{"id":3471,"date":"2014-03-28T14:53:23","date_gmt":"2014-03-28T18:53:23","guid":{"rendered":"http:\/\/kasperskydaily.com\/uk\/?p=3471"},"modified":"2020-02-26T15:08:47","modified_gmt":"2020-02-26T15:08:47","slug":"a-week-in-the-news-3282014","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.uk\/blog\/a-week-in-the-news-3282014\/3471\/","title":{"rendered":"A Week in the News: Metadata, Zero Days, MH 370 Phishing and More"},"content":{"rendered":"<p>Last week was something of a slow week for those of us that spend our days writing about computer security news. However, while there may not have been an abundance of news events, there were a small handful of noteworthy stories that emerged.<\/p>\n<p>In brief, the security firm White Hat has released its internal Web browser, which focuses on security and privacy, for use on Windows machines; U.S. President Barack Obama called for an end to NSA metadata collection; scammers used lost Malaysian Airlines flight MH 370 as bait in phishing scams, and another Microsoft zero day emerged.<\/p>\n<p><b>The Aviator Browser<\/b><\/p>\n<p>Internet security and privacy is as fashionable as ever, thanks, in no small part, to revelations over the last year that the United States\u2019 National Security Agency has the capacity to spy on essentially whomever they want. However, securing Web sessions and ensuring that they remain as private as possible is tough work, especially for users who lack the technical understanding or \u2013 perhaps more importantly \u2013 the time to really get to the bottom of their favorite browser\u2019s settings.<\/p>\n<p>Thus, our friends over at White Hat Security decided to release their Aviator browser to the public (<a href=\"https:\/\/threatpost.com\/jeremiah-grossman-on-the-aviator-browser\/102708\" target=\"_blank\" rel=\"noopener nofollow\">for Mac \u2013 at least<\/a>) a few months ago. They\u2019ve been using the browser internally for a few years now. Earlier this week,<a href=\"https:\/\/threatpost.com\/whitehat-releases-aviator-browser-for-windows\/104960\" target=\"_blank\" rel=\"noopener nofollow\"> they released the Windows variety<\/a>, making the browser available for a far larger audience.<\/p>\n<p>Aviator is built on the Chromium code base, which is very similar in feel and look to Google\u2019s Chrome browser. However, Aviator is designed to optimise user privacy, security, and anonymity. By default, the browser disallows Web tracking for and by advertisers. DuckDuckGo is the default browser, which doesn\u2019t collect user search history or present ads or track users in any way.<\/p>\n<p>In all, the browser doesn\u2019t simply block ads in the way that a number of popular extensions on the big three browsers do, but rather, it doesn\u2019t make any connections to ad networks at all. Not only does this prevent pervasive corporate tracking, but it also protects users from potentially malicious advertisements. The company says that an added benefit of all this is that the browser actually ends up performing faster than most other browsers.<\/p>\n<p><b>Obama Calls for an End to Metadata Collection<\/b><\/p>\n<p>Almost a year ago, it emerged that the NSA was gathering and holding onto the communications metadata of nearly anyone with a mobile phone or computer. Of all the secret information made public by former NSA contractor Edward Snowden \u2013 and it\u2019s a long list of damning allegations against the U.S. spying apparatus \u2013 blanket metadata collection seems to have been the revelation that has gained the most traction with the U.S. audience. This is particularly odd because most people didn\u2019t even know what metadata was two years ago, but also because \u2013 in retrospect \u2013 metadata collection is a bit modest in comparison to some of the other things the NSA has been caught doing.<\/p>\n<p>Any progress is good progress though, and <a href=\"https:\/\/threatpost.com\/white-house-proposal-would-end-nsa-metadata-progam\/105006\" target=\"_blank\" rel=\"noopener nofollow\">the White House has apparently decided it wants to end the intelligence agency\u2019s collection and storage of phone records<\/a>. Under the current system, the NSA stores phone record information for five years. Under the new rules, the NSA wouldn\u2019t store metadata at all. It would instead remain with the various service providers who would only be required to retain such information for 18 months.