A complete guide for SSL, TLS and certificates

Latest — Jul 26, 2024

Smart medical devices represent one of the most significant advancements in healthcare technology, offering the potential to significantly improve patient care, enhance the efficiency of healthcare delivery, and enable new forms of treatment that were previously unimaginable. However, as with any technology, particularly those that are interconnected and data-dependent, they also bring a set of risks, especially concerning security and privacy. This dual nature raises a crucial question: Are smart medical devices indispensable, or are they a security risk? This discussion delves deep into this topic, exploring the benefits, risks, and the complex interplay between indispensability and vulnerability in the context of smart medical devices.

The indispensability of smart medical devices

Smart medical devices have revolutionized healthcare in myriad ways, fundamentally transforming the landscape of medical treatment and patient care. These devices, ranging from wearable fitness trackers to advanced implantable technology, have ushered in a new era of healthcare where real-time monitoring and personalized medicine are not just ideals but realities.

For patients with chronic conditions like diabetes or heart disease, smart medical devices have been nothing short of transformative. Smart insulin pumps, for example, can continuously monitor blood glucose levels and adjust insulin doses accordingly, offering a level of fine-tuned management that was previously unattainable. Cardiac monitors and other wearable devices can detect irregularities in heart rhythms and alert patients and doctors to potential issues before they become critical. This continuous monitoring not only provides a comprehensive picture of the patient's condition but also empowers them to manage their health proactively.

The advent of telehealth and remote patient monitoring, especially accelerated by the COVID-19 pandemic, has underscored the indispensability of these devices. Patients no longer need to make frequent hospital visits, which can be both time-consuming and costly. Instead, they can receive high-quality care from the comfort of their homes, reducing their exposure to potential infections and other health risks. This shift not only makes healthcare more accessible but also more patient-centric, with treatments tailored to fit the individual's lifestyle and needs.

Furthermore, smart medical devices are at the forefront of personalized medicine. By gathering and analyzing data over time, healthcare providers can gain a deep understanding of a patient's unique health profile, enabling them to tailor treatments more effectively. This data-driven approach can lead to better health outcomes, fewer adverse drug reactions, and a more efficient healthcare system overall.

The security risks

The quantity of interconnected medical devices is surging, with predictions suggesting that the international medical IoT market could exceed US$600 billion by 2028. This proliferation of connected medical technology broadens the potential targets for cybercriminals, offering them increased opportunities to breach networks. Particularly concerning are ransomware attacks, which can paralyze networks, hinder access to vital patient information, and disrupt the functionality of connected devices.

The healthcare sector's reliance on essential medical technologies like MRI machines and insulin pumps makes it especially susceptible to these cyber threats, as any disruption can directly impact patient care and potentially endanger lives. Even systems that support these technologies, like appointment scheduling software, are at risk and can cause significant operational disturbances.

Cybercriminals are acutely aware that healthcare providers are often in a desperate position to regain system functionality, making them prime targets for extortionate ransom demands. This places healthcare providers in the precarious situation of having to decide between potentially financing future cybercriminal activities or endangering patient welfare.

Moreover, adversaries frequently aim to pilfer patient data, a valuable asset on the dark web, which can be used for blackmail, extortion, or to orchestrate further targeted cyberattacks. A notable example is the Barts Health NHS Trust in the UK, which fell victim to the notorious BlackCat group, resulting in the theft of over 70 terabytes of sensitive data.

Why does the healthcare sector find it challenging to secure IoT devices?

The inherent nature of connected devices introduces security complexities across all industries. Introducing smart technology typically means integrating numerous new devices into the network, each with its own set of proprietary software and management requirements. Many of these devices, especially older models, weren't initially designed with robust security measures, and activities such as applying security patches can be cumbersome.

Healthcare providers encounter more obstacles than most due to the inclusion of high-cost equipment like CAT scanners and MRI machines in their IoT arsenal. These expensive assets are not easily replaceable as they age, and the constant use they undergo makes routine security maintenance challenging.

Consequently, managing a network of connected medical technology demands substantial resources from IT and security teams who already face extensive responsibilities.

How can healthcare organizations enhance IoT security with finite resources?

Healthcare institutions are experiencing significant budget constraints, particularly NHS Trusts. Therefore, healthcare executives face the challenge of enhancing IoT security without incurring prohibitive costs.

Cybersecurity competes for funding within a tight budget, but considering the average cost of a healthcare data breach was US$11 million in 2022, it's an area that can't be overlooked. This places a premium on achieving a high return on investment in cybersecurity, focusing on strategies that maximize coverage and effectiveness while minimizing expenses.

One strategy is to secure the broader IT network rather than trying to fortify each connected device individually. An emerging network security paradigm, known as Unified Secure Access Service Edge (SASE), offers a solution by consolidating various security services into a single platform. This approach simplifies the process of securing an increasingly complex array of connected medical devices without substantially increasing costs.

Final thoughts 

While smart medical devices are indeed indispensable for modern healthcare, they are not without their security risks. The key is not to shun these devices out of fear but to understand and mitigate the risks they pose. By working together, manufacturers, healthcare providers, regulators, and patients can harness the incredible potential of smart medical devices while ensuring they are safe and secure for all who rely on them. The future of healthcare is smart, but it must also be secure.

Smart medical devices: navigating between vital innovation and security challenges

Jul 24, 2024 — 5 min read

When employees find the standard security measures of their organization cumbersome and annoying, it can significantly increase the risk of internal threats. For example, a recent report by Gartner stated that 69% of employees regularly ignored cybersecurity recommendations within their organization. This does not mean that such individuals deliberately create security risks to spite management. More often, it means they simply want to do their job without unnecessary distractions, considering cybersecurity measures as needless and time-consuming hassles.

Can cybersecurity inherently be combined with a pleasant user experience? 

Passwords are a prime example of the clash between cybersecurity and user experience. The average office worker might have up to 190 different login and password combinations. Naturally, remembering such an overwhelming number and matching them in one's mind to the required services is practically impossible.

61% of employees admit to reusing passwords as a way to cope with this situation. At the same time, most of them are acutely aware that such an approach can have dire consequences for the company's security. So, how can IT departments improve password security in their organizations, knowing that users are already burdened by these endless digital defense measures and have long prioritized convenience and speed, consciously sacrificing security.

Although many tech giants are currently actively promoting passwordless access technologies, eliminating passwords is unfortunately not yet a viable option for most organizations. That is why it is extremely important to choose the most effective security methods that can simultaneously provide a pleasant user experience. Below, we will explore four of the best ways to engage end-users in more responsible password use, in a way that they might even enjoy.

