<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Vulnerability Archives - L2 Cyber Security Solutions Ltd.</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/vulnerability/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/vulnerability/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Thu, 01 Aug 2024 15:11:11 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>Vulnerability Archives - L2 Cyber Security Solutions Ltd.</title>
	<link>https://www.l2cybersecurity.com/tag/vulnerability/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#WeekendWisdom 096 Zero Days</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-096-zero-days/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 24 Sep 2021 07:15:46 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[0 Days]]></category>
		<category><![CDATA[0Days]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Exploit]]></category>
		<category><![CDATA[Exploits]]></category>
		<category><![CDATA[Fix]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[ODays]]></category>
		<category><![CDATA[Patch]]></category>
		<category><![CDATA[Tipperary]]></category>
		<category><![CDATA[Update]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[Zero Days]]></category>
		<category><![CDATA[ZeroDays]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2612</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 96. This week we talk about Zero Days. Where is this coming from? Over the last two #WeekendWisdoms I talked about needing to do updates for vulnerabilities and when it comes to software vulnerabilities zero days are usually the most critical. You see when security researchers are analysing various software like&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-096-zero-days/">#WeekendWisdom 096 Zero Days</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 96. This week we talk about Zero Days.<span id="more-2612"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2612-1" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-096-lo.mp4?_=1" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-096-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-096-lo.mp4</a></video></div>
<h3>Where is this coming from?</h3>
<p>Over the last two #WeekendWisdoms I talked about needing to do updates for vulnerabilities and when it comes to software vulnerabilities zero days are usually the most critical.</p>
<p>You see when security researchers are analysing various software like Microsoft, Apple and Google products, if they discovery a vulnerability in that software, they will report it to the vendor and give them an opportunity to rectify it and fix it before they make it public. They usually give them a period of months, normally it is usually 3 months.</p>
<h3>What are Zero Days?</h3>
<p>But in the case of zero days what happens is that a vulnerability is exposed on a day when nobody is aware of it until everybody is suddenly aware of it, including the vendor and including criminal gangs.</p>
<p>These cyber criminal gangs will immediately start looking to try and exploit that zero day vulnerability, while the vendors are rushing to try and fix it, to put out an update to fix that vulnerability.</p>
<p>That can take time. It can take days, it could take weeks to fix it. So it&#8217;s kind of a race against time for the cyber criminals to try and crack it and exploit it and for the vendors to fix it and update it.</p>
<h3>What should you do?</h3>
<p>So if you ever hear me talking about &#8220;There’s a zero day vulnerability out there that you need to patch!&#8221;, you should be looking to try and patch that as quickly as possible.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<div class="fl-post-content clearfix">
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://www.linkedin.com/in/l2actual/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://infosec.exchange/@L2actual" target="_blank" rel="noopener">Mastodon</a>.</p>
<p>Follow L2 Cyber on <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-096-zero-days/">#WeekendWisdom 096 Zero Days</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-096-lo.mp4" length="31106775" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 095 Why Updates are Important</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-095-why-updates-are-important/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 17 Sep 2021 07:15:28 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Apple Watch]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Exploit]]></category>
		<category><![CDATA[Exploits]]></category>
		<category><![CDATA[iPhone]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Mac]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Patches]]></category>
		<category><![CDATA[Tipperary]]></category>
		<category><![CDATA[Updates]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[Why Updates are important]]></category>
		<category><![CDATA[Windows]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2607</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 95. This week we&#8217;re going to talk about why updates are important. This sounds familiar Waaaay back in the early days of the #WeekendWisdom series, back at number 3, I talked about updates. I&#8217;ll have a link to that video somewhere on the social media post associated with this video. The&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-095-why-updates-are-important/">#WeekendWisdom 095 Why Updates are Important</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 95. This week we&#8217;re going to talk about why updates are important.<span id="more-2607"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2607-2" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-095-lo.mp4?_=2" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-095-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-095-lo.mp4</a></video></div>
<h3>This sounds familiar</h3>
<p>Waaaay back in the early days of the #WeekendWisdom series, back at <a href="https://www.l2cybersecurity.com/weekendwisdom-003-updates/" target="_blank" rel="noopener">number 3</a>, I talked about updates. I&#8217;ll have a link to that video somewhere on the social media post associated with this video.</p>
<p>The events of the last week has brought it back to me that this really is an important topic that we all need to be aware of.</p>
<h3>What happened this last week?</h3>
<p>Apple, earlier this week, released updates to its iPhones and Mac computers and watches that plugged a vulnerability which was being exploited by a surveillance software maker which literally all they had to do if they wanted to take control of somebody&#8217;s iPhone we&#8217;ll say, all they need to do is send a message to that phone and just when the phone receives the message, they now have control of it. The user of the phone did not have to do anything. So that&#8217;s pretty scary.</p>
<p>Also there was the vulnerability that I talked about in <a href="https://www.l2cybersecurity.com/weekendwisdom-094-how-to-remove-internet-explorer/" target="_blank" rel="noopener">last week&#8217;s #WeekendWisdom</a>. Microsoft have issued updates for that this week. So again, it&#8217;s really critical that if you have updates waiting on your Windows computer to apply them.</p>
<h3>This is the reason why updates are important</h3>
<p>You see the problem here is that when the likes of Apple or Microsoft issue updates, criminals go and take those updates, they look at them and they find out what exactly has been fixed in Windows or in the iPhones or whatever. Then they can figure out how they can exploit that, that vulnerability that was there that was fixed. If people don&#8217;t do the updates, the criminals can now exploit them, for those people who don&#8217;t, because there are quite a lot of people who don&#8217;t apply updates.</p>
<p>But it&#8217;s really important that you do.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<div class="fl-post-content clearfix">
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://www.linkedin.com/in/l2actual/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://infosec.exchange/@L2actual" target="_blank" rel="noopener">Mastodon</a>.</p>
<p>Follow L2 Cyber on <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-095-why-updates-are-important/">#WeekendWisdom 095 Why Updates are Important</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-095-lo.mp4" length="34691857" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 094 How to remove Internet Explorer</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-094-how-to-remove-internet-explorer/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 10 Sep 2021 07:15:29 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Exploit]]></category>
		<category><![CDATA[How to remove IE]]></category>
		<category><![CDATA[How to remove Internet Explorer]]></category>
		<category><![CDATA[IE]]></category>
		<category><![CDATA[IE Retirement]]></category>
		<category><![CDATA[Internet Explorer]]></category>
		<category><![CDATA[Internet Explorer Retirement]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Tipperary]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2602</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 94. This week we&#8217;re going to talk about how to remove Internet Explorer. Why would you want to do this? Microsoft are going to retire the Internet Explorer browser in June of 2022. But you might want to consider getting rid of it at bit sooner &#8230; like now. You see&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-094-how-to-remove-internet-explorer/">#WeekendWisdom 094 How to remove Internet Explorer</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 94. This week we&#8217;re going to talk about how to remove Internet Explorer.<span id="more-2602"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2602-3" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-094-lo.mp4?_=3" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-094-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-094-lo.mp4</a></video></div>
<h3>Why would you want to do this?</h3>
<p>Microsoft are going to retire the Internet Explorer browser in June of 2022. But you might want to consider getting rid of it at bit sooner &#8230; like now. You see there is a vulnerability in it that can be exploited by somebody sending you a malicious word document. That all you have to do is open the document. You don&#8217;t need to take any other action, like click enable content or any other thing. Opening the document will exploit this vulnerability and cause malicious code to be run on your computer.</p>
<h3>Check if you should first</h3>
<p>Now before you take any of these steps, please check with your IT support that you really don&#8217;t need to use Internet Explorer anymore or that you&#8217;re allowed to remove it. So please check first.</p>
<h3>How to remove Internet Explorer</h3>
<p>This is how you get rid of it.</p>
<ol>
<li>Go down to the bottom left hand corner and click the start button and select settings.</li>
<li>Click Apps.</li>
<li>Then click Optional features.</li>
<li>Find Internet Explorer, click on it and click uninstall.</li>
<li>Then when you see this thing and it&#8217;s finished, reboot your computer.</li>
</ol>
<p>Once it comes back up again, you should be safe.</p>
<h3>What if you need Internet Explorer?</h3>
<p>If you really do need to use Internet Explorer for some legacy application or something like that, there is an Internet Explorer mode in the Microsoft Edge browser. Google that and find out how you can use that mode.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<div class="fl-post-content clearfix">
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://www.linkedin.com/in/l2actual/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://infosec.exchange/@L2actual" target="_blank" rel="noopener">Mastodon</a>.</p>
<p>Follow L2 Cyber on <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-094-how-to-remove-internet-explorer/">#WeekendWisdom 094 How to remove Internet Explorer</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/09/WeekendWisdom-094-lo.mp4" length="32134340" type="video/mp4" />

			</item>
		<item>
		<title>Vulnerable Cisco Firewalls</title>
		<link>https://www.l2cybersecurity.com/vulnerable-cisco-firewalls/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Tue, 06 Feb 2018 14:25:20 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Best Practice]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1133</guid>

					<description><![CDATA[<p>It emerged last week that a security researcher had made a very significant discovery, which showed that popular firewalls made by Cisco had a vulnerability that was scored a perfect 10 out of 10 on the CVSS (Common Vulnerability Scoring System) scale. The vulnerable Cisco firewalls are in widespread use and they need to be&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/vulnerable-cisco-firewalls/">Vulnerable Cisco Firewalls</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft wp-image-1146 size-thumbnail" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/cisco-asa-5505-risk-150x150.jpg" alt="vulnerable cisco" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/cisco-asa-5505-risk-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/02/cisco-asa-5505-risk.jpg 300w" sizes="(max-width: 150px) 100vw, 150px" />It emerged last week that a security researcher had made a very significant discovery, which showed that popular firewalls made by Cisco had a vulnerability that was scored a perfect 10 out of 10 on the CVSS (<em>Common Vulnerability Scoring System</em>) scale. <span id="more-1133"></span>The vulnerable Cisco firewalls are in widespread use and they need to be patched urgently.</p>
<p>As is usual, the vulnerability lies in the software that runs on these firewalls. This Adaptive Security Appliance (ASA) software is what has been found to be vulnerable by a researcher who was to present his findings at a security conference in Belgium last Friday. He hasn&#8217;t released all of the juicy details yet and there are no reported exploits in the wild, but that could all change.</p>
<p>The affected devices, <a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180129-asa1">according to Cisco</a>, are:</p>
<ul>
<li>3000 Series Industrial Security Appliance (ISA)</li>
<li>ASA 5500 Series Adaptive Security Appliances</li>
<li>ASA 5500-X Series Next-Generation Firewalls</li>
<li>ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers</li>
<li>ASA 1000V Cloud Firewall</li>
<li>Adaptive Security Virtual Appliance (ASAv)</li>
<li>Firepower 2100 Series Security Appliance</li>
<li>Firepower 4110 Security Appliance</li>
<li>Firepower 4120 Security Appliance</li>
<li>Firepower 4140 Security Appliance</li>
<li>Firepower 4150 Security Appliance</li>
<li>Firepower 9300 ASA Security Module</li>
<li>Firepower Threat Defense Software (FTD)</li>
<li>FTD Virtual (FTDv)</li>
</ul>
<p>If you have any of these devices in your network, you should be getting your IT support to patch it as soon as possible. There were reported issues with the initial patches, but Cisco have now rectified those too.</p>
<p>The big concern was to do with the Virtual Private Network (VPN) component on the firewall. If you are able to connect in remotely to your network by way of this VPN, then your entire network is at risk of being compromised.</p>
