Spectacles are a camera that you wear on your face. Tap a record button
near the temple, and they capture video in intervals of 10 seconds,
which automatically uploads to the Snapchat app. The first two
generations of the sunglasses, released in 2016 and 2018 respectively,
were bulky, plastic, and multicolored—almost toylike.
Spectacles 3, to
be released later this fall, are a much more appealing species. Sleeker,
slimmer, and made in lightweight stainless steel, they signal the
company’s move into elevated design. The style—exaggerated round lenses
with a brow bar across the top—comes in just two minimal hues: matte
black (the Carbon) and rose gold (the Mineral). more
Tuesday, August 20, 2019
The Peregrination of a Childhood Promise
Finally, another childhood fantasy becomes reality. Hard on the heals of wall screen TVs; Dick Tracy's wrist radio.
Chester Gould’s idea of Tracy wearing something like this on his wrist in the
comic strip was actually turned down by his employer because it was
thought to be too much of a cheat, so-to-speak, an easy way out for the
detective who had been written into a scene where he was held captive
with no possible way of escaping from the criminals.
It was then that Gould decided to call an inventor he had met, Al Gross (pictured above).
Al Gross was a man way ahead of his time with inventions such as the walkie-talkie. When Gross was just 16 years old, he already had an amateur radio operator's license and had built a ham radio going on to invent the first telephone pager in 1949.
When Gould stopped by, Al Gross had just recently invented a two-way radio that people could wear on their wrists, just like a watch. Gould asked Gross if he could use his idea and that’s where Dick Tracy’s wrist watch radio came into being. Gould was so appreciative that as a Thank You, he gave Gross the first four panels of the cartoon where Tracy is seen wearing and using the soon-to-be infamous gadget. The device proved to be the exact answer for Dick Tracy to rescue himself from the seemingly impossible situation.
Still on my list...
UPDATE - 8/27/19
Apple reportedly kills project to turn iPhone into 'walkie talkie'
Damn!
- The now iconic 2-way wrist radio premiered in 1946 and was replaced with a 2-way wrist TV in 1964.
- 1952 prototype wrist radio.
- 1960's wrist radio.
- Apple watch Walkie-Talkie.
- FutureWatch: A "Real" Dick Tracy wrist radio watch. (Bluetooth)
- Wrist radios on ebay.
- Wrist radios on Amazon.
- In June of 1954, the radio was upgraded to increase the range from 500 miles to 1,000 miles, then again in 1956 to 2,500 miles.
It was then that Gould decided to call an inventor he had met, Al Gross (pictured above).
Al Gross was a man way ahead of his time with inventions such as the walkie-talkie. When Gross was just 16 years old, he already had an amateur radio operator's license and had built a ham radio going on to invent the first telephone pager in 1949.
When Gould stopped by, Al Gross had just recently invented a two-way radio that people could wear on their wrists, just like a watch. Gould asked Gross if he could use his idea and that’s where Dick Tracy’s wrist watch radio came into being. Gould was so appreciative that as a Thank You, he gave Gross the first four panels of the cartoon where Tracy is seen wearing and using the soon-to-be infamous gadget. The device proved to be the exact answer for Dick Tracy to rescue himself from the seemingly impossible situation.
Still on my list...
UPDATE - 8/27/19
Apple reportedly kills project to turn iPhone into 'walkie talkie'
Damn!
Monday, August 12, 2019
Ultrasound Talk Gives a Whole New Meaning to Defcon
Researchers have long known that commercial speakers are also physically able to emit frequencies outside of audible range for humans. At the Defcon security conference in Las Vegas on Sunday, one researcher is warning that this capability has the potential to be weaponized...
Matt Wixey, cybersecurity research lead at the technology consulting firm PWC UK, says that it’s surprisingly easy to write custom malware that can induce all sorts of embedded speakers to emit inaudible frequencies at high intensity, or blast out audible sounds at high volume.
Those aural barrages can potentially harm human hearing, cause tinnitus, or even possibly have psychological effects.
And while it is still unclear whether acoustic weapons played a role in the attack on United States diplomats in Cuba, there are certainly other devices that intentionally use loud or intense acoustic emanations as a deterrent weapon... more
Matt Wixey, cybersecurity research lead at the technology consulting firm PWC UK, says that it’s surprisingly easy to write custom malware that can induce all sorts of embedded speakers to emit inaudible frequencies at high intensity, or blast out audible sounds at high volume.
Those aural barrages can potentially harm human hearing, cause tinnitus, or even possibly have psychological effects.
