Wednesday, December 7, 2016

"Spy Toys" that use voice recognition tech to “listen” to the kids that play with them..

These particular toys — basically a “girl” and “boy” theme on the same core idea — both use voice recognition tech to “listen” to the kids that play with them.
They connect via Bluetooth to a mobile phone app, usually belonging to a parent, and then from there access the internet in order to interact with kids and answer their questions. To accomplish that feat, the apps record and collect conversations between the toys and the kids, and use speech-to-text protocols to turn kids’ questions into searchable queries. 
View Video below.




Friday, November 25, 2016

Delete yourself from the internet by pressing this button..

The internet can be a beautiful and horrible place at the same time, and it isn’t weird to sometimes feel like you want to leave — there’s wasn’t an easy way out, until now.
Swedish developers Wille Dahlbo and Linus Unneb├Ąck created Deseat.me, which offers a way to wipe your entire existence off the internet in a few clicks.
When logging into the website with a Google account it scans for apps and services you’ve created an account for, and creates a list of them with easy delete links.

Tuesday, November 22, 2016

Hack the Army: US military begs white hats to sweep it for bugs..

Security experts reckon the US government’s newly unveiled "Hack the Army" bug bounty programme may usher in greater co-operation across the whole arena of security research.

The US Army will offer cash rewards to hackers who find vulnerabilities in selected, public-facing Army websites under the scheme, which builds on the US military’s previous "Hack the Pentagon" programme.

The Hack the Pentagon programme gave security researchers the chance to earn money by finding bugs on static websites that “weren't operationally significant as targets”. Hack the Army goes one step further by inviting security researchers to look for flaws in websites that offer dynamic exchanges of personal identifiable information, sites considered central to the Army's recruiting mission.

Chris Lynch, the US Department of Defense's head of Digital Service, said: ”Hack the Army [will show] that bringing in creative hackers from a wide variety of backgrounds can fundamentally improve the way we protect our soldiers and secure our systems."

New Malware Turns Headphones into Makeshift Microphones to Record Your Conversations

Mark Zuckerberg made headlines earlier this year for tapping his webcam and microphone. While he forgot the security 101 of not reusing old passwords, the Facebook CEO was definitely paranoid of someone trying to spy on him more than someone hacking his LinkedIn or Pinterest accounts.
Spying makes everyone uncomfortable. Are those so-called IoT devices really surveilling on you? Should you tape up your webcam and microphone slot? The paranoia would see no end because there’s no end to the lengths an attacker could go to spy on their targets. Now, a group of Israeli researchers at Ben Gurion University have given us yet another reason to freak out with malware that converts your headphones into microphones that can record your conversations.
Researchers demonstrated the hack in a video, using a malware they are calling “Speak(a)r” to hijack a computer to record audio, even when the target device’s microphone has been disabled or entirely removed. This malware tweaks the speakers in the earbuds to turn them into makeshift microphones, covertly listening to you.

Friday, November 18, 2016

Spray-on conductive concrete will shield us from EMP attacks..

You don't have to build that Faraday cage after all.

While the threat of an EMP attack knocking out electronics and sending the world into an apocalyptic spiral seems far off, it's good to know that someone is working to protect us from it anyway. University of Nebraska engineers Christopher Tuan and Lim Nguyen have successfully created a cost-effective concrete mix that acts as a shield against "intense pulses of electromagnetic energy" and protects any electronic devices inside.

The EMP-proof concrete has actually been adapted from Tuan and Nguyen's previous -- and slightly more pedestrian -- breakthrough: self-warming concrete that can melt ice and snow with a safe, low-level electrical current. The pair was originally working on a way to build safer roads and bridges when they realized their new concrete could also block electromagnetic energy.

Thursday, November 17, 2016

Secret Back Door in Some U.S. Phones Sent Data to China..

Security contractors recently discovered preinstalled software in some Android phones that monitors where users go, whom they talk to and what they write in text messages.

WASHINGTON — For about $50, you can get a smartphone with a high-definition display, fast data service and, according to security contractors, a secret feature: a backdoor that sends all your text messages to China every 72 hours.

Security contractors recently discovered preinstalled software in some Android phones that monitors where users go, whom they talk to and what they write in text messages. The American authorities say it is not clear whether this represents secretive data mining for advertising purposes or a Chinese government effort to collect intelligence.

International customers and users of disposable or prepaid phones are the people most affected by the software. But the scope is unclear. The Chinese company that wrote the software, Shanghai Adups Technology Company, says its code runs on more than 700 million phones, cars and other smart devices. One American phone manufacturer, BLU Products, said that 120,000 of its phones had been affected and that it had updated the software to eliminate the feature.

Tuesday, November 8, 2016

The Democratic National Committee Has Told the FBI It Found Evidence Its HQ Was Bugged

In an episode reminiscent of Watergate, the Democratic Party recently informed the FBI that it had collected evidence suggesting its Washington headquarters had been bugged, according to two Democratic National Committee officials who asked not to be named.
In September, according to these sources, the DNC hired a firm to conduct an electronic sweep of its offices. After Russian hackers had penetrated its email system and those of other Democratic targets, DNC officials believed it was prudent to scrutinize their offices. This examination found nothing unusual.
In late October, after conservative activist James O'Keefe released a new set of hidden-camera videos targeting Democrats, interim party chairwoman Donna Brazile ordered up another sweep. There was a concern that Republican foes might have infiltrated the DNC offices, where volunteers were reporting to work on phone banks and other election activities. (For some of their actions, O'Keefe and his crew have used people posing as volunteers to gain access to Democratic outfits.)