As noted in this article, “a security researcher has disclosed a new flaw that undermines a core macOS security feature designed to prevent apps, or malware, from accessing a user’s private data, webcam or microphone without their explicit permission.” Recent privacy protections, expanded in the Mojave version of the Macintosh operating system, were meant to make it more difficult for malicious apps to get access to the user’s private information, unless the user allows access through a pop-up dialog.
However, these protections weren’t as good as Apple previously believed. This bug is the result of a whitelist of approved applications that are allowed to create “synthetic clicks” to prevent them from breaking. This includes the popular video playing application VLC, which the researcher showed could access a user’s camera, microphone, and other Macintosh computer services, through a plug-in that performed malicious actions.
This is a reminder that users should be aware anytime an application asks for permission to download and/or load additional software. In this case, any application that requires a download and installation of a plug-in would require closer scrutiny. This is especially true for anyone who attempts to access files through something like torrent services, which could potentially request to download a plug-in to view the downloaded file (or else the file that is downloaded through the torrent file could also be a payload with malicious intent, even if not requiring a plug-in).
If you’d like to discuss further, please let us know!
It is becoming more and more popular for a user to be on a mobile device and receive pop-up windows or be otherwise directed to a site to indicate that you’ve been hacked or are being tracked, and the solutions is to install a VPN (Virtual Private Network) application. A VPN allows the user to connect to another public IP in order to mask their current IP, and encrypt data sent.
With these pop-up redirect ads, what is occurring is that various VPN providers provide affiliate programs, where individuals are compensated for driving traffic to the VPN provider. These individuals create scare-tactic ads that promote users install the VPN application, and in return, the affiliate marketer receives compensation in exchange.
As the article states, if you receive one of these warnings, just close the page. If you are having issues closing the page, close your web browser. Upon re-opening the browser, attempt to close the page if it still exists. Also, closing the page that prompted the redirection is also advised, to prevent further issues. Also, NEVER install any applications being promoted on these sites, as they could install any variety of malware onto your device.
Please let us know if you have questions or would like to discuss setting up a more secure VPN into your computing environment!
An intruder into Donald Trump’s Mar-a-Lago private club had, amongst several other pieces of technology such as cell phones, a thumb drive that could apparently immediately begin installing files onto a computer when plugged in, per the U.S. Secret Service. They indicated that this is very out of the ordinary, as detailed in this story.
A few interesting aspects of this story, in relation to thumb drives as well as other hardware and security. The first is that thumb drives (aka flash drives) are very popular, primarily because of their ease of use: they are an easy way to get programs and files from one computer to another. Because of this, they’re also easy to use to get malicious software onto a computer. This leads to the second and most important point: it is wise to not plug-in thumb drives without positively knowing their source and potential side effects. On this point, it’s a bit alarming that the Secret Service agent didn’t follow this point when they plugged it into their work computer.
The lesson to be gained from the linked article is that employers should not allow their employees to plug-in items such as thumb drives into their computers, or at the very least have security software which prevents the mounting of this type of hardware when it is plugged in.
In addition to being wary of thumb drives, other insecure types of hardware purchased off of sites such as eBay should give a user pause, whether the hardware has been previously used or not. Used hardware always has the potential of having been tampered with, from both a hardware and installed software perspective. For example, users could be spied on through a laptop’s camera, or their keystrokes captured through a hidden keylogger program.
In the realm of “new” hardware, what one person may think is new may actually not be. New hardware should always come in a factory sealed box with a security sticker. Of course, it is possible that this could be faked, but it is much less likely, especially when purchased direct from the Manufacturer.