Showing posts with label Privacy. Show all posts
Showing posts with label Privacy. Show all posts

Tuesday, May 9, 2017

Millions of Android phones could be tracked with ultrasonic spying tool

Researchers discovered 234 Android apps that could be spying on users CREDIT: GOOGLE

Hundreds of Android apps could be covertly tracking users via inaudible sounds emitted by nearby devices, researchers have found. 
Researchers discovered technology that lets devices talk to one another for tracking purposes using ultrasonic tones on 234 Android apps
Televisions, billboards, websites and shops can emit the high frequency sounds, which can't be heard by humans but are picked up by the apps. This signals whether a person has engaged with an advert by watching it, or visited a shop, and how long for. 
Apps featuring the technology include those from McDonald's and Krispy Kreme. Major companies could be using it to track customers' location and habits, both on and off their mobile devices, without them knowing, the researchers warned.
"An adversary can monitor a user's local TV viewing habits, track their visited locations and deduce their other devices," said the researchers. "They can gain a detailed, comprehensive user profile with a regular mobile application and the device's microphone." 
The tracking method has spiked in popularity recently, according to the researchers. Two years ago just five apps in the Google Play store used the technology. Now, it is allegedly present in 234. 

As well as tracking customers' habits, the beacon technology can also be used to send them targeted adverts. Given that the tool can connect location and habits with the device, it could also be used to identify anonymous users, such as those of Bitcoin and Tor. 
The researchers from the Braunschweig University of Technology warned that millions of users could be under surveillance without knowing after they found that a sample of five of the 234 apps had been downloaded up to 11 million times. 
The majority of the apps don't alert users that they are tracking them. All they require to be able to follow users is permission to access the device's microphone. 
"The user just needs to install a regular mobile application that is listening to ultrasonic signals through the microphone in the background," said the researchers. "Once the user has installed these applications on their phone, they neither know when the microphone is activated nor are they able to see what information is sent to company servers."
Silverpush, the company that created the listening tool, denied that its technology was still being used. It stopped supporting the software in 2015 following a privacy outcry. 
"We respect customer privacy and would not want to build our business foundation where privacy was questionable," Hitesh Chawla, founder of Silverpush, told Ars Technica. "Even when we were live, our software was not present in more than 10 to 12 apps. So there is no chance that our presence in 234 apps is possible.
"Every time a new handset gets activated with our software, we get a ping on our server. We have not received any activation for six months now." 
Google said its privacy policy requires apps to disclose how they collect, use and share customer data. 
McDonald's said it did not use the technology in the UK for marketing purposes. Krispy Kreme has been contacted for comment. 

Tuesday, April 4, 2017

An internet security expert tells us the scariest thing about webcam hacking 😎 💻 🇷🇺 🇺🇸 #cybersecurity #privacy


Mikko Hypponen, a cyber security expert told Business Insider: "Once you gain access to somebody’s system it’s trivial to turn on the webcam and record whatever they’re doing, or to just turn on the microphone and record whatever is being spoken around the infected laptop.
"On some laptops, you can even do this so that the light next to your camera will not go on. The light which is supposed to tell you that I am recording might not tell you that it is recording."
Mikko also said that even though he is "quite certain" that his work laptop had not been breached, he covered his webcam with a "band aid" for "a little bit of extra certainty."

via BI


Monday, February 27, 2017

Uber, Ok Cupid and Fitbit password leaked by internet security firm

Uber, Ok Cupid and Fitbit password leaked by internet security firm

California internet security firm Cloudflare helps 6 million websites push their content around the internet. It suffered a bug that saw hundreds of thousands of webpages leaking personal data. ...
dailymail: 'Uber, Ok Cupid and Fitbit password leaked by internet security firm' → [Read details]

Are you at risk of being hacked? A security bug has leaked the passwords and private messages of MILLIONS of Uber, Ok Cupid and Fitbit users for months 

  • Bug in security firm's software led to leaked passwords and private messages
  • Hundreds of thousands of sites have been affected by the leak 
  • Cloudflare said that the bug has now been fixed and all exposed data secured
  • There is no sign yet that the leak had been exploited by hackers
Internet security firm Cloudflare has suffered a bug that saw hundreds of thousands of webpages leaking personal data such as passwords and personal messages.
The leak leaves millions at risk of being hacked or having their private conversations, including chats on dating websites, leaked across the web.
There is no sign yet that the prolonged leak, which lasted for months, was exploited by hackers, Cloudflare said. [Read details]

Thursday, February 23, 2017

Routers don't keep you safe from hackers


Many people assume that their router will keep them safe from hackers. It couldn't be further from the truth. There are a few things that routers offer, but they aren't enough.

