<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security news January 2024</title>
	<atom:link href="http://www.epanorama.net/blog/2024/01/01/cyber-security-news-january-2024/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2024/01/01/cyber-security-news-january-2024/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Wed, 06 May 2026 04:42:25 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/01/01/cyber-security-news-january-2024/comment-page-1/#comment-1821869</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 04 Feb 2024 20:55:22 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=195088#comment-1821869</guid>
		<description><![CDATA[https://www.bleepingcomputer.com/news/security/over-150k-wordpress-sites-at-takeover-risk-via-vulnerable-plugin/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.bleepingcomputer.com/news/security/over-150k-wordpress-sites-at-takeover-risk-via-vulnerable-plugin/" rel="nofollow">https://www.bleepingcomputer.com/news/security/over-150k-wordpress-sites-at-takeover-risk-via-vulnerable-plugin/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/01/01/cyber-security-news-january-2024/comment-page-1/#comment-1821771</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 04 Feb 2024 11:41:28 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=195088#comment-1821771</guid>
		<description><![CDATA[https://thehackernews.com/2024/01/npm-trojan-bypasses-uac-installs.html]]></description>
		<content:encoded><![CDATA[<p><a href="https://thehackernews.com/2024/01/npm-trojan-bypasses-uac-installs.html" rel="nofollow">https://thehackernews.com/2024/01/npm-trojan-bypasses-uac-installs.html</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi</title>
		<link>https://www.epanorama.net/blog/2024/01/01/cyber-security-news-january-2024/comment-page-1/#comment-1821560</link>
		<dc:creator><![CDATA[Tomi]]></dc:creator>
		<pubDate>Thu, 01 Feb 2024 07:26:48 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=195088#comment-1821560</guid>
		<description><![CDATA[GNU C Library Vulnerability Leads to Full Root Access
Researchers at Qualys call attention to a vulnerability in Linux’s GNU C Library (glibc) that allows full root access to a system.
https://www.securityweek.com/gnu-c-library-vulnerability-leads-to-full-root-access/

A vulnerability in Linux’s GNU C Library (glibc) could allow attackers to gain full root access to a system, according to a warning from researchers at Qualys.

Tracked as CVE-2023-6246 and described as a heap-based buffer overflow, the issue was identified in glibc’s __vsyslog_internal() function, which is called by the widely-used syslog() and vsyslog() logging functions.

An unprivileged attacker could exploit the flaw by providing an argv[0] or openlog() ident argument longer than 1024 bytes to overflow the __vsyslog_internal() buffer and overwrite the name[] field of a heap-based struct nss_module with a string of characters that contains a slash.

This action results in a shared library located in the attacker’s working directory being loaded and executed with root privileges, Qualys explains in a technical documentation of its findings.

However, Qualys points out that it takes thousands of attempts to brute force the exploit parameters (such as the length of argv[0] and other variables), which makes the vulnerability unlikely to be triggered remotely.

Even so, the severity of the bug should not be underestimated, as it could provide an attacker with full root access through crafted inputs to applications that employ the syslog() and vsyslog() logging functions.

Introduced in glibc version 2.37 in August 2022 and backported to glibc 2.36 while addressing a different issue, Qualys notes that the CVE-2023-6246 bug impacts major Linux distributions.

The vulnerability was addressed in glibc 2.38, an update that also resolves five other security defects found by the Qualys team.

https://www.qualys.com/2024/01/30/cve-2023-6246/syslog.txt]]></description>
		<content:encoded><![CDATA[<p>GNU C Library Vulnerability Leads to Full Root Access<br />
Researchers at Qualys call attention to a vulnerability in Linux’s GNU C Library (glibc) that allows full root access to a system.<br />
<a href="https://www.securityweek.com/gnu-c-library-vulnerability-leads-to-full-root-access/" rel="nofollow">https://www.securityweek.com/gnu-c-library-vulnerability-leads-to-full-root-access/</a></p>
<p>A vulnerability in Linux’s GNU C Library (glibc) could allow attackers to gain full root access to a system, according to a warning from researchers at Qualys.</p>
<p>Tracked as CVE-2023-6246 and described as a heap-based buffer overflow, the issue was identified in glibc’s __vsyslog_internal() function, which is called by the widely-used syslog() and vsyslog() logging functions.</p>
<p>An unprivileged attacker could exploit the flaw by providing an argv[0] or openlog() ident argument longer than 1024 bytes to overflow the __vsyslog_internal() buffer and overwrite the name[] field of a heap-based struct nss_module with a string of characters that contains a slash.</p>
<p>This action results in a shared library located in the attacker’s working directory being loaded and executed with root privileges, Qualys explains in a technical documentation of its findings.</p>
<p>However, Qualys points out that it takes thousands of attempts to brute force the exploit parameters (such as the length of argv[0] and other variables), which makes the vulnerability unlikely to be triggered remotely.</p>
<p>Even so, the severity of the bug should not be underestimated, as it could provide an attacker with full root access through crafted inputs to applications that employ the syslog() and vsyslog() logging functions.</p>
<p>Introduced in glibc version 2.37 in August 2022 and backported to glibc 2.36 while addressing a different issue, Qualys notes that the CVE-2023-6246 bug impacts major Linux distributions.</p>
<p>The vulnerability was addressed in glibc 2.38, an update that also resolves five other security defects found by the Qualys team.</p>
<p><a href="https://www.qualys.com/2024/01/30/cve-2023-6246/syslog.txt" rel="nofollow">https://www.qualys.com/2024/01/30/cve-2023-6246/syslog.txt</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/01/01/cyber-security-news-january-2024/comment-page-1/#comment-1821547</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 31 Jan 2024 22:31:10 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=195088#comment-1821547</guid>
		<description><![CDATA[Dustin Volz / Wall Street Journal: 	
The FBI and US DOJ disrupt Volt Typhoon, a uniquely dangerous Chinese hacking operation to hijack hundreds of Cisco and Netgear routers at end-of-life status  —  Chinese hackers prepare to ‘wreak havoc’ against Americans, FBI Director Chris Wray tells Congress

Chinese Hacking Against U.S. Infrastructure Threatens American Lives, Officials Say
https://www.wsj.com/politics/national-security/u-s-disables-chinese-hacking-operation-that-targeted-critical-infrastructure-184bb407?mod=followamazon

U.S. officials say Beijing is preparing to set off potentially damaging cyberattacks in any future conflict, including over Taiwan]]></description>
		<content:encoded><![CDATA[<p>Dustin Volz / Wall Street Journal:<br />
The FBI and US DOJ disrupt Volt Typhoon, a uniquely dangerous Chinese hacking operation to hijack hundreds of Cisco and Netgear routers at end-of-life status  —  Chinese hackers prepare to ‘wreak havoc’ against Americans, FBI Director Chris Wray tells Congress</p>
<p>Chinese Hacking Against U.S. Infrastructure Threatens American Lives, Officials Say<br />
<a href="https://www.wsj.com/politics/national-security/u-s-disables-chinese-hacking-operation-that-targeted-critical-infrastructure-184bb407?mod=followamazon" rel="nofollow">https://www.wsj.com/politics/national-security/u-s-disables-chinese-hacking-operation-that-targeted-critical-infrastructure-184bb407?mod=followamazon</a></p>
<p>U.S. officials say Beijing is preparing to set off potentially damaging cyberattacks in any future conflict, including over Taiwan</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/01/01/cyber-security-news-january-2024/comment-page-1/#comment-1821501</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 31 Jan 2024 05:10:07 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=195088#comment-1821501</guid>
		<description><![CDATA[Taylor Swiftiä rienaavat kuvat panivat Amerikan sekaisin: ”Hälyttävää”
https://www.is.fi/digitoday/art-2000010155463.html

TEKOÄLYN avulla tuotetut väärät alastonkuvat laulaja Taylor Swiftistä synnyttivät ison vastareaktion laulajan fanien keskuudessa, mutta vaikutukset eivät rajoitu siihen. Uutistoimisto Reutersin mukaan Valkoinen talo otti asiaan kantaa perjantaina ja kuvaili vääriä kuvia ”hälyttäviksi”.

X lifts ban on Taylor Swift searches after spread of fake explicit images
https://www.reuters.com/technology/x-lifts-ban-taylor-swift-searches-after-explicit-fake-images-spread-wsj-2024-01-30/

Jan 29 (Reuters) - Social-media company X lifted the ban on searches for Taylor Swift Monday evening, after blocking users from searching for her following the spread of fake sexually-explicit images of the pop singer on the social media site last week.
The search has been reactivated and the social media platform &quot;will continue to be vigilant for any attempt to spread this content and will remove it if we find it,&quot; Joe Benarroch, head of business operations at X, said in a statement on Monday]]></description>
		<content:encoded><![CDATA[<p>Taylor Swiftiä rienaavat kuvat panivat Amerikan sekaisin: ”Hälyttävää”<br />
<a href="https://www.is.fi/digitoday/art-2000010155463.html" rel="nofollow">https://www.is.fi/digitoday/art-2000010155463.html</a></p>
<p>TEKOÄLYN avulla tuotetut väärät alastonkuvat laulaja Taylor Swiftistä synnyttivät ison vastareaktion laulajan fanien keskuudessa, mutta vaikutukset eivät rajoitu siihen. Uutistoimisto Reutersin mukaan Valkoinen talo otti asiaan kantaa perjantaina ja kuvaili vääriä kuvia ”hälyttäviksi”.</p>
<p>X lifts ban on Taylor Swift searches after spread of fake explicit images<br />
<a href="https://www.reuters.com/technology/x-lifts-ban-taylor-swift-searches-after-explicit-fake-images-spread-wsj-2024-01-30/" rel="nofollow">https://www.reuters.com/technology/x-lifts-ban-taylor-swift-searches-after-explicit-fake-images-spread-wsj-2024-01-30/</a></p>
<p>Jan 29 (Reuters) &#8211; Social-media company X lifted the ban on searches for Taylor Swift Monday evening, after blocking users from searching for her following the spread of fake sexually-explicit images of the pop singer on the social media site last week.<br />
The search has been reactivated and the social media platform &#8220;will continue to be vigilant for any attempt to spread this content and will remove it if we find it,&#8221; Joe Benarroch, head of business operations at X, said in a statement on Monday</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/01/01/cyber-security-news-january-2024/comment-page-1/#comment-1821429</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 29 Jan 2024 19:12:13 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=195088#comment-1821429</guid>
		<description><![CDATA[https://www.bleepingcomputer.com/news/microsoft/microsoft-teams-hit-by-second-outage-in-three-days/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-teams-hit-by-second-outage-in-three-days/" rel="nofollow">https://www.bleepingcomputer.com/news/microsoft/microsoft-teams-hit-by-second-outage-in-three-days/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/01/01/cyber-security-news-january-2024/comment-page-1/#comment-1821379</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 28 Jan 2024 07:16:51 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=195088#comment-1821379</guid>
		<description><![CDATA[https://en.m.wikipedia.org/wiki/Coordinated_vulnerability_disclosure?fbclid=IwAR1nRCvpx6itOYs4kssXJcNlJBYNlsYl42_rIhIOe0dXXe3_M7tgwBZbsJM]]></description>
		<content:encoded><![CDATA[<p><a href="https://en.m.wikipedia.org/wiki/Coordinated_vulnerability_disclosure?fbclid=IwAR1nRCvpx6itOYs4kssXJcNlJBYNlsYl42_rIhIOe0dXXe3_M7tgwBZbsJM" rel="nofollow">https://en.m.wikipedia.org/wiki/Coordinated_vulnerability_disclosure?fbclid=IwAR1nRCvpx6itOYs4kssXJcNlJBYNlsYl42_rIhIOe0dXXe3_M7tgwBZbsJM</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/01/01/cyber-security-news-january-2024/comment-page-1/#comment-1821378</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 28 Jan 2024 07:15:24 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=195088#comment-1821378</guid>
		<description><![CDATA[It-konsultti paljasti turva-aukon: sai sakot
https://www.tivi.fi/uutiset/it-konsultti-paljasti-turva-aukon-sai-sakot/3fb4b568-2350-427f-89b3-194a909ac4d3?ref=facebook%3A104a&amp;fbclid=IwAR1z0k9V_fF3NWktzS6FF-WZu5KvzKOei1YP2HZw3iDdvrbfXREOU9FwZMk

Kiittämättömyys on maailman palkka.

Liian helppoa. Salasana oli löydettävissä ilman vippaskonsteja, mutta haavoittuvuudesta ilmoittanutta konsulttia kiitettiin sakoilla. 

Yhä edelleen on olemassa yhtiöitä, joissa ei täysin ymmärretä tietoturvan merkitystä tai että miten siitä olisi hyvä huolehtia. Kuumottava esimerkki saadaan Saksasta, jossa avulias valkohattuhakkeri sai sakkoja.

The Register kertoo ”Hendrik H:sta”, joka kesällä 2021 tutkaili erään yhtiön ohjelmisto-ongelmia. Tuo yhtiö oli it-palveluita tarjoavan Modern Solution GmbH:n asiakas. Kävi ilmi, että Modern Solutionin koodi otti yhteyden MariaDB-tietokantapalvelimeen, jonne kirjautumiseen tarvittava salasana löytyi selkokielisenä Modern Solutionin verkossa jakamasta suoritettavasta tiedostosta.

Kuka tahansa, joka olisi avannut Modern Solutionin ohjelman tekstieditorissa, olisi saanut salasanan haltuunsa ilman vippaskonsteja. Palvelimelle kirjautumalla pääsi käsiksi kaikkien niiden Modern Solutionin asiakkaiden tietoihin, jotka tuolle palvelimelle oli tallennettu. Datan kerrotaan sisältäneen Modern Solutionin asiakkaina olleiden verkkokauppojen asiakkaiden tietoja.

Yhtiötä varoitettiin tietoturvaongelmista ja asiaa käsiteltiin verkkokaupankäynnistä uutisoivan Mark Steierin kirjoituksessa kesäkuussa 2021. 

Kummallinen käänne tapahtui syyskuussa 2021, kun poliisi takavarikoi löydön tehneen tietoturvakonsultin tietokoneet. Modern Solution väitti, että konsultti olisi saanut salasanan haltuunsa sisäpiirin tiedon myötä ja väitti tämän olevan kilpailija.

Konsultin väitetään rikkoneen Saksan lakia tunkeutumalla palvelimelle, vaikka Steierin mukaan selväkielisenä tallennettu salasana ei täytä kyseisen lainkohdan kuvailemaa ”erityistä tietoturvaratkaisua”.

IT consultant fined for daring to expose shoddy security
Spotting a plaintext password and using it in research without authorization deemed a crime
https://www.theregister.com/2024/01/19/germany_fine_security/

A security researcher in Germany has been fined €3,000 ($3,300, £2,600) for finding and reporting an e-commerce database vulnerability that was exposing almost 700,000 customer records.

Back in June 2021, according to our pals at Heise, a contractor identified elsewhere as Hendrik H. was troubleshooting software for a customer of IT services firm Modern Solution GmbH. He discovered that the Modern Solution code made a MySQL connection to a MariaDB database server operated by the vendor. It turned out the password to access that remote server was stored in plain text in the program file MSConnect.exe, and opening it in a simple text editor would reveal the unencrypted hardcoded credential.

With that easy-to-find password in hand, anyone could log into the remote server and access data

And we&#039;re told that Modern Solution&#039;s program files were available for free from the web, so truly anyone could inspect the executables in a text editor for plain-text hardcoded database passwords.

Hendrik H. was charged with unlawful data access under Section 202a of Germany&#039;s Criminal Code, based on the rule that examining data protected by a password can be classified as a crime under the Euro nation&#039;s cybersecurity law.

In June, 2023, a Jülich District Court in western Germany sided with the IT consultant because the Modern Solution software was insufficiently protected. But the Aachen regional court directed the district court to hear the complaint. Now, the district court has reversed its initial decision. On January 17, a Jülich District Court fined Hendrik H. and directed him to pay court costs.

&quot;The penalty order is all the more shocking because it is fundamentally wrong,&quot; wrote Steier, the blogger who helped bring the exposed database to light, in a post on Wednesday.

&quot;A password that has been saved almost in plain text does not constitute a &#039;special security&#039; which is required by §202. It&#039;s understandable that a judge can&#039;t evaluate that, but then an expert would have had to be heard on exactly this question. Unfortunately that didn&#039;t happen.&quot;

According to reports, the verdict is not yet legally binding as the two parties have a week to appeal, which the IT consultant reportedly intends to do.

&quot;But it’s exactly as people feared: no matter how flawed the supposed &#039;protection,&#039; its mere existence turns security research into criminal hacking under the German law. This has a chilling effect on legitimate research, allowing companies to get away with inadequate security and in the end endangering users.&quot;]]></description>
		<content:encoded><![CDATA[<p>It-konsultti paljasti turva-aukon: sai sakot<br />
<a href="https://www.tivi.fi/uutiset/it-konsultti-paljasti-turva-aukon-sai-sakot/3fb4b568-2350-427f-89b3-194a909ac4d3?ref=facebook%3A104a&#038;fbclid=IwAR1z0k9V_fF3NWktzS6FF-WZu5KvzKOei1YP2HZw3iDdvrbfXREOU9FwZMk" rel="nofollow">https://www.tivi.fi/uutiset/it-konsultti-paljasti-turva-aukon-sai-sakot/3fb4b568-2350-427f-89b3-194a909ac4d3?ref=facebook%3A104a&#038;fbclid=IwAR1z0k9V_fF3NWktzS6FF-WZu5KvzKOei1YP2HZw3iDdvrbfXREOU9FwZMk</a></p>
<p>Kiittämättömyys on maailman palkka.</p>
<p>Liian helppoa. Salasana oli löydettävissä ilman vippaskonsteja, mutta haavoittuvuudesta ilmoittanutta konsulttia kiitettiin sakoilla. </p>
<p>Yhä edelleen on olemassa yhtiöitä, joissa ei täysin ymmärretä tietoturvan merkitystä tai että miten siitä olisi hyvä huolehtia. Kuumottava esimerkki saadaan Saksasta, jossa avulias valkohattuhakkeri sai sakkoja.</p>
<p>The Register kertoo ”Hendrik H:sta”, joka kesällä 2021 tutkaili erään yhtiön ohjelmisto-ongelmia. Tuo yhtiö oli it-palveluita tarjoavan Modern Solution GmbH:n asiakas. Kävi ilmi, että Modern Solutionin koodi otti yhteyden MariaDB-tietokantapalvelimeen, jonne kirjautumiseen tarvittava salasana löytyi selkokielisenä Modern Solutionin verkossa jakamasta suoritettavasta tiedostosta.</p>
<p>Kuka tahansa, joka olisi avannut Modern Solutionin ohjelman tekstieditorissa, olisi saanut salasanan haltuunsa ilman vippaskonsteja. Palvelimelle kirjautumalla pääsi käsiksi kaikkien niiden Modern Solutionin asiakkaiden tietoihin, jotka tuolle palvelimelle oli tallennettu. Datan kerrotaan sisältäneen Modern Solutionin asiakkaina olleiden verkkokauppojen asiakkaiden tietoja.</p>
<p>Yhtiötä varoitettiin tietoturvaongelmista ja asiaa käsiteltiin verkkokaupankäynnistä uutisoivan Mark Steierin kirjoituksessa kesäkuussa 2021. </p>
<p>Kummallinen käänne tapahtui syyskuussa 2021, kun poliisi takavarikoi löydön tehneen tietoturvakonsultin tietokoneet. Modern Solution väitti, että konsultti olisi saanut salasanan haltuunsa sisäpiirin tiedon myötä ja väitti tämän olevan kilpailija.</p>
<p>Konsultin väitetään rikkoneen Saksan lakia tunkeutumalla palvelimelle, vaikka Steierin mukaan selväkielisenä tallennettu salasana ei täytä kyseisen lainkohdan kuvailemaa ”erityistä tietoturvaratkaisua”.</p>
<p>IT consultant fined for daring to expose shoddy security<br />
Spotting a plaintext password and using it in research without authorization deemed a crime<br />
<a href="https://www.theregister.com/2024/01/19/germany_fine_security/" rel="nofollow">https://www.theregister.com/2024/01/19/germany_fine_security/</a></p>
<p>A security researcher in Germany has been fined €3,000 ($3,300, £2,600) for finding and reporting an e-commerce database vulnerability that was exposing almost 700,000 customer records.</p>
<p>Back in June 2021, according to our pals at Heise, a contractor identified elsewhere as Hendrik H. was troubleshooting software for a customer of IT services firm Modern Solution GmbH. He discovered that the Modern Solution code made a MySQL connection to a MariaDB database server operated by the vendor. It turned out the password to access that remote server was stored in plain text in the program file MSConnect.exe, and opening it in a simple text editor would reveal the unencrypted hardcoded credential.</p>
<p>With that easy-to-find password in hand, anyone could log into the remote server and access data</p>
<p>And we&#8217;re told that Modern Solution&#8217;s program files were available for free from the web, so truly anyone could inspect the executables in a text editor for plain-text hardcoded database passwords.</p>
<p>Hendrik H. was charged with unlawful data access under Section 202a of Germany&#8217;s Criminal Code, based on the rule that examining data protected by a password can be classified as a crime under the Euro nation&#8217;s cybersecurity law.</p>
<p>In June, 2023, a Jülich District Court in western Germany sided with the IT consultant because the Modern Solution software was insufficiently protected. But the Aachen regional court directed the district court to hear the complaint. Now, the district court has reversed its initial decision. On January 17, a Jülich District Court fined Hendrik H. and directed him to pay court costs.</p>
<p>&#8220;The penalty order is all the more shocking because it is fundamentally wrong,&#8221; wrote Steier, the blogger who helped bring the exposed database to light, in a post on Wednesday.</p>
<p>&#8220;A password that has been saved almost in plain text does not constitute a &#8216;special security&#8217; which is required by §202. It&#8217;s understandable that a judge can&#8217;t evaluate that, but then an expert would have had to be heard on exactly this question. Unfortunately that didn&#8217;t happen.&#8221;</p>
<p>According to reports, the verdict is not yet legally binding as the two parties have a week to appeal, which the IT consultant reportedly intends to do.</p>
<p>&#8220;But it’s exactly as people feared: no matter how flawed the supposed &#8216;protection,&#8217; its mere existence turns security research into criminal hacking under the German law. This has a chilling effect on legitimate research, allowing companies to get away with inadequate security and in the end endangering users.&#8221;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/01/01/cyber-security-news-january-2024/comment-page-1/#comment-1821221</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 24 Jan 2024 05:14:30 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=195088#comment-1821221</guid>
		<description><![CDATA[Hän neuvoo toimimaan palvelun­tarjoajan virallisten ohjeiden mukaisesti, jos oma ryhmä tai tili kaapataan. Mesiän mukaan niiden takaisin saaminen ei tapahdu nopeasti, vaan siinä voi mennä viikkojakin.

”Maltti on valttia. Toki salasanoja pitää vaihtaa, jos huijarilla on tiedossaan samat käyttäjä­tunnukset, joita henkilö käyttää muissakin palveluissa.”

KAAPPAAJA saattaa julkaista haltuun ottamaansa ryhmään haitallista sisältöä ja mainoksia, Mesiä huomauttaa. Organisaation tulisi myös ottaa huomioon, että asiakkaiden arkaluontoisia tietoja voi päätyä kaappaajan tietoon.

”Tilimurron tapauksessa yrityksen pitää miettiä, tekeekö ilmoituksen tietosuojavaltuutetulle.”

Mesiän mukaan ikinä ei pitäisi suostua, jos kaappaaja vaatii rahaa tunnusten palauttamisesta. Sen sijaan kiristäjästä tulisi tehdä rikosilmoitus.

https://www.hs.fi/kotimaa/art-2000010114303.html?fbclid=IwAR3LEZq0IKIMmdp021-dLNX2KECMKmlBXR1SYLZNLGmTomQwHI7IIeqV7Aw]]></description>
		<content:encoded><![CDATA[<p>Hän neuvoo toimimaan palvelun­tarjoajan virallisten ohjeiden mukaisesti, jos oma ryhmä tai tili kaapataan. Mesiän mukaan niiden takaisin saaminen ei tapahdu nopeasti, vaan siinä voi mennä viikkojakin.</p>
<p>”Maltti on valttia. Toki salasanoja pitää vaihtaa, jos huijarilla on tiedossaan samat käyttäjä­tunnukset, joita henkilö käyttää muissakin palveluissa.”</p>
<p>KAAPPAAJA saattaa julkaista haltuun ottamaansa ryhmään haitallista sisältöä ja mainoksia, Mesiä huomauttaa. Organisaation tulisi myös ottaa huomioon, että asiakkaiden arkaluontoisia tietoja voi päätyä kaappaajan tietoon.</p>
<p>”Tilimurron tapauksessa yrityksen pitää miettiä, tekeekö ilmoituksen tietosuojavaltuutetulle.”</p>
<p>Mesiän mukaan ikinä ei pitäisi suostua, jos kaappaaja vaatii rahaa tunnusten palauttamisesta. Sen sijaan kiristäjästä tulisi tehdä rikosilmoitus.</p>
<p><a href="https://www.hs.fi/kotimaa/art-2000010114303.html?fbclid=IwAR3LEZq0IKIMmdp021-dLNX2KECMKmlBXR1SYLZNLGmTomQwHI7IIeqV7Aw" rel="nofollow">https://www.hs.fi/kotimaa/art-2000010114303.html?fbclid=IwAR3LEZq0IKIMmdp021-dLNX2KECMKmlBXR1SYLZNLGmTomQwHI7IIeqV7Aw</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/01/01/cyber-security-news-january-2024/comment-page-1/#comment-1821220</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 24 Jan 2024 05:12:47 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=195088#comment-1821220</guid>
		<description><![CDATA[Yritys menetti Facebook-ryhmänsä hallinnan – Kaappauksen mahdollisti työntekijän yksin­kertainen virhe
Kekkilän hallinnoiman ryhmän kaapannut henkilö vaatii rahaa ryhmän palauttamisesta. Tietoturva-asiantuntijan mukaan tilin kaappaajalle ei tulisi koskaan maksaa.
https://www.hs.fi/kotimaa/art-2000010114303.html?fbclid=IwAR3LEZq0IKIMmdp021-dLNX2KECMKmlBXR1SYLZNLGmTomQwHI7IIeqV7Aw]]></description>
		<content:encoded><![CDATA[<p>Yritys menetti Facebook-ryhmänsä hallinnan – Kaappauksen mahdollisti työntekijän yksin­kertainen virhe<br />
Kekkilän hallinnoiman ryhmän kaapannut henkilö vaatii rahaa ryhmän palauttamisesta. Tietoturva-asiantuntijan mukaan tilin kaappaajalle ei tulisi koskaan maksaa.<br />
<a href="https://www.hs.fi/kotimaa/art-2000010114303.html?fbclid=IwAR3LEZq0IKIMmdp021-dLNX2KECMKmlBXR1SYLZNLGmTomQwHI7IIeqV7Aw" rel="nofollow">https://www.hs.fi/kotimaa/art-2000010114303.html?fbclid=IwAR3LEZq0IKIMmdp021-dLNX2KECMKmlBXR1SYLZNLGmTomQwHI7IIeqV7Aw</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
