Showing posts with label vulnerabilities. Show all posts
Showing posts with label vulnerabilities. Show all posts

Ingrained In The Brain: New "Brainprints" Security Metric Proven 100% Accurate

We've all seen a spy movie where someone's fingerprint-scan is needed to access an important area, and they end up forced to scan in at gunpoint, or simply having their finger lopped off to fulfill the invaders' needs.  And even retinal scans could possibly be faked with the right medical information and digital technology.  However, the latest security is key is stashed somewhere very safe:  inside your skull.

When your brain is your password, is your cap the Caps Lock?
(Image courtesy techcresendo.com.)


X Marks The Spotted: Windows 10 Is Watching You

As citizens of the cyber-community, we've unfortunately become conditioned to seeing ads that are eerily targeted to things we say, emails that appear from long-forgotten websites, and other evidence of deep data gathering made manifest for use of moneymaking.  Now, with the launch of Windows 10 becoming a necessity for some users, Microsoft seems to have pulled out even more stops to speed up their spying...

Seriously, what ISN'T spying on us these days?
(Image courtesy hackread.com.)

A Kick In The Astroturf: Amazon Trounces Fake Online Reviews With AI

You might love the internet, but you probably don't trust the internet.  With all manner of scams from impostors faking cute pictures on dating sites, to robots faking comments on popular blogs, the skullduggery is ceaseless.  Now, Amazon aims to use artificial intelligence to take down one of the worst offenders against our online honor...fake product reviews.

The truth will set you free.  Everything else will set you up for something crazy.
(Image courtesy i.huffpost.com.)

"Clear" For Takeoff: New App Removes All Of Your Objectionable Social Media Posts

If you have some kind of a social media account, chances are you've at some point made a statement or posted an image there that you're not particularly proud of.  Maybe you've let it get buried in a tidal wave of tech and time, but if it still exists, it can still be found...and possibly used against you.  Take this power away from your enemies with a new app...

(Image courtesy failbook.com.)

Euthanizing Youtube: Security-Testing Hacker Discovers Ultimate "Delete" Button

What if you had computer hacking skills of such astonishing power, you could bring an entire lane of the information superhighway to a screeching halt?  What would you do with your great and terrible force?  This week, one man was faced with this fascinating decision...

NOOOO!  NOT THE HARLEM SHUFFLE!
(Image courtesy answerbag.com.)

"Like" After Death: Leave A "Legacy Contact" To Manage Your Facebook Postmortem

Like millions of people the world over, perhaps you enjoy reporting the diverse details of your life on Facebook.  But what about...after?  What happens to your e-life when your real one is over?  Better find someone very trustworthy to handle your e-estate...

The Safest Secrets In The World: Swiss Systems Allow For Super-Secure Data Storage

As privacy concerns escalate in our ever-observed lives, steps are now being taken to ensure that precious data can be held as securely as gold or other valuables.  Switzerland, a nation known for its strict privacy in the banking business, is at the forefront of this mission.

According to phys.org, Switzerland has some 61 data-banking centers that deal in information storage.  During the last five years, over a billion dollars have been invested by folks looking to keep their most important information safe from anyone else.

Even their pocketknife USB has a fingerprint scanner and major encryption technology.
No, seriously.
(Image courtesy gadling.com.)

The investments in data storage are surging despite Switzerland's ever-eroding laws concerning banking privacy. Due to the formerly overabundant nature of banking privacy in the nation, it was known as a haven for shady dealings to be neatly numbered and accounted for, without oversight from pesky things like the law. Although that's now changing, the element of the pervasive privacy is now being well applied to data security.

Franz Grueter, the managing director of the data storage firm Green.ch, explained, "Clients need confidence, discretion, reliability and stability. These have been the country's hallmarks forever." He also noted that, "Data storage is the new Eldorado for Switzerland. It's a real boom." (Green.ch has posted 30% annual growth since its inception in 1995.)

Though Switzerland is Europe's fifth-largest data hub, it wants to be known as the nation that takes data security the most seriously. In Switzerland, personal data is legally classified as a "precious good" that requires a judge-issued order before it can be observed by any outsiders. Thus, digital assets, in the form of proprietary secrets, intellectual property, invention schematics, sensitive plans, or other critical data can be safely stashed with the Swiss.

