Technology Get the latest on technology, electronics and software…

The Official Internet/Computer Security News Discussion Thread

Thread Tools
 
Old Jun 6, 2018 | 10:32 PM
  #521  
AZuser's Avatar
_
15 Year Member
Liked
Loved
Community Favorite
 
Joined: Nov 2006
Posts: 19,304
Likes: 3,429
https://www.bleepingcomputer.com/new...d-zte-devices/

VPNFilter Can Also Infect ASUS, D-Link, Huawei, Ubiquiti, UPVEL, and ZTE Devices

June 6, 2018

The VPNFilter malware that infected over 500,000 routers and NAS devices across 54 countries during the past few months is much worse than previously thought.

According to new research technical details published today by the Cisco Talos security team, the malware —which was initially thought to be able to infect devices from Linksys, MikroTik, Netgear, TP-Link, and QNAP— can also infect routers made by ASUS, D-Link, Huawei, Ubiquiti, UPVEL, and ZTE.

The list of devices vulnerable to VPNFilter has seen a sharp jump from Cisco's original report, going from 16 device models to 71 —and possibly more. The full list is embedded at the bottom of this article.

New VPNFilter plugins

Furthermore, researchers have also discovered new VPNFilter capabilities, packed as third-stage plugins, as part of the malware's tri-stage deployment system.



Cisco experts said they discovered the following two new third-stage plugins.

ssler - plugin for intercepting and modifying web traffic on port 80 via man-in-the-middle attacks. Plugin also supports downgrading HTTPS to HTTP.

dstr - plugin to overwriting device firmware files. Cisco knew VPNFilter could wipe device firmware, but in its recent report pinpointed this function to this specific third-stage plugin.
These two new plugins add to the two already known.

ps - plugin that can sniff network packets and detect certain types of network traffic. Cisco believes this plugin was used to look for Modbus TCP/IP packets, often used by industrial software and SCADA equipment, but in its most recent report claims the plugin will also look for industrial equipment that connects over TP-Link R600 virtual private networks as well.

tor - plugin used by VPNFilter bots to communicate with a command and control server via the Tor network.
Technical details about the VPNFilter malware, in general, are available in Cisco's first report. Details about the ssler, dstr, and ps third-stage plugins are available in a report published today.

. . . [ SNIP ] . . .

If users can't update their router's firmware, can't update to a new router, but would still like to wipe the malware from their devices, instructions on how to safely remove the malware are available in this article. Removing VPNFilter from infected devices is quite a challenge, as this malware is one of two malware strains that can achieve boot persistence on SOHO routers and IoT devices. Furthermore, there are no visible signs that a router has been infected with this malware, so unless you can scan your router's firmware, even knowing you're infected is a challenge. The best advice we can give right now is to make sure you're running a router with up-to-date firmware.

. . . [ SNIP ] . . .
Reply
Old Jun 6, 2018 | 11:05 PM
  #522  
#1 STUNNA's Avatar
Thread Starter
Sanest Florida Man
Photogenic
Photoriffic
Shutterbug
Community Influencer
 
Joined: Aug 2007
Posts: 45,985
Likes: 11,771
From: Florida
I mean, it could be Russia, but it could also be China. It could also be lots of other people. It also could be somebody sitting on their bed that weighs 400 pounds, OK?

- Out President
Reply
Old Jun 7, 2018 | 11:14 AM
  #523  
#1 STUNNA's Avatar
Thread Starter
Sanest Florida Man
Photogenic
Photoriffic
Shutterbug
Community Influencer
 
Joined: Aug 2007
Posts: 45,985
Likes: 11,771
From: Florida
Click here to optout of a bunch of ad trackers http://optout.aboutads.info


Reply
Old Jun 7, 2018 | 11:31 AM
  #524  
stogie1020's Avatar
Needs more Lemon Pledge
 