Key phrases for creating strong and memorable passwords

Hackers often use brute force methods to quickly try many different options in a row in an attempt to crack a specific account's password. They frequently combine these methods with dictionaries of known vulnerable passwords, including sequential passwords like "qwerty" or "123456," which users often apply. Shorter and less complex passwords are much more vulnerable to this method of attack, so the standard advice is to create longer passwords of certain complexity.

Of course, such requirements are a headache for users, who now need to remember a multitude of long and complex passwords, ideally consisting of 15 characters and above. One way to simplify this task is to suggest using key phrases instead of traditional passwords.

A key phrase is three or more random words strung together, for example, "Pig-Lion-Window-Night." At first glance, such a password may seem fairly simple and insecure, but even it contains 19 characters, special characters, and capital letters. These factors are enough to make brute force attempts take a vast amount of time. If a few more special characters or numbers are added, one can confidently assert that hackers stand no chance of success. The main thing is to use words that are not related to the company's activities or the personal data of a specific user.

Overall, key phrases are an excellent way for endpoint users to create longer and more complex passwords without increasing their cognitive load.

Recommendations and feedback

Asking an employee to create a new password often makes them feel as if all basic knowledge has left their mind, leading to a lengthy thought process that can take hours. "What password should I create that is both convenient and secure?" the user might think.

It is very important to be in touch with colleagues during such a difficult moment: to give clear recommendations and answer questions. No one should feel as if they are left to their own devices when taking steps directly affecting the security of the entire organization. Ideally, of course, an exhaustive memo with all recommendations and examples should be created so that the password creation process is quick and painless. But even such memos often do not cover all the needs and questions of users.

Providing dynamic feedback during the creation of a password is not only a learning opportunity for the user but also an instant check to see if the password meets the security policy requirements. By consulting with an IT specialist, employees can understand in real time whether their new password complies with the company's policy, and if not, why, and quickly correct it.

Password expiry based on its length

No one likes it when work is stalled due to the need to change a work password again. Sometimes this moment comes too quickly and even greatly irritates the most conscientious employees who take security very seriously. However, using passwords with an indefinite validity period is simply unacceptable in today's realities, as such passwords open many doors for cunning hackers. That's why the regular changing of passwords is so widely used by many organizations.

But why not turn a potentially negative user experience associated with the forced change of a password into a promising opportunity?

Password expiry depending on its length provides end-users with a choice. They can create a relatively simple and easy password that only partially meets the organization's requirements, but they will need to replace it again, for example, in 90 days. Or they can extend the length of the password and not touch this issue for as long as possible, for example, the next 180 days.

Instead of all employees facing a forced password reset every 90 days, a flexible validity period based on its length rewards users who choose longer and safer passwords. This solution provides the best balance between security and ease of use.

Continuous monitoring of compromised passwords

The previously discussed methods are quite effective in helping end-users create more reliable passwords and provide them with greater transparency and understanding of their organization's security policies. However, even reliable passwords can be compromised. And it's impossible to be 100% sure that company employees aren't using the same passwords to authorize themselves in several services at once. That's why it's necessary to have a way to promptly detect compromised passwords and quickly block potential routes for attacks.

Many cybersecurity solutions have the ability to periodically check user passwords against leaked lists of compromised credentials, but these solutions are not perfect, as monitoring is not conducted in real-time. The optimal solution would be to choose a security solution that continuously scans passwords for leaks and immediately notifies the administrator, or even automatically resets such a password, to not give hackers a second for potential compromise. The market for information security solutions is currently very diverse, so finding a product with such functionality should not be difficult.

Conclusion

Passwords do not necessarily have to provoke indignation and irritation. As we have seen above, by choosing the right approach to interaction between the IT department and users, this problem simply disappears on its own.

Using Passwork, the issues aforementioned evaporate. This tool helps organize the storage and access to passwords, making the process more manageable and secure. Key password phrases, feedback during password reset, length-dependent expiry, and continuous scanning for compromised passwords are excellent solutions that can significantly enhance the security of any organization.

Four ways to make users love password security

Jul 19, 2024 — 5 min read

The popularity of push notifications can be easily explained – marketers have noticed that customers are more likely to read short messages that don't need to be opened and are more likely to click on links contained within them. Therefore, various companies have long adopted and actively used this communication channel with customers. However, malicious actors use push notifications for phishing, spreading malware, and other cyber threats. This article discusses the schemes used by malicious actors, what service developers need to consider, and how not to become a victim of fraudsters.

How malicious actors use push notifications

A push notification resembles an SMS, consisting of a title and a short message, an icon with the sender's name, and it may also include an image and buttons to perform a certain action, such as clicking a link. Additionally, the differences between push notifications and SMS include that the latter are received on any model of mobile phone and are delivered through mobile operators. Receiving push notifications requires a smartphone that supports this feature, the installation of applications, and internet access. Users can manage notifications themselves: prohibit, fully allow, or partially allow. Push notifications are usually stored in the personal account on the website, in the application, or in the notification center if the phone is on iOS and in the notification log if you have Android 10 and above.

The most common methods include sending push notifications that masquerade as official notifications from banks, online stores, or other services to prompt users to enter personal data or bank card details on phishing sites. One of the freshest instances involved a victim showing their screen to fraudsters, who posed as a bank security service and saw all push notifications with confirmation codes, allowing them to rob the victim.

From the users' perspective, push notifications seem convenient. A person receives dozens of pushes a day – from media, banks, marketplaces, and messengers. The short texts inform about discounts, new stock arrivals, promotions, and reminders. Moreover, push notifications deliver alerts about funds being debited or credited, codes for authentication, and access to one's account or personal cabinet on various services and sites. Malicious actors exploit this – due to the large amount of incoming information and often, lack of attention, a victim of fraud can easily click on a link in a pop-up "push."

Among relatively new attack methods is the ‘Fatigue’ attack, another form of social engineering. The essence of this method is to send the user a large number of login confirmation requests, thereby catching him off guard and scattering his attention. Eventually, the person is likely to accept the request to eliminate the "spam" on their phone or decide that the system is broken and that they need to "press the button" to fix everything.

The attack targets users whose first factor, most often a password, has already been compromised, although this is not such a big problem, considering the size of leaked password databases. By overcoming the two-factor authentication system in this way, malicious actors penetrated some corporate systems of Uber, Microsoft, and Cisco, and in 2024, Apple users faced this issue. Since successful attacks on large corporations continue, it can be concluded that businesses are not yet ready to repel such attacks.

In late February 2024, The Washington Post published an article about a new method the FBI uses to surveil suspects using push notifications. The agency filed more than 130 orders to disclose data of push notifications in 14 states. This became possible thanks to a feature of "pushes." When a user registers in an app, Apple and Google servers create and store a unique identifier - the "push token." This token can later be used to identify a person using the app based on device information.