<\/p>\n<p>In fact, just now, as I write this very article, <a href=\"https:\/\/threatpost.com\/white-house-releases-proposal-to-end-section-215-bulk-collection\/105092\" target=\"_blank\" rel=\"noopener nofollow\">the White House has made public its plan to end the bulk collection of metadata as was permitted under section 215 of the controversial PATRIOT ACT<\/a>.<\/p>\n<p><b>Phishing MH 370<\/b><\/p>\n<p>As you\u2019re likely aware, some three weeks ago, a Malaysian Airlines flight travelling from Kuala Lumpur to Beijing vanished bizarrely and seemingly without a trace with more than 200 people onboard. At the time of writing, it\u2019s been determined that that flight ended in tragedy. Yet, still there has been no concrete evidence of the flight\u2019s whereabouts, other than that it likely crashed into the Indian Ocean somewhere.<\/p>\n<p>Like other mysterious events and unexplainable disappearances, the saga of MH 370 \u2013 despite what was always likely to be a terrible tragedy \u2013 has generated a laundry list of absurd and ridiculous conspiracy theories, many of which have been perpetuated by shameless media coverage.<\/p>\n<p>Just as shamelessly (albeit less shockingly because now we\u2019re talking about criminals and not people that call themselves journalists), hacking groups have taken to the Internet to exploit MH 370 for financial and informational gain as well.<\/p>\n<p>More than a few social media click scams emerged, suggesting that MH 370 had been found. Users were prompted to click on a link purporting to contain a news story. This old-fashioned link phishing scam pops up nearly any time anything gathers public attention (celebrity deaths, international sporting events, natural disasters, the list goes on). However, there was also <a href=\"https:\/\/threatpost.com\/mh-370-related-phishing-attacks-spotted-against-government-targets\/105024\" target=\"_blank\" rel=\"noopener nofollow\">a more sophisticated and targeted spear phishing campaign<\/a> in which attackers disseminated emails related to the flight with malicious attachments to government officials in the U.S. and Asia Pacific.<\/p>\n<p><b>Microsoft Word Zero Day<\/b><\/p>\n<p>Finally, on Monday, the tech giant Microsoft announced on its Technet blog that it had seen targeted attacks in the wild going after a <a href=\"https:\/\/threatpost.com\/targeted-attacks-exploit-microsoft-word-zero-day\/104980\" target=\"_blank\" rel=\"noopener nofollow\">zero-day vulnerability in Microsoft Word<\/a> 2010. While the attacks they saw were targeting Microsoft Word 2010, the company said that the vulnerability also affected Word 2003, 2007, 2013 and 2013RT, as well as Office for Mac, Office Web Apps 2010 and 2013, and Word Viewer. They created a fix-it tool for the bug and should have a patch available sometime in the next couple of weeks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Last week was something of a slow week for those of us that spend our days writing about computer security news. However, while there may not have been an abundance<\/p>\n","protected":false},"author":42,"featured_media":3472,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,2026],"tags":[134,555,38,553,76,43,97,554],"class_list":{"0":"post-3471","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-browser","10":"tag-mh-370","11":"tag-microsoft","12":"tag-news-2","13":"tag-phishing","14":"tag-privacy","15":"tag-security-2","16":"tag-zero-day"},"hreflang":[{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/a-week-in-the-news-3282014\/3471\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/a-week-in-the-news-3282014\/3161\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/a-week-in-the-news-3282014\/3058\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/a-week-in-the-news-3282014\/3473\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/a-week-in-the-news-3282014\/4248\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/a-week-in-the-news-3282014\/4248\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/a-week-in-the-news-3282014\/4248\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.uk\/blog\/tag\/browser\/","name":"browser"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3471","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=3471"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3471\/revisions"}],"predecessor-version":[{"id":18966,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3471\/revisions\/18966"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media\/3472"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=3471"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=3471"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=3471"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}