Featured Posts

<< >>

Master Email for Business Efficiency

Discover how mastering email communication can boost business efficiency, avoid common pitfalls, and ensure secure, respectful online interactions.

Turkey Revenge

The turkeys are pissed this Thanksgiving they are seeking revenge.

Germs Infest 60% of Americas Phones

60% of Americans sleep with their phones, harboring germs. Cleaning regularly with UV sanitizer or alcohol wipes can help keep your phone and bed germ-free.

Smartphone Sanitizing: A Practical Guide

Securely erase personal data from your old smartphone before recycling. Protect your identity from hackers—easy steps to follow.

Why Soft Skills Matter in Today’s Job Market

Boost your career with essential soft skills like communication, teamwork, and emotional intelligence. Learn why they’re crucial for workplace success.

What You Need to Know About Zoom

Updated 12/01/2020 – Zoom has agreed to settle allegations (PDF) made by the US Federal Trade Commission (FTC) that it “engaged in a series of deceptive and unfair practices that undermined the security of its users.” Among the charges were that Zoom misled users by:

The settlement does not require Zoom to admit fault or pay a fine – So they got away with it.

Updated 05/01/2020 – Zoom made a big splash when CEO Eric Yuan claimed the video conferencing firm had surpassed 300 million daily Zoom meeting users last week. That’s impressive growth in the face of security and privacy holes documented on the Bach Seat and around the Intertubes.

Well in a Zoom tradition they “back-tracked” that announcement, just like they back-tracked their definition of “end-to-end encryption.” Zoom artificially inflated the number of users by counting meeting participants as “users” and “people.” 

Daily meeting participants can be counted multiple times – if you have four Zoom meetings in a day then you’re counted four times. SVCOnline explains that by calling meeting participants “daily users” makes Zoom usage seem larger than it is. The term most companies use to measure service usage is a daily active user (DAU). A DAU is counted once per day. 

Updated 04/08/2020 -Zoom now faces four lawsuits over its security and privacy practices. Today,  Google has banned employees from using Zoom, joining NASA, SpaceX, NYC schools, Clark County (Las Vegas) schools. the governments of Germany and Taiwan as well as Apple.

Updated 04/07/2020Reports of a new blow to Zoom’s security cred’s researchers have discovered up to 15,000 private Zoom recordings exposed online. Many of them were apparently stored in Amazon Web Services (AWS) S3 buckets without passwords.

What You Need to Know About Zoom

Zoom has taken off. Thanks to the global COVID-19 lock-down Zoom’s (ZM) stock has surged over 250% on the NASDAQ since October 2019. Zoom’s video conferencing platform daily usage has exploded from 10 million in December 2019 to more than 200 million in March 2020.

Zoom logo

After its stock price run-up and exploitation of the COVID-19 pandemic Zoom has come under intense scrutiny. The FBI issued a warning about using Zoom. The New York Attorney General’s office sent a letter to Zoom about its practices. Security professionals have found a disturbing list of flaws on Zoom. Here is a brief list of the risks you take when using Zoom.

Zoom Risks

Phishing – Security firm Check Point Software says criminals are waging phishing campaigns with Zoom-related themes as a lure. The phishing emails that Check Point has observed spoof Zoom login pages and attempt to get victims to input their credentials. The Zoom credentials are then harvested by the attackers. Also, Check Point has also uncovered malicious files with names that include “zoom” in the title. 

Encryption

Phony end-to-end encryption – Zoom uses misleading advertising to claim that its meetings use “end-to-end encryption,” according to The Intercept. Zoom uses the term end-to-end encryption” incorrectly. Zoom admitted their definitions of “end-to-end” and of “endpoint” are different from everyone else’s. A spokesperson told The Intercept, “When we use the phrase ‘End to End … it is in reference to the connection being encrypted from Zoom endpoint to Zoom endpoint.

Unlike Apple, Zoom’s data is only encrypted when it travels back and forth from an end-user to a Zoom server. Your data is decrypted at the Zoom server. Zoom (or TLA) can see and hear whatever is going on in its meetings. Zoom Chief Product Officer Oded Gal wrote:

We recognize that there is a discrepancy between the commonly accepted definition of end-to-end encryption and how we were using it.

The Intercept concludes that Zoom doesn’t decrypt user transmissions — but it could.

What You Need to Know About Zoom

Zoom bombing – Zoom bombing occurs when a third party interrupts or takes over a video conference. Anyone can “bomb” a public Zoom meeting. All they need is the meeting number. Attackers can use the file-share to post shocking images or make annoying sounds in the audio. The host of the Zoom meeting can kick out troublemakers, but they can come right back with new user IDs The FBI issued a warning about zoom bombing.

To prevent Zoom bombing do not share Zoom meeting numbers with anyone but the intended participants. Also require participants to use a password to log into the meeting.

Windows password stealing
Bleeping Computer reports that malicious users can use the Zoom side chats to post a Universal Naming Convention (UNC) link that points to a remote server. From there the victim’s Windows computer will try to reach out to the hacker’s remote server specified in the path. From there the PC will automatically try to log in with the user’s Windows username and password. The attacker could capture the password “hash” and decrypt it, giving them access to the Zoom user’s Windows account.

Windows malware injectionWindows malware injection – The same flaw allows a hacker to insert a UNC path to a remote executable malicious file into a Zoom meeting. If a Zoom user running Windows clicks on it, the computer will try to load and run the malicious software. The victim will be prompted to authorize the software to run, which will stop some hacking attempts but not all.

Apple iOS profile sharing – Zoom sends iOS user profiles to Facebook. This is done with the “log in with Facebook” feature in the iPhone and iPad Zoom apps. After Motherboard exposed the practice, Zoom said it hadn’t been aware of the profile-sharing. Zoom’s initial response was to blame the social network’s software development kit used in the Zoom software. CNet concludes that Zoom shares enough personal data that it qualifies as selling your data

Mac malwareMalware-like behavior on Macs – Zoom was caught using hacker-like methods to bypass normal macOS security. It was thought this flaw had been fixed. But security researcher Felix Seele noticed that Zoom installed itself on his Mac without the usual user authorization.

The application is installed without the user giving his final consent and a highly misleading prompt is used to gain root privileges. The same tricks that are being used by macOS malware.

A backdoor for Mac malware – Patrick Wardle, a former NSA hacker and now principal security researcher at Jamf said in a blog post that Zoom used a discontinued installation process. The deprecated process could allow malware to add malicious code to “escalate privileges.” This would allow an attacker to gain total control over the machine without knowing the administrator’s password

Zoom privacy issues

CSO Online reports that he demonstrated the backdoor. He installed a malicious script into the Zoom Mac client. This could give any piece of malware access to the Mac’s webcam and microphone. It would turn any Mac with Zoom into a spying device.

Leaks of email addresses and profile photos – Zoom automatically puts everyone sharing the same email domain into a “company” folder where they can see each other’s information. If you are not a user of large webmail clients like Gmail, Yahoo, Hotmail, or Outlook.com, you could end up in a “company” with dozens of strangers.

Data leakSharing of personal data with advertisers – Privacy experts for Consumer Reports reviewed Zoom’s privacy policy and found that it gave Zoom the right to use Zoom users’ personal data and to share it with third-party marketers. In a blog, Aparna Bawa, Zoom’s chief legal officer, claimed “we do not sell your personal data.” The lawyer definitely concluded, “We are not changing any of our practices.” But we don’t know the details of Zoom’s business dealings with third-party advertisers.

Cloud snitching – For paid subscribers, Zoom’s cloud recording feature can be a problem waiting to happen.  Mashable points out that any time Zoom is used, your person-to-person chat messages are saved and could be sent to your boss by any authorized user. CNet notes that Zoom administrators can limit the recording’s accessibility by IP addresses – but this is not enabled by default.

Tattle-tale attention-tracking feature – Zoom’s attention-tracking feature allows the meeting host to monitor if you are paying attention to their PowerPoint deck. The Zoom desktop client or mobile app alerts the host if any attendees go more than 30 seconds without Zoom being in focus on their screen.

rb-

I agree with those who are calling Zoom’s development processes lazy  As you can see  – Zoom’s software development process creates a huge attack surface.

Tom’s Guide is tracking the status of Zoom’s problems.  So is  Zoom safe to use?  – That is your call. – You need to make an informed decision and patch your Zoom software.

Zoom CEO Eric Yuan

You should be suspicious of “free” products. As in the case of Google and Facebook, you are the product for Zoom. They are monetizing you. Follow the money.

Eric Yuan, the founder, and CEO of Zoom is profiting by using your info. His personal wealth has increased 112% to $7.57 billion in the past three months, as the use of Zoom skyrockets amid the pandemic. While the other 99%f the world braces for a global recession.

How does he get all of that money on free software?

 

Stay safe out there!

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Xerox Ends Hostile Bid for HP

Xerox Ends Hostile Bid for HPThe Xerox (XRX) drama to take over HP (HPQ) has come to an whimpering end. The Norwalk, CT copier company ended it $35B hostile takeover bid for the larger HP on March 31, 2020. The copier manufacturer said that it will formally withdraw its tender offer and proposed slate of directors to replace HP’s board as I outlined on the Bach Seat. Xerox says they gave up because of uncertainty stemming from the Covid-19 pandemic.  In a presser they said, The current global health crisis and resulting macroeconomic and market turmoil caused by Covid-19 have created an environment that is not conducive to Xerox continuing to pursue an acquisition of HP Inc

Stay safe out there!

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Today is World Backup Day

take responsibility for backing-up your data

March 31st is the annual worldwide World Backup Day. Now is a good time to check your backup systems. You have a plan right? Now that so many of us are working from home, we can’t rely on Jim the backup admin to automagically make the files that mysteriously disappeared all by themselves re-appear.

You should take responsibility for backing up your data. From the data the keeps your business moving to the personal information you share and store online, your devices hold the files, images, and conversations that matter most.

According to WorldBackUpDay.com  (Not HTTPS) World Backup Day. was founded by a few “concerned users” on Reddit. The day’s dedication is a decidedly serious one. March 31 was established as:

… a day for people to learn about the increasing role of data in our lives and the importance of regular backups.

What’s a backup?

Cloud backup

A backup is a full image copy of all the data stored on a device like your desktop, laptop, or tablet. By storing this second copy, everything on your device that matters to you is safe and accessible in the event of accidental deletion, system failure, or ransomware attack.

Why backup? Business continuity begins with backups, restoring data from those backups keeps the business up and running. At work, your devices store irreplaceable information. Unfortunately, it’s very easy and costly to lose data. Over, $600 billion are lost to cyber-crime each year, according (PDF) to a 2018 McAfee report.

Stay safe out there!

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Why CTRL + ALT + DELETE

Why CTRL + ALT + DELETEEvery PC user has given their computer the three-finger salute as it locked up – frequently at the most inopportune time. But why CTRL + ALT + DELETE? Turns out the three-finger salute was a 10-minute hack to make programmers life easier. The CTRL + ALT + DELETE was born at IBM (IBM) in the early 1980s.

IBM PCProject Acorn was the code name for the rush project to build IBM’s new personal computer – because Apple (AAPL) and RadioShack were already selling small stand-alone computers. David Bradley was part of the team working from the IBM offices in Boca Raton, FL on the IBM PC.

Mental Floss reports that the programmers’ working on the IBM PC had to manually restart the entire system whenever the computer encountered a coding glitch. This was a waste of time. Mr. Bradley told Mental Floss,  “Some days, you’d be rebooting every five minutes as you searched for the problem … The tedious tests made the coders want to pull their hair out.

IBM logoMr. Bradley worked on everything from writing input/output programs to troubleshooting wire-wrap boards on Project Acorn. In order to placate the programmers, Mr. Bradley created a hack. His hack was a keyboard shortcut that triggered a system reset without memory tests.

To Mr. Bradley CTRL + ALT + DELETE, was just another item to tick off his to-do list. He says. “It was five minutes, 10 minutes of activity, and then I moved on to the next of the 100 things that needed to get done.

The engineer chose the keys by location—with the DEL key across the keyboard from the other two, it seemed unlikely that all three would be accidentally pressed at the same time. Mr. Bradley never intended to make the shortcut available to customers, nor did he expect it to become a cultural icon. It was meant for his fellow coders, for whom every second counted.

Thank IBM for CTRL + ALT + DELETE

The IBM team managed to finish Acorn on schedule. In the fall of 1981, the IBM PC hit the market. It was a dull gray box beneath a green screen monitor. Marketers predicted that the company would sell less than 50,000 units a year. IBM execs thought that estimate was too optimistic. They were all wrong. Computing would never be the same.

