Posted Nov 14, 2017 by Frederic Lardinois (@fredericl)
With the launch of Firefox Quantum, Mozilla released what’s probably the most important update to its browser in recent years. It’s faster, lighter and you should give it a try. And as you do so, you’ll notice another change: Google is now the default search engine again — at least if you live in the U.S., Canada, Hong Kong and Taiwan.
In 2014, Mozilla struck a deal with Yahoo to make it the default search engine provider for users in the U.S., with Google, Bing, DuckDuckGo and others as options. While it was a small change, it was part of a number of moves that turned users against Firefox because it didn’t always feel as if Mozilla had the user’s best interests in mind. Firefox Quantum (aka, Firefox 57), is the company’s effort to correct its mistakes and it’s good to see that Google is back in the default slot (Disclaimer: TechCrunch is part of Oath, Verizon’s roll-up of AOL and Yahoo, though nobody at TechCrunch that I know has ever willingly used Yahoo Search).
When Mozilla announced the Yahoo deal in 2014, it said that this was a five-year deal. Those five years are obviously not up yet. We asked Mozilla for a bit more information about what happened here.
“We exercised our contractual right to terminate our agreement with Yahoo! based on a number of factors including doing what’s best for our brand, our effort to provide quality web search, and the broader content experience for our users. We believe there are opportunities to work with Oath and Verizon outside of search,” Mozilla Chief Business and Legal Officer Denelle Dixon said in a statement. “As part of our focus on user experience and performance in Firefox Quantum, Google will also become our new default search provider in the United States, Canada, Hong Kong and Taiwan. With over 60 search providers pre-installed as defaults or secondary options across more than 90 language versions, Firefox has more choice in search providers than any other browser.”
As Recode reported last year, there was a clause in the Mozilla deal that would have the potential Yahoo acquirer pay $375 million per year through 2019 if Mozilla didn’t want to work with the buyer. This clause also allowed Mozilla to walk away at its sole discretion. We don’t know if Mozilla invoked this clause to terminate the agreement, but it seems likely.
This move makes Google Mozilla’s default search engine in most of the world, with the exception of China, where the default is Baidu, and Russia, Turkey, Belarus and Kazakhstan, where Yandex is the default.
Historically, search engine royalties have been the main revenue driver for Mozilla. Back in 2014, the last year of the Google deal, that agreement brought in $323 million of the foundation’s $330 million in total revenue. Neither Google nor Mozilla discussed the financial details of this new deal, though once Mozilla releases its annual financial statement, we’ll get a better idea of what that looks like.
Mozilla terminates its deal with Yahoo and makes Google the default in Firefox again | TechCrunch
With 20+ years in technical roles and specialized GRC expertise, I translate complex security frameworks into actionable insights. My journey from financial compliance to enterprise security initiatives informs this blog, where I break down cybersecurity concepts for both professionals and everyday users seeking practical protection in our digital world.
Wednesday, November 22, 2017
Hackers Claim to Break Face ID a Week After iPhone X Release | WIRED
When Apple released the iPhone X on November 3, it touched off an immediate race among hackers around the world to be the first to fool the company's futuristic new form of authentication. A week later, hackers on the actual other side of the world claim to have successfully duplicated someone's face to unlock his iPhone X—with what looks like a simpler technique than some security researchers believed possible.
On Friday, Vietnamese security firm Bkav released a blog post and video showing that—by all appearances—they'd cracked Face ID with a composite mask of 3-D-printed plastic, silicone, makeup, and simple paper cutouts, which in combination tricked an iPhone X into unlocking. That demonstration, which has yet to be confirmed publicly by other security researchers, could poke a hole in the expensive security of the iPhone X, particularly given that the researchers say their mask cost just $150 to make.
But it's also a hacking proof-of-concept that, for now, shouldn't alarm the average iPhone owner, given the time, effort, and access to someone's face required to recreate it.
Bkav, meanwhile, didn't mince words in its blog post and FAQ on the research. "Apple has done this not so well," writes the company. "Face ID can be fooled by mask, which means it is not an effective security measure."
In the video posted to YouTube, shown above, one of the company's staff pulls a piece of cloth from a mounted mask facing an iPhone X on a stand, and the phone instantly unlocks. Despite the phone's sophisticated 3-D infrared mapping of its owner's face and AI-driven modeling, the researchers say they were able to achieve that spoofing with a relatively basic mask: little more than a sculpted silicone nose, some two-dimensional eyes and lips printed on paper, all mounted on a 3-D-printed plastic frame made from a digital scan of the would-be victim's face.
The researchers concede, however, that their technique would require a detailed measurement or digital scan of the face of the target iPhone's owner. The researchers say they used a handheld scanner that required about five minutes of manually scanning their test subject's face. That puts their spoofing method in the realm of highly targeted espionage, rather than the sort of run-of-the-mill hacking most iPhone X owners might face. 1
"Potential targets shall not be regular users, but billionaires, leaders of major corporations, nation leaders, and agents like FBI need to understand the Face ID's issue," the Bkav researchers write. They also suggest that future versions of their technique might be performed with a quick smartphone scan of a victim’s face, or even a model created from photographs, but didn't make any predictions about how easy those next steps might be to engineer.
Aside from the challenge of acquiring an accurate face scan, the researchers’ simpler setup outperformed more expensive techniques for attempted Face ID trickery—namely, the ones we at WIRED tried earlier this month. With the help of a special effects artist, and at a cost of thousands of dollars, we created full masks cast from a staffer's face in five different materials, ranging from silicone to gelatin to vinyl. Despite details like eyeholes designed to allow real eye movement, and thousands of eyebrow hairs inserted into the mask intended to look more like real hair to the iPhone's infrared sensor, none of our masks worked.
By contrast, the Bkav researchers say they were able to crack Face ID with a cheap mix of materials, 3-D printing rather than face-casting, and perhaps most surprisingly, fixed, two-dimensional printed eyes. The researchers haven't yet revealed much about their process, or the testing that led them to that technique, which may prompt some skepticism. But they say that it was based in part on the realization that Face ID's sensors only checked a portion of a face's features, which WIRED had previously confirmed in our own testing.
"The recognition mechanism is not as strict as you think," the Bkav researchers write. "We just need a half face to create the mask. It was even simpler than we ourselves had thought."
Without more details on its process, however, plenty about Bkav's work remains unclear. The company didn't respond to the majority of a long list of questions from WIRED, saying that it plans to reveal more in a press conference later this week.
Most prominent among those questions, points out security researcher Marc Rogers, is how exactly the phone was registered and trained on its owner's real face. Bkav's staff could have potentially "weakened" the phone's digital model by training it on its owner's face while some features were obscured, Rogers suggests, essentially teaching the phone to recognize a face that looked more like their mask, rather than create a mask that truly looks like the owner's face.
"For the moment I can't rule out that these guys might be tricking us a bit," says Rogers, a researcher for security firm Cloudflare, who worked with WIRED on our initial attempts to crack Face ID, and was also one of the first to break Apple's Touch ID fingerprint reader in 2013.
But in response to questions from WIRED, Bkav denied any such trickery. A company spokesperson says that after crafting a mask that was able to fool Face ID—it first made four others that failed—the researchers re-registered their test iPhone X on the face of Bkav's staffer, to make sure that it hadn't biased the phone's model of his face. After that, they never entered a passcode into the phone, and yet the mask alone unlocked it.1
Bkav's history also lends its demonstration some credence. Nearly a decade ago, the company's researchers found that they could break the facial recognition of laptop makers including Lenovo, Toshiba, and Asus, with nothing more than two-dimensional images of a user's face. They presented those widely cited findings at the 2009 Black Hat security conference.
If Bkav's findings do check out, Rogers says that the most unexpected result of the company's research would be that even fixed, printed eyes are able to deceive Face ID. Apple patents had led Rogers to believe that Face ID looked for eye movement, he says. Without it, Face ID would be left vulnerable not only to simpler mask spoofs, but also attacks that could unlock an iPhone X even if the owner is sleeping, restrained, or potentially even dead.
The last of those situations is especially worrying, since it would theoretically be a problem for Face ID that even Touch ID didn't present, given that the latter checks for the conductivity of a living person's finger before unlocking. "That would mean this could be tricked without any liveness test at all," Rogers says. "I would say if this is all confirmed, it does mean Face ID is less secure than Touch ID." It's also unclear if Face ID uses any methods beyond eye movement to indicate that someone is alive. (At least one researcher points out that Touch ID make also work on a corpse: SR Labs' Ben Schlabs sent WIRED a video unlocking an iPhone SE with an altogether non-living foam-backed fake fingerprint.)2
Despite the potential threat of snooping on a sleeping, kidnapped, or dead person’s iPhone X, Rogers considers the notion that someone will make a silicone-and-plastic mask of the average person's face far-fetched. A far more practical concern is someone simply tricking a victim into glancing at their phone.
"This is still not the kind of attack the average person on the street should worry about," Rogers says of Bkav's work. "It’s still probably easier to snatch the phone and just show it to someone to unlock it."
1Updated 11/13/2017 9:30 am EST with more information from Bkav.2Updated 11/13/2017 10:55 am EST with a comment from SR Labs on unlocking Touch ID with a non-living finger.
Hackers Claim to Break Face ID a Week After iPhone X Release | WIRED
Using E-Mail Encryption to Combat Cyber Breaches
Given the prevalence of email-based attacks, and the growing number of phishing attacks containing ransomware occurring globally, email security should be a forefront concern for any organization.
By Industry Perspectives | Nov 07, 2017
In the month following the Deloitte breach, consumers and businesses are still at risk of having personal and proprietary information stolen. The Deloitte hack compromised critically private information of six “blue chip” clients including usernames, passwords, IP addresses, and health information. Deloitte failed to utilize multi-factor authentication on a portion of their email system, giving cyber criminals easy access to the accounts.
The cyber criminals then sifted through emails looking for any valuable information they could use or sell for a profit. While the Deloitte hack was contained and only affected six clients, consumers and businesses are at risk from any organization that stores sensitive information about them and fails to implement critical cybersecurity measures. Consumers and businesses can have their information compromised by a variety of organization including healthcare organizations, educational institutions, legal firms, accountancy firms, financial institutions, and businesses/third party vendors through data contained in email accounts.
Regardless of the type of organization, there should be a greater level of responsibility and protection for consumer and client information. Organizations have failed to implement cybersecurity, and it is now an epidemic. By 2019, cybercrime will cost the global economy an estimated $2.1 trillion dollars. To protect consumers and themselves, organizations must implement cybersecurity measures. Given the prevalence of email-based attacks, and the growing number of phishing attacks containing ransomware occurring globally, email security should be a forefront concern for any organization.
A critical first step is to ensure the use of multi-factor authentication for account logins. This added layer of security is integral to account protection and user verification. Cybercriminals seek out the easiest targets to make the fastest profit, utilizing multi-factor authentication encourages the criminal to move onto the next target.
Another consideration for organizations is email encryption. Despite valiant efforts to keep cyber criminals from gaining access to email accounts, inevitably they will find a way in. Each employee with a company email address is a potential point of entry for a cybercriminal. Negligent employees that don’t follow password protocols, fall victim to phishing schemes, and download third party applications that contain malware, create opportunities for cyber criminals to gain access.
In the case of Deloitte, once cybercriminals gained access to the account they downloaded and archived the data to servers overseas to later sort through for any valuable information. Email encryption services put two-factor authentication and an extra level of security on all emails sent, eliminating the value proposition for cyber criminals by disallowing their ability to read the encrypted emails. It would be like breaking into a bank, but the vault is empty.
Securing and protecting email accounts is a critical consideration for organizations of all sizes, from Big Four CPA firms to small businesses. Organizations should begin waging the war against cybercrime today by implementing multi-factor authentication for email accounts and considering an email encryption service. Increased global productivity through advances in technology should not come at the cost of privacy and security.
Using E-Mail Encryption to Combat Cyber Breaches
By Industry Perspectives | Nov 07, 2017
In the month following the Deloitte breach, consumers and businesses are still at risk of having personal and proprietary information stolen. The Deloitte hack compromised critically private information of six “blue chip” clients including usernames, passwords, IP addresses, and health information. Deloitte failed to utilize multi-factor authentication on a portion of their email system, giving cyber criminals easy access to the accounts.
The cyber criminals then sifted through emails looking for any valuable information they could use or sell for a profit. While the Deloitte hack was contained and only affected six clients, consumers and businesses are at risk from any organization that stores sensitive information about them and fails to implement critical cybersecurity measures. Consumers and businesses can have their information compromised by a variety of organization including healthcare organizations, educational institutions, legal firms, accountancy firms, financial institutions, and businesses/third party vendors through data contained in email accounts.
Regardless of the type of organization, there should be a greater level of responsibility and protection for consumer and client information. Organizations have failed to implement cybersecurity, and it is now an epidemic. By 2019, cybercrime will cost the global economy an estimated $2.1 trillion dollars. To protect consumers and themselves, organizations must implement cybersecurity measures. Given the prevalence of email-based attacks, and the growing number of phishing attacks containing ransomware occurring globally, email security should be a forefront concern for any organization.
A critical first step is to ensure the use of multi-factor authentication for account logins. This added layer of security is integral to account protection and user verification. Cybercriminals seek out the easiest targets to make the fastest profit, utilizing multi-factor authentication encourages the criminal to move onto the next target.
Another consideration for organizations is email encryption. Despite valiant efforts to keep cyber criminals from gaining access to email accounts, inevitably they will find a way in. Each employee with a company email address is a potential point of entry for a cybercriminal. Negligent employees that don’t follow password protocols, fall victim to phishing schemes, and download third party applications that contain malware, create opportunities for cyber criminals to gain access.
In the case of Deloitte, once cybercriminals gained access to the account they downloaded and archived the data to servers overseas to later sort through for any valuable information. Email encryption services put two-factor authentication and an extra level of security on all emails sent, eliminating the value proposition for cyber criminals by disallowing their ability to read the encrypted emails. It would be like breaking into a bank, but the vault is empty.
Securing and protecting email accounts is a critical consideration for organizations of all sizes, from Big Four CPA firms to small businesses. Organizations should begin waging the war against cybercrime today by implementing multi-factor authentication for email accounts and considering an email encryption service. Increased global productivity through advances in technology should not come at the cost of privacy and security.
Using E-Mail Encryption to Combat Cyber Breaches
Google Now Shows Wait Times For Restaurants And Grocery Stores | HuffPost
Google Now Shows Wait Times For Restaurants And Grocery StoresNow you just have to figure out what to eat.
By Carly Ledbetter
Google just solved one of the biggest hassles associated with going out to eat: gauging the accurate wait time.
The tech company announced Tuesday that it’s introducing average wait times for around 1 million restaurants, based on anonymized historical data, according to a press release.
Starting today, you’ll be able to see the feature when you type in a restaurant’s name in local search on mobile or desktop. It’s not yet available on the Maps and Search apps but by Thanksgiving, Google hopes to have wait times ready for grocery stores.
The pink bar shows the “live” setting― what wait times look like for the restaurant at that very moment.
To access the Wait Times feature, type in a restaurant’s name, click to open the listing and look at the Popular Times feature. Simply click on the hour bars of the time you want to go to the restaurant and Google will give you the estimated wait time.
With this helpful innovation, you’ll hopefully spend less time stuck in line at the grocery store or taking out your hanger on unsuspecting patrons. Now you just have to figure out WHAT to eat.
Original Article at:
Google Now Shows Wait Times For Restaurants And Grocery Stores | HuffPost
Tuesday, November 21, 2017
Five common scams consumers should avoid
Rippleshot recently released an infographic highlighting five common scams consumers should avoid, including phishing scams involving recognizable companies such as Amazon and Netflix and scams impersonating banks. In addition, Rippleshot provided tips to help consumers actively protect themselves from credit card fraud. Tips include using secure passwords, watching out for ATM skimmers and reporting suspicious activity immediately. |
ConsumerCreditScamsInfographic.pdf
Friday, November 17, 2017
Windows 10 Fall Creators Update broken your Start menu? Microsoft's just fixed it - TechRepublic
Windows 10 Fall Creators Update broken your Start menu? Microsoft's just fixed it
Microsoft has resolved the issue of disappearing apps in the Start menu, alongside a host of other issues in its Patch Tuesday update.
