<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>premier-technology</title><description>premier-technology</description><link>https://www.premier-technology.com.au/blog</link><item><title>Stunning AI Breakthrough Takes Us One Step Closer To The Singularity</title><description><![CDATA[Remember AlphaGo, the first artificial intelligence to defeat a grandmaster at Go? Well, the program just got a major upgrade, and it can now teach itself how to dominate the game without any human intervention. But get this: In a tournament that pitted AI against AI, this juiced-up version, called AlphaGo Zero, defeated the regular AlphaGo by a whopping 100 games to 0, signifying a major advance in the field.A new paper published in Nature today describes how the artificially intelligent system<img src="http://static.wixstatic.com/media/bd23c7_4d2af77a250142fd9731d2e72ea2fe0c%7Emv2.jpg/v1/fill/w_546%2Ch_307/bd23c7_4d2af77a250142fd9731d2e72ea2fe0c%7Emv2.jpg"/>]]></description><link>https://www.premier-technology.com.au/single-post/2017/10/19/Stunning-AI-Breakthrough-Takes-Us-One-Step-Closer-To-The-Singularity</link><guid>https://www.premier-technology.com.au/single-post/2017/10/19/Stunning-AI-Breakthrough-Takes-Us-One-Step-Closer-To-The-Singularity</guid><pubDate>Thu, 19 Oct 2017 05:59:49 +0000</pubDate><content:encoded><![CDATA[<div><img src="http://static.wixstatic.com/media/bd23c7_4d2af77a250142fd9731d2e72ea2fe0c~mv2.jpg"/><div>Remember AlphaGo, the first artificial intelligence to defeat a grandmaster at Go? Well, the program just got a major upgrade, and it can now teach itself how to dominate the game without any human intervention. But get this: In a tournament that pitted AI against AI, this juiced-up version, called AlphaGo Zero, defeated the regular AlphaGo by a whopping 100 games to 0, signifying a major advance in the field.</div><div>A new paper published in <a href="https://www.nature.com/nature/journal/v550/n7676/full/nature24270.html">Nature today</a>describes how the artificially intelligent system that defeated Go grandmaster Lee Sedol in 2016 got its digital arse kicked by a new-and-improved version of itself. And it didn't just lose by a little -- it couldn't even muster a single win after playing a hundred games.</div><div>Read more <a href="https://www.gizmodo.com.au/2017/10/stunning-ai-breakthrough-takes-us-one-step-closer-to-the-singularity/">here.</a></div></div>]]></content:encoded></item><item><title>Google now offers special security program for high-risk users</title><description><![CDATA[The new opt-in program requires authentication with a physical security key.Today, Google rolled out a new program called Advanced Protection for personal Google accounts, intended to provide much higher account security to users of services like Gmail and Drive who are at a high risk of being targeted by phishers, hackers, and others seeking their personal data. The opt-in program makes Google services much less convenient to use, but it's built to prevent the sorts of breaches that have been<img src="http://static.wixstatic.com/media/bd23c7_33f26979c3ab426f816244e553ac0f07%7Emv2.jpg/v1/fill/w_546%2Ch_363/bd23c7_33f26979c3ab426f816244e553ac0f07%7Emv2.jpg"/>]]></description><link>https://www.premier-technology.com.au/single-post/2017/10/19/Google-now-offers-special-security-program-for-high-risk-users</link><guid>https://www.premier-technology.com.au/single-post/2017/10/19/Google-now-offers-special-security-program-for-high-risk-users</guid><pubDate>Wed, 18 Oct 2017 13:45:55 +0000</pubDate><content:encoded><![CDATA[<div><div>The new opt-in program requires authentication with a physical security key.</div><img src="http://static.wixstatic.com/media/bd23c7_33f26979c3ab426f816244e553ac0f07~mv2.jpg"/><div>Today, Google rolled out a new program called Advanced Protection for personal Google accounts, intended to provide much higher account security to users of services like Gmail and Drive who are at a high risk of being targeted by phishers, hackers, and others seeking their personal data. The opt-in program makes Google services much less convenient to use, but it's built to prevent the sorts of breaches that have been making recent headlines.</div><div>Examples of users who could benefit include journalists, politicians, and other public figures who may be running up against hostile actors with considerable resources—and also for private individuals in dangerous situations, like those escaping abusive relationships. In its blog post announcing this program, Google specifically named &quot;political campaign managers,&quot; which harkens back to the breach of Hillary Clinton Presidential Campaign Chairman John Podesta's e-mails, which led to a release from WikiLeaks that may have played a significant role in the US presidential election last year.