Track

now browsing by tag

 
 

Police track down hacker suspects wanted by FBI

30291121-01_big

Source: National Cyber Security – Produced By Gregory Evans

Police track down hacker suspects wanted by FBI

TOURISM police have detained two foreign suspects who allegedly stole the equivalent of billions of baht online from people in many countries. The suspects have been identified as Russian Dmitry Ukrainskiy, 44, and Uzbek Olga Komova, 25. They were arrested at the request of the FBI, which began investigating the duo in 2014 after intercepting […]

The post Police track down hacker suspects wanted by FBI appeared first on National Cyber Security.

View full post on National Cyber Security

Apps to Help Keep Track of What Your Kids Are Doing Online

View full post on Common Sense Blog – Parenting, media, and everything in between – No name







#pso #htcs #b4inc

Read More

The post Apps to Help Keep Track of What Your Kids Are Doing Online appeared first on Parent Security Online.

View full post on Parent Security Online

How experts track global cyber criminals

http---com.ft.imagepublish.prod.s3.amazonaws (1)

Source: National Cyber Security – Produced By Gregory Evans

If President Barack Obama was correct when he blamed the 2014 Sony Pictures cyber attack on the North Korean government, then Pyongyang was also likely responsible for the recent digital assaults on banks using the Swift network. But the president might have been wrong, as several cyber security specialists suggested at the time. If so, […]

The post How experts track global cyber criminals appeared first on National Cyber Security.

View full post on National Cyber Security

Using just your phone number hackers can spy your calls texts track your movements

1457884066-2504

German security experts say hacking into a smartphone is much easier than one would think giving digital thieves the ability to potentially track a person’s calls, texts and whereabouts. To demonstrate their findings, a team of experts spied on a phone used by US Congressman Ted Lieu from California, a member of the House Oversight and Reform Subcommittee on Information Technology, who agreed to use an off-the-shelf iPhone knowing it would be hacked.

In an interview with “60 Minutes” correspondent Sharyn Alfonsi, Berlin-based Karsten Nohl of Security Research Labs and a team of hackers highlighted how digital pickpockets can exploit mobile phones using a flaw in a global mobile network called Signalling System Seven (SS7) – a little-known, but essential network that connects mobile phone carriers across the globe
Using the congressman’s phone number, Nohl, who has a doctorate in computer engineering from the University of Virginia, was able to exploit that flaw to intercept and record calls, view his contacts, read his texts and even track his movements.

“Any choices that a congressman could’ve made, choosing a phone, choosing a pin number, installing or not installing certain apps, have no influence over what we are showing because this is targeting the mobile network,” said Nohl.

They also automatically logged the number of every phone that called Congressman Lieu as well. Lieu said this list, in a typical congressman’s phone, could include other members of Congress and elected officials.

“First, it’s really creepy. And second, it makes me angry,” said Lieu. “They could hear any call of pretty much anyone who has a smartphone. It could be stock trades you want someone to execute. It could be calls with a bank. Last year, the president of the United States called me on my cellphone. And we discussed some issues. So if the hackers were listening in, they would know that phone conversation. And that’s immensely troubling.”

A significant risk to political leaders, business executives and high-ranking officials whose private phone conversations could fetch a high price in the Dark Web, Nohl says the SS7 flaw is actually an open secret among the world’s intelligence agencies. He also notes that the key flaw lies in the mobile network itself.

“Mobile networks are the only place in which the problem can be solved,” said Nohl. “There is no global policing of SS7. Each mobile network has to move — to protect their customers on their networks. And that is hard.” According to Nohl, all phones are the same and no one phone is more secure than the other.

Hacker and co-founder of the mobile security company Lookout, John Hering, also assembled a group of ace hackers in a hotel room with the 60 Minutes team. The group of hackers who were in Las Vegas for Defcon – one of the largest hacker conferences in the world – try to identify security vulnerabilities in order to protect the public.

They created a “ghost” version of the hotel’s Wi-Fi, which Alfonsi connected to, through a process called “spoofing”. Once she was connected, they were able to access her email, pull her phone number, credit card information, recent purchases and track her movements using ride-sharing app records. They could also take control of her phone’s camera.

Hering does note that while the average person isn’t likely to be exposed to these types of attacks, it is important to be aware of the possibility of such security breaches.

“Our goal was to show what’s possible,” said Hering. “So people can really understand if we don’t address security issues, what the state of the world will be. We live in a world where we cannot trust the technology that we use.”

These findings come amid rising concerns about the growing threat of cybercrime that ranges from identity theft and high-profile security breaches to cyberwar and cyberterrorism. According to the 2015 Identity Fraud Study released by Javelin Strategy & Research, as much as $16bn (£11.2bn) was stolen from 12.7 million US consumers in 2014 which means there was a new identity fraud victim every two seconds that year. Business on the Dark Web is also booming, according to a report by Dell, where “customer-friendly” hackers offer a variety of illicit goods and services on the cheap.
Source:http://www.ibtimes.co.uk/hackers-can-spy-your-calls-texts-track-your-movements-using-just-your-phone-number-experts-say-1555386

Related Post

The post Using just your phone number hackers can spy your calls texts track your movements appeared first on AmIHackerProof.com.

View full post on AmIHackerProof.com

Collecting FBI partner on track to dodge jail- child porn.

1459933146020

A cybersecurity taskforce chief turned child pornography collector seems poised to dodge prison – and live across the street from a Seattle elementary school.
Before agents arrived at his house across from Ballard’s West Woodland Elementary School, security consultant Brian Haller led the Seattle chapter of an FBI/private-sector group tasked with fighting computer crime and cyberterrorism. Haller had access to a secure FBI online platform and email system, though he is not alleged to have used either to collect child porn.
Haller was one of the smaller fish caught in an expansive FBI sting last year. Agents found the law enforcement insider used a “dark web” service – a Tor network site – to collect 600 files capturing the sexual abuse and exploitation of countless children.

