Over the two years of the pandemic, millions of people learned to use numerous remote collaboration tools. If previously users thought little about security, after the massive uptake of such services, they started paying far more attention to it. Interest in the security of conferencing software has yet to abate, in show more ...
which regard researchers at three U.S. universities published a study on whether the microphone mute button in popular tools actually does what it says on the tin. The results were varied, yet undoubtedly suggest that its time to reconsider attitudes to privacy during work calls. Where did the idea come from? Actually, the idea was quite obvious. If youve ever used Microsoft Teams, youll surely be familiar with the following situation: you connect to a call in Mute mode, forget to turn it off and start talking, whereupon the program reminds you that the microphone is muted. Clearly, such an (admittedly handy) feature cannot work if the mute button disconnects the microphone altogether. How, then, is this feature actually implemented? And is sound from the microphone sent to the solution vendors server even in Mute mode? These are some of the questions posed by the authors of the study. But how to check? For this, the researchers analyzed the intricacies of microphone interaction for ten services, in each case examining the scenario for browser-based calls. Research results From a privacy point of view, the best solution for conference calls would appear to be a web client. All web-based conferencing services were tested in a browser based on the Chromium open-source engine (the basis of many browsers, including Google Chrome and Microsoft Edge). In this mode, all services must comply with the rules for microphone interaction, as set by the developers of the browser engine. That is, when the microphone mute button is activated in the web interface, the service should pick up no sound at all. Native desktop applications have more rights. General scheme of interaction between native conferencing application and operating system (in this case Windows 10). Source The researchers analyzed how and when the application interacts with the microphone by comparing audio data captured from the microphone with the stream of information sent to the server. And they found that different programs have different behavior. Heres what they learned about the most popular services. Zoom The Zoom client provides an example of decent behavior. In Mute mode, it does not capture the audio stream; that is, it does not eavesdrop on whats going on around you. That said, the client regularly requests information that allows it to determine the noise level near the microphone. As soon as the silence ends (you start talking or just make a noise), the client reminds you, as ever, to turn off Mute mode. Microsoft Teams Regarding the above-mentioned native client for Microsoft Teams, things are slightly more involved: the program doesnt use the standard system interface for microphone interaction, and instead communicates directly with Windows. As such, the researchers were unable to investigate in detail how the Teams client handles muting during a call. Cisco Webex The Cisco Webex client displayed the most unusual behavior. Unique among all the solutions tested, it constantly processed the sound from the microphone during the call, regardless of the state of the Mute button inside the application. However, investigating the client in more detail, the researchers found that Webex does not snoop on you: in Mute mode, sound is not transmitted to the remote server. But it does send metadata; specifically — the volume level of the signal. On the face of it, this doesnt seem like a big deal. However, solely on the basis of this metadata, without access to the actual audio stream, the researchers were still able to determine a number of basic parameters of what was happening at the users end. For example, it was possible to determine with a reasonable degree of reliability that the user was connected to an important work call, had turned off the microphone and camera, and was vacuuming the apartment. Or cooking. Or that a dog was barking. It was possible to know if others were present in the room (for example, that the call was coming from a public place). This involved the use of an algorithm similar in some ways to that of Shazam and other music discovery apps. For each noise sample, a set of patterns is created and compared to the data captured from the Cisco Webex client. Privacy levels The study offers some practical advice and confirms one obvious fact: you dont have full control over what data is collected on you or how. A positive takeaway from the report is that it found no criminality in the operation of popular conferencing tools. Many applications tread very carefully when it comes to microphone use. If, despite these positive results, youre still uneasy about having a native application on your computer with constant access to the microphone, a simple solution, if possible, is to connect through a web client. Sure, the functionality will be limited, but privacy will increase: the Mute button there really does disconnect the microphone from the service. Another option is a hardware microphone Mute button, if there is one on your computer. Or an external headset — the Mute button on top-of-the-range models often isolates the microphone from the computer physically, not by software means. The real danger is not the conferencing tools themselves, but malware that can snoop on victims and send audio recordings of important conversations to its creators. In this case, you need not only a security solution that deals with unwanted programs, but also a means of controlling who accesses the microphone and when — in case a legitimate program decides to do so without asking. Kasperskys solutions for both home and business feature a separate function that informs you when software tries to access the microphone or webcam.
The phishing page claims that Musk is doing an “official” ETH (Ethereal) and BTC (Bitcoin) giveaway. This giveaway aims to hand out a significant amount of BTC, ETH, and DOGE (Dogecoin) to winning participants.
Between February 23 and April 8, Microsoft said, it observed a total of 37 Russian destructive cyberattacks inside Ukraine. The findings underscore how modern warfare can combine digital and kinetic strikes, experts said.
