Posts Tagged ‘security’

The Demon Voice That Can Control Your Smartphone

Tuesday, January 31st, 2017

The Demon Voice That Can Control Your…phone
https://www.theatlantic.com/technology/archive/2017/01/the-demon-voice-that-can-talk-to-your-smartphone/513743 Verbal malware: Yell into a crowd, “Hey #Siri, text mom, I’m pregnant”

QT:{{”

“Here’s a fun experiment: Next time you’re on a crowded bus, loudly announce, “Hey Siri! Text mom, ‘I’m pregnant.’” Chances are you’ll get some horrified looks as your voice awakens iPhones in nearby commuters’ pockets and bags. They’ll dive for their phones to cancel your command.

But what if there was a way to talk to phones with sounds other than words? Unless the phones’ owners were prompted for confirmation—and realized what was going on in time to intervene—they’d have no idea that”
“}}

Yahoo discloses hack of 1 billion accounts

Tuesday, January 10th, 2017

Yahoo discloses #hack of 1 billion accounts
http://social.techcrunch.com/2016/12/14/yahoo-discloses-hack-of-1-billion-accounts/ Seems the scale of this affects a large fraction of all Internet users

Have I been pwned? Check if your email has been compromised in a data breach

Thursday, November 3rd, 2016

https://haveibeenpwned.com/

Inside macOS Sierra: Apple’s Optimized Storage and management features – Mac OS X Discussions on AppleInsider Forums

Monday, October 17th, 2016

Inside…Sierra: $AAPL’s Optimized Storage
http://forums.appleinsider.com/discussion/196115/inside-macos-sierra-apples-optimized-storage-and-management-features Strong filesystem-icloud integration. Maybe good but also heavy handed

QT:{{”

“paxman said:
I am curious though, what do you mean by a very secure iCloud account? Do you just mean that you use two step verification and ‘difficult’ password? or is there something more?
Extremely strong password becaue it’s an internet-facing account that hold so much personal data
Password unique to that account
2FA
Notifcations of access attempts (if that’s possible to set up. I forget) Answers to personal questinons and birthday purposely inaccurate (in other words, the questions are a key to the get the correct answer generated randomly)”
“}}

Yahoo Says Hackers Stole Data on 500 Million Users in 2014 – The New York Times

Sunday, September 25th, 2016

Yahoo Says Hackers Stole Data on 500M in ’14
http://www.nytimes.com/2016/09/23/technology/yahoo-hackers.html I haven’t yet received notice from @Yahoo to change my passwd. Why?

Also:
https://www.ft.com/content/266aa154-8165-11e6-8e50-8ec15fb462f4

Bitcoin Rival Ethereum Gains Traction – WSJ

Monday, July 4th, 2016

#Bitcoin Rival Ethereum Gains Traction…. but suffers $55m theft due to hacked code. Wow!
http://www.wsj.com/articles/bitcoin-rival-ether-gains-traction-1466461279

NCBI retiring HapMap Resource

Friday, July 1st, 2016

Worrisome in rel. to #reproducibleresearch & maintaining secure resources https://twitter.com/adamauton/status/745304911483535360 … #saveHapMap Cf http://papers.gersteinlab.org/papers/security

@adamauton: Even as a @1000genomes advocate, this is not cool: http://www.ncbi.nlm.nih.gov/variation/news/NCBI_retiring_HapMap/ #saveHapMap

http://www.ncbi.nlm.nih.gov/variation/news/NCBI_retiring_HapMap/

Google Search Technique Aided N.Y. Dam Hacker in Iran

Sunday, April 10th, 2016

Google Search Technique Aided NY Dam Hacker in Iran
http://www.wsj.com/articles/google-search-technique-aided-n-y-dam-hacker-in-iran-1459122543 Appears to be ‘#Google dorking,’ using operators like inurl:

Don’t Be Hacker Bait: Do This One-Hour Security Drill – WSJ

Sunday, February 7th, 2016

http://www.wsj.com/articles/do-this-one-hour-security-drill-5-steps-to-being-safer-online-1454528541

Here’s Why Public Wifi is a Public Health Hazard — Matter

Wednesday, January 6th, 2016

Why Public #Wifi is a…Hazard
https://medium.com/matter/heres-why-public-wifi-is-a-public-health-hazard-dd5b8dcb55e6 Exposes one’s past network usage; ergo, don’t put your street into your home’s SSID

QT:{{”

Wouter removes his laptop from his backpack, puts the black device on the table, and hides it under a menu. A waitress passes by and we ask for two coffees and the password for the WiFi network. Meanwhile, Wouter switches on his laptop and device, launches some programs, and soon the screen starts to fill with green text lines. It gradually becomes clear that Wouter’s device is connecting to the laptops, smartphones, and tablets of cafe visitors.

On his screen, phrases like “iPhone Joris” and “Simone’s MacBook” start to appear. The device’s antenna is intercepting the signals that are being sent from the laptops, smartphones, and tablets around us.

“More text starts to appear on the screen. We are able to see which WiFi networks the devices were previously connected to. Sometimes the names of the networks are composed of mostly numbers and random letters, making it hard to trace them to a definite location, but more often than not, these WiFi networks give away the place they belong to.

We learn that Joris had previously visited McDonald’s, probably spent his vacation in Spain (lots of Spanish-language network names), and had been kart-racing (he had connected to a network belonging to a well-known local kart-racing center). Martin, another café visitor, had been logged on to the network of Heathrow airport and the American airline Southwest. In Amsterdam, he’s probably staying at the White Tulip Hostel. He had also paid a visit to a coffee shop called The Bulldog.

“}}