More stories

  • in

    There's been a rise in stalkerware. And the tech abuse problem goes beyond smartphones

    BLACK HAT USA: We need to be wary of mobile devices and IoT products, now widely abused to facilitate partner coercion, researchers have warned. 

    Black Hat USA

    At the Black Hat cybersecurity conference in Las Vegas this week, Lodrina Cherne, Principal Security Advocate at Cybereason and Martijn Grooten, consultant and coordinator at the Coalition Against Stalkerware said that the COVID-19 pandemic has prompted a surge in the use of stalkerware in intimate partner violence (IPV) and gender-based violence. The Coalition Against Stalkerware defines stalkerware as software, made available directly to individuals, that enables a remote user to monitor the activities on another user’s device without consent and without “explicit, persistent notification to that user in a manner that may facilitate intimate partner surveillance, harassment, abuse, stalking, and/or violence.” Mobile applications and PC monitoring software come straight to mind. Unlike spyware, which may be employed to monitor indiscriminately or by government agencies and law enforcement investigations, stalkerware is generally used by individuals.Such software can be used to remotely monitor and eavesdrop on phone calls, SMS messaging, Voice over IP (VoIP) applications, GPS/location data, messaging and social media apps, and to steal images and video from an infected device. It is often the case that stalkerware is installed through physical access to a handset. However, malicious SMS messages or phishing emails may also be the infection vector, although remote installation in stalkerware is rare, Cherne noted. “They are not hidden from a forensic practitioner,” Cherne commented. “But they are hidden from the user.”

    According to the duo, stalkerware is most common on Android mobile devices, whereas this form of malware is most often detected on jailbroken, unpatched, or older iOS handsets. Desktop PC stalkerware also exists, although it is not as prolific.

    This malware may be marketed as employee or children monitoring services and for ‘good’ and ‘ethical’ purposes — but as it is so often hidden, stealthy, and doesn’t require continual consent, can be used in IPV or to abuse others and violate their privacy. Using technology to intimidate, spy on, or abuse someone, however, now can go beyond mobile apps. As noted by the security experts, Internet of Things (IoT) devices including Bluetooth/possession trackers, shared social media accounts, and other smart technology, for example, home security cameras, are also ripe for abuse. Even remote-controlled devices such as smart thermostats or lights, too, could be used to demonstrate power over another and can be “intimidating,” according to Grooten.According to a WESNET survey conducted in Australia, 99.3% of domestic violence practitioners have clients who have experienced technology-facilitated abuse — and the use of video cameras for this purpose, alone, has increased by 183.2% between 2015 and 2000.”Tech abuse rarely involves hacking, it instead exploits a feature of the technology — they are rarely built with IPV in mind,” Grooten added.In the United States, the Stalking Prevention Awareness & Resource Center (SPARC) says that one in four individuals experiencing domestic abuse report that technology was used in some manner. 

    ZDNet Recommends

    While survivors may be “hyper-vigilant,” as they have had to be to endure IPV, the suspicions or belief they are being spied upon through stalkerware should not be dismissed. “Survivors should always be taken seriously to empower them,” Grooten said. “Don’t make decisions on their behalf and try to be supportive [..] understand that this is an abuse problem, not a technical problem.” Founded in 2019, the Coalition Against Stalkerware is a group of non-profit organizations, security advocates, and cybersecurity companies working together to fight stalkerware and other forms of technological abuse in domestic violence and coercive relationships.  Participants include F-Secure, the Electronic Frontier Foundation (EFF), Kaspersky, Malwarebytes, National Network to End Domestic Violence (NNEDV), and others. Interpol also supports the scheme.  “In recent years, the problem of stalkerware has been on the rise globally,” the coalition says. “Non-profit organizations report a growing number of survivors are seeking help with stalkerware, and cybersecurity companies are detecting a consistent increase in these harmful apps.” For further information and advice, check out the coalition’s guide video below, or check out our in-depth guide here:

    [embedded content]

    Previous and related coverage Have a tip? Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0 More

  • in

    Researchers turn the spotlight on the hidden workers of the cybercrime world

    Security researchers have put the spotlight on a little-known but growing group of people who make up a significant part of the cyber-criminal ecosystem, even though some of them may not even be aware that they’re actually taking part in illegal activities. A collaborative research project by Czech Technical University in Prague, plus cybersecurity companies GoSecure and SecureWorks, analyzed the activities of people on the fringes of cybercrime, those behind projects like building the websites that end up being used for phishing attacks, affiliate schemes to drive traffic towards compromised or fake websites or writing the code that ends up in malware. 

