Archive for October, 2017

BREAKING: Rogers Still Recovering From Their Multi-Day Outage

Posted in Commentary with tags on October 26, 2017 by itnerd

While I did post a story that did a post mortem of Rogers multi day outage that affected who knows how many TV, Internet, and home phone customers yesterday, that shouldn’t imply that this crisis is over. I say that because Rogers appears to still be trying to bring people back online based on these Tweets that just popped up from the Rogers Helps Twitter account:

To be frank, I am not sure that customers who have been off line for over a week have any patience left. Take these Tweets for example:

https://twitter.com/QuibJ/status/923389388486213634

Now based on the people that I’ve spoken to, Rogers has made significant progress in terms of resolving this. So hopefully Rogers gets the remaining customers who are still out online in short order. As in today. Because the longer this goes, the worse it gets for Rogers. Both from a PR standpoint and from a financial one as well.

Kaspersky Says It Obtained NSA Hacking Tool Source Code Via Their AV Software

Posted in Commentary with tags on October 26, 2017 by itnerd

Well, this doesn’t look good.

Kaspersky who is under siege because they are allegedly working with Russian spies, and who have spent months denying that had to admit to something that will make them look like they are working with Russian spies. They have admitted that it obtained the source code of National Security Agency (NSA) hacking tools via anti-virus software running on a PC in the US. They put out a statement that detailed what they found when they looked into the claims that they were responsible for stealing these tools. In short, they found that they did steal these tools because the Kaspersky AV software running on the PC in question thought it was a new and different strain of the Equation malware source code. So it promptly scooped it up and sent it back to Mother Russia for analysis.

The bottom line from the company: We did it but it was accidental.

I’m not sure that’s going to calm the waters here seeing as this plays into part of the narrative that Kaspersky are the bad guys. So I suspect that if they want to get people to trust them again, they are likely going to need to do better than this.

 

 

 

#Fail: Google Play Protect Can’t Protect You From Malware

Posted in Commentary with tags on October 26, 2017 by itnerd

Google has a new initiative to reduce malware in the Android ecosystem. Called Google Play Protect, it’s supposed to catch the bad stuff before it ends up on your Android  smartphone. Because lots of bad stuff ends up on Android smartphones. And that’s a big problem.

However, it appears that it will not do much for you. Tests by German malware experts AV-Test indicate that Google Play Protect detected just 65.8 percent of recent malware samples, rising to 79.2 percent of malware of around a month old. Meanwhile, third party solutions caught pretty much everything that was thrown at it. The net result was that Google Play Protect finished dead last in this test.

I’m not sure what Google is going to do about it, but I know what you should do. Forget Google Play Protect and invest in a third party anti-virus app that was tested by AV-Test as it seem Google can’t protect you from the bad stuff that’s out there.

 

#Fail: Dell Forgets To Renew A Domain And It Gets Hijacked

Posted in Commentary with tags on October 26, 2017 by itnerd

Security expert Brian Krebs has a report which shows that #fails come in all forms. I’ll let him give you the details:

There is a program installed on virtually all Dell computers called “Dell Backup and Recovery Application.” It’s designed to help customers restore their data and computers to their pristine, factory default state should a problem occur with the device. That backup and recovery program periodically checks a rather catchy domain name — DellBackupandRecoveryCloudStorage.com — which until recently was central to PC maker Dell’s customer data backup, recovery and cloud storage solutions.

Sometime this summer, DellBackupandRecoveryCloudStorage.com was suddenly snatched away from a longtime Dell contractor for a month and exposed to some questionable content. More worryingly, there are signs the domain may have been pushing malware before Dell’s contractor regained control over it.

That’s a #Fail. You have to wonder if the person who keeps track of when domains expire still works for Dell as this had the potential of going horribly sideways for them. Here’s why:

This program comes in two versions: Basic and Premium, explains “Jesse L,” a Dell customer liaison and a blogger on the company’s site.

“The Basic version comes pre-installed on all systems and allows the user to create the system recovery media and take a backup of the factory installed applications and drivers,”Jesse L writes. “It also helps the user to restore the computer to the factory image in case of an OS issue.”

In other words: If DellBackupandRecoveryCloudStorage.com were to fall into the wrong hands it could be used to foist malicious software on Dell users seeking solace and refuge from just such nonsense!

While this situation isn’t as bad as say Equifax, it could have been. Hopefully Dell learns its lesson and keeps tighter control of their domains going forward.

