|
22 Eargesplitten posted:Are we not supposed to use a password manager anymore? Is that what the SmartLock thing was? Because my Keepass2Android is no longer finding the Keepass database file, despite the sync program finding it. Or is Keepass2Android broken now? 1) What, no, please use a password manager 2) Smart Lock is the Android location or Bluetooth based unlock mechanism 3) It's not broken, it works fine for me, no idea what your issue is. I use mine from Google Drive.
|
# ? May 7, 2017 22:00 |
|
|
# ? May 23, 2024 15:24 |
|
Okay, good. I use mine locally, synced between devices on my home network. I'll try deleting the copy on my phone and re-syncing, maybe it got corrupted.
|
# ? May 7, 2017 22:32 |
|
CLAM DOWN posted:2) Smart Lock is the Android location or Bluetooth based unlock mechanism
|
# ? May 8, 2017 00:49 |
|
apseudonym posted:No that's smart unlock, smart lock is basically a password manager. GD it, sorry, too similarly named
|
# ? May 8, 2017 01:29 |
|
2017 Verizon Data Breach Report is out, it's usually pretty interesting http://www.verizonenterprise.com/resources/reports/rp_DBIR_2017_Report_en_xg.pdf
|
# ? May 8, 2017 22:08 |
|
I wonder if the prevalence of online patient info sites increases or decreases breaches from misdelivery re healthcare. Also never allow employees to use email.
|
# ? May 9, 2017 03:26 |
|
seems to be this? https://twitter.com/taviso/status/861747942314487809
|
# ? May 9, 2017 04:19 |
|
andrew smash posted:seems to be this?
|
# ? May 9, 2017 04:26 |
|
andrew smash posted:seems to be this? I love this part: quote:NScript is the component of mpengine that evaluates any filesystem or network activity that looks like JavaScript. To be clear, this is an unsandboxed and highly privileged JavaScript interpreter that is used to evaluate untrusted code, by default on all modern Windows systems. This is as surprising as it sounds.
|
# ? May 9, 2017 04:32 |
|
Antivirus: not even once. ETA: https://twitter.com/FAANews/status/861697994323787776 Absurd Alhazred fucked around with this message at 05:13 on May 9, 2017 |
# ? May 9, 2017 04:35 |
|
CLAM DOWN posted:I love this part:
|
# ? May 9, 2017 05:34 |
|
What do I win?
|
# ? May 9, 2017 07:46 |
|
MS already released the out of band patch. Nice response. https://twitter.com/msftsecresponse/status/861734360193552385
|
# ? May 9, 2017 12:51 |
|
It is also the stupidest thing I've seen in a while.
|
# ? May 9, 2017 14:42 |
|
So what's the right way of handling secrets these days? I have a couple dozen VMs and they all need encryption keys, database credentials, API keys etc. Right now it's all in /etc directories and files with rigid permissions, managed by ansible. It works, but it feels like a disaster waiting to happen.
|
# ? May 9, 2017 16:33 |
|
a witch posted:So what's the right way of handling secrets these days? I have a couple dozen VMs and they all need encryption keys, database credentials, API keys etc.
|
# ? May 9, 2017 17:03 |
|
Yup, Vault seems to have a lot of the mindshare in that space lately. I had to look into this semi recently myself (in a "likes to use open source, is cloud hosted" context, FWIW) and threw a bunch of bookmarks into Pinboard: https://pinboard.in/u:bitprophet/t:secretsmanagement Some of those are articles or adjacent resources; I'd say the big names to look into are Vault, Torus, Keywhiz, Cerberus, or $CLOUD_PROVIDER_SOLUTION if you're on a single cloud, like Amazon's KMS (which has dozens of projects built on it or can be used directly.) I haven't gotten super deep into Vault yet, practically speaking, but what I have used has been pretty solid and I like a lot of the overall design, the number of secrets backends, etc. It definitely seems like the solution to beat if it fits your parameters.
|
# ? May 10, 2017 00:32 |
|
Have an HP laptop with a Conexant audio device? How do you feel about having all of your keystrokes logged to disk?quote:Conexant's MicTray64.exe is installed with the Conexant audio driver package and registered as a Microsoft Scheduled Task to run after each user login. The program monitors all keystrokes made by the user to capture and react to functions such as microphone mute/unmute keys/hotkeys. Monitoring of keystrokes is added by implementing a low- level keyboard input hook [1] function that is installed by calling SetwindowsHookEx(). Sheep fucked around with this message at 14:20 on May 11, 2017 |
# ? May 11, 2017 14:17 |
|
|
# ? May 11, 2017 14:22 |
|
I don't know if this is the right thread for this, but I'm stuck on a problem. I have some binary blobs which are encoded in some way, but I can't tell how. Looking at the hexdump of one of them, it seems to be an ASCII representation of hex values. code:
One possible hint is that 0x4a4d4c represents JML in ASCII, but I haven't found anything from there.
|
# ? May 11, 2017 16:47 |
|
Sheep posted:Have an HP laptop with a Conexant audio device? How do you feel about having all of your keystrokes logged to disk? I always wish I could talk to the people who implemented these stupid things and find out what the hell they were thinking.
