Messaging / Smishing Attacks

Cyber attackers can just as easily trick or fool you in messaging apps as they can in email. Be on the look-out for scams or attacks via apps such as Slack, Skype, WhatsApp or event simple text messaging. The most common clues are tremendous sense of urgency or curiosity.

from SANS Institute Security Awareness Tip of the Day

Does Your Organization Have a Security.txt File?

It happens all the time: Organizations get hacked because there isn’t an obvious way for security researchers to let them know about security vulnerabilities or data leaks. Or maybe it isn’t entirely clear who should get the report when remote access to an organization’s internal network is being sold in the cybercrime underground.

In a bid to minimize these scenarios, a growing number of major companies are adopting “Security.txt,” a proposed new Internet standard that helps organizations describe their vulnerability disclosure practices and preferences.

An example of a security.txt file. Image:

The idea behind Security.txt is straightforward: The organization places a file called security.txt in a predictable place — such as, or What’s in the security.txt file varies somewhat, but most include links to information about the entity’s vulnerability disclosure policies and a contact email address.

The security.txt file made available by USAA, for example, includes links to its bug bounty program; an email address for disclosing security related matters; its public encryption key and vulnerability disclosure policy; and even a link to a page where USAA thanks researchers who have reported important cybersecurity issues.

Other security.txt disclosures are less verbose, as in the case of HCA Healthcare, which lists a contact email address, and a link to HCA’s “responsible disclosure” policies. Like USAA and many other organizations that have published security.txt files, HCA Healthcare also includes a link to information about IT security job openings at the company.

Having a security.txt file can make it easier for organizations to respond to active security threats. For example, just this morning a trusted source forwarded me the VPN credentials for a major clothing retailer. Finding no security.txt file at the retailer’s site using (which checks a domain for the presence of this contact file), KrebsonSecurity sent an alert to its “security@” email address for the retailer’s domain.

Many organizations have long unofficially used (if not advertised) the email address security@[companydomain] to accept reports about security incidents or vulnerabilities. Perhaps this particular retailer also did so at one point, however my message was returned with a note saying the email had been blocked. KrebsOnSecurity also sent a message to the retailer’s chief information officer (CIO) — the only person in a C-level position at the retailer who was in my immediate LinkedIn network. I still have no idea if anyone has read it.

Although security.txt is not yet an official Internet standard as approved by the Internet Engineering Task Force (IETF), its basic principles have so far been adopted by at least eight percent of the Fortune 100 companies. According to a review of the domain names for the latest Fortune 100 firms via, those include Alphabet, Amazon, Facebook, HCA Healthcare, Kroger, Procter & Gamble, USAA and Walmart.

There may be another good reason for consolidating security contact and vulnerability reporting information in one, predictable place. Alex Holden, founder of the Milwaukee-based consulting firm Hold Security, said it’s not uncommon for malicious hackers to experience problems getting the attention of the proper people within the very same organization they have just hacked.

“In cases of ransom, the bad guys try to contact the company with their demands,” Holden said. “You have no idea how often their messages get caught in filters, get deleted, blocked or ignored.”


So if security.txt is so great, why haven’t more organizations adopted it yet? It seems that setting up a security.txt file tends to invite a rather high volume of spam. Most of these junk emails come from self-appointed penetration testers who — without any invitation to do so — run automated vulnerability discovery tools and then submit the resulting reports in hopes of securing a consulting engagement or a bug bounty fee.

This dynamic was a major topic of discussion in these Hacker News threads on security.txt, wherein a number of readers related their experience of being so flooded with low-quality vulnerability scan reports that it became difficult to spot the reports truly worth pursuing further.

Edwin “EdOverflow” Foudil, the co-author of the proposed notification standard, acknowledged that junk reports are a major downside for organizations that offer up a security.txt file.

