close
  • Ga chevron_right

    The open source CrowdSec bouncer is designed to be included in any PHP application (inc WordPress sites) to help block attackers

    Danie van der Merwe · news.movim.eu / gadgeteerza-tech-blog · 4 days ago - 13:34

https://upload.movim.eu/files/62f168f3fbecac605d21a105beda461820293db1/2oh1p4b3BmEF/security_password_chaos_engineer.jpg

PHP is a widely-used programming language on the web, and it's estimated that nearly 80% of all websites use it. CrowdSec provides server admins with a PHP bouncer to help ward away bots and bad actors who may attempt to interact with PHP files. Note that a server agent must be installed, with the bouncer application running at website level. WordPress has a plugin, whilst Drupal does not, but for Drupal you can use the PHP Bouncer directly.

See https://opensource.com/article/22/1/php-website-bouncer-crowdsec

#technology #security #websites #bots #wordpress #secops

  • Ga chevron_right

    EFF praises Android’s new 2G kill switch, wants Apple to follow suit - In some countries, 2G only serves as an attack vector, so why not turn it off?

    Danie van der Merwe · news.movim.eu / gadgeteerza-tech-blog · Saturday, 15 January - 12:27

The Electronic Frontier Foundation is celebrating Google's addition of a 2G kill switch to Android 12. The digital rights group has been campaigning against the dated, insecure 2G cellular standard since 2020, and Android is the first mobile OS to take the group's advice and let users completely disable 2G.

The problem is that 2G is very old, and it's a lot like connecting to a WEP-secured Wi-Fi hotspot—the security is obsolete, so it's easy to crack. If you're in a country where legitimate uses of 2G are long dead, the standard only serves as an attack vector via fake cell phone towers, so why not just shut it off?

See https://arstechnica.com/gadgets/2022/01/eff-praises-androids-new-2g-kill-switch-wants-apple-to-follow-suit/

#technology #2G #mobile #security #eff

  • Ga chevron_right

    Use a SSH Config File to Manage SSH Connections to Various Remote Servers (or Pi's) instead of remembering IP addresses, ports, etc

    Danie van der Merwe · news.movim.eu / gadgeteerza-tech-blog · Thursday, 6 January - 19:26

Using SSH profiles can help you in cases where you regularly connect to various servers (especially if you've added custom SSH ports to the mix too). No need to remember the IP address and other such details for SSH connection.

So once you've configured this config file in ~/.ssh all you need to login is something like 'ssh webserver' or 'ssh omv-server'. It won't remember passwords, but if you have set up public key access, you won't need any password to login.

This is on my todo list now as I have two servers and two Raspberry Pi's that I log into quite regularly, and every time it is a check for the IP address, correct user name, password, etc.

See https://linuxhandbook.com/ssh-config-file/

#technology #security #Linux #SSH #tips

  • Ga chevron_right

    Swiss Army bans all chat apps but locally-developed Threema - No e-mail or phone no to register, and immune from US CLOUD Act

    Danie van der Merwe · news.movim.eu / gadgeteerza-tech-blog · Thursday, 6 January - 18:33

The Swiss army has banned foreign instant-messaging apps such as Signal, Telegram, and WhatsApp and requires army members to use the locally-developed Threema messaging app instead. As Threema is a paid subscription communications service, the Swiss army promised to cover the annual subscription cost for all soldiers, which is roughly $4.40 per user. Although the troops are expected to follow the official instruction, there are no current penalties if army members use foreign IM apps.

The open source client applications E2E encrypt all messages and files that are sent to other Threema users with their respective public keys. Once a message is delivered successfully, it is immediately deleted from the servers.

Swiss officials underlined the most important difference is that Threema isn't subject to the U.S. Cloud Act, which was passed in 2018 "hidden" inside a budget spending bill. The controversial law lifts the need for securing a search warrant when a U.S. state agency needs to access and scrutinize someone's online data.

See https://www.bleepingcomputer.com/news/security/swiss-army-bans-all-chat-apps-but-locally-developed-threema/

#technology #switzerland #Threema #E2EE #security

  • Ga chevron_right

    5 Essential Steps to Secure Your Linux Server From Hackers

    Danie van der Merwe · news.movim.eu / gadgeteerza-tech-blog · Thursday, 6 January - 14:24

These are really not overly complicated, but are well worth doing for any hardware server, or server you have hosted remotely somewhere on a VPS hosting. It's nothing very fancy but should prevent most of the common exploits that try login into the server via SSH.

What remains of course is any applications (and their 3rd party plugins) that you're running on that server, and which are exposed to the Internet, but that is often specific to the application (or the use of something like Nginx Proxy Manager).

Watch https://youtu.be/ZhMw53Ud2tY

#technology #security #Linux #server #hacking

  • Ar chevron_right

    Pluton, Microsoft’s new security chip, will finally be put to the test

    news.movim.eu / ArsTechnica · Tuesday, 4 January - 22:15

Promotional image of new laptop computer.

Enlarge (credit: Lenovo )

In November 2020, Microsoft unveiled Pluton, a security processor the company designed to thwart some of the most sophisticated types of hack attacks. On Tuesday, AMD said it would integrate the chip into its upcoming Ryzen CPUs for use in Lenovo's ThinkPad Z Series of laptops.

Microsoft already used Pluton to secure Xbox Ones and Azure Sphere microcontrollers against attacks that involve people with physical access opening device cases and performing hardware hacks that bypass security protections. Such hacks are usually carried out by device owners who want to run unauthorized games or programs for cheating.

Now, Pluton is evolving to secure PCs against malicious physical hacks designed to install malware or steal cryptographic keys or other sensitive secrets. While many systems already have trusted platform modules or protections such as Intel’s Software Guard Extensions to secure such data, the secrets remain vulnerable to several types of attacks.

Read 11 remaining paragraphs | Comments

index?i=jJh6xupQ3LI:GFyElaijXlw:V_sGLiPBpWUindex?i=jJh6xupQ3LI:GFyElaijXlw:F7zBnMyn0Loindex?d=qj6IDK7rITsindex?d=yIl2AUoC8zA
  • Ga chevron_right

    Trap hackers in your server using Endlessh as a SSH Honeypot and wastes their time

    Danie van der Merwe · news.movim.eu / gadgeteerza-tech-blog · Tuesday, 4 January - 14:08

Endlessh is an SSH tarpit that very slowly sends an endless, random SSH banner. It keeps SSH clients locked up for hours or even days at a time. The purpose is to put your real SSH server on another port and then let the script kiddies get stuck in this tarpit instead of bothering a real server.

See https://youtu.be/SKhKNUo6rJU

#technology #hacking #security #SSH #Endlessh

  • Ga chevron_right

    Cryptgeon is a secure, open source sharing note / file service inspired by PrivNote

    Danie van der Merwe · news.movim.eu / gadgeteerza-tech-blog · Friday, 24 December - 14:05

The note can have a file attachment, and self-destructs based on either a time or view number limit. The unique link generated, is how the note contents are retrieved, so no separate passwords are needed.

Each note has a 512bit generated ID that is used to retrieve the note. Data is stored in memory and never persisted to disk. The note is then encrypted with AES in GCM mode on the client side and then sent to the server. Data is stored in memory and never persisted to disk. The server never sees the encryption key and cannot decrypt the contents of the notes even if it tried to.

See https://github.com/cupcakearmy/cryptgeon

#technology #encryption #security #notes #cryptgeon