کاربران اینترنت انگلیس و کاربران اینترنت در سراسر جهان باید از پروتکل GHOST مراقب باشند. GCHQ ، که معادل NSA آمریکایی انگلستان است (UK) ، پروتکل GHOST را به عنوان یک برنامه بالقوه قانون قدرتهای تحقیقاتی ارائه داد. قانون IP انگلیس به دولت اجازه می دهد تا شرکت های مستقر در انگلستان را مجبور کند تا از رمزنگاری ارائه شده توسط این کاربر برای کاربران برای دولت جلوگیری کند – و به این شرکت اجازه نخواهد داد کاربر را اعلام کند.
مراقب پروتکل GHOST باشید
هنگامی که آیین نامه آی پی منشور Snooper's در سال 2016 به تصویب رسید ، جانبازان جنگ رمزنگاری از پشت بام ها فریاد زدند: "مراقب باشید!" ساختن پشتیبان رمزگذاری برای دولت غیرممکن است. سپس توسط دیگران استفاده می شود و در نتیجه سودمندی رمزگذاری را می شکند. از هر کسی که در غیر این صورت به شما می گوید ، مراقب باشید ، زیرا آنچه که آنها موعظه می کنند ، به معنای واقعی کلمه جهل نسبت های کتاب مقدس است. در اینجا ، ما دوباره برای نبرد بین جهل و حقایق ریاضی هستیم.
کارشناسان امنیت سایبری موافقت می کنند
کارشناسان امنیت سایبری ، کارشناسان حفظ حریم خصوصی سایبر ، و بسیاری دیگر از افراد که می توانند این مسئله را بدون اینکه یک متخصص شناخته شوند ، تشخیص دهند. موافقت کنید که یک پروتکل GHOST یک ایده وحشتناک است و یک حق تقدم وحشتناک را تعیین می کند. در آینده نادر در فضای سایبر جایی دور از ذهن وجود ندارد که ریاضی به طور ناگهانی کار خود را متوقف کند ، و ناگهان ما در پشتیبان رمزگذاری محکم خواهیم داشت. فقط از نظر جسمی امكان پذیر نیست. شرکت های بالقوه که تحت تأثیر این برنامه هولناک از جمله فیس بوک و اپل قرار بگیرند ، نامه ای سرگشاده به دولت انگلستان در اعتراض به برنامه شکستن رمزگذاری امضا کردند. درک زیمر دسترسی به اینترنت خصوصی به طور مفصلی توضیح می دهد که چرا درپوش رمزگذاری ، یا "رمزنگاری کلید شکاف" ، از این کار در پست وبلاگ PIA محکوم شده است: "رمزنگاری کلید تقسیم شده است بازگشت … دوباره – چرا درب های پشتی دولت کار نمی کنند." 19659003] پروتکل GHOST امکان نظارت گسترده را فراهم می آورد
پروتکل GHQ GCHQ نظارت گسترده را امکان پذیر می کند. حتی اگر این مشکل در حال حاضر تا حد زیادی در یک کشور بومی سازی شده باشد ، نفوذ آن گسترش می یابد. در واقع ، آن به سرعت پخش می شود. کشورهای پنج چشم هر ساله با این موضوع گرد هم می آیند و برنامه انگلیس اکنون در کشورهای دیگر ظاهر می شود. دادستان کل آمریكا اخیراً خواهان چیزی مشابه پروتكل GHOST در آمریكا بود و گفت شركتها فقط باید با آن برخورد كنند. در استرالیا ، لایحه ضد رمزگذاری که به دولت این امکان را می دهد تا از دسترسی به پروتکل GHOST درخواست کند ، گذشت و برای سوء استفاده درست رسیده است. چه با توجه به اطلاع فنی و چه با حروف قانع کننده ، به نظر می رسد دولت ها فکر می کنند که می توانند رمزنگاری را با فریاد زدن در باد شکست دهند. . کالب دارای مدرک کارشناسی ارشد ارز دیجیتال از دانشگاه نیکوزیا و همچنین لیسانس دانشگاه ویرجینیا است. او احساس می کند که جهان به سرعت و بیت کوین به سمت یک فرد بهتر حرکت می کند.
If you’ve lost control of your account, look no further! We’re here to detail every step you need to take in order to regain access to your account and prevent another social media hack from happening again in the future. Only you can make sure your data is secure!
While a small scale social media hack can include embarrassing social media posts, there has also been a huge increase in large-scale attacks which can lead to detrimental data loss and even identity theft!
If your social media account gets hacked, simply changing your password isn’t going to save you. Do you know the other steps you need to take to make sure the hacker hasn’t prepped your account for successive attacks? Here’s everything you need to know to keep hackers out indefinitely!
What Are the Risks of a Social Media Hack?
Let’s say you get some messages from your friends saying that you’ve been sending a few sketchy messages. It’s likely that your computer isn’t just on the fritz, although that’s what we’d all like to believe. When you’re the victim of a social media hack, you have to consider the fact that this person has full access to your account.
Even if just one site gets hacked, your other accounts could be hacked as well.
Hackers don’t just gain access to your username and password. If you use that same password on other sites, they’re likely going to gain access to each of your other accounts as well. If you’re Facebook is linked to your Instagram, for example, that’s two accounts easily hacked! Similarly, if your Twitter is linked to your Instagram, then voilà! Full account access.
Let’s consider what information they may be able to gain from those accounts. Likely, your date of birth is on your Facebook, your personal emails are locked into these pages, your phone number is probably visible to the hacker, they can send messages to everyone in your contacts, etc. Keep in mind, this isn’t just embarrassing, but your contacts might even actually end up sending them money…
It’s more than just your passwords that are at risk.
It’s not hard to imagine how this trend continues to accumulate, letting an attacker even carry out identity theft using your personal details. All of this can affect not just your reputation online (especially if you’re a business!) but also your finances.
How Do I Know if My Account Has Been Hacked?
Not everyone gets a direct message from their email or social media site stating that their account has been compromised. Therefore, you may not immediately know that anything is wrong with your account, especially if the attacker only makes small changes or sends periodic messages. Some common signs that you’ve been the victim of a social media hack are:
If there are ANY updates on your account that you didn’t post yourself
If anyone tells you that they’ve received messages from your account that you didn’t send (occasionally check your sent messages)
New games or apps associated with your account (these can include purchases)
If you get a notification stating that you’ve made changes to your account
Any other actions on your account such as friending, following/unfollowing, blocking, etc.
How Did My Account Get Hacked?
It’s important to understand exactly how a social media hack took place in order to prevent further attacks in the future. Here are the most common ways hackers access your account:
Malware on your device
The site itself being hacked
Your security software is out of date
You clicked a harmful link in an email, direct message or on a webpage
Weak or commonly used passwords
A third-party app that you’ve authorized being breached
Check out how easy it is to hack into a company.
Video: Watch This Hacker Break Into a Company
What to Do If Your Account Was Hacked
If you do discover a social media hack, there are a few steps you should take, immediately:
Check Your Computer for Malware: Most hackers collect passwords using malware. Run a full virus scan on your computer to remove harmful files and programs. Restart your computer and run the scan one more time to be safe. Changing your passwords without cleaning your system might not lock hackers out of your accounts.
Reset Your Password: If you use the compromised password on any other site, change it there as well. You should also make your password stronger than you had it before. This should be 10 characters long and use capital letters, lower case letters, numbers, and symbols.
Enable 2-Step Verification (2SV): 2-Step Verification adds an extra layer of security to your account. By requiring a special code sent to your phone when your account settings are changed, you can make sure you’re always aware if someone is trying to get into your account.
Revoke Permissions from Third-Party Apps: Go through your authorized third-party apps and remove any that you don’t need. Many of us carelessly click “authorize” without realizing how much information you’re letting them access. If that app is breached, you’re a target.
Check That Your System Is up to Date: In fact, set your computer to automatically update automatically so that you get protection from new attacks as soon as possible.