Data protection advocates are concerned that this capability poses a threat to users' privacy from both the state and malicious actors. To send a victim push notifications, a fraudster must infect the device with malware. For example, the banking trojan Ginp was discovered by Kaspersky Lab. In addition to the standard set of abilities for a banking trojan: transmitting the entire contact list to its owners, intercepting SMS, and overlaying the screen with fake pages, the malware uses fake push notifications to convince the victim to open a phishing page.

Recommendations for service developers

Before connecting push notifications to a service, it's recommended to study their weaknesses and plan for data protection from leaks. Limit the information transmitted to the push notification service, including metadata.

There are several security measures. Firstly, do not use Push notifications to access valuable digital resources. Instead, use other protection tools for login, such as TOTP or physical tokens with a built-in password generator or digital certificate.

Secondly, implement throttling mechanisms in server systems for sending Push notifications. A well-designed push factor should offer the user options to reduce automatic responses. For example, it displays several options with numbers, and the user must choose what they see on the device they are logging in from.

Thirdly, report attack attempts to SOC and make quick decisions on temporarily blocking compromised accounts. Also, the importance of encryption when working with push notifications cannot be overlooked. And remind users of cybersecurity rules to prevent illegitimate actions by malicious actors.

For user protection, developers should follow several principles:

Сontent validation
Before sending a notification, ensure it doesn't contain potentially dangerous links or requests;

Use of secure protocols
All communication between the app and server, as well as the push notification server, should use encryption (e.g., via HTTPS);

Regular updates and dependency control
Used libraries and dependencies should be regularly updated to avoid known vulnerabilities;

User education
Provide information about notification settings and the dangers of fraudulent messages.

Protection measures

To avoid becoming a victim of fraudsters, users need to follow several rules, including being vigilant not automatically accepting offers, and not thoughtlessly clicking on links from ‘Pushes’. For security when using push notifications, users should only download official bank apps from their official websites and avoid installing apps from unverified sources.

Be cautious with push notifications about transactions and password change requests – verify such information through official communication channels with the bank.

Push notifications can appear on device lock screens, allowing unauthorized access to information in push notifications if the device falls into the wrong hands. Add a screen lock and configure the allowable information to be displayed on the screen for push notifications.

It's better to simply disable unnecessary notifications, and delete unnecessary apps from the phone. When "pushes" can be sent by a limited number of services, it's easier to notice a suspicious message.

Wrapping up 

In summarizing our exploration into the realm of push notifications, it's evident that these alerts occupy a significant role in our digital ecosystem. They serve as efficient conduits for information, offering immediate updates on transactions, sales, and various notifications directly relevant to our daily activities. However, this convenience also presents an avenue for malicious entities to exploit, using these notifications as a means to deploy phishing attacks, distribute malware, or engage in identity theft.

Despite these vulnerabilities, there is a concerted effort from the development community to enhance the security and integrity of push notification systems. Through the adoption of encryption and the implementation of more rigorous security protocols, developers are creating a more resilient framework to protect users from potential threats. Additionally, there is an emphasis on user education, encouraging individuals to exercise discretion and vigilance when interacting with push notifications.

For users, adopting a proactive approach to digital hygiene can significantly mitigate the risks associated with push notifications. This includes verifying the authenticity of apps before downloading, being cautious about the personal information shared within apps, and utilizing the security features provided by their devices. Periodically reviewing and customizing notification settings can also prevent unauthorized access to sensitive information, further safeguarding against fraudulent activities.

Ultimately, push notifications represent a dual-faceted feature of modern technology – providing essential information swiftly while posing potential security risks. By fostering a culture of awareness and implementing robust security measures, both developers and users can navigate these challenges effectively. As we continue to integrate these notifications into our daily lives, maintaining a balance between convenience and security will be paramount. In doing so, users can leverage the benefits of push notifications without compromising their digital safety.

The art of deception: the threats hidden behind innocent notifications and how to prevent them

Jul 17, 2024 — 4 min read

The name "Bluetooth" is derived from the name of Harald Bluetooth, a king who was known for uniting Danish tribes in the 10th century. Similarly, bluetooth technology, developed in the late 1990s, was created as a wireless alternative to RS-232 data cables, unifying various communication protocols into a single universal standard. 

However, mass unification comes with its risks. Indeed, the recent discovery of a significant Bluetooth vulnerability across several operating systems, including Android, macOS, iOS, iPadOS, and Linux, has raised alarms in the tech community. 

This vulnerability, discovered by security expert Mark Newlin, opens the door to potential contactless hacking of devices without any action required from the device owner. It poses a serious threat, especially considering the widespread use of Bluetooth technology in modern devices. Today, we’ll be discussing some of Bluetooth’s vulnerabilities with the help of Newlin’s report. 

Counterfeit keyboards

The crux of the problem lies in the ability to compel a vulnerable device to establish a connection with a counterfeit Bluetooth keyboard, all without requiring user confirmation. This is achieved by circumventing the Bluetooth protocol's authentication checks, which, in specific implementations of Bluetooth stacks in popular operating systems, allow an attacker to exploit this inherent mechanism. Subsequently, this connection can be exploited to issue commands, granting the attacker the capability to perform actions on the compromised device on behalf of the user, without any additional authentication, such as a password or biometrics (e.g., fingerprint or facial recognition). Newlin, the security researcher who unearthed this vulnerability, emphasized that a successful attack does not necessitate a specialized setup; even a standard Bluetooth adapter on a Linux-based laptop can be used for exploitation.

It's worth noting that the attack's practicality is limited by the proximity requirement between the attacker and the victim, as Bluetooth connections typically have a short range. While this restricts mass exploitation, it does pose a potential threat to individuals who may be targeted by attackers for specific reasons.

Android 

Android devices have been subjected to rigorous scrutiny with regard to the aforementioned vulnerability. Newlin conducted tests on seven different smartphones running various Android versions, ranging from Android 4.2.2 to Android 14. Remarkably, all of them exhibited vulnerability to Bluetooth hacking. In the case of Android, the only prerequisite for a successful hack is that Bluetooth is enabled on the target device.

The researcher promptly alerted Google to this discovered vulnerability in early August. Consequently, Google has already developed patches for Android versions 11 to 14 and shared them with smartphone and tablet manufacturers that rely on this operating system. These manufacturers are expected to release corresponding security updates for their customers' devices in due course. It is imperative for users to install these patches as soon as they become available for their Android 11/12/13/14-based devices. For older Android versions, no updates will be forthcoming, leaving them perpetually susceptible to this attack. Thus, turning off Bluetooth remains a prudent precaution until the end of these devices' life cycles.

