<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber Security October 2018</title>
	<atom:link href="http://www.epanorama.net/blog/2018/10/01/cyber-security-october-2018/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2018/10/01/cyber-security-october-2018/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Wed, 22 Apr 2026 08:40:06 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/10/01/cyber-security-october-2018/comment-page-10/#comment-1610901</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Nov 2018 13:32:54 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=179892#comment-1610901</guid>
		<description><![CDATA[https://www.tivi.fi/Kaikki_uutiset/f-secure-ja-elisa-kehittavat-iot-ajan-reititinta-lupaa-suojaa-vaikka-valmistaja-ei-ole-tietoturvaa-edes-miettinyt-6746856]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.tivi.fi/Kaikki_uutiset/f-secure-ja-elisa-kehittavat-iot-ajan-reititinta-lupaa-suojaa-vaikka-valmistaja-ei-ole-tietoturvaa-edes-miettinyt-6746856" rel="nofollow">https://www.tivi.fi/Kaikki_uutiset/f-secure-ja-elisa-kehittavat-iot-ajan-reititinta-lupaa-suojaa-vaikka-valmistaja-ei-ole-tietoturvaa-edes-miettinyt-6746856</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/10/01/cyber-security-october-2018/comment-page-10/#comment-1610798</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Nov 2018 09:21:50 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=179892#comment-1610798</guid>
		<description><![CDATA[Emotet Trojan Begins Stealing Victim&#039;s Email Using New Module
https://www.bleepingcomputer.com/news/security/emotet-trojan-begins-stealing-victims-email-using-new-module/]]></description>
		<content:encoded><![CDATA[<p>Emotet Trojan Begins Stealing Victim&#8217;s Email Using New Module<br />
<a href="https://www.bleepingcomputer.com/news/security/emotet-trojan-begins-stealing-victims-email-using-new-module/" rel="nofollow">https://www.bleepingcomputer.com/news/security/emotet-trojan-begins-stealing-victims-email-using-new-module/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/10/01/cyber-security-october-2018/comment-page-10/#comment-1610796</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Nov 2018 09:21:35 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=179892#comment-1610796</guid>
		<description><![CDATA[Complete Works Of Shakespeare Hidden Inside Twitter Thumbnail Image
https://www.bleepingcomputer.com/news/security/complete-works-of-shakespeare-hidden-inside-twitter-thumbnail-image/

A security researcher has demonstrated how he could hide the Complete Works of Shakespeare into an image and use Twitter to distribute it using Steganography.

Steganography is the act of hiding information or messages inside objects that are not themselves secret. This allows people to covertly distribute messages, files, and other types of data in files or data that appear to be non-secretive in nature.

In a recent experiment, security researcher Dаvіd Вucһаnаn created a JPEG image of Shakespeare that also included a RARed copy of his complete works in HTML format.  Buchanan went on to further show that this image could also be uploaded to Twitter, which would create a thumbnail that continued to contain the embedded RAR file.]]></description>
		<content:encoded><![CDATA[<p>Complete Works Of Shakespeare Hidden Inside Twitter Thumbnail Image<br />
<a href="https://www.bleepingcomputer.com/news/security/complete-works-of-shakespeare-hidden-inside-twitter-thumbnail-image/" rel="nofollow">https://www.bleepingcomputer.com/news/security/complete-works-of-shakespeare-hidden-inside-twitter-thumbnail-image/</a></p>
<p>A security researcher has demonstrated how he could hide the Complete Works of Shakespeare into an image and use Twitter to distribute it using Steganography.</p>
<p>Steganography is the act of hiding information or messages inside objects that are not themselves secret. This allows people to covertly distribute messages, files, and other types of data in files or data that appear to be non-secretive in nature.</p>
<p>In a recent experiment, security researcher Dаvіd Вucһаnаn created a JPEG image of Shakespeare that also included a RARed copy of his complete works in HTML format.  Buchanan went on to further show that this image could also be uploaded to Twitter, which would create a thumbnail that continued to contain the embedded RAR file.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/10/01/cyber-security-october-2018/comment-page-10/#comment-1610795</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Nov 2018 09:21:06 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=179892#comment-1610795</guid>
		<description><![CDATA[Telegram Desktop Saves Conversations Locally in Plain Text
https://www.bleepingcomputer.com/news/security/telegram-desktop-saves-conversations-locally-in-plain-text/

The desktop variant for Telegram secure messaging app fails to protect chat content locally and offers access to plain text conversations and media that otherwise travel encrypted.