    The people behind these projects are doing it because it’s an easy way to make money. But by doing this work, they’re laying the foundations for cyber criminals to carry out malicious campaigns.SEE: Cybersecurity: Let’s get tactical (ZDNet special feature) The research, titled The Mass Effect: How Opportunistic Workers Drift into Cybercrime and presented at Black Hat USA, has its origins in analysis by Czech Technical University that revealed the inner-workings of Geost, a botnet and Android malware campaign that infected hundreds of thousands of users, which allowed researchers to examine chat logs of some of those involved. They were able to trace people in these chat logs to online forums and other discussion platforms and gain an insight into what motivates them.”We started to understand that, although they were involved in spreading malicious applications, they weren’t necessarily the mastermind behind it, but rather the informal workers, those who work on small gigs,” said Masarah Paquet-Clouston, security researcher at GoSecure. 

    But while these people are at the bottom of the hierarchy, they’re performing useful tasks for cyber criminals who use the websites and tools they build for malicious activities, including phishing and distributing malware.  “They are trying to earn a living and maybe crime is paying better so they go there, they drift into crime and come and go,” said Sebastian Garcia, assistant professor at Czech Technical University, who argues that more attention needs to be paid to the people who dance the line between cybercrime and legal activity. “There is a mass of people in these public forums that the security community is not looking into, but these are the support, these are the people doing the majority of the work, building web pages for phishing emails, APKs, the encryption, the malware, the money mules,” he said. SEE: Cybersecurity: Why a culture of silence and driving mistakes underground is bad for everyoneIf we always focus on ‘motivated offenders’, the masterminds who actually thought of building the botnet and making money through all of this, we forget the workers, warned Paquet-Clouston. “We as a community often forget that there are many people involved, but they’re not necessarily highly motivated people but rather just those who end up doing the activity,” she said. However, this doesn’t necessarily mean that the people involved in these schemes should be treated as if they’re criminal masterminds, particularly when some may not even know that their skills are being exploited to aid cybercrime.  In fact, it could be possible to provide many of these people with opportunities to use their skills in a way that’s beneficial, rather than using them to help cybercrime. “There is a lot of people that, maybe given the correct opportunity, they don’t have to drift into crime,” said Garcia. MORE ON CYBERSECURITY More

  • in

    PJCIS asks for Australia's 'hacking' Bill to gain judicial oversight and sunset clauses

    The Parliamentary Joint Committee on Intelligence and Security (PJCIS) has recommended the passage of the so-called “hacking” Bill that will afford three new computer warrants to two Australian law enforcement bodies, providing its 33 other recommendations are met.The Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020, if passed, would hand the Australian Federal Police (AFP) and the Australian Criminal Intelligence Commission (ACIC) the new warrants for dealing with online crime.The first of the warrants is a data disruption one, which according to the Bill’s explanatory memorandum, is intended to be used to prevent “continuation of criminal activity by participants, and be the safest and most expedient option where those participants are in unknown locations or acting under anonymous or false identities”.The second is a network activity warrant that would allow the AFP and ACIC to collect intelligence from devices that are used, or likely to be used, by those subject to the warrant.The last warrant is an account takeover warrant that would allow the agencies to take control of an account for the purposes of locking a person out of the account.The Bill has been criticised for its “wide-ranging” and “coercive” powers by the Office of the Australian Information Commissioner (OAIC), human rights lawyers have asked the Bill be re-drafted, and the likes of Twitter have labelled parts of the proposed Bill as “antithetical to democratic law”.After considering all the submissions made and testimonies provided on the Bill, the PJCIS in its report [PDF] has called for some tweaks, such as amending the Bill to provide additional requirements on the considerations of the issuing authority to ensure the offences are reasonably serious and proportionality is maintained.

    “The effect of any changes should be to strengthen the issuing criteria and ensure the powers are being used for the most serious of offending,” it added.The committee wants the issuing authority for all of the new powers introduced by the Bill, including emergency authorisations, to be a superior court judge, either of the Federal Court or a state or territory Supreme Court, except for account takeover warrants which may be granted by an eligible Judge as law according to the Surveillance Devices Act 2004.The issuing authority, PJCIS asked, must give consideration to third parties, specifically their privacy, and to privileged and journalistic information.It wants the Bill amended so that, in order to provide an emergency authorisation for disruption of data held in a computer, an authorising officer must be satisfied that that there are no alternative means available to prevent or minimise the imminent risk of serious violence to a person or substantial damage to property and that they consider the likely impacts of the proposed data disruption activity on third parties.In addition, the committee said the Bill should be amended so that, where an issuing authority declines to retrospectively approve an emergency data disruption authorisation, the issuing authority may require the AFP or ACIC to take remedial action, including financial compensation.See also: Intelligence review recommends new electronic surveillance Act for AustraliaThe OAIC previously testified the definition of a “criminal network of individuals” has the potential to include a significant number of individuals, including third parties not the subject or subjects of the warrant who are only incidentally connected to the subject or subjects of the warrant.To remedy that, the PJCIS has asked the definition under the network activity warrant require there to be a reasonable suspicion of a connection between the suspected conduct of the individual group member in committing an offence or facilitating the commission of an offence and the actions or intentions of the group as a whole.Where applying for authorisation is concerned, the committee wants changes made to reflect that only an AFP or ACIC law enforcement officer can apply for a data disruption warrant or an account takeover warrant. The person must also be approved, in writing, by either the AFP Commissioner or ACIC CEO to apply for data disruption warrants, and the relevant agency head must also be satisfied that person possesses the requisite skills, knowledge, and experience to make warrant applications.Further amendments requested include that the individual must make a sworn affidavit setting out the grounds of an application for an account takeover warrant.The PJCIS has asked the issuing criteria for each of the warrants require satisfaction that the order for assistance, and not just the disruption of data, is “reasonably necessary to frustrate the commission of the offences that are covered by the disruption warrant; and justifiable and proportionate, having regard to the seriousness of the offences that are covered by the disruption warrant and the likely impacts of the data disruption activity on the person who is subject to the assistance order and any related parties”.It wants it made clear that decisions under the Bill are not excluded from judicial review.The PJCIS wants the Bill to impose a maximum period for a non-emergency mandatory assistance order to be served and executed, and asked that if the order is not served and executed within that period, the order will lapse and a new order must be sought.It also wants all applications for a non-emergency mandatory assistance order to be made in writing and for the AFP and the ACIC, unless absolutely necessary, to be prohibited from seeking a non-emergency mandatory assistance order in respect of an individual employee of a company.Further amendments include the Bill making it clear that no mandatory assistance order can ever be executed in a manner that amounts to the detention of a person, and that the Bill introduce immunity provisions for both assisting entities and those employees or officers of assisting entities who are acting in good faith with an assistance order.The AFP and ACIC, the committee said, should also be required to notify the Commonwealth Ombudsman or the Inspector-General of Intelligence and Security (IGIS) as soon as reasonably practicable if they cause any loss or damage to other persons lawfully using a computer. Similarly, the PJCIS wants any computers that have been removed from premises under a data disruption warrant or a network activity warrant required to be returned to as soon as reasonably practicable.Elsewhere, PJCIS has requested an amendment to allow it to conduct a review of the three warrants no less than four years from when the Bill receives Royal Assent. It also wants each of the new powers to sunset five years from the date on which the Bill receives Royal Assent.The final recommendation, recommendation 34, simply states: The committee recommends the Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020 be passed, subject to the amendments outlined above.MORE ON THE HACKING BILL More

  • in

    Best internet service provider in San Francisco 2021

    San Francisco is in a unique position when it comes to internet access. The city is investing $1.5 billion to build a fiber-optic network that provides all homes, apartments and businesses with high-speed 1 Gbps internet service. Once the plans are complete, San Francisco will be the country’s largest city to own and operate its own fiber network — and its residents and visitors will be connected to one of the highest speed networks in the country, regardless of where they’re located.If you’re new or moving to town, you’ll have access to a variety of San Francisco internet providers that offer some of the fastest speeds in the country for affordable prices. The following is our review of the best San Francisco internet providers and what they have to offer.

    The best San Francisco internet providers: summed up

    XfinityViasatAT&T FiberSonicDefining traitBest for City-Wide CoverageBest for Satellite InternetBest for FiberBest for SpeedConnection typeCable internetSatelliteFiberFiberCopper and Fiber HybridDownload speeds (Mbps)25 Mbps100 – 200 Mbps300 Mbps600 Mbps1000 Mbps12 Mbps25 Mbps30 Mbps50 Mbps100 Mbps300 Mbps1 GbpsFiber: 1 GbpsCopper and Fiber/Copper Hybrid: 75 MbpsPrices starting at$29.99 per month$35 per month$40 per month$40 per month (May differ by zip code)Contract length12 months24 months or a more expensive no-contract plan12 months12 monthsData cap1 TB12 GB for an entry-level plan, higher data caps available for higher-tier plans1 TB or unlimitedNoneAll information accurate as of 02/20/2020.

    Best for city-wide coverage

    Shutterstock

    Xfinity is at the top of the best San Francisco internet providers list for its wide coverage area, ensuring your new residence will have access to internet service wherever in San Francisco it may be located. Packages not only include home internet, but also offer access to Xfinity’s WiFi hotspots throughout the county so you can connect all your devices and save on your data usage, while you’re on the go.Price: Internet prices start at $29.99 per month for light internet use with 25 Mbps download speeds and $59.95 for Performance Plus download speeds of 1 Gbps.Speed and Data: Xfinity offers 5 download speed plans of 25 Mbps, 100 – 200 Mbps, 300 Mbps, 600 Mbps and 1000 Mbps. All plans come with data limits of 1 TB, except for the highest-tier plan, which has no data cap.Plans/Packages: You’ll have access to Xfinity bundles with your choice of high-speed Internet, landline and mobile phone service, cable TV, and home security/automation. A bundle including internet and ten cable TV channels starts at $34.99 per month.Contract Options: The best rates for San Francisco internet and Xfinity packages are provided with a 12-month contract.

    View Now at Xfinity

    Best for satellite internet

    If you’d rather avoid compromising your data speeds because of the shared internet connection with other users in the neighborhood, or if you’d like to have a plan that isn’t wired to your actual geographical location, satellite internet may be the best choice for you. Viasat’s satellite internet service is one option available to all of San Francisco.Price: Viasat’s internet service starts at $35 per month for the first year and includes DIRECTV service with 15 basic channels. The entry-level $30 per month internet-only package is only available for 3 months before the price jumps up to $50 per month, making the internet and DIRECTV promotion the better deal.Speed and Data: The entry-level plan gives you download speeds of 100 Mbps and a data cap of 12 GB. If you plan on streaming movies or playing games, higher data cap plans are available.Plans/Packages: Liberty, Gold, Bronze, and Platinum packages are available, offering different speeds and data limits. The service plans offer a range in speeds from 12 Mbps to 100 Mbps and data caps of 12 GB to unlimited data. You can bundle Viasat Voice service to your internet package for an additional $20 per month for unlimited local and long-distance calls nationwide and in Canada.Contract Options: Viasat packages come with a 24-month contract. You can select a no long-term contract option, but it incurs a $300 non-refundable fee.

    View Now at Viasat

    Best for fiber

    Shutterstock

    San Francisco is building an entire fiber-optic network that will be managed by the city. In the meantime, AT&T offers the best fiber optic service in the area. Fiber optic internet is faster than cable because you won’t have to share the broadband with your neighbors. AT&T’s San Francisco internet packages and solid customer support are other good reasons why you should include the provider on your list of companies to consider.Price: Internet prices start at $40 per month for 300 Mbps download speeds when you bundle fiber internet into your package. The price includes a $10 per month equipment fee.Speed and Data: AT&T Fiber is available in San Francisco at two speeds: 300 Mbps with a data limit of 1 TB or 1Gbps download speed with no data cap.Plans/Packages: You can choose to bundle fiber optic internet and TV for the best deals. Prices vary according to your area but expect to pay roughly $80 per month for 300mbps-speed internet and 155 DIRECTV channels.Contract Options: AT&T Fiber requires a minimum 12-month service agreement.

    View Now at AT&T

    Best for speed

    Shutterstock

    If you need the highest speeds possible, Sonic may be the answer. According to the provider, users are able to video chat in 4K, perform 70 GB backups in as little as ten minutes, and download 30 GB games in just a few minutes when using their 1000 Mbps (1 Gbps) service.Price: Sonic’s internet package starts at $40 for 1000 Mbps in the first year for the San Francisco area. The price increases to $50 per month after the first year. Installation is free and Sonic will even pay off your existing contract, up to $200*, if you switch.*Sample addressed used for this information. Actual price and discounts may vary.Speed and Data: Sonic’s San Francisco internet plan comes with 1 Gbps download speeds and unlimited data with no speed throttling during busier periods or if you’re using high amounts of data.Plans/Packages: When you bundle phone service with your internet service plan, you’ll get unlimited calls to over 60 countries, your own virtual private network (VPN), personal web hosting, and a new domain for free.Contract Options: You can try Sonic for 30 days free with no contract. If you choose to keep the service, you’ll be required to sign up for 12 months.

