meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Friday, August 18th, 2023

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 18 August 2023

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Whitespaces; Fake Airplane Mode; LinkedIn Attacks; Robot Vacuum Privacy

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Friday, August 18th,

0:03.3

2000-23 edition of the Sandton Stormontas Stormcast.

0:08.2

My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida.

0:14.4

Jesse took a quick look today at a problem that's actually kind of common

0:18.8

when you're looking at text on the command line in

0:22.5

Linux with tools like cat. The problem is that the white space characters are often not clearly

0:30.5

displayed and so two strings that kind of look the same may not be the same because they have

0:36.6

white space characters following

0:38.8

them. Well, Jesse is looking at a couple different options to solve the problem with a little

0:44.3

Python script or, well, a simple cat option das, capital A, which will make these white space

0:51.6

characters more obvious.

0:58.7

An Apple security company, YAMF, has an interesting blog post showing how an attacker may be able to simulate airplane mode in an iOS 16 device.

1:07.5

The problem here is that, well, a user may think that they're safe if the phone is in

1:13.8

airplane mode, but what the attacker is really doing here is essentially just displaying the

1:19.5

airplane mode icon, and with that, the user may feel safe if indeed they're not. The attack

1:26.7

actually goes sort of a step further. In addition to

1:29.5

setting the airplane mode icon, the attack will also disconnect all software from the internet.

1:38.2

And if a user, for example, now attempts to use the email software or the like, it will alert the user, hey, you need to set up

1:46.6

a network connection. Do you want to connect to Wi-Fi? So a behavior that's identical to what

1:53.5

you would experience if the phone is actually in airplane mode. And of course, the attacker is at

1:59.7

the same time also able to still maintain

2:02.3

connectivity for their own application. Pretty neat trick. This is a post-exploid technique,

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.