MacOS, iPadOS, and iOS

In the case of Apple's operating systems, the researcher had a more limited range of test devices at his disposal. Nonetheless, he was able to confirm the presence of the vulnerability in iOS 16.6, as well as in two versions of macOS: Monterey 12.6.7 (x86) and Ventura 13.3.3 (ARM). It is reasonable to assume that a broader spectrum of macOS and iOS versions, including their counterparts, iPadOS, tvOS, and watchOS, could potentially be susceptible to a Bluetooth-based attack.

Regrettably, Apple's enhanced security feature, known as Lockdown Mode, introduced in the past year, does not provide protection against this particular Bluetooth vulnerability. This applies to both iOS and macOS.

Fortunately, a successful attack on Apple's operating systems necessitates an additional condition, in addition to Bluetooth being enabled: the device must have the Apple Magic Keyboard paired with it. As a result, the risk of an iPhone being compromised through this vulnerability appears to be minimal.

Linux

This attack is also applicable to BlueZ, a Bluetooth stack that is included in the official Linux kernel. Newlin verified the Bluetooth vulnerability in various versions of Ubuntu Linux, including 18.04, 20.04, 22.04, and 23.10. The bug that enabled this attack was identified and patched in 2020 (CVE-2020-0556). However, the fix has been deactivated by default in most popular Linux distributions, with only ChromeOS having it enabled (based on information obtained from Google).

The Linux vulnerability discovered by the researcher is designated as CVE-2023-45866 and is rated at 7.1 out of a possible 10 (CVSS v3) with a "moderate" threat status, according to Red Hat. A successful exploit of this vulnerability requires just one condition to be met: Bluetooth discovery or connectivity must be enabled on the Linux device. The good news is that a Linux patch addressing this vulnerability is already available, so it is strongly recommended to install it as soon as possible if it has not been done already.

Final thoughts 

In conclusion, the discovery of a critical Bluetooth vulnerability affecting popular operating systems such as Android, macOS, iOS, iPadOS, and Linux highlights the ongoing risks associated with modern technology. However, it's essential to note that many of these companies have responded promptly to the issue, releasing patches and updates to address the vulnerability. This demonstrates their commitment to enhancing security for their users.

While this story underscores the constant vigilance required in the ever-evolving landscape of cybersecurity, it also serves as a reminder that hackers are not dormant, they continuously seek new vulnerabilities to exploit. As technology advances, the responsibility to remain proactive in protecting our devices and personal information becomes increasingly crucial.

Bluetooth vulnerability: dangers and solutions in operating systems

Jul 12, 2024 — 4 min read

In the digital era, where the internet and electronic devices dominate every aspect of our lives, the importance of data security cannot be overstated. Zip archives, a common format for compressing and storing data, are no exception to the need for stringent security measures. Typically, passwords are employed to protect the contents of these archives. 

However, challenges arise when one forgets the password to a zip file or seeks to evaluate the robustness of their data encryption. 

This article delves into the motivations behind zip archive password cracking and the prevailing methods. Additionally, it offers valuable advice on safeguarding your data against unauthorized access.

Understanding the motivations for cracking zip archive passwords

The act of cracking zip archive passwords can stem from both legitimate and malicious intentions. On the legitimate side, the most common scenario involves individuals attempting to regain access to their own archives after forgetting the password. This forgetfulness is a natural human trait, especially when dealing with numerous passwords for different files and services. On the other hand, the conversation around archive cracking often highlights two main concerns. The first is the ability to crack a password-protected archive to retrieve its contents. The second, more alarming issue, involves exploiting vulnerabilities in the archiving software to gain unauthorized access to a user's computer system.

Fortunately, the current landscape of archive cracking offers a silver lining. Attackers are primarily limited to brute-force attacks, where they attempt to guess the password by trying numerous combinations. This method's effectiveness heavily relies on the complexity of the password. A sufficiently complex password can significantly enhance the security of your data. However, the situation becomes more complicated when considering the vulnerabilities within the archiving software itself. These vulnerabilities can be discovered periodically, making it imperative for users to keep their software updated to prevent potential exploitation by hackers.

Cybercriminals have various motivations for wanting to crack zip archives. These include gaining unauthorized access to confidential information, circumventing copyright protection, bypassing security restrictions and policies, and modifying or destroying data. Such actions can lead to significant breaches of privacy and financial loss. To mitigate these risks, it is advisable to use reputable archiving software and ensure that all necessary updates and patches are applied promptly.

Methods for cracking zip archives

Gaining access to a zip archive without the password involves eliminating and guessing. The unlimited password attempts feature of zip archives makes them vulnerable to brute-force attacks. Various tools and techniques are available for this purpose, each with its own set of strategies:

Full brute-force attack
This method is applicable when no information about the password is known. It involves trying every possible combination within a specified range, allowing for customization based on known password characteristics.

Brute-force attack with extended mask
When some information about the password's structure is known, this method allows for a more targeted approach, reducing the number of guesses needed.

Dictionary attacks
These are effective when the password is suspected to be a common word or phrase. Unfortunately, the tendency of users to choose simple, easily guessable passwords makes many archives vulnerable to this type of attack.

Tools such as John the Ripper, Advanced Archive Password Recovery, KRyLack ZIP Password Recovery, and ZIP Password Cracker Pro are among the most popular for cracking archive passwords.

Enhancing the security of zip archives

The relative ease with which zip archives can be cracked necessitates the adoption of additional protective measures. A robust password is the first line of defense, ideally incorporating a mix of characters, numbers, and symbols to increase complexity. Such passwords are significantly more challenging to crack, providing a strong barrier against unauthorized access.

Beyond passwords, the level of protection should be tailored to the value of the data being secured and the user's knowledge of information security. Encrypting files before sharing them over the internet adds an extra layer of security. For instance, using a zip archive with a strong password for encryption, and then sharing the password through a separate communication channel, can prevent unauthorized access even if the primary transmission method is compromised.

In addition to the fundamental security measures previously discussed, adopting advanced security practices can significantly enhance the protection of zip archives.

Implementing Multi-Factor Authentication (MFA) can dramatically increase the security of your zip archives. While not a standard feature for archive access, integrating MFA through secure storage solutions or encrypted file systems adds a critical security layer. MFA requires users to provide two or more verification factors to gain access, combining something they know (like a password) with something they have (such as a security token or a mobile phone confirmation). This method ensures that even if a password is compromised, unauthorized access to the archive remains highly unlikely.

While zip archives support password-based encryption, users seeking higher security levels should consider additional encryption layers. Tools like VeraCrypt or BitLocker offer robust encryption for files and folders, including zip archives. By encrypting the entire storage container that holds the zip archive, users can protect against both unauthorized access and more sophisticated attacks that target file-level encryption vulnerabilities.

