I hadn’t flown on United Airlines for a long time. But in August 2016, I booked a flight with them and tried to manage it via my United.com account. That was a mistake. Instead of providing real, useful security (like multi-factor authentication or Touch ID on the iPhone app), United insisted that I set up five personal security questions before I could access my account. All I needed to do was check in, but United decided they’d like me to do a pointless security dance for them.
Google has launched several new tools for Google Cloud Platform and G Suite (formerly Google Apps):
Got a Nintendo Switch? Then you also have a vulnerable version of WebKit. The Switch shipped with an old version of WebKit with known vulnerabilities.
The biggest story in security this week is Wikileaks’ dump of CIA documents, reminding people that yes, the CIA is a spy agency and that yes, spy agencies would want to have cracking tools.
The big takeaways are that they have tools for hacking specific devices. Wikileaks spun this as the CIA being able to crack Signal and Whatsapp, but nothing in the documents indicates that – it’s more that the CIA can take control of the phone’s or computer’s OS – once that’s done, they can compromise any app without breaking its protocol.
If you want a phone that’s less likely to be broken into simply because it does much less, the Nokia 3310 may be for you. No App Store and no wifi reduce its attack surface to whatever vulnerabilities are built into Nokia’s software and its baseband firmware.
I’m experimenting with compiling a list of interesting articles each week. I’m trying to keep this quick maintain a high signal-to-noise ratio.
This is huge news for the crypto community. Long deprecated, the SHA1 hash function now has a demonstrated hash collision. The collision took 110 GPU years to compute – we don’t yet have a way to produce arbitrary SHA1 hash collisions, and it still may be years until we do.