Tuesday, July 28, 2015

Nearly 1 billion phones can be hacked with 1 text

“Stagefright” is one of the worst Android vulnerabilities to date.

So listen: Can I have your number?

Can I have it? Can I? Have it?

Um…maybe not. Actually, you should think twice before giving away your cell phone number—especially if you happen to own a phone that runs on Google’s Android operating system.

That’s the only thing a hacker needs to compromise a handset.

A mobile security researcher has uncovered a flaw that leaves as many as 95% of Android devices—that’s 950 million gadgets—exposed to attack. The computer bug, nicknamed “Stagefright” after a vulnerable media library in the operating system’s open source code, may be one of the worst Android security holes discovered to date. It affects Android versions 2.2 and on.

Read more: http://for.tn/1D3iRRC

Image courtesy of posterizeat FreeDigitalPhotos.net

Friday, July 24, 2015

FBI sees 53 percent jump in foreign spies trying to steal U.S. trade secrets

The Federal Bureau of Investigation has identified a 53 percent increase in the number of hostile intelligence agents that have been attempting to steal U.S. trade secrets since this time last year, federal authorities said Thursday.

The number of economic espionage cases that have robbed both large and small companies across the United States is classified, but federal authorities say that those cases are “in the hundreds.”

FBI agents and National Counterintelligence and Security Center officials say the increased cases of economic espionage are tied tightly to international transient trends, which show more and more foreigners are now obtaining jobs in America or have teaching positions at U.S. universities.

Read more: http://bit.ly/1MqHmen
Image courtesy of photostock at FreeDigitalPhotos.net

Thursday, July 23, 2015

Lottery IT security boss guilty of hacking lotto computer to win $14.3m

Your employees pose a credible threat to the security of your organization. If you suspect an employee or contractor is a insider threat, contact ComSec LLC. We detect eavesdropping devices and related cyber threats, including bugs, taps, hidden cameras, IMSI catcher attacks, malware, spyware, etc. We'll help you identify the threat and nullify it!

The Story:

Bloke rigged systems so he knew which numbers would come next!

Iowa state lottery's IT security boss hacked his employer's computer system, and rigged the lottery so he could buy a winning ticket in a subsequent draw.

On Tuesday, at the Polk County Courthouse in Des Moines, Iowa, the disgraced director of information security was found guilty of fraud.

Eddie Tipton, 52, installed a hidden rootkit on a computer system run by the Multi-State Lottery Association so he could secretly alter the lottery's random number generator, the court heard. This allowed him to calculate the numbers that would be drawn in the state's Hot Lotto games, and therefore buy a winning ticket beforehand.

The prosecution said he also tampered with security cameras covering the lottery computer to stop them recording access to the machine. 

Image courtesy of James Barker at FreeDigitalPhotos.net

Wednesday, July 22, 2015

Hackers Remotely Kill a Jeep on the Highway

If you don't think your car's computer system can be hacked, think again. This story by Andy Greenberg of Wired Magazine demonstrates the vulnerabilities of Jeep Cherokee's computer system. 

"I WAS DRIVING 70 mph on the edge of downtown St. Louis when the exploit began to take hold.

Though I hadn’t touched the dashboard, the vents in the Jeep Cherokee started blasting cold air at the maximum setting, chilling the sweat on my back through the in-seat climate control system. Next the radio switched to the local hip hop station and began blaring Skee-lo at full volume. I spun the control knob left and hit the power button, to no avail. Then the windshield wipers turned on, and wiper fluid blurred the glass.

As I tried to cope with all this, a picture of the two hackers performing these stunts appeared on the car’s digital display: Charlie Miller and Chris Valasek, wearing their trademark track suits. A nice touch, I thought."

Tuesday, July 21, 2015

Man arrested for 'installing spying app on girlfriend's mobile phone'

Image courtesy of adamr at FreeDigitalPhotos.net
A man has been arrested on suspicion of spying on his girlfriend - through her mobile phone.

The boyfriend allegedly installed an app to track her use of the phone and its messaging functions.

The software, found by police in JaƩn in southern Spain, apparently allowed him access to her Whatsapp messages and see her posts on social networks.

It also allowed him to activate the camera and microphone remotely on the phone because of software which he installed before he gave her the phone as a gift. Read more about this story: http://bit.ly/1CTxLcP

If you believe your mobile phone may be compromised by spyware or malware, contact ComSec LLC. We provide forensic services for mobile devices. Get more information here: http://comsecllc.com/cellular-forensic-services/ 

Monday, July 20, 2015

Documents Published by WikiLeaks Reveal the NSA's Corporate Priorities

"We are under pressure from the Treasury to justify our budget, and commercial espionage is one way of making a direct contribution to the nation's balance of payments." - Sir Colin McColl, MI6 Chief
For years public figures have condemned cyber espionage committed against the United States by intruders launching their attacks out of China. These same officials then turn around and justify the United States' far-reaching surveillance apparatus in terms of preventing terrorist attacks. Yet classified documents published by WikiLeaks reveal just how empty these talking points are. Specifically, top-secret intercepts prove that economic spying by the United States is pervasive, that not even allies are safe and that it's wielded to benefit powerful corporate interests.
At a recent campaign event in New Hampshire, Hillary Clinton accused China of "trying to hack into everything that doesn't move in America." Clinton's hyperbole is redolent of similar claims from the US deep state. Read more: http://bit.ly/1Sug9Gj
Image courtesy of  Naypong at FreeDigitalPhotos.net

Thursday, July 16, 2015

The truth about HackingTeam, jailbreaking and iOS – and how to keep your device safe

There has been a lot of mixed information and speculation in the media recently in regards to the HackingTeam leak and what it all means for iOS users. Do the surveillance tools the group has reportedly provided to governments and law enforcement present a risk to the average iPhone and iPad user? That’s a question we’ve been getting a lot, so I will attempt to present all of the facts based on the recently leaked documents detailing the HackingTeam’s tools, as well as my opinion on the impact of certain aspects for iOS devices. Advanced users will already be aware of what I am about to state, but for everyone else, here’s what we’re dealing with . . .

Read more: http://bit.ly/1O93Uhi

Image courtesy of Hyena Reality at FreeDigitalPhotos.net