    View Now at Sonic

    How we found the best internet providers in San Francisco

    We analyzed a dozen companies to find the best internet providers in San Francisco. Some of the key features we looked for are:Coverage: The finalists in our San Francisco broadband review offered good coverage for the area. This was the most important factor, so you can rest assured the plans and offers are likely available for your area.Value. You often get what you pay for. The cheapest broadband provider may not be the most convenient. We looked over many provider’s offerings in search of speeds, data caps, contract lengths, packages offered and equipment costs to determine which internet providers in San Francisco provide customers the best value.Customer Satisfaction. At Reviews.com, satisfaction ratings from the American Customer Satisfaction Index (ACSI) and J.D. Power are an important part of the decision-making process on which services and products are the best. Broadband service provider ratings are mediocre across the board, so analyzing each internet provider individually and comparing them to industry averages gives us a better idea of how they respond to customer issues.

    How much speed do I need to stream movies and for online gaming?

    Streaming movies and downloading games can take up a lot of bandwidth. And if you have several household members on multiple devices, the higher the speed you can afford, the better the streaming. Aim for a service plan of 1000 Mbps if you don’t want to experience lag while streaming.

    How fast is internet service in San Francisco?

    If you’re moving to San Francisco, you’re in luck. You’ll have access to several providers offering 1000 Mbps (1 Gbps) service.

    Is fiber internet faster than broadband cable?

    Yes, fiber is the fastest option of the two. The reason being the wiring that carries the internet into your home. Fiber optic internet is delivered on a dedicated line straight to you. Broadband cable wires are shared with anyone signed up for the service in your area, which can create a slowdown in speeds if several users in the neighborhood are online at the same time.

    ZDNet Recommends More

  • in

    Edge Super Duper Secure Mode turns off the JavaScript JIT compiler for extra security

    Image: Microsoft
    The lead of Microsoft Edge Vulnerability Research Johnathan Norman has detailed an experiment in Edge that disabled the JavaScript just-in-time (JIT) compiler to enable some extra security protections. Describing JIT compiling as a “remarkably complex process that very few people understand and it has a small margin for error”, Norman pointed out that half of all vulnerabilities for the V8 JavaScript engine was related to the process. With the JIT engine turned off, it was possible for Edge to turn on protections — such as the hardware-based Control-flow Enforcement Technology (CET) from Intel, and Windows’ Arbitrary Code Guard (ACG) and Control Flow Guard (CFG) — that were previously incompatible with JIT. “This is unfortunate because the renderer process handles untrusted content and should be locked down as much as possible,” Norman said. “By disabling JIT, we can enable both mitigations and make exploitation of security bugs in any renderer process component more difficult. “This reduction in attack surface kills half of the bugs we see in exploits and every remaining bug becomes more difficult to exploit. To put it another way, we lower costs for users but increase costs for attackers.”
    Image: Microsoft
    In testing Edge with JIT disabled, Norman said users rarely noticed a difference in daily browsing, but the JIT-less Edge was hosed in benchmark tests, with performance reduced by as much as 58%.

    “Our tests that measured improvements in power showed 15% improvement on average and our regressions showed around 11% increase in power consumption. Memory is also a mixed story with negatively impacted tests showing a 2.3% regression, but a larger gain on the tests that showed improvements,” Norman wrote. “Page Load times show the most severe decrease with tests that show regressions averaging around 17%. Startup times, however, have only a positive impact and no regressions.” Super Duper Secure Mode is currently available via edge://flags for users of canary, dev, and beta release channels of the browser, and currently switches CET on, but is not currently compatible with WebAssembly. “It will take some time, but we hope to have CET, ACG, and CFG protection in the renderer process. Once that is complete, we hope to find a way to enable these mitigations intelligently based on risk and empower users to balance the tradeoffs,” Norman said. “This is of course just an experiment; things are subject to change, and we have quite a few technical challenges to overcome. Also, our tongue-in-cheek name will likely need to change to something more professional when we launch as a feature.” On Twitter, Norman said plans were afoot to take Super Duper Mode to MacOS and Android, and to get WebAssembly working. Related Coverage More

  • in

    Audit finds some former WA government staff still have systems access after termination

    Image: Getty Images/iStockphoto
    A report from Western Australia’s Auditor-General has found that some former staff at state entities still had access to IT systems and equipment despite their employment being terminated.The finding was made as part of the Office of the Auditor-General’s (OAG) probe into staff exit controls in place at three state government agencies. The audit [PDF] assessed if the Department of Planning, Lands and Heritage (DPLH), the Department of Finance, and the Department of Local Government, Sport and Cultural Industries (DLGSC) effectively and efficiently managed the exit of staff to minimise security, asset, and financial risks.The audit covered the period 1 July 2019 to 31 December 2020 with a sample of 30 staff from DLGSC, 27 from DPLH, and 26 from Finance, including consultants and third-party contractors, that left during that period.While the report found all entities cancelled exiting staff’s IT system access, it was not always done immediately. According to the report, it took between two and 161 days to deactivate or withdraw access to information systems after staff left the entity. At Finance, OAG said it took between six and 161 days to cancel access to IT systems after the last day of employment. The case that took 161 days was related to a secondment arrangement where the former employee continued undertaking work on behalf of the entity, however. Setting that case aside, Finance took, on average, seven days to cancel IT systems access, despite its security management framework noting that IT access for terminated staff is meant to be disabled on the last day of employment. DPLH does not record specific dates when IT access is cancelled, but in probing system log information, where it was available, OAG found late cancellations ranged between one and 124 days after the individual had left.

