<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Mobile Security Archives - L2 Cyber Security Solutions Ltd.</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/mobile-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/mobile-security/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Thu, 24 Sep 2020 17:55:04 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>Mobile Security Archives - L2 Cyber Security Solutions Ltd.</title>
	<link>https://www.l2cybersecurity.com/tag/mobile-security/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#WeekendWisdom number 047 How Safe are Connected Cars</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-number-047-how-safe-are-connected-cars/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 24 Sep 2020 23:05:41 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Connected Cars]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[How Safe are Connected Cars]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2323</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 47. This week we&#8217;re going to talk about how safe are connected cars. I&#8217;m not going to talk about the scary stuff that you see in movies about hackers taking control of vehicles and crashing them and that. No. I&#8217;m going to talk about something much more mundane than that. Why&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-number-047-how-safe-are-connected-cars/">#WeekendWisdom number 047 How Safe are Connected Cars</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 47. This week we&#8217;re going to talk about how safe are connected cars.<span id="more-2323"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2323-1" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2020/09/WeekendWisdom-047-lo.mp4?_=1" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2020/09/WeekendWisdom-047-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2020/09/WeekendWisdom-047-lo.mp4</a></video></div>
<p>I&#8217;m not going to talk about the scary stuff that you see in movies about hackers taking control of vehicles and crashing them and that. No. I&#8217;m going to talk about something much more mundane than that.</p>
<h3>Why am I asking the question about how safe are connected cars?</h3>
<p>There are two stories that I&#8217;ve become aware of in recent times, which were quite similar though they were spaced many years apart.</p>
<h3>The never ending lease</h3>
<p>In <a href="https://krebsonsecurity.com/2020/02/when-your-used-car-is-a-little-too-mobile/" target="_blank" rel="noopener noreferrer">the first case</a>, there was a person who had leased a car from a particular manufacturer who had the car for a number years and then handed it back in 2016. Earlier this year (2020) they got a notification from that manufacturer about something to do with their car. And they thought &#8220;That was odd. I don&#8217;t own that car anymore.&#8221; So they thought they&#8217;d log into their online account for the car to see if their credentials were still valid. And they were.</p>
<p>They were able to see their car. Could see where it was located. They could turn on the engine. Could turn off the engine. They could open doors. Could lock the doors. So they still had access to their old car. <span style="text-decoration: underline; color: #ff0000;"><strong>Four</strong></span> years later!</p>
<h3>An unexpected long term rental</h3>
<p>Similarly <a href="https://arstechnica.com/information-technology/2019/10/five-months-after-returning-rental-car-man-still-has-remote-control/" target="_blank" rel="noopener noreferrer">another person late last year</a> had rented a car for a period of time and they noticed that the manufacturer of that car had an App. So they set up the App which just needed the VIN number of the car and they were able to control car for the period that they had it rented for. <span style="text-decoration: underline; color: #ff0000;"><strong>5 months</strong></span> later they still have access to the car and doing the same things. They could open doors, turn on the engine, etc. They notified the manufacturer about this but nothing had happened.</p>
<h3>What do you need to do?</h3>
<p>So if you&#8217;ve sold a car, traded in a car, gotten rid of a car, rented a car, make sure the damned thing gets reset. That nobody can gain access to your car after the fact.</p>
<p>So that’s it for this week. Let’s be careful out there and we’ll talk to you again next week.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2_Evangelist" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2_evangelist/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-number-047-how-safe-are-connected-cars/">#WeekendWisdom number 047 How Safe are Connected Cars</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2020/09/WeekendWisdom-047-lo.mp4" length="32291059" type="video/mp4" />

			</item>
		<item>
		<title>Whatsapp Authentication Sucks</title>
		<link>https://www.l2cybersecurity.com/whatsapp-authentication-sucks/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 11 Jan 2019 16:56:07 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Whatsapp]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1570</guid>

					<description><![CDATA[<p>Whatsapp Authentication sucks. It sucks really badly. I&#8217;d never thought about it before, but then I saw this tweet yesterday. A lady got a new phone number and when she set up Whatsapp, she had a load of messages on there from the previous owner of the number. &#8220;Wait a minute!&#8221; I hear you cry &#8220;Surely&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/whatsapp-authentication-sucks/">Whatsapp Authentication Sucks</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-thumbnail wp-image-1571" src="https://www.l2cybersecurity.com/wp-content/uploads/2019/01/Whatsapp-Authentication-Sucks-150x150.png" alt="Whatsapp authentication sucks" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2019/01/Whatsapp-Authentication-Sucks-150x150.png 150w, https://www.l2cybersecurity.com/wp-content/uploads/2019/01/Whatsapp-Authentication-Sucks.png 300w" sizes="(max-width: 150px) 100vw, 150px" />Whatsapp Authentication sucks. It sucks really badly. I&#8217;d never thought about it before, but then I saw <a href="https://twitter.com/abbyfuller/status/1083560674884694017?s=19" target="_blank" rel="noopener">this tweet yesterday</a>. A lady got a new phone number and when she set up Whatsapp, she had a load of messages on there from the previous owner of the number. <span id="more-1570"></span>&#8220;Wait a minute!&#8221; I hear you cry &#8220;Surely Whatsapp, owned by Facebook and used by millions of people, has super security?&#8221; Well I&#8217;m sure it&#8217;s back-end systems are all well protected. The messages between users are all properly encrypted and secure. But to authenticate to the service &#8230; all you need is a telephone number. If you use the telephone number of another user or a former user, you get their messages!!! There is a way to prevent this, which I&#8217;ll get to later.</p>
<h3>Setting up an account is sooo easy</h3>
<p>Cast your mind back to when you set up Whatsapp on your phone for the first time and you set up your account with them. Did you specify a User ID or Username? Did you give it a password? The answer is no. The only authentication was your telephone number, which your phone was giving the app.</p>
<h3>Recycling is good for the planet, but not good for security</h3>
<p>Mobile telephone numbers get recycled by telephone companies all the time. This is because they don&#8217;t have an unlimited amount of numbers that they can issue. If you watch enough crime programmes on the TV, you will see a lot of &#8220;burner&#8221; phones being used. These are basically a cheap phone and number that might only be used once or twice and then is disposed of forever. Also, people having affairs would sometimes have a second &#8220;secret&#8221; phone for communicating with their paramour. If the affair doesn&#8217;t last long, that phone number will be disposed of.</p>
<p>So phone companies that have old numbers, where a contract hasn&#8217;t been renewed or a prepaid number has not been topped up in some time, they will simply assign them to new SIM cards and push them out through their retail channels. Thus the number is recycled and reused.</p>
<p>This is what happened to <a href="https://twitter.com/abbyfuller/status/1083560674884694017?s=19" target="_blank" rel="noopener">Abby Fuller</a>. She got a new number and when she installed Whatsapp, she had all of the messages from that telephone number&#8217;s previous owner restored onto her device. Because the number is the only means of identifying an account, this is why Whatsapp authentication sucks.</p>
<p>She took the correct course of action and deleted everything. However if she had a bad side, she could have downloaded all of the messages or even worse, she could have impersonated that number&#8217;s previous owner in those messages and caused all sorts of issues.</p>
<h3>So Whatsapp authentication sucks. What can I do about it?</h3>
<p>You can set up, what Whatsapp calls, two step verification. With this enabled, if you (or somebody else), try to setup Whatsapp with your number on a different phone, you (or they) will be asked for a PIN number, which only you should know.</p>
<p>It&#8217;s really easy to set up:</p>
<ol>
<li>Go into your Whatsapp settings</li>
<li>Select Account -&gt; Two step verification</li>
<li>It will have an explanation screen. Click Enable</li>
<li>Provide a 6 digit PIN number and then confirm it</li>
<li>Optionally (but recommended) you can provide an email address should you forget the PIN number, where a PIN reset request can be sent. You will need to confirm that email address</li>
<li>That&#8217;s it</li>
</ol>
<p>If somebody gets your number or they try to take over your phone number, when they try to set up Whatsapp, they will need to input the PIN you just set up. It&#8217;s not really the best <a href="http://www.l2cybersecurity.com/vii-use-two-factor-authentication/" target="_blank" rel="noopener">two step verification</a> in the world, but it should be effective.</p>
<p>I must try and persuade the few Whatsapp groups that I am involved in to switch to something more secure like <a href="https://signal.org/" target="_blank" rel="noopener">Signal</a>.</p>
<p>Lets be careful out there.</p>
<p>#SecuritySimplified #GDPR #SimpleGDPR</p>
<p>The post <a href="https://www.l2cybersecurity.com/whatsapp-authentication-sucks/">Whatsapp Authentication Sucks</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Simple Security Planner tool for EVERYONE!</title>
		<link>https://www.l2cybersecurity.com/simple-security-planner-tool/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 20 Dec 2017 10:32:16 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Best Practice]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Defence in Depth]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Two-Factor-Authentication]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1017</guid>

					<description><![CDATA[<p>I love it when I get to tell people about another great security tool. This simple Security Planner tool is another FREE resource that can really help protect you, your loved ones, your friends and co-workers. As I recently stated when talking about Quad9, I love it when the good guys come up with something&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/simple-security-planner-tool/">Simple Security Planner tool for EVERYONE!</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-thumbnail wp-image-1023" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/12/Security-Planner-Yes-1-150x150.png" alt="Security Planner" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/12/Security-Planner-Yes-1-150x150.png 150w, https://www.l2cybersecurity.com/wp-content/uploads/2017/12/Security-Planner-Yes-1.png 300w" sizes="(max-width: 150px) 100vw, 150px" />I love it when I get to tell people about another great security tool. This simple Security Planner <a href="https://securityplanner.org/#/">tool</a> is another FREE resource that can really help protect you, your loved ones, your friends and co-workers.<span id="more-1017"></span> As I recently stated when talking about <a href="https://www.l2cybersecurity.com/quad9-safer-addressing-internet/">Quad9</a>, I love it when the good guys come up with something to help everyone &#8211; particularly the non-technical folks out there &#8230; after all you make up the vast majority of the users of the internet. <span id="c128" class="notranslate">?</span></p>
<p>This security planner was created by the good folk of the <a href="https://citizenlab.ca/">Citizen Lab</a>, an interdisciplinary group based at the Munk School of Global Affairs at the University of Toronto. It&#8217;s really, really, really easy to use and will guide you through everything from start to finish.</p>
<ol>
<li>It starts by asking what you use to handle private data (Windows computer, iThing, e-mail, etc.)</li>
<li>Then it asks what are your concerns (getting hacked,  infected, etc.)</li>
<li>Finally it asks if there is any particular reason for your concern (you&#8217;re being harrassed or dealing with a current issue, etc.)</li>
<li>Then it will give you an action list, with individual help on each thing that it recommends you to do.</li>
</ol>
<p>What I really appreciated was the first step it seems to give for everything &#8230; it&#8217;s to do with two-factor-authentication:</p>
<p><img fetchpriority="high" decoding="async" class="aligncenter wp-image-1025 size-full" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/12/2FA.jpg" alt="" width="736" height="342" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/12/2FA.jpg 736w, https://www.l2cybersecurity.com/wp-content/uploads/2017/12/2FA-300x139.jpg 300w" sizes="(max-width: 736px) 100vw, 736px" /></p>
<p>Regular readers of my blog/newsletter will know I&#8217;m always going <a href="https://www.l2cybersecurity.com/double-check-security/">on</a> and <a href="https://www.l2cybersecurity.com/protect-online-accounts/">on</a> and <a href="http://www.l2cybersecurity.com/vii-use-two-factor-authentication/">on</a> about this. I don&#8217;t repeat myself often, unless it&#8217;s for a really, really, really good reason and two-factor-authentication is one such reason. It really does help protect your online accounts and so, where available, please, please, please use it.</p>
<p>So, for those of you reading this now, go ahead and use this security planner to help protect youself.</p>
<p>And then, when you go visiting your family over the Christmas period, particularly the more mature members of your nearest and dearest, why not sit down with them, fire up this website on their computer/tablet/phone and go through this fairly painless, simple process to get themselves as protected as you are. They&#8217;ll thank you for it and so will Santa. <span id="c116" class="notranslate">?</span></p>
<p>Happy Christmas! ?</p>
<p>The post <a href="https://www.l2cybersecurity.com/simple-security-planner-tool/">Simple Security Planner tool for EVERYONE!</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Permission to spy on you?</title>
		<link>https://www.l2cybersecurity.com/permission-to-spy/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Tue, 27 Jun 2017 10:35:24 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[Best Practice]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[iOs]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=767</guid>

					<description><![CDATA[<p>Most people have smart phones these days and of course smart phones really come into their own through the use of Apps. There seems to be an app for every conceivable thing and lots of them are free. The phone makers make a good effort to protect us from bad apps by making sure that&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/permission-to-spy/">Permission to spy on you?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft wp-image-769 size-full" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/App-Permissions-1.png" alt="Permission to spy on you" width="300" height="300" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/App-Permissions-1.png 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/App-Permissions-1-150x150.png 150w" sizes="auto, (max-width: 300px) 100vw, 300px" />Most people have smart phones these days and of course smart phones really come into their own through the use of Apps. There seems to be an app for every conceivable thing and lots of them are free. The phone makers make a good effort to protect us from bad apps by making sure that when we install or update an app, which wants to access, for example, the camera &#8211; then we are shown this clearly and we have to grant the app permission to have the access it wants.<span id="more-767"></span></p>
<p>But do we really pay attention to these pop-ups that advise us what the app is looking to get permission to access? I would say no in most cases, because we just want to get the app and we trust the maker of said app, so let it have whatever it wants.</p>
<p>I&#8217;m raising this issue following:</p>
<ol>
<li>the recent revelation about <a href="https://www.wired.com/story/how-to-turn-off-snapchat-snap-maps/">Snap Map</a>, which is effectively Snapchat&#8217;s stalker mode, where you can see the current exact location of other Snapchat users.</li>
<li>a discussion with a colleague who uses an app that was developed for a small, rural community area and which she discovered showed the current exact location of any other user of the app.</li>
</ol>
<p>In the case of Snapchat, they are a large corporation with a huge number of end users and the revelation about the Snap Map feature has gotten quite a lot of media attention. Therefore a lot of people will have become aware of it and for those people who are concerned for their privacy, there is a means of disabling it, while still using the app for it&#8217;s original intended purpose.</p>
<p>In the second case above, there is probably only a hundred or so end users of this app, which was supposedly a simple community noticeboard. The discovery of the map containing the location of current users was made by accident and caused great concern for my colleague, who is now going to speak with the app developer. There is no way to disable the location tracking without uninstalling the app.</p>
<p>That app, when it was being installed, obviously asked for permission to the person&#8217;s identity and location (amongst other things), but like most people, anybody downloading the app would have trusted their local app developer and just accepted whatever permission was requested by the app, without question.</p>
<p>I tend to be more careful about what permissions apps are looking for, before I let an app install or update (with new permissions). For example, I have an old Android phone (not my primary device), which is no longer receiving updates from Google. So there probably exists vulnerabilities which are not being patched (if you wonder why this is important, you obviously haven&#8217;t read <a href="http://www.l2cybersecurity.com/use-automatic-updates/">Commandment 1</a> <img loading="lazy" decoding="async" class="" src="https://www.facebook.com/images/emoji.php/v9/fe5/1/28/1f60f.png" alt="?" width="16" height="16" />).</p>
