April 28 - Is your phone safe?

Weekly Rundown

Happy Monday! Let’s recap some great highlights from last week and prime ourselves for the week ahead. 6.5 Min Read

Table of Contents

WHAT’S NEW

QR Code to leave your city!?!

What does it mean:
I am not going to get into the debate on how absolutely wrong this is, but I will give you my security perspective. A Canadian municipality recently implemented QR codes to require visitors (and at the beginning citizens) to leave the city. This modern ‘convenience’ brings increased security risks, particularly through MITM (Man-In-The-Middle) attacks.

The Details:
The municipality adopted QR codes and identification to provide easy access to various administrative services; namely how the city will charge tourists for entering and exiting the city.

Security Concerns: While QR codes offer efficiency, they also present vulnerabilities. Scanning a QR code can unknowingly redirect users to malicious websites where personal data can be compromised.

MITM Attacks: These occur when a hacker intercepts the communication between the user and the service being accessed via QR code. Once intercepted, the attacker can steal or manipulate the data transmitted.

Why It Matters:
This example underscores the need for caution when using QR codes. Users should verify the source of a QR code before scanning and be aware of the potential for MITM attacks, which can lead to significant privacy and security breaches.

What You Can Do:
Stay Informed: Understand the security risks associated with QR codes, and find an alternative way to access the information or website.

SECURITY ENVIRONTMENT

The Hidden Dangers of the phone cable (OMG Cable)

What does it mean:
Phone cables are abundant, many are safe, but some can be modified to allow and adversary to steal your information or worse—meet the OMG Cable. This device masquerades as a typical USB charging cable but has the capabilities to compromise your security.

The Details:
Appearance: The OMG Cable looks identical to standard USB cables used for charging devices or transferring data, making it nearly impossible to detect based on looks alone.

Malicious Capabilities: Embedded within the cable is a microchip that allows it to function as a wireless hotspot. This enables attackers to connect remotely to the cable and manipulate the data passing through it.

Security Threats: The primary danger of the OMG Cable lies in its ability to intercept and alter the data sent from your device. This can include keystrokes, browser activities, and personal information, all without the user’s knowledge.

Why It Matters:
Understanding the risks associated with such devices is crucial. The OMG Cable represents a type of cyber threat that relies on physical access but remains hidden in plain sight, illustrating the importance of being vigilant every day.

What You Can Do:

  • Be Cautious with Accessories: Always purchase accessories from reputable sources and be wary of using cables that you find or receive as gifts.

  • Educate Yourself: Awareness is a powerful tool. Learn about the various forms of threats and share this knowledge with your peers to create a more secure environment.

  • Practice Safe Tech Habits: Regularly update your devices, use secure and unique passwords, and avoid connecting to unknown cables.

     

THE AI SPACE

Synthesia unveils expressive avatars

What does it mean:
Synthesia, a London-based AI startup, is changing the game with their new expressive avatars that can talk and show emotions based on your text.

The Details:
What’s Special? These avatars are powered by AI to create videos from text that not only speak but also show emotions like happiness or surprise.

Why It Matters:
For tech-savvy people, understanding and using such AI innovations can enhance your projects and presentations, making them more interactive and relatable. It also informs you that AI can be used by anyone and look/sound like anyone.

Stay ahead by researching technologies like Synthesia's expressive avatars, which are making digital communication more human and interactive. To keep up to date on all cyber security research, I recommend Tl;DR

THINGS TO WATCH
HID OMNIKEY

Why Does it Matter:
HID Global, is a leader in secure identity solutions. They have recently expanded their offering with the HID OMNIKEY series. This technology is crucial in hardening your physical security systems.

The Details:
What is HID OMNIKEY? The OMNIKEY series includes readers that support seamless access control. These devices allow for secure entry and data transmission in facilities like offices, schools, and government buildings.

Features of HID OMNIKEY: These readers are designed to work with a wide range of card technologies, supporting new and existing access cards. This flexibility makes them a versatile option for enhancing security infrastructure.

Benefits for Security: The main advantage of incorporating OMNIKEY readers into your security system is their reliability and the enhanced protection they offer against unauthorized access.

Why It Matters:
In a world where security breaches are increasingly common, having robust physical security measures is essential. The HID OMNIKEY readers provide a dependable solution that can adapt to various security needs, ensuring that only authorized individuals have access to sensitive areas.

What You Can Do:
Upgrade Your Security Systems: Consider integrating HID OMNIKEY readers into your existing security setup to improve safeguarding of physical and data assets.

Links
Current news from around the industry

  • Cisco reveals security breach, warns of state-sponsored spy campaign (Link)

  • Apple’s new AI in iOS 18(Link)

  • Residents hiring security firms to fight auto theft (Link)