Conducting regular security audits and vulnerability assessments of the systems storing zip archives can identify potential security weaknesses before they are exploited. This proactive approach involves scanning for vulnerabilities, assessing the risk level of identified vulnerabilities, and implementing necessary patches or security enhancements. Regular audits ensure that both the software used for archiving and the broader system environment remain secure against emerging threats.

Finally, educating users on security best practices plays a crucial role in safeguarding zip archives. This includes training on creating strong passwords, recognizing phishing attempts, and safely sharing sensitive information. A well-informed user is the first line of defense against many common cyber threats, making education a vital component of any comprehensive security strategy.

Final thoughts 

In conclusion, while zip archives offer a convenient means of compressing and storing data, their security is not infallible. Users must employ strong passwords, take advantage of encryption options, and keep their software up to date to protect their data effectively. Additionally, it's crucial to remember that unauthorized cracking of archives not only violates legal statutes but also infringes on the privacy and confidentiality of individuals. By adopting a proactive approach to data security, users can safeguard their information against the evolving threats in the digital landscape.

Securing the zip: advanced strategies for archive protection in the digital age

Jul 5, 2024 — 5 min read

The counterfeiting of well-known apps remains a popular tool for spreading malicious software. For instance, in 2022, a counterfeit version of the popular messaging app WhatsApp tricked thousands of users into downloading it from unofficial sources, leading to the harvesting of personal data and intrusive ads. 

Cybercriminals employ various tactics to deceive users into downloading fake apps through email, dangerous websites, and social media. This article will provide recommendations to help you identify a fake app before downloading and completely remove it from your smartphone. Let's take a look today at the dangers they pose, their prevalence, and the steps you can take to protect yourself against these threats.

The dangers they pose

Installing malicious software on your phone can expose you to numerous threats, ranging from slowing down your device to spying on you. One of the most common risks is the theft of confidential and personal data. Malicious apps can steal your private information, such as contacts, photos, and messages, which can then be sold to other fraudsters or used for identity theft. Another significant threat is financial theft, where cybercriminals can access your financial information, such as banking apps and cryptocurrency wallets, to steal your money.

Malicious apps can also cause performance issues on your device, leading to slower operation, overheating, or rapid battery drain due to background processes. Additionally, these fake apps may display a large number of ads, known as adware, which can be intrusive and significantly reduce the usability of your device.

Spying is another critical threat posed by malicious apps. These apps can eavesdrop on your conversations, read your messages, and monitor your activities, severely compromising your privacy. If you use your smartphone for work, malicious apps can engage in corporate espionage by stealing corporate data, which can lead to potential business losses and security breaches.

The prevalence of fake apps

In recent years, these threats have become increasingly common. Some target a wide range of users, while others are more specific. Notable examples of malicious fake apps include counterfeit versions of WhatsApp and Telegram, spread through dozens of fake websites. Once installed, these fake apps intercepted victims' chat messages to steal their confidential information and cryptocurrency.

Another example is the spread of BadBazaar spyware disguised as Signal and Telegram by hackers linked to China. Both types of fake apps passed official verification and were available on Google Play and the Samsung Galaxy Store.

How to prevent fake apps from reaching your device

To reduce the likelihood of installing threats on your device, it is crucial to take several preventive measures. Always install the latest versions of your operating system and software, as threats often exploit vulnerabilities in older versions. Before downloading any app, verify the developer's reputation online and check for any reviews of the app to ensure its legitimacy. It's also essential to use official app stores, as they have strict vetting processes to prevent threats from reaching the platform.

Removing any apps you don't use can help you monitor what is on your device more effectively. Be cautious about clicking on links or attachments, especially if they appear in unsolicited social media messages or emails and offer to download something from third-party sites. Similarly, avoid clicking on ads on the internet, as they may be part of a scam aimed at redirecting you to a counterfeit app.

When installing new apps, be cautious when granting permissions that are unrelated to the app's functions, as this could be a sign of malicious software trying to access your data. Using biometric data for login instead of simple passwords in your accounts can also enhance your security.

Lastly, employing security solutions that provide enhanced protection with effective threat detection, blocking malicious websites, safeguarding online payments, and managing passwords. By following these steps, you can significantly reduce the risk of installing fake apps on your device and protect your personal and financial information from cyber threats.

It's also important to monitor unusual activity on your device if malicious software does manage to infiltrate it. For example, be alert if your battery drains faster than usual. Also, if your device runs slower, it may be due to malicious software. Pay attention to persistent pop-up ads, as this could indicate that you have installed adware. Watch for any unusual icons appearing on your screen.

10 additional tips and tricks 

1. Educate Yourself on Common Threats
Understanding the various types of malware and how they typically operate can help you stay vigilant. Common types include trojans, spyware, adware, and ransomware. Each has distinct characteristics and signs that can alert you to their presence.

2. Regularly Update and Patch Software
Make sure all your apps, not just the operating system, are regularly updated. Developers often release patches for known vulnerabilities, so keeping your software current is crucial in preventing exploitation by malicious actors.

3. Monitor App Permissions
Review the permissions of apps already installed on your device. Apps should only have access to the information and functions necessary for their operation. For instance, a flashlight app should not need access to your contacts or messages.

4. Utilize Multi-Factor Authentication (MFA)
Wherever possible, enable MFA for your accounts. This adds an extra layer of security, making it harder for unauthorized users to gain access even if they obtain your password.

5. Backup Your Data Regularly
Ensure you have regular backups of your important data. This practice can save you from losing vital information if your device is compromised. Use cloud services or external storage devices for these backups.

6. Be Skeptical of Free Offers
If an app promises something that seems too good to be true, it probably is. Be cautious of free versions of popular apps that offer the same functionality without any apparent revenue model. These could be traps to lure you into installing malware.

7. Use Strong, Unique Passwords
For each of your accounts, use a unique password that combines letters, numbers, and symbols. Avoid using easily guessable information like birthdays or simple sequences. Password managers can help you keep track of your passwords securely.

8. Regularly Scan Your Device for Malware
Use reputable antivirus and anti-malware software to scan your device regularly. These tools can detect and remove many types of malware before they cause significant harm.

9. Stay Informed on the Latest Threats
Cybersecurity is an ever-evolving field. Stay informed about the latest threats and trends by following trusted sources. This knowledge can help you recognize and avoid new types of attacks.

10. Use Secure Networks
Avoid using public Wi-Fi for sensitive transactions, such as online banking. Public networks can be less secure, making it easier for attackers to intercept your data. Use a virtual private network (VPN) to add a layer of security when connecting to public Wi-Fi.

Conclusion

Today, smartphones and tablets are our gateways to the digital world. But this world must be protected from unwanted guests. By following these simple steps and additional measures, your finances and personal data will be better protected. Stay vigilant, stay informed, and take proactive steps to secure your digital life.

