook's parent Meta not hashing passwords
- A New, forthcoming PayPal default opts their users into merchant data sharing
- DDoS breaks another record
- Speaking of these ASUS routers
- Do you know who you're hiring?
- Vitamin D
- The CUPS vulnerablility
- Routers for normal people
- uBlock Origin & Manifest V3
Show Notes: https://www.grc.com/sn/SN-995-Notes.pdf
Hosts: Steve Gibson and Leo Laporte
Download or subscribe to this show at https://twit.tv/shows/security-now.
Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit
You can submit a question to Security Now at the GRC Feedback Page.
For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6.
Sponsors:
SN 994: Recall's Re-Rollout - Domain Security, Tor + Tails, VLC Update
- The Linux remote code execution flaw
- The CRUCIAL importance of Domain Control Security
- Roskomnadzor strikes a discordant note
- VLC gets a security update
- Tor and Tails Merge
- Telegram changes its long-standing "zero cooperation" policy
- Enshittification
- Bobiverse book 5
- Windows 10 notifications
- Experian woes
- Nuevomailer
- SpinRite
- Peter F. Hamilton
- Recall's Re-Rollout
Show Notes - https://www.grc.com/sn/SN-994-Notes.pdf
Hosts: Steve Gibson and Leo Laporte
Download or subscribe to this show at https://twit.tv/shows/security-now.
Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit
You can submit a question to Security Now at the GRC Feedback Page.
For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6.
Sponsors:
SN 993: Kaspersky exits the U.S. - Exploding Pagers, Passkeys in Chrome
- The case of the exploding pagers and walkie-talkies
- "Ford seeks patent for tech that listens to driver conversations to serve ads"
- Another large chunk of personal data exposed
- Passkeys takes a big step forward: Now supported by Chrome
- A nascent 9.9 Linux Unauthenticated RCE?
- Freezing Credit
- Credit Bureaus
- Drobo 5N
- SN email labeled as spam
- Public Wi-fi saftey
- SN for Certs
- Windows Defender
- Kaspersky exits the U.S.
Show Notes - https://www.grc.com/sn/SN-993-Notes.pdf
Hosts: Steve Gibson and Leo Laporte
Download or subscribe to this show at https://twit.tv/shows/security-now.
Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit
You can submit a question to Security Now at the GRC Feedback Page.
For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6.
Sponsors:
SN 992: Password Manager Injection Attacks - Aging Media, Naval Starlink, adam:ONE
- Windows Endpoint Security Ecosystem Summit
- Aging storage media does NOT last forever
- How Navy chiefs conspired to get themselves illegal warship Wi-Fi
- adam:ONE named the #1 best Secure Access Service Edge (SASE) solution
- AI Talk
- Password Manager Injection Attacks
Show Notes - https://www.grc.com/sn/SN-992-Notes.pdf
Hosts: Steve Gibson and Mikah Sargent
Download or subscribe to this show at https://twit.tv/shows/security-now.
Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit
You can submit a question to Security Now at the GRC Feedback Page.
For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6.
Sponsors:
SN 991: RAMBO - Cloned YubiKeys, Telegram vs. Signal, French Elevators, Unix Time
- Offer to uninstall Recall was a bug, not a feature
- YubiKeys can be cloned
- Miscellany
- Is WhatsApp secure?
- Telegram vs Signal
- French elevators
- Freezing your credit
- The Quiet Canine
- Unix time
- Bobiverse book 5
- Exodus: The Achemedes Engine
- Watching SpinRite
- RAMBO
Show Notes - https://www.grc.com/sn/SN-991-Notes.pdf
Hosts: Steve Gibson and Mikah Sargent
Download or subscribe to this show at https://twit.tv/shows/security-now.
Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit
You can submit a question to Security Now at the GRC Feedback Page.
For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6.
Sponsors:
SN 990: Is Telegram an Encrypted App? - CrowdStrike Exodus, DDoS-as-a-Service, 'Active Listening' Ad Tech?
- Telegram puts End-to-End Privacy in the Crosshairs
- Free security logging is good for everyone
- CrowdStrike hemorrhaging customers
- Microsoft to meet privately with EDR (Endpoint Detection & Response) vendors
- Yelp's Unhappy with Google
- Telegram as the hotbed for DDoSass â DDoS as a Service
- Chrome grows more difficult to exploit
- Cox Media Group's "Active Listening" has apparently not ended
- Cascading Bloom Filter follow-up
- Closing the Loop
- Is Telegram an encrypted app?
Show Notes - https://www.grc.com/sn/SN-990-Notes.pdf
Hosts: Steve Gibson and Leo Laporte
Download or subscribe to this show at https://twit.tv/shows/security-now.
Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit
You can submit a question to Security Now at the GRC Feedback Page.
For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6.
Sponsors:
SN 989: Cascading Bloom Filters - Key Card Backdoors, Fake Cisco Gear
- CrowdStrike Exec's "Most Epic Fail" Award
- Hardware backdoors discovered in Chinese-made key cards
- Counterfeit CISCO networking gear
- SpinRite
- Errata
- NPD breach updates from listeners
- Looking back at old SN episodes
- Cascading Bloom Filters
Show Notes - https://www.grc.com/sn/SN-989-Notes.pdf
Hosts: Steve Gibson and Leo Laporte
Download or subscribe to this show at https://twit.tv/shows/security-now.
Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit
You can submit a question to Security Now at the GRC Feedback Page.
For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6.
Sponsors:
SN 988: National Public Data - Big Patch Tuesday, The Biggest Data Breach
- Revocation Update
- GRC's next experiment
- Patch Tuesday
- "The Famous Computer Café"
- IsBootSecure
- GRC Email
- Working through WiFi Firewalls
- Transferring DNS
- OCSP attestation vs. TLS expiration
- Platform key expiration
- National Public Data
Show Notes - https://www.grc.com/sn/SN-988-Notes.pdf
Hosts: Steve Gibson and Leo Laporte
Download or subscribe to this show at https://twit.tv/shows/security-now.
Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit
You can submit a question to Security Now at the GRC Feedback Page.
For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6.
Sponsors:
SN 987: Rethinking Revocation - SinkClose, IsBootSecure, Another Bad RCE
- Sitting Ducks DNS attack
- A Bad RCE in another Microsoft server
- SinkClose
- The CLFS.SYS BSoD
- IsBootSecure
- Rethinking Revocation
Show Notes - https://www.grc.com/sn/SN-987-Notes.pdf
Hosts: Steve Gibson and Leo Laporte
Download or subscribe to this show at https://twit.tv/shows/security-now.
Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit
You can submit a question to Security Now at the GRC Feedback Page.
For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6.
Sponsors:
SN 986: How Revoking! - Crowdstrike Damage, Firefox Cookies
- Platform Key Disclosure
- Firefox's 3rd-party Cookie mess
- The W3C Finally Weighs-in
- CrowdStrike Damages.
- GRC's Email
- How Revoking!
Show Notes - https://www.grc.com/sn/SN-986-Notes.pdf
Hosts: Steve Gibson and Leo Laporte
Download or subscribe to this show at https://twit.tv/shows/security-now.
Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit
You can submit a question to Security Now at the GRC Feedback Page.
For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6.
Sponsors: