• HOME
  • MEMBERSHIP
  • IN THE COMMUNITY
  • MARKETPLACE
    • SECURITY PRODUCTS
  • ABOUT US
    • PARTNERSHIPS
    • OUR TEAM
  • NEWS & EVENTS
    • EVENTS
    • PRESS RELEASES
    • BLOG
    • MEDIA OVERVIEW
    • GALLERY
  • TIPS & ADVICE
  • HOME
  • MEMBERSHIP
  • IN THE COMMUNITY
  • MARKETPLACE
    • SECURITY PRODUCTS
  • ABOUT US
    • PARTNERSHIPS
    • OUR TEAM
  • NEWS & EVENTS
    • EVENTS
    • PRESS RELEASES
    • BLOG
    • MEDIA OVERVIEW
    • GALLERY
  • TIPS & ADVICE

Knowledge Update: 12 January 2018

22-January-2018
-
Blog
-
No comments
-
Posted by Tom Lejava

This week’s Knowledge Update discusses a possible flaw in WhatsApp, a data breach in a toy firm and an exploit discovered in Google Drive.

 

Research has claimed WhatsApp’s group messaging feature can be compromised.

 

A research team released a paper last week, claiming the group messaging feature in WhatsApp can be compromised. With control over a WhatsApp server, an attacker can act as the “Admin” of an encrypted group chat and manipulate user activity- without the presence of a new member being discovered. Matthew Green mentioned in a blog “The flaw here is obvious: since the group management messages are not signed by the administrator, a malicious WhatsApp server can add any user it wants into the group. This means the privacy of your end-to-end encrypted group chat is only guaranteed if you actually trust the WhatsApp server”.

However, WhatsApp and Moxie Marlinspike (the developer of Signal, the messaging technology WhatsApp is based on) argue researchers have got it wrong, as they release a statement saying “We’ve looked at this issue carefully. Existing members are notified when new people are added to a WhatsApp group.” Not only that, the encryption prevents an attacker from viewing past group messages because they do not have access to the encryption key.

The researchers have proposed fixes, such as requiring Signal and WhatsApp to ensure management messages are signed by group administrators only. WhatsApp declined to say if the fixes are being considered.

Be vigilant of unusual activity when using WhatsApp. Keep an eye out for new software that may be released to patch potential flaws. Antivirus is also available for your mobile devices, to enhance security.

Read more.

 

Toy firm VTech fined $650,000 over data breach

 

VTech will have to pay $650,000 (£480,000) to settle charges that it failed to protect children’s privacy whilst using its gadgets. Whilst the US Federal Trade Commission (FTC) were investigating the breach it had found that VTech had broken US laws governing the way data about children is gathered. The FTC had also said that VTech “failed to take responsible steps” to secure their data.

The implementation of the General Data Protection Act this year will increase the requirements for companies in protecting children’s data. Also, it will be mandatory for organisations to notify of data breaches that risk harm to individuals. Information on GDPR and how it could affect your business can be found here.

Read more.

 

Google Drive exploited to download malware directly from URL

 

A vulnerability has emerged that allows hackers to automatically download malware to a victim’s computer directly from a Google Drive URL.

Proofpoint uncovered the vulnerability and created a proof-of-concept exploit for the issue, which exists in the Google Apps Script. The development platform is based on JavaScript and allows the creation of both standalone web apps and extensions to various elements of the Google Apps SaaS ecosystem. Unfortunately, the normal document-sharing capabilities built into Google Apps can be manipulated to support automatic malware downloads, the firm said.

It works like this: After uploading malicious files or malware executables on Google Drive, bad actors could create a public link and share an arbitrary Google Doc as a lure in sophisticated social engineering schemes, designed to convince recipients to execute the malware once it has been downloaded. Proofpoint researchers also confirmed that it was possible to trigger exploits without user interaction.

Anti-virus software should be installed on your device and automatic updates should be enabled. Anti-virus software’s can be used to detect and remove malware from your corporate networks. Learn about how best to protect your small business with the National Cyber Security Centre small business videos found here.

Read more.

Tags
Data breach
FTC
Google Drive
Knowledge Update
Malware
small business
VTech
Whatsapp
← PREVIOUS POST
Knowledge Update: 26 January 2018
NEXT POST →
Knowledge Update: 05 January 2018
Categories
  • Blog
  • Press Release
Recent Posts
  • Is your business cyber-ready?
  • You’ve Got Mail: 5 Tips to Secure Your Email
  • #OneReset - What could you really lose in a hack?
  • Here’s what GDPR means for your business!
  • Essential Advice for Small Business Cyber Security
London Digital Security Centre

We are a Not for Profit organisation, launched by the Mayor of London as a joint venture with the Metropolitan Police and City of London Police.

Leave a Comment

Your feedback is valuable for us. Your email will not be published.
Cancel Reply

Please wait...
Submit Comment

Related News

Other posts that you should not miss.

The London Digital Security Centre in 2017 - Part 2

19-May-2017
-
Blog

When I wrote my last blog in January, I outlined the work that we were aiming to deliver through the London Digital Security Centre. I now want to update you …

Read More →
Posted by Tom Lejava
8 MIN READ
LDSC knowledge update

Knowledge Update: 6 October 2017

06-October-2017
-
Blog

This week’s Knowledge Update talks about the 2013 Yahoo data breach that hit three billion accounts, stats from the latest data protection survey by SANS and the fears and …

Read More →
Posted by Tom Lejava
2 MIN READ

Cyber Resilience Week Highlights

13-October-2017
-
Blog

During Cyber Resilience Week UK which took place from 11-15 September 2017, the London Digital Security Centre organised and hosted two conferences, two drop-in sessions, two workshops and …

Read More →
Posted by Tom Lejava
1 MIN READ
Twitter Follow
Tweets by LondonDSC
Social Connect
News
  • 18-March-2019
    Is your business cyber-ready?
  • 05-February-2019
    You’ve Got Mail: 5 Tips to Secure Your Email
  • OneReset
    23-October-2018
    #OneReset - What could you really lose in a hack?
Contact Us

Company Number : 09639299
Mail to : [email protected]
Address : One Wood Street, London,
United Kingdom, EC2V 7WS.

Built by Cyber Rescue
Privacy   T & C
Copyright London Digital Security Centre (LDSC) 2017
Knowledge Update: 12 January 2018 - London Digital Security Centre
 Logo Header Menu
MENU
  • HOME
  • MEMBERSHIP
  • IN THE COMMUNITY
  • MARKETPLACE
    • SECURITY PRODUCTS
  • ABOUT US
    • PARTNERSHIPS
    • OUR TEAM
  • NEWS & EVENTS
    • EVENTS
    • PRESS RELEASES
    • BLOG
    • MEDIA OVERVIEW
    • GALLERY
  • TIPS & ADVICE