Smartphone owners have been urged to remove certain apps that could be spying on their activity.
Some of the most popular apps you love and have come to rely on could be posing more of a danger than they're worth. Here's what you need to know. ...some of those apps that you love and have come to rely on could actually be putting you at risk... We’ve (Reader's Digest) collected information about some of the worst offenders so that you can make an educated decision about which apps you trust with your privacy and which ones need to go...
CamScanner
Ana Bera is a cybersecurity expert with Safe at Last. She identified CamScanner, an app meant to imitate a scanner with your phone, as one of the apps consumers should be concerned about. “Cybersecurity experts have found a malicious component installed in the app that acts as a Trojan Downloader and keeps collecting infected files,” she explains. “This kind of app can seriously damage your phone and should be de-installed instantly. Luckily, once you remove it from your phone, it is highly unlikely that it will continue harming you.”
Weather apps
“Check your weather app,” says Shayne Sherman, CEO of TechLoris. “There have been several different weather apps out there that have been laced with Trojans or other malwares.” While the most benign of these claims to take your information purely for weather accuracy, he calls that questionable. “Watch your local forecast instead, and if you have Good Weather, delete it now,” he advises. “That one is especially dangerous.”
Facebook
Look, we all love our social networking apps. But cybersecurity expert Raffi Jafari, cofounder and creative director of Caveni Digital Solutions, says, “If you are looking for apps to delete to protect your information, the absolute worst culprit is Facebook. The sheer scale of their data collection is staggering, and it is often more intrusive than companies like Google. If you had to pick one app to remove to protect your data, it would be Facebook.”
WhatsApp
“This is a call to action for users who may be living under a rock and unaware of the vulnerabilities that were disclosed earlier this year,” says Michael Covington, VP of Product for mobile security leader Wandera. “The vulnerabilities with WhatsApp—both iOS and Android versions—allowed attackers to target users by simply sending a specially crafted message to their phone number. Once successfully exploited, the attackers would be granted access to the same things WhatsApp had access to, including the microphone, the camera, the contact list, and more.”
Instagram
Whatsapp and Instagram are both owned by Facebook, which is part of what makes them all a risk. Dave Salisbury, director of the University of Dayton Center for Cybersecurity and Data Intelligence, says that Instagram “requests several permissions that include but are not limited to modifying and reading contacts and the contents of your storage, locating your phone, reading your call log, modifying system settings, and having full network access.” Plus Nine More
Friday, October 13, 2023
Stores Silently Deploying Facial Recognition to Spy on Shoppers
Major retailers in the US are already using facial recognition cameras to spy on shoppers, a campaigning group has warned...
Cameras are being used not just to catch persistent shoplifters, but also to monitor shoppers and analyze their emotions, so that stores can deliver personalized adverts on screens inside the store, George warned...
‘But it’s also being used for marketing purposes, they are gathering information on shoppers and seeing what they are buying and not buying - and using AI tools to analyse the emotions of shoppers and see what sort of ads to direct at them.’ more
Cameras are being used not just to catch persistent shoplifters, but also to monitor shoppers and analyze their emotions, so that stores can deliver personalized adverts on screens inside the store, George warned...
‘But it’s also being used for marketing purposes, they are gathering information on shoppers and seeing what they are buying and not buying - and using AI tools to analyse the emotions of shoppers and see what sort of ads to direct at them.’ more
Intense Competition Leads to Attempted Corporate Espionage
via Lexology - from the Troutman Papper law firm.
Side Note: Troutman Pepper has formed a Corporate Espionage Response Team to help clients combat the increasing incidence of corporate espionage.
Arthur AI, a New York-based AI company, received a request for a Zoom demonstration of its technology from a startup called OneOneThree. The head of technology at OneOneThree, Yan Fung, expressed interest in purchasing Arthur AI’s technology. But there were some immediate red flags.
First, prior to the Zoom meeting, Arthur AI employees recognized that OneOneThree had no website. The Timesarticle says that Fung told Arthur AI at the time that OneOneThree was in “stealth mode,” which is why it had no website. Then, when Arthur AI asked Fung to sign a nondisclosure agreement (NDA), he reportedly asked Arthur AI to “hold off on the NDA,” and Arthur AI agreed.
