There are many attempts to hack others, to display ads, get data, earn money or just be evil and encrypt data without possible return point.
This post contains few recent breaches and few rules how to not become victim.
Be cautious which npm packages you install.
Recently, there was malware in npm package called
crossenv. Maybe you already heard that package name, it's very popular - but the trick is official package is
cross-env, so you can easily not type sign
- and install malware.
Npm is now holding that package name: https://www.npmjs.com/package/crossenv
There is also latest 2021 flaw https://thehackernews.com/2021/11/two-npm-packages-with-22-million-weekly.html
Abd there might be many others.
To prevent possible issues, always verify that you are installing package from verified owners.
To be more safe, you can integrate automated check which might find vulnerable dependencies.
After integration to your build process, if
nsp find vulnerable dependency (or it's version), it will intermediately stop your build! ..and you will be forced to remove risky package.
Extensions in Chrome are massively used. Did you ever thought that some of your extensions might contains some malicious code?
Answer might be yes, as already some popular extensions contained malware:
It's really hard to prevent these kind of attacks, but basic tip would be to not install many extensions which you not necessarily need - keep in mind that many extensions has access to whole websites you are browsing (Eg. internet banking, etc).
If you are developer, you need many extensions - many of those has access to whole content of websites. My advice is: Never use you browser for development (with dev extensions) for browsing web like email, bank, shops. Instead create different profile without dev extensions, or use another browser for general use.
I like to use Firefox for "safe browsing" & Chrome for development combination.
In popular Electron (NodeJs) framework is (was) critical flaw. It affects all apps written for Electron - like Spotify, Slack, Skype (new), VSCode, Atom, and more.
It's being fixed by apps pretty quickly, but still it's something what might cause security concerns.
More detail here https://thehackernews.com/2018/01/electron-js-hacking.html
Scary as it might sound, quote "It means that any website or server on the Internet that uses a popular Java logging software called log4j can be instantly hacked"
Those were found after many years used processor architecture. Attacker might read/modify another application through special set of processor instructions.
This affects milions of computers using Intel and AMD architecture.
Generally there is no special way how to protect yourself :o only to rely on verified software and vendors hotfixes which were applied pretty "quickly".
Use HTTPS everywhere.
If you are web developer, always use websites with valid SSL certificate. You can even get one for free from Let's encrypt.
Never trust websites without certificate.
Firefox even displays error note if website allows write text to fields, but website doesn't have certificate active.
Without SSL (https), you are sending data without any encryption, so potentially everyone can read you communication.
Some unicode characters looks similar and this open large attack vector, and easy way to trick even advanced users.
Prevention - Disable unicode "punycode" addresses: Firefox:
about:config -> network.IDN_show_punycode as true.
There is very easy way how to pretend to be someone else when using emails. Quite powerful method for protecting against this (spoofing) is to check DKIM.
For Thunderbird there is good addon: https://addons.thunderbird.net/en-US/thunderbird/addon/dkim-verifier/
Use two step verification whenever you can.
Most of services and websites already allow to setup two step verification with SMS, or Google Authenticator (or other similar).
Note that Google Authenticator is much safer than SMS. Once you setup new website, it's working completely offline. While SMS can be more easily "catch" - by sniffing GSM network, or with applications in your phone. Another very popular hack is SIM SWAP - read more about SIM SWAP technique here.
Never underestimate attackers, whenever you are on Mac, Windows or Linux, there are always people who want's your computer power or your data.
And if you learned even single new security tip from this article I will be happy! If you already know all, that's even better.