Even email services established in Switzerland are more secure.
(Image courtesy totaldigitalsecurity.com.)

One such information cache, known as Deltalis, is situated in an underground Cold War-era bunker that's protected by biometric scanners, armed guards, and four-ton steel doors that were built to thwart a nuclear attack. Its exact location is not publicly known, and critical IT developments will be handled only by those who act in strict accordance with Swiss law. As far as privacy goes in the modern world, this is as safe as safe can be.

With leaks everywhere from government to Hollywood to personal cell phones occurring, it's good to know that somewhere, secrecy is being taken seriously. One big leak, from renowned whistleblower Edward Snowden, hinted that international spies had their eye on cracking into the Swiss system. They'll have to be the best in the world to make the attempt, though...digitally, physically, and legally, the Swiss have more layers of data protection in place than useful tools on one of their pocketknives.

Your weirdest nudies are safe here.
(Image courtesy photoromanzoitaliano.com.)

E-Emotional Rescue: Computer Programs That Deal In Your Feelings

Experts say that your computer is a better judge of your personality than even your closest family and friends.  It knows your preferences, correspondents, written words, tastes in imagery, secrets kept and deleted, and more.  But what happens in the possibly-near future when machines begin using all of this information to actually UNDERSTAND you?

When it comes to emotional intelligence and your computer, what constitutes too much information?
(Image courtesy singularityhub.com.)

According to the New Yorker, this may be happening more quickly than we expect.  Computers can already attempt to determine moods from vocal pitch and intensity, while simultaneously analyzing any attendant videos for evidence of micro-expressions or gestures that could reveal even more about an interaction.  Even the placement of words in a sentence can be taken to imply other things, indicating how angry, passionate, or spectacularly talented certain authors are.  Now, computers can not only be aware of these elements, but use them to temper their own responses or advice.

Rana el Kaliouby, an Egyptian scientist who runs the Boston-based company Affectiva, is on the forefront of this mecha-emotional leap.  Affectiva's most prominent software, Affdex, is trained to recognize four major emotions:  happy, confused, surprised, and disgusted.  Breaking down the user's face-image into deformable and non-deformable points, the software analyzes how far certain parts of one's face will move (such as a smile or frown raising or lowering the corners of the mouth) in relation to other set points on the face (such as the tip of the nose.)  Things like skin texture (where wrinkles appear, or not) also factor in.  These metrics are analyzed into computing what you feel.

Based off the research of 1960s scientist Paul Ekman, the idea behind this technology stems from a simple, universal concept:  all humans, regardless of race, gender, age or language barriers, have at least six specific facial expressions that register particular emotions.  Ekman broke these expressions down into their constituent movements and wrote a 500-page epic called FACS (Facial Action Coding System) on the subject.  The work has been considered the preeminent treatise on this topic for decades now.

Other companies are on the e-emotional bandwagon too, with names like Emotient, Realeyes, and Sension.  Companies who rely on videoconferencing could now have a useful extra line on what their clients and associates are thinking.  Emotions, which have been found to be closely neurologically related to decision-making and common sense, now can be deduced from faces and choices with a degree of accuracy that seems like mind-reading.

We're less unique than anyone thinks.
(Image courtesy thewaylifeis.com.)

While useful (and now predominantly operational) in business, Kaliouby also spent time researching if this specific recognizance could act as an "emotional hearing aid" for those with autism.  The National Science Foundation offered Kaliouby and her mentor nearly a million dollars to develop this idea.  This proved successful, but the idea was almost immediately extrapolated by businesses from Pepsi to Toyota in the interest of learning more about their consumers' preferences.  These requests overwhelmed the scientists, leading to the creation of Affectiva.  The company, which claims to have refused requests to use the software for espionage (corporate and personal), wanted to generate revenue from investors to augment their autism-relating research.

