{"id":6594,"date":"2017-02-11T05:45:05","date_gmt":"2017-02-11T13:45:05","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/02\/11\/news-413\/"},"modified":"2017-02-11T05:45:05","modified_gmt":"2017-02-11T13:45:05","slug":"news-413","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/02\/11\/news-413\/","title":{"rendered":"Security News This Week: At Least 76 iOS Apps Are Vulnerable to Attacks"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.wired.com\/wp-content\/uploads\/2017\/02\/Vulnerable-Apps-649986673-2x1-660x330.jpg\"\/><\/p>\n<article class='content link-underline relative body-copy' data-js='content' itemprop=\"articleBody\">\n<p>There&#8217;s a lot going on in the world, but the slow march of cybersecurity research and incidents plods on no matter what else is happening. This week research showed that <a href=\"https:\/\/www.wired.com\/2017\/02\/beware-mobile-vpns-arent-safe-seem\/\" target=\"_blank\">many mobile VPNs fall short<\/a> on delivering security and privacy benefits. International law may be the best mechanism for addressing <a href=\"https:\/\/www.wired.com\/2017\/02\/want-keep-hackers-gadgets-try-international-law\/\" target=\"_blank\">large-scale ransomware attacks<\/a> on Internet of Things devices (like hotel door locks). Attacks using a <a href=\"https:\/\/www.wired.com\/2017\/02\/say-hello-super-stealthy-malware-thats-going-mainstream\/\" target=\"_blank\">stealthy type of &#8220;fileless&#8221; malware<\/a> that hides in computer RAM are on the rise. And it&#8217;s time to get real about strategies for keeping <a href=\"https:\/\/www.wired.com\/2017\/02\/smart-tv-spying-vizio-settlement\/\" target=\"_blank\">smart TV manufacturers from spying<\/a>.<\/p>\n<p>In the political sphere, the Email Privacy Act, which would reform dated and problematic aspects of the Electronic Communications Privacy Act, <a href=\"https:\/\/www.wired.com\/2017\/02\/trump-power-email-privacy-act-never-urgent\/\" target=\"_blank\">took a step in Congress<\/a> toward becoming law. Trump&#8217;s Homeland Security Advisor <a href=\"https:\/\/www.wired.com\/2017\/02\/tom-bossert-trump-cybersecurity\/\" target=\"_blank\">Tom Bossert seems promising<\/a>&#8212;he&#8217;s known as an effective and even-keeled dude. And <a href=\"https:\/\/www.wired.com\/2017\/02\/despite-trump-silicon-valleys-pentagon-ties-stay-strong\/\" target=\"_blank\">links between Silicon Valley and the Pentagon<\/a> remain strong in spite of recent political turmoil in the US. Oh, and there&#8217;s no easy fix for a <a href=\"https:\/\/www.wired.com\/2017\/02\/russians-engineer-brilliant-slot-machine-cheat-casinos-no-fix\/\" target=\"_blank\">clever and effective slot machine cheat<\/a> developed by Russian criminals that has been plaguing casinos around the world for years. So have fun with that one.<\/p>\n<p>But wait! There\u2019s more. Each Saturday we round up the news stories that we didn\u2019t break or cover in depth but that still deserve your attention. As always, click on the headlines to read the full story in each link posted. And stay safe out there.<\/p>\n<h3><a href=\"https:\/\/medium.com\/@chronic_9612\/76-popular-apps-confirmed-vulnerable-to-silent-interception-of-tls-protected-data-2c9a2409dd1#.jryr4vjnn\" target=\"_blank\">Dozens of iOS Apps Are Vulnerable to Man-in-the-Middle Data Attacks<\/a><\/h3>\n<p>Seventy-six iOS apps are vulnerable to man-in-the-middle data interception attacks, thanks to sloppy configuration that could allow a forged certificate to be authenticated and decrypt data protected by the Transport Layer Security (TLS) protocol, thus exposing it. Will Strafach, CEO of mobile security company Sudo Security Group, found the compromised apps while the company was developing its mobile app analysis product. Problems with TLS validation have been around for a long time, and they&#8217;re particularly problematic for apps that handle sensitive data like health or financial information. Nineteen of the 76 apps Strafach found handle this type of &#8220;high risk&#8221; data. Apple has advocated that iOS developers use its App Transport Security protocol to ensure that every iOS app implements TLS, but ATS alone still doesn&#8217;t resolve certificate verification issues. Apple also <a href=\"https:\/\/developer.apple.com\/news\/?id=12212016b\" target=\"_blank\">indefinitely pushed back the deadline<\/a> to implement ATS&#8212;the cutoff was originally supposed to be the end of 2016. Strafach says that hundreds of other apps he analyzed seemed to have the same flaw, but he only pursued analysis of those that he could confirm were jeopardized.