Port blocking isn't enough because hackers can get in through other ports.

Unless you have an enterprise level router, the hardware is too weak to do much. 90% of people just have the router their ISP provides. It just doesn't have enough horsepower to do any meaningful analysis of traffic or any intelligent threat detection.

Routers have static security measures that are outdated the moment they leave the factory. Hackers are constantly updating their tactics. This is why CUJO has security features that are intelligent and adapt to new threats. CUJO is constantly learning and updating every second.

To use an analogy, your typical router protects you as much as having a nice white picket fence around your house. Don't have a false sense of security, get a guard dog like CUJO :)


Right now CUJO doing a limited time offer: you can get a CUJO with a $0 subscription for only $249. Click here to add it to your cart.

Monday, February 20, 2017

Wednesday, November 30, 2016

‘AVALANCHE’ NETWORK DISMANTLED IN INTERNATIONAL CYBER OPERATION

On 30 November 2016, after more than four years of investigation, the Public Prosecutor’s Office Verden and the Lüneburg Police (Germany) in close cooperation with the United States Attorney’s Office for the Western District of Pennsylvania, the Department of Justice and the FBIEuropolEurojust and global partners, dismantled an international criminal infrastructure platform known as ‘Avalanche’.
The Avalanche network was used as a delivery platform to launch and manage mass global malware attacks and money mule recruiting campaigns. It has caused an estimated EUR 6 million in damages in concentrated cyberattacks on online banking systems in Germany alone. In addition, the monetary losses associated with malware attacks conducted over the Avalanche network are estimated to be in the hundreds of millions of euros worldwide, although exact calculations are difficult due to the high number of malware families managed through the platform.
The global effort to take down this network involved the crucial support of prosecutors and investigators from 30 countries. As a result, 5 individuals were arrested, 37 premises were searched, and 39 servers were seized. Victims of malware infections were identified in over 180 countries. Also, 221 servers were put offline through abuse notifications sent to the hosting providers. The operation marks the largest-ever use of sinkholing[1] to combat botnet[2] infrastructures and is unprecedented in its scale, with over 800 000 domains seized, sinkholed or blocked.
On the action day, Europol hosted a command post at its headquarters in The Hague. From there, representatives of the involved countries worked together with Europol’s European Cybercrime Centre (EC3) and Eurojust officials to ensure the success of such a large-scale operation.
In addition Europol supported the German authorities throughout the entire investigation by assisting with the identification of the suspects and the exchange of information with other law enforcement authorities. Europol’s cybercrime experts produced and delivered analytical products.
Eurojust’s Seconded National Expert for Cybercrime assisted by clarifying difficult legal issues that arose during the course of the investigation. Several operational and coordination meetings were also held at both Europol and Eurojust.
Julian King, European Commissioner for the Security Union, said: "Avalanche shows that we can only be successful in combating cybercrime when we work closely together, across sectors and across borders. Cybersecurity and law enforcement authorities need to work hand in hand with the private sector to tackle continuously evolving criminal methods.  The EU helps by ensuring that the right legal frameworks are in place to enable such cooperation on a daily basis".
Rob Wainwright, Europol Director, said: “Avalanche has been a highly significant operation involving international law enforcement, prosecutors and industry resources to tackle the global nature of cybercrime. The complex trans-national nature of cyber investigations requires international cooperation between public and private organisations at an unprecedented level to successfully impact on top-level cybercriminals. Avalanche has shown that through this cooperation we can collectively make the internet a safer place for our businesses and citizens”.
Michèle Coninsx, President of Eurojust, said: “Today marks a significant moment in the fight against serious organised cybercrime, and exemplifies the practical and strategic importance of Eurojust in fostering international cooperation. Together with the German and US authorities, our EU and international partners, and with support from Eurojust and EC3, Avalanche, one of the world’s largest and most malicious botnet infrastructures, has been decisively neutralised in one of the biggest takedowns to date.”
The criminal groups have been using the Avalanche infrastructure since 2009 for conducting malware, phishing and spam activities. They sent more than 1 million e-mails with damaging attachments or links every week to unsuspecting victims.
The investigations commenced in 2012 in Germany, after an encryption ransomware[3] (the so-called Windows Encryption Trojan), infected a substantial number of computer systems, blocking users’ access. Millions of private and business computer systems were also infected with malware, enabling the criminals operating the network to harvest bank and e-mail passwords.
With this information, the criminals were able to perform bank transfers from the victims’ accounts. The proceeds were then redirected to the criminals through a similar double fast flux[4]infrastructure, which was specifically created to secure the proceeds of the criminal activity.