    Similarly, the OAG said DLGSC did not have sufficient information to determine when access to IT systems was cancelled for all 30 people in its audit sample. “System logs showing the dates of when this occurred were not recorded. In the absence of this information, we checked whether any of the individuals had accessed the IT systems and found that 29 did not access the system after they left,” the report said.”One person had accessed the system four days after their exit date.”The report also found that DPLH and DLGSC both lacked adequate information to show that office access passes were returned or deactivated for 72% of the sampled former staff. OAG said staff at DLGSC were charged a AU$12 fee for any changes to the status of passes from the private operator that managed the building and were therefore disincentivised to undertake the process.All access passes were cancelled or deactivated after staff left Finance, however for five out of the sample of 26, OAG said the cancellation of passes was not timely. For four people, OAG said it took between six and 44 days. The individual on secondment still had physical building access for the 116 days they continued to have systems access.Also under scrutiny was the asset returns process at the three entities, with OAG finding none had a complete and easily accessible record of all assets, including IT equipment, provided to staff.The report said OAG was unable to verify whether all IT assets had been returned to DPLH because there were insufficient records of what was issued to the 27 people in its sample. It said 15 staff had left with no evidence of laptop return. Only two of the 27 people were known to have had a phone issued, with evidence proving only one had been returned.At DLGSC, the OAG found records of only six exited staff in its sample of 30 pertaining to laptop returns and Finance demonstrated that 19 of 26 staff in the sample returned their IT equipment.To minimise the risk of unauthorised access to premises when staff leave, OAG recommended entities maintain an accurate register of all access passes including returns and cancellation/deactivation, conduct regular audits of all active passes, and ensure all access passes are returned when staff leave.The OAG has also requested the entities to ensure access to IT systems are removed or disabled immediately when staff leave. It has also asked the entities to clearly record when the removal of IT system access occurred and maintain a register of all assets issued to staff at commencement, during employment, and what is returned at exit.In addition, entities have been asked to minimise the risk of financial loss from overpayments to terminated employees, better manage the risks with different circumstances of employment termination, and improve communication between business functions responsible for staff exits.MORE FROM THE WEST More

  • in

    Spectrum internet review: Consistently dependable

    Spectrum is one of the largest broadband internet providers in the United States. Spectrum Internet prices range from $50 to $105, and speeds ranging from 200 Mbps to 940 Mbps with three plans. Their plans come with no contracts, no data caps or extra fees and include a free modem rental, free access to a nationwide network of Wi-Fi hotspots and free security software. However, unless you request self-installation, there is an installation fee.According to the most recent FCC internet report, a Spectrum Internet review shows that the company has some of the most consistent internet speeds compared to other internet service providers (ISPs) and scored better than most in meeting or exceeding advertised internet speeds. While the infrastructure and services provided by Spectrum have seen high ratings, their reputation with the Better Business Bureau (BBB) is less promising. The BBB gave Spectrum an F rating, the lowest grade possible. This measurement evaluates how a company interacts with its customers and can reflect its customer service. On the 2020 J.D. Power ISP satisfaction survey, which questions customers about their residential ISP satisfaction, Spectrum scored average in most regions of the United States except for the east region, where it scored below average. Benefits One of the biggest benefits of Spectrum Internet is that there are no data caps. This means users do not have to pay extra based on their usage. This is especially helpful to people who stream a lot of video content. Spectrum Internet also does not require users to sign a contract, allowing users to terminate their service at any time instead. Spectrum Internet also comes with several free services, including access to a nationwide network of Wi-Fi hotspots, a suite of security software and a free modem throughout the service term. Drawbacks The biggest drawback to Spectrum Internet is its history of poor customer service, as evidenced by its BBB and J.D. Power reports. Spectrum’s monthly fees are also a bit higher than other cable providers. While users can purchase their own approved router, if you want a router through Spectrum, it’s an additional $5 per month for the basic and Ultra plans. Spectrum internet plans and prices Plan Download Speeds up to: Price per month: Number of Devices: Spectrum Internet200Mbps$49.994-5 Spectrum Internet Ultra400Mbps$64.996-8 Spectrum Internet Gig940Mbps$104.9910+Data effective 1/19/2021