<\/p>\n<\/h3>\n<p><a href=\"https:\/\/krebsonsecurity.com\/2017\/02\/fast-food-chain-arbys-acknowledges-breach\/\" target=\"_blank\">Arby\u2019s Breach Affected Payment Systems at Hundreds of Corporate Locations<\/a><\/h3>\n<p>Arby&#8217;s has been working to address a breach of customer credit and debit card information since it learned of the situation in mid-January. Malware on payment systems at hundreds of restaurant locations around the US captured hundreds of thousands of card numbers throughout the fall. Arby&#8217;s says that only a portion of its 1,000 corporate-owned locations were impacted, and that franchise locations were not affected. It says that the malware has been eradicated from its networks. Arby\u2019s Restaurant Group &#8220;immediately notified law enforcement and enlisted the expertise of leading security experts, including Mandiant,&#8221; the company told Krebs on Security. The investigation is ongoing.<\/p>\n<h3><a href=\"https:\/\/www.axios.com\/confide-the-new-app-for-paranoid-republicans-2246297664.html\" target=\"_blank\">Republican Officials Found an Encrypted Chat App to Prevent Breaches<\/a><\/h3>\n<p>Members of the Trump administration and other republicans have been using a secure messaging app called &#8220;Confide&#8221; to communicate with lower risk of leaks, according to an Axios report. Confide uses end-to-end encryption, with the bonus twist that messages self-destruct after being read. The service also integrates with iMessage, so it&#8217;s easy to use. Official government electronic communications are legally required to be accessible and archivable for transparency, so depending on who is using these apps and for what, they could be <em>too<\/em> secure. But the trend may simply reflect broader adoption of end-to-end encrypted apps like WhatsApp and Signal, and may not be part of official government interactions.<\/p>\n<h3><a href=\"http:\/\/www.politico.com\/story\/2017\/02\/google-hackers-russia-journalists-234859\" target=\"_blank\">State-Sponsored Hackers Set Their Sights on Accounts of Prominent US Journalists<\/a><\/h3>\n<p>Google has notified some well-known US journalists that state-sponsored attackers have been trying to steal their Google account passwords and access their Gmail. Jonathan Chait of New York Magazine, David Sanger of the New York Times, Brian Stelter of CNN, Julia Ioffe of the Atlantic and others told Politico that they had received the <a href=\"https:\/\/twitter.com\/juliaioffe\/status\/825070028311638017\" target=\"_blank\">Google warnings<\/a>. A Google spokesperson said in a statement that, \u201cSince 2012, we\u2019ve notified users when we believe their Google accounts are being targeted by government-backed attackers. We send these warnings out of an abundance of caution&#8212;they do not indicate that a user\u2019s account has already been compromised or that a more widespread attack is occurring when they receive the notice.\u201d Stay safe out there, journos! <\/p>\n<p><a href=\"https:\/\/www.wired.com\/2017\/02\/security-news-week-least-76-ios-apps-vulnerable-attacks\/\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"rss_thumbnail\"><img decoding=\"async\" src=\"https:\/\/www.wired.com\/wp-content\/uploads\/2017\/02\/Vulnerable-Apps-649986673-2x1-660x330.jpg\" alt=\"Security News This Week: At Least 76 iOS Apps Are Vulnerable to Attacks\" \/><\/div>\n<p>Each weekend we round up the news stories that we didn&#8217;t break or cover in depth but that still deserve your attention. The post <a href=\"https:\/\/www.wired.com\/2017\/02\/security-news-week-least-76-ios-apps-vulnerable-attacks\/\">Security News This Week: At Least 76 iOS Apps Are Vulnerable to Attacks<\/a> appeared first on <a href=\"https:\/\/www.wired.com\">WIRED<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[11306,11307,11308,1670,11093,714,11309],"class_list":["post-6594","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-arbys","tag-end-to-end-encryption","tag-gmail","tag-google","tag-secure-communication","tag-security","tag-tls"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6594","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=6594"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6594\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=6594"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=6594"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=6594"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}