Showing posts with label international. Show all posts
Showing posts with label international. Show all posts

Wednesday, 6 April 2016

It’s a Vulnerable World: March 2016

SumRando Cybersecurity, VPN, Secure Messenger, It's a Vulnerable World, vulnerability
Android phones, iPhones, public Wi-Fi, oh my! Is anything safe anymore? March’s vulnerabilities have us convinced that it’s always the right time for a VPN and secure messaging:

Android phones: Not only have recent reports revealed that only 10% of Android phones are encrypted (as compared to 95% of iPhones), Kaspersky Lab has found Android operating systems 4.4.4 and earlier to be at risk for a “Triada” of malware: Ztorg, Gorpo and Leech. Nikita Buchka referred to the malware as “a new stage in the evolution of Android-based threats. They are the first widespread malware with the potential to escalate their privileges on most devices.” Triada has the ability to download, install, launch and modify applications.

iPhone encryption: Johns Hopkins researchers found a way to decrypt photos and videos sent via iMessage, a vulnerability that has since been patched with the release of iOS 9.3. The flaw that remains unfixed, however, is the vulnerability used by the FBI to break into San Bernardino shooter Syed Farook’s phone. Given that we can’t fix what we don’t know, this is one FBI secret that leaves us all less secure.

In-Flight Wi-Fi: Journalist Steven Petrow recently took advantage of American Airlines’ Gogo in-flight Internet to catch up on work while in the air, only to find that he was the one taken advantage of: following the flight, a fellow passenger confessed to hacking into and viewing the online communications of Petrow and several others on board. For Petrow, it was a lesson learned in always using a VPN when accessing public Wi-Fi.

The Right to Be Forgotten: Europe’s Right to Be Forgotten has been extended to all Google searches within the continent, but remains no match for searches conducted while logged into a non-European VPN server, as the protection does not extend elsewhere. In response, France’s CNIL, a privacy authority, fined Google 100,000 euros: “For people residing in France to effectively exercise their right to be delisted, it must be applied to the entire processing operation, i.e., to all of the search engine’s extensions.”

Latin America and the Caribbean:
“Cybersecurity: Are We Ready in Latin America and the Caribbean?”, a study by the Inter-American Development Bank, the Organization of American States and Oxford University, has answered its own question with a resounding no. Of the 32 countries evaluated, only 7—Argentina, Brazil, Chile, Colombia, Mexico, Trinidad and Tobago and Uruguay—have reached even an intermediate level of preparation against cyberattacks, while 16 entirely lack a coordinated capacity to respond to cyberattacks.

Social Media in Turkey: Facebook, Twitter and other social media sites were banned in Turkey following a mid-March Ankara bombing that killed 37 people, but this is one country that has grown accustomed to finding workarounds for government censorship: Suraj Sharma tweeted, “Having to use a VPN again to access Twitter and other social media. Sad, very sad. Information doesn’t kill, never has. #Turkey.”

Social Media in Iran: In Iran, Facebook and Twitter are banned…except for when they’re not. “Of course officials, even lower-ranking ones, use VPNs. A friend of mine, who works in the Iranian parliament, told me that he had seen members of parliament use VPNs to access social networks and forbidden news sites. It’s crazy. These are the very same lawmakers who voted to ban social networks and decided on the penalties for using VPNs,” reported Iranian cybersecurity specialist Amin Sabeti. For everyone else, illegal internet access is punishable by up to a year in prison.

Women on dating websites: 11 South Africa-based Nigerians were arrested for involvement in an operation targeting divorced and widowed women, aged 40-60, on sites such as Match.com and pof.com. The ruse involved a “United States soldier” who, following months of online courtship, would ask for money to cover a medical emergency. Before being shutdown, the operation collected over 70 million South African rand.

Motor vehicles: The United States FBI and National Highway Traffic Safety Administration recently reminded car owners that their vehicles are only growing “increasingly vulnerable” to attack: “Modern motor vehicles often include new connected vehicle technologies that aim to provide benefits such as added safety features, improved fuel economy, and greater overall convenience. However, with this increased connectivity, it is important that consumers and manufacturers maintain awareness of potential cyber security threats.” Meanwhile, German researchers have their own concerns to share, specifically with ease of breaking into vehicles with keyless entry.

Healthcare.gov: The health insurance web portal for Americans without workplace coverage experienced 316 cybersecurity incidents between October 2013 and March 2015. Although to date no sensitive information has been leaked, Healthcare.gov remains vulnerable to attack.

Everyone!: Not only are we surveilled in our daily lives, that surveillance is so readily accessible that it has found its way into the art of Dries Depoorter. The Belgian artist’s exhibits include footage of Canadian jaywalkers, the recordings of American traffic cameras and side-by-side comparisons of Tinder and LinkedIn photos.

Surf secure and stay Rando!



Want to know more about previous security vulnerabilities? Read on!

SumRando Cybersecurity is a Mauritius-based VPN, Web Proxy and Secure Messenger provider.

Thursday, 17 March 2016

St. Patrick’s Day: Mythical Holiday vs. Modern Reality

Ireland, St. Patrick's Day, censorship, internet access, SumRando Cybersecurity, VPN, Secure Messenger
[Source: Andreas F. Borchert]
Americans of all backgrounds eagerly anticipate March 17 each year as an opportunity to wear green, eat corned beef and cabbage, drink beer and bring out the ‘Irish’ in everyone. St. Patrick’s Day, once a holiday to celebrate the homeland for 19th century Irish immigrants, has grown so ubiquitously popular that even Ireland’s politicians head stateside to participate in American parade festivities.