“This is actually stated in the specification itself, and it’s incredibly important to highlight that organizations that implement this are going to get flooded,” Foudil told KrebsOnSecurity. “One reason bug bounty programs succeed is that they are basically a glorified spam filter. But regardless of what approach you use, you’re going to get inundated with these crappy, sub-par reports.”

Often these sub-par vulnerability reports come from individuals who have scanned the entire Internet for one or two security vulnerabilities, and then attempted to contact all vulnerable organizations at once in some semi-automated fashion. Happily, Foudil said, many of these nuisance reports can be ignored or grouped by creating filters that look for messages containing keywords commonly found in automated vulnerability scans.

Foudil said despite the spam challenges, he’s heard tremendous feedback from a number of universities that have implemented security.txt.

“It’s been an incredible success with universities, which tend to have lots of older, legacy systems,” he said. “In that context, we’ve seen a ton of valuable reports.”

Foudil says he’s delighted that eight of the Fortune 100 firms have already implemented security.txt, even though it has not yet been approved as an IETF standard. When and if security.txt is approved, he hopes to spend more time promoting its benefits.

“I’m not trying to make money off this thing, which came about after chatting with quite a few people at DEFCON [the annual security conference in Las Vegas] who were struggling to report security issues to vendors,” Foudil said. “The main reason I don’t go out of my way to promote it now is because it’s not yet an official standard.”

Has your organization considered or implemented security.txt? Why or why not? Sound off in the comments below.

from Krebs on Security

El Pixel 6 estrenará ‘Live Translate’ para traducir en tiempo real los mensajes, transcripciones y más

El Pixel 6 estrenará 'Live Translate' para traducir en tiempo real los mensajes, transcripciones y más

A pocas semanas de su presentación oficial, se siguen filtrando nuevas características de los Pixel 6, y esta vez tienen que ver con el software, con una nueva función que estrenarán los próximos buques insignia de Google.

Se trata de ‘Live Translate’, una nueva función que integrará el Traductor de Google en el sistema operativo de los Pixel como característica exclusiva, al menos temporalmente. Con esta integración Google potenciará la traducción en tiempo real en Android.

Continue reading

Ungoogled Chromium: un Google Chrome para quienes no quieren saber nada de Google

Ungoogled Chromium: un Google Chrome para quienes no quieren saber nada de Google

¿Te gusta Google Chrome, pero no Google? En tal caso tienes a tu disposición un montón de navegadores basados en Chromium como por ejemplo Kiwi Browser. Algo más ligero y sin absolutamente ninguna dependencia de Google es Ungoogled Chromium.

Ungoogled Chromium es Chromium tras eliminar todo el código que apunta a los servidores de Google, siendo algo así como una “versión tonta” de Chrome, totalmente aislada de Google y con algún pequeño extra, aunque no activado de fábrica.

Continue reading

MIUI 13 vuelve a filtrarse dejándonos ver sus widgets y también la lista de teléfonos Xiaomi, POCO y Redmi que actualizarán

MIUI 13 vuelve a filtrarse dejándonos ver sus widgets y también la lista de teléfonos Xiaomi, POCO y Redmi que actualizarán

Con MIUI 12.5 ya circulando, el universo Xiaomi anda ya a la caza de filtraciones sobre la próxima versión de su capa propietaria para Android. Dicha capa no es otra que MIUI 13 y Xiaomi se encargó de anunciar que su llegada se retrasaría. Todo apunta a que no veremos MIUI 13 hasta que el 2021 esté tocando a su fin, pero ya vamos teniendo alguna filtración al respecto.

La futura capa de la firma china acaba de deslizarse parcialmente a los medios. Gracias a una nueva filtración sabemos, o creemos saber pues no hay nada oficial aún, qué aspecto tendrán los widgets de la pantalla de inicio del sistema, también los que se integrarán con la barra de notificaciones. Pero además, se han filtrado los modelos de Xiaomi que podrán actualizar a MIUI 13.

Continue reading