Robocalls now flooding US phones with 200m calls per day

According to a new report, nearly 30% of all US calls placed in the first half of 2019 were garbage, as in, nuisance, scam or fraud calls. Continue reading Robocalls now flooding US phones with 200m calls per day

How do you know which site credentials are sent to when signing into Oauth site in native apps?

I sometimes use these features where I can use my Google account to sign in to different service providers. For example, the Postman app lets me sign in to it using either their own user store, or Google’s (I believe this uses the OAuth schema, but I could be wrong).

When I do this on a website, it’s pretty clear I am sending my Google credentials to Google, not to the site I’m trying to sign in to, as I can verify the URL in the browser. However, in native apps, I don’t see an easy way to check this. How do I know my credentials are being sent to Google, and not to Postman or some other site (by accident, or maliciously)?

See, for example, a screenshot of the Postman Google sign-in screen:
screenshot of the Postman Google sign-in screen

Note: I don’t think this is a duplicate of
How can an end-user verify the authenticity of a third-party authentication provider’s login form
That questions asks specifically about websites, I’m asking about native apps, where the accepted answer to that question does not apply. The answer does tough on that, but only to the extent that the user just needs to trust the native app. I am wondering if there is anything concrete I can do as a user to make sure the prompt is legitimate?

Continue reading How do you know which site credentials are sent to when signing into Oauth site in native apps?

Protecting Against Spear Phishing Attacks: A Guide

As security practices evolve, cybercriminals are finding new methods to carry out their attacks. Using highly personalized email attacks, carefully designed spear phishing attacks are being used to steal sensitive information such as login credentials… Continue reading Protecting Against Spear Phishing Attacks: A Guide

Why does arp spoofing on a local network ‘break’ internet access for the victim?

I’m doing some experimenting with Kali on my home network and was wondering about something regarding ARP spoofing.

When I ARP spoof another device AND the default gateway, Internet access stops working for said device. To get it working,… Continue reading Why does arp spoofing on a local network ‘break’ internet access for the victim?