So, what are the Irish in Ireland up to this St. Paddy’s day?

Some will be celebrating, of course, but others may simply be looking ahead to March 27, the centennial of Ireland’s 1916 uprising. 100 years prior, Irish nationalists revolted against their British government by seizing buildings throughout Dublin and declaring Ireland an independent republic; the fighting that followed left nearly 500 nationalists dead and destroyed much of Dublin. Although the rebellion was all but over in a matter of days, the iron fist used by the British to quell the revolt would eventually come to fuel the resentment necessary to create an independent Irish state in 1949.

Ireland today is certainly not the place it was a century ago, but that is not to say life is all 4-leaf clovers and pots of gold at the end of rainbows. Recently:

  • There has been much criticism over a complete lack of adequate Internet access in much of rural Ireland:  “It is unacceptable for those in rural Ireland to be consigned to battle with poor connectivity. Over and over again we hear of the problems a lack of broadband is causing in rural areas. It is adding to the isolation many in rural Ireland feel—and is contributing to the demise of local communities,” argued Seamus Sherlock of the Irish Cattle and Sheep Farmers’ Association. Fortunately, change is coming: telecoms operator Eir has promised to connect 100,000 residences by 2017 and the government itself has developed a National Broadband Plan to connect 750,000 residences by 2020.

  • Ireland’s Censorship of Publications Board opted to ban a book for the first time in 18 years. “The collective view of the board was that it was a vile publication as it contained graphic descriptions of the rape of a minor,” reported board chairman Shane McCarthy. The initial ban will last for 12 years and prohibit the sale or distribution of the book.

  • No longer a city in shambles, Dublin today is better known as the Silicon Docks, a global tech hub that boasts Facebook’s international operations. The accounts of 83% of all Facebook users (from everywhere but the United States) are managed in Ireland and, increasingly, subject to Irish law: two weeks ago, a German court overturned a decision to allow fake names on Facebook because, although such an act would be protected by German law, Facebook’s real name policy is not in violation of Irish law. The case stems from Facebook’s decision to block the account of a German woman for using a fake name and then unilaterally reinstating it under her actual name.  

  • A banner hung in commemoration of the 1916 uprising found itself under (social media) attack. Tweets of protest over the decision to include portraits of historical figures not involved in the uprising include, “Tourists will be torturing the poor guides with ‘so, where did these guys fight?’” and “Sickened that the official centenary celebration has managed to be more absurd than our 1916 [spoof] documentary.”

Whether or not you choose to celebrate St. Patrick’s Day today, remember that behind this larger-than-life holiday is a people whose struggles—past and present—are very much alive, real and perhaps more similar to your own than you ever imagined.



SumRando Cybersecurity is a Mauritius-based VPN, Web Proxy and Secure Messenger provider. Surf secure and stay Rando!

Thursday, 10 March 2016

Internet Security Depends on Human Behavior, Says RSA’s Amit Yoran

RSA, RSA Conference 2016, Amit Yoran, cybersecurity, SumRando Cybersecurity, VPN, Secure Messenger
Each year, the RSA Conference provides a place for information security experts from around the world to delve deeply into global cybersecurity problems and solutions. This year was no exception, with a record 40,000 individuals in attendance at the 25th anniversary event.

Amidst the sea of technological solutions presented, the keynote address of one man, RSA President Amit Yoran, stood out. His message was clear: until human behavior changes, the Internet will continue to be the insecure place it currently is and hackers will continue to win the cybersecurity war. For three reasons, it is human behavior, not technology, that must change:


Reason #1: The Internet is inherently insecure.

“The general purpose computing paradigms that we operate under cannot be secured. A collection of incredibly complex, interconnected systems, our digital environments, are at their core not deterministic. And with the emergence of IoT, our challenges are only going to get exponentially worse. And yet we continue to push all of our communication, collaboration, and commerce online, pretending that preventative technologies like anti-virus, malware sandboxing, firewalls and even next generation firewalls, will keep us safe when we know that they won’t. Intellectually, we get it, but that’s not translating into changed behavior fast enough.”


Reason #2: Smart creatives today become hackers, not cybersecurity professionals.

“Think about our “game” of cybersecurity. Our opponent isn’t playing the same game and they surely aren’t following the same rules. In fact, our opponents don’t have rules. So in real life, who is sitting across our game board? If you could unveil our opponents, we would likely see creative human beings who are changing the rules as they play.

“For some perspective on tackling the cybersecurity challenge, let’s take a step back and come at our problem from a different angle. Our problem is not a technology problem. Our adversaries aren’t beating us because they have better technology. They’re beating us because they are being more creative, more patient, more persistent. They’re single-minded. They have a target – no prescribed path to get there, no overarching rules limiting them, and a virtually limitless number of pathways to explore.”


Reason #3: Governments continue to fight for security reducing measures, such as weakening encryption.

“We frequently see governments muddying the waters by allowing intelligence communities or law enforcement to dominate national cybersecurity policy and initiatives. Their perspective and agendas are radically different from those trying to defend networks.

“Some policy proposals, like weakening encryption, are so misguided as to boggle the mind. In an era where cybersecurity is consistently cited as the single greatest threat to our way of life, above terrorism and all else, how can we possibly justify a policy that would catastrophically weaken our infrastructures? And contrary to the going dark rhetoric, we live in a golden age of surveillance, more so than at any other point in human history. Weakening encryption is solely for the ease and convenience of law enforcement when pursuing petty criminals. No credible terrorist or nation state actor would ever use technology that is knowingly weakened. However, if we weaken our encryption you can sure bet that the bad guys will use that and exploit it against us. Such a policy would also harm US economic interests on an already suspicious world stage, as well as unconscionably undermine those trying to defend our digital environments in every single industry.”