<p>Of course you&#8217;ve been following <a href="http://www.l2cybersecurity.com/have-a-firewall-in-place/">Commandment 3</a> and have a firewall in place. Now you&#8217;ve also got to employ <a href="http://www.l2cybersecurity.com/use-automatic-updates/">Commandment 1</a> and keep it updated.</p>
<p>For the technical types who are reading this, you can get a much more in-depth view of the vulnerable Cisco firewall issues on <a href="https://blogs.cisco.com/security/cve-2018-0101">a blog post</a> by Omar Santos.</p>
<p>The post <a href="https://www.l2cybersecurity.com/vulnerable-cisco-firewalls/">Vulnerable Cisco Firewalls</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Meltdown and Spectre</title>
		<link>https://www.l2cybersecurity.com/meltdown-spectre-vulnerabilities/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Tue, 30 Jan 2018 10:00:12 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Spectre]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1064</guid>

					<description><![CDATA[<p>You probably can&#8217;t have missed the reports about the cyber-Armageddon that are circulating today. Two very significant vulnerabilities have been found in the processor chips that are used by nearly every single computer, tablet, phone and smart toaster. This includes Mac OS X on Apple computers. Interestingly it has been reported that iPhones and iPads&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/meltdown-spectre-vulnerabilities/">Meltdown and Spectre</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-thumbnail wp-image-1065" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/01/Meltdown-150x150.jpg" alt="Meltdown" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/01/Meltdown-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/01/Meltdown.jpg 300w" sizes="(max-width: 150px) 100vw, 150px" />You probably can&#8217;t have missed the reports about the cyber-Armageddon that are circulating today. Two very significant vulnerabilities have been found in the processor chips that are used by nearly every single computer, tablet, phone and smart toaster. <span id="more-1064"></span>This includes Mac OS X on Apple computers. <span style="color: #800080;"><em><del>Interestingly it has been reported that iPhones and iPads are NOT affected.</del></em></span> These vulnerabilities have been given names. One is called <em>Meltdown</em> and the other <em>Spectre</em>.</p>
<p>I&#8217;m not going to go into any technical detail on these vulnerabilities. If you want to read the technical side you can go to the team that discovered the problems, Google&#8217;s <a href="https://googleprojectzero.blogspot.ie/2018/01/reading-privileged-memory-with-side.html">Project Zero</a>. There is some less technical information available on a <a href="https://meltdownattack.com/">dedicated webpage</a> for the vulnerabilities. I&#8217;ve put in some easy to read background on this in the discussion section below.</p>
<h2><span style="color: #ff0000;">What do you need to do about Meltdown NOW:</span></h2>
<p>First of all <span style="text-decoration: underline;"><strong>DON&#8217;T PANIC</strong></span><span style="text-decoration: underline;">.</span> This is not the end-of-the-world. The situation is serious, but there are currently no active exploits out there. So keep a cool head and this can be managed successfully.</p>
<p><span style="color: #0000ff;"><strong>Original Text posted 4th January 2018 @ 16:30 GMT</strong></span></p>
<hr />
<p><strong><span style="color: #ff0000;">Update 30th January 2018 @ 10:00 GMT:</span></strong></p>
<p>Steve Gibson, a renowned security expert has created an excellent free little tool, called <em><strong>InSpectre</strong></em> for helping people to understand if they are protected or not from the two vulnerabilities. It has other useful advice there too. I would suggest you download it and run it against your Desktop/Laptop and see what your exposure is. Link to the download page is here.</p>
<p><a href="https://www.grc.com/inspectre.htm">https://www.grc.com/inspectre.htm</a></p>
<p><span style="color: #ff0000;"><strong>End-of-Update 2018/01/30-10:00</strong></span></p>
<hr />
<p><strong><span style="color: #ff0000;">Update 8th January 2018 @ 10:00 GMT:</span></strong></p>
<ul>
<li>It has been reported that the Microsoft patches <a href="https://answers.microsoft.com/en-us/windows/forum/windows_10-update/after-installation-of-kb4056892-boot-failure-after/6c015632-2a45-4725-a882-f231f8c88f36?auth=1">are causing problems</a> for people using some AMD processor chips. It stops the machine from booting properly and seems to require Windows to be re-installed. If you have a PC with an AMD processor, it might be advisable to turn off Windows Update <em><strong>temporarily</strong></em><em> </em>until this issue is fixed.</li>
<li>Qualcomm is another chip manufacturer, who make processors for mobile devices (e.g. &#8211; the Snapdragon processor that is used by many Android phones). <a href="http://www.theregister.co.uk/2018/01/06/qualcomm_processor_security_vulnerabilities/">They have now confirmed</a> that their chips are also affected by these vulnerabilities.</li>
</ul>
<p><span style="color: #ff0000;"><strong>End-of-Update 2018/01/08-10:00</strong></span></p>
<hr />
<p><strong><span style="color: #ff0000;">Update 5th January 2018 @ 21:45 GMT:</span></strong></p>
<ul>
<li><a href="https://newsroom.intel.com/news-releases/intel-issues-updates-protect-systems-security-exploits/">Intel have advised</a> that they are rolling out software and firmware patches to address the exploits as best possible. They expect to have 90% of the chips that were made in the last 5 years updated by the end of next week. They don&#8217;t seem to be talking about anything older than 5 years, so this might be a concern for people with older equipment.</li>
</ul>
<p><span style="color: #ff0000;"><strong>End-of-Update 2018/01/05-21:45</strong></span></p>
<hr />
<p><strong><span style="color: #ff0000;">Update 5th January 2018 @ 11:00 GMT:</span></strong></p>
<ul>
<li>What I didn&#8217;t mention yesterday was there are reports that fixing these vulnerabilities will cause the processor performance to degrade. While there will be some level of degradation, in typical workloads it shouldn&#8217;t be too noticeable. I won&#8217;t quote a percentage degree of slowdown as has been reported elsewhere, as it is purely speculation.</li>
<li>Operating Systems:
<ul>
<li>Microsoft have pushed out their patch for this to all platforms. As mentioned earlier some Anti-Virus vendors need to make changes before the patch can apply correctly. Keep an eye on this <a href="https://docs.google.com/spreadsheets/d/184wcDt9I9TUNFFbsAVLpzAtckQxYiuirADzf3cL42FQ/edit?usp=sharing">google doc</a> for the current situation with the various anti-virus packages. Be sure to test the patch where possible before widespread deployment, in case there are any issues.</li>
<li>Apple Macs &#8211; MacOS patches are available.</li>
<li>Linux &#8211; patches are available.</li>
</ul>
</li>
<li>Browsers:
<ul>
<li>Firefox &#8211; be on version 57 (currently available).</li>
<li>Chrome won&#8217;t be releasing version 64 for a few weeks, but Google advise people to enable an experimental feature called &#8220;Site Isolation&#8221; that can offer some protection against the web-based exploits but might also cause performance problems. Do the following:
<ul>
<li>Copy <span style="color: #0000ff;">chrome://flags/#enable-site-per-process</span> and paste it into the URL field at the top of your Chrome web browser, and then hit the Enter key.</li>
<li>Look for Strict Site Isolation, then click the box labelled Enable.</li>
<li>Once done, hit Relaunch Now to relaunch your Chrome browser.</li>
</ul>
</li>
<li>Internet Explorer/Edge will be updated with today&#8217;s patches from Microsoft</li>
</ul>
</li>
<li>Mobile and Smart Devices:
<ul>
<li>The big change since the original post is that iPhones and iPads have been <a href="https://support.apple.com/en-us/HT208394">declared as vulnerable</a> by Apple. Expect updates in the coming days for iOS devices.</li>
<li>Google branded Android phones/tablets will get the January 2018 patches in the next few days. Non-Google branded phones will only get updates at the discretion of the manufacturer. So please watch out for these.</li>
<li>If you have any other devices (smart fridge/kettle/thermostat/toaster, CCTV cameras, digital assistants), be sure to check their interface to see if updates come available for them.</li>
</ul>
</li>
<li>Virtualisation Software:
<ul>
<li>VMWare have <a href="https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html">issued guidance</a> on their affected products.</li>
<li>Citrix don&#8217;t believe they are directly affected, but <a href="https://support.citrix.com/article/CTX231399">have guidance</a> for their customers as other software running on their platform may be impacted.</li>
</ul>
</li>
<li>Cloud platforms:
<ul>
<li>Google Cloud platform has <a href="https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html">detailed advice</a> for their clients.</li>
<li>Microsoft&#8217;s Azure platform also <a href="https://azure.microsoft.com/en-us/blog/securing-azure-customers-from-cpu-vulnerability/">has information</a> for their customers.</li>
<li>Amazon also has <a href="https://aws.amazon.com/security/security-bulletins/AWS-2018-013/">a detailed statement</a> for their clients.</li>
<li>If you use some other Cloud Platform, please contact them to find out what their plans are to address these vulnerabilities.</li>
</ul>
</li>
</ul>
<p><span style="color: #ff0000;"><strong>End-of-Update 2018/01/05-11:00</strong></span></p>
<hr />
<p>I hate to say it, but you need to patch and patch everything as soon as you can. <span style="color: #ff0000;"><strong>Warning:</strong></span> Make sure patches/fixes come from their usual sources and not by somebody sending you <a href="https://www.l2cybersecurity.com/fantom-ransomware-strikes/">an e-mail with the patch</a>. That won&#8217;t end well for you.</p>
<ul>
<li>Microsoft are issuing their monthly Patch bundle today (4th January) to address Meltdown. Install it as soon as it comes available on your PCs and schedule an emergency patch for your servers ASAP. <span style="color: #ff0000;"><strong>Warning:</strong></span> There have been <a href="https://twitter.com/GossiTheDog/status/948833482784038912">reports</a> that some Anti-Virus software may not play nicely with the Windows fixes and cause your machine to crash badly. Check this <a href="https://docs.google.com/spreadsheets/d/184wcDt9I9TUNFFbsAVLpzAtckQxYiuirADzf3cL42FQ/edit?usp=sharing">google doc</a> for the current situation with the various anti-virus packages.</li>
<li>Firefox users make sure you are running version 57 (click the three horizontal lines and go to Help-&gt;About Firefox).</li>
<li>Chrome users need to wait for version 64 which is coming (click the three vertical dots and go to Help-&gt;About Google Chrome).</li>
<li>Apple Macs already have the patches out there, so make sure you are up-to-date.</li>
<li>If you have Linux anywhere, patches are available so update it ASAP.</li>
<li>Hopefully Android phones/tablets will get updates, so please watch out for them.</li>
<li>iPhones/iPads are currently safe from this issue.</li>
<li>If you have any other devices (smart fridge/kettle/thermostat/toaster, CCTV cameras, digital assistants), be sure to check their interface to see if updates come available for them.</li>
</ul>
<p>I would not be at all surprised if there will be multiple patches emanating from Microsoft over the next week or two in respect to this.</p>
<h2>I use services in the cloud, am I affected?</h2>
<p>Absolutely. However reports are that Amazon and Microsoft are busy working away patching their infrastructure. There are a LOT of other other cloud services out there, so please check with them to see if you are in anyway exposed to these bugs.</p>
<h2>Discussion:</h2>
<p>When I check <a href="https://twitter.com/L2_Evangelist">Twitter</a> each morning, I normally see about 10 or 20 tweets from overnight. This morning it was hundreds of tweets. The cyber security world has gone into overdrive in the last 24 hours. I was seeing rumours of an Intel processor vulnerability circulating yesterday and then the disclosure broke overnight. It seems that they were trying to hold off until next week, in order for more work to be done on issuing fixes, but it was leaked. So now there is the scramble to get the fixes out there as fast as possible.</p>
<p>The Meltdown bug is poorly named, as it is not going to &#8220;melt&#8221; anything (ignore the picture I&#8217;ve used for this post I just liked the look of it <span id="c128" class="notranslate">?</span>). What it does is it breaches protections between the operating system (e.g. Windows) and Applications that are in use (e.g. Excel, Sage, etc.). The bug enables a malicious program to get at parts of the computer memory that stores sensitive information, such as passwords. Once it has this information it could send it to the bad guys. This vulnerability is relatively easy to exploit and proof of concept exploits have shown up in the wild.</p>
<p>The Spectre bug is not as easy to exploit as Meltdown, but it is also not as easily fixed. It works by breaking the isolation between different applications, which enables an attacker to fool normal computer programs into revealing sensitive data that they have in memory. The current discussion on this indicates that to truly protect against Spectre, hardware may need to be replaced.</p>
<p>We&#8217;re in for an interesting start to 2018!!! <span id="c126" class="notranslate">?</span><span id="c126" class="notranslate">?</span><span id="c126" class="notranslate">?</span></p>
<p>The post <a href="https://www.l2cybersecurity.com/meltdown-spectre-vulnerabilities/">Meltdown and Spectre</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Pacemaker updates &#8211; they&#8217;re a thing now!?!?</title>
		<link>https://www.l2cybersecurity.com/pacemaker-updates/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Mon, 04 Sep 2017 16:45:39 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=895</guid>

					<description><![CDATA[<p>On August 23rd the Food and Drug Administration (FDA) in the US approved the deployment of a software update for pacemakers made by St. Jude Medical.  This was to fix vulnerabilities discovered in 2016, which were patched by St. Jude Medical in January 2017. Actually, vulnerabilities in pacemakers have been around for quite a while,&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/pacemaker-updates/">Pacemaker updates &#8211; they&#8217;re a thing now!?!?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-thumbnail wp-image-896" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/09/pacemaker-patched-150x150.jpg" alt="Pacemaker updates" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/09/pacemaker-patched-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2017/09/pacemaker-patched.jpg 300w" sizes="(max-width: 150px) 100vw, 150px" />On August 23rd the Food and Drug Administration (FDA) in the US <a href="https://www.fda.gov/MedicalDevices/Safety/AlertsandNotices/ucm573669.htm">approved the deployment</a> of a software update for pacemakers made by St. Jude Medical.  This was to fix vulnerabilities discovered in 2016, which <a href="http://media.sjm.com/newsroom/news-releases/news-releases-details/2017/St-Jude-Medical-Announces-Cybersecurity-Updates/default.aspx">were patched</a> by St. Jude Medical in January 2017. Actually, vulnerabilities in pacemakers have been around for quite a while, as <a href="http://www.nytimes.com/2008/03/12/business/12heart-web.html">this article</a> in the New York Times from March 2008 shows. So it seems that pacemaker updates are going to be another aspect of our future.<span id="more-895"></span></p>
<p>Don&#8217;t be overly worried about this subject. At this time, hackers won&#8217;t be able to issue some commands from their bedrooms that will stop every pacemaker in use. In this particular case, they would need a very unlikely set of circumstances to happen in order to degrade the battery of the pacemaker or set it to an inappropriate rhythm. The reason for the long delay between the patch being released and the FDA approving it, was they needed to be sure there would be no ill effects on the patients when they applied the pacemaker updates.</p>
<p>Virtually every technology runs on a mixture of hardware and software. The software controls and monitors the hardware. In devices like a pacemaker, the software is usually referred to as <em>Firmware</em>. This is because it is built into the of electronics of the device as opposed to being on a hard disk, for example. Updating firmware is usually a bit more difficult to carry out than say updating windows. Different devices have different mechanisms to do so. In some cases the firmware may only be updated by replacing a physical electronic chip.</p>
<p>As was detailed in our <a href="http://www.l2cybersecurity.com/use-automatic-updates/">First Commandment</a>, developers of software sometimes make mistakes. If evil doers discover these mistakes, they will endeavour to see if the mistake created a vulnerability. If there is a vulnerability, the bad guys will seek to exploit it and make the software do something it was not meant to do. This will never be something for your benefit.</p>
<p>Therefore we should all keep anything with software (which includes firmware) as up-to-date as possible in order to remove the vulnerabilities.</p>
<p>So have a look around you and think about the different devices that you may have in your office or home. We covered mobile, networking equipment, printers and internet of things in the <a href="http://www.l2cybersecurity.com/use-automatic-updates/">First Commandment</a>. But it would now seem that pacemaker updates (in fact any medical electronic device) will need to be added to that list.</p>
<p>The post <a href="https://www.l2cybersecurity.com/pacemaker-updates/">Pacemaker updates &#8211; they&#8217;re a thing now!?!?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Permission to spy on you?</title>
		<link>https://www.l2cybersecurity.com/permission-to-spy/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Tue, 27 Jun 2017 10:35:24 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[Best Practice]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[iOs]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=767</guid>

					<description><![CDATA[<p>Most people have smart phones these days and of course smart phones really come into their own through the use of Apps. There seems to be an app for every conceivable thing and lots of them are free. The phone makers make a good effort to protect us from bad apps by making sure that&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/permission-to-spy/">Permission to spy on you?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft wp-image-769 size-full" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/App-Permissions-1.png" alt="Permission to spy on you" width="300" height="300" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/App-Permissions-1.png 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/App-Permissions-1-150x150.png 150w" sizes="auto, (max-width: 300px) 100vw, 300px" />Most people have smart phones these days and of course smart phones really come into their own through the use of Apps. There seems to be an app for every conceivable thing and lots of them are free. The phone makers make a good effort to protect us from bad apps by making sure that when we install or update an app, which wants to access, for example, the camera &#8211; then we are shown this clearly and we have to grant the app permission to have the access it wants.<span id="more-767"></span></p>
<p>But do we really pay attention to these pop-ups that advise us what the app is looking to get permission to access? I would say no in most cases, because we just want to get the app and we trust the maker of said app, so let it have whatever it wants.</p>
<p>I&#8217;m raising this issue following:</p>
<ol>
<li>the recent revelation about <a href="https://www.wired.com/story/how-to-turn-off-snapchat-snap-maps/">Snap Map</a>, which is effectively Snapchat&#8217;s stalker mode, where you can see the current exact location of other Snapchat users.</li>
<li>a discussion with a colleague who uses an app that was developed for a small, rural community area and which she discovered showed the current exact location of any other user of the app.</li>
</ol>
<p>In the case of Snapchat, they are a large corporation with a huge number of end users and the revelation about the Snap Map feature has gotten quite a lot of media attention. Therefore a lot of people will have become aware of it and for those people who are concerned for their privacy, there is a means of disabling it, while still using the app for it&#8217;s original intended purpose.</p>
<p>In the second case above, there is probably only a hundred or so end users of this app, which was supposedly a simple community noticeboard. The discovery of the map containing the location of current users was made by accident and caused great concern for my colleague, who is now going to speak with the app developer. There is no way to disable the location tracking without uninstalling the app.</p>
<p>That app, when it was being installed, obviously asked for permission to the person&#8217;s identity and location (amongst other things), but like most people, anybody downloading the app would have trusted their local app developer and just accepted whatever permission was requested by the app, without question.</p>
<p>I tend to be more careful about what permissions apps are looking for, before I let an app install or update (with new permissions). For example, I have an old Android phone (not my primary device), which is no longer receiving updates from Google. So there probably exists vulnerabilities which are not being patched (if you wonder why this is important, you obviously haven&#8217;t read <a href="http://www.l2cybersecurity.com/use-automatic-updates/">Commandment 1</a> <img loading="lazy" decoding="async" class="" src="https://www.facebook.com/images/emoji.php/v9/fe5/1/28/1f60f.png" alt="?" width="16" height="16" />).</p>
<p>I therefore downloaded the free Avast Anti-Virus app to give me an additional layer of protection (in keeping with <a href="http://www.l2cybersecurity.com/use-anti-virus/">Commandment 2</a>). Initially it looked for permissions to in-app purchases, Device &amp; App History, Identity, Contacts, Location, SMS, Phone, Photos/Media/Files, Wi-Fi Connection information and Device ID. I was a little cagey about it needing access to location. Avast is a large company with a good reputation, so I took the decision to allow it access.</p>