Joined: Mar 2005
Posts: 52,768
Likes: 2,000
From: Phoenix, AZ
Netgear has updated firmware out (at least for my model router).
Reply
Old Jun 7, 2018 | 12:01 PM
  #525  
justnspace's Avatar
Moderator
15 Year Member
Liked
Loved
Community Favorite
iTrader: (1)
 
Joined: Feb 2010
Posts: 86,293
Likes: 16,291
glad I rebooted my asus router; it's now on the new list.
Reply
Old Aug 14, 2018 | 05:27 PM
  #526  
doopstr's Avatar
Team Owner
20 Year Member
Liked
Loved
Community Favorite
 
Joined: Jan 2001
Posts: 25,967
Likes: 2,685
From: Jersey
https://www.intel.com/content/www/us...-sa-00161.html
Summary:

Security researchers have identified a speculative execution side-channel method called L1 Terminal Fault (L1TF). This method impacts select microprocessor products supporting Intel® Software Guard Extensions (Intel® SGX). Further investigation by Intel has identified two related applications of L1TF with the potential to impact additional microprocessors, operating systems, system management mode, and virtualization software. If used for malicious purposes, this class of vulnerability has the potential to improperly infer data values from multiple types of computing devices.


Intel is committed to product and customer security and to coordinated disclosure. We worked closely with other technology companies, operating system, and hypervisor software vendors, developing an industry-wide approach to mitigate these issues promptly and constructively.
For facts about these new exploits, technical resources, and steps you can take to help protect systems and information please visit: https://www.intel.com/securityfirst.
Reply
Old Aug 25, 2018 | 11:31 AM
  #527  
doopstr's Avatar
Team Owner
20 Year Member
Liked
Loved
Community Favorite
 
Joined: Jan 2001
Posts: 25,967
Likes: 2,685
From: Jersey
https://www.tomshardware.com/news/di...ity,37690.html
Theo de Raadt, founder of OpenBSD, which makes a free, multi-platform, UNIX-like operating system, recommended everyone completely disable Intel’s Hyper-Threading in BIOS before hackers start taking advantage of it.

Hyper-Threading Is Unsafe

In a post this week, de Raadt said that the Foreshadow and TLBleed flaws have made it mandatory to disable the Hyper-Threading technology on all Intel-based machines. He claimed mitigating these flaws requires a new CPU microcode and coding workarounds, but these alone are not sufficient to stop attackers; Hyper-Threading also has to be disabled.
OpenBSD version 6.4 and newer will disable Hyper-Threading completely.

Last edited by doopstr; Aug 25, 2018 at 11:37 AM.
Reply
Old Aug 28, 2018 | 01:51 PM
  #528  
stogie1020's Avatar
Needs more Lemon Pledge
 
Joined: Mar 2005
Posts: 52,768
Likes: 2,000
From: Phoenix, AZ
Hmmmm. Not sure I am going to disable hyperthreading.
Reply
Old Oct 4, 2018 | 09:59 AM
  #529  
#1 STUNNA's Avatar
Thread Starter
Sanest Florida Man
Photogenic
Photoriffic
Shutterbug
Community Influencer
 
Joined: Aug 2007
Posts: 45,985
Likes: 11,771
From: Florida
I just got a text message from Paypal that said "Paypal: Your security code is: 443162...."

Except I wasn't in front of a computer, I wasn't trying to access my account, I didn't have paypal tab open on another PC. I usually only get that when I sign in to Paypal which i wasn't doing. So was someone signing in to my account!? I use lastpass and my paypal password is 20 characters long, unique, gibberish password. It's not used anywhere else, and you can't brute force it.

I'm just assuming that something glitched with paypal's 2fa server and sent codes to the wrong person, or maybe someone typed my number into their account and now I'm getting their codes, Either way, I changed my Paypal password to a different 20 character unique complex pw. Still weird.

