Intel Kernel Security Flaw: You might lose up to 30% performance…

A terrible start for 2018 and Intel. A security flaw was discovered in Intel hardware, and the fix could be VERY costly. Depending on what processor is in your computer, you might see performance losses anywhere from 5% to 30%. Yikes. And yes, even you Mac users will be affected. Here’s the scoop on Intel’s Kernel Security flaw. Pretty sure my next PC build will be an AMD…

*** UPDATE ***

Intel press release acknowledging the issue.
Google press release detailing affected products
.
AMD press release explaining why AMD CPU’s aren’t affected the same way.

ARM official response to exploit on mobile processors.

Continue reading “Intel Kernel Security Flaw: You might lose up to 30% performance…”

Microsoft Security Software Will Now Remove ASK Toolbar and Search Hijacking

It’s kinda sad how far ASK has fallen. From the cute Ask Jeeves to now being considered malware by Microsoft.

And with good reason. The Ask toolbar is an insidious little piece of software which hijacks your search options and adds an ugly bar to your browser.  I once reinstalled an OS just to completely rid a system of browser add ons, of which Ask was one.

java-ask-toolbar-installationIt’s exceedingly rare to find knowledgeable computer users who intentionally use it. That was likely Ask’s problem. Not enough people using their search engine, so they partnered with other companies to try and sneak their software onto your computer. The frustration of clicking through a program installation, and having to pay close attention to make sure no crapware is included.

Thankfully Microsoft Security Software will now scan for and remove search hijacks like these. It’s a long overdue move, but a welcome one. Microsoft’s free security software is actually quite good, and this makes it a little better at helping users with a very common security concern.

(via Microsoft Protection Center)

Twitch Encouraging Users to Change Passwords After “Unauthorized Activity” Detected

twitch logoNot a lot of info on this one just yet, as the story is just breaking, but if you use the game streaming service Twitch, you might want to switch out your password.

A very brief announcement on the Twitch Blog, describes some “unauthorized activity” was discovered, and as a safety precaution, they’ve disabled accounts and sync to Twitter  and Youtube. You can read the full press release below.

Continue reading “Twitch Encouraging Users to Change Passwords After “Unauthorized Activity” Detected”

Lenovo Publishes SuperFish Removal Instructions with Removal Tool

superfish lenovo removalSuperFish has been an ugly security black mark for Lenovo. It’s often been a criticism in my reviews of their gear that they include too much “value added” software (bloat), and removing a lot of it will noticeably improve system performance.

SuperFish however was a piece of adware. If a Lenovo owner opted into the “service”, SuperFish would analyze images and searches to insert ads for similar products and to do cost comparisons. While that doesn’t sound terrible, behind the scenes SuperFish would install its own security certificates which allowed the service to intercept encrypted traffic.

It’s doubtful that Lenovo or SuperFish seriously wanted to peek in on your private and secured data, but such a gaping hole could easily have been exploited by another attacker.

Lenovo detailed that this adware package was only installed on consumer systems, not on Thinkpads and business systems. Today they’ve published details on removing the service, and they’ve released an app to aid in the removal.

Click here for more info on SuperFish and how to remove it.

Android Device Manager now a Standalone App: Locate Lost Phones, Reset Passcode, Remote Wipe Data

android device manager on google play app protection remote lock wipe screenshotBabysteps people…

I still find supremely frustrating that we don’t have a kill switch option on our phones. A self destruct setting. Something that would make our glowing rectangles FAR less attractive to thieves. In the meantime, services like this help move us in the right direction.

Android Device Manager was built into newer releases of the Android OS, but that didn’t help folks on OLDER versions of Android. Now you can grab it as a standalone app, and that makes me really happy. Again, we’re seeing Google side step manufacturers and carriers which aren’t updating older phones, and offering more of their OS services as standalone apss they can update and control. Wise move.

Android Device Manager allows you to track a lost phone, reset your password, and in the event you can not retrieve the device you can wipe it out to prevent your data falling in the wrong hands. We still don’t have a hard lock/brick setting, but at least we have better, officially supported tools to protect our Android phones and tablets.

Go get at folks. It’s compatible with Android 2.3 and newer models!
Data and device security is something we should all be on top of.

Android Device Manager on Google Play

Review: Kingston DataTraveler 6000 – Hardcore Military-Grade Encryption for your USB Flash Drive

Kingston datatraveler 6000 review somegadgetguy encrypted usb flash driveThis little guy is pretty brutal.

I used to work for a company which sold gear to Department of Energy facilities, and we dealt with a number of products designed for data protection. In this day and age though, I think we’re all getting a little more concerned with our data security. Honestly a little digital paranoia might not be such a bad thing come to think of it.

Let’s take a quick look at a USB Flash drive from Kingston which aims to lock down your information and protect it from any prying eyes should it fall into the wrong hands.

More info on Kingston Drives: http://www.kingston.com
The DataTraveler 6000 on Amazon

Interview: Talking External Hard Drives with ioSafe CEO Rob Moore – Waterproof & Fireproof Drives

iosafe_solopro_2tb_with_3year_drsdata_recovery_serviceThe phrase “data security” can mean a couple different things. Is your data safe from hackers? Is your data backed up? Would your data survive a flood or a fire?

Rob Moore, the CEO of ioSafe, joins me to chat about some of their solutions which should help answer ALL THREE of those questions about your data and how secure it might be!

Shop ioSafe on Amazon.
More info on ioSafe.

Touch ID fingerprint security already circumvented using low tech methods

apple touch id fingerprint readerThat was fast.

So, iPhone 5S was officially released two days ago, and Touch ID has already been bypassed. It must have taken an army of L337 haxxors running server farms to crack the protection right? Well, unfortunately for us  fans of biometric security, it would seem that the same low tech methods for bypassing still work, even on Apple’s improved fingerprint sensor.

So, as long as you can gain access to someone’s fingerprint, you know those pesky traces of ourselves we leave after touching just about any surface we come in contact with, even potentially ON the fingerprint reader itself, you can spoof someone’s print well enough to fool Touch ID.

From the Chaos Computer Club (the team responsible for the hack):

“In reality, Apple’s sensor has just a higher resolution compared to the sensors so far. So we only needed to ramp up the resolution of our fake… “

Earlier implementations of optical fingerprint readers could even sometimes be fooled by silly putty, so I had very high hopes that Apple’s implementation would solve this problem. The dream of not having to enter complex alpha-numeric passwords on an unforgiving touchscreen isn’t quite realized yet.

Now the process for spoofing your print still requires a little work, making sure you can take a high resolution picture of the print, printing it out, and transferring it to a glue or latex membrane. You have to judge for yourself if the information on your phone is valuable enough for someone to go through this process to try and obtain it. Also, to be fair to Apple, it does require more work to crack than Google’s “Face Unlock” from the front facing cameras on Android handsets.

Unfortunately this will likely strike a blow to corporate and government use, as while it’s still one of the best implementations of biometric security we’ve seen on a mobile device, it’s still entirely defeat-able.

A video demonstrating the exploit can be seen below.

(via CCC)