Tagged: through Toggle Comment Threads | Keyboard Shortcuts

  • jkabtech 12:17 pm on February 3, 2018 Permalink | Reply
    Tags: , Secretly, , through   

    How to Stop iOS Apps From Secretly Spying Through Your Camera 

    Patrick Lucas AustinYesterday 4:30pmFiled to: iOSiOS 11Digital PhotographyPrivacydata security142EditSend to EditorsPromoteShare to KinjaToggle Conversation toolsGo to permalink

    View the Original article

  • jkabtech 12:17 pm on October 25, 2017 Permalink | Reply
    Tags: , , , , through   

    Malware spreading through Facebook Messenger 

    Don’t click on links.

    A new advanced malware is spreading via Facebook’s Messenger app, researchers have warned.

    Kaspersky Labs researcher David Jacoby came across the malware after a Facebook friend sent him a link to a purported video file in Messenger. The link, when clicked, triggered the infection via a Google Docs file.

    The Google Docs file is a fake video that redirects users to several websites that extract information such as operating system and web browser type.

    Moving users through a set of websites allows the malware writers to plant tracking cookies on web browsers to monitor victims’ activity, and display ads.

    Jacoby said the malware works across Windows and macOS, and is independent of browser type.

    The malware also attemps to download more files, although Jacoby noted that they were adware and not malicious code like Trojans and exploits.

    It is unclear how the malware spreads via Messenger. Jacoby speculated it could be through stolen user credentials, browser hijacking or clickjacking. He is conducting further research to find the dissemination vector.

    Users are advised not to click on random links from Facebook friends in Messenger.

    View the Original article

  • jkabtech 12:17 pm on August 3, 2017 Permalink | Reply
    Tags: Bench, , Circuit, through, Workout   

    Blast Through a Circuit Workout With Just a City Bench 

    Beth SkwareckiYesterday 11:30amFiled to: lunch break workoutworkoutsfitnessexercisestrengthstrength trainingcircuit traininghiit11EditPromoteShare to KinjaToggle Conversation toolsGo to permalink

    Today’s lunch break workout is a perfect one to take outside. After a no-equipment warmup, you’ll do two circuits of strength exercises, and two 30-second cardio bursts, with no more equipment than a sturdy bench.

    You can do the same workout indoors, of course

    View the Original article

  • jkabtech 10:17 pm on July 12, 2017 Permalink | Reply
    Tags: , , , , , nabbed, through, Tudge   

    Medicare cards likely nabbed through access compromise: Tudge 

    Confidential briefing given to peak doctors body.

    The anonymous vendor selling Medicare card data on the dark web likely obtained the details through a compromise of legitimate access credentials, Human Services minister Alan Tudge has indicated.

    The Guardian yesterday revealed that an unknown individual was offering any Australian’s Medicare card data for around A$29 per file, once the target’s full name and date of birth are provided.

    The vendor claims to have exploited a “vulnerability

    View the Original article

  • jkabtech 4:46 am on June 22, 2016 Permalink | Reply
    Tags: , fraud:, , sought, , through, wire-transfer   

    Hackers sought to steal over $3 billion through wire-transfer fraud: FBI 

    Getty Images

    Hackers have sought to steal more than $3 billion from businesses in a pernicious, fast-growing type of scam in which criminals impersonate company executives in emails ordering large wire transfers, the Federal Bureau of Investigation warned on Tuesday.

    The FBI disclosed the data as it launched a public awareness campaign providing tips on how to defend against such scams. The cases, which are widely known as business email compromise, target businesses and not consumers.

    U.S. and foreign victims reported 22,143 cases involving business email compromise cases in which cyber criminals sent requests for some $3.1 billion in fraudulent transfers from October 2013 through last month, according to the FBI. That represents a significant increase from the agency’s previous tally, which put attempted losses at $2.3 billion through February of this year.