    * For more details on these plans, click here to learn more from Allconnect. Pricing With Spectrum Internet, you may request a self-install kit or pay a one-time installation fee of $50 to have Spectrum install its equipment. That’s a lower installation price than some other providers charge, and not all companies allow for self-installation. Two of Spectrum’s plans rely on cable internet and can often be installed with minimal effort, especially if the location already has coaxial lines. Spectrum Internet prices start at $50 per month for 200Mbps, with the middle tier plan being $65 per month for 400Mbps, and the top tier plan being $105 per month with 940Mbps. Although it may not be intuitive, the more expensive plans charge less per Mbps of speed. Contacting Spectrum to schedule an installation is as easy as filing a purchase request on their website or calling the sales phone number. If you want to do the installation yourself, make sure you have the necessary equipment and request a self-installation when you speak with a Spectrum sales representative. Spectrum speeds and data caps Plan Download Speeds up to: Price per month: Number of Devices: Spectrum Internet200Mbps$49.994-5 Spectrum Internet Ultra400Mbps$64.996-8 Spectrum Internet Gig940Mbps$104.9910+ Estimated speeds While Spectrum has speeds listed with each of their plans, it’s important to note these are estimates of top speeds during optimal performance. Although they are well rated for consistently delivering speeds as advertised, it is common for internet speeds to fluctuate based on traffic levels and location. So you may want to purchase a faster internet plan than you otherwise might. For instance, if you need your connection to maintain at least 400Mbps of download speed, you might consider the Spectrum Internet Gig plan. While the Gig plan will often deliver more speed than you need in this case, it should rarely — if ever — drop below that threshold.  For simple tasks such as social media, web browsing, and other basic internet tasks, the Spectrum Internet 200Mbps plan should be sufficient. For slightly more data-heavy tasks, such as online photo and video downloading, the 400Mbps plan is reasonable. For intensive activities, such as streaming HD movies on multiple devices, uploading and downloading large amounts of video content, the 940Mbps plan can be a wise choice. Internet availability Spectrum offers residential broadband cable internet coverage in 41 states and fiber internet to businesses in 41 states and 32 metropolitan areas. As with all ISPs, the speed of Spectrum internet plans varies by location. In general, urban areas with more modern infrastructure experience higher speeds and greater consistency of service. This results from the speed with which infrastructure problems are addressed and how many alternative lines of communication exist within an area. However, rural areas are often capable of high-speed connections but remain more vulnerable to internet disruptions. Spectrum internet additional features Spectrum Internet plans come with several extra features. Each plan includes a rental modem free of charge, meaning you have to return the modem when your plan ends, but you don’t have to pay to use it. Customers gain access to Spectrum Wi-Fi hotspots for mobile internet in public spaces. Each Spectrum account also gives you access to up to six Spectrum email addresses and the Spectrum security suite software, including antivirus and other computer monitoring programs. What we recommend While having speeds of 940Mbps is convenient, the average American family will do excellently with the 200 and 400Mbps plans. The average internet speed in America is around 124Mbps and falls well below Spectrum’s slowest plan. However, as long as your connection is above 25Mbps consistently, your network should be able to handle most basic internet activities.  For homes with only one to five devices and one to two regular internet users, the 200Mbps plan is excellent. For larger households and more devices, the 400Mbps plan is recommended. At the end of the day, though, the best plan for your family will depend on your household’s use. It can be wise to start with a slower plan and upgrade speeds with that provider if it becomes necessary. Just make sure that faster speeds are available for your location before you commit to such a strategy. The Bottom Line Spectrum Internet plans have no data caps, no contracts, and come with a free modem rental. Spectrum broadband internet is widely available, with a presence in 41 states. Three plans are offered, ranging in price from $50 to $105, with speeds ranging from 200Mbps to 940Mbps. The first two plans use cable internet while the third, the highest speed plan, uses fiber. Spectrum delivers quality internet at a variety of speeds, scoring well with the FCC on actual speeds versus advertised speeds and consistency of speed. This same report highlights that Spectrum has above-average latency and below-average packet loss. However, based on Spectrum Internet reviews, the company has a reputation for poor customer service and average customer satisfaction, as can be seen on the BBB and the J.D. Power reports. Nevertheless, their product exhibits many signs of quality, and the lack of any contract makes cancellation easy. 

