{"id":15191,"date":"2019-04-27T10:45:05","date_gmt":"2019-04-27T18:45:05","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/04\/27\/news-8940\/"},"modified":"2019-04-27T10:45:05","modified_gmt":"2019-04-27T18:45:05","slug":"news-8940","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2019\/04\/27\/news-8940\/","title":{"rendered":"Hackers Found a Freaky New Way to Kill Your Car"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5cc3664f4ef5ad318eea382e\/master\/pass\/Car-hack-1144980326.jpg\"\/><\/p>\n<p><strong>Credit to Author: Emily Dreyfuss| Date: Sat, 27 Apr 2019 13:00:00 +0000<\/strong><\/p>\n<p><span class=\"lede\">The week in <\/span>security news began much as you\u2019d expect: still trying to make sense of the redacted Mueller report, which was released to congress late last week. <a href=\"https:\/\/www.wired.com\/author\/garrett-m-graff\/\">Garrett M. Graff\u2019s takeaways<\/a>? The report makes clear that Trump was worse than a \u201c<a href=\"https:\/\/www.wired.com\/story\/mueller-report-donald-trump-useful-idiot\/\">useful idiot<\/a>,\u201d along with <a href=\"https:\/\/www.wired.com\/story\/mueller-report-donald-trump-takeaways\/\">14 other insights<\/a> you may have missed.<\/p>\n<p>After a horrific string of bombings left more than 300 people dead in Sri Lanka over the weekend, the government there blocked US tech platforms in order to quell the spread of misinformation. <a href=\"https:\/\/www.wired.com\/story\/sri-lanka-bombings-social-media-shutdown\/\">Civil rights experts warned<\/a> that despite the harmful role social media has played in spreading violence and propaganda, this was the wrong move.<\/p>\n<p class=\"paywall\">Things quickly swerved away from the geopolitical and toward the familiar domain of terrifying hacks, including two that almost sound like hackers are actually reading minds (they&#x27;re not). First, a blockchain bandit is <a href=\"https:\/\/www.wired.com\/story\/blockchain-bandit-ethereum-weak-private-keys\/\">guessing people\u2019s private keys<\/a> and making off with the funds; and next, hackers <a href=\"https:\/\/www.wired.com\/story\/netflix-interactive-bandersnatch-hackers-choices\/\">can tell exactly<\/a> which Netflix <em>Bandersnatch<\/em> choices you make. Hackers have also <a href=\"https:\/\/www.wired.com\/story\/supply-chain-hackers-videogames-asus-ccleaner\/\">sneaked malware into videogames<\/a> via their supply chain, which ain\u2019t good. But GoDaddy took down <a href=\"https:\/\/www.wired.com\/story\/godaddy-spam-takedown-subdomains-snake-oil\/\">15,000 spammy domains<\/a>, which <em>is<\/em> good. And in even better news, there\u2019s a pretty good fix for the ever-escalating SIM card swap attack\u2014but <a href=\"https:\/\/www.wired.com\/story\/sim-swap-fix-carriers-banks\/\">why isn\u2019t the US using it?<\/a><\/p>\n<p class=\"paywall\">If you haven\u2019t already, do yourself a favor this weekend and read the <a href=\"https:\/\/www.wired.com\/story\/dark-web-bitcoin-murder-cottage-grove\/\">jaw-dropping tale<\/a> of bitcoins and murder.<\/p>\n<p class=\"paywall\">But that\u2019s not all! Every Saturday we round up security news we didn\u2019t break or report on in depth. As usual, click on the headlines to read the full articles. And be safe out there.<\/p>\n<p class=\"paywall\">Motherboard reports that a hacker going by the name L&amp;M claims to have hacked into 7,000 iTrack and 20,000 ProTrack accounts\u2014GPS tracking tools\u2014and from there gained access to some vehicles internal systems. The hacker says he could turn off cars&#x27; engines as they drove under 12 miles an hour or were stopped. On all the vehicles, he was able to track the cars as they drove. He got in by realizing that all users of those apps had been given the same default password. After bruteforcing millions of usernames, he was in. Motherboard confirmed the breach with four people whose information L&amp;M listed in a sample of the breached data he shared with the website. L&amp;M says he did this to show the companies how compromised their security was, and that he has never remotely turned off a car engine. So I guess that\u2019s some comfort?<\/p>\n<p class=\"paywall\">A new report suggests yet another reason to worry about filling your home with internet of things devices that listen, watch, and wait to get hacked: their peer-to-peer technology isn\u2019t always secure. According to security journalist Brian Krebs, the iLnkP2P software made by Shenzhen Yunni Technology is inside millions of different IoT devices, like doorbells, cameras, and baby monitors. It\u2019s got a weakness that security researcher <a href=\"https:\/\/www.twitter.com\/PaulMarrapese\" target=\"_blank\">Paul Marrapese<\/a> found and shared with Krebs. The software is supposed to make it easier for people to log in remotely to their IoT devices using just a barcode to log in. Marrapese found that the software offers no encryption or authentication, and makes it very easy for hackers to connect directly with these devices. He told Krebs he found more than 2 million devices vulnerable to this kind of attack. He suggests people can protect themselves by setting up a firewall that blocks traffic to the peer-to-peer port, but Krebs has an easier suggestion: \u201cAvoid purchasing or using IoT devices that advertise any P2P capabilities.\u201d<\/p>\n<p class=\"paywall\">Despite backlash from privacy advocates across the world, the EU this week voted to do the damned thing. That thing being to merge a bunch of different biometric tracking databases for immigration, crime, and and border patrol into a single shared database that border and law enforcement agents can use to access biometric information for people. Once assembled, the database will be one of the biggest \u201cpeople-tracking databases in the world,\u201d according to ZDNet, containing the records of more than 350 million people. Those records will include both biometrics such as fingerprints and facial scans as well as identification information like passport numbers, names and dates of birth.<\/p>\n<p class=\"related-cne-video-component__dek\">Hacker and security researcher Samy Kamkar takes a look at a variety of hacking scenes from popular media and examines their authenticity.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/car-hacking-biometric-database-security-roundup\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5cc3664f4ef5ad318eea382e\/master\/pass\/Car-hack-1144980326.jpg\"\/><\/p>\n<p><strong>Credit to Author: Emily Dreyfuss| Date: Sat, 27 Apr 2019 13:00:00 +0000<\/strong><\/p>\n<p>Mueller report fallout, a biometrics database, and more of the week&#8217;s top security news.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21357],"class_list":["post-15191","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-security-news"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15191","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15191"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15191\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15191"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15191"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15191"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}