And while it is still unclear whether acoustic weapons played a role in the attack on United States diplomats in Cuba, there are certainly other devices that intentionally use loud or intense acoustic emanations as a deterrent weapon... more
Sunday, August 11, 2019
Tesla Mod Creates a Mobile Surveillance Station - Possible Bad News for PIs on Surveillance
At the Defcon hacker conference today, security researcher Truman Kain
debuted what he calls the Surveillance Detection Scout. The DIY computer
fits into the middle console of a Tesla Model S or Model 3, plugs into
its dashboard USB port, and turns the car's built-in cameras—the same
dash and rearview cameras providing a 360-degree view used for Tesla's
Autopilot and Sentry features—into a system that spots, tracks, and
stores license plates and faces over time.
The tool uses open source image recognition software to automatically put an alert on the Tesla's display and the user's phone if it repeatedly sees the same license plate. When the car is parked, it can track nearby faces to see which ones repeatedly appear.
Kain says the intent is to offer a warning that someone might be preparing to steal the car, tamper with it, or break into the driver's nearby home. more
The tool uses open source image recognition software to automatically put an alert on the Tesla's display and the user's phone if it repeatedly sees the same license plate. When the car is parked, it can track nearby faces to see which ones repeatedly appear.
Kain says the intent is to offer a warning that someone might be preparing to steal the car, tamper with it, or break into the driver's nearby home. more
FutureWatch: Your Voice Can Give Away What You Look Like
Spying is multifaceted. It includes everything from plain old audio eavesdropping, to spycams (thus adding the visual element), to aggregating all the telltale data about us. Once science fiction, even facial recognition is coming to airports. Is it possible to squeeze more from a spy's cornucopia of tricks?
What if you want to know what a person is thinking, or what they look like?
These two challenges are the future of spying, and they are being worked on today.
We started covering mind reading advancements in 2006. And now, how to tell what a person looks like—and even their environment... just from the sound of their voice.
What if you want to know what a person is thinking, or what they look like?
These two challenges are the future of spying, and they are being worked on today.
We started covering mind reading advancements in 2006. And now, how to tell what a person looks like—and even their environment... just from the sound of their voice.
Friday, August 9, 2019
Warshipping - The Next Corporate Espionage Headache
Hackers looking to gain access to your Wi-Fi network don’t necessarily have to lurk around your home or office, warns IBM X-Force Red.
Instead, writes Charles Henderson, global head of that security unit, they could simply ship you a package with a tiny, concealed device they can remotely control.
“In fact, they could ship multiple devices to their target location thanks to low build cost,” Henderson writes. “The device, a 3G-enabled, remotely controlled system, can be tucked into the bottom of a packaging box or stuffed in a toy (a device no bigger than the palm of your hand) and delivered right into the hands or desk of an intended victim.”...
Such a device could even set up a rogue wireless network of its own to sniff login credentials to use on the real target network, according to the post. Devices made for the technique, which IBM has dubbed warshipping, can be built for under $100, the company says.
To avoid such attacks, Henderson’s team recommends companies set up policies to inspect and isolate packages and potentially discourage employees from getting personal shipments at work. more
Instead, writes Charles Henderson, global head of that security unit, they could simply ship you a package with a tiny, concealed device they can remotely control.
“In fact, they could ship multiple devices to their target location thanks to low build cost,” Henderson writes. “The device, a 3G-enabled, remotely controlled system, can be tucked into the bottom of a packaging box or stuffed in a toy (a device no bigger than the palm of your hand) and delivered right into the hands or desk of an intended victim.”...
Scheduled TSCM inspections find electronic surveillance items like this. Dead or alive. |
To avoid such attacks, Henderson’s team recommends companies set up policies to inspect and isolate packages and potentially discourage employees from getting personal shipments at work. more
How to Desensitize the World to Spying — Start Young
iPhone iMessage iHacked
When you think about how hackers could break into your smartphone, you probably imagine it would start with clicking a malicious link in a text, downloading a fraudulent app,
or some other way you accidentally let them in.
It turns out that's not necessarily so—not even on the iPhone, where simply receiving an iMessage could be enough to get yourself hacked.
At the Black Hat security conference in Las Vegas on Wednesday, Google Project Zero researcher Natalie Silvanovich is presenting multiple so-called “interaction-less” bugs in Apple’s iOS iMessage client that could be exploited to gain control of a user’s device. And while Apple has already patched six of them, a few have yet to be patched...
The six vulnerabilities Silvanovich found—with more yet to be announced—would potentially be worth millions or even tens of millions of dollars on the exploit market. more
Our 41 Smartphone Security Tips.