Anyone else with paypal 2fa just get a text from them?
Reply
Old Oct 4, 2018 | 10:15 AM
  #530  
Whiskers's Avatar
Go Giants
20 Year Member
Liked
Loved
Community Favorite
 
Joined: Aug 2004
Posts: 70,003
Likes: 1,260
From: PA
No but happened to me the other day with Amazon. I changed the password
Reply
Old Oct 4, 2018 | 10:47 AM
  #531  
thoiboi's Avatar
Senior Moderator
15 Year Member
Community Builder
Loved
Community Favorite
 
Joined: Apr 2010
Posts: 48,302
Likes: 9,172
From: SoCal, CA
A while ago, a friend posted a white paper about why 2FA via text message is not secure due to the ability to hijack numbers. My 2FA method of choice is Google Authenticator but not all sites support a 3rd party code generator yet.
Reply
Old Oct 4, 2018 | 10:54 AM
  #532  
stogie1020's Avatar
Needs more Lemon Pledge
 
Joined: Mar 2005
Posts: 52,768
Likes: 2,000
From: Phoenix, AZ
Originally Posted by thoiboi
A while ago, a friend posted a white paper about why 2FA via text message is not secure due to the ability to hijack numbers. My 2FA method of choice is Google Authenticator but not all sites support a 3rd party code generator yet.
Yes they can spoof a cell number, but they have to know WHICH cell number to spoof. The concern is more of a targeted attack (where your cell number and various accounts may already be known) than random mass account hijacks. Unless, of course, the service is warehousing your account credentials AND your 2FA tel number in plain text on the same storage server...
Reply
Old Oct 4, 2018 | 11:32 AM
  #533  
thoiboi's Avatar
Senior Moderator
15 Year Member
Community Builder
Loved
Community Favorite
 
Joined: Apr 2010
Posts: 48,302
Likes: 9,172
From: SoCal, CA
Originally Posted by stogie1020
Yes they can spoof a cell number, but they have to know WHICH cell number to spoof. The concern is more of a targeted attack (where your cell number and various accounts may already be known) than random mass account hijacks. Unless, of course, the service is warehousing your account credentials AND your 2FA tel number in plain text on the same storage server...
I mean it's paypal we're talking about
Reply
Old Oct 4, 2018 | 11:33 AM
  #534  
#1 STUNNA's Avatar
Thread Starter
Sanest Florida Man
Photogenic
Photoriffic
Shutterbug
Community Influencer
 
Joined: Aug 2007
Posts: 45,985
Likes: 11,771
From: Florida
I always use an app if it's available, unless something has changed they don't support 2FA apps
Reply
Old Oct 4, 2018 | 09:02 PM
  #535  
doopstr's Avatar
Team Owner
20 Year Member
Liked
Loved
Community Favorite
 
Joined: Jan 2001
Posts: 25,967
Likes: 2,685
From: Jersey
https://www.bloomberg.com/news/featu...-top-companies

The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies


Reply
Old Oct 4, 2018 | 09:08 PM
  #536  
doopstr's Avatar
Team Owner
20 Year Member
Liked
Loved
Community Favorite
 
Joined: Jan 2001
Posts: 25,967
Likes: 2,685
From: Jersey
https://www.supermicro.com/newsroom/..._Bloomberg.cfm
Supermicro Refutes Claims in Bloomberg Article

Supermicro along with Apple and Amazon refute claims in Bloomberg story

https://aws.amazon.com/blogs/securit...neous-article/

Last edited by doopstr; Oct 4, 2018 at 09:11 PM.
Reply
Old Oct 5, 2018 | 07:58 AM
  #537  
George Knighton's Avatar
Grandpa
 
Joined: Dec 2003
Posts: 7,596
Likes: 2,609
From: Virginia, Besieged
Originally Posted by doopstr
https://www.supermicro.com/newsroom/..._Bloomberg.cfm
Supermicro Refutes Claims in Bloomberg Article

Supermicro along with Apple and Amazon refute claims in Bloomberg story

https://aws.amazon.com/blogs/securit...neous-article/
I'd feel better about this if that weren't exactly what they'd say, and if there weren't activities at Apple in 2015, and at Amazon and Apple in 2017, that might indicate that they knew that something was going on.

