{"id":13198,"date":"2018-08-25T10:45:22","date_gmt":"2018-08-25T18:45:22","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2018\/08\/25\/news-6965\/"},"modified":"2018-08-25T10:45:22","modified_gmt":"2018-08-25T18:45:22","slug":"news-6965","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/08\/25\/news-6965\/","title":{"rendered":"Reality Winner, Insider Trading, and More Security News This Week"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5b8086a63dca62083fbf4860\/master\/pass\/FacebookCreepyApp-831882106.jpg\"\/><\/p>\n<p><strong>Credit to Author: Emily Dreyfuss| Date: Sat, 25 Aug 2018 14:40:21 +0000<\/strong><\/p>\n<p><span class=\"lede\">The biggest news <\/span>in America this week struck like two timed missiles minutes apart on Tuesday afternoon. Though they appear at first blush unrelated to Russia\u2019s hacking of the 2016 US election, they are likely to explode right in the heart of Robert Mueller\u2019s investigation. First. Trump\u2019s former lawyer Michael Cohen pleaded guilty to two felonies\u2013implicating the president in both crimes in court\u2013and then Trump\u2019s <a href=\"https:\/\/www.wired.com\/story\/how-to-interpret-robert-muellers-new-charges\/\">former campaign chairman Paul Manafort<\/a> was found guilty of eight criminal charges. <a href=\"https:\/\/www.wired.com\/story\/robert-mueller-vietnam\/\">Robert Mueller expert Garrett Graff<\/a> explains what this means for the Russia investigation, and spells out the <a href=\"https:\/\/www.wired.com\/story\/manafort-cohen-guilty-trump-mueller-investigation\/\">six biggest questions<\/a> now facing the administration, Congress, and the American people.<\/p>\n<p>WIRED\u2019s <a href=\"https:\/\/www.wired.com\/story\/notpetya-cyberattack-ukraine-russia-code-crashed-the-world\/\">latest cover story<\/a> details the most devastating cyberattack in history. Andy Greenberg spent the better part of a year getting the full story of the NotPetya code, which took down the world\u2019s cyber infrastructure in 2017. Greenberg reveals previously untold details about the devastation NotPetya caused, particularly at shipping giant Maersk, in breathtaking detail.<\/p>\n<p class=\"paywall\">Of course there was more news in the security world. The Democratic National Committee thought a <a href=\"https:\/\/www.wired.com\/story\/dnc-phishing-test-votebuilder\/\">phishing test<\/a> was a real attack. Researchers <a href=\"https:\/\/www.wired.com\/story\/monitor-ultrasonic-sounds-reveal-content-side-channel\/\">discovered the ultrasonic sound<\/a> monitors make can reveal what\u2019s on your screen. We <a href=\"https:\/\/www.wired.com\/story\/sim-swap-attack-defend-phone\/\">explained how to protect yourself<\/a> from a SIM swap attack. Facebook and Twitter <a href=\"https:\/\/www.wired.com\/story\/facebook-twitter-eye-iran-fake-account-crackdown\/\">thwarted suspicious activity<\/a> coming from Iran, and Microsoft <a href=\"https:\/\/www.wired.com\/story\/microsoft-russia-fancy-bear-hackers-sinkhole-phishing\/\">seized six domains<\/a> owned by Russian hacking group Fancy Bear\u2014both of which were attempting to influence the midterm elections. With tech companies seemingly on the front lines of defending democracy from foreign aggressors, <a href=\"https:\/\/www.wired.com\/story\/microsoft-facebook-tech-giants-defending-democracy\/\">we wonder<\/a>, why isn\u2019t the government doing more? Should it really be up to Silicon Valley to defend US democracy?<\/p>\n<p class=\"paywall\">Plus, there&#x27;s more. As always, we\u2019ve rounded up all the news we didn\u2019t break or cover in depth this week. Click on the headlines to read the full stories. And stay safe out there.<\/p>\n<p class=\"paywall\">Apple\u2019s been a quest this summer to force all apps in its App Store to conform to stricter privacy rules. Unsurprisingly, Facebook\u2019s so-called security app Onavo failed and was subsequently booted. Onavo is a virtual private network app that lets you access the internet on your phone through a private Facebook server. While that makes it harder for third parties or hackers to spy on your phone activity, it gives Facebook full access to it. Not ideal. And while Facebook removed Onavo from the App Store, if you downloaded it already\u2014or if you have it on Android\u2014it&#x27;s still there, logging all your data. You need to delete the app manually. And if you\u2019re still not convinced it\u2019s a bad idea to let Facebook spy on all your phone activity even when it has nothing to do with the social media site, we wrote you this <a href=\"https:\/\/www.wired.com\/story\/facebook-onavo-protect-vpn-privacy\/\">explainer about all Onavo\u2019s problems a few months<\/a>. Read it, then get deleting.<\/p>\n<p class=\"paywall\">This story is bananas. In possibly the biggest security fraud case in US history, according to law enforcement, stock traders on Wall Street were paying hackers to break into business newswire websites to steal embargoed press releases that would allow the traders to make preemptive stock buys. The Verge this week traced the whole scheme back to three Russian hackers, who were embroiled in a turf war over access to the press release sites. The story is a classic saga of greed, but with a modern twist: with the internet, insider trading becomes a whole new thing. As reporter Isobel Koshiw writes, \u201cTraders no longer need someone inside a company to obtain inside information. Instead, they can turn to hackers, who can take their pick of security weaknesses.\u201d<\/p>\n<p class=\"paywall\">Australia has a lot going for it: weird animals, lots of sun, and great accents. But apparently internet security isn\u2019t a strong suit. At least, not in Western Australia, where a recent security audit of government agencies found that more than a quarter of government officials had seriously weak passwords. Five thousand of them has the word \u201cpassword\u201d in their password. Luckily, this was revealed by a government-ordered audit, so there\u2019s time for these officials to process the shame of their poor passwords and come up with something stronger. If they need some tips, they can <a href=\"https:\/\/www.wired.com\/story\/7-steps-to-password-perfection\/\">start here<\/a>.<\/p>\n<p class=\"paywall\">Only three days after Washington\u2019s Dulles Airport switched on its new biometric facial recognition tech, the system caught an imposter trying to enter the US from Brazil on a fake passport. This is the first time this implementation has caught an identity scammer, according to authorities. They said it was likely human passport agents would have allowed the man to enter because he looked much like the picture on the passport. The facial recognition system, however, flagged him. Authorities later found the man\u2019s real ID hidden in his shoe, arrested him, and sent back to Brazil.<\/p>\n<p class=\"paywall\">On Thursday, a US District Court Judge in Georgia sentenced former NSA contractor Reality Winner to 63 months in prison for violating the Federal Espionage Act. Winner had pled guilty earlier this summer to leaking a confidential NSA report on Russian election hacking to the website The Intercept. The Intercept faced criticism after it <a href=\"https:\/\/theintercept.com\/2017\/06\/05\/top-secret-nsa-report-details-russian-hacking-effort-days-before-2016-election\/\" target=\"_blank\">published an article<\/a> based on Winner\u2019s leak, because in the process of reporting it inadvertently clued officials into Winner&#x27;s identity based on printer marks on the leaked document.<\/p>\n<p class=\"paywall\">If you have no idea what Struts 2 is, you should stop reading, go outside, and enjoy your weekend, hopeful that the people who do know keep reading and update theirs immediately. Threat Post reports that the Apache Software Foundation found a vulnerability in open-source developer framework Struts 2, used for coding in Java, that could be more dangerous than a similar vulnerability that led to the massive Equifax breach last year. \u201cThe vulnerability is caused by insufficient validation of untrusted user data in the core of the Struts framework,\u201d Threat Post reports. Apache is urging all developers to update. If you use Struts 2.3, update to 2.3.35. If you use 2.5, update to 2.5.17. Got that? Great. Thanks for updating and keeping us all safe!<\/p>\n<p class=\"related-cne-video-component__dek\">It seems like every time you turn around there&#39;s a new breach of personal information. Follow these steps to minimize the damage.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/delete-onavo-facebook-vpn-app-security-roundup\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5b8086a63dca62083fbf4860\/master\/pass\/FacebookCreepyApp-831882106.jpg\"\/><\/p>\n<p><strong>Credit to Author: Emily Dreyfuss| Date: Sat, 25 Aug 2018 14:40:21 +0000<\/strong><\/p>\n<p>In security news this week, Apple and Facebook beef, Reality Winner gets sentenced, facial recognition at the airport, and more.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714],"class_list":["post-13198","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13198","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13198"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13198\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13198"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13198"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13198"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}