</div><div>And yes, Podesta could have avoided that particular breach had he been using this new program. That's because the Advanced Protection Program goes beyond digital two-factor authentication by requiring a physical security key in addition to your password to log in. This isn't a new idea, of course, even on the consumer side of things. Facebook has offered something similar, and even video game company Blizzard has offered one to gamers who want to protect their World of Warcraftaccounts for years. In this case, the security key is a USB stick or wireless Bluetooth device that works with FIDO Universal 2nd Factor (U2F).</div><div>That's not the only element of the program, though. When you opt in to Advanced Protection, your Google account will limit data access to just a few apps to protect sensitive information in your Gmail inbox or Google Drive. That means almost all apps and services that you might normally give access to any aspect of your Google account will automatically be rejected. To start, only Google services will be granted access, but the company says it is exploring adding some trusted partners as well.</div><div>Finally, Google will take extra steps to verify your identity should you lose access to your account. The company says regaining access will take days, though it hasn't said what the verification steps are. The Advanced Protection Program is only available to individual personal accounts presently, though Google offers OAuth whitelisting and other features to enterprise customers that provide similar kinds of protection with greater control for administrators.</div></div>]]></content:encoded></item><item><title>Microsoft shuts down Krack with sneaky Windows update</title><description><![CDATA[The company last week quietly patched vulnerabilities in the WPA2 protocol used to secure wireless networks, but did not reveal the fix until today.Microsoft today revealed that it quietly patched Windows last week against vulnerabilities in the Wi-Fi Protected Access II (WPA2) protocol used to secure wireless networks.Details of the security update were only published Monday to Microsoft's Security Update Guide, the catalog-like portal that earlier this yearreplaced the decades-old practice of<img src="http://static.wixstatic.com/media/bd23c7_5e62e99568844c4ea0e6b6893960a5d3%7Emv2.jpg"/>]]></description><link>https://www.premier-technology.com.au/single-post/2017/10/18/Microsoft-shuts-down-Krack-with-sneaky-Windows-update</link><guid>https://www.premier-technology.com.au/single-post/2017/10/18/Microsoft-shuts-down-Krack-with-sneaky-Windows-update</guid><pubDate>Wed, 18 Oct 2017 12:11:24 +0000</pubDate><content:encoded><![CDATA[<div><img src="http://static.wixstatic.com/media/bd23c7_5e62e99568844c4ea0e6b6893960a5d3~mv2.jpg"/><div>The company last week quietly patched vulnerabilities in the WPA2 protocol used to secure wireless networks, but did not reveal the fix until today.</div><div>Microsoft today revealed that it quietly patched Windows last week against vulnerabilities in the Wi-Fi Protected Access II (WPA2) protocol used to secure wireless networks.</div><div>Details of the security update were only published Monday to Microsoft's Security Update Guide, the catalog-like portal that earlier this yearreplaced the decades-old practice of delivering explanatory bulletins.</div><div>All supported versions of Windows received the update, according to the catalog listing, including Windows 7, Windows 8.1, Windows 10, Windows Server 2008, Windows Server 2012 and Windows Server 2016.</div><div>The vulnerabilities were revealed today by Mathy Vanhoef, a researcher at Katholieke Universiteit Leuven in Belgium. On a website that went live Monday, Vanhoef said that weaknesses in WPA2 allowed criminals to read information transmitted over a Wi-Fi network thought to be encrypted by the protocol.</div><div>&quot;</div><div>Attackers can use this novel attack technique to read information that was previously assumed to be safely encrypted,&quot; Vanhoef wrote on the site. &quot;This can be abused to steal sensitive information such as credit card numbers, passwords, chat messages, emails, photos, and so on.&quot;</div><div>Vanhoef dubbed the attack &quot;Krack,&quot; for &quot;Key Reinstallation Attacks.&quot;</div><div>Microsoft included the anti-Krack update in its October security slate released on Oct. 10, but the company held the news until today because information about Krack was scheduled to be issued this morning by Vanhoef, numerous security organizations and multiple vendors. &quot;In partnership with the International Consortium for Advancement of Cybersecurity on the Internet (ICASI), Microsoft participated in a multi-vendor coordinated disclosure to acknowledge and describe several Wi-Fi Protected Access (WPA) vulnerabilities,&quot; Microsoft said in its update description.