It turns out that's not necessarily so—not even on the iPhone, where simply receiving an iMessage could be enough to get yourself hacked.
At the Black Hat security conference in Las Vegas on Wednesday, Google Project Zero researcher Natalie Silvanovich is presenting multiple so-called “interaction-less” bugs in Apple’s iOS iMessage client that could be exploited to gain control of a user’s device. And while Apple has already patched six of them, a few have yet to be patched...
The six vulnerabilities Silvanovich found—with more yet to be announced—would potentially be worth millions or even tens of millions of dollars on the exploit market. more
Our 41 Smartphone Security Tips.
The Avaya Phone Bug – Back From the Dead
Experts at McAfee Advanced Threat Research say they were just doing
general studies of Avaya desk phone security when they stumbled on the
reincarnated bug.
An attacker could exploit it to take over the phone’s operations, extract audio from calls, and even essentially bug the phone to spy on its surroundings.
“It was kind of a holy crap moment,” says Steve Povolny, McAfee's head of advanced threat research...
Though a fix is now available (again), the McAfee researchers note that it will take time for the patch to distribute out to all the corporate and institutional environments where vulnerable phones are lurking on every desk. more
My past posts about Avaya eavesdropping vulnerabilities.
Update: Avaya is second only to Cisco in the enterprise VoIP market, and is used by almost all of the Fortune 100. The company's response and advisory notice can be found here.
An attacker could exploit it to take over the phone’s operations, extract audio from calls, and even essentially bug the phone to spy on its surroundings.
“It was kind of a holy crap moment,” says Steve Povolny, McAfee's head of advanced threat research...
Though a fix is now available (again), the McAfee researchers note that it will take time for the patch to distribute out to all the corporate and institutional environments where vulnerable phones are lurking on every desk. more
My past posts about Avaya eavesdropping vulnerabilities.
Update: Avaya is second only to Cisco in the enterprise VoIP market, and is used by almost all of the Fortune 100. The company's response and advisory notice can be found here.
Wednesday, August 7, 2019
Security Director Alert: Check for Unsecured Wi-Fi Printers
A group of hackers linked to Russian spy agencies are using "internet of
things" devices like printers and internet-connected phones to break
into corporate networks, Microsoft announced on Monday. more
We see this vulnerability at approximately a third of the corporations where we conduct inspections. It is a very common issue. Very dangerous.
Q. "So, why does this happen so often?"
A. When initially outfitting the office the IT Department usually does a good job of turning on encryption for Wi-Fi Access Points, and the things connecting to them.
Later, someone decides they need their own printer. It arrives. It is plugged in. Nobody thinks about turning on the encryption.
Often, the Wi-Fi feature of the printer is not even used, but it's on by default. The company network is now subject to compromise.
The only way to know if you have this issue is to look for it. Have your IT Department check periodically, or have us do it, but do it. ~Kevin
We see this vulnerability at approximately a third of the corporations where we conduct inspections. It is a very common issue. Very dangerous.
Q. "So, why does this happen so often?"
A. When initially outfitting the office the IT Department usually does a good job of turning on encryption for Wi-Fi Access Points, and the things connecting to them.
Later, someone decides they need their own printer. It arrives. It is plugged in. Nobody thinks about turning on the encryption.
Often, the Wi-Fi feature of the printer is not even used, but it's on by default. The company network is now subject to compromise.
The only way to know if you have this issue is to look for it. Have your IT Department check periodically, or have us do it, but do it. ~Kevin
Labels:
#hack,
#IoT,
advice,
business,
computer,
cybersecurity,
encryption,
photocopier
Business Security Trend: Proactive Information Security... Legislated by law!
via Brian G. Cesaratto, Epstein Becker Green
New York is the latest state to adopt a law that requires businesses that collect private information on its residents to implement reasonable cybersecurity safeguards to protect that information.
New York now joins California, Massachusetts and Colorado in setting these standards. New York’s law mandates the implementation of a data security program, including measures such as risk assessments, workforce training and incident response planning and testing.
Businesses should immediately begin the process to comply with the Act’s requirements effective March 21, 2020.
Notably, New York’s law covers all employers, individuals or organizations, regardless of size or location, which collect private information on New York State residents.
In order to achieve compliance, an organization must implement a data security program that includes:
New York is the latest state to adopt a law that requires businesses that collect private information on its residents to implement reasonable cybersecurity safeguards to protect that information.
