Thursday, March 21, 2019

Hundreds of motel guests were secretly filmed and live-streamed online..

About 1,600 people have been secretly filmed in motel rooms in South Korea, with the footage live-streamed online for paying customers to watch, police said Wednesday.
Two men have been arrested and another pair investigated in connection with the scandal, which involved 42 rooms in 30 accommodations in 10 cities around the country. Police said there was no indication the businesses were complicit in the scheme.

In South Korea, small hotels of the type involved in this case are generally referred to as motels or inns. Cameras were hidden inside digital TV boxes, wall sockets and hairdryer holders and the footage was streamed online, the Cyber Investigation Department at the National Police Agency said in a statement.

Saturday, February 16, 2019

USB Cable Allows Remote Attacks over WiFi


*Note, ComSec's Cyber TSCM Inspection, Utilizing the "ORIUS WIFI" analyzer would reveal this threat within seconds. Contact us, we can help. J.D.L.~


Like a scene from a James Bond or Mission Impossible movie, a new offensive USB cable plugged into a computer could allow attackers to execute commands over WiFi as if they were using the computer's keyboard.

When plugged into a Linux, Mac, or Windows computer, this cable is detected by the operating system as a HID or human interface device. As HID devices are considered input devices by an operating system, they can be used to input commands as if they are being typed on a keyboard.

Created by security researcher Mike Grover, who goes by the alias _MG_, the cable includes an integrated WiFi PCB that was created by the researcher. This WiFi chip allows an attacker to connect to the cable remotely to execute command on the computer or manipulate the mouse cursor.

Thursday, January 31, 2019

New security flaw impacts 5G, 4G, and 3G telephony protocols

Researchers have reported their findings and fixes should be deployed by the end of 2019.
A new vulnerability has been discovered in the upcoming 5G cellular mobile communications protocol. Researchers have described this new flaw as more severe than any of the previous vulnerabilities that affected the 3G and 4G standards.

Further, besides 5G, this new vulnerability also impacts the older 3G and 4G protocols, providing surveillance tech vendors with a new flaw they can abuse to create next-gen IMSI-catchers that work across all modern telephony protocols.This new vulnerability has been detailed in a research paper named "New Privacy Threat on 3G, 4G, and Upcoming5G AKA Protocols," published last year.According to researchers, the vulnerability impacts AKA, which stands for Authentication and Key Agreement, a protocol that provides authentication between a user's phone and the cellular networks.

Wednesday, January 30, 2019

Apple ‘knew FaceTime could let people spy on you a WEEK before telling us..

APPLE was reportedly told that its FaceTime app could let strangers spy on you more than a week and a half ago.
This will come as a shock to many iPhone owners, as Apple only confirmed the bug's existence late on Monday, January 28.

It comes as security experts revealed this morning that an Apple iCloud bug let anyone read your private iPhone notes.

The Face Time bug meant that anyone could call your FaceTime and listen in through your microphone, without you ever accepting the call.

In some cases, it was even possible to secure a live video feed of the victim – without their knowledge or consent.

Apple has temporarily disabled Group FaceTime while it prepares a "fix" this week, but the company supposedly knew about the bug days prior to the 9to5mac reveal.

According to the New York Times, 14-year-old Grant Thomas, from Arizona, discovered the bug on January 19. The teen found that he could use FaceTime video chats to eavesdrop on his friend's phone before his friend had answered the call.

His mother Michele reportedly sent a video of the hack to Apple the very next day, warning over a "major security flaw".

Tuesday, September 25, 2018

Spray-on antennas unlock communication of the future

Hear the word “antenna” and you might think about rabbit ears on the top of an old TV or the wire that picks up radio signals for a car. But an antenna can be much smaller – even invisible. No matter its shape or size, an antenna is crucial for communication, transmitting and receiving radio signals between devices. As portable electronics become increasingly common, antennas must, too.
Wearable monitors, flexible smart clothes, industrial sensors and medical sensors will be much more effective if their antennas are lightweight and flexible – and possibly even transparent. We and our collaborators have developed a type of material that offers many more options for connecting antennas to devices – including spray-painting them on walls or clothes.
Our materials science lab focuses on nanomaterials, which are more than 100,000 times thinner than a human hair. In 2011, researchers in the Drexel University Materials Science and Engineering Department developed a way to combine metals with carbon or nitrogen atoms to create a material that’s a few atoms thick, very strong and good at conducting electricity. We call these materials MXenes (pronounced “maksens”), and we can make them with different metals – including titanium, molybdenum, vanadium and niobium.
Our most recent work has identified that mixing MXenes with water lets us spray antennas on any surface, including a brick wall or a glass window – and even use an inkjet to print an antenna on paper. This creates new opportunities for smaller, lighter, more flexible antennas to accompany devices that are also being made from more varied and versatile materials.

Tuesday, August 7, 2018

Television White Space Technology to Provide Long-Range Wireless Connectivity Up To 8 km

The Ammbr Foundation has released details on a long-range wireless technology that will make the Ammbr mesh router capable of picking up signals from up to eight kilometers (5 miles). The key in this technology is tapping into unused frequencies known as television white space (TVWS). The Ammbr foundation intends to help connect the 4.1 billion people who don't have Internet connections, through the implementation of innovative technology that allows improved connections in rural areas and over longer distances.
TVWS technology can operate in conditions where line-of-site is not possible due to obstructions such as vegetation and walls. Theoretical calculations show that a 600-MHz TV white space signal can cover 16 times as much area as a 2.4-GHz Wi-Fi signal. The technology will allow Ammbr routers to extend their range up to 8 km, provide a much wider coverage footprint and allow the devices to reach neighbouring routers in areas not possible before TVWS.

Tuesday, June 26, 2018

THE WIRETAP ROOMS...

The NSA’s Hidden Spy Hubs in Eight U.S. Cities. via, 
of "The Intercept".

THE SECRETS ARE hidden behind fortified walls in cities across the United States, inside towering, windowless skyscrapers and fortress-like concrete structures that were built to withstand earthquakes and even nuclear attack. Thousands of people pass by the buildings each day and rarely give them a second glance, because their function is not publicly known. They are an integral part of one of the world’s largest telecommunications networks – and they are also linked to a controversial National Security Agency surveillance program.

Atlanta, Chicago, Dallas, Los Angeles, New York City, San Francisco, Seattle, and Washington, D.C. In each of these cities, The Intercept has identified an AT&T facility containing networking equipment that transports large quantities of internet traffic across the United States and the world. A body of evidence – including classified NSA documents, public records, and interviews with several former AT&T employees – indicates that the buildings are central to an NSA spying initiative that has for years monitored billions of emails, phone calls, and online chats passing across U.S. territory.