<p>I therefore downloaded the free Avast Anti-Virus app to give me an additional layer of protection (in keeping with <a href="http://www.l2cybersecurity.com/use-anti-virus/">Commandment 2</a>). Initially it looked for permissions to in-app purchases, Device &amp; App History, Identity, Contacts, Location, SMS, Phone, Photos/Media/Files, Wi-Fi Connection information and Device ID. I was a little cagey about it needing access to location. Avast is a large company with a good reputation, so I took the decision to allow it access.</p>
<p>Then several weeks ago it looked to update the app and needed some additional permission granted. Now it wanted the following:</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-770" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Avast-additional-permission.png" alt="Avast additional permission" width="236" height="358" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Avast-additional-permission.png 236w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Avast-additional-permission-198x300.png 198w" sizes="auto, (max-width: 236px) 100vw, 236px" /></p>
<p>I can see no justifiable reason for an Anti-Virus application to need permission to access the camera and microphone, let alone Bluetooth connection information. Viruses do not come through by the phone looking at or listening to something. So I have not allowed it to be updated.</p>
<p>Everyone really needs to be more careful when installing or updating apps, particularly when presented with the permissions pop-up. Just think &#8220;What is this app going to do for me?&#8221; and then go through each of the permissions it is asking for and say &#8220;Why does it need access to &#8230;?&#8221;. If you are really unsure, then please ask somebody who knows about such things (and not your pre-teen or teenager). If you want, you can reach us at <a href="mailto:support@L2CyberSecurity.com">support@L2CyberSecurity.com</a>.</p>
<p>The post <a href="https://www.l2cybersecurity.com/permission-to-spy/">Permission to spy on you?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Phone scams &#8211; some current examples</title>
		<link>https://www.l2cybersecurity.com/phone-scams-current-examples/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Mon, 19 Jun 2017 15:54:15 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Fake]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=758</guid>

					<description><![CDATA[<p>In the last few days, I&#8217;ve received a couple of attempted phone scams. The first was a new one on me, but the second was an old favourite. The first occurred on Friday, late afternoon. I was speaking with a client on my business phone, when a call came in on my personal phone. It&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/phone-scams-current-examples/">Phone scams &#8211; some current examples</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-759" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Scam-meme-150x150.jpg" alt="Phone scams" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Scam-meme-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Scam-meme.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />In the last few days, I&#8217;ve received a couple of attempted phone scams. The first was a new one on me, but the second was an old favourite.</p>
<p><span id="more-758"></span></p>
<p>The first occurred on Friday, late afternoon. I was speaking with a client on my business phone, when a call came in on my personal phone. It was a UK number +44-141-846-1617. I didn&#8217;t answer and let it go to voicemail, which a minute or so later showed that I had a message. When I finished speaking with my client I dialed 171 and listened to it.</p>
<p>There was silence for a long time and then &#8220;Hi. A free Euromillions Lottery ticket is waiting for you at the upcoming 45 million Euro jackpot draw. To redeem, press 1.&#8221;. This was repeated until the voicemail cut out. Here is a recording:</p>
<audio class="wp-audio-shortcode" id="audio-758-1" preload="none" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Lotto-Draw-Hoax.mp3?_=1" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Lotto-Draw-Hoax.mp3">https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Lotto-Draw-Hoax.mp3</a></audio>
<p>There was probably some sort of auto-dialler that was cycling through a set of numbers and playing the message at them. Presumably if somebody pressed 1, they would be connected to an &#8220;agent&#8221; who would kick off the <em>sales-pitch</em>, with &#8220;Oh good news, you have won a thousand Euro in a special draw, just give me all of your bank account details and PIN number and we can transfer that money for you.&#8221; and then proceed to empty your account. <img loading="lazy" decoding="async" class="" src="https://www.facebook.com/images/emoji.php/v9/f6e/1/28/1f621.png" alt="?" width="15" height="15" /></p>