By incorporating these practices into your daily routine, you can create a robust defense against the ever-present threat of fake apps and other forms of cybercrime. Your digital safety is paramount, and with the right knowledge and tools, you can navigate the digital world securely and confidently.

Identifying fake apps on your smartphone

Jun 28, 2024 — 4 min read

The world has grown accustomed to social media, where users upload millions of images and videos daily. However, not everyone realizes that an innocent-looking selfie at work could be used by malicious actors to break into a company or that a hotel photo might lead to blackmail.

With the advancement of technology and the expansion of geospatial information systems, cybersecurity threats have also increased, demanding more careful consideration of the data being published. This article explores what GEOINT is, how criminals use your photographs for their purposes, and why people scrutinize Google Maps.

What is GEOINT?

GEOINT, short for "Geospatial Intelligence," involves the analysis and use of imagery and geospatial information to gain insights into activities on Earth. It combines several disciplines: cartography, charting, image analysis, and imagery intelligence. While traditionally associated with the military, geospatial intelligence is increasingly utilized by civilian sectors, including telecommunications, transportation, public health, safety, and real estate, to enhance daily life quality. In broader applications, geospatial intelligence is used for emergency planning, crime and security monitoring, and protecting critical infrastructure.

Technological advancements have brought a new era in geospatial intelligence. The advent of powerful analytical software, ubiquitous geolocation data, far-reaching broadband connections, rapidly developing computational power, affordable cloud storage, advanced analytics, and artificial intelligence have all played a role in the revolution of geospatial intelligence.

GeoGuessing

In the context of geospatial intelligence, the phenomenon of geo guessing is worth mentioning. The term comes from the name of the browser game GeoGuessr, launched in 2013. The game uses Google Street View maps, requiring players to guess the location of a street/alley/highway worldwide by marking it on Google Maps. Since 2015, the game has also been available as an iOS app.

The game has become so popular that competitions and tournaments are held. In 2023, the GeoGuessr World Championship finals were held in Stockholm with a prize pool of $50,000. Clues include road markings, languages on signs and plaques, animals and people in the frame, and other details. The most professional players can recognize a location on the map by a 3D image within seconds, requiring extensive time studying maps.

How criminals use GEOINT

An example of careless handling of personal information is found in an interview with Michael Oren, a former Israeli ambassador to the U.S. Attentive viewers noticed a note with login credentials in the background during the shoot from his home. Imagine the damage a criminal could cause in such a situation. 

Be vigilant and cautious when sharing your photos on social media. Like any other information obtained through theft or leakage, data from open sources can be used by malicious actors. Here are some ways they exploit this information:

1. Phishing using geolocation
By determining your location, criminals can personalize phishing messages. For instance, if you're at a resort, you might not ignore a message supposedly from emergency services warning of dangerous weather conditions in the area.

2. Physical threats
Criminals can locate server centers or critical infrastructure and plan physical intrusions.

3. Espionage and surveillance
Malicious actors can use geodata to track people or organizations, monitor their movements, connections, habits, and even plans to exploit this information for their gain, such as crafting more convincing social engineering attacks or blackmail.

Overall, the use of geospatial intelligence by criminals poses a severe threat to data security, personal information, and critical infrastructure.

Law enforcement and GEOINT

On the flip-side, law enforcement agencies use GEOINT for investigations and apprehending criminals. For example, in 2019, Sacramento authorities arrested a drug dealer who sent potential buyers photos of marijuana on his hand. The fingerprints visible in the photo led to his identification. 

Photographs can indeed serve as evidence in criminal cases. In spring 2023, a data leak from the Pentagon put U.S. National Guard member Jack Teixeira under suspicion. An investigation revealed that the leaked photos were taken in his home, as the edges of the photographs matched the interior.

The most frequent method of geospatial intelligence is analyzing images or videos to determine their location. Almost anyone can conduct basic geospatial intelligence using the internet and various services. For example, a jealous wife might deduce from her husband's social media photos that he is not on a business trip but visiting a lover. 

Tools and services for GEOINT

Various services and tools are used for collecting data from open sources in geospatial intelligence. Here are some examples:

Google Maps. A web mapping platform from Google offering satellite photos, aerial photography, street maps, interactive street views in 360°, and real-time traffic conditions.

OpenStreetMap. An open collaborative project to create a free editable geographic database of the world.

Soar Earth. A service for collecting and exploring satellite images, aerial photographs, and drone images.

GeoHack Tools. This service provides a list of OSINT resources for the selected area on a map, including maps/satellite images, photographs, real-time weather, flight and maritime tracking, railways, peaks, and even fitness device data.

The range of geospatial intelligence tools is vast and continually expanding.

Final thoughts — protecting oneself 

As we have explored, even innocent photos shared on social media can be exploited by malicious actors, leading to severe consequences such as unauthorized access, blackmail, or even physical threats. To safeguard against these threats, it is essential to:

1. Be vigilant with personal information
Avoid sharing sensitive data in photos, such as login credentials or identifiable locations, that can be exploited by criminals.

2. Control privacy settings
Regularly review and adjust the privacy settings on social media platforms to limit the visibility of your posts to trusted individuals.

3. Use geotagging wisely
Disable geotagging on your devices when sharing photos publicly, as location data can be a significant security risk.

4. Leverage security tools
Utilize available security tools and services to monitor and protect against unauthorized use of geospatial data.

By taking these proactive steps, individuals and organizations can better defend themselves against the growing threats posed by the misuse of geospatial intelligence.

GEOINT and the Chamber of Secrets

Jun 21, 2024 — 4 min read

Every year, blockchain technology unveils new possibilities in the realm of digital transactions and decentralized applications. One of the latest additions to this ecosystem is the smart account—advanced accounts capable of automatically performing predefined functions and operations.

Imagine a digital wallet that automatically allocates funds among various investment portfolios based on predetermined rules or market conditions. Or consider a smart contract managing the supply of goods in real-time, based on demand and supply.

While smart accounts offer unprecedented flexibility and automation in managing cryptocurrencies, they also introduce unique security challenges that must be addressed to protect valuable digital assets and ensure the stability of decentralized systems.

What is a smart account?

Before delving into security issues, let’s clarify what smart accounts are and their role in the blockchain ecosystem. In traditional blockchains like Bitcoin, accounts are addresses linked to specific balances and transactions. However, smart accounts, as seen on platforms like Ethereum, have far broader functionality.

Smart accounts are unique accounts tied to executable code known as smart contracts. These contracts define the conditions under which the smart account can perform certain actions, such as transferring funds, performing computations, or interacting with other contracts. For instance, a smart account could be programmed to automatically send monthly rent payments from your cryptocurrency funds.

