Rogers Releases New Internet Speed Tiers…. With The Same Pathetic Upstream Speed

Posted in Commentary with tags on December 5, 2022 by itnerd

Just this morning a reader of this blog pointed me towards this page on Rogers website where it appears that Rogers has released new Internet speed tiers:

It looks like Rogers has deleted the 1 Gbps tier and added a 1.5 Gbps and a 2.5 Gbps tier. As always, the Devil is in the detail. so if you go looking for detail, you’ll notice this:

Now I am using the 1.5 Gbps tier as an example of this as I couldn’t find an address where the 2.5 Gbps tier was available, but the first thing that should grab your attention is the upload speed which is a laughable 50 Mbps. Any of Bell’s Internet tiers will simply destroy this without breaking a sweat if a potential customer compares the two against each other. How Rogers can put this out there and try to sell it with a straight face is beyond me. The other thing that I notice is that they call this “Pure fibre to your home”. I find that unlikely to be the case given the upload speed. This sounds like Rogers existing cable infrastructure jazzed up to sound like it is competitive with Bell’s fibre to the home offering, when in actual fact it is not even in the same league.

What kills me is that Bell has had actual fibre to the home for five or more years now. Meanwhile Rogers fibre footprint is so tiny, it’s microscopic because I am guessing that they are trying to milk every last cent from copper cable that they can. That leaves Rogers at a significant disadvantage. At this point, Rogers really needs to suck it up and start rolling out fibre everywhere they operate, or just roll out DOCSIS 4.0 instead which may give them a fighting chance against Bell. And if somehow Rogers and Shaw manage to close their deal to merge, Rogers will face the same problem with Telus out west. The bottom line is that while this is a mildly interesting development, this does nothing to make Rogers more competitive with Bell in areas where the two compete against each other.

Nice try Rogers.

Major Android Security Leak Disclosed

Posted in Commentary with tags on December 5, 2022 by itnerd

Bad news for anyone who owns a Samsung, LG, Xiaomi among other Android phones. Apparently this phones have been left vulnerable to malicious apps with system-level privileges, following the leaking of their platform-signing keys:

As shared by Googler Łukasz Siewierski (via Mishaal Rahman), Google’s Android Partner Vulnerability Initiative (APVI) has publicly disclosed a new vulnerability that affected devices from Samsung, LG, and others.

The core of the issue is that multiple Android OEMs have had their platform signing keys leaked outside of their respective companies. This key is used to ensure that the version of Android that’s running on your device is legitimate, created by the manufacturer. That same key can also be used to sign individual apps.

By design, Android trusts any app signed with the same key used to sign the operating system itself. A malicious attacker with those app signing keys would be able to use Android’s “shared user ID” system to give malware full, system-level permissions on an affected device. In essence, all data on an affected device could be available to an attacker.

Notably, this Android vulnerability doesn’t solely happen when installing a new or unknown app. Since these leaked platform keys are also in some cases used to sign common apps — including the Bixby app on at least some Samsung phones — an attacker could add malware to a trusted app, sign the malicious version with the same key, and Android would trust it as an “update.” This method would work regardless of if an app originally came from the Play Store, Galaxy Store, or was sideloaded.

Google’s public disclosure doesn’t lay out which devices or OEMs were affected, but it does display the hash of example malware files. Helpfully, each of the files has been uploaded to VirusTotal, which also often reveals the name of the affected company. With that, we know the following companies’ keys were leaked (though some keys have not yet been identified):

  • Samsung
  • LG
  • Mediatek
  • szroco (makers of Walmart’s Onn tablets)
  • Revoview

Yikes! I have a pair of comments from Venafi on this:

Tony Hadfield, Sr. Director of Solutions Architects at Venafi“This is a great example of what happens when organizations sign code without a plan to manage code signing keys. If they keys fall into the hands of an attacker it can lead to catastrophic breaches. The only way to prevent this kind of problem is to have an auditable, ‘who/what/where’ solution: how do you control signing keys, where are they stored, who has access to them, and which kind of code gets signed? You need this information to protect your keys and also respond quickly to a breach by rotating your public and private keys.”

Ivan Wallis, Global Architect at Venafi: This is a great example that showcases the lack of proper security controls over code signing certificates, in particular the signing keys for the Android platform. These certificate leaks are exactly related to this, where these vendor certificates made it into the wild, allowing for the opportunity for misuse and the potential to sign malicious android applications masquerading as certain “vendors”, similar to Solarwinds. Bad actors can essentially gain the same permissions as of the core service. The lack of the who/what/where/when around code signing makes it difficult to know the impact of a breach, because that private key could be anywhere. At this point it must be considered a full compromise of the code signing environment and key/certificate rotation must happen immediately.”

