Changes

From Security Weekly Wiki
Jump to navigationJump to search
1,853 bytes added ,  16:33, 26 June 2014
== Larry's Stories ==
#[https://twitter.com/DIYDroneSafety/status/481815902531231745/photo/1 - WiFi Anyone?] - [Larry] - Why does this keep happening? World Cup “corporate WiFi’ PSK shown on whiteboard in press picture. Really, stop writing this stuff down in plain sight, and then packing pictures for the media. Loose lips sink ships. This is not the first time we’ve seen this happen…Wildfire support FTP servers, wifi networks for press at baseball games...
#[https://www.duosecurity.com/blog/duo-security-researchers-uncover-bypass-of-paypal-s-two-factor-authentication Paypal Mobile 2FA bypass] - [Larry] - nice write up and research by @quine and compadres at Duo Security into the investigation of the Paypal Mobile app. If your Paypal account is set up for 2FA, you can’t use the mobile app as it is unsupported….unless you burp it and set the flag for 2FA to false, then it chugs along just fine, including the ability to re-use session tokens to authorize multiple transactions. PayPal has not completely fixed the issue, but they have made it non-trivial to exploit.
#[http://www.engadget.com/2014/06/25/ipad-PIN-snooping/?ncid=rss_truncated recovering iDevice device PINs] - [Larry] - and not how you’d think. This one uses a video recording, and analysis of hand motions. Of course camera angle and quality increased the recovery rate, use of a low quality Google Glass camera and 3meter distance, the recovery rate was still as high as 83% for a 4 digit pin. A good camera? 100% success rate at up to 44 meters (yeah, nearly 150 feet).
#[http://www.f-secure.com/weblog/archives/00002719.html Heathrow Express WiFi TOS] - [Larry] - Love it. Includes notification that HEX and others can monitor traffic, and that the user is responsible for their own security (or lack thereof). I wonder how many people actually read these things...
== Jack's Stories ==

Navigation menu