{"id":15680,"date":"2019-06-29T10:45:03","date_gmt":"2019-06-29T18:45:03","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/06\/29\/news-9428\/"},"modified":"2019-06-29T10:45:03","modified_gmt":"2019-06-29T18:45:03","slug":"news-9428","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2019\/06\/29\/news-9428\/","title":{"rendered":"Myspace Employees Used to Spy on Users"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5d169f49bac5d0000887c71e\/master\/pass\/security%20-%20myspace%20spying%20-%20154960848%20-%20v2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Brian Barrett| Date: Sat, 29 Jun 2019 13:00:00 +0000<\/strong><\/p>\n<p><span class=\"lede\">As we approach <\/span>the July 4 holiday, the security world had no shortage of fireworks\u2014starting with a hacker group, likely from China, that has spent years breaking into carriers in an effort to <a href=\"https:\/\/www.wired.com\/story\/chinese-hackers-carrier-metadata\/\">hoover up metadata from prime targets<\/a>. Russia gets most of the attention lately, but never count <a href=\"https:\/\/www.wired.com\/story\/doj-indictment-chinese-hackers-apt10\/\">out China&#x27;s sophistication<\/a> and verve.<\/p>\n<p>Also never count out Excel as a popular target for hackers. We took a look at not one but <a href=\"https:\/\/www.wired.com\/story\/microsoft-excel-hacking-power-query-macros\/\">two different methods of attack<\/a> against the venerable spreadsheet software, both of which use the program&#x27;s features as intended to wreak havoc. We also checked out a bug that a security research told Apple about months ago that hasn&#x27;t yet gotten a fix\u2014and <a href=\"https:\/\/www.wired.com\/story\/macos-gatekeeper-vulnerability\/\">hackers have taken notice<\/a>. And cybersecurity pro Dan Salmon <a href=\"https:\/\/www.wired.com\/story\/i-scraped-millions-of-venmo-payments-your-data-is-at-risk\/\">has a warning for you about Venmo<\/a>: All that <a href=\"https:\/\/www.wired.com\/story\/venmo-alternatives\/\">public data<\/a> makes it child&#x27;s play for a bad guy to spearphish you.<\/p>\n<p class=\"paywall\">Zeynep Tufekci wrote about how the <a href=\"https:\/\/www.wired.com\/story\/internet-made-dupes-cynics-of-us-all\/\">endless assault of falsehoods online<\/a> has turned us all into dupes and cynics. And we looked about how the <a href=\"https:\/\/www.wired.com\/story\/bgp-route-leak-internet-outage\/\">so-called Border Gateway Protocol<\/a> is behind so many of the internet&#x27;s more practical woes, like outages and espionage.<\/p>\n<p class=\"paywall\">Lastly, you really should spend some time with <a href=\"https:\/\/www.wired.com\/story\/cyberstalked-teen-girls-for-years-fought-back\/\">this feature from our July\/August issue about<\/a> about a hacker who harassed girls in a small New Hampshire town\u2014until they fought back.<\/p>\n<p class=\"paywall\">Of course, that\u2019s not all that happened in the privacy and security world this week. Every Saturday we round up the stories we didn\u2019t break or report on in-depth, but which you should know about nonetheless. Click on the headlines to read the full articles, and be safe out there.<\/p>\n<p class=\"paywall\">Motherboard reports week that in the golden age of Myspace, employees had access too and abused an administrative tool called Overlord. Former Myspace workers said that colleagues used this &quot;entire backdoor to the Myspace platform&quot; to snoop on unsuspecting users\u2014including exes. This happened a decade ago, before the <a href=\"https:\/\/www.wired.com\/story\/wired-guide-personal-data-collection\/\">value of personal data gained mainstream awareness<\/a>. Which in no way excuses the behavior of the employees in question; it doesn&#x27;t take a Cambridge Analytica news cycle to realize that spying on people is wrong. Most platforms have a tool like this\u2014Uber notably called its version &quot;God View,&quot; and had similar privacy issues\u2014but also strictly limit access to it. If you don&#x27;t want your employees to misuse a tool that grants access to the private messages, passwords, and other user data on your social network, maybe also don&#x27;t give it such an ominous name.<\/p>\n<p class=\"paywall\">Hopefully by now you&#x27;ve read <a href=\"https:\/\/www.wired.com\/story\/mueller-report-russia-redacted-trump-barr-read\/\">Robert Mueller&#x27;s report on Russian interference in the 2016 election<\/a>, and Donald Trump&#x27;s many flirtations with obstructing justice. If not, please do it now. Look, we&#x27;ll even put it right here for you. Take your time!<\/p>\n<p><iframe loading=\"lazy\"  src=\"https:\/\/www.documentcloud.org\/documents\/ width=\"100%\" height=\"420\" frameborder=\"0\" ><\/iframe> <\/p>\n<p class=\"paywall\">Apologies for the insistence. But it&#x27;s important that you read it for yourself, because it lays things out as clearly as they&#x27;ll ever be. While Mueller will testify before Congress on July 17, he has made abundantly clear that he&#x27;s not going to go beyond what he already put in his report. And frankly, he shouldn&#x27;t have to; the picture it paints speaks loudly, regardless of how <a href=\"https:\/\/www.wired.com\/story\/mueller-report-trump-obstruction-of-justice-barr\/\">attorney general William Barr chose to frame it<\/a>.<\/p>\n<p class=\"paywall\">Microsoft&#x27;s OneDrive doesn&#x27;t get as much attention as Dropbox or Google Drive for storage needs, but if you have data that needs an extra layer of protection, its new Personal Vault feature merits a closer look. It lets you put whatever data you choose behind a strong password and second-factor authentication, which can be either a numerical code or a biometric option. And mostly, please take this as a reminder to <a href=\"https:\/\/www.wired.com\/story\/two-factor-authentication-apps-authy-google-authenticator\/\">use strong multifactor authentication<\/a> on everything, all the time! You&#x27;re worth it!<\/p>\n<p class=\"paywall\">We talk a lot about <a href=\"https:\/\/www.wired.com\/story\/upnp-router-game-console-vulnerabilities-exploited\/\">vulnerable IoT devices<\/a>, but it never seems to get much better. In fact, this week it got considerably worse. A new malware called Silex went on a tear, bricking 2,000 exposed devices by using widely known default credentials. The hacker, who claims to be a 14-year-old, has hit pause on his crusade after receiving attention from security researchers <a href=\"https:\/\/blogs.akamai.com\/sitr\/2019\/06\/sirt-advisory-silexbot-bricking-systems-with-known-default-login-credentials.html\" target=\"_blank\">at Akamai<\/a> and <a href=\"https:\/\/www.zdnet.com\/article\/new-silex-malware-is-bricking-iot-devices-has-scary-plans\/\" target=\"_blank\">reporters at ZDNet<\/a>. Which doesn&#x27;t, of course, the Internet of Things any less vulnerable. It just has a temporary reprieve.<\/p>\n<p class=\"related-cne-video-component__dek\">Hacker and security researcher Samy Kamkar takes a look at a variety of hacking scenes from popular media and examines their authenticity.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/myspace-overlord-iot-robert-mueller-security-roundup\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5d169f49bac5d0000887c71e\/master\/pass\/security%20-%20myspace%20spying%20-%20154960848%20-%20v2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Brian Barrett| Date: Sat, 29 Jun 2019 13:00:00 +0000<\/strong><\/p>\n<p>Robert Mueller will testify, malware wrecks IoT, and more of the week&#8217;s top security news. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21358],"class_list":["post-15680","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-cyberattacks-and-hacks"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15680","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15680"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15680\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15680"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15680"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15680"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}