Notify Friends and Family: Although most people will realize that it probably wasn’t you sending invitations to buy a miracle weight loss cure, it’s worth double-checking they got the memo. Let your friends and family know you’ve been hacked, especially in case they received any money requests. This is especially true if the hack was the result of malware or malicious links.
Check Your Email Settings: Check your mail settings as hackers can change your settings to forward a copy of your emails. You should also review your signature to make sure they haven’t left any hidden codes or traces. Also, don’t forget to check for an activated auto-responder aimed to turn your email into a spam machine.
Report Any Spam or Scams: Be sure to report the breach so that the site can stop the attack from spreading.
Contact Support: If you’re unable to access your account you’ll need to contact support to regain control.
Phishing, Scams, and Memory
If your account was hacked, it was likely due to spam phishing and scams. It’s worth taking a moment to refresh your memory on what these malicious links often look like and how to avoid them in the future.
It’s fair to say that anything online that sounds too good to be true, probably is. Although it would be nice to have some long lost distant family members who’d like to wire you millions of dollars and all you have to do is send them your account details – we’re pretty positive they’re just trying to get access to your financial information. Oh, and more importantly, use secure networks and protect yourself using a VPN.
Browse Privately with SaferVPN
With SaferVPN, your data is always encrypted using bank-level 256 AES encryption. Help prevent a social media hack by making sure your personal data is never exposed online.
If you don’t have SaferVPN yet, get a subscription today (we offer a 30-Day Money-Back Guarantee, you’ve got nothing to lose!) or try SaferVPN for free so you can enjoy peace of mind online.
Have any feedback, suggestions or feature requests? Feel free to contact us, ask questions in the comments, and join us on social media! We’d love to hear from you.
What to Do When Your Social Media Account Is Hacked
Hackers have used an SSL Strip for years. So why haven’t websites made it impossible to do? Learn how you can take your online security into your own hands.
Unfortunately, nearly every user of the Internet is susceptible all kinds of Wi-Fi hacking software.
And even though SSL Stripping was discovered nearly a decade ago, attackers can still exploit website vulnerabilities to steal your personal details online.
It’s up to you to make sure you’re secure. Here’s how you can protect yourself from these kinds of attacks!
What is a Man-In-The-Middle Attack?
Simply put, an SSL Strip is a type of “Man-in-the-middle” (MITM) attack.
During a man in the middle attack, hackers intercept data packages leaving the victim’s device as it travels to the intended destination. The Man-in-the-middle can then use your connection to:
See all of the content you access.
Modify any communication you have with any website.
Access personal emails, passwords and other sensitive details.
This common attack is easily one of the easiest ways people have their personal identity and other sensitive details stolen over unsecured public Wi-Fi connections.
Alright, so this is the type of attack that is happening, so what does an SSL Strip have to do with it?
What is an SSL Strip?
An SSL Strip is a type of attack that lets a Man-in-the-middle read your private details in plain text. Essentially, a man in the middle takes a secure, HTTPS website, removes the ‘S’ (for secure), and downgrades the site to an HTTP connection.
What’s the difference between HTTP and HTTPS?
Well, the first difference you may notice is the ‘S’ – which is really what it all breaks down to. HTTPS stands for Hypertext Transfer Protocol Secure.
In theory, HTTPS connections provide:
Authentication – If you see the green padlock icon and “https:” in your address bar, you can feel confident you are exchanging information with google.com and not a man in the middle.
Confidentiality – Data transmitted using HTTPS will be encrypted, meaning no one else can read what information you are sending.
Integrity – The data you send over a TLS connection will not be tampered with or changed by a third party, meaning a man in the middle cannot redirect your packets of information.
It becomes obvious that HTTPS encryption is vitally important to ensure secure communication standards on the Internet.
How an SSL Strip Works
As mentioned, an SSL Strip, for lack of a better word, strips HTTPS down to HTTP, leaving your personal data exposed to hackers and third parties.
Once the man in the middle is the connection between your device and the Internet they can see your request to visit https://yourbank.com. They can then see the request, strip the SSL, and then forward it back to you. When you type in your credentials, the attacker pretends to be you without you ever having a clue.
In doing this, all of the traffic typed in on the user’s device is read in CLEAR text by the attacker. That means your email (clearly written), your password (served on a platter), and imagine if you log into your bank account or purchase something online!
Some scary facts:
All an attacker needs is a simple $20 setup that you can purchase on the web.
You’ll have no idea that an attacker has intercepted your connection.
Why Haven’t I Heard of an SSL Strip Before?
Although the name sounds a bit strange, an SSL Strip is a very familiar term in the security world. It all started with Moxie Marlinspike – a well-known computer security researcher. In 2009, Marlinspike introduced the idea of an SSL Strip at a Black Hat conference in Washington D.C.
Although the finding did prompt new technology to protect users from these kinds of attacks, around 50% of websites still DON’T USE HTTPS.
But there may be hope for the future. Josh Aas, the co-founder of Let’s Encrypt, an organization that’s helping millions of sites add HTTPS to their sites for free, stated, “Expectations for security will continue to rise, and as a result, we expect to see sites move to HTTPS even faster than they have been.” – Wired
How Websites Can Increase Security
After SSL Stripping was discovered, a higher level of security was found using HSTS (HTTP Strict Transport Security). Websites that implement HSTS will instruct your browser to only ever connect through HTTPS and require that your computer never connects while unencrypted using HTTP. That means, even if a man in the middle were to jump in and try to strip SSL attack your connection and transmit your data through HTTP, it wouldn’t be possible.
However, this method only works if you are not already being attacked during your first visit to the site. It is also quite hard for the average user to tell if a website implements HSTS or whether it has any vulnerabilities.
Therefore, users should consider further, more secure options for protecting their privacy.
How You Can Protect Yourself Against an SSL Strip
When an SSL strip can happen over many different types of networks, even those that are secured with passwords, it’s vitally important for users to protect themselves online. Here are a few things you can do to make sure your connection is never compromised by a man in the middle.
HTTPS Everywhere for Your Browser
One excellent way to make sure your browser is using HTTPS instead of just HTTP is by downloading The Electronic Frontier Foundation’s awesome tool called HTTPS Everywhere.
The tool is actually a browser extension that forces your browser to only send information over HTTPS websites. Unfortunately, you’ll quickly realize that if you set your preferences to reject sites that don’t use HTTPS, you may begin to find a rather lonely Internet (many sites still don’t use it!).
Use a VPN to Prevent an SSL Strip
A man in the middle attack is primarily possible when sharing a common network with the attacker. When using a VPN, all internet traffic is encrypted and protected within a secure VPN tunnel, meaning the attacker can’t even see that you’re on the same network.
With VPN security, you no longer need to worry about checking for HTTP, HTTPS, lock symbols or anything else! Type in usernames, passwords, or whatever you need and feel completely confident that no one else can see your online activities or private details.
Don’t be afraid of an SSL Strip. With SaferVPN you have absolutely nothing to worry about. We’ve got you covered.
If you don’t have SaferVPN yet, get a subscription today (we offer a 30-Day Money-Back Guarantee, you’ve got nothing to lose!) or try SaferVPN for free so you can enjoy peace of mind online.
Have any feedback, suggestions or feature requests? Feel free to contact us, ask questions in the comments, and join us on social media! We’d love to hear from you.
بسیاری از دستگاه های محبوب MiFi که به عنوان نقاط مهم 4G استفاده می شوند در معرض هک شدن هستند. یک صحبت DEFCON 27 توسط Pen Test همکاران ، آسیب پذیری های مربوط به تزریق فرمان و اجرای کد از راه دور را در نقاط مهم 4G و روترهای MiFi ساخته شده توسط ZTE ، Netgear ، TP-Link و Huawei نشان داد. مدل های تحت تأثیر آن شامل Netgear Nighthawk M1 ، ZTE MF910 و ZTE MF920 و همچنین TP-Link M7350 است. لیست کامل CVE ها و اطلاعات بیشتر محققان امنیتی که باعث خراب شدن این دستگاه ها شده اند را می توانید در وبلاگ پست Pen Peners Partners در مورد این عنوان با عنوان: "نقاط مهم سرگرمی Reverse Engineering 4G برای تفریح ، اشکالات و خسارات مالی خالص مشاهده کنید."
محققان امنیتی در اوایل سال جاری این آسیب پذیری ها را نسبت به شرکت های تحت تأثیر کشف و فاش کردند و حتی ممکن است در آینده انتشار بیشتری داشته باشند. اگرچه برخی از دستگاههای MiFi تحت تأثیر قرار گرفته اند ، اما برخی از آنها مسئله امنیتی بزرگتری که روی دستگاههای کانون MiFi تأثیر می گذارد وجود ندارد. محقق امنیتی معتبر امنیتی Pen Test Partners ، G Richter ، خطر طولانی ماندگاری این آسیب پذیری های نقاط مهم 4G را خلاصه گفتگوی DEFCON خود بیان کرد:
«[…] بسیاری از مودم ها و روترهای 4G موجود بسیار ناامن هستند. ما در انتخاب دستگاه هایی از فروشندگان مختلف ، بدون نیاز به انجام کارهای زیاد ، نقص های بحرانی از راه دور قابل بهره برداری را پیدا کردیم. بعلاوه ، فقط تعداد کمی OEM وجود دارد که به طور جدی با فناوری های تلفن همراه کار می کنند ، و سخت افزار آنها (و وابستگی های نرم افزاری) در همه مکان ها قابل اجرا است. کدهای قدیمی آنها 4G ، 3G و حتی 2G در این دستگاه های دارای قدرت 5G در حال اجرا است. »
با استقرار گسترده 5G در همه جا ، شرکت های موجود که در حال استقرار و نگهداری شبکه های 4G و فروش روترهای 4G هستند که مصرف کنندگان برای دسترسی به این شبکه باید از آنها استفاده کنند ، همانهایی هستند که ما برای 5G گیر کرده ایم. یکی از نگرانی ها این است که بسیاری از سخت افزارهای آسیب پذیر هرگز به یاد نمی آورند یا به روز نمی شوند و حتی با فروش به مصرف کنندگان ناآگاه ، آسیب پذیر خواهند ماند. محققان در مورد یک مدل خاص با آسیب پذیری ZTE تماس گرفتند و ZTE پاسخ دادند که از آنجایی که این مدل خاص دیگر به روز نمی شود. با این حال ، ZTE هنوز آن مدل (MF910) را به مشتریان ناآگاه می فروشد.
روترهای MiFi فقط بخشی از آسیب پذیری های امنیتی 4G LTE هستند
4G LTE حتی در مواقعی که از کانون استفاده نمی کنید ، نیز آسیب پذیر است. در اوایل سال جاری ، گروهی از محققان KAIST ده ها آسیب پذیری امنیتی را کشف کردند که به هکرها اجازه می دهد تا به حریم شخصی شما حمله کنند. بسیاری از این افراد بدون تماشا مانده اند. حتی دسته ای از آسیب پذیری های امنیتی از سال 2018 که امکان جعل هویت ، ردیابی و اسپم را فراهم کرده است ، هنوز از هر دستگاه محافظت نمی شود. در واقع ، هرگز نخواهد بود. چه با سهل انگاری مایل ، چه در مورد ZTE ، پایان عمر واقعی و زمانبندی پشتیبانی ، یا سهل انگاری کاربر ناب برای نصب به روزرسانی های امنیتی ارائه شده توسط سازندگان سخت افزار و نرم افزارهای مسئول … همواره کاربران دستگاه های ناامن و شبکه های ناامن وجود خواهند داشت. [19659003] برای اهداف خالص OpSec ، نتیجه گیری منطقی این است که مسائل را به دست خودتان ببرید و از لایه دیگری از رمزگذاری و جلوگیری از آدرس IP استفاده کنید با استفاده از VPN. اگر نمی توانید به شبکه ای که در آن هستید اعتماد کنید – که این نشت ها 100٪ از زمان ما را نشان می دهد – پس باید با استفاده از VPN امنیت و حفظ حریم شخصی خود را به دست خود بگیرید.
Caleb Chen
Caleb Chen یک ارز دیجیتال و مدافع حریم خصوصی است که معتقد است باید ترجیحاً از طریق عدم تمرکز ، #KeepOurNetFree را انجام دهیم. کالب دارای مدرک کارشناسی ارشد ارز دیجیتال از دانشگاه نیکوزیا و همچنین لیسانس دانشگاه ویرجینیا است. او احساس می کند که جهان به سرعت و بیت کوین به سمت یک فرد بهتر حرکت می کند.
But take a VPN with you on vacation and you’ll quickly learn why it’s almost as important as remembering to pack your passport.
Be sure to still pack your passport, though.
Whether you’re already on vacation or planning one, read ahead to learn how and why a VPN can come in handy on your next trip.
VPNs Explained
In the simplest terms, a VPN is a quick and easy way to ensure everything you do online is completely private.
It’s best thought of as a secure, encrypted “tunnel” between the device you’re using and the rest of the Internet. Run your connection through a VPN and your online activity is automatically encrypted and kept secret from any and all third parties.
VPN servers also give you a new and anonymous IP address based in a country of your choice. For what it’s worth, SaferVPN members can choose from VPN servers in over 30 countries across the globe – which, by the way, you can access from any vacation destination.
Why You Need a VPN on Vacation
So how does this all apply to your summer vacation? Here are the top five ways a VPN is an important part of your travels.
1. A VPN unblocks your streaming accounts.
Even if you’re in the most exciting place in the world, let’s face it: You’re probably going to want to decompress with some screen time. Unfortunately, if you’re traveling abroad, you probably won’t be able to access your entertainment accounts due to pesky geo-restrictions.
To fix this problem and unblock your accounts, use your VPN to relocate your IP address so it’s based in your home country. Your streaming account will think you’re still at home too!
2. You can use public Wi-Fi without putting yourself at risk.
Wherever you travel, you’re bound to come across public Wi-Fi (in the airport lounge, in coffee shops, in train stations, etc.).
But if you use these networks, you’re likely to be inadvertently connecting with some unsavory characters. All it takes is a few simple tools for bad guys to scan and capture your unencrypted data – e.g., emails, passwords, credit card numbers, flight plans and so forth.
Use a VPN to keep all this information secret!
3. You can keep yourself safe on hotel Wi-Fi.
Staying in a hotel? Use their wireless network without the proper protection and you’re essentially broadcasting your online activity to everyone else who’s connected – just like on public wireless hotspots.
Protect yourself with a VPN and keep the creeps next door from seeing what you’re up to!
4. You can save hundreds of dollars on flights and hotel rooms.
Vacations are expensive! Before you book your flights and accommodations, check to see whether or not you can get a deal by using a VPN.
Basically, if you change your IP address with the help of a VPN, you can fool hotel and flight websites into thinking you’re based in another country – and often get access to special deals.
Use the right tricks and you could get hundreds of dollars off your travel bills!
Another (possibly more dangerous) way to get a deal on a flight.
5. A VPN keeps governments from surveilling your online activity.
Many countries are known for having governments that monitor your Internet activity or censor large parts of the web. Unfortunately, it just so happens that these countries are also some of the greatest vacation destinations on Earth. (For a look at which governments we’re talking about, check out Freedom House’s handy guide on the topic.)
Needless to say, if you’re vacationing in one of these places, we don’t recommend using the Internet without a VPN. You’re likely being monitored by the authorities, and you won’t even be able to access sites the government is blocking – which could be most of the Internet.
Fortunately, if you encrypt your web activity with a VPN, those governments won’t be able to see what you’re doing online. As a result, they won’t be able to censor or track what you do!
How to Get Started with a VPN
A VPN is a quick and easy way to ensure everything you do online is completely private and free from constraints – making getting an account (or free trial) an essential part of your summer vacation planning.
And since SaferVPN doesn’t take up any precious suitcase space, it’s kind of a no-brainer.
You’ll still have room for one shirt, a watch and an entire bottle of Hennessy. Bon voyage!