 

#Fail: Apple Might Have Dumbed Down Face ID To Ship More iPhone X Models [UPDATED]

Posted in Commentary with tags on October 25, 2017 by itnerd

If this report in Bloomberg is true, this will cement my decision to skip the iPhone X and wait for the next model. Apparently Apple might have given the green light to reduce the accuracy of their FaceID authentication system to allow them to ship more iPhone X units:

As of early fall, it was clearer than ever that production problems meant Apple Inc. wouldn’t have enough iPhone Xs in time for the holidays. The challenge was how to make the sophisticated phone—with advanced features such as facial recognition—in large enough numbers.

As Wall Street analysts and fan blogs watched for signs that the company would stumble, Apple came up with a solution: It quietly told suppliers they could reduce the accuracy of the face-recognition technology to make it easier to manufacture, according to people familiar with the situation. 

That doesn’t inspire confidence. But it reinforces a belief about Apple products that I have and I am not shy about sharing. Never, ever buy version 1.0 of any Apple product. It will have issues that will get worked out in the next version. Though this case is a bit different. Instead of being a beta tester for cutting edge tech that still has some kinks to work out, you’d be someone who was on the receiving end of a business decision to dumb some cutting edge tech down in the interests of shipping a few more iPhones. Not cool Apple. Not cool. Of course, all of this assumes that the Bloomberg report is accurate. Assuming it is, I have to wonder what the fine folks at Apple Park have to say about it.

Wake me up in fall 2018 when the next version of the iPhone with Face ID pops up. Until then, I’m going to pass on the iPhone X.

UPDATE: Apple has put out a statement to TechCrunch saying that this report is “completely false”:

Customer excitement for iPhone X and Face ID has been incredible, and we can’t wait for customers to get their hands on it starting Friday, November 3. Face ID is a powerful and secure authentication system that’s incredibly easy and intuitive to use. The quality and accuracy of Face ID haven’t changed. It continues to be 1 in a million probability of a random person unlocking your iPhone with Face ID.

Bloomberg’s claim that Apple has reduced the accuracy spec for Face ID is completely false and we expect Face ID to be the new gold standard for facial authentication.

This is clearly a touchy point for Apple. And you can understand why. But at the same time, Bloomberg would not have posted this story without having their ducks in a row. Thus you have to wonder if the truth lies somewhere in between the Apple statement and the Bloomberg story.

Oh, it still doesn’t change the fact that I won’t be getting an iPhone X as the best case scenario here is that I am a beta tester for a technology that has kinks to work out.

 

Bad Rabbit Ransomware Attack Hits Europe

Posted in Commentary with tags on October 25, 2017 by itnerd

Today’s nightmare for IT staff is called Bad Rabbit. It’s is thought to be a variant of Petya which hit people earlier this year. Infected systems direct people to a page where they are told to pay a ransom of 0.05 bitcoin (about $277 USD) to recover their files within 41 hours. As we speak, it’s hitting Europe right now:

The malware has affected systems at three Russian websites, an airport in Ukraine and an underground railway in the capital city, Kiev.

The cyber-police chief in Ukraine confirmed to the Reuters news agency that Bad Rabbit was the ransomware in question.

It bears similarities to the WannaCry and Petya outbreaks earlier this year.

But the potential exists for this to spread. Thus you need to be on guard. The Independent has a great guide on how to protect yourself. Please consider it to be required reading so that you don’t become the next victim.

The Rogers Outage: A Post Mortem

Posted in Commentary with tags on October 25, 2017 by itnerd

Now that it looks like the multi-day Rogers outage is on it’s way to being resolved, I figured it would be worth doing a post mortem of this incident. The reason being is that I believe there are things that can be taken away from this incident that can either help to avoid another one like it, or to improve the response to a similar situation.

The first thing that jumps out at me is the system that failed and caused this outage. Whatever systems that Rogers had that authorizes its hardware when you connect it to their network clearly failed. And it took days for Rogers to get things fixed to a point that customers could come back online. This is the sort of system that sounds business critical to me, which in my world is something that usually has a backup system. But based on what seems to have gone down from my perspective, it appears on the surface that this may not be the case. If that is accurate, then that is reason to worry if you’re a Rogers customer as this could happen again. Now if Rogers was a small ISP, I could see them not having a backup system of some sort. But this is Canada’s largest telco. That should not be the case. The other possibility is that if they did have a backup system, it clearly didn’t work. If that’s what happened, then Rogers has a much bigger issue that they need to deal with. In either case, one hopes that they address this going forward. On top of that, one has to wonder if there are other business critical systems within Rogers that lack any sort of backup at all or one that they know is in a working state.

That brings me to point number two, it took Rogers days to resolve this. During that time the following happened:

  • Retail stores allegedly had no idea that this was going on. But they still handed out hardware that had zero chance of working, which in turn compounded the amount of angry customers the telco had to deal with.
  • Tech support was somewhat aware of this issue, but there was nothing they could say or do other than offer a service credit if you pushed hard enough.
  • The Rogers social media team didn’t start to admit that there was a widespread problem until this past weekend. During that time their responses weren’t consistent. Then when they did admit to it, they sent out at least a couple of messages saying that things were resolved when in reality they were not even close to being resolved. Not to mention a secondary issue of some sort was uncovered. And late on in this crisis, customers were unable to get responses for them for extended periods of time which didn’t help their cause.

The net result is that Rogers customers who were affected by this outage were not happy campers. If you look through any of my stories covering this outage that’s clear as I posted Tweets in each story from customers who took to Twitter to express their displeasure. These are people who counted on Rogers to provide them with quality Internet service, and were willing to give Rogers some slack when this incident started. But when the above happened, and the days dragged on, any goodwill those customers had went out the window. I’ve talked to exactly 103 people via e-mail, phone and Twitter about this issue. None of them are happy. If these 103 people represent how some, most or all of Rogers customers who were affected by this feel, then Rogers has a very big problem on their hands. These are people who will at the very least bad mouth Rogers to anyone who will listen. At worst, people will do that and leave Rogers for other telcos such as Bell Canada. Either way, it’s not good for Canada’s largest telco.

Now this does sound dire. But strange as it may seem, Rogers can rescue this. If I ran Rogers, here’s what I would do:

  1. Tell Rogers customers what happened, why it happened, and why it will never happen again in a robust manner and give details on how things are going to change. For example, in this case Rogers let people get new hardware that had zero chance of working and allegedly their retail staff had no idea that an critical event was going on. The fix for that is to ensure that all parts of the organization know when a critical event happens and take the best action in the interest of their customer base. As in not handing out hardware to customers that had zero chance of working. The bottom line is that customers have to know that you recognize that you’ve made a mistake and you’re willing to invest to fix it because they want to trust you. If customers can’t trust you, they’ll go elsewhere to someone who they can trust.
  2. Rogers needs to apologize. They need to do so in a robust and fulsome way that shows that they regret the inconvenience that they’ve caused their customers. Sending a direct email to all affected customers would work best in this situation. Because when one does that, most people will respond positively. Conversely, when when that doesn’t happen, customers go elsewhere because they feel that the organization doesn’t care.
  3. Make amends by giving a credit of some sort to customers. And by that, I don’t mean a credit that amounts to a week or two of service. I mean a credit that takes into account that some Rogers customers had difficulty working from home, making money if they were self employed, and had to use expensive cellular data to get online. A credit that is worth a month of service should cut it based on what I saw online. By offering a credit that is meaningful, they recognize that they seriously inconvenienced their customers. And customers will respond positively to to that.

By doing all of the above, Rogers stands a healthy chance of retaining the customers that they upset during this outage. But will they do it? At best I think the odds are 50/50 that they will. But I do know that if they don’t do anything, their odds of retaining customers who were affected by this outage plummet dramatically. How will you know for sure which way this goes? Watch next quarter’s results for increased churn in their cable, TV, and home phone operations relative to last quarter. If it goes up, then you know that the people who were ranting about Rogers on social media were deadly serious about leaving Canada’s largest telco.

One other thing. I want to circle back to the 83 year old client of mine who I had to set up my spare cell phone in hotspot mode (which ended up consuming 5GB of data and blowing by my data cap with Fido by 1GB by the way) so that she could get onto the Internet as having Internet access allows her to order medication and food. That’s important because she is housebound. She’s up and running as of yesterday and I will monitor her situation. But what was interesting was that Rogers reached out to me directly on Monday to see if they could assist. I told this to my wife and her response in a very cynical tone was “they likely want to get her story off the field because it looks really bad to take a old woman offline.” That statement further highlights the challenge that Rogers has which is how the public now perceives them. But the reality is that Rogers didn’t have to try and help her. Thus I applaud them for wanting to assist. The thing is, the fact that Rogers wanted to try and help this woman illustrates that they aren’t bad guys. I think that something happened here that went sideways on multiple levels. That along with some less than optimal decision making on the part of Rogers conspired to make them look worse than the really are. I believe that they can remedy that if they choose to do the right thing. The question I have is if they have the desire to do so.

I guess we’re about to find out.

UPDATE: Rogers is apparently still working towards bringing people back online. Details here.

