Tech News

Samsung patches multiple SmartThings Hub security flaws

July 28, 2018 — by Engadget.com0


Samsung’s SmartThings hub suffered from 20 vulnerabilities that could have allowed attackers to control the internet-of-things devices connected to it. Thankfully, security intelligence firm Cisco Talos discovered the flaws and worked with the Korean company to resolve the issues, allowing Samsung to release a firmware update that patches them for all affected customers. Talos admits in its report that some of the vulnerabilities would’ve been difficult to exploit, but attackers can combine several at once to launch a “significant attack on the device.”

While the hub may not have access to credit card and bank account numbers, hackers could have taken advantage of the flaws to disable smart locks and gain physical entry to people’s homes, for instance, or to take command of nanny cams and CCTVs to monitor a house’s occupants or an establishment’s activities. They could’ve used the flaws to disable motion and alarm systems or even to damage appliances connected to the hub.

Despite the multiple vulnerabilities, Talos praised the company for working to resolve the situation after being informed. Craig Williams, Director of Cisco Talos Outreach, told ZDNet that Samsung “did a lot of things right and should be commended for the way [it] designed [its] devices to be easily updated.” He added “Every piece of software from every vendor has bugs if you look closely enough.” A Samsung spokesperson also told the publication that it had already released an automatic update to fix all the flaws Talos found and “all active SmartThings Hub V2 devices in the market are updated to date.”

Gaming News

How to Make Your Wifi Router as Secure as Possible

July 18, 2018 — by Kotaku.com0

Though more router manufacturers are making routers easier to set up and configure—even via handy little apps instead of annoying web-based interfaces—most people probably don’t tweak many options after purchasing a new router. They log in, change the name and passwords for their wifi networks, and call it a day.

While that gets you up and running with (hopefully) speedy wireless connectivity, and the odds are decent that your neighbor or some random evil Internet person isn’t trying to hack into your router, there’s still a lot more you can do to boost the security of your router (and home network).


Before we get into our tips, one quick caveat: Wireless routers all have different interfaces, different ways they name their settings, and different settings you can adjust. For this article, I’ll be poking around the interface of a TP-Link Archer C7. You’ll want to explore around your router’s web-based configuration screen (or app) to make sure you’ve adjusted all the right settings, but it’s possible you won’t be able to do everything we’ve detailed below.

Accessing your router’s settings

If your router doesn’t have an easy-to-use app for configuring its settings—like what you typically encounter when buying a mesh-networking system—you’ll probably access its settings by pulling up a web browser (on a device that’s connected to your router) and typing in your router’s IP address:

  • On a Windows system, pull up the command prompt and type in ipconfig. The IP address that’s listed as your default gateway is likely your router’s IP address.
  • If you’re on a Mac, pull up System Preferences > Network, and click on Advanced in the bottom-right corner. Click on the TCP/IP option toward the top of the next window and look for your router’s IP address.
  • If you’re on your iPhone, tap on Settings, then Wi-Fi, and tap on the “i” icon next to the wifi network you’re connected to. Your router’s IP address should be listed right there.


Step One: Update your firmware

Some routers bury firmware updates deep in their settings menus; some might even notify you about a new firmware update the moment you log into their apps or web-based user interfaces. However you find the option, you’re going to want to make sure that your router is running the most up-to-date firmware.

If you’re lucky, your router will be able to download new firmware updates directly from its manufacturer. You might have to click on a button (or two) to start this process, or this might happen automatically—routers that do the latter are great, because most people don’t really think about “checking to see if my favorite tech gear has updated firmware” on a regular basis, if ever.


Screenshot: David Murphy

It’s also possible that your router will require you to upload new firmware yourself. If so, you’ll have to download the right firmware from the router’s manufacturer—likely on a support page for your router—and manually update the router by browsing for this firmware file and starting the update process yourself. You’ll have to do this each time you want to update your router with new firmware, which means you’ll have to check for new firmware fairly regularly, perhaps a few times a year. It’s a laborious process that’s easily forgotten, but it’s also important if you want to keep your router protected from external threats.

Change your router login and password

If you’re still using “admin / admin,” “admin / password,” or some variant of generic words to log into your router, change that. Even if your router manufacturer has given you a quirkier password that presumably differs for everybody, it’s important to use a login and password that’s tough to guess or brute-force.


Screenshot: David Murphy

Even if you’re stuck using “admin” as a user name to log in, make your password something complex, not something anyone can look up via a quick web search.

Use WPA2 to secure your wireless network

It almost goes without saying, but don’t use WEP when you’re setting up a password for your wifi network. Passwords “protected” with the WEP encryption are a lot easier to brute-force attack than those encrypted with WPA2. Even though you probably don’t have someone hanging out on your street corner, wardriving everyone’s wireless networks, there’s no reason to not use the stronger WPA2 protocol—unless you have an old device that simply can’t handle WPA2, which is unlikely. And whatever you do, don’t run an open (password-free) wifi network. My god.


Screenshot: David Murphy

Turn off WPS

On paper, WPS—or Wi-Fi Protected Setup—sounds great. Instead of having to type in a long, reasonably complex wifi password on a device, you can just type in a smaller PIN number, likely printed directly on your router.


Guess what? These PIN numbers are much easier to brute-force attack than a more complicated password or passphrase. While a number of routers will time out an attacker after they botch a certain number of password attempts, that hasn’t stopped more ingenious WPS attacks from surfacing. The easiest way to prevent these kinds of shenanigans is to just disable WPS entirely.

Yes, you’ll have to type in your password. Yes, it’ll be annoying. It’s an extra minute of your life. You’ll be fine. Or, if you truly cannot handle this process, check to see if your router allows you to use push-button WPS instead of PIN-based WPS. That way, you’ll have to physically press buttons on your router and any devices you want to connect, which will make it a lot trickier for someone to exploit WPS and break into your network.


Use a better DNS

Browse the web a little bit faster by switching away from your ISP’s DNS and using a service like Google DNS, Cloudflare, or OpenDNS. As an added bonus, you’ll also increase the likelihood that you actually make it to the websites you’re trying to visit without any man-in-the-middle attacks, popups, redirects, interstitials, or annoying “you made a typo in your web address so we’re going to redirect you to a webpage filled with spam and ads” that your ISP might use.

If you want to get really crafty, you can drop a service like OpenDNS on your kid’s laptop, enable parental controls to keep them off time-sucking websites like Tumblr and Reddit, and give yourself a different DNS provider (like Google DNS) to browse the web without any restrictions. Your child will hate you, but at least they’ll turn out to be a rocket scientist with 27 inventions instead of a Twitch streamer with 3 followers.


Screenshot: David Murphy

Consider using MAC filtering, annoying as it might get

While it’s easy for an attacker to spoof a MAC address, you can at least give yourself a little extra security by setting up your router to only allow devices to connect that appear on a whitelist. This filtering is based on each device’s MAC address—a long string of letters and numbers that looks something like “00-11-22-33-44-55.”


Screenshot: David Murphy

While this means that you’ll need to go in and add any new devices you purchase whenever you want them to be able to connect to your router, it also means that devices you don’t authorize won’t be able to do squat. Like I said, though, MAC addresses are easy to spoof, so if this tip gets more annoying than practical, feel free to disable MAC filtering. You’ll be OK.

Consider scheduling your wifi

If you work a pretty normal schedule during the week and you have no reason to remotely connect to your home devices, consider using your router’s scheduling mechanism—if it has one—to just turn off your wifi when you aren’t home.


This isn’t the most practical tip if you have a bunch of smarthome devices that need the Internet, like if you want to be able to turn the lights on and off to piss off your cat or you want to be able to watch a delivery driver drop off the expensive package you ordered. If you live a relatively simple life—no harm there—and nothing really needs Internet connectivity when you aren’t around, then why power up your wifi for no reason? It’s hard to hack into a network that doesn’t exist.

Disable potentially sketchy services

You probably don’t need to mess with your router’s settings when you aren’t actively connected to your wireless network. If your router has some kind of an option for “remote management” or “remote administration” make sure it’s disabled.


Screenshot: David Murphy

You should also consider disabling UPnP on your router, although this might give you a little grief when you’re gaming or running BitTorrent—to name two examples. Still, when an entire website is dedicated to the various ways one can exploit UPnP for nefarious purposes … maybe it’s time to go back to manually forwarding ports, if needed.

Some routers also let you set up an FTP server so you can transfer files in and out of your network. However, we live in an era when it’s easy to use any number of cloud storage providers—or file-uploading services—to share your files. You probably don’t need to run an FTP at home, and it’s a lot safer to disable this feature entirely (if your router supports it).


You also likely don’t need to access your router over SSH or Telnet—turn either off, if offered—nor do you probably need to access any USB-connected printers or storage when you aren’t at home. In short, if your router lets you do something from afar, consider turning the feature off (if you can). The fewer ways you can access your home network when you aren’t in it, the harder it’ll be for someone else to take advantage of a vulnerability and access your router (or your home network).

If you can, consider disabling your router’s cloud functionality as well. While it might be useful to be able to edit your router’s settings by logging into the manufacturer’s cloud service, it’s just one more open door that an attacker could use to compromise your router (or network). While you have no choice with some routers—typically mesh routers—it’s always better, and safer, to log into a router’s web-based UI manually from a device that’s connected to your home network, even though it’s a lot less convenient.

Consider a separate wifi network for guests and smart-home devices

I’ve been playing, testing, and reviewing routers for more than a decade, and I still have yet to meet someone who uses their router’s guest network feature. Heck, I don’t think I’ve ever even connected to a friend’s “guest network” in their home or apartment.


Still, the premise of a guest network is great, security-wise: Your router automatically sets up a second SSID for friends to use, and any device connecting to it is walled off from other devices on your primary network, either plugged into your router directly or connected wirelessly. (Most routers let you adjust whether you want guests to see everything, each other, or nothing, if you need to customize your setup a bit.)