The loss of some of the network’s components was avoided with the help of its sophisticated infrastructure, by redistributing the tasks of disrupted components to still-active computer servers. The Avalanche network was estimated to involve as many as 500,000 infected computers worldwide on a daily basis.
What made the ’Avalanche’ infrastructure special was the use of the so-called double fast flux technique. The complex setup of the Avalanche network was popular amongst cybercriminals, because of the double fast flux technique offering enhanced resilience to takedowns and law enforcement action.
Malware campaigns that were distributed through this network include around 20 different malware families such as goznym, marcher, matsnu, urlzone, xswkit, and pandabanker. The money mule schemes operating over Avalanche involved highly organised networks of “mules” that purchased goods with stolen funds, enabling cyber-criminals to launder the money they acquired through the malware attacks or other illegal means.
In preparation for this joint action, the German Federal Office for Information Security (BSI) and the Fraunhofer-Institut für Kommunikation, Informationsverarbeitung und Ergonomie (FKIE) analysed over 130 TB of captured data and identified the server structure of the botnet, allowing for the shut-down of thousands of servers and, effectively, the collapse of the entire criminal network.
The successful takedown of this server infrastructure was supported by INTERPOL, the Shadowserver FoundationRegistrar of Last ResortICANN and domain registries involved in the takedown phase. INTERPOL has also facilitated the cooperation with domain registries. Several antivirus partners provided support concerning victim remediation.
Computer users should note that this law enforcement action will NOT clean malware off any infected computers – it will merely deny the Avalanche users’ ability to communicate with infected victims’ computers. Avalanche victims’ computers will still be infected, but shielded from criminal control.
Victims of malware operating over the Avalanche network may use the following webpages created for assistance in removing the malware:
The Shadowserver Foundation have supported this operation and will be making the sinkhole data available globally to responsible bodies via their free daily remediation feeds. More information can be found in their blog article.
[1] Sinkholing is an action whereby traffic between infected computers and a criminal infrastructure is redirected to servers controlled by law enforcement authorities and/or an IT security company. This may be done by assuming control of the domains used by the criminals or IP addresses. When employed at a 100% scale, infected computers can no longer reach the criminal command and control computer systems and so criminals can no longer control the infected computers. The sinkholing infrastructure captures victims’ IP addresses, which can subsequently be used for notification and follow-up through dissemination to National CERTs and Network Owners.
[2] Botnets are networks of computers infected with malware, which are under the control of a cybercriminal. Botnets allow criminals to harvest sensitive information from infected computers, such as online banking credentials and credit card information. A criminal can also use a botnet to perform cyberattacks on other computer systems, such as denial-of-service attacks.
[3] Ransomware is a type of malware that infects the victim’s PC and encrypts the victim’s files, so that the victim is unable to access them. The criminal behind the ransomware then uses intimidation and misinformation to force the victim to pay a sum of money in exchange for the password that unlocks the encrypted files. Even if a password is eventually provided, it does not always work.
[4] Fast flux technique is an evasion technique used by botnet operators to quickly move a fully qualified domain name (a domain that points to one specific Internet resource such as www. domain .com) from one or more computers connected to the Internet to a different set of computers. Its aim is to delay or evade the detection of criminal infrastructure. In the double fast flux setup, both the domain location and the name server queried for this location are changed.

Friday, June 10, 2016

EnGenius' SOHO wireless router

Create your own wireless network with the EnGenius' SOHO wireless router. EnGenius ESR Series will provide you with a low-cost high powered Wi-Fi router that will extends your network's wireless range. Connect the ESR Series to any broadband modem and wirelessly share your high-speed Internet connection. Enjoy surfing the web, checking e-mail, and chatting with family and friends online. Reach the places your previous router would not go with EnGenius ESR Series high powered radio and extended range coverage.

Parents can also use EnShare to remotely monitor Cloud Router usage or disconnect devices connected to the IoT Cloud Router whenever they're away from home via an Internet connection.

Learn more >>>


EnGenius ESR350 802.11b/g/n Router with 4 ...
The ESR350 is a 2.4 GHz Wireless N300 IoT Cloud Router with a 4-Port Gigabit Ethernet s... [More]
Price: $81.99
Buy Now

The ESR350 is a 2.4 GHz Wireless N300 IoT Cloud Router with a 4-Port Gigabit Ethernet switch, Gigabit Ethernet WAN port and USB port. With the free EnShareT app, families can use their Apple iPhones, iPads or Android-based tablets or smartphones to transfer video, music and other files to and from a router-attached USB hard drive when they are in the home or when they are away from home.