Yoran began and ended his speech with a reminder that, in today’s world of cybersecurity, actions speak louder than intentions. We simply cannot wait for technology to change or for experts and government officials to catch up. Take matters into your own hands and make a VPN, secure messenging, unique passwords and HTTPS part of your daily Internet routine.



SumRando Cybersecurity is a Mauritius-based VPN, Web Proxy and Secure Messenger provider. Surf secure and stay Rando!

Tuesday, 8 March 2016

This International Women’s Day, Celebrate the Words of Women

“Women are severely underrepresented in the news today. Only around 1 in 4 people heard or read about in news are women.”

Facts such as this, reported by UN Women, remind us of the continued importance of International Women’s Day, celebrated each year on March 8. In honor of the holiday, we have highlighted below the handful of women whose words and actions have successfully captured the media’s attention in recent weeks:

Queen Rania (Jordan): Unwilling to accept a Charlie Hebdo cartoon that suggested drowned Syrian migrant Aylan Kurdi would have grown up to sexually harass women, Queen Rania commissioned Osama Hajjaj to depict an alternate viewpoint: an adult Aylan Kurdi as a productive member of society. “Aylan could’ve been a doctor, a teacher, a loving parent…Thanks @osamacartoons for sketching my thoughts,” Queen Rania tweeted.

Jordan, Queen Rania, Aylan Kurdi, political cartoon, SumRando Cybersecurity, VPN, Secure Messenger
[Source: Twitter]

Manar N (Saudi Arabia): At Starbucks in Saudi Arabia, single people and families enter and sit in separate parts of the establishment. When a dividing wall fell in a Riyadh Starbucks, it was replaced with a sign reading, “PLEASE NO ENTRY FOR LADIES ONLY SEND YOUR DRIVER TO ORDER THANK YOU.” In response, Manar M tweeted, “#Starbucks store in Riyadh refused 2 serve me just because I’m a WOMAN & asked me 2 send a man instead.” A flurry of activity on Facebook and Twitter followed, and within a week, the Starbucks in question was again open to all. 

Jacky Fleming (United Kingdom): Fleming’s latest book, The Trouble With Women, caught the Guardian’s eye. The book of cartoons draws attention to the absence of women from history and challenges the notion that women are less able than their male counterparts. According to Fleming, “Depriving girls of their history is control through lowered expectations.”

Jacky Fleming, The Trouble With Women, United Kingdom, SumRando Cybersecurity, VPN, Secure Messenger
[Source: The Guardian]

Guris Ozen (Turkey): Citing security concerns, Istanbul banned this year’s International Women’s Day rally. When it continued as planned, the Turkish police broke up a crowd of hundreds with rubber bullets. Ozen told Reuters, “We have always said that we would never leave the streets for the March 8 demonstration, and we never will. Neither the police nor the government can stop us. You see the power of women. We are here despite every obstacle and we will continue to fight for our cause.”

Loveness Mudzuru and Ruvimbo Tsopodzi (Zimbabwe): Former child brides Mudzuru and Tsopodzi recently argued to Zimbabwe’s Constitutional Court that child marriage is both illegal and unconstitutional—and the court agreed. According to the Huffington Post, Mudzuru is “happy that we have played an instrumental part in making Zimbabwe a safe place for girls. Raising a child when you are a child yourself is hard.”

Given the current state of women in the media, the words of women are rarely found in headlines, but it is well-worth a reader's time to find them. Every day, women exercise their right to free speech in order to stand up for their gender and for human compassion, but too often these stories aren’t heard.

The United Nation's theme of this year’s International Women’s Day is “Planet 50-50 by 2030: Step It Up for Gender Equality.” If we hope to achieve equal opportunities and rights for women by 2030, we must start by making room for the words of women today.


 
SumRando Cybersecurity is a Mauritius-based VPN, Web Proxy and Secure Messenger provider. Surf secure and stay Rando!

Monday, 29 February 2016

It's a Vulnerable World: February 2016

It's a Vulnerable World, vulnerability, SumRando Cybersecurity, February 2016, VPN, Secure Messenger
Another month, another onslaught of Internet insecurities. The big news in February was the ongoing battle between Apple and the United States Federal Bureau of Investigation (FBI), but this short month also brought reports of vulnerabilities for airports, social media, faces and more:

Airport Wi-Fi: In an effort to demonstrate the danger of public Wi-Fi, Avast Software set up 3 fake Wi-Fi networks next to the Mobile World Congress registration booth at the Barcelona Airport. In 4 hours, Avast had the data of over 2,000 conference attendees. Gagan Singh of Avast advised, “With most Mobile World Congress visitors traveling from abroad, it’s not surprising to see that many opt to connect to free Wi-Fi in order to save money, instead of using data roaming services. When taking this route, people should utilize a VPN service that anonymizes their data while connecting to public hotspots to ensure that their connection is secure.”

Facebook Users and Non-Users: CNiL, the French data protection authority, has found Facebook guilty of collecting the information of non-users who visit public Facebook pages as well as collecting the sexual orientation and religious and political views of users without their explicit consent. CNiL has given Facebook 3 months to comply with the French Data Protection Act. If only the rest of the world were similarly looked after…

African Corporations and Governments: Hacktivist group Anonymous has targeted Rwanda, Uganda, South Africa, Zimbabwe, Tanzania, Sudan, South Sudan and Ethiopia in its latest attack on child abuse, child labor and internet censorship: “The focus of [Operation Africa] is a disassembly of corporations and governments that enable and perpetuate corruption on the African continent.”