New York now joins California, Massachusetts and Colorado in setting these standards. New York’s law mandates the implementation of a data security program, including measures such as risk assessments, workforce training and incident response planning and testing.
Businesses should immediately begin the process to comply with the Act’s requirements effective March 21, 2020.
Notably, New York’s law covers all employers, individuals or organizations, regardless of size or location, which collect private information on New York State residents.
In order to achieve compliance, an organization must implement a data security program that includes:
- reasonable administrative safeguards that may include designation of one or more employees to coordinate the security program, identification of reasonably foreseeable external and insider risks, assessment of existing safeguards, workforce cybersecurity training, and selection of service providers capable of maintaining appropriate safeguards and requiring those safeguards by contract;
- reasonable technical safeguards that may include risk assessments of network, software design and information processing, transmission and storage, implementation of measures to detect, prevent and respond to system failures, and regular testing and monitoring of the effectiveness of key controls; and
- reasonable physical safeguards that may include detection, prevention and response to intrusions, and protections against unauthorized access to or use of private information during or after collection, transportation and destruction or disposal of the information.
AT&T Employees Took Bribes to Plant Malware
AT&T employees took bribes to unlock millions of smartphones, and to install malware and unauthorized hardware on the company's network, the Department of Justice said yesterday...
The bribery scheme lasted from at least April 2012 until September 2017...
The two recruited AT&T employees by approaching them in private via telephone or Facebook messages. Employees who agreed, received lists of IMEI phone codes which they had to unlock for sums of money. more
Remember this survey from 2016? "One in five employees said they would sell their passwords."
The Point: Quarterly Technical Information Security Surveys mitigate this risk, and prove due diligence.
Monday, August 5, 2019
Spy Tip: How to Break Out of Automated Phone Trees
Tired of Talking to a Voice Robot?
Want to Talk with a Human?
Skip the cue.
Try...
Want to Talk with a Human?
Skip the cue.
Try...
- Dial O, or try multiple zeros.
- You can add the # key or the * key before and after a 0.
- Dial multiples of other numbers 1111, 2222, 3333, 4444, etc.
- Being silent sometimes works (believe it or not some people still have rotary phones).
- Speak non-sensible phrases to confuse computer.
- Try speaking and repeating "Operator" or "Customer Service".
- If there is a company directory, press just one letter and then try to connect to that person and then may transfer you or give you an inside phone number.
- Make sure once you get a human, ask for the direct line to call.
Wallet, Keys, Bag Packed... Ooopps, Forgot the Post-it Notes
When airline seatback entertainment systems started to come bundled with little webcams, airlines were quick to disavow their usage, promising that the cameras were only installed for potential future videoconferencing or gaming apps, and not to allow the crew or airline to spy on passengers in their seats.
Enter Hong Kong's Cathay Pacific, the country's flagship airline, which has just amended its privacy policy to reveal that it is recording its passengers as they fly, as well as gathering data on how individual passengers spend time in airport terminals, and even brokered data on their use of rivals' hotel and airplane loyalty programs.
But don't worry, the company promises it will take "commercially reasonable" cybersecurity measures to keep all that data from leaking. more
Enter Hong Kong's Cathay Pacific, the country's flagship airline, which has just amended its privacy policy to reveal that it is recording its passengers as they fly, as well as gathering data on how individual passengers spend time in airport terminals, and even brokered data on their use of rivals' hotel and airplane loyalty programs.
But don't worry, the company promises it will take "commercially reasonable" cybersecurity measures to keep all that data from leaking. more
Amazon Alexa's New Dump the Human Eavesdropping Switch
Alexa users who don’t want their recordings reviewed by third-party contractors finally have an option to opt-out...
Unfortunately, Amazon has never made opting-out of data collection on its devices particularly easy, and this new policy doesn’t buck that trend.
According to Bloomberg, users need to dig into their settings menu, then navigate to “Alexa Privacy,” and finally tap “Manage How Your Data Improves Alexa” to see the following text: “With this setting on, your voice recordings may be used to develop new features and manually reviewed to help improve our services. Only an extremely small fraction of voice recordings are manually reviewed.” more
Unfortunately, Amazon has never made opting-out of data collection on its devices particularly easy, and this new policy doesn’t buck that trend.
According to Bloomberg, users need to dig into their settings menu, then navigate to “Alexa Privacy,” and finally tap “Manage How Your Data Improves Alexa” to see the following text: “With this setting on, your voice recordings may be used to develop new features and manually reviewed to help improve our services. Only an extremely small fraction of voice recordings are manually reviewed.” more
Subscribe to:
Posts (Atom)