Statista Percent of US households with a computer 1984 - 2016

As PC sales took off – few users were aware of Mr. Bradley’s shortcut hidden in their machines. That changed in the early 1990s when Microsoft’s (MSFT) Windows 3 took off. Now Microsoft’s Windows PCs were crashing and the infamous “blue screen of death” plagued Windows users. A quick fix to the BSOD spread by word of mouth (this was before the WWW) – CTRL + ALT + DELETE. Suddenly, Mr. Bradley’s quick hack was a big deal.

At an event celebrating the 20th anniversary of the IBM PC industry big-wigs gathered for a panel discussion. Mental Floss says that the first question to the panel bypassed Microsoft chairman Bill Gates and was for David Bradley. Mr. Bradley, who has always been surprised by how popular his CTRL + ALT + DELETE hack made him, was quick to deflect the glory. The programmer joked;

I have to share the credit, I may have invented it, but I think Bill made it famous.

rb-

Bill Gates has publicly admitted that CTRL + ALT + DELETE was a mistake – but the company he founded continues to use Mr. Bradley’s hack. In Windows 10  the keyboard combination starts Windows Security, which lets you lock the computer, switch to a different user, log off, start Task Manager, or shut down/reboot the computer.

Stay safe out there!

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

COVID On Your Cell Phone

COVID On Your Cell PhoneAmid the chaos of the COVID-19 lock-down one of your only allies in the social distancing campaign is your cell phone. Right? After all, everybody is attached to their mobile phone. In fact, research has shown that millennials check their phones 150 times a day (PDF). Why do we check our cell phones so much?

Researchers from the University of Illinois found in a recent study that 37% of women and 30% of men walking down the street have a smartphone in their hand. The UofI researchers Laura Schaposnik and James Unwin paper The Phone Walkers: A study of human dependence on inactive mobile devices propose four plausible reasons that pedestrians practice this behavior.

Appeasement – The first proposal is that we need immediate access to our phones now because so much of our social lives exist on the phone. In particular, research suggests that people in romantic relationships expect to be texted back within five minutes. We keep our phones out to appease partners.

anxiety if separated from mobile phonesAnxiety – The researcher’s next hypothesis was that we might be psychologically dependent on these phones to the point that we have anxiety if we’re separated from them. The researchers write. “… the simple manipulation of the object could lead to a corresponding decrease in tension or anxiety ….”

Safety – Personal safety is another distinct possibility. Research has found that technology gives young people confidence when facing the potential dangers of crime in a public place. The UofI team says we “..may hold their phones both for personal reassurance against perceived threats and as a visible warning sign to potential assailants.

peacock effectThe peacock effect – We might want to impress a possible partner with our fancy phones. The researchers compared the phenomenon to “displays of affluence by wearing designer fashion clothes or jewelry … to enhance or affirm a person’s social standing and to attract a suitable mate.

We are addicted to our cell phones so what? I have covered the germiness of mobiles on the Bach Seat before. But in the wake of recent events, I checked on current thinking and found that COVID-19 is probably on your mobile. German researchers reported (PDF) in the Journal of Hospital Infection that Coronaviruses can live on inanimate surfaces like metal, glass, or plastic, and remain infectious “from 2 hours up to 9 days.

Coronaviruses can live on surfaces like metal, glass, or plastic, and remain infectious "from 2 hours up to 9 days."Lead researcher Günter Kampf, M.D., an associated professor at the University of Greifswald, reported that a good strategy for surface disinfection is with a solution that contains 0.1% sodium hypochlorite or 62 to 71% ethanol. Either of these “significantly reduces coronavirus infectivity on surfaces within 1 min exposure time.

Charles Gerba, Ph.D., professor of microbiology and immunology at The University of Arizona, told Mens Health

…What we found … in office buildings is that you touch a surface with a virus on it and then you place it on your cell phone.” (A door handle, for example.) … You then go home or to another location and you touch your phone again a touch a table moving it to another location—great way to spread viruses around an office.

great way to spread viruses around an officeDr. Kampf warns,Check with the manufacturer. First, it should be effective against coronavirus … Second, not all disinfectants are compatible with the material of the smartphone surface.

Professor Gerba recommends an alcohol wipe or a microfiber cloth. “I would do it every time I have been out in public,” he says.

rb-

To safely clean your mobile:

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.