Samsung smart fridge leaves Gmail logins open to attack The internet-connected device is designed to download Gmail Calendar information to an on-screen display. Security shortcomings mean that hackers who manage to jump on to the same network can potentially steal Google login credentials from their neighbours. I would say that you shouldn’t trust a kitchen appliance maker with computer security, but this is Samsung. They should have tons of experience with this type of thing. So they don’t get a pass, this is bad. But at least security researchers are testing all of these internet-connected devices these days. It’s worth noting that this is the same company that makes a Smart TV that listens to your conversations and has the ability to send whatever you say back to their servers. The main takeaway from this is that if you’re getting ready to head into college, cybersecurity is probably a good degree to go for, because there will be never-ending jobs in the computer security field. How security flaws work: the buffer overflow The buffer overflow has long been a feature of the computer security landscape. In fact the first self-propagating Internet worm—1988’s Morris Worm—used a buffer overflow in the Unix finger daemon to spread from machine to machine. Twenty-seven years later, buffer overflows remain a source of problems. Windows infamously revamped its security focus after two buffer overflow-driven exploits in the early 2000s. And just this May, a buffer overflow found in a Linux driver left (potentially) millions of home and small office routers vulnerable to attack. I feel like almost every day I’m pushing a link to ArsTechnica in this column, and that’s because they often write articles that I wish we had done. This one is no exception — it’s an extremely detailed and technical look at what buffer overflows are and how they work at a very low level. AT&T Hotspots: Now with Advertising Injection While traveling through Dulles Airport last week, I noticed an Internet oddity. The nearby AT&T hotspot was fairly fast—that was a pleasant surprise. But the web had sprouted ads. Lots of them, in places they didn't belong. Curious, and waiting on a delayed flight, I started poking through web source. It took little time to spot the culprit: AT&T's wifi hotspot was tampering with HTTP traffic. This is one of many reasons why you should always use a VPN whenever you connect to a public Wi-Fi hotspot. Using a VPN will protect you from ad-injection, people sniffing your packets, and generally make the web more secure. It’s well worth the couple of dollars per month. When I have a decent 4G LTE connection on my iPhone, I usually share my internet connection with my other devices, but when I can’t do that, I use Private Internet Access if I need to connect to a public Wi-Fi hotspot. After testing a lot of different VPN providers, they had the fastest service for the best price, and a huge selection of servers to choose from, so I’m comfortable recommending them. |
Tidak ada komentar:
Posting Komentar