Features:
  • ESR350 2.4GHz Wireless-N 802.11b/g/n router with 4 port GigE switch.
  • Broadband Frequency Band: 2.4 GHz
  • Data Rate: 300 Mbit/s
  • Frequency Range: 2.412-2.472 GHz
  • WiFi Deployment Type: Standalone / Controller-Based
  • WiFi Standard: 802.11b / 802.11g / 802.11n
  • WiFi Security: WEP / WPA / WPA2
  • Environment: Indoor
  • Temperature Range: 0-40 deg C
  • Data Connectors: 1x Gigabit WAN Port, 4x Gigabit LAN Ports, 1x USB 2.0 Port
  • Power Supply: DC IN, 12V 1.5A
  • Mfg. Warranty: 1 Year

Wednesday, May 11, 2016

7 Important Simple Steps to Protect Your Home


1. Set Strong Passwords
Often times we use basic passwords like Admin or 1234. It takes mere milliseconds to hack such passwords. Use passwords that are at least 12 characters long, have upper & lower case letters, contain symbols and numbers. It will take more than a year to decrypt your new password. Start with changing your computer and router passwords. And change them frequently, at least four times a year.
2. Protect Your Router
Your router is arguably the most vulnerable connected device in your home. If hackers take over the router, they will collect information about you without alerting your anti-virus and anti-malware software. The best way to protect your router is to update your router’s firmware (software) at least quarterly, to set a strong password for the admin console of your router (as described above), and to use a WPA2 network password (the password that you use to connect to your wireless network. 

Here’s a basic guide for Linksys routers (google ‘change router WPA2 password’ for your own brand of routers or call your internet provider): http://www.linksys.com/us/support-article?articleNum=139152

If you have trouble with this step, reply to our email and we will try to help.
3. Use a Secure Browser
Mainstream browsers like Internet Explorer or most often targeted by hackers because of their popularity and reach. Enjoy a much more secure browsing experience with the Tor browser (see https://www.torproject.org). If you want to stick with mainstream browsers, we suggest using Chrome as the safest alternative.
4. Anti-virus is Not Enough
Anti-virus protects you only against the most basic of threats. Install free anti-malware software by Malwarebytes. Make sure to set it so that it runs and updates automatically multiple times a week.
5. Disconnect When Not in Use
Disconnect devices when not in use. This especially applies to baby monitors and other home cameras. Simply unplug them from their power or Internet source. Hackers can take over cameras and record videos or pictures when you least expect. They will even disable the light that indicates when the camera is on. You should never disconnect devices that provide physical home security such as your security cameras.
6. Public Internet Networks
Our credit card security and privacy is most vulnerable when we connect to ‘guest’ networks in public spaces such as coffee shops. We strongly urge you not to enter credit card data or other private information when connected to such networks. Also, don’t log into your bank accounts from such networks.
7. Download our eBOOK
By applying our suggestions above, you will take a strong step towards keeping your home and your information secure. For extended tips, read our eBook here.

Friday, October 16, 2015

iOS still does app privacy better than Android

There's not a lot new in Android 6.0 Marshmallow, which is now slowly making its way onto Android smartphones and tablets. Google characterizes Marshmallow more as an under-the-hood effort to improve system performance and stability. But one of the key new features for users is the ability to manage the privacy settings of applications.
How do Marshmallow's privacy controls compare to iOS's?
For several versions, Android has shown users what data and services an app wants to use when the app is installed, but you could only accept or reject them all. Also, you could not deactivate permissions (such as to your contacts or camera) later.
There's not a lot new in Android 6.0 Marshmallow, which is now slowly making its way onto Android smartphones and tablets. Google characterizes Marshmallow more as an under-the-hood effort to improve system performance and stability. But one of the key new features for users is the ability to manage the privacy settings of applications.
How do Marshmallow's privacy controls compare to iOS's?
For several versions, Android has shown users what data and services an app wants to use when the app is installed, but you could only accept or reject them all. Also, you could not deactivate permissions (such as to your contacts or camera) later.
If you want to see all the apps that use a specific type of data or resource, here's how: In the Settings app, tap App, then tap the Settings icon (the gear) to open the Configure Apps screen. Normally, you use the More menu (via the ... icon) in Android for accessing additional features, but in this case you use Settings. In the Configure Apps screen, tap App Permissions to get a screen that shows each permission. Tap a permission, as you would in iOS's equivalent but more accessible screen, to see and manage which apps use those permissions. It shouldn't be that hard to find.
Of course, a diligent user will eventually find that obtuse path or go into each app's settings in Android Marshmallow and check into every permission. (iOS lets you work that way too; if you tap an app in Settings, you can see its privacy permissions and adjust them.) But Android's approach is also more apt to let apps get more access to your private data and system services than you'd like or realize.

Thursday, October 20, 2011

iPhone spyware can snoop on desktop typing


A team of researchers at Georgia Tech have demonstrated how they were able to spy on what was typed on a regular desktop computer's keyboard via the accelerometers of a smartphone placed nearby.
iPhone and keyboard
Normally when security researchers describe spyware on smartphones, they mean malicious code that can be used to snoop on calls, or to steal the data held on mobile phones.
In this case, however, researchers have described how they have put software on smartphones to spy on activity *outside* the phone itself - specifically to track what a user might be doing on a regular desktop keyboard nearby.
It sounds like the stuff of James Bond, but the researchers paint a scenario where a criminal could plant a smartphone on the desk close to their target's keyboard and use specialist software to analyse vibrations and snoop on what was being typed.
It's a quite beautiful twist on how bad guys could use microphones to "hear" keystrokes and spy on your passwords.
Patrick TraynorPatrick Traynor, an assistant professor in Georgia Tech's School of Computer Science, admits that the technique is difficult to accomplish reliably but claims that the accelerometers built into modern smartphones can sense keyboard vibrations and decipher complete sentences with up to 80% accuracy.
"We first tried our experiments with an iPhone 3GS, and the results were difficult to read," said Traynor. "But then we tried an iPhone 4, which has an added gyroscope to clean up the accelerometer noise, and the results were much better. We believe that most smartphones made in the past two years are sophisticated enough to launch this attack."
Indeed, a photograph of the researcher shows him posing with what appears to be an Android smartphone.
Keyboard vibrations
What's quite interesting to those of a geeky mindset is the technique adopted by the university researchers to build up their cache of stolen data. It turns out that is largely based on probability.
Presently the spyware cannot determine the pressing of individual keys through the iPhone's accelerometer, but "pairs of keystrokes" instead. The software determines whether the keys are on the right or left hand side of a standard QWERTY keyboard, and then whether the pair of keys are close together or far apart.
With the characteristics of each pair of keystrokes collected, it compares the results against a dictionary - where each word has been assigned similar measurements.
For example, take the word "canoe," which when typed breaks down into four keystroke pairs: "C-A, A-N, N-O and O-E." Those pairs then translate into the detection system’s code as follows: Left-Left-Near, Left-Right-Far, Right-Right-Far and Right-Left-Far, or LLN-LRF-RRF-RLF. This code is then compared to the preloaded dictionary and yields "canoe" as the statistically probable typed word.
For understandable reasons, the technique is said to only work reliably on words which have three or more letters.
Text recovery
Henry Carter, one of the study's co-authors, explained the attack scenario that they envisaged could be used:
"The way we see this attack working is that you, the phone’s owner, would request or be asked to download an innocuous-looking application, which doesn’t ask you for the use of any suspicious phone sensors."
"Then the keyboard-detection malware is turned on, and the next time you place your phone next to the keyboard and start typing, it starts listening."
It's an interesting piece of research, but I have to wonder how effective it would be in the real world.
KeyboardFor instance, hackers often want to steal passwords from individuals. If the computer users is following sensible security practice and is *not* using a dictionary word for their password then it's hard to imagine that the technique in its current form would be able to determine what the password is.
And an 80% accuracy rate falls some way short of what most criminals would want.
I'm also curious as to how well the system would work when trying to steal numerical information - such as account numbers, credit card data or social security numbers. The dictionary wouldn't be any help against them, and the placement of numerical keys (either along the top row of the keyboard or tightly fit on a numeric keypad) would make discrimination very difficult I suspect.
The study's authors also determined that because the smartphone had to be within a range of just three inches from the keyboard, phone users who left their phones in their pockets or purses, or simply moved them further from the keyboard would be well defended.
The researchers admitted that the likelihood of an attack of this nature "right now is pretty low", and I'm not planning to lose any sleep over the threat. Nevertheless, if you manage to get the chance do take some time to read the paper: "(sp)iPhone: Decoding Vibrations From Nearby Keyboards Using Mobile Phone Accelerometers".

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes