Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Telegram security an ...

 Privacy

Facebook’s WhatsApp recently updated its privacy policy, causing many disgruntled users to switch to rival messengers, among them Telegram. Thanks largely to this exodus, Telegram added 25 million new users in just a few days, pushing its user base over the 500 million mark. That makes this the perfect time to   show more ...

talk about Telegram’s security and privacy. End-to-end encryption is not the default option in Telegram The first thing to know about Telegram is that Cloud chats, as Telegram calls its standard chats, are not end-to-end encrypted. (Here’s why end-to-end encryption is important for privacy.) In a nutshell, the absence of end-to-end encryption means Telegram has access not only to metadata (who you wrote to, when, how often, and so forth), as WhatsApp does, but also to the contents of standard chats with no end-to-end encryption. According to Telegram’s privacy policy at the time of this writing, the data is not used for advertising purposes. However, as we know from experience, policies can change. How to enable end-to-end encryption for secret chats in Telegram Telegram does have end-to-end encryption — you just need to enable it. Telegram calls chats with end-to-end encryption enabled Secret chats. In secret chats, text messages, pictures, videos, and all other files are sent using end-to-end encryption. That means only you and the recipient have the decryption key, so Telegram cannot access the data. Moreover, the contents of secret chats are not stored on Telegram’s servers. Because secret chats are saved only on the devices of chat participants, they cannot be accessed from another device — and they disappear when you log out of Telegram or delete the app. Secret chats are available in Telegram’s iOS, Android, and macOS apps. The Web version and Windows app do not support secret chats; they cannot ensure secure storage of chats on the device. How to create a secret chat in Telegram Current versions of the Telegram apps do not make the secret chat feature easy to find. To create a secret chat, you need to open the profile of your chat partner, tap or click the three-dot button (sometimes called More, sometimes not), and select Start Secret Chat. How to enable end-to-end encryption in Telegram: Starting a secret chat That opens a chat in which end-to-end encryption is applied to messages (a notification to that effect appears in the chat window at the start). You can also set the time after which messages will be deleted by tapping or clicking the clock icon in the message input box. Set up a timer in Telegram’s secret chats to delete messages automatically Of course, the automatic deletion of messages doesn’t prevent your chat partner from taking screenshots, but if they do, you will be notified about it in the chat. The one exception is if the other person is using the macOS app; in that case you won’t get a notification. Here’s another handy tip: Telegram allows multiple secret chats with the same person. Group chats cannot be secret, however, unlike in WhatsApp, which applies end-to-end encryption to all chats by default. How to know if a chat is end-to-end encrypted: The padlock icon Because Telegram chats can be either cloud or secret, in some cases it is important to know which type you are using. If a chat contains sensitive information, it should be secret, right? Yes, of course. But end-to-end encrypted chats look almost identical to regular ones. To confirm which kind you’re in, look for a padlock icon next to the name or phone number of your chat partner. If it’s there, the chat is secret. If not, then end-to-end encryption is off, in which case you should create a new chat. How to check if a chat in Telegram is end-to-end encrypted: Look for a padlock icon You can also tap or click your chat partner’s icon, and if end-to-end encryption is enabled, the words Encryption Key will appear at the bottom of the window that opens. How to configure Telegram security and privacy While we’re at it, let’s take a moment to configure security and privacy in the app. Click the Settings button in the lower right corner of the screen and select Privacy and Security. Telegram security settings The first step is to make sure no one can read your chats if you accidentally leave your device unlocked and unattended. To do so, select Passcode, tap or click Turn Passcode On, think up a PIN code you won’t forget, set it, and confirm. Next, select Auto-Lock and set a low value — 1 or 5 minutes. If your device supports fingerprint or face recognition, you can enable the option here. How to set up security in Telegram The next step is to set up two-factor authentication to protect your account against hijacking. The primary login method uses a one-time code sent by text, so Telegram lets you set a password as the second factor. To do so, on the Privacy and Security tab, select Two-Step Verification (Telegram’s term for 2FA), and set a strong combination. Remember that you will rarely enter this password, so it is very easy to forget; store it somewhere safe, such as in a password manager. What will happen if you forget that additional password? You’ll have to reset your account. In essence, that means submitting a request to remove your account completely, after which you will have to wait seven days. After a week, the account will be deleted (including associated contacts, cloud chats, and channel subscriptions) and you can create a new, completely empty account using the same phone number. Telegram privacy settings So as not to share unnecessary details with all 500 million–plus Telegram users, configure your profile privacy appropriately. To do so, go through Telegram’s Privacy settings, changing the set values​ — all options and data are available to everyone by default. We recommend the following: Phone Number → Who can see my phone number — Nobody. Phone Number → Who can find me by my number — My Contacts. Last Seen & Online → Who can see my timestamp — Nobody. Profile photo → Who can see my profile photo — My Contacts. Calls → Who can call me — My Contacts (or Nobody, if you prefer). Calls→ Peer-to-peer — My contacts (or Nobody, if you prefer not to share your IP address with chat partners). Forwarded Messages → Who can add a link to my account when forwarding my messages — My Contacts. Groups & Channels → Who can add me — My Contacts. How to set up Telegram privacy This is also a great time to take a look at Privacy & Security → Data Settings and remove from Telegram storage any information you do not want to be there. Telegram security for the extremely cautious The above tips should be enough for most users, but here are a few more for the extra cautious: Use a separate phone number to sign in to Telegram — or even a virtual phone number instead of a real mobile number. However, make sure not to use a one-time number or else someone else could access your account. Use a VPN to hide your IP address (which Telegram can disclose at the request of law enforcement agencies, for example). Consider using another app — one better suited to secure and private communication, such as Signal or Threema. Unlike Telegram, they encrypt all chats by default and have a bunch of extra privacy options. On the other hand, they are less popular and lack some of the features that attract users to Telegram. Keep in mind that even the most secure messenger is defenseless if someone gains access to your device, either physically or remotely. With that in mind, we recommend always being sure to lock all of your devices with a password or a PIN code, regularly updating all apps and operating systems installed on them, and using a reliable antivirus solution to protect against malware.