<p>There were some reports in <a href="http://www.independent.ie/irish-news/news/garda-warning-over-lotto-scam-offering-free-play-in-the-euromillions-draw-35725526.html">May</a> about these calls coming from an Irish number, but this week it was a UK number.</p>
<p>The second of the phone scams came yesterday and was the old SMS text message with a link to a photo (apparently), and here is said offender:</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-761 size-medium" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Screenshot_2017-06-18-19-22-39-300x190.png" alt="scam text" width="300" height="190" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Screenshot_2017-06-18-19-22-39-300x190.png 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Screenshot_2017-06-18-19-22-39-768x486.png 768w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Screenshot_2017-06-18-19-22-39-1024x648.png 1024w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Screenshot_2017-06-18-19-22-39.png 1079w" sizes="auto, (max-width: 300px) 100vw, 300px" /></p>
<p>It would be so easy to click on that link, but as I am a firm believer in <a href="http://www.l2cybersecurity.com/v-cast-aside-e-mails-from-strangers/">Commandment 5</a>, I resisted the temptation to click and instead fired up a sacrificial machine and typed the link into that instead <img loading="lazy" decoding="async" class="" src="https://www.facebook.com/images/emoji.php/v9/fe5/1/28/1f60f.png" alt="?" width="15" height="15" />.  After a moment of the web address changing in the browser (also known as a redirect) I was presented with, what appears to be, the start of a movie trailer and then this message:</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-762 size-full" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Movie-hoax.png" alt="" width="504" height="276" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Movie-hoax.png 504w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Movie-hoax-300x164.png 300w" sizes="auto, (max-width: 504px) 100vw, 504px" /></p>
<p>So like a good sucker, I clicked on OK and was presented with:</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-763 size-full" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Movie-Hoax-2.png" alt="" width="708" height="397" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Movie-Hoax-2.png 708w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Movie-Hoax-2-300x168.png 300w" sizes="auto, (max-width: 708px) 100vw, 708px" /></p>
<p>Anybody who read last week&#8217;s <a href="https://www.l2cybersecurity.com/typo-can-cause-problems/">post</a>, will know that these kind of sign-ups, will usually mean entering a credit card number somewhere, which will then be milked dry by the evil doers. I traced the original link to a company based in the Seychelles, so at least the money would be going somewhere nice <img loading="lazy" decoding="async" class="" src="https://www.facebook.com/images/emoji.php/v9/f92/1/28/1f911.png" alt="?" width="15" height="15" /><img loading="lazy" decoding="async" class="" src="https://www.facebook.com/images/emoji.php/v9/f37/1/28/1f47a.png" alt="?" width="15" height="15" /><img loading="lazy" decoding="async" class="" src="https://www.facebook.com/images/emoji.php/v9/f6e/1/28/1f621.png" alt="?" width="15" height="15" /></p>
<p>So, please don&#8217;t fall for these phone scams. There are many others, so if in doubt, just remember &#8220;If it sounds too good to be true, then it probably is.&#8221; and follow <a href="http://www.l2cybersecurity.com/v-cast-aside-e-mails-from-strangers/">Commandment 5</a> for unsolicited e-mails, texts or social media messages with links.</p>
<p>The post <a href="https://www.l2cybersecurity.com/phone-scams-current-examples/">Phone scams &#8211; some current examples</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Lotto-Draw-Hoax.mp3" length="107847" type="audio/mpeg" />

			</item>
		<item>
		<title>Protect your on-line accounts, but not with text messages.</title>
		<link>https://www.l2cybersecurity.com/protect-online-accounts/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Mon, 12 Sep 2016 15:01:28 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Best Practice]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Defence in Depth]]></category>
		<category><![CDATA[LinkedIn]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=554</guid>

					<description><![CDATA[<p>As I outlined here, if you are using on-line accounts for e-mail, social media, etc. then one of the strongest means of protecting yourself from the evil doers is to use, what is called, two factor authentication. If you are not doing this now, you really should be as it improves your protection massively. This is&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/protect-online-accounts/">Protect your on-line accounts, but not with text messages.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">As I outlined <a href="http://www.l2cybersecurity.com/vii-use-two-factor-authentication/" data-blogger-escaped-target="_blank">here</a>, if you are using on-line accounts for e-mail, social media, etc. then one of the strongest means of </span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">protecting yourself from the evil doers is to use, what is called, two factor authentication. If you are not doing this now, you really should be as it improves your protection massively.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">This is where you can set your on-</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">line accounts to not only request your user ID and password (something you know) but also using your phone (something you have) by </span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">way of an app or sending you a text message with a code that you enter on the site to confirm you are <b><u>you</u></b>. </span></p>
</div>
<p><span id="more-554"></span></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">If you have this set-up to authenticate by a SMS Text message, then a bad guy who has access to your LinkedIn details from the </span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><a href="https://blog.linkedin.com/2012/06/06/linkedin-member-passwords-compromised" data-blogger-escaped-target="_blank">2012 hack</a> should not be able to access your e-mail account using the password that they have recovered from there, because as </span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">soon as they try to access your e-mail account, you will be sent a text message. So you&#8217;re safe &#8230; right?</span></p>
</div>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif; text-align: justify;">Well, if they have your LinkedIn details, they may also have your mobile phone number (or they have it from other means). So as </span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif; text-align: justify;">soon as they try to access your e-mail and a text message is sent to you from your e-mail provider, they follow it up immediately </span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif; text-align: justify;">with a text from themselves to say somebody is trying to access your account and to reply to them with the 6 digit code that you </span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif; text-align: justify;">just received. If you do this, they immediately access your account and lock you out of it. You can see how this works on this </span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif; text-align: justify;">short video from Symantec.</span></p>
<p><iframe loading="lazy" title="SMS Phishing Scam for Email Accounts | Symantec" width="500" height="281" src="https://www.youtube.com/embed/_dj_90TnVbo?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>&nbsp;</p>
<div data-blogger-escaped-style="text-align: justify;"> The three tips on that video at the end are very pertinent:</div>
<ol>
<li><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Beware of unsolicited text messages</span></li>
<li><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">If unsure, check with your account provider</span></li>
<li><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Password recovery text services never require a response via text or other e-mail</span></li>
</ol>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">So really, the best way to secure your account is to use an app on your smart phone like <a href="https://support.google.com/accounts/answer/1066447?hl=en" data-blogger-escaped-target="_blank">Google Authenticator</a>, <a href="https://www.twilio.com/authy" data-blogger-escaped-target="_blank">Authy</a> or <a href="https://duo.com/why-duo/why-two-factor-authentication-2fa" data-blogger-escaped-target="_blank">Duo</a>. These </span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">are constantly generating random 6 digit codes which you can use to authorise your access to an account. These will work even in flight mode. So if you receive a text </span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">message asking for your code, you can simply ignore it. Here&#8217;s an example from Google Authenticator:</span></p>
<p class="separator" data-blogger-escaped-style="clear: both; text-align: center;"><a href="https://2.bp.blogspot.com/-XIi-YThkLz8/V9a9SE62G8I/AAAAAAAAAX4/jT-34Q5rXvAct9GmAmjZBtGG7OpeJgVQgCLcB/s1600/Screenshot_2016-09-12-15-30-41.png" data-blogger-escaped-style="margin-left: 1em; margin-right: 1em;"><img loading="lazy" decoding="async" class="aligncenter" src="https://2.bp.blogspot.com/-XIi-YThkLz8/V9a9SE62G8I/AAAAAAAAAX4/jT-34Q5rXvAct9GmAmjZBtGG7OpeJgVQgCLcB/s400/Screenshot_2016-09-12-15-30-41.png" width="225" height="400" border="0" /></a><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><br />