LinkedIn Rolls Out Enhanced Smart Replies For LinkedIn Messaging

Posted in Commentary with tags on October 24, 2017 by itnerd

Today, LinkedIn rolls out enhanced smart replies for LinkedIn messaging, a brand new natural language processing recommendation engine to help members save time and respond to messages with greater ease.

Using a machine learning framework developed within LinkedIn, smart replies suggests personalized, contextual messages, enabling members to have a more productive dialogue with their connections.

How does it work? If you message a connection to see if they’d like to get coffee next week, you’ll see suggestions based on the conversation’s context to provide more relevant replies such as “Yes I do” and “What time?” Members are also able to message from any page on LinkedIn, no longer requiring you to leave a profile or company page to start a conversation.

Smart replies are rolling out globally in English first with other languages to come and the messaging is accessible on the LinkedIn mobile app and on desktop.

Members can enable or disable smart replies by going to their settings.

To learn more about the new smart replies, please visit LinkedIn’s blog post and video. For more information on the technical work that goes into generating smart replies, check out this post on the LinkedIn Engineering Blog.

 

Guest Post: NordVPN Discusses How Companies Can Protect Themselves from Breaches

Posted in Commentary with tags on October 24, 2017 by itnerd

An average data breach costs companies around 7 million dollars per year, due to loss of customers, business disruption, the effect on brand reputation, fines, and so on. Small businesses are especially at risk, because many of them do not even have basic security tools in place, such as antivirus, firewalls or encryption software.

At the same time, large companies and even government organizations are also vulnerable. A couple of years ago, one NSA employee took classified material home to work on his computer. As a result, his use of the Russian-made Kaspersky Lab antivirus program enabled Russian hackers to see all the secret files. The theft helped Russian government to evade US cyber espionage and to track American activities. More recently, Equifax – one of USA’s major credit card reporting companies – was attacked, and hackers went away with the personal information of more than 140 million people in the US and other countries.

“The biggest problem of such major hacks is that governments and innocent people will suffer the consequences for years to come,” said Marty P. Kamden, CMO of NordVPN. “When private companies fall victim to such hacks, they should act immediately, inform all affected customers and do everything they can to ensure that people know how to protect themselves. That includes informing them they should change their passwords and possibly even their bank accounts.”

“Of course, we understand that any breach spells disaster for that company’s reputation – so rather than deal with unfortunate consequences, it’s always wiser to prevent major hacks from happening.”

NordVPN offers a solution for companies to protect their privacy by applying military-grade encryption to all data that any company’s employee sends or receives over the Internet. A VPN also protects the company and its employees from the risk of working from unsecured Wi-Fi spots, such as hotels, cafes, or airports.

“Nowadays, alongside other security oriented means, it’s a must for every company to use a VPN,” said Marty P. Kamden. “Due to recently revealed KRACK vulnerability, hackers can now obtain the traffic going through the majority of Wi-Fi connections if they are within the range of that connection. Companies should take their privacy into their own hands. They should teach their employees to use only https sites; they should update their router’s firmware and consider using Ethernet. Also – this goes without saying – companies should invest in a reliable VPN provider that will keep their Internet traffic private.”

VPN is a proven method to transmit any information confidentially to employees or clients. It also allows to safely execute financial transactions and to stay private in countries with high Internet censorship. Additionally, using a VPN will help companies bypass bandwidth throttling, surveillance or tracking by ISPs.

#PSA: Windows 10 Users Now Have A Means To Protect Themselves From Ransomware

Posted in Commentary with tags on October 24, 2017 by itnerd

If you’ve updated your Windows 10 install to the Fall Creators Update, you have a new feature that protects you from ransomware. It’s called controlled folder access. What it does is it prevents suspicious applications from changing the contents of selected protected folders. So if you extrapolate that to a ransomware attack, it should stop ransomware from encrypting your files and holding them hostage.

Here’s how you turn it on:

  • Go to the Windows Defender Security Center App
  • Open the virus & threat protection screen within Defender
  • Click on Virus & threat protection settings
  • Turn on the controlled folder access option

The document that I linked to above also has a way to turn this on in a corporate environment with dozens or perhaps hundreds of computers. There’s no performance penalty by turning this on and you will be better off by doing so. Thus I would recommend that you turn it on today.

UPDATE: In further testing I found that Parallels Desktop does not seem to like this feature if you have turned on sharing of your Mac’s home folders with a Windows 10 virtual machine. It also stops updates to Parallels Tools from taking place. Thus Parallels Desktop users should turn this feature off until Parallels comes out with a fix for this.