PinMe: Tracking a Smartphone User around the World with GPS and WiFi off

We describe PinMe, a novel user-location mechanism that exploits non-sensory/sensory data stored on the smartphone, e.g., the environment’s air pressure, along with publicly-available auxiliary information, e.g., elevation maps, to estimate the user’s location when all location services, e.g., GPS, are turned off. Source: [1802.01468] PinMe: Tracking a Smartphone User around the World

Maybe you should’ve stuck with NetWare: Hijackers can bypass Active Directory controls

“The idea of a rogue domain controller is not new and has been mentioned multiple times in previous security publications but required invasive techniques (like installing a virtual machine with Windows Server) and to log on a regular domain controller (DC) to promote the VM into a DC for the targeted domain.”That’s easily spotted, so Read more about Maybe you should’ve stuck with NetWare: Hijackers can bypass Active Directory controls[…]

Lenovo Fingerprint Manager Pro for Windows has a hardcoded password

A vulnerability has been identified in Lenovo Fingerprint Manager Pro. Sensitive data stored by Lenovo Fingerprint Manager Pro, including users’ Windows logon credentials, is encrypted using a weak algorithm, contains a hard-coded password, and is accessible to all users with local non-administrative access to the system it is installed in. Source: Lenovo Fingerprint Manager Pro Read more about Lenovo Fingerprint Manager Pro for Windows has a hardcoded password[…]

Heat Map Released by Fitness Tracker Reveals Location of Secret Military Bases

Strava which markets itself as a “social-networking app for athletes” publicly made available the global heat map, showing the location of all the rides, runs, swims, and downhills taken by its users, as collected by their smartphones and wearable devices like Fitbit. Since Strava has been designed to track users’ routes and locations, IUCA analyst Read more about Heat Map Released by Fitness Tracker Reveals Location of Secret Military Bases[…]

Dutch agencies provide crucial intel about Russia’s interference in US-elections, US burns the Dutch source

The Cozy Bear hackers are in a space in a university building near the Red Square. The group’s composition varies, usually about ten people are active. The entrance is in a curved hallway. A security camera records who enters and who exits the room. The AIVD hackers manage to gain access to that camera. Not Read more about Dutch agencies provide crucial intel about Russia’s interference in US-elections, US burns the Dutch source[…]

Researchers find a way to link TOR / Silk Road BTC expenditure to people using two datasets

To do so, the Qatari researchers first collected dozens of bitcoin addresses used for donations and dealmaking by websites protected by the anonymity software Tor, run by everyone from WikiLeaks to the now-defunct Silk Road. Then they scraped thousands of more widely visible bitcoin addresses from the public accounts of users on Twitter and the Read more about Researchers find a way to link TOR / Silk Road BTC expenditure to people using two datasets[…]

Easy to watch over your shoulder at your Tindering

Checkmarx researchers disclosed two flaws (CVE-2018-6017, CVE-2018-6018) and a proof of concept (see video below) for an app that could sit on the wireless network of, say, an airport or hotel and observe actions including profile views, swipes, and likes. The first issue, CVE-2018-6017, results from the Tinder’s app’s use of insecure HTTP connections to Read more about Easy to watch over your shoulder at your Tindering[…]

It’s 2018 and your Macs, iPhones can be pwned by playing evil music: lots of patches

Apple has released security patches for iOS and macOS that include, among other things, Meltdown and Spectre fixes. The new versions should be installed as soon as possible. […] Less-hyped, but still serious, are vulnerabilities in the macOS kernel that include an exploitable race condition (CVE-2018-4092), a validation issue (CVE-2018-4093), and memory initialization bug (CVE-2018-4090) Read more about It’s 2018 and your Macs, iPhones can be pwned by playing evil music: lots of patches[…]

Skype, Signal, Slack, other apps inherit Electron vuln

Electron is a node.js and Chromium framework that lets developers use Web technologies (JavaScript, HTML and CSS) to build desktop apps. It’s widely-used: Skype, Slack, Signal, a Basecamp implementation and a desktop WordPress app all count themselves as adopters. Slack users should update to version 3.0.3 or better, and the latest version of Skype for Read more about Skype, Signal, Slack, other apps inherit Electron vuln[…]

Intel patches for Spectre cause reboots, Intel tells people to stop installing them and also please help test for them

As we start the week, I want to provide an update on the reboot issues we reported Jan. 11. We have now identified the root cause for Broadwell and Haswell platforms, and made good progress in developing a solution to address it. Over the weekend, we began rolling out an early version of the updated Read more about Intel patches for Spectre cause reboots, Intel tells people to stop installing them and also please help test for them[…]

Someone is touting a mobile, PC spyware platform called Dark Caracal to governments

Dark Caracal [PDF] appears to be controlled from the Lebanon General Directorate of General Security in Beirut – an intelligence agency – and has slurped hundreds of gigabytes of information from devices. It shares its backend infrastructure with another state-sponsored surveillance campaign, Operation Manul, which the EFF claims was operated by the Kazakhstan government last Read more about Someone is touting a mobile, PC spyware platform called Dark Caracal to governments[…]

Lenovo inherited a switch authentication bypass

Lenovo has patched an ancient vulnerability in switches that it acquired along with IBM’s hardware businesses and which Big Blue itself acquired when it slurped parts of Nortel. The bug, which Lenovo refers to as “HP backdoor”, for reasons it has not explained, has been in present in ENOS (Enterprise network operating system) since at Read more about Lenovo inherited a switch authentication bypass[…]

OnePlus suspends credit card transactions after fraud

Over the weekend, members of the OnePlus community reported cases of unknown credit card transactions occurring on their credit cards post purchase from oneplus.net. We immediately began to investigate as a matter of urgency, and will keep you updated. […] As a precaution, we are temporarily disabling credit card payments at oneplus.net. PayPal is still Read more about OnePlus suspends credit card transactions after fraud[…]

All Intel laptops open to unlocking with ctrl-P and “admin”. Another fatal flaw in Intel Management Engine.

