{"id":4381,"date":"2014-04-04T12:50:47","date_gmt":"2014-04-04T16:50:47","guid":{"rendered":"https:\/\/www.kaspersky.com.au\/blog\/?p=4381"},"modified":"2020-02-27T03:41:19","modified_gmt":"2020-02-26T16:41:19","slug":"a-week-in-the-news-april-1","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/a-week-in-the-news-april-1\/4381\/","title":{"rendered":"A Week in the News &#8211; April 1"},"content":{"rendered":"<p>We begin our synopsis of this week by looking forward to next week when Microsoft will \u2013 at long last \u2013 discontinue its support of the once ubiquitous, forever vulnerable, and still widely deployed Windows XP operating system. More on that next week.<\/p>\n<p>As for the things that actually happened this week: we\u2019ve got more news from Bitcoin; security concerns regarding the Tesla S; insights into the global phishing game; fixes for Apple\u2019s Safari browser; bugs in a Phillips Smart TV and more.<\/p>\n<p><a href=\"http:\/\/www.reuters.com\/article\/2014\/04\/01\/us-bitcoin-mtgox-karpeles-idUSBREA3021920140401\" target=\"_blank\" rel=\"noopener nofollow\">According to a Reuters report,<\/a> a federal judge in the American state of Texas has ordered Mt. Gox chief executive Mark Karpeles to travel to the U.S. and answer questions about the Bitcoin exchange\u2019s bankruptcy filing. Mt. Gox \u2013 once the world\u2019s largest exchanger of the Bitcoin digital crypto-currency \u2013 shut down in February after losing a reported $400 million and subsequently filed for bankruptcy. Karpeles reportedly filed for Chapter 15 bankruptcy protection at the same Texas court to which he has been summoned in order to avoid a class action lawsuit filed in Chicago. The Texas judge believes that if Karpeles would like to seek protection from his court, then he ought to come and stand before it.<\/p>\n<p><a href=\"https:\/\/threatpost.com\/wifi-bug-plagues-philips-internet-enabled-tvs-2\/105134\" target=\"_blank\" rel=\"noopener nofollow\">According to my colleague Chris Brook from Threatpost<\/a>, certain versions of Philips\u2019 popular internet-enabled SmartTVs contain a vulnerability that could give an attacker the ability to access potentially sensitive information within the TV\u2019s system and configuration files as well as any files that may be on a USB stick connected to the TV itself. If that user happens to be browsing the Internet on the very same TV, an attacker could pilfer cookies use them to access certain websites or online accounts. The problem has to do with a WiFi feature called Miracast, which is enabled by default with a preset and fixed password. This password allows anyone within range of the device\u2019s WiFi adapter to connect to the TV and access its many features.<\/p>\n<p>One of my other colleagues at Threatpost, Dennis Fisher, reported that<a href=\"https:\/\/threatpost.com\/researcher-identifies-potential-security-issues-with-tesla-s\/105146\" target=\"_blank\" rel=\"noopener nofollow\"> the popular, high-end, all-electric Tesla S automobile deploys a weak, single-factor authentication system<\/a> for a mobile app that lets users unlock their vehicle and more. Researcher Nitesh Dhanjani found that when new owners sign up for an account on the Tesla site, they must create a six-character password. That password is then used to login to the iPhone app. The app gives owners the ability to manipulate the door locks, the suspension and braking system and sunroof. The real problem here is that there is no limit on login attempts; meaning that an attacker can perform brute-force attacks against a relatively short password. Six characters are easily breakable in a system with no login attempt limits.<\/p>\n<p>In passing, I\u2019d like to remind any Apple users that the Cupertino, California computer giant issued more than<a href=\"https:\/\/threatpost.com\/apple-fixes-more-than-25-flaws-in-safari\/105197\" target=\"_blank\" rel=\"noopener nofollow\"> 25 security vulnerability fixes to its Safari browser<\/a>. Some of these bugs are quite serious, so you should update that browser if you haven\u2019t done so already.<\/p>\n<p>Our researcher friends at Securelist released the first part of their look into the dark world of financial cyber-threats in 2013. Part one is <a href=\"http:\/\/www.securelist.com\/en\/analysis\/204792330\/Financial_cyber_threats_in_2013_Part_1_phishing\" target=\"_blank\" rel=\"noopener nofollow\">an extensive analysis of the global phishing environment<\/a>. In brief, they found that 31 percent of all phishing attacks in 2013 targeted financial institutions. Some 22 percent of all attacks involved fake bank websites, which doubles down on their findings from the previous year, 2012, in which only 11 percent of such attacks deployed fake banking websites. Jest less than 60 percent of banking phishing attacks exploited the brands of only 25 international banks, with the remaining 40 percent exploiting the brands of more than 1000 banks.<\/p>\n<p>In closing, <a href=\"http:\/\/www.bbc.com\/news\/technology-26879185\" target=\"_blank\" rel=\"noopener nofollow\">I point you toward the BBC<\/a>, who is reporting that a five year old boy from San Diego, California uncovered a flaw in the popular XBOX Live online gaming platform that allowed him to log into his father\u2019s account without the correct password. The boy, Kristoffer Von Hassel, attempted to log into his father\u2019s XBOX Live web account. When he entered the wrong password, he was prompted to enter it again. He hit spacebar, and, like magic, he was in.<\/p>\n<p>\u201cI got nervous. I thought [my dad] was going to find out,\u201d Kristoffer told a local television station, KGTV. \u201cI thought someone was going to steal the Xbox.\u201d<\/p>\n<p>The BBC says that Kristoffer\u2019s father, who works in security, reported the details of the bug to Microsoft. In turn, Microsoft fixed the bug and thanked the boy for his help.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We begin our synopsis of this week by looking forward to next week when Microsoft will \u2013 at long last \u2013 discontinue its support of the once ubiquitous, forever vulnerable,<\/p>\n","protected":false},"author":42,"featured_media":4383,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[580,374,581,38,574,76,97,579],"class_list":{"0":"post-4381","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-automobile-security","9":"tag-bitcoin","10":"tag-hacking-cars","11":"tag-microsoft","12":"tag-news-2","13":"tag-phishing","14":"tag-security-2","15":"tag-tesla"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/a-week-in-the-news-april-1\/4381\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/a-week-in-the-news-april-1\/3277\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/a-week-in-the-news-april-1\/3145\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/a-week-in-the-news-april-1\/3566\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/a-week-in-the-news-april-1\/4381\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/a-week-in-the-news-april-1\/3218\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/a-week-in-the-news-april-1\/4381\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/automobile-security\/","name":"automobile security"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/4381","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=4381"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/4381\/revisions"}],"predecessor-version":[{"id":26275,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/4381\/revisions\/26275"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/4383"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=4381"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=4381"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=4381"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}