<p>Then several weeks ago it looked to update the app and needed some additional permission granted. Now it wanted the following:</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-770" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Avast-additional-permission.png" alt="Avast additional permission" width="236" height="358" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Avast-additional-permission.png 236w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Avast-additional-permission-198x300.png 198w" sizes="auto, (max-width: 236px) 100vw, 236px" /></p>
<p>I can see no justifiable reason for an Anti-Virus application to need permission to access the camera and microphone, let alone Bluetooth connection information. Viruses do not come through by the phone looking at or listening to something. So I have not allowed it to be updated.</p>
<p>Everyone really needs to be more careful when installing or updating apps, particularly when presented with the permissions pop-up. Just think &#8220;What is this app going to do for me?&#8221; and then go through each of the permissions it is asking for and say &#8220;Why does it need access to &#8230;?&#8221;. If you are really unsure, then please ask somebody who knows about such things (and not your pre-teen or teenager). If you want, you can reach us at <a href="mailto:support@L2CyberSecurity.com">support@L2CyberSecurity.com</a>.</p>
<p>The post <a href="https://www.l2cybersecurity.com/permission-to-spy/">Permission to spy on you?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Sick subtitles can infect your media player</title>
		<link>https://www.l2cybersecurity.com/sick-subtitles-can-infect-media-player/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Mon, 29 May 2017 15:28:57 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Check Point]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Kodi]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Media Player]]></category>
		<category><![CDATA[Popcorn Time]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Strem.io]]></category>
		<category><![CDATA[Stremio]]></category>
		<category><![CDATA[Subtitles]]></category>
		<category><![CDATA[VLC]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=714</guid>

					<description><![CDATA[<p>Do you use a media player like VLC, Kodi, Popcorn Time or Strem.io? Perhaps you are using one of those &#8220;dodgy&#8221; Android boxes? If so you will want to update them to their latest version ASAP because it is possible that they might pick up subtitles that can compromise the machine that you are playing&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/sick-subtitles-can-infect-media-player/">Sick subtitles can infect your media player</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-715" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/05/R2-D2-Sad-Beeps-408x408-150x150.jpg" alt="Evil subtitles" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/05/R2-D2-Sad-Beeps-408x408-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2017/05/R2-D2-Sad-Beeps-408x408.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />Do you use a media player like VLC, Kodi, Popcorn Time or Strem.io? Perhaps you are using one of those &#8220;dodgy&#8221; Android boxes? If so you will want to update them to their latest version ASAP because it is possible that they might pick up subtitles that can compromise the machine that you are playing the media on.<span id="more-714"></span></p>
<p>According to <a href="https://www.theregister.co.uk/2003/10/18/kill_bill_trojan_fails/">this</a>, the concept of using malicious subtitle files to compromise a machine goes back to the early 2000&#8217;s. However that was not a very widespread phenomenon back in the day.</p>
<p>In this modern era, where every home probably has multiple media players, this could become a very serious problem, because you might not have the media player set to automatically update. In fact in some cases there is no automatic update facility available, only a message to suggest you update the software manually. This is the case with VLC and Kodi for Windows. As we say in our <a href="http://www.l2cybersecurity.com/use-automatic-updates/">First Commandment</a>, you should always keep your software up-to-date with patches and new versions.</p>
<p>You might ask what kind of impact could a malicious subtitle file really have. The researchers at Check Point posted their <a href="http://blog.checkpoint.com/2017/05/23/hacked-in-translation/">research</a> into this attack vector and the following is what they said could happen:</p>
<blockquote><p><em>By conducting attacks through subtitles, hackers can take complete control over any device running them. From this point on, the attacker can do whatever he wants with the victim’s machine, whether it is a PC, a smart TV, or a mobile device. The potential damage the attacker can inflict is endless, ranging anywhere from stealing sensitive information, installing ransomware, mass Denial of Service attacks, and much more.</em></p></blockquote>
<p>So, yes it is pretty serious alright. The researchers also discovered that it is possible to manipulate sites that host subtitles in order to make a malicious subtitle file more &#8220;popular&#8221; so the sick subtitles would be more likely to be chosen and loaded by the media player when the video is being played.</p>
<p>They have also provided a video to show, as a proof of concept, how easy it is to take control of the victim&#8217;s computer by way of malicious subtitles.</p>
<p><iframe loading="lazy" title="Hacking Demonstration | Popcorn Time Translation Malware Found" width="500" height="375" src="https://www.youtube.com/embed/vYT_EGty_6A?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>I realised after reading this story that I still have Kodi installed on my home PC, though I have not used it in a couple of years (as I use Plex to watch my media now). It was running version 14.1 whereas the current version is 17.3. So I&#8217;ve uninstalled it altogether now and also verified that my Plex installation is fully updated, as well as any installs of VLC. I gotta practice what I preach. <img decoding="async" src="https://www.facebook.com/images/emoji.php/v9/f61/1/28/1f64f.png" alt="?" /><img decoding="async" src="https://www.facebook.com/images/emoji.php/v9/f64/1/28/1f60e.png" alt="?" /></p>
<p>&nbsp;</p>
<p>The post <a href="https://www.l2cybersecurity.com/sick-subtitles-can-infect-media-player/">Sick subtitles can infect your media player</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Do you WannaCry? I didn&#8217;t think so.</title>
		<link>https://www.l2cybersecurity.com/wannacry-didnt-think-so/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 18 May 2017 12:30:18 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Best Practice]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Defence in Depth]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=660</guid>

					<description><![CDATA[<p>I delayed this week&#8217;s blog, just to let some of the dust settle on the whole WannaCry (also known as WCry or WannaCrypt) furore and see if we can learn anything from it that will help protect my readers going forward. I&#8217;ll start with some easy background on Ransomware and them explain what was special&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/wannacry-didnt-think-so/">Do you WannaCry? I didn&#8217;t think so.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="size-thumbnail wp-image-661 alignleft" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/05/WannaCry-150x150.png" alt="Do you WannaCry?" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/05/WannaCry-150x150.png 150w, https://www.l2cybersecurity.com/wp-content/uploads/2017/05/WannaCry.png 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />I delayed this week&#8217;s blog, just to let some of the dust settle on the whole WannaCry (also known as WCry or WannaCrypt) furore and see if we can learn anything from it that will help protect my readers going forward. I&#8217;ll start with some easy background on Ransomware and them explain what was special with WannaCry. Then we&#8217;ll get to protecting you.</p>