|
# ? May 11, 2017 18:14 |
|
Thermopyle posted:I always wish I could talk to the people who implemented these stupid things and find out what the hell they were thinking. "We need to get this thing out yesterday and they're not paying us to do anything after it's feature complete" mostly
|
# ? May 11, 2017 18:23 |
|
Thermopyle posted:I always wish I could talk to the people who implemented these stupid things and find out what the hell they were thinking. "Meets specs, ship it"
|
# ? May 11, 2017 18:25 |
|
Volmarias posted:"We need to get this thing out yesterday and they're not paying us to do anything after it's feature complete" mostly This is exactly right. Crunch time means the project manager will look for the easy and really lovely implementation to get them across the finish line. Here's another example where a car insurance company decided to not have authentication in really dangerous API calls. https://www.andreascarpino.it/posts/how-my-car-insurance-exposed-my-position.html
|
# ? May 11, 2017 18:28 |
|
As long as we agree that every single person involved should be fired out of a cannon into the sun.
|
# ? May 11, 2017 18:48 |
|
edit: wrong thread
SeaborneClink fucked around with this message at 21:19 on May 11, 2017 |
# ? May 11, 2017 19:48 |
|
EVIL Gibson posted:This is exactly right. Crunch time means the project manager will look for the easy and really lovely implementation to get them across the finish line. I hope someday a law will make this a crime. Security should not be an afterthought.
|
# ? May 12, 2017 07:02 |
|
So, Trump actually did something good with this new EO. We can discuss whether or not the man even knows what he's signing off on, but bottom line, this is a good move. The EO strengthens US cybersecurity and holds LEAs accountable for risk management. https://techcrunch.com/2017/05/11/trump-signs-long-delayed-executive-order-on-cybersecurity/
|
# ? May 12, 2017 15:34 |
|
Most of the EO looks good and strengthening standards at the federal level will cascade in to a bunch of different sectors that work with them so it should shore things up quite well. The standard they use for Critical Infrastructure is from 2001 and rather vague so I expect either it will get reworded or all the agencies will re-assess what constitutes Critical Infrastructure and a lot more things are going to come under some kind of scrutiny *cough* SCADA *cough* This bit though: quote:(b) Deterrence and Protection . Within 90 days of the date of this order, the Secretary of State, the Secretary of the Treasury, the Secretary of Defense, the Attorney General, the Secretary of Commerce, the Secretary of Homeland Security, and the United States Trade Representative, in coordination with the Director of National Intelligence, shall jointly submit a report to the President, through the Assistant to the President for National Security Affairs and the Assistant to the President for Homeland Security and Counterterrorism, on the Nation's strategic options for deterring adversaries and better protecting the American people from cyber threats. could have unintentional consequences resulting in legal reprisal mechanisms for people who do security research and disclosures which scares me.
|
# ? May 12, 2017 17:43 |
|
BangersInMyKnickers posted:Most of the EO looks good and strengthening standards at the federal level will cascade in to a bunch of different sectors that work with them so it should shore things up quite well. The standard they use for Critical Infrastructure is from 2001 and rather vague so I expect either it will get reworded or all the agencies will re-assess what constitutes Critical Infrastructure and a lot more things are going to come under some kind of scrutiny *cough* SCADA *cough* You think so? Even with all of the new bug bounty programs that even the DoD is starting to implement?
|
# ? May 12, 2017 18:08 |
|
BangersInMyKnickers posted:Most of the EO looks good and strengthening standards at the federal level will cascade in to a bunch of different sectors that work with them so it should shore things up quite well. The standard they use for Critical Infrastructure is from 2001 and rather vague so I expect either it will get reworded or all the agencies will re-assess what constitutes Critical Infrastructure and a lot more things are going to come under some kind of scrutiny *cough* SCADA *cough* That's just telling people send him a report, wait until something real is proposed to be scared.
|
# ? May 12, 2017 18:09 |
|
Requesting the report indicates they plan on doing something. Our government loves reprisals on whistleblowers, we have a long history of it. There's plenty to be concerned about right now.
|
# ? May 12, 2017 18:48 |
|
We are currently evaluating Filecloud (https://www.getfilecloud.com/) as a method to share files with external users. They offer an on prem version and a hosted version, we're testing the hosted version. Guess who just discovered that you can go through the entire login process as a user without seeing https anywhere.
|
# ? May 12, 2017 21:19 |
|
If anyone needs a list of hashes for the WannaCry / Wcry going around right now so you can block your endpoints from executing, links below. https://gist.github.com/Blevene/42bed05ecb51c1ca0edf846c0153974a https://isc.sans.edu/forums/diary/Massive+wave+of+ransomware+ongoing/22412/
|
# ? May 12, 2017 21:23 |
|
Who is the person in the GitHub link? We're a bit wary of shooting down hashes from some random GitHub post when I can't even find a corresponding twitter feed.
|
# ? May 12, 2017 22:03 |
|
Is there anything in these ransomware payloads in general that would prevent multiple machines from encrypting the same network shares, requiring decryption in the reverse order to get the data back?
|
# ? May 12, 2017 22:04 |
|
BangersInMyKnickers posted:Who is the person in the GitHub link? We're a bit wary of shooting down hashes from some random GitHub post when I can't even find a corresponding twitter feed. Pulled it from: https://twitter.com/malwrhunterteam?lang=en if you search the page for "md5" the gist link will come up.
|
# ? May 12, 2017 22:41 |
|
This is what they get for running XP and not patching systems, what are the chances this will be a wakeup call? (answer: zero)
|
# ? May 13, 2017 00:44 |
|
Holy poo poo https://twitter.com/josephfcox/status/863171107217563648
|
# ? May 13, 2017 00:46 |
|
|
# ? May 23, 2024 15:24 |
|
|
# ? May 13, 2017 00:47 |