Windows 10's recent Fall Creators Update added a variety of new features to Microsoft's OS but also broke the Start menu for some users.
Following the update, there were numerous complaints about tiles for installed apps disappearingfrom the Start menu.
Now Microsoft has resolved the issue in its latest Patch Tuesday update. The fix should be automatically applied for internet-connected Windows 10 Home users but Microsoft recommends those who can't install the patch follow the steps outlined here.
The free Fall Creators Update is currently being rolled out to Windows 10 machines and offers a variety of improvements, with standout features including streamlined cloud storage, better protection against ransomware, a new social hub and a host of security additions for enterprise. Tuesday's update also resolves crashes in Windows 10's newly added Mixed Reality Portal.
Microsoft's wider Patch Tuesday update resolved more than 50 security vulnerabilities, 20 of which are critical. These flaws included one that allowed software to bypass Windows 10 Device Guard protections and designate an exploit as a trusted file, which could then be executed. Another allowed malware to bypass settings stopping macros from being run inside Excel, a problem given that macros are commonly used by malware to infect computers.
Researchers at Trend Micro's Zero Day Initiative also suspect one of the updates is aimed at mitigating a nearly undetectable Microsoft Office exploit that takes advantage of a 24-year-old Microsoft protocol called Dynamic Data Exchange (DDE). Microsoft is rather tight-lipped on what the update does, only saying it provides "enhanced security as a defense-in-depth measure" for Microsoft Office.
A series of remote-code execution vulnerabilities in Office have been patched (CVE-2017-11884, CVE-2017-11882, CVE-2017-11878, CVE-2017-11854), as have similar flaws in the Internet Explorer and Microsoft Edge web browsers (CVE-2017-11845, CVE-2017-11855, CVE-2017-11856).
Researchers at Trend Micro says the most pressing updates are for Flash Player and Acrobat, which correct various exploits allowing for remote-code execution.
View the original article here:
Windows 10 Fall Creators Update broken your Start menu? Microsoft's just fixed it - TechRepublic
The best smartphones and tablets to give as gifts
Let's be real: Smartphones are pricey and as far as gifts go, they're hard to keep a surprise. But there's also a good chance someone in your life is due for an upgrade, and as the holiday season approaches, you're likely to spot some good deals.
For Engadget's 2017 holiday gift guide, we recommend four phones: the iPhone 8/8 Plus,
the Google Pixel 2 and 2XL, the older-but-still-good Galaxy S8 and S8 Plus, and the Moto G5 Plus, for the budget conscious. We also threw in some tablets for good measure: the basic iPad for Apple fans and the Galaxy Tab S3 for Android users. Certain folks requiring more power might be better served by the 10.5-inch iPad Pro or Microsoft's Surface Pro, but unless your giftee also needs a laptop replacement, you can easily get by with something less expensive. Let's be real: Smartphones are pricey and as far as gifts go, they're hard to keep a surprise. But there's also a good chance someone in your life is due for an upgrade, and as the holiday season approaches, you're likely to spot some good deals. For Engadget's 2017 holiday gift guide, we recommend four phones: the iPhone 8/8 Plus, the Google Pixel 2 and 2XL, the older-but-still-good Galaxy S8 and S8 Plus, and the Moto G5 Plus, for the budget conscious. We also threw in some tablets for good measure: the basic iPad for Apple fans and the Galaxy Tab S3 for Android users. Certain folks requiring more power might be better served by the 10.5-inch iPad Pro or Microsoft's Surface Pro, but unless your giftee also needs a laptop replacement, you can easily get by with something less expensive.
The best smartphones and tablets to give as gifts
Subscribe to:
Posts (Atom)
-
The Windows logo key, located in the bottom row of most computer keyboards is a little-used treasure. Don't ignore it. It is the shortcu...
-
Open Paint by clicking the Start button, clicking All Programs, clicking Accessories, and then clicking Paint. Click the Paint button, cli...
-
By: Fahmida Y. Rashid 2010-09-27 Cisco Systems says spammers targeted LinkedIn members with fake connection requests that downloaded a wo...