F-Secure reports a security issue affecting most corporate laptops that allows an attacker with physical access to backdoor a device in less than 30 seconds. The issue allows the attacker to bypass the need to enter credentials, including BIOS and Bitlocker passwords and TPM pins, and to gain remote access for later exploitation. It exists Read more about All Intel laptops open to unlocking with ctrl-P and “admin”. Another fatal flaw in Intel Management Engine.[…]

Let’s Encrypt plugs hole that let miscreants grab HTTPS web certs for strangers’ domains

Let’s Encrypt – a SSL/TLS certificate authority run by the non-profit Internet Security Research Group (ISRG) to programmatically provide websites with free certs for their HTTPS websites – on Thursday said it is discontinuing TLS-SNI validation because it’s insecure in the context of many shared hosting providers. TLS-SNI is one of three ways Let’s Encrypt’s Read more about Let’s Encrypt plugs hole that let miscreants grab HTTPS web certs for strangers’ domains[…]

Adult Themed Virtual Reality App spills Names, Emails of Thousands

Researchers at the firm Digital Interruption on Tuesday warned that an adult-themed virtual reality application, SinVR, exposes the names, email and other personal information via an insecure desktop application – a potentially embarrassing security lapse. The company decided to go public with the information after being frustrated in multiple efforts to responsibly disclose the vulnerability Read more about Adult Themed Virtual Reality App spills Names, Emails of Thousands[…]

Wait, what? The Linux Kernel Mailing List archives lived on ONE PC? One BROKEN PC?

Spare a thought for Jasper Spaans, who hosts the Linux Kernel Mailing List archive from a single PC that lives in his home. And since things always happen this way the home machine died while he was on holiday. The archive was therefore unavailable for much of the weekend, although Linux developers could still use Read more about Wait, what? The Linux Kernel Mailing List archives lived on ONE PC? One BROKEN PC?[…]

EMC, VMware security bugs throw gasoline on cloud security fire

While everyone was screaming about Meltdown and Spectre, another urgent security fix was already in progress for many corporate data centers and cloud providers who use products from Dell’s EMC and VMware units. A trio of critical, newly reported vulnerabilities in EMC and VMware backup and recovery tools—EMC Avamar, EMC NetWorker, EMC Integrated Data Protection Read more about EMC, VMware security bugs throw gasoline on cloud security fire[…]

Okay, Google: why does Chromecast clobber Wi-Fi connections?

Wi-Fi router vendors have started issuing patches to defend their products against Google Chromecast devices.TP-Link and Linksys were first out of the blocks with firmware fixes, and TP-Link has posted this explanation of the issue. The bug is not in the routers, but in Google’s “Cast” feature, used in Chromecast, Google Home, and other devices. Read more about Okay, Google: why does Chromecast clobber Wi-Fi connections?[…]

WhatsApp Security Design Could Let an Infiltrator Add Members to Group Chats

Only admins can add new members to private groups. But the researchers found that anyone in control of the server can spoof the authentication process, essentially granting themselves the privileges necessary to add new members who can snoop on private conversations. The obvious examples that come to mind are hackers who manage to gain access Read more about WhatsApp Security Design Could Let an Infiltrator Add Members to Group Chats[…]

Stop us if you’ve heard this one: Apple’s password protection in macOS can be thwarted

An Apple developer has uncovered another embarrassing vulnerability in macOS High Sierra, aka version 10.13, that lets someone bypass part of the operating system’s password protections.This time, a vulnerable dialog box was found in the System Preferences panel for the App Store settings. The bug, reported by developer Eric Holtam to the Open Radar bug Read more about Stop us if you’ve heard this one: Apple’s password protection in macOS can be thwarted[…]

Yahooooo! says! its! email! is! scrahoooo-ed!

Yahoo! Mail – yes, amazingly it is still a thing – is today taking a break from business as usual norms with the service down for almost the past seven hours.Since circa 9am, the email service has received hundreds of complaints an hour on downdetector.co.uk, with users moaning about persistant “error 15” messages, and others Read more about Yahooooo! says! its! email! is! scrahoooo-ed![…]

Western Digital ‘My Cloud’ devices have a hardcoded backdoor — stop using these NAS drives NOW!

Today, yet another security blunder becomes publicized, and it is really bad. You see, many Western Digital My Cloud NAS drives have a hardcoded backdoor, meaning anyone can access them — your files could be at risk. It isn’t even hard to take advantage of it — the username is “mydlinkBRionyg” and the password is Read more about Western Digital ‘My Cloud’ devices have a hardcoded backdoor — stop using these NAS drives NOW![…]

Edward Snowden’s New App Uses Your Smartphone to Physically Guard Your Laptop

My disk is encrypted, but all it takes to bypass this protection is for an attacker — a malicious hotel housekeeper, or “evil maid,” for example — to spend a few minutes physically tampering with it without my knowledge. If I come back and continue to use my compromised computer, the attacker could gain access Read more about Edward Snowden’s New App Uses Your Smartphone to Physically Guard Your Laptop[…]