</div><div>The Windows security updates patched the client and server flavors of Microsoft's OS, but even then, users may be at risk, the firm warned. &quot;When affected Windows-based systems enter a connected standby mode in low-power situations, the vulnerable functionality may be offloaded to installed Wi-Fi hardware,&quot; Microsoft said. &quot;To fully address potential vulnerabilities, you are also encouraged to contact your Wi-Fi hardware vendor to obtain updated device drivers.&quot;</div><div>Windows PCs with Automatic Updates enabled have probably received the patches by this point. Managed devices must get the green light from IT personnel, as usual.</div><div>Vanhoef and Frank Piessens, another security researcher at Katholieke Universiteit Leuven, will present a paper on Krack Nov. 1 at a conference in Dallas, Texas. The paper can be found <a href="https://papers.mathyvanhoef.com/ccs2017.pdf">here</a>.</div></div>]]></content:encoded></item><item><title>Everything You Need To Know About KRACK, The Latest Wi-Fi Exploit</title><description><![CDATA[A huge flaw in Wi-Fi devices using WPA and WPA2 security encryption was exposed by Mathy Vanhoef, working out of KU Leuven, yesterday. Attackers can use this flaw to steal sensitive data – passwords, credit card numbers, emails – or inject malicious software into websites. If you’re using an Android device, an attack could be “exceptionally devastating”.Here’s what you need to know.What Is KRACK?KRACK stands for Key Reinstallation Attack. In short, it is an exploit that takes advantage of the<img src="http://static.wixstatic.com/media/bd23c7_7d88e669915c4fb587c05eccd39d5246%7Emv2_d_2121_1414_s_2.jpg"/>]]></description><link>https://www.premier-technology.com.au/single-post/2017/10/15/Everything-You-Need-To-Know-About-KRACK-The-Latest-Wi-Fi-Exploit</link><guid>https://www.premier-technology.com.au/single-post/2017/10/15/Everything-You-Need-To-Know-About-KRACK-The-Latest-Wi-Fi-Exploit</guid><pubDate>Sun, 15 Oct 2017 11:55:00 +0000</pubDate><content:encoded><![CDATA[<div><img src="http://static.wixstatic.com/media/bd23c7_7d88e669915c4fb587c05eccd39d5246~mv2_d_2121_1414_s_2.jpg"/><div>A huge flaw in Wi-Fi devices using WPA and WPA2 security encryption was exposed by Mathy Vanhoef, working out of KU Leuven, yesterday. Attackers can use this flaw to steal sensitive data – passwords, credit card numbers, emails – or inject malicious software into websites. If you’re using an Android device, an attack could be “exceptionally devastating”.</div><div>Here’s what you need to know.</div><div>What Is KRACK?</div><div>KRACK stands for Key Reinstallation Attack. In short, it is an exploit that takes advantage of the WPA2 protocol - the protocol most internet users are currently utilising to encrypt the information they send when online. It is directed at a process known as a 4-way handshake that all protected WPA2 Wi-Fi networks use.</div><div>This 'handshake' acts like a secret greeting between a client (such as your smartphone, laptop etc) and an access point (such as a modem/router): If both client and access point know the secret greeting (the password), then you can connect to the internet. This process also generates an encryption key.</div><div>This particular point in the process is vulnerable to being tricked to reinstall that 'key' that is already in use, thus the name KRACK.</div><div>Attackers can clone a protected Wi-Fi network while forwarding the internet connection - essentially meaning the user can still access the internet - and then using KRACK can manipulate this 'handshake' process. Thus, the attacker, in Vahoef's words, &quot;obtains a man-in-the-middle (MitM) position between the victim and the real Wi-Fi network.&quot; This doesn't give the attacker access to your WPA2 Wi-Fi password, but it does allow them to 'listen in' on the information that a client is sending between an access point.</div><div>Confusing? Definitely - the take home message is that this exploit can affect any device that uses WPA2 protection to encrypt data over a wireless network. That means pretty much every device you use in your daily life.</div><div>Fortunately, for it to be taken advantage of, an attacker would need to be in the physical vicinity of the Wi-Fi device.</div><div>Why Is Android Vulnerable To This Exploit?</div><div>Android 6.0 and above is particularly susceptible to attack via KRACK because of the way devices running this system deal with WPA2 protection.</div><div>The exploit was unearthed by Mathy Vanhoef who specifically notes that &quot;due to an implementation bug, Android and Linux ... will reinstall an all-zero encryption key [which] makes it trivial to intercept and manipulate all data that is transmitted by these devices.&quot;</div><div>You can see his explanation, in full, below:</div><iframe src="https://www.youtube.com/embed/Oh4WURZoR98"/><div>As you can see in the video, Vanhoef also explains that simply visiting secure sites - sites that are HTTPS-protected - does not necessarily prevent an attack, because some of these HTTPS-protected sites are also easy to manipulate. In the video, this results in the attacker, using KRACK, being able to see the username and password combination that the user has entered on a website.