{"id":9879,"date":"2017-10-14T04:45:11","date_gmt":"2017-10-14T12:45:11","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/10\/14\/news-3652\/"},"modified":"2017-10-14T04:45:11","modified_gmt":"2017-10-14T12:45:11","slug":"news-3652","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/10\/14\/news-3652\/","title":{"rendered":"An Equifax Goof, an iOS Phish, and More Security News This Week"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/59e13169e926957a1ec521ab\/master\/pass\/PhoneHackedDate-HP-531403996.jpg\"\/><\/p>\n<p><strong>Credit to Author: Brian Barrett| Date: Sat, 14 Oct 2017 12:00:00 +0000<\/strong><\/p>\n<p data-reactid=\"247\"><span class=\"lede\" data-reactid=\"248\">This week was <\/span><!-- react-text: 249 -->one of revelations in the security world, most of them centered around nation-states pulling off ambitious hacks. In the wake of reports that Russia had used Kaspersky Lab software to steal NSA secrets, we took a look at the <!-- \/react-text --><a href=\"https:\/\/www.wired.com\/story\/kaspersky-russia-antivirus\/\" data-reactid=\"250\">antivirus paradox<\/a><!-- react-text: 251 --> that applies to every company selling it. And given reports that North Korea had attempted to hack a US energy utility, we looked at <!-- \/react-text --><a href=\"https:\/\/www.wired.com\/story\/hacking-a-power-grid-in-three-not-so-easy-steps\/\" data-reactid=\"252\">when exactly grid-attacks should freak you out<\/a><!-- react-text: 253 -->.<!-- \/react-text --><\/p>\n<p data-reactid=\"254\"><!-- react-text: 255 -->In addition to break-ins, we took a look at a few things that are broken, like <!-- \/react-text --><a href=\"https:\/\/www.wired.com\/story\/donald-trump-madman-strategy-north-korea-nuclear-weapons\/\" data-reactid=\"256\">Donald Trump\u2019s attempt to use Richard Nixon\u2019s \u201cmadman\u201d playbook<\/a><!-- react-text: 257 --> against North Korea. (It didn\u2019t work so great for Nixon, either.) Cyberattacks don\u2019t really work against North Korea anymore, because there\u2019s not much internet to work with. <!-- \/react-text --><a href=\"https:\/\/www.wired.com\/story\/social-security-number-replacement\/\" data-reactid=\"258\">Social Security numbers are a bad system that\u2019ll be hard to replace<\/a><!-- react-text: 259 -->\u2014but not impossible. <!-- \/react-text --><a href=\"https:\/\/www.wired.com\/story\/voting-village-hacking-report\/\" data-reactid=\"260\">Voting tech reforms have started coming in drips<\/a><!-- react-text: 261 -->, but we need to crank the faucet all the way.<!-- \/react-text --><\/p>\n<p data-reactid=\"262\"><!-- react-text: 263 -->There\u2019s at least some good news though: <!-- \/react-text --><a href=\"https:\/\/www.wired.com\/story\/crypto-anchors-breach-security\/\" data-reactid=\"264\">A method exists that would have helped stop the Equifax megabreach and others like it<\/a><!-- react-text: 265 -->. If only more companies would use it.<!-- \/react-text --><\/p>\n<p data-reactid=\"266\">And yet there&#x27;s more! As always, we\u2019ve rounded up all the news we didn\u2019t break or cover in depth this week. Click on the headlines to read the full stories.<\/p>\n<p data-reactid=\"269\">You know how annoying it is when you\u2019re just futzing along on your iPhone and suddenly a pop-up prompts you to enter your Apple ID password for no good reason? As developer Felix Krause illustrates, that reason might well be \u201ca bad guy wants to steal your info.\u201d Krause says that it\u2019s \u201cshockingly easy\u201d for a shady developer to prompt people to enter their passwords using iOS\u2019s UIAlertController, which lets developers create pop-ups that also happen to mimic the system dialog. How to protect yourself? Don\u2019t download untrusted apps first of all. But you can also hit the home button when a pop-up asks for your password. If the app quits, someone was phishing you. If not, it\u2019s a real-deal iOS request.<\/p>\n<p data-reactid=\"274\"><!-- react-text: 275 -->The already absurd Equifax situation seemingly grows a little more so every day. Earlier this week, the company\u2019s site <!-- \/react-text --><a href=\"https:\/\/arstechnica.com\/tech-policy\/2017\/10\/after-second-bungle-irs-suspends-equifaxs-taxpayer-identity-contract\/\" target=\"_blank\" data-reactid=\"276\">delivered<\/a><!-- react-text: 277 --> bogus Flash updates to users; if you clicked, your device came down with a nasty case of adware. This time, at least, the company paid a price: The IRS has suspended the $7.5 million (no-bid) contract it first awarded Equifax to \u201cvery taxpayer identity\u201d in the aftermath of the initial debacle. It could be reinstated after a review, but in the meantime the service Equifax had proved, called Secure Access, is down.<!-- \/react-text --><\/p>\n<p data-reactid=\"280\"><!-- react-text: 281 -->One of the original low-cost, high-quality smartphones out of China, OnePlus has a reputation for solid design and an at times archaic order process. It also uses OxygenOS, a forked version of Android with perfectly decent usability and, apparently, one nasty little surprise: It tracks users, but doesn\u2019t anonymize that data. All smartphones send location and other data back to their servers, but they also take precautions not to link that data with a specific phone, because it would enable the kind of privacy overreaches that consumers rightly find deeply unsettling. According to security researcher <!-- \/react-text --><a href=\"https:\/\/www.chrisdcmoore.co.uk\/post\/oneplus-analytics\/\" target=\"_blank\" data-reactid=\"282\">Christopher Moore<\/a><!-- react-text: 283 -->, though, OxygenOS recorded the device\u2019s unique identifiers, battery status, timestamps, detailed app usage information, and more. At least now we know what the \u201cplus\u201d stands stands for.<!-- \/react-text --><\/p>\n<p data-reactid=\"286\">The Daily Beast takes a look this week at Danny Manupassa, a security products vendor who, the report says, has sold phones that \u201chave been linked to assassinations, armed robbery, money laundering, and other serious crimes.\u201d More than a look at just one supplier, the story looks at the underworld use of encrypted, hard to trace smartphones. It\u2019s a cutthroat business in a murky legal territory, and worth spending a little time with.<\/p>\n<p class=\"related-cne-video-component__dek\" data-reactid=\"296\">Phishing scams are getting more and more sophisticated, to the point where they\u2019re fooling even security experts. Here&#39;s how to avoid them.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/apple-id-password-phishing\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/59e13169e926957a1ec521ab\/master\/pass\/PhoneHackedDate-HP-531403996.jpg\"\/><\/p>\n<p><strong>Credit to Author: Brian Barrett| Date: Sat, 14 Oct 2017 12:00:00 +0000<\/strong><\/p>\n<p>Another Equifax goof, an easy iOS phish, and more of the week&#8217;s top security news.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714],"class_list":["post-9879","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9879","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=9879"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9879\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=9879"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=9879"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=9879"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}