Category Archives: Internet Security
Foreign Operatives Allegedly Using Zoom To Spy On Americans – Brinkwire
The COVID-19 pandemic triggered the increase in the use of video chatting and teleconferencing apps like Zoom. These kind of apps become popular because businesses shut down to help flatten the curve and arranged awork-from-home set-up. However, U.S. officials have discovered that these apps are being used by foreign operatives to spy on Americans.
A recent article from theTimerevealed an alarming discovery from the US government. According to the report, three U.S. counter-intelligence agencies found out that foreign operatives are using Zoom to spy on Americans. These foreign cyberspies are Russians and Chinese, according to the report. One of the three U.S. officials revealedthat more than anyone else, the Chinese are interested in what American companies are doing, implying that Chinese operatives are the most aggressive ones when it comes to spying.
With millions of Americans now using Zoom for their work from home needs, internet security researchers and intelligence officials are increasingly alarmed. On Apr. 3, The Citizen Lab, a research team of the University of Toronto, revealed thatit had found several security issues with Zoom. One of these issues allows users to be defenseless to China.
The report stated that Zooms encryption keys, via its Chinese servers, are responsive to pressure from Chinese authorities. The Chinese servers are also weak, and the apps ownership is dependent on Chinese labor. Additionally, U.S.intelligence officials revealed that all conferences in the platform have end-to-end encryption.
Zoom made a swift response to address the issue by releasing a series of public statements. It also denied the allegations about the end-to-end encryption and claimed that the online messaging tools of the app do not have one. It is worth noting, however, that, while the U.S. intelligence officials have discovered this kind of observation in Zoom, it clarified that, at this point, they were not able to piece any evidence that shows the popular video conferencing apps is working with China.
Earlier this week, the New York City Department of Education banned students and teachers from using Zoom. It also recommended switching to Microsoft Teams as the new video teleconferencing platform as soon as possible over privacy and security concerns.Zoom recently said that it was overwhelmed by the increased number of users of its platform but assured the public that it is doing its best to further improve the privacy and security of the app.
Read the original:
Foreign Operatives Allegedly Using Zoom To Spy On Americans - Brinkwire
Top Ways to Guard Against Work-from-Home Phishing Threats – Infosecurity Magazine
By now were all familiar with what social distancing means as it relates to stopping or slowing down the spread of the coronavirus. Following what have rapidly become best practices along with government the mandates many companies are practicing social distancing by encouraging or requiring employees to work from home.
While thats a sensible approach on many levels, it does present potential cybersecurity problems, as workers move from trusted and secured office networks to remote locations, taking advantage of at-home internet connectivity and power sources, but often falling short when it comes to security coverage. Its a move that extends corporate networks in ways that make them more difficult to secure, providing cyber criminals with an almost irresistible opportunity to take advantage of the situation.
In fact, the National Cyber Security Centre (NCSC) has issued a warning that criminals are looking to exploit the spread of coronavirus to conduct cyber attacks and hacking campaigns. NCSC experts have seen multiple scams and cyber threats that look to take advantage of COVID-19 for their own malicious ends.
Cyber-criminals are already using "Coronavirus" and COVID-19 as subject lines for phishing scams, hoping to fool unsuspecting workers into clicking on a link or opening an attachment that results in the installation of malware or unwittingly handing over usernames and passwords.
With that in mind, here are six best practices that can help raise awareness of potential phishing techniques and other scams, and help keep your systems and data safe while you and your employees work from home:
At a time when we all have so much on our minds, following these recommendations can help keep you and your companys data safe from cyber-attacks as you keep yourself and your loved ones safe while working outside of the office. At a time of great distraction like this, individuals are more likely to slip up and be a victim of phishing.
Read more from the original source:
Top Ways to Guard Against Work-from-Home Phishing Threats - Infosecurity Magazine
Get 2 years of Webroot internet security and antivirus for $50 at Amazon – BGR
The novel coronavirus pandemic has changed our lives in so many ways, and it will be many months before things even begin to get back to normal. In hot zones in particular, most stores and other nonessential businesses will have to remain closed potentially through the end of the summer. The painful truth is that many of them will never reopen. In fact, even restaurants that have been allowed to remain open for takeout and delivery orders may end up closing down permanently because business for many of them has been so slow. We should all do our best to support local businesses whenever were able to, of course.
As for personal impact, many of us are working from home or taking online classes from home for the first time. If thats the case, its important to remember that when it comes to the COVID-19 outbreak, not everyone is in this together. Most people band together and look for ways to help each other, even if that just means having a video chat once in a while with someone who might be lonely. But some people are trying to use the pandemic as an opportunity to take advantage of others. Thats especially true of nefarious hackers, which means you need to protect yourself.
Amazon is running a terrific deal for one day only on Friday that slashes the price of Webroot Internet Security Plus with Antivirus Protection Software to just $49.99. Thats a 2-year subscription, mind you, and it covers you for up to three devices. That means you can protect every computer in your home for the next two years, and itll only cost you $50! Its a fantastic deal, but its only available until the end of the day.
Here are the key details from Amazons product description:
Follow @BGRDeals on Twitter to keep up with the latest and greatest deals we find around the web. Prices subject to change without notice and any coupons mentioned above may be available in limited supply. BGR may receive a commission on orders placed through this article, and the retailer may receive certain auditable data for accounting purposes.
Image Source: Gorodenkoff/Shutterstock
See the article here:
Get 2 years of Webroot internet security and antivirus for $50 at Amazon - BGR
Internet Security Software Market Growth Analysis, Top Manufacturers, Shares, Growth Opportunities and Forecast to 2026 – Germany English News
New Jersey, United States:The new report has been added by Market Research Intellect to provide a detailed overview of the Internet Security Software Market. The study will help to better understand the Internet Security Software industry competitors, the sales channel, Internet Security Software growth potential, potentially disruptive trends, Internet Security Software industry product innovations and the value / volume of size market (regional / national level, Internet Security Software- Industrial segments), market share of the best actors / products.
Information has been added to the report to provide a realistic view of the industry based on data from Internet Security Software manufacturers, i.e. H. Shipping, price, sales, gross profit, business distribution, etc., SWOT analysis, consumer preference, current developments and trends, drivers and limiting factors, company profile, investment opportunities, analysis of the demand gap, market size value / volume, services and products, Porters five models , socio-economic factors, official regulations in the Internet Security Software branch. Market participants can use the report to take a look at the future of the Internet Security Software market and make significant changes to their operating style and marketing tactics in order to achieve sustainable growth.
Get | Download Sample Copy @ https://www.marketresearchintellect.com/download-sample/?rid=193777&utm_source=GEN&utm_medium=888
The report examines the competitive environment scenario observed with key players in Internet Security Software sales, the profile of their business, their earnings, their sales, their business tactics, and the forecasting situations of the Internet Security Software sales industry. According to studies, the Internet Security Software sales market is very competitive and diverse due to global and local suppliers.
The Internet Security Software Sales Market Report mainly contains the following Manufacturers:
Market Competition
The competitive landscape of the Internet Security Software market is examined in detail in the report, with a focus on the latest developments, the future plans of the main players and the most important growth strategies that they have adopted. The analysts who compiled the report have created a portrait of almost all of the major players in the Internet Security Software market, highlighting their key commercial aspects such as production, areas of activity and product portfolio. All companies analyzed in the report are examined on the basis of important factors such as market share, market growth, company size, production, sales and earnings.
Report Highlights
Assessment of sales channels
innovation trends
sustainability strategies
Niche market trends
Market entry analysis
market size and forecast
The geographic department provides data that give you an overview of the turnover of companies and sales figures for the growth activity Internet Security Software for electrical meters. Here are the strengths of the geographic divisions: North America (United States, Canada and Mexico), Europe (Germany, Spain, France, Great Britain, Russia and Italy and more), Asia-Pacific (China, Japan, Korea, India and Southeast Asia) and more ), South America (Brazil, Argentina, Colombia), the Middle East and Africa (Saudi Arabia, United Arab Emirates, Egypt, Nigeria and South Africa) and ROW.
Ask For Discount (Special Offer: Get 25% discount on this report) @ https://www.marketresearchintellect.com/ask-for-discount/?rid=193777&utm_source=GEN&utm_medium=888
Table of Content
1 Introduction of Internet Security Software Market1.1 Overview of the Market1.2 Scope of Report1.3 Assumptions
2 Executive Summary
3 Research Methodology3.1 Data Mining3.2 Validation3.3 Primary Interviews3.4 List of Data Sources
4 Internet Security Software Market Outlook4.1 Overview4.2 Market Dynamics4.2.1 Drivers4.2.2 Restraints4.2.3 Opportunities4.3 Porters Five Force Model4.4 Value Chain Analysis
5 Internet Security Software Market, By Deployment Model5.1 Overview
6 Internet Security Software Market, By Solution6.1 Overview
7 Internet Security Software Market, By Vertical7.1 Overview
8 Internet Security Software Market, By Geography8.1 Overview8.2 North America8.2.1 U.S.8.2.2 Canada8.2.3 Mexico8.3 Europe8.3.1 Germany8.3.2 U.K.8.3.3 France8.3.4 Rest of Europe8.4 Asia Pacific8.4.1 China8.4.2 Japan8.4.3 India8.4.4 Rest of Asia Pacific8.5 Rest of the World8.5.1 Latin America8.5.2 Middle East
9 Internet Security Software Market Competitive Landscape9.1 Overview9.2 Company Market Ranking9.3 Key Development Strategies
10 Company Profiles10.1.1 Overview10.1.2 Financial Performance10.1.3 Product Outlook10.1.4 Key Developments
11 Appendix11.1 Related Research
Complete Report is Available @ https://www.marketresearchintellect.com/product/global-internet-security-software-market-size-and-forecast/?utm_source=GEN&utm_medium=888
We also offer customization on reports based on specific client requirement:
1-Freecountry level analysis forany 5 countriesof your choice.
2-FreeCompetitive analysis of any market players.
3-Free 40 analyst hoursto cover any other data points
About Us:
Market Research Intellect provides syndicated and customized research reports to clients from various industries and organizations with the aim of delivering functional expertise. We provide reports for all industries including Energy, Technology, Manufacturing and Construction, Chemicals and Materials, Food and Beverage and more. These reports deliver an in-depth study of the market with industry analysis, market value for regions and countries and trends that are pertinent to the industry.
Contact Us:
Mr. Steven FernandesMarket Research IntellectNew Jersey ( USA )Tel: +1-650-781-4080
Email: [emailprotected]
Get Our Trending Report
https://www.marketresearchblogs.com/
https://www.marktforschungsblogs.com/
Tags: Internet Security Software Market Size, Internet Security Software Market Growth, Internet Security Software Market Forecast, Internet Security Software Market Analysis, Internet Security Software Market Trends, Internet Security Software Market
Read the rest here:
Internet Security Software Market Growth Analysis, Top Manufacturers, Shares, Growth Opportunities and Forecast to 2026 - Germany English News
Foreign Spies Are Targeting Americans on Zoom and Other Video Chat Platforms, U.S. Intel Officials Say – TIME
As much of the world works from home, an explosion of video conference calls has provided a playground not just for Zoombombers, phishermen and cybercriminals, but also for spies. Everyone from top business executives to government officials and scientists are using conferencing apps to stay in touch during the new coronavirus lockdowns and U.S. counterintelligence agencies have observed the espionage services of Russia, Iran, and North Korea attempting to spy on Americans video chats, three U.S. intelligence officials tell TIME.
But the cyberspies that have moved fastest and most aggressively during the pandemic, the intelligence officials say, have been Chinas. More than anyone else, the Chinese are interested in what American companies are doing, said one of the three. And that, in turn, has some U.S. counterintelligence officials worrying about one video conference platform in particular: Zoom. While the Chinese, Russians, and others are targeting virtually every tool Americans and others are using now that theyre forced to work from home, Zoom is an attractive target, especially for China, the intelligence officials and internet security researchers say.
An Apr. 3 report by The Citizen Lab, a research organization at the University of Toronto, found a number of shortcomings in Zooms security, including some that made it particularly vulnerable to China. It found that Zooms encryption scheme has significant weaknesses, including routing some encryption keys through Chinese servers, and that its ownership structure and reliance on Chinese labor could make Zoom responsive to pressure from Chinese authorities.
The U.S. intelligence officials stress there is no evidence that Zoom is cooperating with China or has been compromised by it, only that Zooms security measures leave gaps, some of which may make the application less secure than others. All three intelligence officials, who requested anonymity because they are not authorized to discuss ongoing operations with the media, said spies are using multiple applications to search government, corporate, and academic conversations for financial, personal, product development, research, and intellectual property information and leads. Federal experts have warned both government and private officials not to use video conference applications to discuss or exchange sensitive information. In a memo on Thursday, the Senate Sergeant-at-Arms told Senators not to use Zoom, according to one person who received the memo.
Keep up to date on the growing threat to global health by signing up for our daily coronavirus newsletter.
Zoom has responded to the particular criticism of its security with multiple public efforts to address the concerns. After initially claiming that its platform provides end-to-end encryption for all its conversations, Zoom later said some encryption was in fact absent from some online messaging tools. While we never intended to deceive any of our customers, we recognize that there is a discrepancy between the commonly accepted definition of end-to-end encryption and how we were using it, wrote Oded Gal, the chief product officer for Zoom Video, in an April 1 blog post.
The subsequent investigation by The Citizen Lab found other weaknesses. During a test of a Zoom meeting with two users, one in the United States and one in Canada, the Citizen Labs researchers found that the key for conference encryption and decryption was sent to one of the participants from a Zoom server apparently located in Beijing. A scan located a total of five servers in China and 68 in the United States that apparently run the same Zoom server software as the Beijing server, their report says.
Zooms headquarters are in San Jose, California and it is listed on the NASDAQ. The companys main applications have been developed in part by three companies in China that all are named Ruanshi Software, the Citizen Lab study found. Two are owned by Zoom, and one is owned by a company called American Cloud Video Software Technology Co., Ltd. Zooms most recent SEC filing says the company employs at least 700 research and development employees in China, and job postings for Ruanshi Software in Suzhou, China include positions for C++ coders, Android and iOS app developers, and testing engineers, the Citizen Lab reported.
Zoom says it is not alone in having workers and servers in China, and says it has resolved the issue of encryption keys being routed through a server there. Zoom is not unique among its U.S. based teleconferencing peers in having a data center and employees in China; Zoom is perhaps just more transparent about it, the company said in a statement to TIME. Ruanshi is the Chinese name that Zoom uses to name our subsidiaries in China, the company said, and Our engineers are employed through these three subsidiaries and we are fully transparent about itall of this is disclosed in our filings. The company added that it has a number of documented controls and protections in place to protect data and prevent unauthorized access, including from Zoom employees. These controls are strictly enforced across the Company, regardless of jurisdiction.
In the wake of the Citizen Lab report, Zoom has taken other steps to reassure users about its commitment to security. On April 8, Alex Stamos, former chief security officer at Facebook and Yahoo, posted a note on Medium saying Zoom CEO Eric Yuan had called and asked if I would be interested in helping Zoom build up its security, privacy and safety capabilities as an outside consultant, and I readily agreed.
Sens. Amy Klobuchar of Minnesota and Michael Bennet of Colorado and Reps. Frank Pallone of New Jersey, the Chairman of the House Energy and Commerce Committee, and Jan Schakowsky of Illinois have called for the Federal Trade Commission to investigate whether Zoom has taken the measures necessary to protect its users. Multiple state attorneys general already have begun looking into the company, Politico reported. And despite Zooms reassurances, some intelligence experts remain concerned about its vulnerabilities. Zooms links to China, regardless of what its CEO promises, create a persistent threat, former director of the National Security Agency and the Central Intelligence Agency Michael Hayden, tells TIME.
Please send tips, leads, and stories from the frontlines to virus@time.com.
Thank you! For your security, we've sent a confirmation email to the address you entered. Click the link to confirm your subscription and begin receiving our newsletters. If you don't get the confirmation within 10 minutes, please check your spam folder.
Contact us at editors@time.com.
See the original post here:
Foreign Spies Are Targeting Americans on Zoom and Other Video Chat Platforms, U.S. Intel Officials Say - TIME
iOS users beware: Myth of Apple security invulnerability is just that – The Star Online
Windows computers are prone to viruses, while iOS is a safe haven: Apple users like to believe their operating systems are virus-proof. But MacBooks and iPhones also come with weaknesses and the myth of their invulnerability is perhaps the biggest danger.
The common belief is that while Windows users have to deal with viruses, worms, and Trojans, Mac and iPhone users don't have to worry because Apple's devices are invulnerable to security threats.
In fact it's not really true anymore because there's been a rapid increase in the amount of malware targeting Apple in recent years.
The security of the macOS and iOS operating systems has always been based on a simple principle: the systems are closed and Apple specifies which hardware and software can be used with them.
Microsoft Windows and Android, Google's operating system for mobile devices, on the other hand, follow an open approach. That means that anyone can configure those systems themselves or develop and distribute software for them.
This approach means more freedom but also more risk. Windows and Android keep the gates a little bit open, which can mean that threats sometimes get in, while Apple users are protected behind high walls, at least in theory.
In reality those walls have gaps too. In 2017 a serious security vulnerability was discovered in the High Sierra version of macOS that made it easy for anyone to gain admin access, even if they didn't have programming knowledge or special software.
As well as the security of a closed system, Mac users in the past could rely on another advantage: cybercriminals focused on Windows.
"Macs have always also been vulnerable, but Windows was the easier and bigger target," says Kai Schwirzke from Mac & i magazine.
Because Windows computers were so much more common than Macs, that platform offered criminals a lot more potential victims.
However, with Macs now having an increased market share they've become a more attractive cyber-crime target.
"We have found that targeted attacks against macOS are increasingly being carried out," Schwirzke says.
In its 2019 annual report, the US anti-malware manufacturer Malwarebytes identified an increase in threats to Mac systems of more than 400% compared to the previous year.
According to the security experts, the integrated security systems of macOS are particularly blind to adware.
Adware not only displays advertisements and often transmits user data, but can also serve as a gateway for attacks.
Downloading apps only from Apple's App Store is also no cast-iron guarantee of security.
With the millions of lines of code in the apps that have to be checked by the App Store, it is impossible to rule out the possibility of malicious code slipping through unnoticed," Schwirzke says.
He recommends that you pay close attention to the permissions you grant an iPhone app. For example, a recipes app doesn't need access to your phone's address book or microphone.
Possibly the biggest danger is the Apple myth itself. In the belief that macOS and iOS are invulnerable, Apple users are often careless.
"The same applies to Apple as to other manufacturers: The biggest weak point is people," warns Internet security specialist David Bothe.
Phishing emails in particular pose a risk and are now being tailored specifically for Apple users.
In 2019 Germany's Federal Office for Information Security warned of an email that pretended to come from Apple Support. A blackmail trojan was hidden in a link inside the message.
Bothe advises Apple users to maintain a healthy dose of scepticism.
"Emails with calls for action should always be critically examined. Do not click on links if you're not one hundred per cent sure," he says. In addition, you shouldn't open email attachments from strangers. dpa
Read the original:
iOS users beware: Myth of Apple security invulnerability is just that - The Star Online
Google removes Android VPN with critical vulnerability from Play Store – Naked Security
Google has removed an Android VPN program from the Google Play store after researchers notified it of a critical vulnerability. The app, SuperVPN, has been downloaded over 100 million times.
Virtual private networks (VPNs) let users create encrypted connections to online servers that then serve as their gateway to the Internet. They enable users to tunnel safely to the internet when using untrusted local connections such as those in public places like coffee shops. In theory, they should stop intruders from sniffing your traffic on insecure networks. SuperVPN is one of dozens of programs that supposedly serve this function for Android devices.
VPNpro, a company that reviews and advises on VPN products, warned in February of a vulnerability in the product that could cause a man in the middle (MITM) attack, enabling an intruder to insert themselves between the user and the VPN service. It said at the time:
What this VPN app has done is to leave its users, people seeking extra privacy and security, to actually have less privacy and security than if theyd used no VPN at all.
The program was sending encrypted data, but it hard coded the decryption key, the review site said. Decrypting the data revealed information about SuperVPNs server, certificates, and authentication credentials. VPNpro was able to replace that data with its own.
That means the attacker can force SuperVPN to connect to a fake server, enabling them to see all of the users data including passwords, private text, and voice messages, VPNpro said.
VPNpros researcher Jan Youngren discovered the vulnerability in October 2019, adding that its developer, SuperSoftTech, likely based in Beijing, didnt respond to its notification. Instead, it notified the Google Play Security Reward Program (GPSRP), operated for Google by HackerOne. That team couldnt get a response from SuperSoftTech either, so it removed the program from the Google Play store on 7 April, 2020.
This isnt the first time that SuperVPN has cropped up in vulnerability research. It also got a mention in a 2016 paper that researched security risks in Android VPNs. That research, presented at the Association for Computing Machinerys 2016 Internet Measurement Conference (IMC), found that 13 antivirus programs detected malware activity in the software. It took third place in a ranking of Android VPNs most often flagged with malware-like activity by antivirus programs.
SuperVPN wasnt the only Android VPN to raise VPNpros concerns. It identified nine others in its February blog post that it said had critical vulnerabilities leaving their users vulnerable to to MITM attacks. A quick check shows that several of them are still available for download on the Play Store.
Read more from the original source:
Google removes Android VPN with critical vulnerability from Play Store - Naked Security
Experts: Internet voting isn’t ready in the face of coronavirus pandemic – CyberScoop
Written by Brett Winterford Apr 8, 2020 | CYBERSCOOP
Internet technologies are set to play a critical role in the 2020 presidential election, but precisely which voting alternatives will be pursued and whether they can adequately be secured is now a $400 million question.
COVID-19 doesnt at this point present an excuse to postpone the general election in November. Chris Krebs, Director of the Cybersecurity and Infrastructure Security Agency told a recent Axios forum that 42 U.S. states have mechanisms in place that allow for alternatives to in-person voting, and the other eight have break-glass provisions for doing the same when emergencies require it. A global pandemic would most certainly meet that threshold.
The $2.2 trillion coronavirus relief bill (CARES Act) signed into law last week included $400 million of grants the Election Assistance Commission can give to states to help them prevent, prepare for and respond to Coronavirus. Earlier versions of the bill stipulated that the grants were conditional on states spending it on election security, but these provisions were later stripped out. States retain the autonomy to make the preparations they each deem necessary, as officials face the daunting task of upholding the most essential function of democracy in the midst of a health pandemic that constrains the movement and assembly of people in public spaces.
How each state chooses to conduct the election now shapes as a partisan battleground. House Speaker Rep. Nancy Pelosi, D-Calif., paints the $400 million as a down payment on the several billions of dollars required to run a wholly vote-by-mail election. There remains a danger that President Donald Trump or Senate Majority Leader Mitch McConnell, R-Ky., might seize this as a political opportunity to promote radical alternatives.
The worst alternative, according to election security experts, would be online voting.
Last week, Risky Business spoke to Jennifer Morrell, expert adviser to the Cybersecurity and Infrastructure Security Agency for our feature podcast, as well as DEF CON Voting Village co-founder Harri Hursti and several top security researchers in the field to ask what trade-offs theyd make to ensure Americans still get to the polls.
None felt that online voting was ready for a general election, even in the midst of a crisis.
It doesnt make sense to rush into remote marking of ballots, said Dan Guido, CEO of Trail of Bits.
In March, Trail of Bits published a complete white-box audit of Voatz, a mobile voting app piloted at small scale in several states including West Virginia, Colorado, Oregon, Utah, and Washington. The jaw-dropping report of that assessment detailed 79 security findings, a third of which were high severity. Voatz was one of several election apps Guidos team has tested.
To use a mobile phone to mark a ballot in a high-stakes election, you would need to trust every computer between you and the election official to correctly record your preference, Guido told Risky Business. There are any number of points at which remote marking of ballots could be interfered with. We havent seen an adequate solution to this yet.
MIT researcher Mike Specter who independently discovered a number of bugs in the same platform shares the same concern. Its still not clear how to prevent attacks against the host (user) operating system in a consumer device, Specter said.
Harri Hursti has dedicated 15 years of his career on the security of election systems, made famous in the 2006 documentary Hacking Democracy and the recent HBO sequel Kill Chain. He describes online voting as snake oil that doesnt solve any of the pressing problems facing elections.
The first sign of a crackpot is somebody that says elections are easy, Hursti told Risky Business. There is nothing easy about elections. Elections are uniquely difficult problems because they require both a secret ballotand auditability.
COVID-19 presents a very specific problem to the November election, he said, for which online voting isnt necessarily the right answer. The need is for a mode of voting that doesnt require hundreds of people to congregate in queues at polling stations. But that problem is solved already, Hursti said. Weve had early ballots, absentee ballots, mail-in ballots and other methods of voting for 40 or 50 years.
If politics doesnt get in the way, the internets best attributes can be harnessed in the November election in order to better facilitate these tried-and-true methods.
The most likely solution will be an electronic distribution of printable ballots that can be hand marked and posted back to the polling station. In some states, it will be augmented with earlier and staggered opportunities to vote at the polling place or curbside drive-thru voting booths.
Morrell confirmed that these options are under active investigation. The bulk of U.S. voters are most likely to receive their ballot digitally and submit it physically. The point of expanding mail-in voting is only to minimize the number of people you have to serve in-person on election day, she said.
Thats because most election officials, she said, are as anxious as the cybersecurity community about ballots being marked online.
Guido was at ease with using the internet for voter registration and distribution of unmarked ballot forms.
We should use every technology available to use to make the process of delivering ballots more efficient, Guido said.
Election officials would need to adjust their threat model to accommodate the change. Voters would face heightened social engineering risks, such as malicious actors using the process for phishing. Misinformation campaigns will try to convince voters to mail their ballot back to the wrong place.
But these are risks that can be managed, Guido said, especially if information about the voting process is centralized a difficult prospect in a process every state guards with zeal. An official voting app would quickly achieve primacy in the relevant app stores within the first million downloads, making it much harder for adversaries to trick people into downloading imitations.
Morell agrees that voters will need a trusted place to go for information and a consistent set of messages.
We saw in recent primaries some examples of voters being told on social media not to bother showing up, she said. Currently, CISA is focused on how to operationalize for a huge increase in mail-in ballots, and the agency will focus on voter outreach as November draws closer.
There will likely remain small pockets of the voting population offered mobile options , such as military personnel stationed overseas or disabled voters. Morell predicts a handful of states might also allow for voters to submit a scanned, marked ballot via PDF via a web portal.
Its also unclear whether current election apps can scale to meet the needs of a general election. The identity verification process in Voatz, for example, appears to require manual confirmation of identity data by a human operator making it no more scalable than the processes used by polling places.
Hursti urges policymakers to re-frame their threat model in order to meet the challenges for this election cycle. He feels that its less probable that a candidate would attempt to manipulate the system to win, and more probable that a motivated, well-funded adversary like a nation-state would use the compromise of an election system to seek to sow distrust and undermine a society.
A peaceful transition of power is only possible when the supporters of the losing party accept that the result is fair and square, Hursti said.
Morell wants researchers to keep exploring and pushing for better ways to improve election systems, and doesnt want to write off the use of online voting altogether.
But as for November, were not ready.
Brett Winterford is an editor with Risky Business. This post was reported by and originally appeared on Risky.Biz, and was produced with support from the William and Flora Hewlett Foundation.
More:
Experts: Internet voting isn't ready in the face of coronavirus pandemic - CyberScoop
Slack in the security spotlight lessons for collaboration servers – Naked Security
Researchers at German pentesting company Enable Security just published an intriguing blog post about a security problem they found in the popular online collaboration tool Slack.
The short version is that they uncovered a way to poke around inside the private parts of Slacks network, so they disclosed it, Slack fixed it and paid them a $3,500 bounty
and then, as sometimes happens when the rest-of-life gets in the way, it was another two years before they got the green light to publish their findings.
In some ways, the bug bounty progress report makes more fascinating reading than the blog post itself, because it shows how the responsible disclosure process allows for affable and open technical discourse between the bug finders and the bug fixers, without giving needless hints to crooks along the way.
But well focus on the blog post here because it includes some really simple but very effective advice that anyone running real-time collaboration services (a hot topic right now!) can take on board.
Whether youre interested in live text chat, audio or video, this report could help you improve your own security, and that of your users.
One problem that so-called end-to-end or peer-to-peer software has on most internet-connected networks is that very few computers these days have network identifiers what are known as IP numbers assigned uniquely to them.
Heres why.
The modern internet numbering system known as IPv6 (there is no IPv5 numbering system because the suffix -5 had already been used for other things) gives each device on the internet a 128-bit number.
Even using just 64 bits worth of that so-called address space, you can count all the way from zero to 264-1, which is enough to number more nearly 20 million million million devices uniquely.
But the older IPv4 system is still used by the vast majority of devices out there, and it has just 32 bits, which gives you an absolute maximum device count of just over 4000 million (4 billion).
As large as that sounds, there are already billions of mobile phones around the world, plus billions more laptops, routers, cloud servers, smart kettles, street signs, lampposts
so you can see why 32-bit network numbers are a real problem these days, and have been for years.
(In practice, there arent even 232 values available because about half-a-billion IPv4 numbers are set aside for purposes other than identifying individual devices.)
Most networks these days make do with one IP number thats shared between all the computers on the local network (LAN), which make do with so-called private IP numbers that are reserved for internal use only.
These private IP numbers dont get past the router, so they dont need registration or any central authority to control them, but they dont identify your computer globally in any useful or usable way.
If youve ever wondered why your computer may show up with an IP number such as 192.168.1.12 at home, and something very similar, such as 192.168.1.13 at the coffee shop you (used to) frequent, its because those numbers are private only, and as long as theyre allocated on separate LANs they wont get in each others way.
As an aside, if youve ever had the misfortune to have all the computers on your network blocklisted at the same time because just one of them did something naughty, such as sending spam
thats because all traffic out of your network has the very same IP number once it joins the public internet, so your individual computers cant be blocked independently they stand or fall together.
Your router therefore acts as a sort of traffic proxy that figures out which incoming network packets are replies to what outgoing network requests, and redirects them accordingly.
Thats called NAT, short for Network Address Translation, and its a decent enough solution if all you want to do is establish connections from your private network to servers on the public internet, as you did when you browsed to this web server to start reading this article.
Generally speaking, however, a NATting router can only deal reliably with incoming traffic after a computer on the LAN has initiated an outbound connection otherwise it has no idea which network flows (as they are called) belong to which device.
For peer-to-peer chats, whether theyre one-to-one calls or group calls, you have a problem each participant can dial out to the call by connecting outwards to any or all of the others, but no one can accept the call because incoming network traffic relies on an already-open connection to a public server first.
Stalemate!
One solution to this problem is known as TURN, which is a rather forced acronym meaning Traversal Using Relays around NAT. (Relays Using NAT Traversal would be clearer to write in full, but wouldnt be a good acronym.)
The idea is that a server on the public internet acts as an answering machine that accepts calls from other computers, even if they are behind NAT routers, and applies suitable identification and authentication as needed.
For any call that users are trying to connect to, the TURN server ends up on the receiving end of outbound connections from everyone on the call, so it can act as a relay or broker that shuffles one callers outbound data into the right recipients inbound data channel and vice versa, thus simulating an end-to-end connection between two or more computers that would otherwise be kept apart by their NAT routers.
This isnt an ideal solution, especially if the TURN server is in New York and the callers are both in San Diego, say, because the packets are crossing a continent only to come straight back again, and it also means that everyones call latency gets affected by the load on the TURN server.
But by making TURN into a lightweight data packet shuffling service, its nevertheless proved to be a very useful system that works for all sorts of traffic, not just for audio, or video, or whatever.
Because TURN servers can broker traffic between arbitrary services on arbitrary computers, you dont need to add TURN code to every type of server you run, meaning that you can dedicate TURN servers entirely to their job of packet brokering.
This means you can therefore configure and tune TURN your servers for optimum throughput, without worrying if those tweaks would reduce performance for other service types on your network such as web, database and streaming servers.
But this general-purpose nature of TURN means that you need some way for a TURN server to allow the original caller to specify where they want to go to reach the other end of their TURN call.
And the primary functions of TURN is to broker traffic past NAT routers, which means that TURN needs to be able to make sense of IP traffic that a router itself would ignore because the destination computers have internal-only IP numbers that make no sense on the public internet.
You can probably guess where this is going.
There are almost certainly several network ports open on your laptop right now, many of them listening on localhost, which is a special series of IP numbers from 127.0.0.0 to 127.255.255.255 that are reserved for your computer to access itself only from itself.
Localhost addresses (127.0.0.1 is usually used) are so special that many operating systems dont even send local network packets through the networking subsystem.
To improve the speed, security and reliability of local-to-local connections they often just shuffle the data directly in memory between the sending program and the receiver.
Likewise, your router probably has an administration web server running on an IP number such as 192.168.1.254 or 192.168.0.1 to keep it safely cut off from the outside world but accessible to computers inside your network.
But if you have a TURN server, it is already inside your network, so if you accidentally permit an incoming caller to specify an internal-only IP number as its target, you may end up brokering packets between an outsider and some internal service that would otherwise be invisible to outsiders.
Peeking into internal Slack resources via Slacks TURN servers in this way is what our intrepid researchers were able to do, two years ago.
By placing fake calls with recipients that were inside Slacks own network, using a mixture of localhost and private IP numbers, they were able to boldly go where no caller was supposed to.
They made an informative video (its slow going but surprisingly easy to follow) of what happened:
If you are a Slack user, there is nothing to do.
Slack already did it for you, which is why this report is public only now.
But if you run your own TURN servers, the researchers suggest checking that you have configured your server to ignore connection brokering requests to any internal-only IP numbers.
This protects you from access control mistakes down the line, because there is no down the line.
For the server described in their paper (called coturn), the configuration they recommend is as follows:
If youre a networking person you will probably recognise those ranges anyway they cover multicast, LAN-only IP numbers, localhost-only IP numbers, autoconfiguration IP numbers, reserved-for-documentation IP numbers and more.
Remember: the earlier you block bad traffic, the less harm it can possibly do!
More:
Slack in the security spotlight lessons for collaboration servers - Naked Security
Is there a way to find this file that’s being used by another processor? – Windows 10 Support – BleepingComputer
To the OP, I have read your posts several times very carefully and it seems that the only problem that you are reporting is that you think that somebody else is messing with your computer. Is that the case? You did not report or describe any other problem so maybe that is why nobody is responding with advice.
My advice is to secure your computer. Also, change your log in password. There are forums on the internet that deal with internet security, you might want to visit one of those forums.
Also, just because somebody is messing with your computer is no reason to go messing with your command line. There is absolutely no reason for you to mess with your settings or your command line just because you think that somebody is messing around with your computer.
Leave your command line alone and just change your password.
Continued here:
Is there a way to find this file that's being used by another processor? - Windows 10 Support - BleepingComputer