Facebook’s WhatsApp recently updated its privacy policy, causing many disgruntled users to switch to rival messengers, among them Telegram. Thanks largely to this exodus, Telegram added 25 million new users in just a few days, pushing its user base over the 500 million mark. That makes this the perfect time to show more ...
talk about Telegram’s security and privacy. End-to-end encryption is not the default option in Telegram The first thing to know about Telegram is that Cloud chats, as Telegram calls its standard chats, are not end-to-end encrypted. (Here’s why end-to-end encryption is important for privacy.) In a nutshell, the absence of end-to-end encryption means Telegram has access not only to metadata (who you wrote to, when, how often, and so forth), as WhatsApp does, but also to the contents of standard chats with no end-to-end encryption. According to Telegram’s privacy policy at the time of this writing, the data is not used for advertising purposes. However, as we know from experience, policies can change. How to enable end-to-end encryption for secret chats in Telegram Telegram does have end-to-end encryption — you just need to enable it. Telegram calls chats with end-to-end encryption enabled Secret chats. In secret chats, text messages, pictures, videos, and all other files are sent using end-to-end encryption. That means only you and the recipient have the decryption key, so Telegram cannot access the data. Moreover, the contents of secret chats are not stored on Telegram’s servers. Because secret chats are saved only on the devices of chat participants, they cannot be accessed from another device — and they disappear when you log out of Telegram or delete the app. Secret chats are available in Telegram’s iOS, Android, and macOS apps. The Web version and Windows app do not support secret chats; they cannot ensure secure storage of chats on the device. How to create a secret chat in Telegram Current versions of the Telegram apps do not make the secret chat feature easy to find. To create a secret chat, you need to open the profile of your chat partner, tap or click the three-dot button (sometimes called More, sometimes not), and select Start Secret Chat. How to enable end-to-end encryption in Telegram: Starting a secret chat That opens a chat in which end-to-end encryption is applied to messages (a notification to that effect appears in the chat window at the start). You can also set the time after which messages will be deleted by tapping or clicking the clock icon in the message input box. Set up a timer in Telegram’s secret chats to delete messages automatically Of course, the automatic deletion of messages doesn’t prevent your chat partner from taking screenshots, but if they do, you will be notified about it in the chat. The one exception is if the other person is using the macOS app; in that case you won’t get a notification. Here’s another handy tip: Telegram allows multiple secret chats with the same person. Group chats cannot be secret, however, unlike in WhatsApp, which applies end-to-end encryption to all chats by default. How to know if a chat is end-to-end encrypted: The padlock icon Because Telegram chats can be either cloud or secret, in some cases it is important to know which type you are using. If a chat contains sensitive information, it should be secret, right? Yes, of course. But end-to-end encrypted chats look almost identical to regular ones. To confirm which kind you’re in, look for a padlock icon next to the name or phone number of your chat partner. If it’s there, the chat is secret. If not, then end-to-end encryption is off, in which case you should create a new chat. How to check if a chat in Telegram is end-to-end encrypted: Look for a padlock icon You can also tap or click your chat partner’s icon, and if end-to-end encryption is enabled, the words Encryption Key will appear at the bottom of the window that opens. How to configure Telegram security and privacy While we’re at it, let’s take a moment to configure security and privacy in the app. Click the Settings button in the lower right corner of the screen and select Privacy and Security. Telegram security settings The first step is to make sure no one can read your chats if you accidentally leave your device unlocked and unattended. To do so, select Passcode, tap or click Turn Passcode On, think up a PIN code you won’t forget, set it, and confirm. Next, select Auto-Lock and set a low value — 1 or 5 minutes. If your device supports fingerprint or face recognition, you can enable the option here. How to set up security in Telegram The next step is to set up two-factor authentication to protect your account against hijacking. The primary login method uses a one-time code sent by text, so Telegram lets you set a password as the second factor. To do so, on the Privacy and Security tab, select Two-Step Verification (Telegram’s term for 2FA), and set a strong combination. Remember that you will rarely enter this password, so it is very easy to forget; store it somewhere safe, such as in a password manager. What will happen if you forget that additional password? You’ll have to reset your account. In essence, that means submitting a request to remove your account completely, after which you will have to wait seven days. After a week, the account will be deleted (including associated contacts, cloud chats, and channel subscriptions) and you can create a new, completely empty account using the same phone number. Telegram privacy settings So as not to share unnecessary details with all 500 million–plus Telegram users, configure your profile privacy appropriately. To do so, go through Telegram’s Privacy settings, changing the set values — all options and data are available to everyone by default. We recommend the following: Phone Number → Who can see my phone number — Nobody. Phone Number → Who can find me by my number — My Contacts. Last Seen & Online → Who can see my timestamp — Nobody. Profile photo → Who can see my profile photo — My Contacts. Calls → Who can call me — My Contacts (or Nobody, if you prefer). Calls→ Peer-to-peer — My contacts (or Nobody, if you prefer not to share your IP address with chat partners). Forwarded Messages → Who can add a link to my account when forwarding my messages — My Contacts. Groups & Channels → Who can add me — My Contacts. How to set up Telegram privacy This is also a great time to take a look at Privacy & Security → Data Settings and remove from Telegram storage any information you do not want to be there. Telegram security for the extremely cautious The above tips should be enough for most users, but here are a few more for the extra cautious: Use a separate phone number to sign in to Telegram — or even a virtual phone number instead of a real mobile number. However, make sure not to use a one-time number or else someone else could access your account. Use a VPN to hide your IP address (which Telegram can disclose at the request of law enforcement agencies, for example). Consider using another app — one better suited to secure and private communication, such as Signal or Threema. Unlike Telegram, they encrypt all chats by default and have a bunch of extra privacy options. On the other hand, they are less popular and lack some of the features that attract users to Telegram. Keep in mind that even the most secure messenger is defenseless if someone gains access to your device, either physically or remotely. With that in mind, we recommend always being sure to lock all of your devices with a password or a PIN code, regularly updating all apps and operating systems installed on them, and using a reliable antivirus solution to protect against malware.
At the time of discovery, the unsecured Microsoft Azure Blob contained 12,464 images, PDF documents, and email messages presumably sent by the exposed workers to Nohow International.
A total of 68 high-severity flaws were identified in Cisco’s Small Business RV110W, RV130, RV130W, and RV215W routers, but the patches won’t be released because these devices have reached EOL.
Several flaws have been identified in Pepperl+Fuchs Comtrol IO-Link Master industrial gateways, including those that can be exploited to gain root access to a device and create backdoors.
The US National Security Agency has published today a guide on the benefits and risks of encrypted DNS protocols, such as DNS-over-HTTPS (DoH), which have become widely used over the past two years.
VComply announced the close of a preemptive $6 million Series A in funding from Counterpart Ventures and Accel, which will help further fuel the company’s go to market operations in the US.
The Boulder, Colorado-based cybersecurity firm LogRhythm announced to acquire MistNet, a cloud-based analytics platform that delivers vast network visibility and accurate threat detection.
Google has removed 164 Android applications from the official Play Store after security researchers caught the apps bombarding users with out-of-context (or out-of-app) ads last year.
Luatix has described ANSSI as a founding member, having been the first organization, along with CERT-EU, to be involved in Luatix’s inaugural security projects, OpenCTI and OpenEx.
According to the company, the round was completed in the third quarter of 2020, saying the additional funding would be used to expand its offerings to telco and smart utility customers.
The Saskatchewan province said the incident occurred on Jan. 7 when an email regarding Hunter Harvest surveys was sent to HAL customers from a third-party agency called Aspira.
In the wake of several recent attacks, the adoption of ransomware tactics points to the fact that these APT groups are aiming for financial gains as these attacks don’t count as espionage targets.
A security flaw in Ring’s Neighbors app, which lets users anonymously alert nearby residents to crime and public-safety issues, was exposing precise locations and home addresses of those who posted.
With broad vulnerabilities across all levels of government and firms, the US must reevaluate its approach to advancing its interests while also protecting itself in this emerging fifth domain of war.
According to a new report from VC firm DataTribe, the trend reflects the way the cybersecurity industry is resetting after a wave of venture capital began dropping off about two years ago.
An undisclosed Cross-Site Scripting (XSS) vulnerability in Apache Velocity Tools can be exploited by unauthenticated attackers to target government sites, including NASA.
Crosswalk, first documented by FireEye in 2017, is a modular backdoor capable of carrying out system reconnaissance and receiving additional modules from an attacker-controlled server as shellcode.
The U.S. CISA urged federal agencies on Thursday to deploy ad-blocking software and standardize web browser usage across their workforces in order to fend off advertisements implanted with malware.
According to F5 Networks, the vulnerability is related to a component named Traffic Management Microkernel (TMM), which processes all load-balanced traffic on BIG-IP systems.
The SolarWinds hack is just one example of a third-party, supply chain compromise. And while the scale of the SolarWinds hack is certainly novel, third-party compromises are not.
“I own this issue and I am disappointed and sorry,” said Governor Adrian Orr, adding that the ongoing investigation showed the breach is “serious and has significant data implication.”
It includes a $9 billion investment for the Cybersecurity and Infrastructure Security Agency (CISA) and the General Services Administration (GSA) to launch new cybersecurity and IT shared services.
The cyber landscape has recently encountered many new variants of trojans. Since many trojans are now offered for sale or rent on dark web forums, it enables such attack campaigns to grow rapidly.
While dealing with a massive cyber-espionage campaign against the U.S. government, the FBI is trying to quietly implement a new strategy aimed at better tracking foreign hackers.
Researchers have pointed out that several cyber gangs have started targeting Linux machines via a fileless malware installation technique that was more commonly used against Windows-based systems.
The year 2020 was characterized by chaotic change, and unfortunately, cybersecurity threats were a part of that as many organizations everywhere faced a constantly shifting set of risks.
Cybereason researcher Lior Rochberger says the actors behind Conti have released three versions since it burst onto the scene in May 2020, improving its effectiveness with each new variant.
Researchers like Patrick Wardle, who spied the changes to MacOS 11.2 beta, noted that it was trivial for malware to take advantage of the exclusion list to circumvent security products.
Security researchers are watching a threat group that takes advantage of Microsoft and Google cloud services with the goal of exfiltrating data across a broad range of target organizations.
Recent supply chain attacks prompted cybersecurity professionals, under the auspices of Cybersecurity Collaborative, to stand up a task force focused on minimizing third-party risk.
Loading remotely hosted images instead of embedding them directly into emails is one of the latest tricks employed by phishers to bypass email filters that cannot detect such images in real-time.
All extensions were developed by a software company named "Oink and Stuff," specialized in creating Android apps and browser extensions for Chrome, Firefox, Opera, and Microsoft Edge.
Over the past week, security researcher MalwareHunterTeam has seen an uptick in verified Twitter accounts hacked in a scam promoting another fake Elon Musk cryptocurrency giveaway.
Ubuntu Security Notice 4693-1 - It was discovered that an SQL injection vulnerability exists in the Ampache search engine. Any user able to perform searches could dump any data contained in the database. An attacker could use this to disclose sensitive information. It was discovered that an XSS vulnerability in show more ...
Ampache. An attacker could use this vulnerability to force an admin to create a new privileged user. Various other issues were also addressed.
Whitepaper called UFW - A Beginners Guide to Linux Firewall. The white paper is intended to provide information about a Linux firewall using a simple tool called UFW. It provides complete information on the tool and various ways through which users can create their own firewall rules to protects their assets.
WhatWeb is a next-generation web scanner. WhatWeb recognizes web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices. WhatWeb has over 1800 plugins, each to recognize something different. WhatWeb also show more ...
identifies version numbers, email addresses, account IDs, web framework modules, SQL errors, and more. WhatWeb supports an aggression level to control the trade off between speed and reliability.
Alumni Management System version 1.0 suffers from a persistent cross site scripting vulnerability. Original discovery of cross scripting vulnerability in this version is attributed to Valerio Alessandroni in December of 2020.
E-Learning System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass and also suffers from remote code execution via file upload functionality.
Ubuntu Security Notice 4694-1 - It was discovered that the LIO SCSI target implementation in the Linux kernel performed insufficient identifier checking in certain XCOPY requests. An attacker with access to at least one LUN in a multiple backstore environment could use this to expose sensitive information or modify data.
EyesOfNetwork version 5.3 suffers from a remote code execution vulnerability that leverages file upload. Original discovery of remote code execution in this version is attributed to Clement Billac in February of 2020.
Red Hat Security Advisory 2021-0146-01 - Red Hat OpenShift Serverless 1.12.0 is a generally available release of the OpenShift Serverless Operator. This version of the OpenShift Serverless Operator is supported on Red Hat OpenShift Container Platform version 4.6, and includes security and bug fixes and enhancements. show more ...
For more information, see the documentation listed in the References section. Issues addressed include code execution and cross site scripting vulnerabilities.
Online Hotel Reservation System version 1.0 suffers from multiple remote SQL injection vulnerabilities. Original discovery of SQL injection in this version was discovered by Richard Jones in January of 2021.
Cybersecurity researchers have disclosed a series of attacks by a threat actor of Chinese origin that has targeted organizations in Russia and Hong Kong with malware — including a previously undocumented backdoor. Attributing the campaign to Winnti (or APT41), Positive Technologies dated the first attack to May 12, 2020, when the APT used LNK shortcuts to extract and run the malware payload. A