2) Scam Emails
Predictably, the emergence of the Omicron variant has spawned new malicious email opportunities. Often, email attacks (termed ‘phishing’) play on people’s fear, have a sense of urgency, or use official badges to make people trust them. We saw this at the start of the pandemic… now, as people become more worried again, scams are encouraging them to pay for delivery of home kits (… input credit card details here…) or to set up accounts with security questions and personal details. Make sure you are visiting only official sites, and be very wary of unsolicited emails containing links that send you elsewhere.
These scam emails are also often used to make a user download malicious software onto their device, often by clicking on an attachment, and being asked to enable further action for the content to display. Last month we became aware of particularly unpleasant one that had been circulated, entitled ‘employee termination’ – advising the recipient that their services were no longer required, and that full detail could be found in the attached file. Just a question: would you click on this, or would one of your team? If the answer is ‘maybe’ then perhaps the team needs to be more aware of how phishing works. Do let us know if you need a hand.
3) Managing your passwords
National Cyber Security centre
advice continues to recommend password managers which remember every password that you use, so you don’t have to. LastPass is a widely-used example.
Over the last month, several users have reportedly complained that their LastPass accounts were blocked as a result of login attempts from unfamiliar locations,
using the right credentials. But LastPass say that there is no indication a breach has taken place. So how could anyone have had the correct login details? Chances are, this is the same story of people recycling passwords on a number of different sites. It’s critically important that if you do use a password manager, it has a strong and unique password which only you know, and you should support this where you can with two factor authentication.
4) Apple HomeKit
HomeKit is Apple’s software for configuring and connecting smart home devices. Right now, it has a flaw. If one of your devices has a name of over half a million characters, your iphone / ipad will crash. Which sounds improbable: but what if I set up a device with a name like that and invited you to connect? The so-called ‘doorlock’ vulnerability does just this. Once you’ve connected, your device fails and goes into an indefinite cycle of crashes until you reset it from the recovery or device firmware update mode. And if you sign back into icloud, where the device name will be stored, you’ll crash again. Indefinitely. Apple are aiming to produce a fix in early 2022 but we thought it was worth flagging this one now. Be wary of which devices you connect to.
5) Y2K XXII
Not really a security issue: but we thought we’d give you this one as a freebie, if you’re experiencing an unusually quiet New Year. Many of you will remember when the millenium’s change of digits was supposed to create IT chaos. Apparently, the gremlins were actually waiting for the calendar to shift from 2021 to ’22… at which point they refused to send on any emails. A more detailed and mathematical explanation is found in the attached
article. If like other companies you’ve found that the world seems to have gone a bit quiet, you’ll be reassured to know that a fix is at hand. Happy New Year.