That's not a validation of anything, just some weird, circumstantial and coincidental evidence.

I guess.

0_o
Reply
Old Nov 2, 2018 | 04:54 PM
  #538  
doopstr's Avatar
Team Owner
20 Year Member
Liked
Loved
Community Favorite
 
Joined: Jan 2001
Posts: 25,967
Likes: 2,685
From: Jersey
Another Hyperthreading vulnerability. And WTF saying AMD likely impacted but they didn't bother to test.

https://www.zdnet.com/article/intel-...vulnerability/

Intel CPUs impacted by new PortSmash side-channel vulnerability

Vulnerability confirmed on Skylake and Kaby Lake CPU series. Researchers suspect AMD processors are also impacted.
Reply
Old Nov 5, 2018 | 09:58 AM
  #539  
stogie1020's Avatar
Needs more Lemon Pledge
 
Joined: Mar 2005
Posts: 52,768
Likes: 2,000
From: Phoenix, AZ
Originally Posted by doopstr
Another Hyperthreading vulnerability. And WTF saying AMD likely impacted but they didn't bother to test.

https://www.zdnet.com/article/intel-...vulnerability/

Intel CPUs impacted by new PortSmash side-channel vulnerability

Vulnerability confirmed on Skylake and Kaby Lake CPU series. Researchers suspect AMD processors are also impacted.
Researchers say they notified Intel's security team last month, on October 1, but the company has not provided a patch until yesterday, the date on which researchers went public with their findings.
So, patched.
Reply
Old Mar 5, 2019 | 06:09 PM
  #540  
doopstr's Avatar
Team Owner
20 Year Member
Liked
Loved
Community Favorite
 
Joined: Jan 2001
Posts: 25,967
Likes: 2,685
From: Jersey
New vulnerability found in Intel CPUs. Not present in AMD or ARM.

All Intel chips open to new Spoiler non-Spectre attack: Don't expect a quick fix
Researchers say Intel won't be able to use a software mitigation to fully address the problem Spoiler exploits.
https://www.zdnet.com/article/all-in...t-a-quick-fix/

Last edited by doopstr; Mar 5, 2019 at 06:13 PM.
Reply
Old Mar 5, 2019 | 09:55 PM
  #541  
Will Y.'s Avatar
Registered but harmless
20 Year Member
 
Joined: Aug 2005
Posts: 14,888
Likes: 1,164
From: Los Angeles, CA
Question Kaspersky replacement?

I'm running Kaspersky Total Security on several computers.
Are there any good alternatives to Kaspersky Total Security which are both active and passive while combining security, anti-malware and anti-virus functions without a connection to the FSB and Internet Research Institute?
Reply
Old Mar 5, 2019 | 11:54 PM
  #542  
AZuser's Avatar
_
15 Year Member
Liked
Loved
Community Favorite
 
Joined: Nov 2006
Posts: 19,304
Likes: 3,429
Bitdefender

https://www.av-comparatives.org/test...y-report-2018/
Reply
Old Mar 6, 2019 | 09:53 AM
  #543  
stogie1020's Avatar
Needs more Lemon Pledge
 
Joined: Mar 2005
Posts: 52,768
Likes: 2,000
From: Phoenix, AZ
Originally Posted by AZuser
^Werd

Company is based out of Romania.
Reply
Old Mar 6, 2019 | 10:24 PM
  #544  
Will Y.'s Avatar
Registered but harmless
20 Year Member
 
Joined: Aug 2005
Posts: 14,888
Likes: 1,164
From: Los Angeles, CA
Originally Posted by AZuser
I'll check it out; thanks!
Originally Posted by stogie1020
^Werd