In partnership with the NSA and the FBI, cybersecurity authorities worldwide have released today a list of the top 15 vulnerabilities routinely exploited by threat actors during 2021.
Security researchers have noticed an increase in the number of databases publicly exposed to the Internet, with 308,000 identified in 2021. The growth continued quarter over quarter, peaking in the first months of this year.
NAS appliance maker QNAP on Wednesday said it's working on updating its QTS and QuTS operating systems after Netatalk last month released patches to contain seven security flaws in its software.
Google on Tuesday officially began rolling out a new "Data safety" section for Android apps on the Play Store to highlight the type of data being collected and shared with third-parties.
Alongside its partners across the federal government — like DHS's CISA, the FBI, and the Defense Cyber Crime Center — NSA dives into intelligence to develop deep insights into ways our adversaries are trying to exploit US networks.
According to Cloudflare, the attack, which lasted less than 15 seconds, was launched from a botnet of approximately 6,000 unique bots and originated from 112 countries around the world.
Due to their ability to quickly amass new victims and the style of their negotiations, this is likely not a new operation but rather a rebrand of a previous top-tier ransomware gang that brought along their affiliates.
The round is led by insurance and financial services giant USAA, with Mastercard, Capital One Ventures, C5 Capital, DataTribe, the CIA’s strategic investment arm In-Q-Tel, Cyber Mentor Fund, Bloomberg Beta, GC&H and 1843 Capital also participating.
In a rebuttal of the research, Bernardo Quintero, VirusTotal’s founder, said that the code executions are happening on third-party scanning systems that take and analyze samples obtained from VT rather than VirusTotal itself.
Starting in March 2022, Proofpoint observed campaigns delivering a new downloader called Bumblebee. At least three clusters of activity including known threat actors currently distribute Bumblebee.
In December 2021, as a result of its continued monitoring of the activities of the DustSquad threat actor, Kaspersky observed new infrastructure and tools being used alongside the already known Octopus Trojan.
Trend Micro found a new APT group dubbed Earth Berberoka (aka GamblingPuppet). This APT group targets gambling websites on Windows, macOS, and Linux platforms using old and new malware families.
The acquisition comes less than a year after Bit Discovery raised $4 million in Series B funding to build technology to help organizations track and manage risks to digital assets.
The recently investigated campaign relying on RIG EK leverages CVE-2021-26411, an Internet Explorer vulnerability that causes memory corruption when viewing a specially crafted website.
The round was led by Valor Equity Partners, with participation from DataTribe, Koch Disruptive Technologies, and One9 Ventures. Costa Saab, from Valor Equity Partners, will join Strider’s Board of Directors.
A newly discovered Onyx ransomware operation is destroying files larger than 2MB instead of encrypting them, preventing those files from being decrypted even if a ransom is paid.
Cybercriminals purposely choose specific times when all of us are busy with taxes, and preparing for holidays (e.g., Easter), that’s why you need to be especially careful during these times.
Backers included Accel, Bain Capital, Ballistic Ventures, GV, Norwest Venture Partners, and True Ventures, as well as Kevin Mandia, Enrique Salem, Lane Bess, Manoj Apte, Joe Montana, Niels Provos, and Karthik Rangarajan, and many more.
The university, located in Clarksville, Tennessee advised students, staff, and faculty to disconnect their computers and devices from the university network immediately as a precaution after confirming the attack.
The hypothesis used by researchers is that threat actors don’t necessarily have to use bcdedit to modify bootloader configurations but could implement code that directly modifies the Windows registry keys that determine those configurations.
According to the DFIR Report, Quantum ransomware has upped its encryption game as it now encrypts systems within a few hours of penetration within a network. Rapid attacks are concerning as they offer less time for analysts to defend their systems.
APT37, suspected to have ties with the North Korean government, was found targeting journalists with sophisticated info-stealer malware dubbed Goldbackdoor. The emails sent to the journalists included a link to download ZIP archives with LNK files. Targets are advised to ensure they don’t open any attachments from show more ...
unconfirmed sources and avoid instantly opening emails that contain attachments and urge quick response.
Right before the invasion, at least six Russian distinct actors launched more than 237 attacks. All of these attacks were of destructive nature and many are still ongoing.
According to Kaspersky, there has been a 46% rise in the number of attacks. The U.S. accounted for the most number of targets at 45.01%, followed by China (9.34%) and Germany (4.95%).
The Call For Papers for nullcon Goa 2022 is now open. Nullcon is an information security conference held in Goa, India. The focus of the conference is to showcase the next generation of offensive and defensive security technology. It will take place September 9th through the 10th, 2022. This conference was originally planned for March but was moved due to the pandemic.
Ubuntu Security Notice 5392-1 - It was discovered that Mutt incorrectly handled certain requests. An attacker could possibly use this issue to expose sensitive information. This issue only affected Ubuntu 20.04 LTS. It was discovered that Mutt incorrectly handled certain input. An attacker could possibly use this issue to cause a crash, or expose sensitive information.
Ubuntu Security Notice 5394-1 - A large number of security issues were discovered in the WebKitGTK Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution.
Ubuntu Security Notice 5371-2 - USN-5371-1 fixed several vulnerabilities in nginx. This update provides the fix for CVE-2021-3618 for Ubuntu 22.04 LTS. It was discovered that nginx Lua module mishandled certain inputs. An attacker could possibly use this issue to perform an HTTP Request Smuggling attack. This issue only affects Ubuntu 18.04 LTS and Ubuntu 20.04 LTS.
Ubuntu Security Notice 5393-1 - Multiple security issues were discovered in Thunderbird. If a user were tricked into opening a specially crafted website in a browsing context, an attacker could potentially exploit these to cause a denial of service, conduct spoofing attacks, or execute arbitrary code. It was show more ...
discovered that Thunderbird ignored OpenPGP revocation when importing a revoked key in some circumstances. An attacker could potentially exploit this by tricking the user into trusting the authenticity of a message or tricking them into use a revoked key to send an encrypted message.
Log4Shell, ProxyShell, ProxyLogon, ZeroLogon, and flaws in Zoho ManageEngine AD SelfService Plus, Atlassian Confluence, and VMware vSphere Client emerged as some of the top exploited security vulnerabilities in 2021. <!--adsense--> That's according to a "Top Routinely Exploited show more ...
Vulnerabilities" report released by cybersecurity authorities from the Five Eyes nations Australia, Canada, New Zealand
Cloudflare on Wednesday disclosed that it acted to mitigate a 15.3 million request-per-second (RPS) distributed denial-of-service (DDoS) attack. The web infrastructure and website security company called it one of the "largest HTTPS DDoS attacks on record." "HTTPS DDoS attacks are more expensive in terms of required computational resources because of the higher cost of establishing a secure TLS
Network-attached storage (NAS) appliance maker QNAP on Wednesday said it's working on updating its QTS and QuTS operating systems after Netatalk last month released patches to contain seven security flaws in its software. Netatalk is an open-source implementation of the Apple Filing Protocol (AFP), allowing Unix-like operating systems to serve as file servers for Apple macOS computers. <!-
Elon Musk, CEO of SpaceX and Tesla and Twitter's new owner, on Thursday called on adding support for end-to-end encryption (E2EE) to the platform's direct messages (DM) feature. "Twitter DMs should have end to end encryption like Signal, so no one can spy on or hack your messages," Musk said in a tweet. The statement comes days after the microblogging service announced it officially entered into
A new campaign leveraging an exploit kit has been observed abusing an Internet Explorer flaw patched by Microsoft last year to deliver the RedLine Stealer trojan. "When executed, RedLine Stealer performs recon against the target system (including username, hardware, browsers installed, anti-virus software) and then exfiltrates data (including passwords, saved credit cards, crypto wallets, VPN
A cyberespionage threat actor known for targeting a variety of critical infrastructure sectors in Africa, the Middle East, and the U.S. has been observed using an upgraded version of a remote access trojan with information stealing capabilities. Calling TA410 an umbrella group comprised of three teams dubbed FlowingFrog, LookingFrog and JollyFrog, Slovak cybersecurity firm ESET assessed that "
You've been asked for a Vulnerability Assessment Report for your organisation and for some of you reading this article, your first thought is likely to be "What is that?" Worry not. This article will answer that very question as well as why you need a Vulnerability Assessment Report and where you can get one from. As it's likely the request for such a report came from an important source such
Cybercriminal actors previously observed delivering BazaLoader and IcedID as part of their malware campaigns are said to have transitioned to a new loader called Bumblebee that's under active development. "Based on the timing of its appearance in the threat landscape and use by multiple cybercriminal groups, it is likely Bumblebee is, if not a direct replacement for BazaLoader, then a new,
Members of The Bored Ape Yacht Club get that sinking feeling, a face unwittingly launches hundreds of romance scams, and is an as-yet unseen Kim Kardashian sex tape a load of old Roblox? All this and much more is discussed in the latest edition of the award-winning "Smashing Security" podcast by computer show more ...
security veterans Graham Cluley and Carole Theriault, joined this week by BBC cyber correspondent Joe Tidy.
The United States has made it $10 million harder to keep your mouth shut, if you happen to have any information about the Russian military hackers who masterminded the notorious NotPetya cyber attack. Read more in my article on the Hot for Security blog.