In December 2022, Apple announced a raft of new user data protection features. The most important was the expanded list of end-to-end encrypted data uploaded to iCloud. In most cases, only the owner of a key has access to it, and even Apple itself wont be able to read this information. There was also an unofficial show more ...
announcement: the company mentioned it was dropping its controversial plans for a technology to scan smartphones and tablets for child pornography. Encryption of iCloud backups Lets start with the innovation of most interest. Owners of iPhones, iPads and macOS computers (not all, but more about that below) can now encrypt backup copies of their devices uploaded to iCloud. Well try to explain this rather complicated innovation as simply as possible, but therell still be plenty of detail as it is really quite important. All Apple mobile devices upload backups of themselves to iCloud by default. This extremely useful feature helps restore all data to a new device as it was on the old one at the time of the last backup. In some cases, such as if your smartphone is lost or broken, its the only way to access family photos or work notes. Youll likely have to pay extra for this feature: Apple provides a mere 5 GB of cloud storage for free, which fills up fast. You either have to buy extra gigabytes or choose what data to back up: for example, you might exclude music, video, and other heavy files. Apple has always encrypted backups on its servers, but in such a way that both the company and the user had the decryption key — so backups were only protected from hacks against the companys servers themselves. The December update of Apple operating systems introduced a new end-to-end encryption feature whereby data remains encrypted all the way from sender to recipient. This kind of encryption is of most relevance to communication tools — especially messengers. Its presence shows that the developer cares about data confidentiality; for example, Apples own messaging service, iMessage, has long used end-to-end encryption. The convenience of end-to-end encryption depends on its implementation. For instance, in Telegram most chats are unencrypted and accessible on all devices connected to the account, but you can create a separate secret chat with another user; this exists only on the device on which you initiated the encrypted chat, and its content is visible only to you and your chat partner, no one else. But back to backups. By default, Apple backups save all information on your device, including iMessage correspondence. Whats of note here is that, although iMessage communication is encrypted end-to-end, if an attacker somehow manages to get a backup copy of your phone, theyll be able to read your message history. Plus, theyll have access to a huge amount of other data: photos, documents, notes, and so on. It is this potential security hole that Apple has fixed. With end-to-end encryption of backups, youre the only sender and recipient of data, and only you have access to the key to decrypt it. If the algorithm is implemented correctly, Apple wont be able to decrypt your data even if it wants to. Someone who gets hold of your Apple ID without knowing the encryption key wont be able to steal your data either. The new setting is called Advanced Data Protection, and it looks as follows: Advanced Data Protection settings Its important to note that, once the feature is enabled, you and only you are responsible for access to your data: if you lose the encryption key, even Apple support would be powerless to help. Thats why the new privacy setting will be voluntary: if you decide not to activate it, your backups will still be available to Apple and could be stolen by intruders if, say, your Apple ID is hacked. Incidentally, Advanced Data Protection cannot be activated on a device recently added to your Apple ID. After all, if someone gets hold of your Apple ID and activates end-to-end encryption on their smartphone, youll lose access to your data. Even if you manage to restore access to your account, you wont have the encryption key! Therefore, if you just bought a new Apple device, you can only enable Advanced Data Protection from the previous one. End-to-end encryption of other data Apples new feature is not limited to just smartphone, tablet, and laptop backups. Photos and notes will also be encrypted. Its possible that this list will grow, but for now Apple is talking about strong protection for 23 categories of data, without specifying which. Previously, end-to-end encryption was used for 14 categories, including iMessage chats, Keychain passwords, and all health-related data, such as readings from Apple Watch sensors. But we do know what end-to-end encryption definitely wont be used for: iCloud mail, calendars, and contacts. According to Apple, this is to ensure compatibility with other developers systems. Hardware security keys for Apple ID authentication Even with end-to-end encryption implemented, access to many types of data on your iPhone, iPad or Mac is through your Apple ID account. If an attacker manages to gain access to it, theyll be able to restore your backup on their device (which is what Advanced Data Protection prevents) and track your location using Find My. A common way to steal your Apple ID credentials is phishing. Having stolen your iPhone, the thieves cant just resell it, except perhaps for parts. They must enter your Apple ID to unlink the phone from it, after which a new owner can register it. And when youre desperately trying to find your phone (for example, using