{"id":16510,"date":"2019-10-05T10:45:15","date_gmt":"2019-10-05T18:45:15","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/10\/05\/news-10250\/"},"modified":"2019-10-05T10:45:15","modified_gmt":"2019-10-05T18:45:15","slug":"news-10250","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/10\/05\/news-10250\/","title":{"rendered":"A Bug in Popular Android Phones Gives Hackers Full Control"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5d97e217ca17900008c49683\/master\/pass\/Security-Samsung-Galaxy-9-RN135B.jpg\"\/><\/p>\n<p><strong>Credit to Author: Brian Barrett| Date: Sat, 05 Oct 2019 13:00:00 +0000<\/strong><\/p>\n<p class=\"content-header__row content-header__dek\">FCC comment bots, a &quot;bulletproof&quot; hosting takedown, and more of the week&#39;s top security news.<\/p>\n<p>The theme of this week is by now a familiar one: &quot;Things keep getting worse.&quot; Starting with the security of countless so-called real time operating systems that all <a href=\"https:\/\/www.wired.com\/story\/urgent-11-ipnet-vulnerable-devices\/\">share some variation on the same decades-old code<\/a>. That makes them all vulnerable to the <a href=\"https:\/\/www.wired.com\/story\/vxworks-vulnerabilities-urgent11\/\">set of Urgent\/11 vulnerabilities<\/a> we had reported on just the other week. And as is so often the case with these sort of devices and ancient code, there&#x27;s really no good way to fix them. And that was just the start of the week.<\/p>\n<p>As a bookend, the attorney general <a href=\"https:\/\/www.wired.com\/story\/encryption-wars-facebook-messaging\/\">William Barr Friday sent a sternly worded letter to Facebook<\/a> encouraging them not to go forward with its plans for cross-platform end-to-end encryption, in the process reigniting the <a href=\"https:\/\/www.wired.com\/2016\/02\/apple-fbi-privacy-security\/\">decades-old encryption debate<\/a>. But while Barr had his counterparts from the UK and Australia backing up his push, it&#x27;s unclear what if any actual authority he would have to weaken encryption without laws on the books forcing it. (Also, it would be a truly terrible idea.)<\/p>\n<p>In slightly brighter social media news, we looked at how <a href=\"https:\/\/www.wired.com\/story\/adversarial-examples-machine-learning-privacy-social-media\/\">adversarial examples could help protect your Facebook data<\/a> from the next Cambridge Analytica. And we explained how the new Incognito Mode for Google Maps helps cover your tracks\u2014and more importantly, all the ways in which it doesn&#x27;t. Speaking of covering tracks, we took a look at how <a href=\"https:\/\/www.wired.com\/story\/whistle-blower-did-it-right\/\">the Ukraine whistle-blower did everything meticulously by the book<\/a>, and the potential dangers in the Trump administration&#x27;s repeated insistence that he or she did not. We also <a href=\"https:\/\/www.wired.com\/story\/former-whistle-blowers-trump-ukraine-complaint\/\">talked to two past whistle-blowers<\/a> for some perspective on what the current one must be going through. The consensus: his or her life will be forever changed.<\/p>\n<p>The Trump campaign, meanwhile, <a href=\"https:\/\/www.wired.com\/story\/iran-hackers-target-us-presidential-candidate\/\">appears to have been the target of Iranian hackers<\/a>, although Microsoft says the phishing attempts it spotted were unsuccessful. Lastly, if you&#x27;re thinking about <a href=\"https:\/\/www.wired.com\/story\/horrifying-way-to-get-google-apps-huawei-phones\/\">sideloading Google apps onto a Huawei device<\/a>&#8230; don&#x27;t! You&#x27;re welcome.<\/p>\n<p>And there&#x27;s more! Every Saturday we round up the security and privacy stories that we didn\u2019t break or report on in-depth but which we think you should know about nonetheless. Click on the headlines to read them, and stay safe out there.