Month: December 2022

Not in a million years: It can take far less to crack a LastPass password | 1Password Blog

How 1Password goes above and beyond to protect you in the event of a breach.

Source: Not in a million years: It can take far less to crack a LastPass password | 1Password Blog


Security analyst: LastPass statement on breach includes ‘half-truths and outright lies’

Just before Christmas, LastPass issued an update on its security breach including the news that customer vaults were obtained by the hacker. After digging through all the technical claims, one security researcher says the situation is much worse than the company claims and beleives the statement is “full of omissions, half-truths and outright lies.” more… The post Security analyst: LastPass statement on breach includes ‘half-truths and outright lies’ appeared first on 9to5Mac.

Source: Security analyst: LastPass statement on breach includes ‘half-truths and outright lies’


More to Lastpass

Just as I thought, August’s breach was more severe than they thought. It’s all about the metadata.


The Twitter Files

How interesting. FBI meddling going on with tweets. The truth would eventually come out.


I Have Nothing to Hide?

More tracking info. We’re all subjected to these while we use ‘normy’ phones.


Finally!

There won’t be a repeat of the San Bernadino shooting data saga. Apple finally enabled ‘advanced data protection.’


Security Vulnerabilities in Eufy Cameras

Eufy cameras claim to be local only, but upload data to the cloud. The company is basically lying to reporters, despite being shown evidence to the contrary. The company’s behavior is so egregious that ReviewGeek is no longer recommending them. This will be interesting to watch. If Eufy can ignore security researchers and the press without there being any repercussions in the market, others will follow suit. And we will lose public shaming as an incentive to improve security.

Source: Security Vulnerabilities in Eufy Cameras


COVID-bit: New COVert Channel to Exfiltrate Data from Air-Gapped Computers

An unconventional data exfiltration method leverages a previously undocumented covert channel to leak sensitive information from air-gapped systems. “The information emanates from the air-gapped computer over the air to a distance of 2 m and more and can be picked up by a nearby insider or spy with a mobile phone or laptop,” Dr. Mordechai Guri, the head of R&D in the Cyber Security Research Attachments:

Source: COVID-bit: New COVert Channel to Exfiltrate Data from Air-Gapped Computers