    Supervisory Special Agent Mitchell Thompson said victims should notify the FBI immediately if they find they have been victimized in such scams, so the bureau can work with agents overseas to ask foreign banks to freeze the funds before fraudsters pull them out of the banking system.

    “The sooner somebody reports this to the FBI, the better the possibility they can get their money back,” he said at a news conference in New York.

    The bulk of the cases involved requests to transfer funds to banks in Hong Kong and China, though a total of 79 countries have been identified to date, according to the bureau.

    Thompson said he could not say how much money victims actually lost through the schemes, but said about one in four U.S. victims respond by wiring money to fraudsters.

    The FBI said the sharp jump in cases since its last tally was due to the high level of recent activity, as well as an effort by law enforcement agencies around the world to identify such scams as business email compromise, rather than generic wire fraud.

    The FBI said it has seen a 1,300 percent increase in identified exposed losses since January 2015.
    The size of the losses vary widely from case to case, from about $10,000 to tens of millions of dollars, according to Thompson.

    Austrian aircraft parts FACC said in January that it lost about 50 million euros ($55 million) through such a scam.

    SHOW COMMENTSPlease add a username to view or add commentsPublic Username for Commenting

    JOIN THE DISCUSSIONTo learn more about how we use your information, please read ourPrivacy Policy and Terms of Service.

    View the Original article

  • jkabtech 1:21 am on April 29, 2016 Permalink | Reply
    Tags: , , , moving, through,   

    How $80B moving through NY Fed daily could be vulnerable to hackers 

    Steve Liesman 6 Hours AgoCNBC.comSHARES

    The Federal Reserve Bank of New York, in its first extensive remarks on cybersecurity following the theft of $81 million from accounts it held for the central bank of Bangladesh, said the incident is a “wake-up call” for the global financial system and the Fed is taking the issue “very seriously.”

    However, a senior New York Federal Reserve official said in an interview with CNBC that the central bank has no authority to inspect or oversee the cybersecurity precautions at foreign central banks that keep their assets at the New York Fed. That means there can be varying cybersecurity risk levels around the world for transactions between global central banks and the New York Fed.

    The New York Fed stands at the center of the globalized, dollar-denominated world, maintaining as many as 250 accounts for central banks that contain approximately $3 trillion in assets. One of the reasons those funds are concentrated in New York is that the United States is seen as among the safest places in the world for central bankers looking to protect assets. At the same time, that massive pool of money represents a rich and tempting target for international thieves and their growing attempts at cybertheft.

    View the Original article

  • jkabtech 1:54 pm on March 6, 2016 Permalink | Reply
    Tags: , , strangers, through,   

    Spying through strangers’ webcams just got easier 

    Thursday, 28 Jan 2016 | 11:19 AM ETCNBC.com

    Spying on strangers through their own webcams is now easier than ever.

    Shodan — a company that describes itself as a search engine for Internet-connected devices — launched a tool last year that lets users access publicly available webcams all over the world. Recently, the company added freeze-framed images from those webcams, making browsing through people’s public and private lives as easy as clicking through a Netflix catalog.

    An American toddler in daycare? Check. Sleeping couch potato in Hong Kong? You got it. Or perhaps you’re into a specific street corner in Guangzhou China? Plus who knows what else. Full access to over 1,000 webcams — pointed at public and private spaces around the world — requires a one-time membership fee of $49.

    Of course, tech-savvy spies have always been able to tap into unsecured webcams or hack into poorly protected devices, but the new feature on Shodan makes it easier than ever for anyone to browse a library of webcams that have not been password protected.

    “Shodan has started to grab screenshots for various services where the existing text information didn’t provide much information,” founder John Matherly wrote in an email. “This was launched in August 2015 and the various sources for screenshots have expanded since then — one of those recent additions is for webcams.”

    The websites Shodan shows unsecured web cam feeds that you can watch in your area. The websites Shodan shows unsecured web cam feeds that you can watch in your area.

