fbpx
Open post

Net neutrality and the FCC’s use of deceased people’s name

Lately the internet has been abuzz about net neutrality and preventing it from being stolen from us, lest we want to see a degradation in our society. Even knowing this, and having sent the FCC millions of petitions and signatures, the chair of the FCC still ignored the pleas of the masses and voted for tearing down our rights to online access and freedom to roam. Not only did the FCC ignore the masses, but the FCC also decided to revive the dead and use them against us.

 

What is net neutrality? 

First lets quick cover the basis of what net neutrality is. Net neutrality is basically a guiding rule or principle. It preserves our right to roam and communicate freely online, without the interference of those in a higher power position. It is free speech for the internet. This allows us to have access to all forms of information without any bias in the mix, restricting what we see and read and learn. For example, if net neutrality does become history, Fox news could pay to have specific internet providers show news from them, and them alone. This would cause a great tunnel vision in our society, and depending on peoples specific situations, cause a rift in general knowledge and understanding, leading to more chaos separation in our society.

Deceased commentators 

So back to the first paragraph, deceased persons coming to life. On multiple instances, there has been a realization that people who have passed away are somehow posting onto the FCC’s site, tickets that are in favor of getting rid of net neutrality. Family members of these deceased commentators have outright called on the FCC for their immoral and illegal actions, demanding they stop such horrid actions and be taken to court for just desserts.

Comments by the deceased were sometimes word for word, the same as other comments by other deceased persons. This shows the action as being a form of spam. But the issue at hand is that the FCC is using identities of Americans who have died to try and defend their actions by putting words in their mouths and pretending they were still alive.

As a response, the FCC has said that unvetted commentary has lost all forms of power online, and will therefore be dismissed. The only way comments will be considered is if they are cryptographically secure identities, tied to living persons.

The FCC has stated they will not help in the pursuit of those using deceased Americans identities.

Net neutrality is obviously something very important for more than just online surfing, it gives access for students and education, for keeping the world in mind and staying up to date on global events and being able to read both sides and come to ones own conclusions. Net neutrality is so much more than just “the internet” it is a necessity in a world ever growing in technological involvement.

Educated yourself on the issue

Learn about net neutrality, make an educated, well thought out decision on the matter, and then give your comments to the FCC. Here is a helpful link to the FCC’s site where you can submit your comments. http://gofccyourself.com

Open post

Reddit user discloses some major issues with Mac OS root login

Recently, a user on Reddit gave information on a huge Mac OS High Sierra vulnerability. Access to “root” permissions is as easy as an empty password, potentially leaving users extremely vulnerable. If someone has physical access to a Mac OS High Sierra system, they can access personal files and change anything without any admin credentials.

This is a huge vulnerability for Mac users. Developer Lemi Orhan Ergin contacted apple to inform them of the vulnerability. Apple at the time had no update ready for such an issue, however informed of users a way to mitigate the possibility of someone gaining root access.

Disable guest users 

Opening up the system preferences and finding the “Users & Groups” section you can select guest users and uncheck “Allow guests to log into this computer.”

By doing this, no one can log into a guest user account and give them direct access to the root permissions option.

Change root password on Mac OS High Sierra

Another means of mitigating this issue, is by actually assigning a password to the root permissions, so if someone did attempt to enter with an empty password, they would be outright blocked.

  1. Launch systems and preferences
  2. Select users and groups
  3. Login options
  4. Join which is next to the “Network Account Server”
  5. Open Directory Utility
  6. Click the lock icon, and enter your password to gain access
  7. Once inside, in the menu bar of directory utility, select “Change Root Password”

That’s it! Make your own password for the Root access and ensure it is strong to keep it worth this effort!

Apple has informed that they are working on a quick patch, so the problem shouldn’t be relevant for too long, however it is always good to become familiar with this side of your system and learn of it’s layout, in case something in the future pops-up involving the same issue.

Stay safe and hacker free! Give us a call at re2tech and we can beef up your security and help explain your system and it’s workings to you in the process! 

Open post

OnePlus Update

OnePlus has been under some heat lately for their non-consensual data snooping through their mobile devices.

After a security researcher had exposed OnePlus for their snooping, they have reportedly admitted to the non-consensual action. Their address to their customer service forum on Friday the 13th confirmed such accusations. OnePlus tried to clarify and explain that the intent of the program was to improve user experience on it’s OxygenOS software.

OnePlus stated they have at no point shared any of the information with outside parties, to help ease the anxiety of their customers. OnePlus has stated that they will stop collecting telephone numbers, MAC addresses and WiFi information by the end of October. Also at the end of October, the company will prompt all users on how and why they collect data and will give an option to users to opt out of the data collection.

Their is still tension with some customers for fear of their data being mined for its value to marketers.  Despite opting out of the data gathering, there is still no real change. By opting out, the only difference is that there is no tags that link back to the device the data was gathered from. Currently there is still no sure-fire way to prevent the data from being gathered. 

Open post

WPA2 protocol leaves all access points vulnerable! Including yours!

Recently, some online researchers have discovered a fatal flaw in the WPA2 protocol. This flaw can affect anyone and everyone that is involved with Wi-Fi access.

This flaw allows potential attackers to manipulate vulnerable information such as passwords, e-mails, and other encrypted data, whilst intercepting that information they may also leave ransomware or other malicious content into a website a client is visiting.

The point of weakness is called KRACK, short for Key Reinstallation Attacks. Supposedly the research has been kept under wraps and was designated for disclosure on Monday at 8am.

This point of weakness affects the core WPA2 protocol itself and is highly effective against devices running Android and Linux as well as OpenBSD. To a less extreme measure. it also affects macOS, Windows, and MediaTek Linksys, along with other types of devices. It’s believed that attackers can exploit the flaw to decrypt a cache of data that is normally secured by the ubiquitous Wi-Fi encryption protocol.

The vulnerability allows potential access to credit card numbers, passwords, chat messages, emails, photos among many other possibilities. All modern Wi-Fi protected networks.

The attack functions by forcing the phone/device to reinstall an all-zero encryption key, rather than a real key.  Some may think that visiting only HTTPS-protected pages would solve the issue, however the risk remains due to many sites possibly being improperly configured allowing the forceful action of dropping encrypted HTTPS traffic and instead transmitting unencrypted HTTP data.

Patches have started to be developed for devices at the most risk currently. Thus far Linux patches have been developed but there is no word when they will be released. Some however not all Wi-Fi access points have patches available right now.

There will be an official address on November 1st at the ACM conference on Computer and Communications Security in Dallas. Its believed the address will also be available on krackattack.com’s site.

This could become one of the biggest threats to large corporations and government Wi-Fi networks.

Its advised to abstain from Wi-Fi use until patches are available and instead use a wired connection.

contact use with any questions/concerns about your vulnerability 

Open post

Watch out for Ransomware!

WannaCry 2.0 is a new form of ransomware that is affecting Windows computers around the world. Ransomware is a type of malware that encrypts all your data on your PC, and the only way to unlock it is to completely erase your hard drive or pay a ransom to the hacker.
If you have a mac, you are safe from this particular version but that does not mean you are completely safe from ransomware or other types of malware all together. As of right now Macs are gaining popularity, but windows remains the most popular of the two operating systems. Your average Mac user believes they are immune to picking up any sort of virus on their computer. It is true that a Mac user is less likely to attract some sort of malware or virus, but this is only because windows remains the most popular. Hackers focus on windows users because it makes the most sense. If they want to maximize their profits or data gathered, it only makes sense for them to attack the most popular OS. This doesn’t mean Macs are safe from viruses and malware, it just means it is less likely. With that in mind, you still should be very careful of what your clicking on and downloading.
Here at Re2 Tech, we have lots of experience dealing with these sorts of things. If you are ever effected with a virus or malware, reach out to us if you need help taking care of the problem. We are here to help.
contact_us_button

Open post

Having a Mac doesn’t necessarily mean your safe from Malware

For some time now, many people have believed that viruses and malware on a Mac was impossible. This is not true. The most recent threat to mac users goes by the name Dok. Dok targets all versions of Mac OS, and will completely take control of your mac if you let it. Also, at this moment, anti-malware software is not picking up said virus. But for the time being the only way for this malware to infect your computer is if you open the Zip file attached to an unfamiliar email.

Once Dok is successfully installed to your Mac, it gets access to all communications going through your computer, including those encrypted by SSL. The attacker does this by secretly redirecting traffic through a malicious proxy server. Here the attacker can monitor your data and pick out anything that they might want. When complete, the software deletes itself.

This proves that even Mac users are not safe from malicious software.
If your having any issues and need support contact us today!contact_us_button

Source : http://www.pcmag.com/news/353411/dok-malware-takes-complete-control-of-your-mac

Scroll to top