Unlike regular accounts that merely hold funds, smart accounts are autonomous agents capable of making decisions and performing complex operations based on embedded logic. It’s akin to a bank account that can independently transfer funds at specific intervals and under certain criteria.

Security issues of smart accounts

The unique security challenges of smart accounts are a significant concern, especially as protecting digital assets in the dynamic blockchain environment becomes critically important with the mass adoption of cryptocurrencies. Key security issues include code vulnerabilities, cyberattacks, and problems with access management and permissions. Any bugs or vulnerabilities in the code can have catastrophic consequences, such as the Genesis DAO project’s loss of $50 million in 2016 due to a smart contract vulnerability.

Several high-profile blockchain security breaches involving smart contracts have raised serious concerns, particularly among those actively engaged with blockchain technology. For instance, the infamous DAO hack led to the Ethereum network's hard fork, resulting in a new version of the blockchain—Ethereum Classic.

Once a smart contract is deployed on the blockchain, its code becomes immutable, making it extremely difficult to correct errors and vulnerabilities. This underscores the importance of thorough testing and code auditing before deployment. Otherwise, mistakes can lead to disastrous outcomes, as seen with CryptoKitties and Cryptozombies, where bugs in smart contracts resulted in the loss of valuable digital resources.

Best practices for smart account security

Given the risks associated with smart accounts, it’s crucial to follow best security practices throughout the lifecycle of smart contracts. Security should be an integral part of the smart contract design process, with careful consideration of contract logic, access structures, key management, and other critical aspects. For example, MakerDAO implemented a multi-tier permission structure and voting mechanism for managing its collateralized stablecoin system with security in mind.

Secure development of smart contracts involves using formal verification methods and proofs to ensure code correctness, engaging independent experts to audit the code before deployment, and applying secure programming patterns and standards, such as OpenZeppelin and Solidity Security Best Practices. Even after deployment, continuous monitoring of smart contract security is essential, as new threats and vulnerabilities can emerge at any time.

The future of smart account security

As blockchain and smart contract technologies evolve, new approaches and tools are emerging to enhance smart account security. AI and machine learning are being used for automatic vulnerability detection and error identification in smart contract code. Zero-Knowledge Proofs (ZKPs) are maintaining transaction privacy, and Secure Multi-Party Computation (MPC) is protecting confidential data by allowing computations on encrypted data without revealing the data itself. Formal verification provides mathematical proof of smart contract code correctness.

While quantum computers are still in early development stages, they may pose a future threat to the cryptographic algorithms used in blockchains. Malicious actors with sufficiently powerful quantum computers could potentially break traditional cryptographic systems used in blockchains. Smart contract developers should monitor this development and adapt their security systems using quantum-resistant algorithms.

Open-source communities play a crucial role in raising smart contract security standards. Collaboration, knowledge sharing, and tool improvement contribute to a more secure ecosystem. Examples of such communities include OpenZeppelin, the Ethereum Security Community, and Ethereum Cat Herders.

Education and awareness in smart account security

Ensuring the security of smart accounts involves education and awareness. This includes training developers, auditors, users, and other blockchain ecosystem participants on security best practices, threats, vulnerabilities, and prevention methods.

Smart contract developers should be well-versed in secure programming principles, security threats, and prevention techniques. This includes understanding common vulnerabilities like buffer overflows, coding errors, and access management issues, as well as using tools and methodologies for detecting and fixing such vulnerabilities.

Smart contract security auditors should be trained in using specialized tools and methodologies to analyze smart contract code, identify vulnerabilities, and recommend fixes. They should also stay updated on the latest threats and trends in blockchain security.

Users of smart accounts and decentralized applications also play a crucial role. They should be aware of security risks and best practices. This can include training on the secure storage and use of private keys, understanding phishing risks and other fraud types, and using tools and services to monitor the security of their smart accounts.

Conclusion

Smart account security is critically important in the era of digital transactions and decentralized applications. From secure development and auditing of smart contracts to education and awareness, compliance with regulatory requirements and security standards, and continuous monitoring and evaluation of security—all these aspects are key to ensuring the security of smart accounts.

Smart account security

Jun 14, 2024 — 5 min read

Cybersquatting, i.e., the registration of domain names similar to a trademark already owned by someone, has existed for about as long as the Internet itself. However, even today, many companies are new to encounters with individuals who want to make money from the similarity of domains.

To successfully combat cybersquatters, it's important to consider their possible interest before registering a domain name for your website. What should you think about and what actions should you take? We explain in this article.

What is cybersquatting?

A person who registers domains that are consistent with someone else's trademarks is called a cybersquatter. Their non-cybersquatter counterpart, the common squatter, occupies a vacant building and asserts rights to it.

The principle remains the same, while the object is the humble ‘Domain’. Is there a company or brand name, but the domain consonant with it is somehow free? Then it needs to be occupied, sat on comfortably, and held until the owner who needs this domain name pays a ransom for it.

Simply put, cybersquatting is a type of entrepreneurial activity. Its goal: to be the first to find a potentially needed domain, register it for a standard symbolic value, and then resell it at a much higher price.

Types of cybersquatting

With many people wanting to make money on your website's domain or another company’s web resource, several types of cybersquatting exist:

Typosquatting or counting on user error involves registering a name one letter different from the original. If there’s a website example.com, registering exemple.com means some visitors will land there due to the typo. By displaying ads before they realize their mistake, you can make money.

Branded cybersquatting or counting on fame. A company has registered the domain example.ru, but it didn’t use example.com or example.biz. These will be registered by a cybersquatter.

Unsuccessful cybersquatting. An entrepreneur wants to launch a new product and announces his plans on social networks without registering the domain. The cybersquatter will get there first and the entrepreneur will have to pay more for the domain.

Cybersquatting with a trademark, which by law is worth more than the registered domain name. A site without a registered trademark finds a cybersquatter, who registers the TM for himself and, voilà, can now legally take away the domain through the court.

Drop domain cybersquatting involves domains not renewed in time by the rightful holder. Such a domain falls into a special section of the registrar's site, where the most promising quickly pass into the hands of entrepreneurs. When the owner remembers that the domain has not been renewed, it already belongs to another person.

Another phenomenon often confused with cybersquatting is called domaining. In this case, entrepreneurs use popular words in various industries without claiming a specific unique domain name. This is done expecting that someone wanting to create a new site will buy a favorable and easy-to-promote domain at a higher price.

For domains, words like business, photo, market, shop, and others are often used in various combinations. They also often take the surnames of famous people and names of settlements. The domain ivanivanov.ru could interest an entrepreneur with this name. Cityname.com with the name of a particular city is suitable for the site of its administrative structures or tourist portal.