Company is based out of Romania.
At least it's in a NATO country; vampires are less scary than the FSB anyway.
Reply
Old Apr 11, 2019 | 01:01 PM
  #545  
AZuser's Avatar
_
15 Year Member
Liked
Loved
Community Favorite
 
Joined: Nov 2006
Posts: 19,304
Likes: 3,429
https://www.zdnet.com/article/dragon...wpa3-standard/

Dragonblood vulnerabilities disclosed in WiFi WPA3 standard

April 10, 2019

Two security researchers disclosed details today about a group of vulnerabilities collectively referred to as Dragonblood that impact the WiFi Alliance's recently launched WPA3 Wi-Fi security and authentication standard.

If ever exploited, the vulnerabilities would allow an attacker within the range of a victim's network to recover the Wi-Fi password and infiltrate the target's network.

The Dragonblood vulnerabilities

In total, five vulnerabilities are part of the Dragonblood ensemble --a denial of service attack, two downgrade attacks, and two side-channel information leaks.

While the denial of service attack is somewhat unimportant as it only leads to crashing WPA3-compatible access points, the other four are the ones that can be used to recover user passwords.

Both the two downgrade attacks and two side-channel leaks exploit design flaws in the WPA3 standard's Dragonfly key exchange --the mechanism through which clients authenticate on a WPA3 router or access point.

In a downgrade attack, WiFi WPA3-capable networks can be coerced in using an older and more insecure password exchange systems, which can allow attackers to retrieve the network passwords using older flaws.

In a side-channel information leak attack, WiFi WPA3-capable networks can trick devices into using weaker algorithms that leak small ammounts of information about the network password. With repeated attacks, the full password can eventually be recovered.

Downgrade to Dictionary Attack - works on networks where both WPA3 and WPA2 are supported at the same time via WPA3's "transition mode." This attack has been confirmed on a recently released Samsung Galaxy S10 device. Explainer below:

If a client and AP both support WPA2 and WPA3, an adversary can set up a rogue AP that only supports WPA2. This causes the client (i.e. victim) to connect using WPA2's 4-way handshake. Although the client detects the downgrade-to-WPA2 during the 4-way handshake, this is too late. The 4-way handshake messages that were exchanged before the downgrade was detected, provide enough information to launch an offline dictionary attack.
Group Downgrade Attack - works when WPA3 is configured to work with multiple groups of cryptographic algorithms, instead of just one. Basic downgrade attack. Explainer below:

For example, say a client supports the elliptic curves P-521 and P-256, and prefers to use them in that order. In that case, even thoug the AP also supports the P-521 curve, an adversary can force the client and AP into using the weaker P-256 curve. This can be accomplished by jamming the messages of the Dragonfly handshake, and forging a message that indicates certain curves are not supported.
Cache-Based Side-Channel Attack (CVE-2019-9494) - exploits the Dragonfly's protocol's "hunting and pecking" algorithm. High-level explainer below.

If an adversary can determine which branch of the if-then-else branch was taken, they can learn whether the password element was found in a specific iteration of this algorithm. In practice we found that, if an adversary can run unprivileged code on the victim machine, we were able to use cache-based attacks to determine which branch was taken in the first iteration of the password generation algorithm. This information can be abused to perform a password partitioning attack (this is similar to an offline dictionary attack).
Timing-Based Side-Channel Attack (CVE-2019-9494) - exploits WPA3's "multiplicative groups" feature. Explainer below:

When the Dragonfly handshake uses certain multiplicative groups, the password encoding algorithm uses a variable number of iteratins to encode the password. The precise number of iterations depends on the password being used, and the MAC address of the AP and client. An adversary can perform a remote timing attack against the password encoding algorithm, to determine how many iterations were needed to encode the password. The recovered information can be abused to perform a password partitioning attack, which is similar to an offline dictionary attack.
More detailed explanations for each of these vulnerabilities are available in an academic paper authored by Mathy Vanhoef and Eyal Ronen, titled "Dragonblood: A Security Analysis of WPA3's SAE Handshake" --or this website dedicated to the Dragonblood vulnerabilities.