The article that I linked to has some really good advice in terms of protecting yourself. Specifically”

While the details of this latest Android security leak are being confirmed, there are some simple steps you can take to make sure your device stays secure. For one, be sure that you’re on the newest firmware available for your device. If your device is no longer receiving consistent Android security updates, we recommend upgrading to a newer device as soon as possible.

Beyond that, avoid sideloading applications to your phone, even when updating an app that’s already on your phone. Should the need to sideload an app arise, be sure you completely trust the file you’re installing.

This is advice that you should be following anyway as it will keep you safe from exploits of any type.

Google Canada kicks-off the year early for startups, with applications for the 2023 Google for Startups Accelerator Canada cohort 

Posted in Commentary with tags on December 5, 2022 by itnerd

As we head into a season of holiday cheer, Google Canada today announces applications are open for the 2023 Google for Startups Accelerator Canada – helping Canadian startups begin the new year strong. 

The intensive ten-week bootcamp is designed to bring the best of Google’s programs, products, people and technology to Canadian startups that leverage machine learning and AI in their company today or plan to in the future. Up to 12  Canadian technology startups will be selected to participate. 

Through the equity free program, Google wants to make it possible for startups to continue to thrive in Canada’s tech ecosystem. The accelerator provides technical training and strategic counsel through one-to-on mentorship opportunities with Google experts. 

Google has provided more infomation in a blog post that was posted today. Applications for the program are now open to startups across all sectors until February 1st with the program kicking off March 2023.  

Skills Shortage and Integration Challenges Halt Cybersecurity Adoption: BlackFog

Posted in Commentary on December 5, 2022 by itnerd

BlackFog today released the latest findings in their CISO research which shows that half of CISOs (50%) have been prevented from adopting new security solutions due to problems with integration, whilst security teams now use an average of 20 tools to combat cybersecurity threats. 

This research, sponsored by BlackFog and conducted by Sapio Research, is the second part of an exploration into the many frustrations and challenges faced by CISO’s, IT Security Leaders and Cybersecurity Professionals in the UK and US.  

This research also found that: 

  • 32% stated a lack of skills within their team prevented deployment of a new solution 
  • 22% would consider leaving their current role due to lack of budget for investing in the latest technology   
  • 22% reported that securing additional budget for implementing new technology was one of their biggest priorities in the first 6 months 

This research continues to highlight the lack of cybersecurity investment and the effect it has on those in leading security positions. 

You can read their findings here.

Atlas VPN Windows app’s security gets verified in an independent audit

Posted in Commentary with tags on December 5, 2022 by itnerd

Atlas VPN has completed an independent security audit of its Windows application between July and November this year. The security assessment was conducted by global cybersecurity experts from MDSec.

MDSec’s cybersecurity specialists tested the 2.4.4 version of the Atlas VPN Windows app, looking for issues that could leave it susceptible to compromise. The thorough research did not detect any high or critical category threats within the app. The app’s developers have since implemented all the recommendations provided by the auditor, as confirmed in a retest by MDSec.

Windows application audit by MDsec is the second independent assessment of Atlas VPN, as in 2021, Atlas VPN’s iOS app received a positive review in a security audit by VerSprite. The company expects to complete even more independent tests of Atlas VPN service in the future.

Atlas VPN is a freemium VPN provider with a mission to make safe and open internet accessible to everyone. To protect the privacy of its users, the company uses military-grade encryption and protocols and has a no-logs policy. Today, Atlas VPN is trusted by users from more than 170 countries worldwide.

More information: https://atlasvpn.com/blog/independent-audit-verifies-the-security-of-our-windows-app

Apple Must Take Complete Responsibility For Issues In Their Supply Chain

Posted in Commentary with tags on December 4, 2022 by itnerd

I am certain that readers of this blog would have seen videos of people in an iPhone plant run by Foxconn in China where people were literally fighting their way out of the plant because of a major COVID outbreak along with a lack of food and medicine. Not to mention a lack of pay. If you missed this, here’s a couple of clips for you to look at

Here’s the thing. Apple needs to take responsibility for this. I say that because I’ve been reading a lot of stories over the last two weeks. And the closest thing to responsibility that Apple has taken in terms of the conditions that caused these people to riot like this is as follows:

We are working closely with our supplier to return to normal production levels while ensuring the health and safety of every worker.

Here’s the problem that I have with this. This isn’t the first time that something like this has happened. There was a riot last year in an iPhone plant run by Wistron where workers rioted because of poor living conditions and accusations of explotation:

Now Apple did slap the hand of Wistron over this. And I am sure that Foxconn will get something similar in terms of punishment over their recent issues. But the thing is that this sort of thing has now happened twice over the last year. And the only reason why this sort of thing happens is that Wistron and Foxconn think that they can exploit workers with little or no punishment from Apple. Which implies that Apple is okay with it unless something gets into news that shouldn’t. In which case Apple has to do something to show that they are large and in charge.