 Companies to Watch

The Boulder, Colorado-based cybersecurity firm LogRhythm announced to acquire MistNet, a cloud-based analytics platform that delivers vast network visibility and accurate threat detection.

 Threat Actors

In the wake of several recent attacks, the adoption of ransomware tactics points to the fact that these APT groups are aiming for financial gains as these attacks don’t count as espionage targets.

 Trends, Reports, Analysis

The cyber landscape has recently encountered many new variants of trojans. Since many trojans are now offered for sale or rent on dark web forums, it enables such attack campaigns to grow rapidly.

 Trends, Reports, Analysis

Researchers have pointed out that several cyber gangs have started targeting Linux machines via a fileless malware installation technique that was more commonly used against Windows-based systems.

 Malware and Vulnerabilities

Cybereason researcher Lior Rochberger says the actors behind Conti have released three versions since it burst onto the scene in May 2020, improving its effectiveness with each new variant.

 Feed

Ubuntu Security Notice 4693-1 - It was discovered that an SQL injection vulnerability exists in the Ampache search engine. Any user able to perform searches could dump any data contained in the database. An attacker could use this to disclose sensitive information. It was discovered that an XSS vulnerability in   show more ...

Ampache. An attacker could use this vulnerability to force an admin to create a new privileged user. Various other issues were also addressed.

 Feed

Whitepaper called UFW - A Beginners Guide to Linux Firewall. The white paper is intended to provide information about a Linux firewall using a simple tool called UFW. It provides complete information on the tool and various ways through which users can create their own firewall rules to protects their assets.

 Feed

WhatWeb is a next-generation web scanner. WhatWeb recognizes web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices. WhatWeb has over 1800 plugins, each to recognize something different. WhatWeb also   show more ...

identifies version numbers, email addresses, account IDs, web framework modules, SQL errors, and more. WhatWeb supports an aggression level to control the trade off between speed and reliability.

 Feed

Ubuntu Security Notice 4694-1 - It was discovered that the LIO SCSI target implementation in the Linux kernel performed insufficient identifier checking in certain XCOPY requests. An attacker with access to at least one LUN in a multiple backstore environment could use this to expose sensitive information or modify data.

 Feed

EyesOfNetwork version 5.3 suffers from a remote code execution vulnerability that leverages file upload. Original discovery of remote code execution in this version is attributed to Clement Billac in February of 2020.

 Feed

Red Hat Security Advisory 2021-0146-01 - Red Hat OpenShift Serverless 1.12.0 is a generally available release of the OpenShift Serverless Operator. This version of the OpenShift Serverless Operator is supported on Red Hat OpenShift Container Platform version 4.6, and includes security and bug fixes and enhancements.   show more ...

For more information, see the documentation listed in the References section. Issues addressed include code execution and cross site scripting vulnerabilities.

 Feed

Cybersecurity researchers have disclosed a series of attacks by a threat actor of Chinese origin that has targeted organizations in Russia and Hong Kong with malware — including a previously undocumented backdoor. Attributing the campaign to Winnti (or APT41), Positive Technologies dated the first attack to May 12, 2020, when the APT used LNK shortcuts to extract and run the malware payload. A

2021-01
Aggregator history
Friday, January 15
FRI
SAT
SUN
MON
TUE
WED
THU
JanuaryFebruaryMarch