</div><div>How Can I Ensure My Android Device Is Secure?</div><div>At the moment, there’s not a lot you can do short of not using your Android device to access the internet via Wi-Fi, or more accurately, being conscious of your internet usage. Ensure that you update your devices with the latest patches as they become available. Importantly, Google have stated they will implement a fix for Pixel devices in their security update on November 6, 2017 but other, older devices don't have as solid a date, with Google stating they'll be patched 'in the coming weeks.'</div><div>If you're running an Android device with an Ethernet port, then you can use an Ethernet cable to connect to the internet instead of Wi-Fi. The exploit can only be used when a device has been connected to the internet via Wi-Fi. We recently posted a guide to the different types of ethernet cables, if you need help deciding which one is right for you.</div><div>Public Wi-Fi can also be dangerous, so it would be best to avoid it until a fix is released. Without any clear idea of who is on the network or how they're using it, you open yourself up to attack.</div><div>It's a pain, but during this time of uncertainty I would also ensure that you are connecting to secure services and webpages that include HTTPS in their address. Though this doesn't guarantee you'll be safe, it's another layer of protection that you should always be aware of (and not just in the face of a WPA2 exploit). You can also find extensions such as HTTPS Everywhere, for Chrome, which ensure you are connecting to secure websites when browsing the internet.</div><div>Lastly, you can use a VPN service and connect to that when using Wi-Fi on your smartphone or connected devices. This will ensure you data is encrypted end-to-end. If you need help choosing a VPN, consult this guide.</div><div>One of the big issues will be for Wi-Fi connected devices around the house. Anthony discussed this issue earlier this morning.</div><div>Are iOS Users Vulnerable To KRACK?</div><div>Apple users can rest slightly more easily as the exploit doesn't work quite as simply on these platforms as it does on Android (and Linux).</div><div>At this point, it seems that Apple have developed patches for iOS, macOS, watchOS and tvOS which are currently in beta and these will be rolled out in software updates in the coming weeks.</div><div>Similarly, Microsoft rolled out a security patch on October 10th, ahead of the announcement.</div><div>Do I Need To Buy A New Router?</div><div>Simply put, no. However, these devices and other devices that connect to the internet via Wi-Fi are potentially open to attack until manufacturers and suppliers roll out patches for them. Several have released statements regarding the exploit, which I have included below:</div><div>Belkin, Linksys, Wemo</div><div>“Belkin, Linksys, and Wemo are aware of the WPA vulnerability. Our security teams are verifying details and we will advise accordingly. Also know that we are committed to putting the customer first and are planning to post instructions on our security advisory page on what customers can do to update their products, if and when required.”</div><div>Amazon</div><div>&quot;We are in the process of reviewing which of our devices may contain this vulnerability and will be issuing patches where needed.&quot;</div><div>Netgear</div><div>&quot;NETGEAR is aware of the recently publicized security exploit KRACK, which takes advantage of security vulnerabilities in WPA2 (WiFi Protected Access II). NETGEAR has published fixes for multiple products and is working on fixes for others. Please follow the security advisory for updates.</div><div>&quot;NETGEAR appreciates having security concerns brought to our attention and are constantly monitoring our products to get in front of the latest threats. Being pro-active rather than re-active to emerging security issues is a fundamental belief at NETGEAR.</div><div>&quot;To protect users, NETGEAR does not publicly announce security vulnerabilities until fixes are publicly available, nor are the exact details of such vulnerabilities released. Once fixes are available, NETGEAR will announce the vulnerabilities from NETGEAR Product Security web page.&quot;</div><div>Belong</div><div>A spokesperson for Belong suggested that modems and routers will be &quot;automatically updated once [a patch] is available.&quot;</div><div>Nest</div><div>&quot;We are aware of the issue and will be rolling out patches to Nest products over the next couple weeks.&quot;</div><div>No matter your device, because of the ubiquity of WPA2, pretty much anyone who connects to the internet is able to be targeted with this exploit. Ensure your devices are as up-to-date as possible and that you keep an eye out for available patches as soon as they become available.</div></div>]]></content:encoded></item></channel></rss>