Thus Affdex began testing users' response to advertisements, giving the promotions industry a leg up on what consumers would be feeling when exposed to their sales pleas.  More than two million videos from eighty countries lent the program an unprecedented amount of information, all adding up to more accuracy in prediction from the program.  Affectiva now deals in these negotiations and improvements full-time.  In coming years, with more "smart" devices and internet-enabled items out there for our interaction, emotional electronics could use their ever-increasing knowledge to hopefully make our lives better.

These programs have our attention, which is a valuable resource.  Now, can that be used to hold our interest, connect us more completely, and/or improve our circumstances (even just by knowing we need the room temperature raised a little?)  Or will it simply serve as another metric to keep tabs on a passive populace?  Will we have the right to know when and where we are being emotionally analyzed, and will we be able to thwart such advances if desired?  Kaliouby maintains that there must be an overall altruistic tilt to the usage of the program, explaining to various advertisers that, “In our space, you could very easily be perceived as Big Brother, as opposed to the gatekeeper of your own emotional data—and it is two very different positions. If we are not careful, we can very easily end up on the Big Brother side.”

Whether we'll end up selling our attention to gain happiness points to sell for more happiness remains uncertain.  But the fact remains that the market for your emotions is vast and lucrative.  Companies will want to know you're happy if it makes them feel they're doing something right.  Other more insidious organizations may be tickled to learn that you're feeling deeply unsettled and on edge (right where some of them want you.)  Will the future be made of humans wearing constant poker faces, lest we be called out by computers?  Will there be surcharges for extra super-sized doses of happiness from certain places or products?  Or should we maybe turn the lens in on ourselves, and understand the nature of our own feelings, before we release them into the wild to be tagged and tracked...or hunted?

And remember, all of this information is taken from imagery alone.  We're not even really "plugged in" yet...
(Image courtesy rdn-consulting.com)






Pew Report: 90% Of Americans Feel They've "Lost Control" Over Data Privacy

It's no secret that most civilian information in the United States is not secret.  But just how bad has the encroachment on our privacy gotten?  In a new Pew Research Center report, it seems that the cognitive dissonance of the American Dream is frustrating, but still not something people feel ready to fix...even though it is more critical now than ever to stop the erosion from the invasion.

It's not just a feeling.  It's their first move.
(Image courtesy mb.com.ph.)

The Washington Post reports that a recent study indicated Americans were very aware of the "privacy dystopia" they were living in, with 61% stating that they "would like to do more" to protect their online information.  Over 90% were aware that they had "lost control" over how private organizations were able to obtain and utilize their personal information.

Unfortunately, 55% were admittedly willing to trade personal information for free services online, which doesn't seem to be in line with most peoples' stated desires for privacy (yes, it DOES require sacrifice of some things, unfortunately, but perhaps someday with effort, that could be changed.  Cognizance of this is the first step to correcting it.)

Whatever this is, it isn't worth your security.
(Image courtesy news.softpedia.com.)

Other data from the report included some interesting findings:

-60% reported that revealing data to companies over the internet did not significantly improve their online experience

-88% did not trust advertisers the majority of the time

-82% did not trust the government all or most of the time

-Only 24% felt they could be easily anonymous online

-Perhaps most importantly, over 60% disagreed or strongly disagreed with the statement "it is a good thing for society if people believe that someone is keeping an eye on the things that they do online."

Cell phones, land lines, and social media site security were also assessed, but the overall results were clear:  the snooping needs to stop.  And until we cease squandering our own operational security or surrendering our data for the benefit of fleeting internet fun, this is going to be difficult to change.  It is no longer enough to disagree with privacy-violating practices - consumers and citizens must make the powers that be stop shamelessly snooping and selling our security.  Big Brother has become a bully, and it's time to fight back.

More technological shutters must be closed to block a variety of prying eyes.
(Image courtesy nypost.com.)

New "Wakie" App To Frighten You Awake

Some people just need that extra nudge to get themselves out of bed in the morning (or midafternoon...we understand.)  Now, a new app is available to outsource your alarm clock and force you to interact your way awake.

According to metro.co.uk, the "Wakie" app was created by Armenian entrepreneur Hrachik Adjamian, and it operates on a simple principal: getting talked awake. It sounds nightmarish to some, but it might be just the thing to motivate a particularly recalcitrant rester.  The Wakie app has a random stranger call you at the desired time, and say...something, anything...to get you awake.

Could it be creepy?  Sure.  But Wakie is already popular in Russia, and that means while you're waking up in America, you could have some happy-hour vodka-infused Russian on the other side of the world barking you awake.

Wakie not only helps you return the favor by searching for "Sleepies" you can rouse, but it also tries to match you up with someone of the opposite gender.  You know, so you can jump right into that "get the hell out of bed and get to work goddamnit" stage of the relationship.

You can download Wakie here.  Sweet dreams!

The wrong side of the bed has gone worldwide.

Hacked Printer Shows How Lax Security Could "Doom" Your Company

We live in a world of instant gratification and hyper-connectivity. Unfortunately, the connections that bring us easy and immediately pleasant results can turn on us just as quickly as they work for us. Nowhere is this more true than in the field of technology. This was recently illustrated when a Canon office printer, connected to an outside computer server, was hacked to play "Doom."

According to pcgamesn.com, the security flaw was intentionally manifested to prove that the overly-accessible printer proved a threat to office data security. The Canon Pixma printers have a web-accessible interface that required no authentication, enabling Context Information Security analyst Michael Jordon to sneak into the system and run a copy of "Doom" on the Pixma's LED screen. This was a playful but serious reminder than any party with unpleasant intent could create firmware to monitor or manipulate the printer's output, which could be instrumental in corporate espionage or sabotage.

As Jordon explained to The Guardian, “If you can run Doom on a printer, you can do a lot more nasty things...In a corporate environment, it would be a good place to be. Who suspects printers?”

Canon has assured its users that an update, requiring a username and password for the Pixma interface, will solve any rogue infiltration programs in all models that had previously been at risk to be compromised. Who says video games never teach you anything?

There are even worse things than these guys waiting to grab your office intel.  (Image courtesy cdn.bloodydisgusting.com.)

Scammed By A Skimmer: Watch Out For ATM-Based Info Theft Devices

Crafty criminals have used technology to streamline their operations since the word "hacking" only meant to slash off someone's limb.  Recently, their methods have been getting trickier and less obtrusive, so much so that you may be robbed without even knowing about it.

Who needs to be a stickup artist when a simple, slim ATM skimmer can do all the work for you?  According to gizmodo.com, that's what's troubling police in southern Europe this week, after this insidious little interloper was pulled from a bank machine.

It's efficient, but sure doesn't look as badass as old bank robbers used to.

Powered by a mere watch battery and a small magnetic reader, the heist device was also equipped with a small data storage unit.  The skimmer was likely used alongside an external camera that monitored customers pressing PIN numbers, although this was missing from the crime scene.  One bank employee explained that mystery well, stating they "didn't capture any hidden camera [because the criminals] probably took it. There were definitely no PIN pad [overlays]. In all skimming cases lately we see through the videos that fraudsters capture the PIN through [hidden] cameras."

This trend could easily go unnoticed in busy commercial centers where people need cash quickly, but if you aren't paying attention, you may end up paying through the nose. Keep your eyes peeled and your wallets sealed around shady ATMs!
A.T.Ummmm...



Critical Linux Vulnerability Discovered

From Ars Technica:
Hundreds of open source packages, including the Red Hat, Ubuntu, and Debian
distributions of Linux, are susceptible to attacks that circumvent the most widely used technology to prevent eavesdropping on the Internet, thanks to an extremely critical vulnerability in a widely used cryptographic code library.
The bug in the GnuTLS library makes it trivial for attackers to bypass secure sockets layer (SSL) and Transport Layer Security (TLS) protections available on websites that depend on the open source package. Initial estimates included in Internet discussions such as this one indicate that more than 200 different operating systems or applications rely on GnuTLS to implement crucial SSL and TLS operations, but it wouldn't be surprising if the actual number is much higher. Web applications, e-mail programs, and other code that use the library are vulnerable to exploits that allow attackers monitoring connections to silently decode encrypted traffic passing between end users and servers.
The bug is the result of commands in a section of the GnuTLS code that verify the authenticity of TLS certificates, which are often known simply as X509 certificates.