Power Grids: Evidence has confirmed that a December blackout in Ukraine was in fact caused by a cyberattack. According to United States officials, such an attack is far from limited to the Eastern European nation, as power grids in countries such as the U.S. are no more secure.

Gmail: The security hasn’t changed, but it has become a bit more apparent. Gmail recently added a red unlock symbol to any emails that haven’t been authenticated by TLS encryption. Look for it: you may be surprised to discover how many insecure emails land in your inbox.
Social Media: February 18 brought not only elections, but also a shutdown of Facebook, Twitter and Whatsapp to Uganda, which was written off as a “security measure.” In response, a reported 1.5 million VPN downloads were used to access these valuable platforms on election day.

The Internet of Things: United States intelligence chief James Clapper is aware of the vulnerabilities found in IoT devices such as cars, appliances and power grids, but appears to view them in a positive light: “In the future, intelligence services might use the IoT for identification, surveillance, monitoring, location tracking, and targeting for recruitment, or to gain access to networks or user credentials.”

Hospital Computer Systems: Vulnerabilities were found this month on both coasts of the United States. Ransomware forced the computers of a California hospital offline until the demanded $17,000. was paid and security researchers revealed the medical devices at a dozen Baltimore and Washington, DC hospitals to be vulnerable to attack.

Your Face: Artists Adam Broomberg and Oliver Chanarin have created portraits of over 100 Russians with Vocord FaceControl 3-D, a camera surveillance system. When utilized as intended, the cameras collect and identify the faces of passersby in crowded entrances to stadiums and train stations.

Surf secure, stay Rando and check out our Leap Year special: 12 months of SumRando Platinum VPN (unlimited data) for only $29 USD!




Want to know more about previous security vulnerabilities? Read on!

SumRando Cybersecurity is a South Africa-based VPN, Web Proxy and Secure Messenger provider.

Tuesday, 2 February 2016

It's a Vulnerable World: January 2016

Vulnerabilities this past month popped up in the places we’d least expect: dental software, Blackphones, thermostats and even Twitter shortlinks, just to name a few. Take note of the risks below and take time to protect yourself:

It's a Vulnerable World, vulnerability, vulnerability roundup, VPN, Secure Messenger, SumRando CybersecurityDental Software: Dentrix G5 has been proven to not live up to the industry-standard level of encryption that its advertising promised, leaving sensitive patient information insecure.
Hyatt Hotels: Malware compromised the payment card data at Hyatt hotel restaurants, spas, golf shops, parking, front desks and sales offices worldwide from August 13 to December 8, 2015. A list of locations affected can be found on Hyatt’s website.

Blackphones: Smart Circle’s Blackphone, the “private by design” smartphone, has a vulnerability of its own: an open socket was found to allow hackers to control functions such texting, calling and altering the phone’s settings.

Phone calls: The MIKEY-SAKKE voice encryption protocol, promoted by the British government as a secure way to communicate, is in fact “motivated by the desire to allow undetectable and unauditable mass surveillance.” MIKEY-SAKKE supports key escrow, which gives the government the very backdoor into phone conversations it was looking for.

Argentina, Brazil, Ecuador and Venezuela: For the last seven years, hacker group Packrat has been targeting political opposition and the independent press in these South American countries with malware, phishing and disinformation. Even more disconcerting is the fact that the attacks are thought to be carried out by government actors.

Nuclear power: 20 countries, including Argentina, China, Egypt, Israel, Mexico and North Korea, completely lack government regulations regarding protection of atomic weapons or nuclear facilities against cyberattacks. According to former United States Senator Sam Nunn, “There was great progress for six or so years. But it has slowed down. It’s hard to keep this subject on the front burner.”

IoT thermostats: The Google-owned Nest Learning Thermostat was found guilty of leaking homeowners’ zip codes. Rest assured, the bug has since been fixed.

Medium in Malaysia:
When Malaysia blocked the Sarawak Report in 2015, the investigative journalism news source turned to publishing its articles on Medium. Now, Malaysia has blocked all of publishing platform Medium, citing “false” reporting as the reason for doing so.

Twitter links: Choose your Twitter shortlinks carefully: disguised links to crashsafari.com have been circulating the platform. Accidentally click on one of them and your iPhone or iPad will shut down immediately.

Surf secure and stay Rando!




Want to know more about previous security vulnerabilities? Read on!
 
SumRando Cybersecurity is a South Africa-based VPN, Web Proxy and Secure Messenger provider. Surf secure and stay Rando!

Thursday, 28 January 2016

Happy Data Privacy Day, Randos!

Today we celebrate Data Privacy Day in honor of the January 28, 1981 signing of the Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data. 35 years later, legislation such as this has never been more important.

Convention 108, as the treaty is more commonly known, was the first legally binding international agreement dedicated to the protection of individuals’ personal data. As the National Cyber Security Alliance reminded us in its Data Privacy Day video:

“What you may not realize is that there is probably more of your personal information floating around in cyberspace than you think. Everything from what you post on social media and your browsing habits to the information organizations collect about you online leaves a digital footprint...Information about you such as the games you like to play, what you search online and where you shop and live has value, just like money. Be thoughtful about who gets that information and how it’s collected through apps and websites.”

A year ago, we celebrated Data Privacy Day by offering our readers tips to enhance their online safety. Take a look. Although we wish we could report otherwise, these seven recommendations are as necessary today as they were in January 2015.

