Security, Privacy and IoT: The Week of February 27th, 2017

Security

If you want a phone that’s less likely to be broken into simply because it does much less, the Nokia 3310 may be for you. No App Store and no wifi reduce its attack surface to whatever vulnerabilities are built into Nokia’s software and its baseband firmware.

https://arstechnica.com/gadgets/2017/02/nokia-3310-hands-on-its-hard-not-to-like-this-modern-take-on-the-feature-phone/

Google disclosed an unpatched vulnerability in Microsoft’s Internet Explorer and Edge browsers which allows an attacker to execute arbitrary code, after reporting it to Microsoft 90 days ago with no patch forthcoming.
https://arstechnica.com/security/2017/02/high-severity-vulnerability-in-edgeie-is-third-unpatched-msft-bug-this-month/

A severe bug in the popular WordPress plugin NextGEN Gallery allows attackers to execute arbitrary SQL code. Keep your WordPress installs and plugins up to date!

https://arstechnica.com/security/2017/02/severe-vulnerability-in-wordpress-plugin-could-affect-1-million-sites/

Slack disclosed a vulnerability in its web app which allowed an attacker access to other users’ authentication tokens (and therefore their Slack accounts). Fortunately there’s no sign that this was ever exploited.

https://www.wired.com/2017/03/hack-brief-slack-bug-everyones-worst-office-nightmare/

Wired has a lightweight non-technical overview of the security mess that awaits the world with connected medical devices.

https://www.wired.com/2017/03/medical-devices-next-security-nightmare/

And Trojan malware has a novel way of receiving commands – via the DNS. Covert communication channels that masquerade or are carried over infrastructure protocols like DNS are a great way to control and communicate with malware.

https://arstechnica.com/security/2017/03/researchers-uncover-powershell-trojan-that-uses-dns-queries-to-get-its-orders/

USB controllers in your computer run their own firmware, which has its own vulnerabilities – independent of the software and OS your computer runs. This firmware may become compromised by malicious USB devices. There is now a USB firewall – plug an untrusted USB device into it and plug it into your computer. The firewall inspects all USB taffic and protects your computer’s USB firmware from malicious requests. Unfortunately, the current version can only run at 12Mbps.

https://github.com/robertfisk/USG/wiki

Privacy

This one belongs under both Privacy and IoT: a children’s connected teddy bear was compromised, leaking 800,000 accounts and held ransom by attackers. Oh, and millions of voice messages were also leaked.

https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings

The latest Yahoo hack is now bad for Yahoo executives, too.

https://arstechnica.com/security/2017/03/marissa-mayer-forgoes-bonus-after-yahoo-botches-hack-investigation/

The FCC has not got your back when it comes to protecting your privacy online.
https://www.wired.com/2017/03/fcc-graciously-sets-internet-providers-free-sell-data/

 

IoT

The Raspberry Pi Zero W – a Raspberry Pi Zero with Wifi and Bluetooth – will be available soon, giving us a new way to embed a little Linux in everything.

https://www.raspberrypi.org/blog/raspberry-pi-zero-w-joins-family/

The Withings brand will vanish as the company is absorbed by its new owner, Nokia. Withings delivered some of the earlier connected devices, like scales and blood pressure cuffs.

https://techcrunch.com/2017/02/26/goodbye-withings-hello-nokia/

Amazon’s Alexa gets even wider distribution as Motorola decides to bake it into their new smart phones as their voice assistant.

https://techcrunch.com/2017/02/26/motorola-picks-amazons-alexa-as-its-voice-assistant/

Share this:
%d bloggers like this:
var _gaq = _gaq || []; var pluginUrl = '//www.google-analytics.com/plugins/ga/inpage_linkid.js'; _gaq.push(['_require', 'inpage_linkid', pluginUrl]); _gaq.push(['_setAccount', 'UA-239812-12']); _gaq.push(['_trackPageview']); (function() { var ga = document.createElement('script'); ga.type = 'text/javascript'; ga.async = true; ga.src = ('https:' == document.location.protocol ? 'https://' : 'http://') + 'stats.g.doubleclick.net/dc.js'; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(ga, s); })();