29.6.18

How (over)sharing on social media can trip you up



Profuse recounting of details from your life via social media may come at a price
Ours is a sharing era. Social networking sites have opened up new ways of sharing all kinds of private information, so much so that the divulgation of a variety of personal details on the internet has become second nature to many users. However, the more information you pour into the online world, the more at risk you are to spilling information that may put you in attackers’ sights.
To be sure, the urge to share is nothing new. This behavior reflects and harnesses a strong human desire to connect with others, which runs deep in our evolutionary past. Arguably, then, the trouble does not lie so much with digital sharing per se. Rather, it boils down to what kind of information we share and, even more strikingly, who can access it.
Many users are oblivious to the risks to which they may expose themselves to by sharing personal, if seemingly innocuous, information on social platforms. The same goes for applying little to no restrictions on who can see their activities on networking sites. In addition, social media users tend to use more than one such channel. As a result, attackers can build a fairly rich profile of their target by piecing together information gleaned from the target’s profiles and activities on various networking sites.
Oversaturated with personal information, social media networks have become perfect hunting grounds for malefactors. Having used such a site or sites as a reconnaissance tool, attackers can send you a targeted message that entices you into visiting a bogus website that looks and feels much like the legitimate one in order to steal your credentials and money. Or they can manipulate you into opening a malware-laced attachment acting as a dropper for other malware that can then go on to do all sorts of things, including exfiltrating data or recording keystrokes.
Such missives can be highly tailored and can evoke the impression of being sent from a friend or co-worker. It is little wonder, then, that they have proven to be more successful than spray-and-pray tactics.
Blurring the picture further, the concept of networking that lies at the heart of social platforms contributes to a decreased sense of caution. Many people let their guard down and are more likely, for example, to click malicious links sent via social media than those received in an email.
To be sure, social engineering techniques predate the advent of online social platforms. However, with online networking, they have taken on whole new vigor and opened up new avenues for identity theft, online fraud, and other crimes.
Human-factor precautions
What are some of the measures you can take to counter risks stemming from digital (over)sharing?
To start off, you may want to review regularly and make the best use of the privacy settings available on your social network(s) of choice. Importantly, whenever possible, you are well advised to limit the circle of people who can see what you’re up to.
Notwithstanding such restrictions, however, there is still some risk that your private information can be exposed to prying eyes. In fact, as soon as you post something, you have no control over what others do with it.
With that in mind, you may want to limit information that you post or upload, especially the kind of information that could make you vulnerable. It’s safer not to post anything that you wouldn’t want the public to see. Put yourself in the attackers’ shoes: could the information you divulge help them hurt you? If so, you may not want to share it.
Beware suspicious or too-good-to-be-true messages and links. That applies even if the message appears to come from one of your friends, as that could well come from an attacker after he has broken into your friend’s account. Ne’er-do-wells know too well that the more credibility they can provide for their shenanigans, the juicier the rewards.
Also, be skeptical of strangers wanting to be your online friends. Ideally, accept only friendship or connection requests from people you know in real life. The internet is rife with fraudsters intent on bilking money out of you via all manner of ploys. Or they can simply burglarize your home in an old-fashioned style after you tell the world about your vacation, leaving your abode empty and ripe for the picking.
At heart, this all is a human vs. human problem, which highlights how this can be countered – by being more security-aware. “On the Internet, nobody knows you’re a dog”, as the adage that captures the spirit of online privacy and anonymity goes. We were made to be social, but let’s socialize responsibly.

27.6.18

Wi-Fi security gets a boost as WPA3 standard is launched



The new wireless security protocol is poised to make hacking Wi-Fi connections a whole lot harder
The Wi-Fi Alliance on Monday officially launched WPA3, a new Wi-Fi security protocol that is designed to enhance wireless security.
The new standard “adds new features to simplify Wi-Fi security, enable more robust authentication, and deliver increased cryptographic strength for highly sensitive data markets,” according to the Wi-Fi Alliance, a nonprofit group that certifies Wi-Fi networking standards.
The latest iteration of WPA (short for “Wi-Fi Protected Access”) comes in two flavors – personal and enterprise. They share a number of features, such as the latest security methods and the non-acceptance of legacy protocols, but each mode of operation also contains additional capabilities that take into account differences between the usages of, and requirements for, home versus enterprise networks.
Key improvements
One of the notable security enhancements brought by WPA3 resides in protection against password-guessing attacks, such as dictionary attacks, in which malefactors take countless stabs at a password in a bid to arrive at the right one. This new safeguard is thanks to an authentication handshake called Simultaneous Authentication of Equals (SAE) and also applies to cases when users choose simple and easy-to-break passwords – a very common scenario indeed.
In addition, WPA3 supports forward secrecy, meaning that even if a password is compromised, attackers can’t decrypt Wi-Fi traffic transmitted prior to the intrusion. Of note is also the fact that the new features don’t impose any extra burden or inconvenience on the user.
For enterprise networks, WPA3 “offers the equivalent of 192-bit cryptographic strength, providing additional protections for networks transmitting sensitive data, such as government or finance”.
In addition, the Alliance announced Wi-Fi Easy Connect, which is a feature that is intended to securely get devices with limited or no display interface – notably Internet-of-Things (IoT) gadgets – onto a network by scanning QR codes with a smartphone.
Do you find it hard to resist using free public Wi-Fi? If so, the Wi-Fi Alliance has some good news for you, too. The announcement on launching WPA3 also notes the release earlier this month of Wi-Fi CERTIFIED Enhanced Open, a technology that supports individualized data encryption in a bid to counter the risk of threats such as Man-in-the-Middle (MiTM) attacks.
WPA3 is a successor to WPA2, which was launched way back in 2004 and is widely used for securing Wi-Fi traffic. WPA2 security was recently in the spotlight after researchers found that the protocol suffers from a series of serious flaws that they dubbed ‘KRACK’. Although many device manufacturers have since sealed up the cracks, the discovery highlighted concerns surrounding wireless connections.
It remains to be seen when WPA3-enabled products will enter the market, although it is very likely to take quite some time before they reach broad implementation. For the time being, WPA3 is optional for newly-manufactured devices and it retains interoperability with WPA2 devices through a transitional mode of operation, said the Wi-Fi Alliance.

26.6.18

ESET wordt lid van Cybersecurity Tech Accord



 Meer dan 30 jaar geleden ontwikkelden de oprichters van ESET de eerste versie van de nu wereldwijd gebruikte antimalware software die vandaag op meer dan 110 miljoen toestellen geïnstalleerd is, bij consumenten, in bedrijven of op mobiele apparaten. Hun inzet, en die van iedereen bij ESET, is vandaag even sterk als toen en juist daarom heeft ESET zich aangesloten, net als meer dan dertig andere technologiebedrijven, bij Cyber Tech Accord.

De geconnecteerde wereld raakt virtueel elk aspect van onze samenleving, van landbouw tot ruimteonderzoek, van smartphones tot de infrastructuur die ons energie levert. Connectiviteit breidt dagelijks verder uit en zou nog sneller moeten groeien dankzij IoT (Internet of Things). Wij zijn de generatie van de technologische revolutie, degene die de samenleving voor goed zal veranderen.

Kwaadaardige spelers, al dan niet crimineel, politiek of gewoon ontwrichtend zijn, blijven het gratis, open en veilige Internet ondermijnen. Hiervan zijn talloze voorbeelden, ransomware veroorzaakte blackouts in Oekraïne in 2015 en 2016 en had een globale impact op medische diensten in 2017.

De online wereld beschermen is een collectief probleem. Geen enkel bedrijf kan alleen de veiligheid, stabiliteit en weerstand aanbieden die cyberspace nodig heeft. Door samen te werken met een groep vooraanstaande bedrijven, hoopt de  Cyber Tech Accord te kunnen profiteren van hun gezamenlijke inzet en zo de nadelige effecten veroorzaakt door kwaadaardige spelers te ontkrachten.

De belangrijkste prioriteiten die de leden van Cyber Tech Accord willen verdedigen zijn: respect voor de kernprincipes voor de bescherming van burgers en het ontwikkelen van middelen om veiligheid, weerstand en stabiliteit van de cyberspace te verbeteren.

Elk lid verbindt zich ertoe vier principes te volgen: 

1.      Beschermen van al onze klanten en gebruikers.
2.      Zich verzetten tegen cyberaanvallen op onschuldige burgers en bedrijven, waar ze zich ook bevinden.
3.      Gebruikers, klanten en ontwikkelaars meer macht geven om de cyberbeveiliging te versterken.
4.      Samenwerken, met elkaar en gelijkgezinde groepen, om de cyberbeveiliging te verhogen.

Cyber Tech Accord is de grootste groep bedrijven die op deze wijze samenwerkt en zich inzet om zowel individueel als samen burgers en bedrijven te beschermen. Door de combinatie van de middelen van alle leden zal een grote kracht tegen cybercrime tot stand komen.

“Het verheugt ons lid te zijn van Cyber Tech Accord. Zo verlengen we 30 jaar inzet alsook de onberispelijke staat van dienst die ESET reeds behaalde voor het beschermen van burgers, data en toestellen,” zei Juraj Malcho, CTO van ESET. “Nu staten en organisaties cyberaanvallen ontwikkelen die soms in de verkeerde handen terecht komen, zoals we vorig jaar met WannaCry konden vaststellen, is het belangrijk dat we collectieve maatregelen treffen om kwaadaardige spelers te stoppen.

Meer details over Cyber Tech Accord is te vinden op www.eset.com