A guest network comes with an added bonus, too; you can use it for all of your less-secure smart-home devices. If someone takes advantage of a vulnerability in your smart lightbulb and breaks into your network, there will still be a layer of protection between your hacked device and your desktop PC, smartphone, and laptop—to name a few examples. While you can also get crazy and segment off your network with separate SSIDs and VLANs, if your router supports it, this is an easier method that won’t give you a weekend’s worth of headaches (if you don’t know what you’re doing).


Tech News

Permanent LTE exploits steer users to rogue websites

July 1, 2018 — by Engadget.com0

Daniel Acker/Bloomberg via Getty Images

LTE was theoretically supposed to fix the security holes baked into earlier wireless standards, but it isn’t completely immune. An international team of researchers has discovered a attack methods (nicknamed aLTEr) that takes advantage of inherent flaws in LTE to direct users to hostile websites. An active exploit uses the lack of integrity checks in LTE’s lower layers to modify the text inside a data packet. Since that’s easy to determine with DNS packets, which direct traffic to website addresses, you can steer requests to malicious DNS servers and thus take the user to a website of your choice.

A passive attack, meanwhile, uses a sniffing device near the user to intercept leaked info about a user’s LTE data transmissions (when and how much data they use, for instance) and compares those to data ‘fingerprints’ for popular websites. If there’s a match, you know where they’re going despite encryption ostensibly keeping the destination a secret.

These attacks aren’t exactly trivial. You need to be physically close to your target, and sniffing hardware isn’t cheap (Ars Technica places the cost at roughly $4,000). Whoever uses the attacks will likely be either a committed thief or a surveillance agency. The problem, as you might have gathered, is that you can’t patch against this. Your best bet is to only visit sites using HTTP Strict Transport Security or DNS Security extensions, and that isn’t always easy. Although the like of facing an attack isn’t that high, there might not be a permanent solution until you’re using 5G.

[embedded content]

Tech News

Google will fix Home and Chromecast bug that reveals your location

June 18, 2018 — by Engadget.com0

Chris Velazco/Engadget

Don’t look now, but your Google Home speaker or Chromecast could give away your whereabouts… for a little while, that is. Google has promised a fix for an authentication vulnerability that lets attackers obtain your location using the company’s devices as a conduit. While the necessary Home app on your phone normally performs most tasks through Google’s cloud services, others (such as setting a device name and WiFi connection) are sent directly to the Home or Chromecast without authentication. If you use domain name system rebinding software, you can exploit this to obtain nearby wireless networks and use Google’s location lookup services to obtain a position to an accuracy of a few feet.

An intruder doesn’t need to be connected to your local network — they just need to prompt you to open a link while you’re connected to the same network as one of Google’s affected devices. You also need to keep that link open for roughly a minute (the amount of time it takes to get a location), but that’s not necessarily difficult if there’s enough content to distract the target.

The fix is expected to arrive in mid-July. In the meantime, though, there’s a risk this could be used to add seeming legitimacy to phishing and extortion campaigns. A scammer could target you by focusing on your exact address or neighborhood, for instance, while a blackmailer could find out where you live and use that as part of a threat to release private info. No matter what, this is a reminder that smart home gadgets still have a long way to go before they’re truly secure. You have to assume that even mildly sensitive info transmitted in the clear can serve as an avenue for attack, and Google has learned that lesson the hard way.

[embedded content]

PC News and Reviews

Intel Processors Vulnerable Again, Hit by “Lazy FP State Restore” Vulnerability

June 14, 2018 — by ThinkComputers.org0


It looks like Intel processors are vulnerable again as security researchers have discovered a vulnerability that is affecting all modern Core and Xeon processors. This is an exploit of a performance optimization feature called “lazy FP state restore,” which when exploited to sniff out sensitive information, including cryptographic keys used to protect sensitive data. All x86 micro-architectures by Intel from “Sandy Bridge” and later are vulnerable.

The “lazy FP state restore” feature is used to temporarily restore or store the FPU states of applications running “lazily” (opposed to “eagerly”). Red Hat has put out an advisory that numbers held in FPU registers could be used to access sensitive information about the activities of other applications, including encryption keys.

Intel has started to work with popular OS vendors to quickly roll out software patches against this vulnerability.


Tech News

Frontier Communications' password bug lets anyone into your account

June 8, 2018 — by Engadget.com0


Frontier Communications

While you might feel more at ease knowing your personal information is protected by two-factor authentication, a bug in Frontier’s password reset system is demonstrating that vulnerabilities can open your info up to exposure even when that extra level of protection is available. The internet giant’s password system sends users a two-factor code when they initiate a reset, but ZDNet reports that the system lets you enter as many codes as you want, opening up users’ accounts to a breach. Spotted by security researcher Ryan Stevenson, the bug means a determined attacker with some time on their hands could get into an account with just a username or an email address.

Stevenson demonstrated the vulnerability on a test account he set up, automating a process that sent code after code to the browser until the right one was selected. That code then let him reset the account password. Based on his demonstration, it would take around a day to try out every possible code with Stevenson’s set up, but he says it could probably happen more quickly with a faster connection.

Frontier told ZDNet that it’s investigating the issue. “Out of an abundance of caution while the matter is being investigated, Frontier has shut down the functionality of changing a customer’s password via the web,” a company spokesperson said.

Image: Frontier Communications