What we suspect has changed in the last year is the willingness of individuals to actively engage in data protection. In comparing 2014’s celebration with 2015’s, StaySafeOnline.org witnessed a nearly 125% increase in web traffic and the number of registered Champions of Data Privacy Day increased approximately 45%. Given that terms such as cybercrime law, data breach, encryption, government backdoor and VPN (and the concern for personal safety that they bring) are far more common than they were in January 2015, we expect this year’s celebration to be bigger than ever before.

January 28 is a day to envision a world that 'Respects Privacy, Safeguards Data and Enables Trust.’ Join us in striving to make this goal a reality.

Monday, 4 January 2016

It’s a Vulnerable World: December 2015

It's a Vulnerable World, Internet insecurity, security vulnerability, SumRando Cybersecurity
[Source: EFF Graphics]

For many, January means a fresh start, but December’s Internet insecurities are far from over. 2015 rounded out with threats to nearly every facet of everyday life, including the basic acts of using a credit card, logging onto a computer and accessing a favorite website. At risk are:
Windows Users: Users who login to Windows 10 via a Microsoft account (i.e. most users) unknowingly upload a copy of their recovery key to Microsoft’s servers, which can be used to access information that would otherwise be protected by encryption. In the words of cryptography professor Matthew Green, “Your computer is now only as secure as that database of keys held by Microsoft, which means it may be vulnerable to hackers, foreign governments, and people who can extort Microsoft employees.”
Android Devices: Symantec recently discovered Android.Spywaller, malware pretending to be a well-known Chinese antivirus app that actually steals information from infected Android devices.

Outdated Encryption Lacking “Salt”: 3.3 million user accounts were leaked from Hello Kitty-owner Sanrio’s database. Much remains unknown about the data breach, but one thing is clear: the compromised passwords were encrypted with now-deprecated SHA-1 hashing and lacked an extra layer of security known as “salt”.

International Officials: Private data including names, phone numbers, usernames, email addresses and secret questions and answers of over 1,400 officials at the UN’s Paris climate talks were made public by Hacktivist movement Anonymous. The leak was in response to the arrest of approximately 100 protesters on November 29. Weak encryption was found to be at least partially to blame.

German and Turkish Banking: Security researcher Karsten Nohl found flaws that compromise personal identification number (PIN) codes, transactions and funds in German retail payment systems. In Turkey, a two-week attack thought to be carried out by Anonymous repeatedly disrupted credit card transactions and banks in general.

Internet of Things:
A study of 4,000 IoT devices from 70 different manufacturers revealed only 580 unique keys, the result of sharing, leaking and/or stealing code. Motherboard summarized the situation well: “Imagine an apartment building of 4,000 rooms but with only 580 different locks; the odds would be pretty good that your neighbor and you share the same front-door key. It’s a bit unsettling.” These static keys most affect devices in the United States, Mexico and Brazil.

Mobile Apps: Wandera revealed that 16 travel and leisure companies, collectively serving 500,000 users per day, had failed to use the encryption necessary to protect credit card information when submitted via a mobile app or website. To date, only easyJet, Chiltern Railways, San Diego Zoo, CN Tower, Aer Lingus, Air Canada and SISTIC have remedied the issue.

World Wide Web: Malvertising, when hackers buy ad space on otherwise trustworthy websites, became increasingly common in 2015. By taking advantage of computer vulnerabilities, hackers only need users to open a website in order to steal financial information or lock files in exchange for ransom.
As always, let us know if there are any vulnerabilities we missed in the comments below.




Want to know more about previous security vulnerabilities? Read on!

SumRando Cybersecurity is a South Africa-based VPN, Web Proxy and Secure Messenger provider. Surf secure and stay Rando!

Tuesday, 8 December 2015

Let’s Encrypt: Free, Automated and Open

Let's Encrypt, encryption, HTTPS, Internet Security Research Group, ISRG, Josh Aas
[Source: Let's Encrypt]
It’s a Christmas miracle: Let’s Encrypt has entered public beta, making free HTTPS certificates readily available to all.

‘HTTPS’, usually accompanied by a padlock, are the five letters preceding a website URL that tell you all data sent between your browser and the website will be encrypted, making it safe for you to enter your password, credit card information or anonymous comment. Without Hyper Text Transfer Protocol Secure, your information could easily be compromised by anyone interested in taking it.

As Jacob Hoffman-Andrews of the Electronic Frontier Foundation recently reminded readers, “A huge percentage of the world’s daily Internet usage currently takes place over unencrypted HTTP, exposing people to illegal surveillance and injection of unwanted ads, malware, and tracking headers into the websites they visit.”

When reached for comment, Internet Security Research Group (ISRG) Executive Director Josh Aas reported, “I’m not 100% sure what the future holds, but demand for Let’s Encrypt’s services seems to be strong. Ultimately what we care about most is seeing two numbers go up: 1) the percentage of sites using HTTPS and 2) the percentage of encrypted traffic on the Web. We want those numbers as close to 100% as possible. That’s the next big step for the Web to take in terms of privacy and security.”

Let’s Encrypt, a joint project stemming from ISRG, was born in 2012 when Aas and then-Mozilla coworker Eric Rescorla concluded that the best way to increase transport layer security (TLS) usage on the Internet would be to provide a free and fully automated certificate authority. Three years later, Let’s Encrypt has issued more than 26,000 invite-only HTTPS certificates, a number that will only grow exponentially now that the service is accessible to all.