Let’s face facts. Apple and their shareholders want high profit margins on everything it sells. That means that Apple will go to places like India and China to get large amounts of workers to build iDevices at a low cost. And Apple will look the other way in terms of anything bad that might be going on in those places as a result. For a company who tries to claim the moral high ground in terms areas like privacy being a human right, which these days is questionable at best, this is pretty bad. Apple needs to own the fact that they have companies like Foxconn and Wistron working for them who clearly are bad actors, and do something substantive about it to ensure that products with their name on it are built by people who are not being actively exploited. Otherwise, Apple is simply talking the talk, but failing to walk the walk. Thus I hope that people in the US Congress are watching this situation closely and are prepared to hold Apple to account if Apple themselves don’t do the right thing and find ways to build iDevices that doesn’t involve the exploitation of workers by third parties. And when it comes to those who buy iPhones, perhaps every one of us need to take into account the conditions that the people who build your next iPhone work in before you take out your credit card to buy your next iPhone.

Your move Apple.

Twitter Alternative Hive Goes Offline After HUGE Data Breach

Posted in Commentary with tags on December 3, 2022 by itnerd

People who weren’t happy about Elon Musk taking over Twitter have run to Hive which saw massive amounts of growth recently. But Hive is now offline after a stunningly huge data breach:

A report published earlier this week alleges that Hive had a massive—and I do mean massive—problem on its hands. According to the German security collective Zerforschung, Hive had grievous software vulnerabilities that exposed pretty much all of its users’ personal data to the internet. A cybercriminal aware of the bugs would have been able to steal Hive users’ kit and caboodle—everything from private messages to registered account information. Researchers claim the bugs were so serious that they refrained from sharing technical details about them—fearing that hackers would exploit them.

According to Zerforschung’s blog:

“The issues we reported allow any attacker to access all data, including private posts, private messages, shared media and even deleted direct messages. This also includes private email addresses and phone numbers entered during login. Attackers can also overwrite data such as posts owned by other users…”

Zerforschung researchers say they reached out to Hive last Saturday about the security vulnerabilities but that the company failed to fix a majority of the issues in the report. After a couple of days, researchers decided to publish their findings, labeling their blog “Warning: do not use Hive Social.” It was only after the research went live that Hive publicly acknowledged the security issues and subsequently took its service offline.

On Thursday, Hive put out a statement, ironically posting it to the platform’s Twitter account. It reads: “The Hive team has become aware of security issues that affect the stability of our application and the safety of our users. Fixing these issues will require temporarily turning off our servers for a couple of days while we fix this for a better and safer experience.” In an additional post, Hive optimistically quipped: “Our server is temporarily shut down. You’ll be able to sign up once we’re back online!”

Whatever is going on, it must be pretty bad to take the entire site down. As I type this, it appears that Hive might be slowly coming back online. Though a check of their Twitter account indicates that it isn’t online. But when they do pop up, I hope that they have their security situation sorted out because you can bet that everyone and their dog will be looking for holes because of this incident.

Twitter Massively Misses Ad Revenue Targets Further Adding To Elon Musk’s Troubles

Posted in Commentary with tags on December 3, 2022 by itnerd

Elon Musk’s troubles with Twitter are really starting to mount. And that’s being illustrated by this New York Times article that a reader pointed me towards were Twitter is massively missing its ad revenue targets at a time that Twitter should not only be hitting them, but exceeding them:

The World Cup has historically been a boon for Twitter, bringing in record traffic and an influx of advertising dollars.

But this time, when the global soccer tournament started on Nov. 20, Twitter’s U.S. ad revenue was running at 80 percent below internal expectations for that week, three people with knowledge of the figures said.

In tandem, Twitter was rapidly cutting its revenue projections. The company previously forecast that it would generate $1.4 billion in the last three months of the year, down from $1.6 billion a year ago because of the global economic downturn. But as Twitter kept missing its weekly advertising targets, that number slid to $1.3 billion, then to $1.1 billion, two people said.

Elon Musk, Twitter’s new owner, has warned repeatedly that his social media company faces dire financial straits. Interviews with seven former employees and internal documents seen by The New York Times paint a fuller picture of Twitter’s financial woes.

Here’s why this is happening according to the Times:

Many of the company’s troubles can be traced to Mr. Musk’s takeover in late October. Since then, advertisers — which provide 90 percent of Twitter’s revenue — have paused some spending on the platform, citing concerns about how Mr. Musk might change the service. The billionaire, a self-described “free speech absolutist,” has reinstated banned accounts and dropped at least one misinformation policy. Hate speech on Twitter has soared in recent weeks, researchers found.

At the same time, Mr. Musk has alternated between wooing advertisers and blasting them. Last month, he threatened a “thermonuclear name & shame” of brands that halted their spending on Twitter. This week, he briefly picked a fight with Apple, which was on track to spend more than $180 million on Twitter ads this year, three people said.

