Posts Tagged ‘security’

Artificial intelligence just made guessing your password a whole lot easier

September 22, 2017

#AI just made guessing your password…easier
http://www.ScienceMag.org/news/2017/09/artificial-intelligence-just-made-guessing-your-password-whole-lot-easier rather Number cracked raises #security/#privacy concerns HT @Rozowsky

QT:{{”
The new study aimed to speed this up by applying deep learning, a brain-inspired approach at the cutting edge of AI. Researchers at Stevens Institute of Technology in Hoboken, New Jersey, started with a so-called generative adversarial network, or GAN, which comprises two artificial neural networks. A “generator” attempts to produce artificial outputs (like images) that resemble real examples (actual photos), while a “discriminator” tries to detect real from fake. They help refine each other until the generator becomes a skilled counterfeiter.
“}}

Advertisements

We’re committed to your security

September 17, 2017

http://links.e.lastpass.com/ctt?kn=1&ms=NTQ4ODM4MTcS1&r=MTk4NDYzMjg3MDcwS0&b=0&j=MTI0NDc3NjcwMwS2&mt=1&rt=0

https://www.equifaxsecurity2017.com/

QT:{{”
As you may have heard, Equifax, one of the three largest credit monitoring bureaus in the U.S., announced a data breach at the company that may have affected 143 million U.S. consumers. The breach included social security numbers, birth dates, addresses, credit card numbers as well as other personal information.
“}}

Identity Thieves Hijack Cellphone Accounts to Go After Virtual Currency

September 5, 2017

Identity Thieves Hijack Cellphone Accounts to Go After Virtual
Currency https://www.nytimes.com/2017/08/21/business/dealbook/phone-hack-bitcoin-virtual-currency.html Problematic #privacy loophole w/ #2factor

QT::{{”
“Hackers have discovered that one of the most central elements of online security — the mobile phone number — is also one of the easiest to steal.
In a growing number of online attacks, hackers have been calling up Verizon, T-Mobile U.S., Sprint and AT&T and asking them to transfer control of a victim’s phone number to a device under the control of the hackers.
“}}

cybersecurity story

August 5, 2017

The absent-minded prof in the news…!

http://www.nature.com/news/cybersecurity-for-the-travelling-scientist-1.22379

Cybersecurity for the travelling scientist

Virtual private networks, tracking apps and ‘burner’ laptops: how to protect sensitive data when you take your research on the road.

Brian Owens

02 August 2017

QT:{{”
Mark Gerstein has had his fair share of scares when it comes to losing track of his electronic devices — and, along with them, access to his private information and research data.

“I’m very security conscious, but also a bit of an absent-minded professor,” says Gerstein, a bioinformatician at Yale University in New Haven, Connecticut.

He recalls one trip to Boston, Massachusetts, when he left his phone in a taxi, and watched it get farther and farther away on the tracking app on his iPad while he ran after the car in vain. Luckily, Gerstein was able to contact the taxi company, and eventually watched his phone make the return journey to his pocket.

Gerstein’s story had a happy ending, but all too often, hardware lost on the road is lost for good.
“}}

Inside the Hunt for Russia’s Most Notorious Hacker

April 28, 2017

Inside the Hunt for Russia’s Most Notorious #Hacker
https://www.Wired.com/2017/03/russian-hacker-spy-botnet/ A
progression: Zeus, the Business Club & then espionage

QT:{{”
“As far as anyone could tell, GameOver Zeus was controlled by a very elite group of hackers—and the group’s leader was Slavik. He had reemerged, more powerful than ever. Slavik’s new crime ring came to be called the Business Club. A September 2011 internal announcement to the group—introducing members to a new suite of online tools for organizing money transfers and mules—concluded with a warm welcome to Slavik’s select recipients: “We wish you all successful and productive work.””
“}}

WikiLeaks Shows How the CIA Can Hack a Mac’s Hidden Code

March 25, 2017

WikiLeaks Shows How the CIA Can Hack a Mac
https://www.wired.com/2017/03/wikileaks-shows-cia-can-hack-macs-hidden-code/ Modifying the firmware of Thunderbolt adapters to make spyware implanters

QT:{{”
“The CIA’s documents describe a series of tools that agents can use to install “implants” on target machines, capable of silently monitoring everything that occurs within its operating system and transmitting it to a remote operator. One manual explains how to modify the firmware of a standard Apple Thunderbolt-to-ethernet adapter, turniing it into an spyware-planting tool the CIA calls “Sonic Screwdriver.” When plugged in, the altered adapter can trick a Mac into thinking it’s booting its operating from a spoofed network source that the adapter impersonates, allowing tweaks to its firmware even in the rare cases when the user has set a password for any changes to that deep-seated code.”
“}}

The Demon Voice That Can Control Your Smartphone

January 30, 2017

The Demon Voice That Can Control Your…phone
https://www.theatlantic.com/technology/archive/2017/01/the-demon-voice-that-can-talk-to-your-smartphone/513743 Verbal malware: Yell into a crowd, “Hey #Siri, text mom, I’m pregnant”

QT:{{”

“Here’s a fun experiment: Next time you’re on a crowded bus, loudly announce, “Hey Siri! Text mom, ‘I’m pregnant.’” Chances are you’ll get some horrified looks as your voice awakens iPhones in nearby commuters’ pockets and bags. They’ll dive for their phones to cancel your command.

But what if there was a way to talk to phones with sounds other than words? Unless the phones’ owners were prompted for confirmation—and realized what was going on in time to intervene—they’d have no idea that”
“}}

The Demon Voice That Can Control Your Smartphone

January 30, 2017

The Demon Voice That Can Control Your…phone
https://www.theatlantic.com/technology/archive/2017/01/the-demon-voice-that-can-talk-to-your-smartphone/513743 Verbal malware: Yell into a crowd, “Hey #Siri, text mom, I’m pregnant”

QT:{{”

“Here’s a fun experiment: Next time you’re on a crowded bus, loudly announce, “Hey Siri! Text mom, ‘I’m pregnant.’” Chances are you’ll get some horrified looks as your voice awakens iPhones in nearby commuters’ pockets and bags. They’ll dive for their phones to cancel your command.

But what if there was a way to talk to phones with sounds other than words? Unless the phones’ owners were prompted for confirmation—and realized what was going on in time to intervene—they’d have no idea that”
“}}

Yahoo discloses hack of 1 billion accounts

January 10, 2017

Yahoo discloses #hack of 1 billion accounts
http://social.techcrunch.com/2016/12/14/yahoo-discloses-hack-of-1-billion-accounts/ Seems the scale of this affects a large fraction of all Internet users

Have I been pwned? Check if your email has been compromised in a data breach

November 3, 2016

https://haveibeenpwned.com/