How cybersquatters choose domains

Registering hundreds and thousands of unique domains with all kinds of typos and similar names is expensive. To keep his business afloat, it's important for a cybersquatter to choose successful combinations. To do this, entrepreneurs specializing in the resale of domain names often:

• Monitor situations in companies. For example, rumors of a merger between companies A and B. Therefore, a name containing fragments of each of their names is likely needed. Cybersquatters can register these before employees of the new large organization.

• Look for companies that already exist but don't have their own website yet. For example, those finding customers through social networks and other marketing channels. Domains consonant with their names are also bought for the future.

• Check the registration of a trademark on the company's domain name. The scheme of taking the domain from the owner is not always possible, but it still works.

Cybersquatting is real

Companies often believe those wanting to register a domain and resell it more favorably exist in a parallel universe. However, companies all over the world regularly encounter them.

Not all disputes over a domain arise for personal gain and fit the definition of cybersquatting. Sometimes the reason is the consonance in the names of two companies. For example, in 2014, the recruitment portal HeadHunter sued the Russia-based company HH&HR over the use of the domain hh-hr.ru. The court sided with the portal and ruled to seize the domain name in its favor. At that time, HeadHunter had no intention of using the domain name for commercial purposes.

But in 2017, Google sued Vitaly Popov over a case more akin to cybersquatting. The domain secret.ɢoogle.com was used to send messages saying "Vote for Trump" during the US election. The name differed from Google by just one letter. It started with an uppercase but small Latin "G", i.e., "ɢ", which in Unicode is denoted by the symbol 0262.

The battle between Italian clothing brand Lotto Sports Italy and Canadian David Dent for the domains LottoStore.com and LottoWorks.com ended with the latter winning. However, it was an epic two-part duel. The Canadian resident bought the two domains and planned to create gaming-themed websites. The clothing brand sued Dent and initially won. The court ordered the transfer of the domain names to the company. The Canadian appealed, and Lotto Sports Italy was eventually found guilty of reverse domain seizure. The company paid $237,000.

Cybersquatters and the law

No matter how dubious the activity of some squatters may seem, it doesn't negate the fact: cybersquatting is entirely within the legal field. It's not illegal to register domains and trademark names.

Yet the world is trying to combat cybersquatters. The main arbiter of domain disputes is the WIPO (World Intellectual Property Organisation), which unites 157 member countries. It has developed the UDRP — Uniform Domain Dispute Resolution Policy.

There are two ways for companies and brands that have faced domain name seizure: pay the amount demanded by the cybersquatter or go to court, where it's necessary to provide justification for their claims to the domain. For those slow to act, there's a third option: wait. If the domain name is rare and doesn't cause other market participants particular interest, the cybersquatter might eventually reduce the price. However, this is a path with unpredictable results.

Summing up: how to fight cybersquatting

It's important not only to know what cybersquatting is but also to think in advance about how to protect yourself from this phenomenon. A few simple rules will help:

• Check for a domain that matches the name of the company or brand before finalizing the name. Using an original, "off-the-beaten-path" name reduces the risk of domain disputes due to conflicts of interest.

• Don't publicize the brand or company name before the domain name is officially registered. Cybersquatters don't sleep! — Don't limit yourself to one domain when registering. It's better to choose several similar ones in different popular domain zones. This reduces the risk of someone creating dubious content on a similar domain.

• Register a trademark on the selected domain name immediately. This isn't a panacea, but in most domain disputes, its presence becomes a decisive argument for the court.

• Make timely payments for domain renewal to avoid dealing with squatters who quickly re-register drop domains to themselves.

If you can do all of this — it’s safe to say that you’ll be safe from the squatters!

Your domain is my domain: how to protect yourself from cybersquatting

Jun 4, 2024 — 3 min read

Passwork 6.4, we have introduced a number of changes which enhance our browser extension security, make user permissions settings more flexible, and improve the logging of settings related changes:

  • Mandatory extension PIN code
  • Logging of all changes related to settings
  • User access to history of actions with passwords
  • Automatic updating of LDAP group lists

Mandatory extension PIN code

With the new setting ‘Mandatory PIN code in extension’, administrators can set a mandatory browser extension PIN code for all users, minimizing potential unauthorized access. Once enabled, users who have not yet set a PIN code will be prompted to do so upon their next login to the extension. Users will be able to configure their auto-lock timeout and change the PIN code, but they cannot disable these functions.

The ‘Mandatory PIN code in extension’ setting is located in the ‘API, extension and mobile app’ section of the System settings

Now all changes in the Account settings, User management, LDAP settings, SSO settings, License info, and Background tasks are displayed in the Activity log.

All changes related to settings logged in the Activity log in the Settings and users

History of actions with passwords

The new setting ‘Who can view the history of actions with passwords’ makes it possible for vault administrators to let other users view password history, password editions, and receive notifications related to their changes. Previously, these features were available only to vault administrators.

You can customize this feature in the Vaults section of the System settings

Automatic updating of LDAP group lists

Automatic updating of LDAP group lists can now be configured on the Groups tab in the LDAP settings. The update is performed through background tasks with a selected time interval.

To configure LDAP group list updates, select LDAP server, go to the Groups tab, and click the Edit settings button

Other improvements

  • Added pop-up notifications when exporting data or moving data to the Bin
  • Improved display of dropdown lists on the Activity log page
  • Changed time display format of the ‘Automatic logout when inactive’ and ‘Maximum lifetime of the session when inactive’ settings
  • Changed the Enabled / Disabled dropdown lists on the System settings and LDAP settings pages with toggles
  • Increased minimum length of generated passwords to six characters

Bug fixes

  • Fixed an issue in the Password generator where selected characters were sometimes missing in the generated password
  • Fixed an issue where local users could not independently recover their account password when an LDAP server was enabled
  • Fixed an issue where local users could not register in Passwork when an LDAP server was enabled
  • Fixed an issue which occurred after moving a folder with shortcuts to another vault and shortcuts not being displayed in the new vault
  • Fixed an issue that occurred when trying to move a shortcut found in search results without opening any vaults right after logging into Passwork
  • Fixed an issue that occurred when trying to copy a password found in search results without opening any vaults right after logging into Passwork
  • Fixed an issue that occurred when a password was sent to another user and remained on the recipient's Recents and Starred pages after the initial password was moved to the Bin
  • Fixed the value in the time field for the ‘API key rotation period (in hours)’ setting which was reset to zero after disabling it
  • Fixed incorrect event logging in the Activity log after changing folder permissions
  • Fixed incorrect text notification about assigning access rights to a user through a role
  • Fixed incorrect tooltip text when hovering over the username of a recently created user
  • Fixed incorrect display of long invitation titles
  • Removed the local registration page when the LDAP server is enabled

Passwork 6.4