    Matherly calls Shodan the first search engine for the Internet of Things, pulling in data from anything connected to the Web. The site has been used for, among other things, studying the popularity of HBO Go on Roku and producing a global map of industrial control systems, Matherly said. Shodan’s home page touts the service as “the search engine for power plants, refrigerators and webcams,” among other things.

    Matherly was quick to point out that the company is not specifically focused on webcams. “Shodan wants to provide a complete view of the Internet which includes control systems, printers, servers, databases, tea kettles and of course webcams,” he wrote.

    Still, the three most popular searches listed on its website are ‘Webcam,’ ‘Cams’ and ‘Netcam.’

    The site’s capability is fascinating — and potentially disturbing. But, creepiness aside, are there actual risks associated with, say, someone in a remote location tuning in to a baby monitor?

    “When you think about the real-world risks, you have to reach pretty far to find something that would be genuinely bad,” said Anton Chuvakin, security and risk management researcher at Gartner. He noted that while it may be possible to find the neighborhood in which a webcam is located, it is very unlikely that the Internet Protocol address could reveal an actual house.

    “Basic geographic information is available for almost all devices on Shodan, including webcams,” wrote Matherly. “Note that the granularity of the physical location is extremely rough: it can tell you in which city/country it is located but it isn’t possible to pinpoint the exact physical location.”

    However, each webcam screenshot is paired with a map, and in rural areas where there are fewer houses, it doesn’t seem like it would be hard to find an actual location.

    Shodan allows you watch unsecured web cam feeds. Here a woman in Hong Kong is asleep on her couch. Shodan allows you watch unsecured web cam feeds. Here a woman in Hong Kong is asleep on her couch.

    Of course, hackers don’t need Shodan to access unprotected webcams, or hack into poorly protected devices. But when It comes cyberstalkers using information gathered this way for malicious purposes, such as extorting victims for money, Chuvakin believes such schemes are of extremely limited use.

    “You have to — presumably — hack into a lot of PCs and figure out where there are naked people. It’s a project, and there are so many better ways to make money if you’re a cybercriminal.” he said.

    As always, the solution to protecting your webcam from being viewed by unwelcome eyes is password protection of your devices — in this case your router. “People never change their router’s wireless password — it’s a rarity,” said Trend Micro chief cybersecurity officer Tom Kellermann. “Change that, because that’s the gate-keeper to everything that connects to your home network.”

    Chuvakin agreed: “Don’t use standard passwords that come with the router.”

    Read MoreWe’re investing big in cybersecurity: Cisco

    Right now, nothing is forcing device makers to improve built-in security, which ought to change, said experts. For example, the FTC could mandate that webcam makers ship cameras that require users to set their own login credentials, rather than allowing default usernames and passwords to be applied.

    “Can the regulator make the good thing easier and the wrong — risky thing — harder? If yes, then sure, that’s good regulation,” said Chuvakin.

    “When it comes to IoT, the FTC needs to get involved immediately,” said Kellermann. “To protect the physical privacy of consumers, because these devices can be used to violate the physical privacy of consumers, there needs to be greater assurances on the software, easier update functionalities and greater security provided.”

    The FTC did not respond to request for comment. The agency did issue a report on Wednesday calling on companies to adopt best practices to address consumer privacy and security risks.

    “The only way for the Internet of Things to reach its full potential for innovation is with the trust of American consumers,” said FTC Chairwoman Edith Ramirez. “We believe that by adopting the best practices we’ve laid out, businesses will be better able to provide consumers the protections they want and allow the benefits of the Internet of Things to be fully realized.”

    Harriet Taylor SHOW COMMENTS Please add a username to view or add commentsPublic Username for Commenting

    View the original article here

Compose new post
Next post/Next comment
Previous post/Previous comment
Show/Hide comments
Go to top
Go to login
Show/Hide help
shift + esc
%d bloggers like this: