loader from loading.io

Welcome! New Office macro attacks against MacOS plus more on Tech Talk with Craig Peterson on WGAN

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Release Date: 08/15/2020

eSIM Exposed: Safeguarding Mobile Privacy & Combatting Hacks show art eSIM Exposed: Safeguarding Mobile Privacy & Combatting Hacks

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

  Chris's $10,000 smartphone hack is just one instance of a concerning trend of cyberattacks. Today, we're delving deep into eSIM technology, a game-changer in mobile privacy and security. Cybersecurity Concerns: The rise in hacking incidents highlights the urgent need for robust cybersecurity measures, especially in the mobile space. eSIM Technology: Exploring the intricacies of eSIMs reveals both their potential and the security challenges they present. Online Privacy: With eSIMs becoming more prevalent, understanding their impact on online privacy is crucial for users. Combatting...

info_outline
Disappear Online: Expert Tips for Digital Cleansing! show art Disappear Online: Expert Tips for Digital Cleansing!

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

  In today's digital age, our online presence can become cluttered and overwhelming, affecting not just our digital identity but also our cybersecurity and privacy. Let's delve into the expert secrets of digital cleansing to ensure a safer and more secure online journey: Understanding Digital Clutter: Learn how digital clutter impacts your life and why it's essential to tidy up your online presence. Cybersecurity Concerns: Uncover the risks posed by unchecked emails, unused accounts, and shares, and how they can compromise your cybersecurity. The Importance of Online Privacy:...

info_outline
Defend Your Digital Domain: Transforming Home Networks for Cybersecurity show art Defend Your Digital Domain: Transforming Home Networks for Cybersecurity

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Hey there! Is your home Wi-Fi a potential cyber threat? Let’s bolster your network's defenses! Here's what you'll find in this guide: Privacy Concerns: Understand the risks associated with a vulnerable home network and the importance of safeguarding your personal information. Wi-Fi Security: Learn how to secure your home Wi-Fi network to prevent unauthorized access and protect your devices. Smart Devices: Explore the security challenges posed by smart devices and how to mitigate these risks effectively. Network Segregation: Delve into the concept of dividing your home network for...

info_outline
Unlocking the Secrets of Online Privacy: Cracking the Code to Secure Chats show art Unlocking the Secrets of Online Privacy: Cracking the Code to Secure Chats

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Have you ever paused mid-message, wondering who might be lurking in the digital shadows? I've delved deep into the realms of online privacy, spam prevention, encryption, and the intricacies of organizing your digital life to keep your conversations secure. Join me on this thrilling journey through cyberspace as we unravel the secrets of safeguarding your chats. Here's what you'll discover in our expedition: Privacy in the Digital Age: Uncover the nuances of online privacy and learn how to navigate the digital landscape confidently. Combatting Cyber Threats: Dive into the world of...

info_outline
Defend Your Inbox: The Ultimate Plus Addressing Privacy Solution! show art Defend Your Inbox: The Ultimate Plus Addressing Privacy Solution!

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Hey there! Ever find yourself drowning in a sea of spam emails? 📧 Fret not! I've got the perfect solution to not only declutter your inbox but also fortify your online privacy and cybersecurity. 🛡️ Introducing the ultimate guide to digital clean up, with a focus on plus addressing for enhanced privacy and organization. No more sifting through unwanted emails – this guide is your ticket to a streamlined and secure email experience. 📥 Here's what you'll find in this comprehensive guide: Privacy Reinforcement: Learn how plus addressing can act as a shield, allowing you to...

info_outline
Online Advertising Transformed: Google's Move Beyond Cookie Dependency show art Online Advertising Transformed: Google's Move Beyond Cookie Dependency

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Hold onto your hats, tech enthusiasts! 🎩💻 Get ready for a seismic shift in the digital landscape as Google bids farewell to cookies, ushering in a new era where privacy is more than just wishful thinking. Say goodbye to the cookie craze! 🍪🚫 In my latest deep dive, "Digital Clean Up: Navigating Google's Game-Changing Shift in Online Advertising," I'm unraveling the intricacies of this groundbreaking move and what it means for all of us navigating the vast realms of the internet. 🌐🔍 Here's what you can expect in this enlightening journey: Advertising Evolution: Explore...

info_outline
Crack the Code: Mastering Windows Security and Digital Clean-Up Tactics show art Crack the Code: Mastering Windows Security and Digital Clean-Up Tactics

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

In the fast-paced world of technology, your Windows device needs the ultimate defense against cyber threats. I've revamped the guide, diving deep into the realms of anti-virus protection, cybersecurity, and online privacy. Here's your roadmap to a digitally clean and secure future: Windows Defender vs. Norton vs. Malwarebytes: Uncover the strengths and limitations of each superhero in the battle against cyber villains. The War Against Malware: Arm yourself with knowledge on the latest malware trends and the tools to combat them effectively. Guarding Your Cyber Fortress: Explore...

info_outline
Boost Online Privacy: A Cyber Spring Clean show art Boost Online Privacy: A Cyber Spring Clean

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Is your digital realm resembling a messy attic? Files overflowing like forgotten knick-knacks, an inbox resembling a confetti blizzard, and social media feeds choked with digital dust bunnies? Fear not, fellow data denizens, for spring cleaning season has arrived – and this year, we're reclaiming our online peace of mind! But unlike dusting cobwebs and decluttering drawers, taming our digital wilderness requires a different arsenal. Forget brooms and vacuum cleaners – we're talking AI-powered assistants, data-detective hounds, and even a digital shredder for those long-dormant devices...

info_outline
Beyond Delete: The Ultimate Guide to Shredding Sensitive Digital Trails show art Beyond Delete: The Ultimate Guide to Shredding Sensitive Digital Trails

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

Hey there cyber enthusiasts! Ever wondered how to transform your digital space into a fortress of security? Well, buckle up, because we've crafted the ultimate guide to help you declutter, fortify, and defend your digital realm. Our mission: to make cybersecurity engaging and effective, without drowning you in techno-jargon. Check out these key points we've covered: Wi-Fi Wonders: Unveiling the mysteries of Wi-Fi security to ensure your online activities remain secure from prying eyes. Password Power: Dive into the world of password protection, unlocking the secrets to crafting...

info_outline
Securing Your Digital Realm: The Ultimate Cybersecurity First-Aid Kit Unveiled! show art Securing Your Digital Realm: The Ultimate Cybersecurity First-Aid Kit Unveiled!

Craig Peterson - Secure Your Business, Your Privacy, and Save Your Sanity

In the vast landscape of the digital world, safeguarding your online presence is paramount. Welcome to another episode of TechTalk with Craig Peterson, where today, we unravel the secrets to fortifying your digital realm with "The Ultimate Cybersecurity First-Aid Kit." Decrypting Wi-Fi Woes Our journey begins with the cornerstone of your digital fortress: Wi-Fi encryption. No secret stays safe forever, and that includes your Wi-Fi password. We delve into the importance of encrypting your Wi-Fi, ensuring that your digital stronghold remains impenetrable. Password Party Extravaganza "abc123"...

info_outline
 
More Episodes

Welcome!

Craig discusses these new macro attacks from MS Office against MacOS and why it is not as big a deal as the media are making it out to be.

For more tech tips, news, and updates visit - CraigPeterson.com

---

Read More:

Window Swap Lets You Enjoy the View From Other People's Windows Around the World

Report: Hundreds of apps have hidden tracking software used by the government

Researcher Finds New Office Macro Attacks for MacOS

New cars can stay in their lane—but might not stop for parked cars

Here’s why Apple believes it’s an AI leader—and why it says critics have it all wrong

Snapdragon chip flaws put >1 billion Android phones at risk of data theft

Trump Targets WeChat and TikTok, in Sharp Escalation With China

Pen Testers Who Got Arrested Doing Their Jobs Tell All

Information Operations Spotlighted at Black Hat as Election Worries Rise

---

Automated Machine-Generated Transcript:

Craig Peterson: [00:00:00] We've got a resurrection of a problem we've had for many years. Thanks. Microsoft looks like macros are hitting max now.

Yes indeed. You thought you were safe by using a Mac. You usually are. Okay. The bottom line, Apple Macintoshes are great pieces of equipment. They were developed on software. That was developed at universities, that Unix operating system. It is the operating system. The internet was designed on. It's still the operating system that is used to run the backbone of the internet.

So if you're a school and you have a lot of people, students, and others, who would. Kind of like to do the Ferris Bueller thing and change their grade. You better have a secure operating system and you better make sure your internet stack is secure. So we know over the years, the software that Microsoft is using, they started with software from a company called Spider.

And I actually. Hope to port that way back when, to the Microsoft operating system, Windows operating system, when Mt. 1.0 was coming out. Yeah. I've been in it for a very, very long time and it wasn't a great implementation and I did some implementations. For digital equipment corporation as well, so that they had something that was smooth.

And I fixed problems with the stack over the years. So we know that yeah. You know, Unix was designed with security in mind from day one, not the type of security we need today. Mind you, but it has a lot of security in it. And windows were designed as kind of an afterthought. They, they took a big crowbar and, and they put.

And to the windows and internet, that's kind of basically what they did. And you probably remember some of the others know Val, which almost won that battle. At least in the Windows world, they had a great little stack going and the different protocols and everything. We won't get into all that right now.

But back then, you remember when. Microsoft introduced macros Mac crows are available in word and Excel and some of the other software packages and it's to make your life just. That much easier, at least that's their goal. Let's make everybody's life easier. So off they go, trying to make life easier for everybody.

And what ends up happening? Well, uh, yeah, not so easy. What they were doing with Matt with macros is basically allowing you to do programming. They had eventually visual basic in, and you could do a whole bunch of stuff with the visual basic, but. That's where the creeps started. Right in the side. All of a sudden you have the ability with these macros to do programming.

And when that happens, what are the bad guys do? Well, the bad guys use that to kind of create, been from this height and. Do malicious things like write files, they shouldn't have been writing or read-files. They shouldn't have been reading or cross execute things that just shouldn't have happened.

Putting links in Microsoft has thank goodness. I removed a lot of that functionality. Uh, internet Explorer was. Terrible at some of this stuff, what internet Explorer was doing was frankly, kind of criminal, allowing you to have a website run code on your machine, not, not within the browser, but actually run code on your machine.

And that's part of the problem seen with other implementations as well. So now we're finding out from a researcher. His name is Patrick Wartell. He's a principal security researcher, GMF. You might want to check them out. Jam J M F has some great software for managing your devices, pulling it all together.

Having one centralized management system works great for max works great for windows, et cetera, et cetera. So. He has come up with a real problem. And it's, it's kinda sad to see after all these years. How, how long are these macros been around 20 years? I think it is. It's been a long time. So. Microsoft office, no strangers you'd have vulnerabilities.

They haven't fixed all of these vulnerabilities, you know, pros and cons to some of this stuff. But I turn off macros. Okay. Just get rid of them. They are nothing but trouble. Okay. That's the bottom line here. If you need to do some Grammy, do some programming, use real tools to do it that have really great controls on it.

Don't put any macros into the Microsoft office software. It's just always been a problem. So most of the vulnerabilities over the years have led from Microsoft office over to Microsoft windows, but now it turns out there is a potential path for Mac Wes as well. And it's kind of scary. It was discussed a week ago here, over at the black hat conference.

Now, if you're not familiar with BlackHat, it happens every year. This is the first year that I'm aware of that it's been virtual. I'm pretty sure it's the first year it's been virtual. Usually, everybody gets together in Vegas. Uh, you, you take your phone, you turn it off. You should not feel a laptop. You're never use anything electronic.

If you were in BlackHat or if you're in Vegas during BlackHat,  it's going to be hacked. And there are some real fun sessions there at BlackHat like spotting the fed where the Hill they'll have everybody who's in a session. Uh, just say who's the fan to here, right? Cause there's always federal guy, IT officers.

There's FBI there's secret service, NSA, CIA. Everybody goes to this thing, right? Because it's not necessary. Sarah Lee all dark black arts from a negative standpoint, but it. Is about how you could do hacking how hacking works. And so they share a lot of information back and forth. Well, this was shared at black hat this year, about a week and a half ago.

Now in most of the macro-based attacks, human enter intervention on the part of the victim is required. If you are on a Mac and there is one of these macro hacks that is with the tube downloaded, right. Mistake one, you haven't turned off macro execution, mistake two, and you've gone even further than that.

And it pops up saying, there's a macro, do you want to run it? And you say, yeah, go ahead and run it. Okay. You've made at least three mistakes. These macros on the Mac must be given explicit permission to be able to run. And if they run, they can cause nothing but trouble for you. Okay. Now, Mac has a special privileged mode now that has really saved the goose of many people out there.

And I think that's a very, very good thing, frankly, because people need to understand that what they're doing. And of course, people don't understand it most of the time. So on the Mac, there are some special privileges that you need in order to get files that might cause problems. Okay. But. It's the second stage payload here that really starts causing you some problem.

And it can be really, really huge problems. Now, this is from dark reading, a site that I follow all the time and a few words, our security person, or maybe just responsible for the security in your business. You might want to kind of keep an eye on it. It's kind of like the FBI InfraGard feed that I get from the FBI.

BI InfraGard program, uh, daily with multiple other alerts. It just can be overwhelming if there's it's your full-time job. But this second stage payload is doing some nastiness here. It is actually trying to skim your credentials, create a bot, or even encrypt your data as part of a ransomware scheme.

And all of this is happening. On Mac OS now that's really happened in front of me. All of these machines here that are I'm using are all Macs. Yes, indeed. And so I know a fair amount about them. You probably know that already, right? I helped to write some of the code that's the basis of today's MacOS but.

The modern malware writers that are trying to do this through macros through Microsoft office are in a bit more of a bind because of what's called sandboxes. This is a kind of a Waldorf environment that helps to protect everything. So be very careful, write down, download this stuff. Don't run macros, turn macros off.

It's our new. Attack against MacOS but it's been around for a very long time in the windows world. Hey, if, if you're looking for that great new car, one that drives itself down the road. I got some big news for you. I'm afraid it's more dangerous than we thought. Visit me online. Craig, Peterson dot com

---

More stories and tech updates at:

www.craigpeterson.com

Don't miss an episode from Craig. Subscribe and give us a rating:

www.craigpeterson.com/itunes

Follow me on Twitter for the latest in tech at:

www.twitter.com/craigpeterson

For questions, call or text:

855-385-5553