{"id":4203,"date":"2014-03-24T13:00:39","date_gmt":"2014-03-24T17:00:39","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=4203"},"modified":"2020-02-26T10:48:33","modified_gmt":"2020-02-26T15:48:33","slug":"this-week-in-the-news-nsas-confessions-and-apple-id-hijacking","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/this-week-in-the-news-nsas-confessions-and-apple-id-hijacking\/4203\/","title":{"rendered":"Last Week in the News: NSA&#8217;s Confessions and Apple ID Hijacking"},"content":{"rendered":"<p>Last week brought us a host of news stories, including a handful of highlights. As usual, we have collected the most interesting security news and are bringing it to you in a single post.<\/p>\n<p><b>NSA rats on IT companies <\/b><br>\nTo begin here is a small, yet <a href=\"http:\/\/www.theguardian.com\/world\/2014\/mar\/19\/us-tech-giants-knew-nsa-data-collection-rajesh-de\" target=\"_blank\" rel=\"noopener nofollow\">sensational<\/a><span style=\"text-decoration: underline;\">,<\/span> news story. During last week\u2019s Privacy and Civil Liberties Oversight Board (PCLOB) meeting, NSA\u2019s principal consultant, Rajesh De, confirmed that industry giants, including Facebook, Google, and Yahoo!, were aware of a bulk collection of user data by the US intelligence service. News of these actions wasn\u2019t completely unexpected, but getting an official confirmation is a different story. What makes this most suspicious is the fact that the aforementioned companies previously blatantly rejected any accusations of having any alleged involvement in massive intelligence collections of citizen data. Some companies (we won\u2019t publicly blame anyone, for the sake of Apple\u2019s fandom\u2019s feelings) even stated that they have \u2018never heard of Prism\u2019. We\u2019ll see how they try to put an end to the \u2018nasty accusations\u2019 this time around.<\/p>\n<p><b>An OS tailored for smart watches <\/b><br>\nThe newly announced operational system developed by Google, for increasingly popular smart watches and other types of \u2018wearable devices\u2019, was dubbed Android Wear. <a href=\"http:\/\/googleblog.blogspot.ru\/2014\/03\/sharing-whats-up-our-sleeve-android.html\" target=\"_blank\" rel=\"noopener nofollow\">The announcement<\/a> was published Tuesday on the company\u2019s corporate blog, coinciding with Motorola and LG\u2019s new smart watch announcements. The OS is predictably based on Android, but, unlike its predecessor, is intended to be used more for voice than for touch (just like Google Glass). The OS is capable of managing any Bluetooth-enabled peripherals, even the garage gates. The horizon of opportunities for hackers is therefor\u2026 well, unbelievable.<\/p>\n<p><b>How Microsoft charged FBI <\/b><br>\n\u201cIf you cannot win \u2013 then command\u201d, the saying goes. \u201cIf you cannot command \u2013 then at least earn\u201d, Microsoft added. <a href=\"http:\/\/www.dailydot.com\/news\/microsoft-compliance-emails-fbi-ditu\/\" target=\"_blank\" rel=\"noopener nofollow\">According to the Syrian digital army<\/a>, the famous global corporation earned over $100 for each case of personal data exposure that was performed by demand of the FBI. The hackers confirmed that at least during September 2012, the FBI spent over $145K on these activities. Last year, one case of user data exposure cost $100, but in 2013 this price grew two-fold. As far as the legitimacy of these activities is concerned, Microsoft claims the FBI wasn\u2019t charged for a piece of the action, but for time spent on carrying out a legitimate request. Time is money you see.<\/p>\n<p><b>Gmail is now fully HTTPS\u2019ed<\/b><br>\nIt\u2019s strange that it <a href=\"http:\/\/gmailblog.blogspot.co.uk\/2014\/03\/staying-at-forefront-of-email-security.html\" target=\"_blank\" rel=\"noopener nofollow\">happened<\/a> in 2014, but from now on, all Gmail activities will be carried out through \u2018https\u2019 secure protocol. Regardless of the fact that Gmail has been using encryption since day one, some actions up until now were carried out through unsecured channels. Now users simply do not have any choice: not only is the https connection enabled by default, it cannot be disabled. Moreover, correspondences are to be encrypted when messages are sent to an addressee, as well as when they\u2019re circulated between Google\u2019s internal servers, which is a crucial development.<\/p>\n<p><b>Apple ID hijacked in Electronic Arts<br>\n<\/b>Recently, the hacking of the renowned game distribution platform, Electronic Arts, was <a href=\"https:\/\/threatpost.com\/ea-games-site-hacked-to-steal-apple-ids\/104925\" target=\"_blank\" rel=\"noopener nofollow\">reported<\/a>. It\u2019s interesting to note that the company\u2019s data was not the primary target for the attack; the culprits instead went after users\u2019 Apple ID credentials. The hackers employed a very elegant strategy to achieve their goal. Having hacked ea.com, they launched a carefully parroted phish website, copying Apple\u2019s credential request form on the company\u2019s subdomains, that also provided an opportunity to hijack credit card credentials. The report does not elaborate on the number of victims, and what is even more curious is the fact that EA never publicly acknowledged that the phish website page ever resided on their servers. And that is fishy, or \u2018phishy\u2019, we should say.<\/p>\n<p>\u2014<\/p>\n<p>That\u2019s it for now. See you next week!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Last week brought us a host of news stories, including a handful of highlights. As usual, we have collected the most interesting security news and are bringing it to you<\/p>\n","protected":false},"author":214,"featured_media":4204,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[282,492],"class_list":{"0":"post-4203","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-cybersecurity","9":"tag-security-news"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/this-week-in-the-news-nsas-confessions-and-apple-id-hijacking\/4203\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/this-week-in-the-news-nsas-confessions-and-apple-id-hijacking\/3145\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/this-week-in-the-news-nsas-confessions-and-apple-id-hijacking\/3041\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/this-week-in-the-news-nsas-confessions-and-apple-id-hijacking\/3453\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/this-week-in-the-news-nsas-confessions-and-apple-id-hijacking\/3437\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/this-week-in-the-news-nsas-confessions-and-apple-id-hijacking\/3015\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/this-week-in-the-news-nsas-confessions-and-apple-id-hijacking\/4203\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/this-week-in-the-news-nsas-confessions-and-apple-id-hijacking\/4203\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/cybersecurity\/","name":"Cybersecurity"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4203","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/214"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=4203"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4203\/revisions"}],"predecessor-version":[{"id":33080,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4203\/revisions\/33080"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/4204"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=4203"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=4203"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=4203"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}