Dargonblood also impacts EAP-pwd

Besides WPA3, researchers said the Dragonblood vulnerabilities also impact the EAP-pwd (Extensible Authentication Protocol) that is supported in the previous WPA and WPA2 WiFi authentication standards.

"We [...] discovered serious bugs in most products that implement EAP-pwd," the research duo said. "These allow an adversary to impersonate any user, and thereby access the Wi-Fi network, without knowing the user's password."

The two researchers didn't publish details how the Dragonblood vulnerabilities impact EAP-pwd because the patching process is still in progress. They did, however, publish tools that can be used to discover if WPA3-capable devices are vulnerbale to any of the major Dragonblood flaws.

Fixes for WPA3 are available

On the other hand, the WiFi Alliance announced today a security update for the WPA3 standard following Vanhoef and Ronen's public disclosure of the Dragonblood flaws.

"These issues can all be mitigated through software updates without any impact on devices' ability to work well together," the WiFi Alliance said today in a press release. Vendors of WiFi products will now have to integrate these changes into their products via firmware updates.

Vanhoef is the same security researcher who in the fall of 2017 disclosed the KRACK attack on the WiFi WPA2 standard, which was the main reason the WiFi Alliance developed WPA3 in the first place.
Reply
Old Apr 14, 2019 | 10:15 AM
  #546  
nfnsquared's Avatar
Race Director
 
Joined: Dec 2003
Posts: 12,521
Likes: 1,824
From: MAGA country
XP is officially dead:

https://www.extremetech.com/computin...rs-post-launch
Reply
Old May 14, 2019 | 07:40 PM
  #547  
doopstr's Avatar
Team Owner
20 Year Member
Liked
Loved
Community Favorite
 
Joined: Jan 2001
Posts: 25,967
Likes: 2,685
From: Jersey
If you so desire, here is information on how to disable hyperthreading on mac, windows, redhat.
https://support.apple.com/en-us/HT210108
https://support.microsoft.com/en-us/...n-side-channel
https://support.microsoft.com/en-us/...n-side-channel
Reply
Old May 14, 2019 | 08:01 PM
  #548  
doopstr's Avatar
Team Owner
20 Year Member
Liked
Loved
Community Favorite
 
Joined: Jan 2001
Posts: 25,967
Likes: 2,685
From: Jersey
https://mdsattacks.com/

RIDL and Fallout: MDS attacks

Attacks on the newly-disclosed "MDS" hardware vulnerabilities in Intel CPUs
Reply
Old May 21, 2019 | 08:20 AM
  #549  
AZuser's Avatar
_
15 Year Member
Liked
Loved
Community Favorite
 
Joined: Nov 2006
Posts: 19,304
Likes: 3,429
https://www.extremetech.com/computin...wn-mds-patches

Intel Performance Hit 5x Harder Than AMD After Spectre, Meltdown Patches

May 20, 2019

Ever since Spectre and Meltdown broke in January 2018, we’ve known that the combined impact of patching these security issues would impact raw performance. The question, especially as new disclosures have stacked up, is how large the impacts would be and how would they change the performance comparison between Intel and AMD?

Phoronix has put that question to the test with a substantial suite of benchmarks across multiple Intel platforms, including the 6800K (Broadwell-E), 8700K (Coffee Lake), 7980XE (Skylake-SP), Ryzen 7 2700X, and Threadripper 2990WX. These chips collectively represent all of the recent major architectures in play.

The collective impact of enabling all patches is not a positive for Intel. While the impacts vary tremendously from virtually nothing too significant on an application-by-application level, the collective whack is ~15-16 percent on all Intel CPUs without Hyper-Threading disabled. Disabling increases the overall performance impact to 20 percent (for the 7980XE), 24.8 percent (8700K) and 20.5 percent (6800K).

The AMD CPUs are not tested with HT disabled, because disabling SMT isn’t a required fix for the situation on AMD chips, but the cumulative impact of the decline is much smaller. AMD loses ~3 percent with all fixes enabled.

. . . .

[ SNIP ]
Reply
Old May 31, 2019 | 04:58 PM
  #550  
doopstr's Avatar
Team Owner
20 Year Member
Liked
Loved
Community Favorite
 
Joined: Jan 2001
Posts: 25,967
Likes: 2,685
From: Jersey
Hey you know what stuff Intel said they fixed? They didn't fix it.
https://arxiv.org/abs/1905.12701
Recently, out-of-order execution, an important performance optimization in modern high-end processors, has been revealed to pose a significant security threat, allowing information leaks across security domains. In particular, the Meltdown attack leaks information from the operating system kernel to user space, completely eroding the security of the system. To address this and similar attacks, without incurring the performance costs of software countermeasures, Intel includes hardware-based defenses in its recent Coffee Lake R processors.
In this work, we show that the recent hardware defenses are not sufficient. Specifically, we present Fallout, a new transient execution attack that leaks information from a previously unexplored microarchitectural component called the store buffer. We show how unprivileged user processes can exploit Fallout to reconstruct privileged information recently written by the kernel. We further show how Fallout can be used to bypass kernel address space randomization. Finally, we identify and explore microcode assists as a hitherto ignored cause of transient execution.
Fallout affects all processor generations we have tested. However, we notice a worrying regression, where the newer Coffee Lake R processors are more vulnerable to Fallout than older generations.
Reply
Old May 31, 2019 | 07:30 PM
  #551  
stogie1020's Avatar
Needs more Lemon Pledge
 
Joined: Mar 2005
Posts: 52,768
Likes: 2,000
From: Phoenix, AZ
Crap, I was about to plunk down cash on a coffee lake hoping I had left these issues behind...
Reply
Old Jun 4, 2019 | 10:52 AM
  #552  
stogie1020's Avatar
Needs more Lemon Pledge
 
Joined: Mar 2005
Posts: 52,768
Likes: 2,000
From: Phoenix, AZ
This video is NSFW (language) and cracked me up. it gets better and better as it plays...

Reply
Old Aug 13, 2019 | 01:04 PM
  #553  
stogie1020's Avatar
Needs more Lemon Pledge
 
Joined: Mar 2005
Posts: 52,768
Likes: 2,000
From: Phoenix, AZ
SWAPGS vulnerability in all Ivy Bridge and later Intel Processors using speculative execution

https://www.bitdefender.com/business...ecommendations
Reply
Old Aug 13, 2019 | 02:34 PM
  #554  
#1 STUNNA's Avatar
Thread Starter
Sanest Florida Man
Photogenic
Photoriffic
Shutterbug
Community Influencer
 
Joined: Aug 2007
Posts: 45,985
Likes: 11,771
From: Florida
this is just going to be an endless game of whack a mole from now on, isn't it
Reply
Old Aug 13, 2019 | 03:32 PM
  #555  
stogie1020's Avatar
Needs more Lemon Pledge
 
Joined: Mar 2005
Posts: 52,768
Likes: 2,000
From: Phoenix, AZ
Originally Posted by #1 STUNNA
this is just going to be an endless game of whack a mole from now on, isn't it
What is interesting is that BitDefender has a VM tool thta they say negates these threats.

It makes me think that the CPUs themselves need to be separated (or integrated) into greater virtualization to prevent these types of attacks. A completely virtual OS of sorts...