Find My iPhone), youre very easily duped: strange text messages seemingly from Apple arrive at the contact number you specified, with a link to sign in with your Apple ID. Instead of Apples website, you go to a plausible imitation and enter your credentials, which fall straight into the cybercriminals hands. Alas, sometimes even two-factor authentication (which requires an additional code) doesnt help. The phishing page may consider this protection method and ask you for a one-time verification code. A hardware security key (a separate device like a flash drive) greatly reduces the likelihood of falling for phishing. In this case, for Apple ID authentication, you either put the NFC key near the device, or insert it into the Lightning or USB-C connector. All data is exchanged in encrypted form only with Apples servers. Its almost impossible for a fake phishing site to successfully imitate this kind of authentication. Apple ID account sign-in screen requiring a physical security key Additional protection for iMessage Another minor innovation concerns Apples native messenger. After the update, it will warn you if a third party can see messages between you and another user. The details arent yet known, but the feature is expected to counter the most sophisticated attacks, such as man-in-the-middle ones. If that happens, youll get a warning about possible eavesdropping right in the chat. Whats more, iMessage Contact Key Verification users will be able to compare the verification code either (i) when actually meeting the person with whom youre messaging, (ii) on FaceTime, or (iii) in another messenger app. iMessage Contact Key Verification lets users verify theyre communicating only with whom they intend iMessage Contact Key Verification will be useful to potential victims of sophisticated and expensive cyberattacks: journalists, politicians, celebrities, etc. Ordinary users are more likely to be inconvenienced by it, like the previously unveiled Lockdown Mode. In any case, it will be available to everyone. When will the new features be available? The most useful feature — Advanced Data Protection — already went live on December 13, 2022. To use it, you need to update all devices linked to your Apple ID account; the minimum operating system requirements are: iPhone — iOS 16.2 or later iPad — iPadOS 16.2 or later Mac — macOS 13.1 or later Apple Watch — watchOS 9.2 or later Apple TV — tvOS 16.2 or later HomePod speakers — version 16.0 or later Windows computers with iCloud for Windows — version 14.1 or later If just one device doesnt support the right version (for example: iPhone 7 and earlier; 4th-generation and lower iPads), you wont be able to enable Advanced Data Protection until you unlink it from your account. Incidentally, the current version of macOS — Ventura — supports most devices released since 2017. Apple hasnt named the launch dates for the other features, stating only that theyll be coming some time this year. Scanning devices for child pornography scrapped Lastly, another important change was more… whispered than announced: an Apple spokesperson only mentioned briefly in an interview that the company no longer plans to implement CSAM Detection, which weve already written about. Recall that, in August 2022, Apple announced a technology for detecting child pornography on devices. The more correct legal term, which Apple used, is Child Sexual Abuse Material (CSAM). The idea was that all Apple devices would carry out background scanning of images, and if any matched the database of child pornography images, the company would be notified and tip off the law enforcement agencies. Although Apple insisted that CSAM Detection would not violate the privacy of ordinary users with nothing illegal on their devices, the initiative was still criticized. Apples promises of minimal likelihood of false positives didnt help: in any case, the feature turned out to be extremely non-transparent and, a first, implemented directly on the device — not in the cloud system that Apple itself manages, but on the phone or tablet. Apple critics, such as the US non-profit Electronic Frontier Foundation, rightly pointed out that the noble goal of preventing the spread of child pornography could easily morph into scanning devices for any content. Advances in data privacy Apples introduction of end-to-end encryption for the most sensitive user data and scrapping of controversial scanning technology show that the company really does care about user privacy. And enabling Advanced Data Protection will greatly reduce the chances of data theft from an iCloud hack. Moreover, Apple wont be able to hand over your data at the request of law enforcement. At present, the company can do this in respect of all accounts where any information is uploaded to the cloud. In addition, we mustnt forget that, for any security measure, sooner or later a hacking technique will be found. Even in end-to-end encryption technology vulnerabilities can crop up, and Apple innovations always get put to the most stringent test by both conscientious security researchers and cybercriminals. But its important to remember that no amount of encryption will help if someone gains access to your unlocked Apple device. And while Apples innovations are certainly useful, they will cause the user some inconvenience. If you lose the decryption key, your data is lost forever. And if you lose your only Apple device, you may have problems restoring your data to a new one. So, we recommend taking a timeout to fully consider the new features and whether theyre right for you.