    What is Spectrum’s best plan, and how much does it cost?

    Spectrum Internet Gig is the plan that delivers the most speed. Because it uses fiber, users will experience lower latency issues than with other plans. For those who want the absolute most of their internet, this is the best plan, but it is also the most expensive at $105 per month.

    Where is Spectrum available?

    Spectrum broadband internet is available in 41 states across the United States. Further, Spectrum offers fiber internet to businesses in 41 states and 32 metropolitan areas. However, speeds and plan availability vary by location within these locales.

    How fast is Spectrum Internet?

    According to the most recent FCC  report on ISP speed scores, a majority of panelists reported that most of the time, Spectrum (listed as Charter on the report) internet speeds were higher than 95% of the advertised speed. According to this same FCC report, spectrum maintains among the most consistent internet speeds across time and geography. On latency, Spectrum scored slightly higher than average. The final part of the FCC report shows that, compared to other ISPs, Spectrum showed minimal packet loss. Overall, this is good news for Spectrum customers, as it shows Spectrum can deliver on their advertised speeds.

    Does Spectrum have data caps?

    Unlike many ISPs, Spectrum does not have data caps placed within their plans. This means there is no limit to how much data you can download and upload. The average American household uses  344 gigabytes per month. With many ISPs, it’s necessary to either pay extra for unlimited data or pay overage fees any time you go over your monthly data allotment.

    Whom is each plan best for?

    200Mbps: Best for 2-3 users with 4-5 devices, or one device used for high bandwidth activity such as HD movie streaming or light online gaming.400Mbps: Best for 3-4 users with 6-8 devices, or two devices used for high bandwidth activity such as HD movie streaming on multiple devices or moderate online gaming.·  940Mbps: Best for 4 or more users with 10 or more devices, or three to four devices used for high bandwidth activity such as HD movie streaming on numerous devices or heavy online gaming.

    ZDNet Recommends More

  • in

    Security company warns of Mitsubishi industrial control vulnerabilities

    Cybersecurity company Nozomi Networks Labs has warned the industrial control system (ICS) security community about five vulnerabilities affecting Mitsubishi safety PLCs.In a new report, the company said Mitsubishi acknowledged the issues — which are focused on the authentication implementation of the MELSOFT communication protocol — after they were discovered at the end of 2020. The Japanese manufacturing giant has devised a strategy to patch the issues but Nozomi Networks Labs said software updates for safety PLCs or medical devices often take longer to deploy than other software products. Vendors must go through specific certification processes before patches can be released, the report explained. “Depending on the type of device and regulatory framework, the certification procedure could be required for each individual software update,” Nozomi Networks Labs researchers wrote.”While waiting for the patch development and deployment process to be completed, we deployed detection logic for customers of our Threat Intelligence service. At the same time, we started researching more general detection strategies to share with asset owners and the ICS security community at large.”The researchers noted that the vulnerabilities they found “likely” affect more than one vendor and said they were concerned that “asset owners might be overly reliant on the security of the authentication schemes bolted onto OT protocols, without knowing the technical details and the failure models of these implementations.”The security company disclosed the first batch of vulnerabilities through ICS-CERT in January 2021 and another batch more recently, but patches are still not available. 

    Mitsubishi has released a number of mitigations and Nozomi Networks Labs urged customers to assess their security posture in light of the advisories. The report specifically leaves out technical details or proof of concept documents in an effort to protect systems that are still being secured. Researchers discovered the vulnerabilities while researching MELSOFT, which is used as a communication protocol by Mitsubishi safety PLCs and corresponding engineering workstation software GX Works3. They found that Authentication with MELSOFT over TCP port 5007 is implemented with a username/password pair, which they said are “effectively brute-forceable” in some cases. The team tested multiple methods that gave them access to systems and found that there are even instances where attackers can reuse session tokens generated after successful authentication.”An attacker that can read a single privileged command containing a session token is able to reuse this token from a different IP after it has been generated, within a window of a few hours,” the report said.”If we chain together some of the identified vulnerabilities, several attack scenarios emerge. It’s important to understand this approach as real world attacks are often executed by exploiting several vulnerabilities to achieve the final goal.” Once an attacker gains access to a system, they can then take measures to lock other users out, forcing the last-ditch option of physically shutting down the PLC to prevent further harm.Nozomi Networks Labs suggested asset owners protect the link between the engineering workstation and the PLC so that an attacker cannot access the MELSOFT authentication or authenticated packets in cleartext. They also suggest protecting access to the PLC so an attacker cannot actively exchange authentication packets with the PLC. More