Despite these issues, a Zoom meeting was arranged to demo the technology. Fung said Karina Patel, OneOneThree’s “main engineer,” would dial in to the meeting. However, during the Zoom meeting, an attendee logged in under the name of Aparna Dhinakaran, which an Arthur AI employee immediately recognized as a founder of Arize AI, a rival startup. When recognized, the attendee quickly logged off. Arthur AI later deduced that Fung was, in fact, an employee of Arize AI named Dat Ngo, and OneOneThree was an inactive company of his.
After the call concluded, one of Arthur AI’s employees messaged Ngo via LinkedIn direct messaging. Ngo responded by trying to recruit the Arthur AI employee, according to the Times article. more
Lessons Learned:
First, prior to the Zoom meeting, Arthur AI employees recognized that OneOneThree had no website. The Timesarticle says that Fung told Arthur AI at the time that OneOneThree was in “stealth mode,” which is why it had no website. Then, when Arthur AI asked Fung to sign a nondisclosure agreement (NDA), he reportedly asked Arthur AI to “hold off on the NDA,” and Arthur AI agreed.
Despite these issues, a Zoom meeting was arranged to demo the technology. Fung said Karina Patel, OneOneThree’s “main engineer,” would dial in to the meeting. However, during the Zoom meeting, an attendee logged in under the name of Aparna Dhinakaran, which an Arthur AI employee immediately recognized as a founder of Arize AI, a rival startup. When recognized, the attendee quickly logged off. Arthur AI later deduced that Fung was, in fact, an employee of Arize AI named Dat Ngo, and OneOneThree was an inactive company of his.
After the call concluded, one of Arthur AI’s employees messaged Ngo via LinkedIn direct messaging. Ngo responded by trying to recruit the Arthur AI employee, according to the Times article. more
Lessons Learned:
- Require NDAs Every Time.
- Perform Proper Due Diligence and Act Consistently With Your Findings.
- Only Use Secure Communication Channels and Restrict Recording.
- Train Employees on Spotting and Responding to Potential Threats.
- Conduct a Prompt and Careful Investigation Into Suspected Activity.
Apple AirTag: Police Official Accused of Stalking
CA - A high-ranking Los Angeles Police Department official has been demoted and is facing the possibility of termination after being accused of stalking a fellow officer with whom he was romantically involved...
The female officer who accused Labrada of stalking contacted Ontario police after she discovered an AirTag — a small tracking device that can be attached to personal items — among her possessions, according to two sources familiar with the case.
A group of officers from a since-disbanded San Fernando Valley gang unit is under investigation for, among other misconduct, allegedly using the devices to track suspects without court authorization...
Ontario police had been investigating the stalking allegations, but the San Bernardino County district attorney’s office said Wednesday it did not have enough evidence to pursue charges against Labrada. more
The female officer who accused Labrada of stalking contacted Ontario police after she discovered an AirTag — a small tracking device that can be attached to personal items — among her possessions, according to two sources familiar with the case.
A group of officers from a since-disbanded San Fernando Valley gang unit is under investigation for, among other misconduct, allegedly using the devices to track suspects without court authorization...
Ontario police had been investigating the stalking allegations, but the San Bernardino County district attorney’s office said Wednesday it did not have enough evidence to pursue charges against Labrada. more
Monday, October 9, 2023
China Is Becoming a No-Go Zone for Executives
Foreign executives are scared to go to China.
Their main concern: They might not be allowed to leave.
Beijing’s tough treatment of foreign companies this year, and its use of exit bans targeting bankers and executives, has intensified concerns about business travel to mainland China. Some companies are canceling or postponing trips. Others are maintaining travel plans but adding new safeguards, including telling staff they can enter the country in groups but not alone.