Read More

The post Collecting FBI partner on track to dodge jail- child porn. appeared first on Parent Security Online.

View full post on Parent Security Online

Hacking Facebook and WhatsApp signals to track 4G/LTE smartphone’s precise locations

Source: National Cyber Security – Produced By Gregory Evans

Hacking Facebook and WhatsApp signals to track 4G/LTE smartphone’s precise locations

Researchers have made a low-cost gadget to track the precise location of smartphones using 4G/LTE by hacking Facebook and WhatsApp signals. It was earlier thought that though such attacks could be targeted against the 2G and 3G enabled smartphones and 4G/LTE enabled smartphones are immune. to such attacks Security researchers have revealed how simply contacting somebody via WhatsApp or Facebook messenger can reveal a smartphone owner’s location by exploiting a security flaw in 4G mobile networks. According to researchers, a hacker could use the apps to discover the supposedly anonymised identifiers that are assigned to devices when they connect to a network. This can than be used to track their precise location. 4G/LTE enabled smartphones are expected to have a user base of about 1.37 billion people by the end of the year. The researchers assembled a $1,400 gadget which runs on freely available open-source software. The contraption can target 4G/LTE smartphones to leak their location to within a 32- to 64-foot (about 10 to 20 meter) radius and in some cases their GPS coordinates. The researchers said only tech savvy smartphone users can detect any intrusion made by their gadget. They also said that there exists a separate method that can track the […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Hacking Facebook and WhatsApp signals to track 4G/LTE smartphone’s precise locations appeared first on National Cyber Security.

View full post on National Cyber Security

Cyber Sleuths Track Hacker to China’s Military

Source: National Cyber Security – Produced By Gregory Evans

The email attachment would tempt anyone following the diplomaticstandoff between China and other countries in the South China Sea. The Microsoft Word document contained text and photos depicting Thai naval personnel capturing Vietnamese fishermen and forcing them to kneel at gunpoint. But the attachment was a decoy: Anyone who opened it inadvertently downloaded software that searched their computers for sensitive information and sent it to an obscure corner of the Internet. Manning that corner, according to a new report from U.S. security researchers, was Ge Xing, a member of a Chinese military reconnaissance unit. The growing reach of China’s army of cyberwarriors has become a flash point in relations between Beijing and Washington that President Barack Obama said will be a focus during Chinese President Xi Jinping ’s state visit to the U.S. this week. Cyberspace is the newest domain in warfare, and China’s relentless testing of its boundaries has flustered the U.S. The story of the Chinese military staffer’s alleged involvement in hacking provides a detailed look into Beijing’s sprawling state-controlled cyberespionage machinery. Mr. Ge doesn’t appear to fit the hacker stereotype. His published academic papers identify him as an expert in a nontechnical subject: Thai politics. Frequent posts […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Cyber Sleuths Track Hacker to China’s Military appeared first on National Cyber Security.

View full post on National Cyber Security

The Brazil-U.S. Cyber Relationship Is Back on Track

Source: National Cyber Security – Produced By Gregory Evans

Alex Grigsby is the assistant director for the Digital and Cyberspace Policy program at the Council on Foreign Relations. Brazilian President Dilma Rousseff’s was in Washington D.C. this week to meet with President Obama. The trip came two years after she had famously cancelled a state visit in 2013 in protest following allegations that the NSA had spied on Brazil and Rousseff personally. At the time, the Brazilian president was very public and vocal in her denunciations, calling the espionage “manifestly illegitimate” and expressing her outrage at the United Nations. While the U.S.-Brazil cyber relationship hit the rocks in the immediate aftermath of the Snowden disclosures, it seems like time and some deft diplomacy has helped patch things up. At this year’s Summit of the Americas, Rousseff indicated that she’s moved on. Things have improved so much in fact that the Rousseff-Obama joint communiqué dedicated five paragraphs to Internet issues. Most importantly, both leaders have agreed to resume the Brazil-U.S. cyber working group. The United States and Brazil share the understanding that global Internet governance must be transparent and inclusive, ensuring full participation of governments, civil society, private sector and international organizations, so that the potential of the Internet as a powerful tool for economic and […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post The Brazil-U.S. Cyber Relationship Is Back on Track appeared first on National Cyber Security.

View full post on National Cyber Security

Scientists track dating scams and other feel-good frauds

Here’s a perfect fraud. You commit a crime but your victim has such a good time he doesn’t even think he’s been conned. It turns out this is the kind of swindle that is prevalent in China’s largest dating service operated by Jiayuan, according to a joint study by the company and researchers from University College London. Read More….

The post Scientists track dating scams and other feel-good frauds appeared first on Dating Scams 101.

View full post on Dating Scams 101

Where are your kids? Apps, programs let parents track teens’ location and monitor digital lives

Every afternoon, Bronx mom Jayra Paredes checks her phone to track her kids on a map and make sure they’re where they said they’d be.

“After school, we’re like. ‘OK, where are they?’ It’s peace of mind for me,” said Paredes, who uses T Mobile’s Family Where.

The $9.99-a-month tracking app pinpoints the location of each phone on Paredes’ family account, and will send alerts if someone doesn’t arrive at a certain landmark on time or turns off the device.

“It sounds kind of overprotective, but I want to know where my kids are . . . My son is fine with it, my daughter’s like, ‘why are you trying to keep track of me?

Read More

The post Where are your kids? Apps, programs let parents track teens’ location and monitor digital lives appeared first on Parent Security Online.

View full post on Parent Security Online