The rapid maturation and rebranding of ransomware groups calls for relentless preparation and flexibility in response, according to one view from the trenches.
Only one in 10 enterprises will create a robust zero-trust foundation in the next three years, while more than half of attacks won't even be prevented by it, according to Gartner.
The first victim of the 2022 Kronos malware had the malware automatically installed through a malicious Chrome extension called Seguridad. This is the first time it was observed utilizing a chrome extension with web injects on financial institutions.
The FBI Columbia field office is leading a multi-agency law enforcement three-day training course this week aimed at better equipping investigators with tools and knowledge to address the ever-growing threat of cybercrime.
The bug isn't a remote code execution flaw; it's a vulnerability that allows someone to pretend to be another to an application or operating system, in the context of identity and certificate cryptography checks on Windows.
As tech transformations—for example, a business unit built around A.I. or a new app geared toward personalized customer experience—have picked up steam in recent years, so have cyber risks and data privacy concerns.
Google addressed six security vulnerabilities in Chrome, none of them actively exploited in the wild. Google released Chrome version 109.0.5414.119 for Mac and Linux and 109.0.5414.119/.120 for Windows to address a total of six vulnerabilities.
The first half of 2022 saw fewer compromises reported due in part to Russia-based cybercriminals distracted by the war in Ukraine and volatility in cryptocurrency markets, according to the Identity Theft Resource Center.
The attack commences with a phishing email containing a ZIP archive, which, in turn, harbors two shortcut (.LNK) files that masquerade as front and back side images of a seemingly legitimate U.K. driver's license.
So-called “advance fee” fraud surged by 82% year-on-year in 2022, with fake ads for loans, jobs, and rental properties among the most common tactics used by scammers, according to Lloyds Bank.
The Circleville Municipal Court was added to the leak site of the LockBit ransomware group last week. The group claimed it stole 500 GB of data that included case information and gave the court a deadline of January 24 to pay a ransom.
The theft of the company's anticheat system source code — even an old system — could help hackers develop better and less-detectable cheats, according to industry experts who spoke to TechCrunch.
Security researchers at Check Point have revealed that Yahoo knocked DHL off the top spot as the most imitated brand in the last quarter of 2022, now responsible for 20% of all phishing attempts recorded in the wild.
A 2020 ransomware attack against Baltimore County Public Schools began with a contractor error, according to a report released Monday by Maryland's Office of the Inspector General for Education.
ServiceNow announced a strategic investment in Snyk. The startup focuses on helping developers detect and fix code vulnerabilities. The Wall Street Journal reported that the investment is worth $25 million.
The U.K NCSC warned that instead of sending surprise phishing emails, the Russia-based SEABORGIUM and Iran-based APT42 (or Charming Kitten) are contacting their targets in a benign fashion and attempting to build a rapport and a sense of trust.
Public authorities in the Netherlands are being told to steer clear of TikTok amid growing concerns across the EU and U.S. that the Chinese-owned video-sharing platform poses privacy risks.
Prompt engineering is the manipulation of prompts given to a chatbot like OpenAI's ChatGPT, designed to force the system to respond in a specific manner desired by the user.
Newfound unease by clinicians over advertising-driven surveillance is causing a Midwest specialty medical care clinic to treat patient exposure to online tracking pixels as a data breach reportable to federal regulators.
The CISA discovered malicious activity within the networks of multiple federal civilian executive branch (FCEB) agencies using the EINSTEIN intrusion detection system after the release of a Silent Push report in mid-October 2022.
Strata closed a $26M Series B round of financing led by Telstra Ventures with participation from existing investors Menlo Ventures, Forgepoint Capital, and Innovating Capital.
According to the notice, threat actors had access to an older database of customers who had signed up for the Zacks Elite product between November 1999 through February 2005.
Multicloud offers numerous benefits, from avoiding vendor lock-in to reliability, agility, and cost-efficiency. At the same time, however, it brings additional layers of complexity, particularly regarding security management.
The 25-year-old now faces charges of violating data privacy and computer trespassing laws, and laundering cryptocurrency valued at around $491,000, according to media reports.
The General Services Administration announced Tuesday that it is accepting advisory board member nominations for the FedRAMP cybersecurity authorization program, marking the first step in implementing recent legislation that reformed the program.
Threat actors are auctioning the alleged source code for Riot Game's League of Legends and the Packman anti-cheat software, confirmed to be stolen in a recent hack of the game company's developer environment.
In 2022, U.S. organizations issued 1,802 data breach notifications, reporting the exposure of records or personal information affecting more than 400 million individuals, the Identity Theft Resource Center reports.
The CISA released a report outlining a variety of steps that K-12 schools and districts should take to enhance their cybersecurity practices, amid an increase in ransomware attacks and other digital threats targeting education institutions.
The Federal Trade Commission will mark its annual Identity Theft Awareness Week with a series of free events January 30-February 3 focused on how identity theft affects people of every community and ways to reduce your risk.
The team identified the bug, tracked under CVE-2007-4559, in Python’s tarfile module late last year. It was first reported to the Python project in 2007 but left unchecked.
Secure Web Gateway version 10.2.11 suffers from a cross site scripting vulnerability. RedTeam Pentesting identified a vulnerability which allows attackers to craft URLs to any third-party website that result in arbitrary content to be injected into the response when accessed through the Secure Web Gateway. While it is show more ...
possible to inject arbitrary content types, the primary risk arises from JavaScript code allowing for cross site scripting.
Ubuntu Security Notice 5829-1 - It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. Tamás Koczka discovered that the Bluetooth L2CAP show more ...
handshake implementation in the Linux kernel contained multiple use-after-free vulnerabilities. A physically proximate attacker could use this to cause a denial of service or possibly execute arbitrary code.
Red Hat Security Advisory 2023-0468-01 - Red Hat Openshift GitOps is a declarative way to implement continuous deployment for cloud native applications.
Red Hat Security Advisory 2023-0466-01 - Red Hat Openshift GitOps is a declarative way to implement continuous deployment for cloud native applications.
Red Hat Security Advisory 2023-0467-01 - Red Hat Openshift GitOps is a declarative way to implement continuous deployment for cloud native applications. Issues addressed include a bypass vulnerability.
Ubuntu Security Notice 5828-1 - It was discovered that Kerberos incorrectly handled certain S4U2Self requests. An attacker could possibly use this issue to cause a denial of service. This issue was only addressed in Ubuntu 16.04 ESM and Ubuntu 18.04 LTS. Greg Hudson discovered that Kerberos PAC implementation show more ...
incorrectly handled certain parsing operations. A remote attacker could use this issue to cause a denial of service, or possibly execute arbitrary code.
Ubuntu Security Notice 5827-1 - Rob Schulhof discovered that Bind incorrectly handled a large number of UPDATE messages. A remote attacker could possibly use this issue to cause Bind to consume resources, resulting in a denial of service. Borja Marcos discovered that Bind incorrectly handled certain RRSIG queries. A show more ...
remote attacker could possibly use this issue to cause Bind to crash, resulting in a denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu 22.10.
Ubuntu Security Notice 5826-1 - Joshua Rogers discovered that Privoxy incorrectly handled memory allocation. An attacker could possibly use this issue to cause a denial of service. Artem Ivanov discovered that Privoxy incorrectly handled input validations. An attacker could possibly use this issue to perform cross-site scripting attacks.
Red Hat Security Advisory 2023-0459-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.7.1. Issues addressed include a bypass vulnerability.
Red Hat Security Advisory 2023-0462-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.7.1. Issues addressed include a bypass vulnerability.
Red Hat Security Advisory 2023-0461-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.7.1. Issues addressed include a bypass vulnerability.
Red Hat Security Advisory 2023-0460-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.7.1. Issues addressed include a bypass vulnerability.
Red Hat Security Advisory 2023-0463-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.7.1. Issues addressed include a bypass vulnerability.
Red Hat Security Advisory 2023-0408-01 - OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform. Issues addressed include denial of service and out of bounds read vulnerabilities.
Red Hat Security Advisory 2023-0237-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include a bypass vulnerability.
Red Hat Security Advisory 2023-0456-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.7.1. Issues addressed include a bypass vulnerability.
Red Hat Security Advisory 2023-0275-01 - OpenStack Networking is a virtual network service for OpenStack. Just as OpenStack Compute provides an API to dynamically request and configure virtual servers, OpenStack Networking provides an API to dynamically request and configure virtual networks. These networks connect show more ...
'interfaces' from other OpenStack services. The OpenStack Networking API supports extensions to provide advanced network capabilities.
Red Hat Security Advisory 2023-0457-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.7.1. Issues addressed include a bypass vulnerability.
Advanced workflow, approval process, and management dashboard enhance control, distribution, and supervision, while reducing errors and streamlining the entire SBOM management process.
A vulnerability within Microsoft's OAuth application registration allows an attacker to create hidden forwarding rules that act as a malicious SaaS rootkit.
Cybersecurity researchers have unearthed a new Python-based attack campaign that leverages a Python-based remote access trojan (RAT) to gain control over compromised systems since at least August 2022. "This malware is unique in its utilization of WebSockets to avoid detection and for both command-and-control (C2) communication and exfiltration," Securonix said in a report shared with The Hacker
At least two federal agencies in the U.S. fell victim to a "widespread cyber campaign" that involved the use of legitimate remote monitoring and management (RMM) software to perpetuate a phishing scam. "Specifically, cyber criminal actors sent phishing emails that led to the download of legitimate RMM software – ScreenConnect (now ConnectWise Control) and AnyDesk – which the actors used in a
Any organization that handles sensitive data must be diligent in its security efforts, which include regular pen testing. Even a small data breach can result in significant damage to an organization's reputation and bottom line. There are two main reasons why regular pen testing is necessary for secure web application development: Security: Web applications are constantly evolving, and new
The infrastructure associated with the Hive ransomware-as-a-service (RaaS) operation has been seized as part of a coordinated law enforcement effort involving 13 countries. "Law enforcement identified the decryption keys and shared them with many of the victims, helping them regain access to their data without paying the cybercriminals," Europol said in a statement. The U.S. Department of
Google on Thursday disclosed it took steps to dismantle over 50,000 instances of activity orchestrated by a pro-Chinese influence operation known as DRAGONBRIDGE in 2022. "Most DRAGONBRIDGE activity is low quality content without a political message, populated across many channels and blogs," the company's Threat Analysis Group (TAG) said in a report shared with The Hacker News. "However, a
Proof-of-concept (Poc) code has been released for a now-patched high-severity security flaw in the Windows CryptoAPI that the U.S. National Security Agency (NSA) and the U.K. National Cyber Security Centre (NCSC) reported to Microsoft last year. Tracked as CVE-2022-34689 (CVSS score: 7.5), the spoofing vulnerability was addressed by the tech giant as part of Patch Tuesday updates released in
New research has linked the operations of a politically motivated hacktivist group known as Moses Staff to another nascent threat actor named Abraham's Ax that emerged in November 2022. This is based on "several commonalities across the iconography, videography, and leak sites used by the groups, suggesting they are likely operated by the same entity," Secureworks Counter Threat Unit (CTU) said
What are prisoners getting up to with mobile phones? Why might ransomware no longer be generating as much revenue for cybercriminals? And how on earth did an airline leave the US government's "No Fly" list accessible for anyone in the world to download? All this and much more is discussed in the latest show more ...
edition of the award-winning "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Maria Varmazis.
Websites used by the Hive ransomware-as-a-service gang to extort ransoms and leak data stolen from corporate victims have been seized in a joint operation involving police around the world.
A 22-year-old suspected of being "Seyzo", a member of the ShinyHunters cybercrime gang, has been extradited from Morocco to the United States, where - if convicted - he could face up to 116 years in prison. The ShinyHunters gang became notorious in 2020, following a series of data breaches that impacted over 60 companies - including Microsoft. Read more in my article on the Tripwire State of Security blog.