Telegram’s focus on providing secure communication is well known. The app uses encryption to ensure that a third party cannot read the conversations on their way to the destination.

A feature called ‘secret chats’ is available for those that want complete privacy for their communication, by using end-to-end encryption to guarantee that only the sender and the receiver can access the contents.]]></description>
		<content:encoded><![CDATA[<p>Telegram Desktop Saves Conversations Locally in Plain Text<br />
<a href="https://www.bleepingcomputer.com/news/security/telegram-desktop-saves-conversations-locally-in-plain-text/" rel="nofollow">https://www.bleepingcomputer.com/news/security/telegram-desktop-saves-conversations-locally-in-plain-text/</a></p>
<p>The desktop variant for Telegram secure messaging app fails to protect chat content locally and offers access to plain text conversations and media that otherwise travel encrypted.</p>
<p>Telegram’s focus on providing secure communication is well known. The app uses encryption to ensure that a third party cannot read the conversations on their way to the destination.</p>
<p>A feature called ‘secret chats’ is available for those that want complete privacy for their communication, by using end-to-end encryption to guarantee that only the sender and the receiver can access the contents.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/10/01/cyber-security-october-2018/comment-page-10/#comment-1610794</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Nov 2018 09:20:35 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=179892#comment-1610794</guid>
		<description><![CDATA[Check this out: Radisson Hotel Group &#039;fesses up to &#039;security incident&#039;
Loyalty card members deets exposed
https://www.theregister.co.uk/2018/10/31/radisson_hotel_group_fesses_up_to_security_incident/]]></description>
		<content:encoded><![CDATA[<p>Check this out: Radisson Hotel Group &#8216;fesses up to &#8216;security incident&#8217;<br />
Loyalty card members deets exposed<br />
<a href="https://www.theregister.co.uk/2018/10/31/radisson_hotel_group_fesses_up_to_security_incident/" rel="nofollow">https://www.theregister.co.uk/2018/10/31/radisson_hotel_group_fesses_up_to_security_incident/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/10/01/cyber-security-october-2018/comment-page-10/#comment-1610793</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Nov 2018 09:20:18 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=179892#comment-1610793</guid>
		<description><![CDATA[50 ways to leave your lover, but four to sniff browser history
Vulnerabilities that expose browsing history yet to be fixed
https://www.theregister.co.uk/2018/10/31/web_browsers_privacy/]]></description>
		<content:encoded><![CDATA[<p>50 ways to leave your lover, but four to sniff browser history<br />
Vulnerabilities that expose browsing history yet to be fixed<br />
<a href="https://www.theregister.co.uk/2018/10/31/web_browsers_privacy/" rel="nofollow">https://www.theregister.co.uk/2018/10/31/web_browsers_privacy/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/10/01/cyber-security-october-2018/comment-page-10/#comment-1610742</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Nov 2018 00:40:52 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=179892#comment-1610742</guid>
		<description><![CDATA[Return of the Ping of Death

Kernel RCE caused by buffer overflow in Apple&#039;s ICMP packet-handling code (CVE-2018-4407)
https://lgtm.com/blog/apple_xnu_icmp_error_CVE-2018-4407

This post is about a heap buffer overflow vulnerability which I found in Apple&#039;s XNU operating system kernel. I have written a proof-of-concept exploit which can reboot any Mac or iOS device on the same network, without any user interaction. Apple have classified this vulnerability as a remote code execution vulnerability in the kernel, because it may be possible to exploit the buffer overflow to execute arbitrary code in the kernel.