Elon has really painted himself into a corner here with no clear way to get himself out of the situation that he’s in. His behavior has sent Twitter into free fall. And at some point he’ll have to make a call as to what he will do to salvage the situation. Because the longer that this goes on, the less options that Elon has at his disposal. Which means that it is more likely that Twitter crashes and burns under his watch.

Eufy Needs To Be Banned Because They Can’t Be Trusted

Posted in Commentary with tags , on December 3, 2022 by itnerd

This week it came to light that Eufy has been lying about the security of their cameras. That’s not a surprise to me as when I reviewed their cameras last year, they were dealing with similar issue where users could see other people’s cameras without any effort. The issue was corrected quickly. But it wasn’t the first time something like this has happened.

Now in case you didn’t want to read any of that, here’s the TL:DR (too long, didn’t read) on this: Eufy’s cameras aren’t as secure as they have claimed for years. Threat actors with the right information can watch video from your Eufy camera. If that’s not bad enough, Eufy also uploads some data to the cloud that customers were previously unaware of. Now the company has issued an apology and has updated its product language in the Eufy app to better clarify which settings will trigger a cloud upload. Though, in a bizarre twist, Eufy issued a second statement on December 2 that from a PR and customer confidence standpoint sucks:

“eufy Security adamantly disagrees with the accusations levied against the company concerning the security of our products. However, we understand that the recent events may have caused concern for some users. We frequently review and test our security features and encourage feedback from the broader security industry to ensure we address all credible security vulnerabilities. If a credible vulnerability is identified, we take the necessary actions to correct it. In addition, we comply with all appropriate regulatory bodies in the markets where our products are sold. Finally, we encourage users to contact our dedicated customer support team with questions.”

Now where I sit, I can’t say if Eufy is just lazy when it comes to security, or if they are trying to do something nefarious. But seeing as they are a Chinese company, issues like these have to be treated with some degree of extra suspicion. And seeing as this has happened more than once, I think we’re at a point where retailers should not only stop selling their gear, but I would argue that governments should ban this company from being able to sell their gear. Just like Huawei has been banned from many telcom networks.

Eufy keeps saying that that they will do better going forward. But we’re not seeing evidence of that seeing as this keeps happening. At this point I am through giving them chances. And so should governments around the world because there is no way that this sort of behavior by Eufy should be tolerated. A ban will send the message to Eufy and others that they need to talk the talk and walk the walk when it comes to security. Plus if Eufy or others really want to have the confidence of consumers, they need to have their claims validated by a third party. But I suspect that Eufy won’t subject themselves to that level of scrutiny. Thus they need to be banned. And the sooner the better.

Now if you ask me what you should do if you have an Eufy camera? My advice would be to rip them out because your privacy and security is invaluable. That is true for both indoor cameras and outdoor ones too. I would even go as far as to say that you shouldn’t even resell them as you’re just passing along a major problem to someone else which is not fair on that person. My advice is to recycle them at your local electronics recycling facility and take these security and privacy nightmares out of circulation forever.

Finally, if Eufy is reading this, I have to say that you’ve created this mess and it’s way too late for you to say sorry for it. Consumers put a lot of trust in the vendors of this sort of gear and you’ve burned through that trust. And since you can’t fix your issues, hopefully governments around the world will fix it for you by banning you out of existence.

Game over Eufy.

BlackFog Releses The State of Ransomware For November 2022

Posted in Commentary with tags on December 2, 2022 by itnerd

BlackFog today released the November State of Ransomware Report. Key findings for the month of November from Dr. Darren Williams, CEO and Founder, BlackFog:

  • “Unusually, November saw the second highest number of ransomware attacks this year, a 180% increase year over year with a total of 42 attacks. There seems to be no end in sight, with recent insurance statistics demonstrating a general lack of preparedness. In fact, providers are now mandating more serious levels of protection before underwriting any new cybersecurity policy.
  • The biggest changes this month saw the persistent use of data exfiltration at 89% and a further increase in the use of PowerShell, now utilized in 86% of all attacks.
  • The greatest increases by industry involved Healthcare and Manufacturing with increases of 26% and 25% respectively. Smaller increases were observed in Education and Government, with 14% and 13% respectively, but continue to be the most targeted industries. Typically, these organizations struggle due to financial and skill shortages (please refer to BlackFog’s latest research article @ https://www.blackfog.com/cybersecurity-leaders-consider-quitting/). 
  • LockBit easily took the lead this month in terms of variants with a 33% increase in successful attacks followed by BlackByte and BlackCat with increases of 25% and 14% respectively.”

Today’s full report can be found here: https://privacy.blackfog.com/wp-content/uploads/2022/12/BlackFogRansomwareReport-Nov-2022.pdf