</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="background-color: white; font-family: &quot;verdana&quot; , sans-serif;">The </span><a href="http://www.l2cybersecurity.com/security-awareness-training/" data-blogger-escaped-style="background-color: white; color: #4a4a4a; font-family: Verdana, sans-serif; text-decoration: none;" data-blogger-escaped-target="_blank">training</a><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="background-color: white; font-family: &quot;verdana&quot; , sans-serif;"> that L2 Cyber Security Solutions delivers, will give you a better understanding of the threats that are out there and show you how you can easily protect yourself from them. </span></p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/protect-online-accounts/">Protect your on-line accounts, but not with text messages.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A Nightmare on Quadrooter Street.</title>
		<link>https://www.l2cybersecurity.com/nightmare-on-quadrooter-street/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Tue, 16 Aug 2016 06:39:10 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[Check Point]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Quadrooter]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=548</guid>

					<description><![CDATA[<p>When I was a teenager, watching slasher flicks like A Nightmare on Elm Street (the original 1984 version) and Halloween, in order to look like a &#8220;tough guy&#8221; I developed a sort of movie watching buffer whereby when any startling occurrence happened (e.g. the scary guy leaps out of the shadows), I would simply sit&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/nightmare-on-quadrooter-street/">A Nightmare on Quadrooter Street.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">When I was a teenager, watching slasher flicks like <i><span style="color: #666666;" data-blogger-escaped-style="color: #666666;">A Nightmare on Elm Street</span></i> (the original 1984 version) and <i><span style="color: #666666;" data-blogger-escaped-style="color: #666666;">Halloween</span></i>, in order to look like a &#8220;tough guy&#8221; I developed a sort of movie watching buffer whereby when any startling occurrence happened (e.g. the scary guy leaps out of the shadows), I would simply sit there all cool-like while all around me leaped out of their seats. I would mentally take a moment to let the occurrence happen and then internally say &#8220;Yep! That thing that happens in every scary movie happened&#8221; and just continue watching. I just don&#8217;t react to the situation the instant it happens.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Nowadays I continue this type of trick when I read scary stories. For example, last weeks <a href="http://www.l2cybersecurity.com/garda-systems-hit-by-ransomware/">blog post</a> about the Garda Síochána hack. After all the initial &#8220;Mob hack the Garda&#8221; hyperbole, it would appear, after a few days, that it was a simple Ransomware incident.</span></p>
</div>
<p><span id="more-548"></span></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">And so it is with the <a href="https://www.checkpoint.com/resources/quadrooter-vulnerability-enterprise/">recent story</a> from Check Point Software Technologies Ltd about their sexily named Quadrooter. A set of four vulnerabilities what they discovered in the Qualcomm chips that are in use in up to 900 million Android devices worldwide.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">There&#8217;s no denying that the vulnerabilities exist, but were things as bad as Check Point were making out? Obviously if you purchased Check Point&#8217;s security solution for mobile devices, you would be protected from Quadrooter, but guess what? You were most likely already protected &#8230; by Android itself.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">As long as you are running Android 4.2 or higher on which &#8220;Verify Apps&#8221; was turned on by default and have not changed the app store settings to enable &#8220;Unknown Sources&#8221;, you won&#8217;t be affected by 3 of the 4 vulnerabilities. Simples. Google are working on a patch for the 4th vulnerability. </span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">According to Google, 90% of the 900 million devices quoted by Check Point will be protected from Quadrooter, and the remaining 10% would be if they re-enable &#8220;Verify Apps&#8221;.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">You can see further information <a href="http://www.androidcentral.com/google-confirms-verify-apps-can-block-apps-quadrooter-exploits">here</a>.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">So another Scary Story that, with the passing of a few days, turns out not to be so scary after all.</span></p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/nightmare-on-quadrooter-street/">A Nightmare on Quadrooter Street.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
