By continuing to use the site or forum, you agree to the use of cookies, find out more by reading our GDPR policy

This review was written after using Android 10 for the past two months, as well as a week of the final release which is much the same as the previous betas. Android 10 is Google’s latest Android software version and is the version of Android that will be on the Pixel 4 when it launches. There aren’t many huge features packed in here as there would be with iOS. This isn’t a knock on Android however, it’s because Google trickles down features to its apps via the Play Store rather than waiting for a single large annual update. With Android 10, Google will also start pushing security updates via the Play Store as well. So enough about what’s not new here, here’s what IS new here. While Android 10 has a bevy of new features, only a few of them are directly relevant or even worth mentioning to new users. The first is the new gestures system, the second is the dark theme, and the last is the new privacy system. Before that, there are a whole bunch of other interesting features Google’s advertised with Android 10. We’ve got Live Caption, a feature that’ll let your phone add captions to whatever audio is playing automatically even if there aren’t any subtitles present. It’s meant to be an accessibility feature and something that’ll improve the quality of life of Android users with hearing difficulties. Google has also announced Focus Mode, a series of features to help users improve their productivity on their phones. Aside from being highlighted on the Android 10 official release, both features have the dubious distinctions of not actually being present in the final release itself almost as if Gooogle couldn’t be bothered to complete its work before releasing the project. And that’s an issue with Android 10 in general that I’ve noticed. Read the review on OUR FORUM.

Cobalt Dickens, a threat actor associated with the Iranian government, ran a phishing operation in July and August that targeted more than 60 universities in countries on four continents. Security researchers say that the group's hacking activity affected at least 380 universities in more than 30 countries, many of the targets being hit multiple times. The latest phishing campaign was directed at organizations in Australia, Hong Kong, the U.S., Canada, the U.K., and Switzerland. It used at least 20 new domain names registered using the Freenom service that offers free top-level domain names (.ml, .ga, .cf, .gq, .tk). A fraudulent email Cobalt Dickens sent to people with access to the library of the targeted university, shows a message that prompted to reactivate the account by following a spoofed link. Using a spoofed link is a change in the modus operandi as previous campaigns from the group relied on shortened URLs to direct to the fake login page. Following the fake link leads "to a web page that looks identical or similar to the spoofed library resource," say researchers from Secureworks' Counter Threat Unit (CTU). Once the credentials are provided, they are stored in a file named 'pass.txt' and the browser loads the genuine university website. To cancel suspicions of fraudulent activity, the threat actor often uses valid TLS certificates for its websites. Most of the certificates observed in this campaign are free, issued by the Let's Encrypt non-profit certificate authority. Also known as Silent Librarian, the group focuses on compromising educational institutions, although its victims count private sector companies, too. Its purpose seems to be stealing library account credentials and selling academic resources as well as access to them to customers in Iran. Nine individuals believed to have roles in the group's activity were indicted by the US Department of Justice in March 2018 for cyber intrusion activities. It is believed that they were partners or hacker-for-hire for a company called Mabna Institute that carried hacking operations since at least 2013. You can find the complete posting on OUR FORUM.

Attackers can use genuine binaries from Microsoft Teams to execute a malicious payload using a mock installation folder for the collaboration software. The problem affects most Windows desktop apps that use the Squirrel installation and update framework, which uses NuGet packages. A list of impacted products, as tested by the security researcher that made the discovery, includes WhatsApp, Grammarly, GitHub, Slack, and Discord. Reverse engineer Reegun Richard found that he could create a fake Microsoft Teams package and use a signed binary to execute anything present in a specific location. One notable aspect of the experiment is that no resources are required on the target system other than the minimum package created by the attacker. The researcher found that the genuine 'Update.exe' file and two folders - 'current' and 'packages,' all being part of a normal Microsoft Teams installation, are sufficient to launch on the system malware that inherits the trust of the signed executable, allowing the defeat of some defense mechanisms. It appears that the 'Update' executable blindly deploys anything that is present in the 'current' folder. The 'packages' location needs to have a 'RELEASES' file, albeit it does not have to be valid. "It just needs the format 'SHA1 filename size'. Microsoft is aware of the problem but decided not to address it. The researcher says that the reason the company gave him was that the glitch "did not meet the bar of security issue." The researcher explains that not all NuGet packages are vulnerable but all apps relying on the Squirrel one-click installer are. More details can be found on OUR FORUM.