The following operating system versions and devices are vulnerable:

Apple iOS 11 and earlier: all devices (upgrade to iOS 12)
Apple macOS High Sierra, up to and including 10.13.6: all devices (patched in security update 2018-001)
Apple macOS Sierra, up to and including 10.12.6: all devices (patched in security update 2018-005)
Apple OS X El Capitan and earlier: all devices]]></description>
		<content:encoded><![CDATA[<p>Return of the Ping of Death</p>
<p>Kernel RCE caused by buffer overflow in Apple&#8217;s ICMP packet-handling code (CVE-2018-4407)<br />
<a href="https://lgtm.com/blog/apple_xnu_icmp_error_CVE-2018-4407" rel="nofollow">https://lgtm.com/blog/apple_xnu_icmp_error_CVE-2018-4407</a></p>
<p>This post is about a heap buffer overflow vulnerability which I found in Apple&#8217;s XNU operating system kernel. I have written a proof-of-concept exploit which can reboot any Mac or iOS device on the same network, without any user interaction. Apple have classified this vulnerability as a remote code execution vulnerability in the kernel, because it may be possible to exploit the buffer overflow to execute arbitrary code in the kernel.</p>
<p>The following operating system versions and devices are vulnerable:</p>
<p>Apple iOS 11 and earlier: all devices (upgrade to iOS 12)<br />
Apple macOS High Sierra, up to and including 10.13.6: all devices (patched in security update 2018-001)<br />
Apple macOS Sierra, up to and including 10.12.6: all devices (patched in security update 2018-005)<br />
Apple OS X El Capitan and earlier: all devices</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/10/01/cyber-security-october-2018/comment-page-10/#comment-1610727</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 31 Oct 2018 19:57:42 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=179892#comment-1610727</guid>
		<description><![CDATA[Zack Whittaker / TechCrunch: 	
Audit finds a US Geological Survey network in South Dakota was infected with malware after an unnamed employee visited thousands of porn pages on his laptop

Civil servant who watched porn at work blamed for infecting a US government network with malware
https://techcrunch.com/2018/10/29/porn-sites-blamed-after-government-network-infected-malware/

A U.S. government network was infected with malware thanks to one employee’s “extensive history” of watching porn on his work computer, investigators have found.

The audit, carried out by the U.S. Department of the Interior’s inspector general, found that a U.S. Geological Survey (USGS) network at the EROS Center, a satellite imaging facility in South Dakota, was infected after an unnamed employee visited thousands of porn pages that contained malware, which downloaded to his laptop and “exploited the USGS’ network.” Investigators found that many of the porn images were “subsequently saved to an unauthorized USB device and personal Android cell phone,” which was connected to the employee’s government-issued computer.

Investigators found that his Android cell phone “was also infected with malware.”]]></description>
		<content:encoded><![CDATA[<p>Zack Whittaker / TechCrunch:<br />
Audit finds a US Geological Survey network in South Dakota was infected with malware after an unnamed employee visited thousands of porn pages on his laptop</p>
<p>Civil servant who watched porn at work blamed for infecting a US government network with malware<br />
<a href="https://techcrunch.com/2018/10/29/porn-sites-blamed-after-government-network-infected-malware/" rel="nofollow">https://techcrunch.com/2018/10/29/porn-sites-blamed-after-government-network-infected-malware/</a></p>
<p>A U.S. government network was infected with malware thanks to one employee’s “extensive history” of watching porn on his work computer, investigators have found.</p>
<p>The audit, carried out by the U.S. Department of the Interior’s inspector general, found that a U.S. Geological Survey (USGS) network at the EROS Center, a satellite imaging facility in South Dakota, was infected after an unnamed employee visited thousands of porn pages that contained malware, which downloaded to his laptop and “exploited the USGS’ network.” Investigators found that many of the porn images were “subsequently saved to an unauthorized USB device and personal Android cell phone,” which was connected to the employee’s government-issued computer.</p>
<p>Investigators found that his Android cell phone “was also infected with malware.”</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/10/01/cyber-security-october-2018/comment-page-10/#comment-1610726</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 31 Oct 2018 19:56:43 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=179892#comment-1610726</guid>
		<description><![CDATA[Salvador Rodriguez / CNBC:NEW 	
Facebook says it will move Workplace by Facebook, its Slack rival, to its own domain in 2019, Workplace.com, to appease businesses&#039; fears about data security  —  - Workplace by Facebook, the company&#039;s enterprise business, is moving onto a website domain separate from Facebook.com in an effort … 