Bitdefender has demonstrated how Hypervisor Introspection stops the attack by removing conditions it needs to succeed on unpatched Windows systems. This mitigation has introduced no noticeable performance degradation. While deploying the patch from Microsoft is highly recommended, Hypervisor Introspection provides an effective compensating control until systems can be patched.
Reply
Old Sep 6, 2019 | 12:02 PM
  #556  
stogie1020's Avatar
Needs more Lemon Pledge
 
Joined: Mar 2005
Posts: 52,768
Likes: 2,000
From: Phoenix, AZ
Ran into an interesting phishing vector...

My wife had an event invitation appear in her google Calendar with a message saying something like "Accept: Pickup Free Samsung S9" and there was a link in the calendar invite.

She had not received any emails with an invitation, so this came directly through the Google Calendar interface.

This article has the info about it along with the remedy:

https://www.wired.com/story/phishing...endar-invites/

TLDR: Open Google Calendar's settings on a desktop browser and go to Event Settings > Automatically Add Invitations, and then select the option "No, only show invitations to which I've responded." Also, under View Options, make sure that "Show declined events" is unchecked, so malicious events don't haunt you even after you decline them.
Reply
Old Sep 23, 2019 | 05:17 PM
  #557  
doopstr's Avatar
Team Owner
20 Year Member
Liked
Loved
Community Favorite
 
Joined: Jan 2001
Posts: 25,967
Likes: 2,685
From: Jersey
https://www.us-cert.gov/ncas/current...curity-updates

Microsoft Releases Out-of-Band Security Updates

Microsoft has released out-of-band security updates to address vulnerabilities in Microsoft software. A remote attacker could exploit of these vulnerabilities to take control of an affected system.

The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review Microsoft Security Advisories for CVE-2019-1367, CVE-2019-1255, and Microsoft’s Cumulative security update for Internet Explorer and apply the necessary updates.
Reply
Old Sep 29, 2019 | 03:52 PM
  #558  
doopstr's Avatar
Team Owner
20 Year Member
Liked
Loved
Community Favorite
 
Joined: Jan 2001
Posts: 25,967
Likes: 2,685
From: Jersey

Microsoft Stops Trusting SSD Makers

https://www.tomshardware.com/news/bi...sds,40504.html

Windows ships with a full volume encryption tool called BitLocker. The feature used to trust any SSD that claimed to offer its own hardware-based encryption, but that changed in the KB4516071 update to Windows 10 released on September 24, which now assumes that connected SSDs don't actually encrypt anything.

"SwiftOnSecurity" called attention to this change on September 26. The pseudonymous Twitter user then reminded everyone of a November 2018 report that revealed security flaws, such as the use of master passwords set by manufacturers, of self-encrypting drives. That meant people who purchased SSDs that were supposed to help keep their data secure might as well have purchased a drive that didn't handle its own encryption instead.

Those people were actually worse off than anticipated because Microsoft set up BitLocker to leave these self-encrypting drives to their own devices. This was supposed to help with performance--the drives could use their own hardware to encrypt their contents rather than using the CPU--without compromising the drive's security. Now it seems the company will no longer trust SSD manufacturers to keep their customers safe by themselves.
Reply
Old Oct 5, 2019 | 11:48 PM
  #559  
#1 STUNNA's Avatar
Thread Starter
Sanest Florida Man
Photogenic
Photoriffic
Shutterbug
Community Influencer
 
Joined: Aug 2007
Posts: 45,985
Likes: 11,771
From: Florida
AZ has 2FA now!

When the hell did that happen!?

https://acurazine.com/forums/security.php
Reply
Old Jan 14, 2020 | 06:42 PM
  #560  
doopstr's Avatar
Team Owner
20 Year Member
Liked
Loved
Community Favorite
 
Joined: Jan 2001
Posts: 25,967
Likes: 2,685
From: Jersey
Patch your crap
https://arstechnica.com/information-...ion-is-broken/

Patch Windows 10 and Server now because certificate validation is broken

Reply



All times are GMT -5. The time now is 03:04 PM.