“There is a very significant cautionary attitude toward travel to China,” said Tammy Krings, chief executive of ATG Travel Worldwide, which works with large employers around the world. “I would advise mission-critical travel only.” Krings said she has seen a roughly 25% increase in cancellations or delays of business trips to China by U.S. companies in recent weeks. more
“There is a very significant cautionary attitude toward travel to China,” said Tammy Krings, chief executive of ATG Travel Worldwide, which works with large employers around the world. “I would advise mission-critical travel only.” Krings said she has seen a roughly 25% increase in cancellations or delays of business trips to China by U.S. companies in recent weeks. more
Where The Spies Are
There are about 80 Russian spies in Switzerland, which is about one-fifth of the total number of Russian agents in Europe. Source: Neue Zürcher Zeitung, citing the Swiss Federal Intelligence Service, as reported by European Pravda
Details: European states have been actively countering the Russian intelligence network, expelling employees of Russian embassies since the beginning of Russia's full-scale invasion of Ukraine in February 2022.
Details: European states have been actively countering the Russian intelligence network, expelling employees of Russian embassies since the beginning of Russia's full-scale invasion of Ukraine in February 2022.
However, Switzerland did not resort to such a step due to the long tradition of neutrality. The estimates of the intelligence service, shared with members of parliament in September, indicate that there are currently about 80 Russian agents in the country.
A representative of the Swiss Department of Foreign Affairs in an interview with NZZ emphasized that the country's government "does not impose any sanctions in the form of expelling diplomats", adding that communication channels with Russia should be preserved. more
Fine... Feathered Drones Now
Boffins create drone that flies exactly like a bird to blend in on spying missions.
This drone flies exactly like a bird so it blends in on spying missions. The wing-flapping robot mimics the natural flight of its feathered counterparts. The Icelandic company behind it, said it could be for military or private use. Silent Flyer UAV went on display during the DroneX expo at East London’s ExCel centre. It is designed by Icelandic company Flygildi.
Earlier this year we revealed creepily realistic drones made from dead birds were being developed by scientists. more
Earlier this year we revealed creepily realistic drones made from dead birds were being developed by scientists. more
How New Corporate Espionage Techniques Are Born, or... Their Next App Attack
In a university somewhere (guess where) students are working on this...
"Introduction: Snooping keystrokes (a.k.a., keystroke inference attacks) seriously threaten information security and privacy.
By launching such an attack, an adversary has an opportunity to steal sensitive information such as accounts, passwords, credit card numbers, SSNs, and conidential (sic) documents[1, 15, 29, 30] from the victims when they are typing on a keyboard.
Smartphone-based snooping [15, 18, 24] further eases the launching when an adversary could intentionally leave his own smartphone near the victim’s keyboard.
Furthermore, an attacker could spread a malicious mobile app (e.g., in app markets) that pretends to be a normal audio playing and recording application but stealthily collects user’s keystroke data over the Internet. He may afect (sic) a large volume of smartphones and enable large-scale keystroke inference attacks as shown in Fig. 1..." more
Wednesday, October 4, 2023
If Ants Can be Tricked, What Chance do Corporations Have?
A cautionary tale for corporations that think they are espionage-proof.
In a study in the journal Science, researchers report that blue butterfly caterpillars infiltrate red ant colonies and grub food by mimicking the raspy sound of the ant queen.
It’s good to be the Queen. You get fed and cared for and generally treated like royalty. But if you’re a blue butterfly caterpillar, you can get the same benefits by just pretending to be queen. Because these crafty caterpillars trick ants into feeding them—by mimicking the sound of their queen.
Ants are social creatures whose colonies contain a queen ant, and hordes of worker ants who feed the queen and take care of all her young. Blue butterfly caterpillars have come up with clever ways to exploit that system. These parasitic caterpillars take up residence in the nests of red ants. And they mooch free meals in part by waggling their heads to beg for food like all the other ant grubs.
In a study in the journal Science, researchers report that blue butterfly caterpillars infiltrate red ant colonies and grub food by mimicking the raspy sound of the ant queen.
It’s good to be the Queen. You get fed and cared for and generally treated like royalty. But if you’re a blue butterfly caterpillar, you can get the same benefits by just pretending to be queen. Because these crafty caterpillars trick ants into feeding them—by mimicking the sound of their queen.
