{"id":16698,"date":"2019-10-26T10:45:20","date_gmt":"2019-10-26T18:45:20","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/10\/26\/news-10437\/"},"modified":"2019-10-26T10:45:20","modified_gmt":"2019-10-26T18:45:20","slug":"news-10437","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/10\/26\/news-10437\/","title":{"rendered":"Rudy Giuliani Butt-Dialed a Reporter (Twice!)"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5db36d510da2b80009c7fb48\/master\/pass\/Security_rudy..._-1155546169.jpg\"\/><\/p>\n<p><strong>Credit to Author: Brian Barrett| Date: Sat, 26 Oct 2019 13:31:02 +0000<\/strong><\/p>\n<p class=\"content-header__row content-header__dek\">A UN phishing attack, Adobe accounts exposed, and more of the week&#39;s top security news.<\/p>\n<p>This week, <a href=\"https:\/\/www.wired.com\/story\/republicans-storm-scif-national-security-nightmare\/\">Republicans stormed a sensitive compartmented information facility<\/a> in a show of\u2026 something? Unclear. But they definitely created a national security issue by bringing their smartphones along with them and refusing to give them up. So, yes, that was the low point. But there were also highs!<\/p>\n<p>Microsoft has a new plan to protect firmware in Windows PCs from hacks, called \u201csecured-core PCs.\u201d A county in Georgia had a plan to <a href=\"https:\/\/www.wired.com\/story\/flock-safety-license-plate-readers-crime\/\">use license plate detectors to reduce crime<\/a>, but experts aren\u2019t convinced it worked as advertised. And <a href=\"https:\/\/www.wired.com\/story\/russian-hackers-false-flags-iran-fancy-bear\/\">Russians have rapidly evolved their plans to execute so-called false flag hacks<\/a>, making their attacks look like another sophisticated adversary pulled them off. Fancy Bear! They\u2019re they mask-wearing <em>Scooby-Doo<\/em> villain of cyberwar.<\/p>\n<p>Elsewhere, we took a look at why <a href=\"https:\/\/www.wired.com\/story\/keybase-two-factor-authentication\/\">two-factor authentication isn\u2019t always the answer<\/a>\u2014even though it\u2019s <a href=\"https:\/\/www.wired.com\/story\/two-factor-authentication-apps-authy-google-authenticator\">still essential in certain situations<\/a>. We talked you through <a href=\"https:\/\/www.wired.com\/story\/facebook-instagram-twitter-posts-private\/\">making your social media posts private<\/a> when you want them to be. And we detailed how <a href=\"https:\/\/www.wired.com\/story\/apple-app-store-malware-click-fraud\/\">a fleet of click fraud apps snuck past Apple\u2019s vaunted App Store defenses<\/a>.<\/p>\n<p>We also explored <a href=\"https:\/\/www.wired.com\/story\/hong-kong-protests-digital-technology\/\">technology\u2019s role in the ongoing Hong Kong protests<\/a>\u2014on both sides\u2014and ran through some <a href=\"https:\/\/www.wired.com\/story\/time-to-outsource-your-passwords-app\/\">quality password manager options<\/a>.<\/p>\n<p>Lastly, set aside some time this weekend to read this <a href=\"https:\/\/www.wired.com\/story\/pompeo-was-riding-highuntil-the-ukraine-mess-exploded\/\">in-depth profile of secretary of state Mike Pompeo<\/a>, who finds himself at\u2014or at least near\u2014the center of the increasingly alarming Ukraine investigation. It\u2019s a doozy.<\/p>\n<p>And there&#x27;s more! Every Saturday we round up the security and privacy stories that we didn\u2019t break or report on in-depth but which we think you should know about nonetheless. Click on the headlines to read them, and stay safe out there.<\/p>\n<p>Please <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.nbcnews.com\/politics\/politics-news\/rudy-giuliani-butt-dials-nbc-reporter-heard-discussing-need-cash-n1071901&quot;}\" href=\"https:\/\/www.nbcnews.com\/politics\/politics-news\/rudy-giuliani-butt-dials-nbc-reporter-heard-discussing-need-cash-n1071901\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">go read this NBC News story<\/a>. Truly, you won&#x27;t regret it. Because it relates the tale of how Rudy Giuliani\u2014lawyer to an embattled president, unlikely proprietor of a cybersecurity <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;http:\/\/www.giulianisecurity.com\/&quot;}\" href=\"http:\/\/www.giulianisecurity.com\/\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">firm<\/a>\u2014managed to butt-dial NBC News reporter Rich Shapiro not once, but twice in the last several weeks. The substance of the three-minute voicemails Giuliani inadvertently left seems inconclusive, although the most recent does include Giuliani&#x27;s extremely relatable lament that &quot;the problem is we need some money.&quot; And sure butt-dialing is a universal experience. But for someone in the middle of, let&#x27;s conservatively say, several legally dubious narratives to take so little care with his outgoing communications is quite something! Especially given that this seems to be at least a semi-regular occurrence:<\/p>\n<p><a href=\"https:\/\/twitter.com\/jdawsey1\/status\/1187814073175564289\">https:\/\/twitter.com\/jdawsey1\/status\/1187814073175564289<\/a><\/p>\n<p>Giuliani may be as divisive a character as exists in American politics today, but in the annals of butt-dialing, mark him down as a legend.<\/p>\n<p>The latest entrant in the never-ending parade of exposed data appears to be Adobe Creative Cloud. A security researcher discovered 7.5 million records sitting in an Elastisearch database that was easily accessible online. Adobe reportedly secured the database the same day it was discovered, October 19. No payment information leaked out, and there&#x27;s no indication that it had been compromised by bad actors. But it still included details like email accounts, what Adobe products in use, member IDs, and when the account was created.<\/p>\n<p>Speaking of scourges, a phishing campaign has hit the Red Cross, UNICEF, the UN, and more. It&#x27;s unclear who&#x27;s behind the attack, but its goal appears to be breaking into Microsoft and Okta accounts. The scam set up a series of convincing fake websites, and would capture username and password data as entered in real-time. It&#x27;s not unusual that these groups would be targeted, but the sophistication of the campaign is both impressive and worrying.<\/p>\n<p>Dimitrios Vastakis was the branch chief of White House computer network defense until he resigned earlier this month. And when he did, Axios reports, he left behind a resignation letter that called out just how irresponsible the White House&#x27;s attitude toward cybersecurity has become. Experienced cybersecurity professionals are being forced out, the letter says, which ultimately makes White House cybersecurity less safe. That&#x27;s especially concerning given the <a href=\"https:\/\/www.wired.com\/2017\/02\/trump-north-korea-scif\/\">apparent lack of care given by President Donald Trump<\/a> in the first place, and the <a href=\"https:\/\/www.wired.com\/story\/white-house-cybersecurity-coordinator\/\">prior elimination of important strategic cybersecurity roles<\/a>. In other words, don&#x27;t be surprised if a big White House hack happens\u2014or if it already has.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/rudy-giuliani-butt-dial-adobe-leak-un-phishing\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5db36d510da2b80009c7fb48\/master\/pass\/Security_rudy..._-1155546169.jpg\"\/><\/p>\n<p><strong>Credit to Author: Brian Barrett| Date: Sat, 26 Oct 2019 13:31:02 +0000<\/strong><\/p>\n<p>A UN phishing attack, Adobe accounts exposed, and more of the week&#8217;s top security news.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21357],"class_list":["post-16698","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-security-news"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16698","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16698"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16698\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16698"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16698"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16698"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}