<\/p>\n<p>The <a href=\"https:\/\/www.wired.com\/2014\/07\/google-project-zero\/\">bug boffins at Google&#x27;s Project Zero<\/a> have identified a vulnerability in popular Android handsets like the Google Pixel 2, Samsung Galaxy S9, and Moto Z3. Not only that, but the researchers have spotted evidence that hackers are exploiting that bug in the wild. This isn&#x27;t quite as dire as, say, the <a href=\"https:\/\/www.wired.com\/story\/ios-attack-watering-hole-project-zero\/\">recent revelations about widespread iOS hacking<\/a>. For one thing, the affected devices are mostly older, although in many cases still widely in use. And for the attack to work, it needs either to be paired with a second Chrome browser exploit, or victim needs to download a malicious app. Still, the potential consequences are devastating, especially given that it&#x27;s actively in use: a full compromise of the device, meaning access to any of its data and more. Google says it plans to patch the vulnerability in its October security update.<\/p>\n<p>In the heated, <a href=\"https:\/\/www.wired.com\/story\/guide-net-neutrality\/\">high stakes debate over net neutrality<\/a>, the FCC comment period became a prime battleground. Unfortunately, as was <a href=\"https:\/\/www.wired.com\/story\/bots-broke-fcc-public-comment-system\/\">widely reported at the time<\/a>, that process was also <a href=\"https:\/\/www.wired.com\/story\/bots-form-letters-humans-fcc-net-neutrality-comments\/\">overwhelmed by bots<\/a>. A <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.buzzfeednews.com\/article\/jsvine\/net-neutrality-fcc-fake-comments-impersonation&quot;}\" href=\"https:\/\/www.buzzfeednews.com\/article\/jsvine\/net-neutrality-fcc-fake-comments-impersonation\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">Buzzfeed News investigation<\/a> shows how two small firms appear to have been behind the bulk of the misrepresentation.<\/p>\n<p>Security experts broadly agree that voting by app is not a great idea, electoral-integrity-wise. Still, <a href=\"https:\/\/www.wired.com\/story\/smartphone-voting-is-happening-west-virginia\/\">an app called Voatz<\/a> entered that particular thunderdome in West Virginia last fall, allowing members of the military from that state serving abroad to cast their ballots with their smartphones. Now, CNN reports that the FBI is investigating an apparent attempt to hack into Voatz\u2014although it may have been as <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.cnn.com\/2019\/10\/04\/politics\/fbi-voting-app-hack-investigation\/index.html&quot;}\" href=\"https:\/\/www.cnn.com\/2019\/10\/04\/politics\/fbi-voting-app-hack-investigation\/index.html\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">innocuous as a University of Michigan student experiment<\/a>. Either way, it&#x27;s a nice reminder of why everyone&#x27;s so uncomfortable with this whole digital voting idea in the first place.<\/p>\n<p>German authorities raided and shut down a &quot;bulletproof&quot; Dark Web hosting operating comprising hundreds of servers housed in an former NATO bunker in late September. Seven were arrested in connection with hosting the sites\u2014which included \u201cCannabis Road,\u201d \u201cWall Street Market,\u201d and \u201cOrange Chemicals\u201d\u2014including the 59-year-old Dutchman alleged to be the operation&#x27;s ringleader.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/android-smartphone-hacking-fcc-bots-voatz-security-news\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5d97e217ca17900008c49683\/master\/pass\/Security-Samsung-Galaxy-9-RN135B.jpg\"\/><\/p>\n<p><strong>Credit to Author: Brian Barrett| Date: Sat, 05 Oct 2019 13:00:00 +0000<\/strong><\/p>\n<p>FCC comment bots, a &#8220;bulletproof&#8221; hosting takedown, and more of the week&#8217;s top security news.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21357],"class_list":["post-16510","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-security-news"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16510","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16510"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16510\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16510"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16510"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16510"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}