forked from micheleMM/N-O-D-E.net
-
Notifications
You must be signed in to change notification settings - Fork 0
/
dd09.html
165 lines (104 loc) · 8.72 KB
/
dd09.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
<!--
=============================
_ ______ ____ ______
/ | / / __ \/ __ \/ ____/
/ |/ / / / / / / / __/
/ /| / /_/ / /_/ / /___
/_/ |_/\____/_____/_____/
=============================
-->
<!DOCTYPE html>
<html>
<head>
<title>N O D E</title>
<meta name="google-site-verification" content="KAh0wcTC2Anz5ea6Kq26RuhsiUKx5FD3D4HZAJdfaf4" />
<link rel="shortcut icon" href="images/avatar.png">
<link rel="alternate" href="https://n-o-d-e.net/rss/rss.xml" type="application/rss+xml" title="N O D E"/>
<link href="https://fonts.googleapis.com/css?family=Share+Tech+Mono" rel="stylesheet" type="text/css">
<link rel="stylesheet" type="text/css" href="css/style.css" media="screen">
</head>
<body>
<div id="page">
<div id="content">
<!--HEADER SECTION -->
<div id="header"><pre>
<a class="node" href="http://n-o-d-e.net">
×× ×× ××××× ×××××× ××××××
××× ×× ×× ×× ×× ×× ××
×× × ×× ×× ×× ×× ×× ×××××
×× ××× ×× ×× ×× ×× ××
×× ×× ××××× ×××××× ××××××</a>
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------</pre>
</div>
<!--CONTENT -->
<div id="list">
<div class="title">
DEAD DROP 9 / NAVY BREACH, RIOT ENCRYPTION, MICROPHONE HEADPHONES, UNSECURED WIFI<br>
--
</div>
<div id="post">
<p>Welcome to Dead Drop number 9, a look at what's happening in the worlds of computer security and internet freedom. All source links mentioned are below.</p>
<div class="videowrapper">
<iframe src="https://www.youtube.com/embed/bWT3LgSMEwU?rel=0&showinfo=0" frameborder="0"></iframe>
</div>
<p class="description">
- <a href="https://www.youtube.com/watch?v=bWT3LgSMEwU" target="_blank">Youtube link</a><br>
- <a href="https://archive.org/download/deaddrop09/dd09.mp4" target="_blank">Archive.org mirror</a><br>
- <a href="https://archive.org/download/deaddrop09/deaddrop09_archive.torrent" target="_blank">Torrent</a><br>
- <a href="https://keybase.pub/nodefiles/dd09.mp4" target="_blank">Keybase mirror</a>
</p>
<p class="subtitle">BREACHES</p>
<p>A laptop used by a Navy IT contractor was recently hacked, exposing sensitive data including social security numbers of about 130,000 Navy personnel. A spokesman said that those affected will be notified in the coming weeks.</p>
<p>http://www.reuters.com/article/us-usa-cyber-navy-idUSKBN13J001</p>
<p class="subtitle">COMMUNICATION</p>
<p>Riot announced that the latest version of their decentralized, cross-platform chat app now has end-to-end encryption built in, meaning room admins now have the ability to increase the privacy of users.</p>
<p>https://medium.com/@RiotChat/exciting-new-riot-release-get-ready-for-chatting-securely-acc93ecfe0a<br>
http://riot.im</p>
<p>The Tor Project also pushed out a new release of their Tor Messenger app this week too. Have any of you tried either of these chat apps? What are your thoughts?</p>
<p>https://blog.torproject.org/blog/tor-messenger-030b1-released</p>
<p class="subtitle">HACKING</p>
<p>Blackhat uploaded a tonne of new videos from their latest conference, Black Hat USA 2016. As always, there are many different topics covered to get your neurons firing.</p>
<p>https://www.youtube.com/user/BlackHatOfficialYT/videos</p>
<p class="subtitle">WIFI</p>
<p>Kaspersky Lab created a report on the security of wireless networks around the globe, according to their security network database. They found that of the 32 million access points assessed, roughly ¼ of them are completely open, without any form of encryption. It also drills down into the types of encryption used, and distribution around the world. Well worth a read.</p>
<p>https://securelist.com/blog/research/76733/research-on-unsecured-wi-fi-networks-across-the-world/</p>
<p>And speaking of unsecured networks, AndroidAuthority on Youtube, released a good 101 video about the different ways someone could go about capturing data on open wifi hotspots.</p>
<p>https://www.youtube.com/watch?v=YzP3ZL4vlkY</p>
<p class="subtitle">INTERNET OF FAILS</p>
<p>On the back of all the IP camera fails I've covered recently, a new serious vulnerability has been found in Siemens-branded CCTV cameras, used widely by government and healthcare organizations. </p>
<p>A careful crafted request can be exploited remotely, revealing admin credentials, and leading to access. A patch has been released, but it requires individual camera operators to apply it manually. </p>
<p>https://threatpost.com/credentials-accessible-in-siemens-branded-cctv-cameras/122072/<br>
https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-284765.pdf</p>
<p class="subtitle">VULNERABILITIES</p>
<p>Another day, another massive Android vulnerability, this time, affecting almost 3 million Chinese handsets. Similar to something I covered in an earlier episode, researchers found a hidden binary responsible for software updates, which can be taken advantage of using a man in the middle attack, allowing attackers to install and run, anything they like.</p>
<p>http://blog.anubisnetworks.com/blog/ragentek-android-ota-update-mechanism-vulnerable-to-mitm-attack<br>
https://thehackernews.com/2016/11/hacking-android-smartphone18.html<br>
https://www.youtube.com/watch?v=I0P5vOmuzqw</p>
<p class="subtitle">PRIVACY</p>
<p>Researchers at Ben Gurion University showed off a way to turn headphones into microphones, for audio surveillance. This is due to the widely used Realtek audio codec chip, which allows attackers to change audio output to audio input.</p>
<p>https://www.youtube.com/watch?v=ez3o8aIZCDM<br>
https://thehackernews.com/2016/11/headphone-spying-malware.html</p>
<p class="subtitle">BIG DATA</p>
<p>And finally, Bloomberg reports that some financial insitutions have begun using phone data, like location, call and browsing habits, to determine whether people who don't have credit histories are allowed or denied loans. </p>
<p>This opens up the possibility of being pre-declined for loans, just by virtue of where you live, who you know, and what your interests are.</p>
<p>https://www.bloomberg.com/news/articles/2016-11-25/no-credit-history-no-problem-lenders-now-peering-at-phone-data<br>
https://www.youtube.com/watch?v=g-MkkXUFedE</p>
<p>--<br>
BY NODE</p>
</div>
</div>
<!--FOOTER SECTION -->
<div id="footer">
<pre>------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------</pre>
<div class="filter">
<a href="http://n-o-d-e.net">HOME</a>
<span class="footdogs"> × </span>
<a href="http://N-O-D-E.net/shop/">SHOP</a>
<span class="footdogs"> × </span>
<a target="_blank" href="http://patreon.com/N_O_D_E_">PATREON</a>
<span class="footdogs"> × </span>
<a target="_blank" href="https://github.com/N-O-D-E/N-O-D-E.net">GITHUB</a>
</div>
</div>
</body>
</html>