Anyone who owns a domain name is welcome to obtain a Let’s Encrypt certificate; for information regarding installation or renewal, go to https://letsencrypt.org/howitworks/. In keeping with an open internet, Let’s Encrypt is a transparent, cooperative effort that makes publicly available all issued and revoked certificates, publishes open standard protocols for adoption and is overseen by independent experts and those from supporting organizations alike. Although still in beta, Let’s Encrypt is committed to closely monitoring user feedback and quickly making improvements.

Here’s to an encrypted 2016!




Want to know more about the encryption debate? Read on! 
SumRando Cybersecurity is a South Africa-based VPN, Web Proxy and Secure Messenger provider. Surf secure and stay Rando!

Tuesday, 1 December 2015

It’s a Vulnerable World: November 2015

It's a Vulnerable World, security vulnerabilities, Africa, Middle EastNovember was a month filled with insecure phones, credit cards and websites of all kinds.

The big trend, however, was the growing threat of cybercrime to Africa and the Middle East. The BBC called cybercrime Africa’s “next big threat”; a Fire Eye report found that cybercrimes doubled in the Middle East, Africa and Turkey in the first half of 2015; and ACLU principal technologist, Chris Soghoian, argued, “We now find ourselves in not just a digital divide but a digital security divide. The phone used by the rich is encrypted by default and cannot be surveilled, and the phone used by most people in the global south and the poor and disadvantaged in America can be surveilled.”

With that in mind, we bring you November’s vulnerability roundup:
Android phones: Google is capable of unlocking all Android phones prior to Android 5.0 that utilize a pattern lock. Protect yourself by switching to a PIN, password or fingerprint lock.

Credit card numbers: Security researcher Samy Kamkar cracked the code to American Express credit cards, enabling him to predict future card numbers. “The day that card is cancelled, as soon it gets rejected, two seconds later I know what your new number and expiration date will be. If I were doing fraud, that would be pretty useful,” Kamkar said.

Linux-based operating systems: Ransomware Linux.Encoder.1 has been found to target Linux-based operating systems, demanding a one Bitcoin/$500 ransom. If there remains any uncertainty about the future of ransomware, a recent Intel Security report predicted it will be 2016’s greatest threat to cybersecurity.

Dating websites: In case Ashley Madison wasn’t evidence enough of the insecurity of dating websites, Tantan (the Tinder of China) was recently found guilty of not encrypting or otherwise protecting phone numbers, passwords, gender, sexual orientation, interests and hobbies listed on the website.

…And nearly all other websites: A study done at the University of Pennsylvania revealed that “nearly 9 in 10 websites leak user data to parties of which the user is likely unaware.” The data, in turn, is leaked to 9 domains on average.

...And software of all kinds: Zerodium, a broker of “zero day exploits” (hacker techniques), has brought attention to the hush-hush market by publishing a list of going rates. The price for cracking a browser such as Chrome, Internet Explorer, Tor, or Firefox is $30,000; for an Android or Windows phone is $100,000; and for an Apple iOS phone is $500,000. Zerodium’s customers, in turn, are corporations and government organizations.  

Data collection: The data breach of childrens’ technology firm VTech compromised the information of 5 million parents and 200,000 children, including profile photos, audio files and chat logs, leaving many to wonder why there was so much information to steal. Mark Nunnikhoven of Trend Micro wisely advised, “Don’t collect data because it might be useful at some point. This opens the organizations up to unnecessary risk.” 

As always, let us know if there are any vulnerabilities we missed in the comments below.



Want to know more about previous security vulnerabilities? Read on!

SumRando Cybersecurity is a South Africa-based VPN, Web Proxy and Secure Messenger provider. Surf secure and stay Rando!

Friday, 27 November 2015

Seven Tips for A Secure Cyber Monday

Cyber Monday, VPN, Internet security, hackers
[Source: Kevin Marks]
Thanksgiving may be an all-American holiday, but Cyber Monday no longer belongs to any country in particular. Internet users from Brazil, Colombia, Egypt, Uganda and the United Arab Emirates alike will go online November 30 in search of deals, but hackers will also be there, looking for information to steal.

Before you shop online this Monday, protect yourself:
  • Take advantage of two-factor authentication when possible: Many platforms offer an additional layer of protection beyond username and password. If this is an option, take it. Amazon.com, for example, will now text users a code that needs to be entered before logging in. To set this up, click on “Your Account”, “Change Account Settings” and finally “Advanced Security Settings”; your stored personal and credit card information will thank you.  

  • Answer security questions with fake answers: What is your mother’s maiden name? What year did you graduate high school? What street did you grow up on? With Facebook, Google and a little ingenuity, it’s not hard for a hacker to find the actual answers to your security questions. Think differently: What was your first pet’s name? To get to the other side. 
 
  • Beware of pop ups and unsolicited emails: The approaching holiday season means that retailers are working hard to get you to buy now more than ever—and that hackers are creating malicious links they hope you will click on. (Typos and mismatched URLs are warning signs worth noting.) Yes, you will receive an onslaught of pop ups and emails, but you do not have to click on their links or attachments. If you see an offer you like, type the URL into your browser rather than use the link provided.   
 
  • Look for HTTPS and a padlock in your browser: HTTP is not enough if you are about to enter personal or credit card information. A secure site will begin with https://.
 
  • Choose credit over debit: A hacker with your debit card information also has access to your bank account. Credit cards, alternatively, typically have protections against unwanted purchases built into their user agreements. 
 
  • Avoid QR codes: Those pixelated squares that can be scanned by your phone’s camera can also be infiltrated by hackers to redirect to a malicious website. QR codes are convenient, but not worth the risk involved. 
 