Ants are social creatures whose colonies contain a queen ant, and hordes of worker ants who feed the queen and take care of all her young. Blue butterfly caterpillars have come up with clever ways to exploit that system. These parasitic caterpillars take up residence in the nests of red ants. And they mooch free meals in part by waggling their heads to beg for food like all the other ant grubs.
But that’s not all. Scientists using sophisticated recording equipment were able to listen to the caterpillars chatter. And found that the interlopers imitated the sounds of an adult queen. more
- Your company is filled with hard-working, innocent, social creatures.
- Anyone bent on corporate espionage knows they just have to blend in.
- They will listen to your sounds.
- They will exploit your system.
- They will imitate loyalty.
- They will eat your lunch.
- Fight back.
Monday, October 2, 2023
FutureWatch - Robot Eavesdropping Microphone Smart Swarms
by Nick Bil
With the help of modern technology, muting distracting voices in video calls has become a simple process. With just a few clicks, you can silence unwanted background noise and side conversations, ensuring that the primary speaker's message remains clear and uninterrupted. This is largely possible due to the sophisticated audio processing algorithms and noise cancellation features built into video conferencing software...
One can take precautions to minimize background noise and encourage attendees to be considerate, but there is no easy technological solution to separate voices cleanly from a shared physical space. That may change in the near future, however, thanks to a swarm of robotic smart microphones that was recently developed by researchers at the University of Washington. The robots autonomously navigate around a room to distribute themselves optimally, then they run onboard deep learning algorithms to identify and track the position of each individual speaker.
The robots are powered by Nordic Semiconductor nRF52840 microcontroller, with a Bluetooth Low Energy module added for wireless communication capabilities. By selecting a sufficiently powerful microcontroller, the algorithms can run on-device, sidestepping any privacy concerns associated with sending a stream of audio to a cloud service. A gyroscope and accelerometer provide odometry information, and a pair of micro motors provide for locomotion. A pair of microphones and a speaker are onboard, and the entire system is powered by a rechargeable LiPo battery.
Each of the circular, wheeled robots is about an inch across. After deployment from a charging station, they all travel in different directions, emitting high frequency sounds to communicate with one another and make sure they are spread out as far as possible from one another. These high-pitched chirps also keep the robots from falling off of tables or bumping into other obstacles.
Each of the circular, wheeled robots is about an inch across. After deployment from a charging station, they all travel in different directions, emitting high frequency sounds to communicate with one another and make sure they are spread out as far as possible from one another. These high-pitched chirps also keep the robots from falling off of tables or bumping into other obstacles.
By feeding audio information into a deep neural network, including the delay in time with which a particular voice arrives at microphones in different positions, the team found that it was possible to locate and track individual speakers in space. And the algorithm proved to be accurate enough to distinguish between speakers, even if they had similar sounding voices and were near to one another. Experiments showed that the present system was able to accurately distinguish between nearby individuals 90% of the time. Importantly, this was accomplished without prior information about the individuals, so no initial training session is required to calibrate the device...
And further down the road yet, they plan to explore incorporating noise-canceling technologies into the robots. That addition could allow them to mute noisy areas in physical locations, producing a sci-fi-like cone of silence. more
Time for an espionage sequel to the movie Runaway (1984)?
Monday, September 25, 2023
Legacy Systems Threaten Security in Mergers & Acquisitions
Here’s a simple fact: Legacy systems are far more likely to get hacked. This is especially true for companies that become involved in private equity transactions, such as mergers, acquisitions, and divestitures...
We have seen two primary trends throughout 2023:
– Threat groups are closely following news cycles, enabling them to quickly target entire portfolios with zero-day attacks designed to upend aging technologies — disrupting businesses and their supply chains.
– Corporate espionage cases are also on the rise as threat actors embrace longer dwell times and employ greater calculation in methods of monetizing attacks. more
We have seen two primary trends throughout 2023:
– Threat groups are closely following news cycles, enabling them to quickly target entire portfolios with zero-day attacks designed to upend aging technologies — disrupting businesses and their supply chains.
– Corporate espionage cases are also on the rise as threat actors embrace longer dwell times and employ greater calculation in methods of monetizing attacks. more
Malaysian Police Investigate Spycam Found in Newlywed Couple’s Airbnb
Malaysian police investigate after spycam found in newlywed Chinese couple’s Airbnb room...
The device was installed inside a wall power socket in a room of a lodging establishment in Sabah
The case came to light after the tourists shared their ordeal on Chinese social media
Malaysian police are looking for those responsible for placing a hidden camera within a wall power socket in a room of a lodging establishment in Sabah state where a newlywed Chinese couple had stayed in earlier this month...
A probe had been conducted at the said premises, he said, adding they have seized the spycam in question. more
The device was installed inside a wall power socket in a room of a lodging establishment in Sabah
The case came to light after the tourists shared their ordeal on Chinese social media
Malaysian police are looking for those responsible for placing a hidden camera within a wall power socket in a room of a lodging establishment in Sabah state where a newlywed Chinese couple had stayed in earlier this month...
A probe had been conducted at the said premises, he said, adding they have seized the spycam in question. more
Disrupting Time: Industrial Combat, Espionage, and...
This week, Aaron Stark joins the show to discuss his new book Disrupting Time: Industrial Combat, Espionage, and the Downfall of a Great American Company, which chronicles an attempt by a foreign power to infiltrate, emulate, and eventually annihilate a great American company.
In the late 19th century, watches were at the forefront of technological innovation, and the Waltham Watch Company made some of the finest watches in the world. Unlike their Swiss competitors, whose products were fancy, handcrafted works of art, the Watham company specialized in mass produced, affordable, and reliable watches for the masses.
At an 1876 World’s Fair, they announced their arrival on the world’s stage, and the world took notice. The Swiss, in particular, took notice, and they took it by sending spies to steal the secrets of Waltham’s success. more
Secret ‘James Bond’ Tunnels May Become a Tourist Attraction
A subterranean space once used by British spies has been sold to fund manager Angus Murray, who has grand ambitions for it.
A warren of tunnels beneath central London, once used by the spies who inspired the creation of James Bond, has been bought by a fund manager with a £220 million ($269 million) plan to turn them into a tourist attraction “as iconic as the London Eye.” more
World Spy News Roundup
Canada Finds Smoking Gun In Nijjar Killing After Spying On India more
5 Bulgarians charged with espionage | Spying for Russia more
EU tells China spy and sanction laws could spook investors more more
10 Underrated Movies Based on Actual Real-Life Spies more
Spies in America who stole and sold U.S. secrets | 60 Minutes YouTube
Hamas Operative Arrested on Suspicion of Spying for Israel, Lebanese Media Report more
An award-winning London beautician accused of spying for Russia told her customers she had no interest in politics. more more
Ethiopian Contractor Charged For Spying In US more U.S. government contractor was charged with delivering national defense information to aid a foreign government. more
Exclusive Interview With Ukraine’s Spy Boss From His D.C. Hotel Room more
The Spy Inside Your Smartphone more
Norway drops spying claims against foreign student, says he's being held now for a 'financial crime' more
5 Bulgarians charged with espionage | Spying for Russia more
EU tells China spy and sanction laws could spook investors more more
10 Underrated Movies Based on Actual Real-Life Spies more
Spies in America who stole and sold U.S. secrets | 60 Minutes YouTube
Hamas Operative Arrested on Suspicion of Spying for Israel, Lebanese Media Report more
An award-winning London beautician accused of spying for Russia told her customers she had no interest in politics. more more
Ethiopian Contractor Charged For Spying In US more U.S. government contractor was charged with delivering national defense information to aid a foreign government. more
Exclusive Interview With Ukraine’s Spy Boss From His D.C. Hotel Room more
The Spy Inside Your Smartphone more
Norway drops spying claims against foreign student, says he's being held now for a 'financial crime' more
Subscribe to:
Posts (Atom)