<p>This story is going to disappear from the news headlines fairly quickly, as there is nothing massively new or worrying coming out for the moment, so we&#8217;ll probably be back to normal by next week.</p>
<h2><span id="more-660"></span>What is Ransomware?</h2>
<p>Ransomware has been around for a good few years. Earlier versions were fairly rudimentary, as they only prevented the victim from using their PC and were easily mitigated. The term itself comes from the techie habit to combining words and in this case it is a combination of Ransom Software.</p>
<p>It normally spreads by e-mail attachment/link or a poisoned web page/online ad. If you open the attachment or click on a poisoned ad, a little piece of computer code executes, which downloads the actual  ransom software from the internet. This software then generates an extremely complicated &#8220;key&#8221;, which is used to scramble the data contained in your files (documents, spreadsheets, photos, videos, databases, etc.). It will carry out the scrambling on any drive that the PC running it can see (so hard drives, network drives, external drives, USB sticks, cloud drives, etc.).</p>
<p>A screen is popped up advising the victim about what has happened and provides instructions for how they can pay the ransom in order to get the &#8220;key&#8221; to unlock and recover their scrambled files. In some cases the &#8220;key&#8221; is stored on the evil doers servers, so if the victim does pay, they will be given the key and will be able to get their files back. There may even be a helpdesk telephone number which you can call to get assistance on how you can pay. This is usually because not everyone knows how to go through the cumbersome process of acquiring BitCoin &#8230; &#8220;Ah here! WTF is BitCoin?&#8221; I hear you cry! ? Basically BitCoin is a virtual currency, which is untraceable and that&#8217;s why the bad guys like it.</p>
<p>If the victim does get their files back, there is a good chance that the crooks will leave behind a &#8220;present&#8221;, which will wait a few weeks, then execute on it&#8217;s own and scramble the files again. The victim paid once, so there is a good chance they will do it again. However there is also a high probability that paying the ransom won&#8217;t mean you get your data back, as you might never get the key from the bad guys.</p>
<p>So that&#8217;s a very brief outline of what Ransomware is. In the last 2 years, it has become extremely prevalent. Over 50% of evil email contains some form of Ransomware.</p>
<h2>What was special about WannaCry?</h2>
<p><img loading="lazy" decoding="async" class="wp-image-662 size-medium alignright" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/05/WannaCrypt-300x225.jpg" alt="" width="300" height="225" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/05/WannaCrypt-300x225.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/05/WannaCrypt-768x577.jpg 768w, https://www.l2cybersecurity.com/wp-content/uploads/2017/05/WannaCrypt.jpg 900w" sizes="auto, (max-width: 300px) 100vw, 300px" /></p>
<p>What made WannaCry special was the fact that it spread all by itself. It did not require anybody to click on a link or open an attachment. This is what technical types call a &#8220;worm&#8221;. What it does is it finds a machine on the internet that has a specific vulnerability which it exploits and loads itself into that machine, scrambles the data and then looks for more machines to infect on the local network, as well as on the internet.</p>
<p>My most avid readers ? will remember back in a March <a href="http://www.l2cybersecurity.com/patch-tuesday-double/">post</a>, I discussed the Microsoft Patch Tuesday was a double month, because there had been none in February. Then in an April <a href="http://www.l2cybersecurity.com/hackers-released-nsa-hacking-tools/">post</a>, we found out why there was secrecy around the previous month&#8217;s patching. The US&#8217; National Security Agency (NSA) had their hacking toolkit released to the internet and Microsoft had spent February urgently patching vulnerabilities that the NSA toolkit exploited.</p>
<p>Which brings us neatly to WannaCry. The evil doers used one of the NSA tools to have their ransomware scan for machines that are vulnerable to a specific exploit and then infect any such machines it finds. Microsoft has issued the patch for this vulnerability in <a href="https://technet.microsoft.com/en-us/library/security/ms17-010.aspx">March</a> however it was only issued for the versions of Windows that they still support (Windows Vista, 7, 8.1 and 10 as well as a bunch of server operating systems). Anybody running a Windows XP or 8.0 machine would be vulnerable. The British NHS still has a lot of Windows XP machines and these were the ones that got all of the attention when thousands of them became infected causing surgeries, diagnostic procedures and clinics to be cancelled as a result. In fairness to Microsoft they did subsequently release the patch for the unsupported versions of Windows, which will prevent this attack vector being used in future.</p>
<p>It started circulating on Friday 12th May, and by Saturday it was very widespread, so much so that it grabbed a lot of media attention. This is where it get my first problem &#8211; advice from newspaper &#8220;Tech&#8221; journalists. I&#8217;ll possibly get stick for this, but most of them are nothing more than <em>shiny gadget reviewers</em>. They don&#8217;t actually truly understand the underlying technology and just parrot &#8220;don&#8217;t click links&#8221;, &#8220;patch your software&#8221;, etc. While that is good advice, I then see them giving inaccurate reportage like &#8220;this was spread by somebody clicking on a link&#8221;. No it wasn&#8217;t! That&#8217;s not how a worm works!!! ? &#8230; On a related matter, which I think is hilarious &#8230; the shiny gadget reviewer on Ireland AM on TV3 gave better advice than any &#8220;Tech&#8221; journalist I&#8217;ve read this week. ?</p>
<p>My second problem was advice from &#8220;Experts&#8221; from larger cyber security firms. In the last few days I&#8217;ve heard two such experts (from different unnamed companies) say the same thing as the &#8220;Tech&#8221; journalists, except they made it worse by saying &#8220;this worm was spread by somebody opening an attachment.&#8221; THAT IS NOT HOW A WORM WORKS FFS!!! ?</p>
<p>My third problem is with technology vendors that try to capitalise on the fear, uncertainty and doubt (FUD) that was present in businesses across the globe on Monday morning. Coming out with nonsense like, &#8220;Our Whizz-Bang product will fully protect you from WannaCry.&#8221; as Mrs. Brown is known to say &#8220;That&#8217;s nice.&#8221; See below for some simple steps on how you can protect yourself, that is available for free and for nothing.</p>
<p>There are a lot of small to medium-sized, independent security consultancy firms out there that have been giving excellent, accurate and timely advice. These are the ones you should be listening too. They are staffed by people who actually truly know what is happening. I&#8217;d like to think I&#8217;m also in that category as I don&#8217;t state something unless I know it to be a fact. If I don&#8217;t know something, I will say so and will go and educate myself.</p>
<p>The spread of WannaCry was stanched by a Cyber Security blogger in the UK (<a href="https://twitter.com/MalwareTechBlog">@MalwareTechBlog</a>) who discovered that if a certain internet domain name was registered and active, the worm would not carry out it&#8217;s scrambling and scanning function. This was a great help to the world, which has led the young man to be hounded by tabloid newspapers. There you go &#8211; no good deed goes unpunished. ?</p>
<p>There is one aspect about this, that I&#8217;ve only seen mentioned once. What if the culprits behind this didn&#8217;t use Ransomware as the payload? They used the NSA tools to scan the internet for the vulnerability that allowed them execute something on hundreds of thousands of PCs. They chose Ransomware, which kinda gets in your face when it has done it&#8217;s dirty deed. What if they chose keyloggers (software that logs all key presses &#8211; used for stealing passwords) or other surreptitious, stealthy, spying software? We might never have realised there was something afoot. ?</p>
<p>There&#8217;s talk that it was the North Korean&#8217;s what did it! Is that interesting? &#8230; Maybe. I would have thought they might have preferred the stealth route, but their leader might have had other ideas.</p>
<h2>How do I protect myself?</h2>
<p>This is the insanely easy bit, believe it or not. All you have to do is follow 4 of my 10 commandments:</p>
<ul>
<li><a href="http://www.l2cybersecurity.com/use-automatic-updates/">Commandment 1</a> Keep all software up-to-date with automatic patching/updating</li>
<li><a href="http://www.l2cybersecurity.com/use-anti-virus/">Commandment 2</a> Use and keep up-to-date Anti-Virus software</li>
<li><a href="http://www.l2cybersecurity.com/iv-thou-shalt-always-backup-thy-data/">Commandment 4</a> Take regular backups of all your data and test that you can restore.</li>
<li><a href="http://www.l2cybersecurity.com/v-cast-aside-e-mails-from-strangers/">Commandment 5</a> Ignore email from strangers and be careful of email from friends, family, co-workers.</li>
</ul>
<p>Do those few things and you shouldn&#8217;t have to pay any ransom to anybody, because if 1, 2 and 5 fail you (for whatever reason), then 4 will recover you. ?</p>
<p>Let&#8217;s be careful out there!</p>
<p>The post <a href="https://www.l2cybersecurity.com/wannacry-didnt-think-so/">Do you WannaCry? I didn&#8217;t think so.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Hackers released NSA hacking tools &#8230; World continues to turn ?.</title>
		<link>https://www.l2cybersecurity.com/hackers-released-nsa-hacking-tools/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Tue, 18 Apr 2017 15:32:38 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Hacking Tools]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=624</guid>

					<description><![CDATA[<p>You probably missed it &#8211; but don&#8217;t worry, I&#8217;m here to give you the simple low-down ?. The Cyber Security world was in meltdown for some of last weekend about the fact that a hacking group known as Shadow Brokers had released a load of NSA hacking tools to the internet and this meant everyone was&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/hackers-released-nsa-hacking-tools/">Hackers released NSA hacking tools &#8230; World continues to turn ?.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="size-full wp-image-625 alignleft" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/04/shadow-brokers-nsa-hacking.png" alt="NSA Hacking tools" width="300" height="300" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/04/shadow-brokers-nsa-hacking.png 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/04/shadow-brokers-nsa-hacking-150x150.png 150w" sizes="auto, (max-width: 300px) 100vw, 300px" />You probably missed it &#8211; but don&#8217;t worry, I&#8217;m here to give you the simple low-down ?. The Cyber Security world was in <a href="https://arstechnica.com/security/2017/04/nsa-leaking-shadow-brokers-just-dumped-its-most-damaging-release-yet/">meltdown</a> for some of last weekend about the fact that a hacking group known as Shadow Brokers had released a load of NSA hacking tools to the internet and this meant everyone was at risk from hackers breaking into their files and the sky was going to fall and leopards would lie down with the goat, etc. etc.  All pretty apocalyptic stuff ? (though, if you are a Windows XP/Server 2003 user it probably is the end times. ?)<span id="more-624"></span></p>
<p>Well for the most part<span style="color: #ff0000;"><strong>§</strong></span> it turned into &#8220;not much to see here, move along&#8221;. Yes, these NSA hacking tools were released to the internet for anybody with evil intentions to use them on the innocent. Yes, they are highly effective. Yes, they can let hackers break into your computer.</p>
<p>But you follow my <a href="http://www.l2cybersecurity.com/use-automatic-updates/">first commandment</a> don&#8217;t you? You keep your Windows (and other software) automatically updated, don&#8217;t you? If so, then you&#8217;ll be fine &#8230; nothing to see here, move along &#8230; these NSA hacking tools are nothing to concern yourself with.</p>
<p><span style="color: #ff0000;"><strong>§</strong></span>Now, this is where the earlier reference to &#8220;for the most part&#8221; gets some clarity. If you are running Windows XP, then you are at extreme risk of probably every tool that was released by Shadow Brokers. Microsoft patched the vulnerabilities in their supported operating systems (so Windows 7, 8.1 and 10) that all of the hacking tools exploited, except for three. The tools that were named &#8220;EnglishmanDentist”, “EsteemAudit”, and “ExplodingCan” are the only ones that Microsoft didn&#8217;t bother with as they only affected earlier versions of Windows which Microsoft no longer support (Windows XP or Server 2003 anyone?).</p>
<p>So if you are still an XP/2003 user, you&#8217;ve got a pile of evil-doers, with access to at least 12 hacking tools which the NSA created and they can come and compromise your PC/Laptop/Server! ? It&#8217;s that simple, you really need to move off XP/2003 for your own good. If you can&#8217;t upgrade, then get the XP/2003 thing off the internet so you can&#8217;t be compromised. ?</p>
<p>Some of you may recall back in <a href="http://www.l2cybersecurity.com/patch-tuesday-double/">March</a>, I talked about how Microsoft offered no patches in February and then here was a double lot in March. Microsoft were pretty tight lipped about why this happened and most of the speculation was around problems encountered with the way they were changing their method of delivering updates.</p>
<p>Welllllll &#8230; it would seem it was much more likely that is was to do with the NSA giving them a low-down on the vulnerabilities that they knew were about to be revealed and exploited by the bad guys and so Microsoft put the head down and got on with fixing these &#8220;secret&#8221; vulnerabilities. ?</p>
<p>There were also <a href="https://www.theregister.co.uk/2017/04/14/latest_shadow_brokers_data_dump/">some tools</a> released which enabled the NSA (the US National Security Agency) to monitor some service bureaus used by the SWIFT inter-bank payment network. This mainly targeted middle-east bureaus, but it&#8217;s possible this could be expanded. This is something for the SWIFT network to address and there is likely nothing you can do about this. ?</p>
<p>Let&#8217;s be careful out there!</p>
<p>The post <a href="https://www.l2cybersecurity.com/hackers-released-nsa-hacking-tools/">Hackers released NSA hacking tools &#8230; World continues to turn ?.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