  • Use a VPN for an extra layer of protection: Hoping to do a little mobile shopping while waiting in line for coffee? Whether you’re at the mall, a coffee shop or the airport, public Wi-Fi is an insecure hacker haven. Be sure to login to a VPN to secure your connection and encrypt your traffic.
 
Utilizing two-factor authentication, typing in a URL, and logging into your SumRando VPN connection are measures that will slow down your Cyber Monday shopping, but they will also protect your purchases from the prying eyes of hackers. Isn’t your security worth it?


SumRando Cybersecurity is a South Africa-based VPN, Web Proxy and Secure Messenger provider.
 Surf secure and stay Rando!

Wednesday, 11 November 2015

Freedom on the Net Amounts to “Privatizing Censorship, Eroding Privacy”

Freedom House’s 2015 Freedom on the Net report highlights the fact that a lack of digital liberty is a problem unique to no particular corner of the earth. For the fifth year in a row, internet freedom as defined by obstacles to access, limits on content and violations of user rights has declined. The report includes 65 countries, representing 88% of the world’s online population; nearly half of these users reside in China, India or the United States.

Iceland, Estonia and Canada were found to be most free while China, Syria and Iran claimed the titles of least free. Libya, Ukraine and France took the biggest tumbles downward in 12 months, due to internal conflict, conflict with Russia and the aftermath of Charlie Hebdo, respectively.

Freedom House, Freedom on the Net 2015, censorship, internet censorship, international censorship

"Undermining online encryption and anonymity weakens the internet for everyone, but especially for human rights activists and independent journalists," reports Freedom on the Net Project Director, Sanja Kelly. Featured below are just a few of the many examples of what can go wrong when freedom goes without guarantee, according to the study's Summary of Findings.
  • In Morocco, police detained 17-year old rapper Othman Atiq for three months after he criticized them in online videos.
  • In Indonesia, a young woman was sentenced to two months in prison after her social media complaint calling the city of Yogyakarta “uncivilized” went viral in March 2015.
  • In 2014, the Saudi #Women2Drive campaign encouraged women to share videos and images of themselves behind the wheel to challenge a de facto ban on women drivers, but authorities blocked the campaign website.
  • In July 2015, a Turkish court banned five websites for promoting the Kurdistan Workers’ Party (PKK), a designated terrorist organization. However, since the sites were hosted on WordPress.com—an international blog-hosting service that employs HTTPS—Turkish ISPs had to block all of WordPress, affecting more than 70 million websites.
  • In Saudi Arabia, sentences for posting controversial content online often include requirements to close social media accounts and bans on further posts. When the human rights lawyer Walid Abulkhair refused, his prison sentence was increased from 10 to 15 years.
  • In July 2015, a leak of documents from the information technology company Hacking Team named the governments of Azerbaijan, Egypt, Ethiopia, Uzbekistan, and Vietnam—all of which have jailed activists and bloggers—as Hacking Team clients, despite the company’s claim that it does not sell to countries where there are credible human rights concerns.
  • In Cuba, encryption services must be preapproved by the government, ensuring that none are impervious to state surveillance.
  • In India, ISPs are banned from encrypting customer data in bulk, allowing state security agencies to scan all traffic for keywords.
  • In August 2015, three staff members working for Vice News were arrested in southeastern Turkey and charged with supporting terrorists after authorities found encryption software on one of their computers. 
  • A decree in Vietnam bans the use of pseudonyms on blogs, following the lead of increasingly strict real-name registration for social media activity in China, and all IP addresses in Iran must be registered with the authorities. 
  • Eight men were jailed in Egypt in December 2014 for appearing in a video documenting a gay couple’s wedding ceremony. A court sentenced them to three years’ imprisonment for “inciting debauchery,” later reduced to one year. 
  • Assailants in the Mexican border state of Tamaulipas murdered Maria del Rosario Fuentes Rubio for administering a Twitter and Facebook network that reported criminal violence, then broadcast photos of her body using her mobile phone and Twitter account. 
  • Iranian cartoonist Atena Farghadani was sentenced to 12 years in prison on charges of insulting state officials and spreading propaganda for posting this image on Facebook depicting members of parliament as animals, casting votes on proposed legislation to limit reproductive rights. 
Iran, Atena Farghadani, censorship
Iranian Atena Farghadani received a 12 year sentence for her critique of parliament.

Despite the report's countless examples of privacy violations, the year is not without forward momentum. Governments worldwide have made more of an effort to force companies and individuals to remove unwanted content, but largely in response to the ability of VPNs and encryption technology to otherwise prevent blocking and filtering of content. "Governments are increasingly pressuring individuals and the private sector to take down or delete offending content, as opposed to relying on blocking and filtering. They know that average users have become more technologically savvy and are often able to circumvent state-imposed blocks," says Kelly.

Furthermore, legislative change and judicial decisions have been primary sources of positive change, “indicating that countries with meaningful political debates and independent judiciaries have a distinct advantage in safeguarding internet freedom over their more authoritarian counterparts.”

* Updated November 12, 2015 to include comments from Sanja Kelly of Freedom House.

SumRando Cybersecurity is a South Africa-based VPN, Web Proxy and Secure Messenger provider. Surf secure and stay Rando!

Thursday, 5 November 2015

Corporations Worldwide Lack Digital Rights Accountability

The results of Ranking Digital Rights’ 2015 Corporate Accountability Index can be summarized in two words: needs improvement.