Facebook is separating Workplace from the main Facebook site to appease business customers concerned about security
https://www.cnbc.com/2018/10/31/facebook-introduces-workplace-domain-to-calm-enterprise-security-fears.html

    Workplace by Facebook, the company&#039;s enterprise business, is moving onto a website domain separate from Facebook.com in an effort to build trust with customers and build its brand.
    The Workplace by Facebook unit informed Walmart, a top customer, of the domain change the day Facebook disclosed a security breach that impacted millions of consumers.
    Workplace by Facebook expects to begin using the new domain for its customers in 2019.]]></description>
		<content:encoded><![CDATA[<p>Salvador Rodriguez / CNBC:NEW<br />
Facebook says it will move Workplace by Facebook, its Slack rival, to its own domain in 2019, Workplace.com, to appease businesses&#8217; fears about data security  —  &#8211; Workplace by Facebook, the company&#8217;s enterprise business, is moving onto a website domain separate from Facebook.com in an effort … </p>
<p>Facebook is separating Workplace from the main Facebook site to appease business customers concerned about security<br />
<a href="https://www.cnbc.com/2018/10/31/facebook-introduces-workplace-domain-to-calm-enterprise-security-fears.html" rel="nofollow">https://www.cnbc.com/2018/10/31/facebook-introduces-workplace-domain-to-calm-enterprise-security-fears.html</a></p>
<p>    Workplace by Facebook, the company&#8217;s enterprise business, is moving onto a website domain separate from Facebook.com in an effort to build trust with customers and build its brand.<br />
    The Workplace by Facebook unit informed Walmart, a top customer, of the domain change the day Facebook disclosed a security breach that impacted millions of consumers.<br />
    Workplace by Facebook expects to begin using the new domain for its customers in 2019.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/10/01/cyber-security-october-2018/comment-page-10/#comment-1610691</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 31 Oct 2018 14:29:47 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=179892#comment-1610691</guid>
		<description><![CDATA[The Google Home Hub is deeply insecure
https://techcrunch.com/2018/10/31/the-google-home-hub-is-deeply-insecure/?sr_share=facebook&amp;utm_source=tcfbpage

Security advocate Jerry Gamblin has posted a set of instructions – essentially basic lines of XML – that can easily pull important information off of the Google Home Hub and, in some cases, temporarily brick the device.

The Home Hub, which is essentially an Android  tablet attached to a speaker, is designed to act as an in-room Google Assistant.]]></description>
		<content:encoded><![CDATA[<p>The Google Home Hub is deeply insecure<br />
<a href="https://techcrunch.com/2018/10/31/the-google-home-hub-is-deeply-insecure/?sr_share=facebook&#038;utm_source=tcfbpage" rel="nofollow">https://techcrunch.com/2018/10/31/the-google-home-hub-is-deeply-insecure/?sr_share=facebook&#038;utm_source=tcfbpage</a></p>
<p>Security advocate Jerry Gamblin has posted a set of instructions – essentially basic lines of XML – that can easily pull important information off of the Google Home Hub and, in some cases, temporarily brick the device.</p>
<p>The Home Hub, which is essentially an Android  tablet attached to a speaker, is designed to act as an in-room Google Assistant.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
