Connect with us

Tech News

New ‘ RCS Standard ‘ SMS Alternative Exposes Users to Security Threats!

New SMS Alternative ‘RCS Standard’ Is Exposing Users To Security Threats

This Article Covers New ‘ RCS Standard ‘ SMS Alternative Exposes Users to Security Threats!

Replacement of the regular SMS by the RCS or Rich Communication Services makes users vulnerable to text-based attacks, location tracking, call interception, and more according to new research. RCS standard (Rich Communication Services) is a replacement for SMS with functions such as read confirmations, the ability to send media, etc.

Although the new SMS standard is not inherently flawed, researchers at SLabs state that carrier networks expose users to several security threats because they are implementing RCS on a large scale. Because there is no uniform standard, large telecom companies can use it differently and make mistakes.

What Is RCS?

RCS is a protocol that will soon replace the standard SMS. Although it originated in 2007, we barely recognized it until 2018 when Google announced that it is working with major providers to bring the RCS protocol to Android devices. With the new standard, users can start a group chat, send high-resolution images, audio – mainly all the functions of popular chat services such as iMessage and WhatsApp.

What’S The Problem?

For the research, the SLabs team took sample SIM cards from different providers and searched for RCS-related domains. The o find every vulnerability.

The researchers discovered problems in how telecom sends the RCS configuration files to devices. For example, a server provides the exact configuration file by identifying the IP addresses.

Karsten Nohl of SLabs said that any app could request the file, with or without permissions, because they also use the IP address. “So now every app can get your username and password for all your text messages and all your voice calls.”

The researchers also found security breaches in the authentication process. For example, a telecom sends a unique authentication code to verify the identification of the RCS user. Because the carrier gives an ‘unlimited number of attempts’, bad actors can bypass authentication with unlimited attempts.

Response From Network Providers

When asked to comment, Vodafone assured users that it would take security measures to protect the RCS services. In the meantime, AT&T and Sprint focused their concerns on the GSM Association (a trade organization for telecommunications)

GSM told Vice that although they appreciate the efforts of SLabs to the public, the security issues; however, the study includes “no new vulnerabilities” that the body was unaware of.

The SLabs researchers will report their findings at the Black Hat December conference in Europe.

Continue Reading
Click to comment

You must be logged in to post a comment Login

Tech News

Users Are Still Not In A Hurry To Install New Releases Of Windows 10

Users Are Still Not In A Hurry To Install New Releases Of Windows 10

Here Is The Details:

AdDuplex tracks the delivery status of the different variants of Windows 10. The statistics for June revealed that the October 2018 Update (1809) was only on 30 percent of systems (down from 31.3 percent in May), while the May 2019 Update (1903) was discovered on 6.3 percent of computers in the same time span.

The surveillance company has just published its stats for July ( i.e AdDuplex Report For July 2019), showing that the May 2019 Update has found its way to more devices, but at a very cautious rate.

The revision has gained just 5 % share in the previous month, and is now on 11.4 % of Windows 10 installs.

The April 2018 Update remains comfortably the most popular flavor of Windows 10, with 53.7 % share, although it’s down from the 58 % it held last month.

 

Continue Reading

Tech News

LinkedIn Is Full Of Spies, Is This True?

LinkedIn Is Full Of Spies, Is This Is True?

What types of user are you of LinkedIn? The type that accepts requests from individuals you know only “connects?” Or is there a blanket accepter connecting to all who ask?

LinkedIn Is Full Of Spies, Is This Is True?

Fortunately, many U.S. government officials and political intelligentsia are falling into the latter camp for the American public! Which makes LinkedIn a prime hunting ground for… foreign spies?!

According to a new report from the Associated Press, foreign intelligence operations routinely use LinkedIn to target, connect with, and eventually gain knowledge about and influence over American political affairs.

These operations create fake LinkedIn profiles, boasting impressive (imaginary) credentials alongside computer-generated photos, which send connection requests to politicians, lobbyists, academics, or think tank employees. Once one person accepts, that bolsters the fake account’s credibility, so other high-profile LinkedIn users accept, too, and so it goes.

These profiles send out tens of thousands of connection requests at a time. And, apparently, there have been multiple independent cases of American figures being targeted by Russian or Chinese spy operations via connections they unwittingly accepted on LinkedIn.

The AP spoke with multiple D.C. figures, including a former Trump administration official, who had accepted a connection request from political expert “Katie Jones.” None of Jones’ credentials checked out, and experts determined that her photo was generated by A.I., so Jones, by all accounts, does not exist. But the person running the account still had the ability to direct message with political influencers, posing as a colleague.

LinkedIn told the AP that it removes fake accounts; indeed, it removed Jones’ account shortly after the AP inquired about Katie Jones. But as multiple other social networks have demonstrated, a reactionary stance in the fight against fake activity online is an insufficient one.

AND IN THE CASE OF LINKEDIN AS A BREEDING GROUND FOR ESPIONAGE, THAT’S NOT ENOUGH.

Continue Reading

Tech News

How Do You Turn a Spare Internal Hard Drive into an External USB 3.0 Hard Drive?

These days, hard drives are dirt inexpensive compared to previous prices, particularly when you consider the huge drive sizes presently on the market.

That’s why a lot of individuals choose to upgrade their current computers ‘ hard disks instead of purchasing a whole fresh PC.

How Do You Turn a Spare Internal Hard Drive into an External USB 3.0 Hard Drive?

How Do You Turn a Spare Internal Hard Drive into an External USB 3.0 Hard Drive?

If you’re one of those who took the plunge and upgraded your computer’s hard drive, you might wonder what your ancient drive can do.

Well, you have a few choices, but my favorite is to convert the old drive to an internal USB hard drive. All you need to do is buy and plug your drive into an internal USB 3.0 hard drive enclosure. It’s that easy really!

External hard drive enclosures used to be costly, but no more. You can actually discover them for less than $10 on Amazon (click here to see their present range).

Note: Most recent hard drives have SATA connections so any SATA compatible external enclosure will work with them.

However, if your drive was abstracted from an older computer it would well have a different interface (IDE/ATA/PATA, etc.). If your drive uses one of those legacy interfaces you’ll need to purchase an external enclosure that fortifies that interface.

If you’re unsure about which interface type your drive has, feel in liberty to contact me I’ll avail you cull the right one. Simply send me a message containing the brand and model of either the hard drive itself or the computer it was abstracted from.

While your fresh external hard drive is unlikely to be nearly as spacious as one you can purchase off the shelf today, a backup set or two will probably be large enough to store.

Furthermore, most of us can always use an additional internal drive, right? And it’s quite a deal with about 10 dollars!

If you decide to transform your old internal hard drive to an external USB hard drive, here are a few things to consider:

  1. If your computer doesn’t have USB 3.0 ports, you can probably add some for about the cost of a good pizza.
  2. After installing the drive in the enclosure and plugging it into your PC, you’ll probably want to reformat it. Simply right-click on the the drive in Windows Explorer / File Explorer, and click Format.

Important! Make sure your new drive, and its Windows installation is working as it should, and That you’ve copied all of your files off the old drive before you format it!

 That’s All There Is To It! Good Luck!

Thanks for Visiting: www.GreenhatPro.com

Thanks for reading “How Do You Turn a Spare Internal Hard Drive into an External USB 3.0 Hard Drive?”. If you found this post useful, don’t forget to share it with your friends. Want more Tools & useful tips, you can follow us on Facebook, Tumblr and Twitter.

Continue Reading