The inaugural Index examined eight Internet companies and eight telecommunications companies that collectively provide access to billions worldwide and concluded that “There are no ‘winners.’ Even companies in the lead are falling short.” 

Results were tallied overall and in three categories: Commitment, Freedom of Expression and Privacy. Of Internet companies, the United States’ Google ranked the highest with a score of 65% and Russia’s Mail.Ru Group came in at a low 13%. For telecoms, British Vodafone reported a high score of 54% and Emirates’ Etisalat rounded out the rankings with a score of 14%.

Ranking Digital Rights, 2015 Corporate Accountability Index, Google, Yahoo, Microsoft, Twitter, Kakao, Facebook, Tencent, Mail.Ru
Ranking Digital Rights, 2015 Corporate Accountability Index, Vodaphone, At&T, Orange, America Movil, MTN, Bharti Airtel, Axiata, Etisalat

Wednesday, 4 November 2015

CISA: Thankfully, Not Yet a Law

What do United States Senators Wyden, Heller, Leahy and Franken have in common?

They all tried to mitigate the potential damage of the Cybersecurity Information Sharing Act (CISA), but to no avail. Their proposed amendments would have protected personally identifiable information and the framework of the Freedom of Information Act, and restricted the definitions of cybersecurity threat and threat indicator.

Instead, last Tuesday, the Senate approved CISA as is by a vote of 74 to 21. The legislation will allow U.S. companies to voluntarily share user data with the U.S. Department of Homeland Security, which in turn could pass that data along to the NSA and FBI. The bill, already widely criticized by the civil liberties and technology communities alike, has repeatedly been associated with two main concerns: first, it will enable companies to share users’ information regardless of protections under other laws and agreements and second, it will empower the U.S. government to domestically prosecute foreign nationals who have committed cybercrimes against U.S. companies, regardless of their location.

Monday, 2 November 2015

It’s a Vulnerable World: October 2015

October’s insecurities bring more tricks than treats, leaving the entities that sustain modern society—Wi-Fi routers, the cloud, nuclear facilities, telecom companies and even clocks—open to attack.
Journalists: Not one, but two tools advertised to protect journalists’ communications were found to be not-so-secure this month: TrueCrypt, a disk encryption software program, has taken responsibility for its recently discovered threat to Windows computers’ security and included a disclaimer on its homepage: “WARNING: Using TrueCrypt is not secure as it may contain unfixed security issues”; conversely, Reporta’s website boasts its technology was designed “to empower journalists working in potentially dangerous conditions to quickly implement their security protocols with the touch of a button,” yet in response to numerous concerns from security experts, Executive Director Elisa Lees Munoz acknowledged the technology is still a “work in progress.”

Wi-Fi routers: Linux.Wifatch has brought a whole new meaning to malware. Wifatch has illegally infected more than 10,000 unprotected routers, but with the purported intention of making them more secure. Nonetheless, when Symantec asked the anonymous hacker whether s/he could be trusted, the response was: “Of course not, you should secure your device.” Routers have been infected worldwide, in countries including China, Brazil, Mexico and India.

AWS, Amazon Web Services, cloud computing, cross-VM RSA Key Recovery, Worcester Polytechnic Institute
Cloud computing proves yet again to be insecure. [Source: FutUndBeidl]
The cloud: “Seriously, get off my cloud! Cross-VM RSA Key Recovery in a Public Cloud,” a study published by the Worcester Polytechnic Institute, demonstrated how a hacker could steal encryption keys in Amazon Web Services’ cloud. Amazon argued that the flaw, since fixed, did not represent a real-world vulnerability. Security scientist Yehuda Lindell countered: “Although a difficult attack to carry out, this further highlights the fact that secret keys are vulnerable, wherever they may be. They are even more vulnerable in cloud and virtualized environments where you have less direct control.”
Nuclear power stations: A recent Chatham House report found that nuclear facilities are at an elevated risk for cyberattacks, as standard security precautions—such as air gapping, training for personnel, and proactive cybersecurity policies—are largely lacking.

Wireless printers: Singapore researchers successfully hacked a wireless printer with only a drone and a mobile phone, proving that even the most hard-to-reach offices are none too secure. Let this be your reminder to check your printer’s security settings.

Siri and Google Now: For those who tend to keep microphone-enabled headphones plugged into their phones, know that French researchers can convert the headphone cord into an antenna and then use Siri or Google Now to “make calls and send texts, dial the hacker’s number to turn the phone into an eavesdropping device, send the phone’s browser to a malware site, or send spam and phishing messages via email, Facebook, or Twitter.” A word to the wise: disable Siri or Google Now from your lock screen now.

Telecom companies: TalkTalk is determined to prove why companies should not store their users’ data: the U.K. telecommunications and Internet provider has suffered its third hack in the past year. This time, the unencrypted names, email addresses and phone numbers of 1.2 million users were stolen, along with dates of birth and obscured credit and debit card details.

Back to the Future, Part II, data manipulation, Network Time Protocol
Data manipulation comes to computer clocks. [Source: Back to the Future, Part II]
Clocks: Keeping with a growing trend of manipulating data rather than simply stealing it, Boston University security researchers have shown it is possible for hackers to attack the Network Time Protocol (NTP) of a computer system in order to change the system’s time and also to prevent the synchronization of clocks via a denial of service attack. Back to the future, indeed.  

As always, let us know if there are any vulnerabilities we missed in the comments below.



Curious about additional security vulnerabilities? Read on!

SumRando Cybersecurity is a South Africa-based VPN, Web Proxy and Secure Messenger provider. Surf secure and stay Rando!