members

now browsing by tag

 
 

#sextrafficking | Bloods Gang Members Indicted for Sex Trafficking Ring in Multiple Bronx Motels | #tinder | #pof | romancescams | #scams

By SÍLE MOLONEY Motel Photo by Steven Lewis on Unsplash Bronx District Attorney Darcel D. Clark and New York City Police Commissioner Dermot Shea announced on Dec. 23 that nine […] View full post on National Cyber Security

#sextrafficking | Federal court in Virginia charges alleged MS-13 members with sexual trafficking of girl, 13 | #tinder | #pof | #match | romancescams | #scams

A federal court in Virginia presented charges against 11 purported members and associates of the vicious MS-13 gang in connection with the sexually exploiting and beating a 13-year-old girl. The […] View full post on National Cyber Security

Facebook Reveals New Data Leak Incident Involving Groups’ Members

Source: National Cyber Security – Produced By Gregory Evans

facebook groups data leak

Facebook today revealed yet another security incident admitting that roughly 100 app developers may have improperly accessed its users’ data in certain Facebook groups, including their names and profile pictures.

In a blog post published Tuesday, Facebook said the app developers that unauthorizedly access this information were primarily social media management and video streaming apps that let group admins manage their groups more effectively and help members share videos to the groups, respectively.

For those unaware, Facebook made some changes to its Group API in April 2018, a month after the revelation of the Cambridge Analytica scandal, limiting apps integrated with a group to only access information, like the group’s name, the number of members and the posts’ content.

To get access to additional information like names and profile pictures of members in connection with group activities, group members had to opt-in.

However, it seems like Facebook once again failed to protect its users’ information despite the company changing its Group API access parameters back in April 2018.

In an ongoing review, Facebook said it found that the developers of some apps retained the ability to access Facebook Group member information from the Groups API for longer than the company intended.

Though Facebook did not disclose the total number of users affected by the leak or if the data also involved other information beyond just names and profile pictures, the company did assure its users that it stopped all unauthorized access to the data and that it found no evidence of abuse.

“Although we’ve seen no evidence of abuse, we will ask them to delete any member data they may have retained, and we will conduct audits to confirm that it has been deleted,” the company said.

Facebook also believes that the number of app developers that actually accessed this data is smaller and decreased over time, as it says that of roughly 100 app developers retaining user data access through Groups API since the last 18 months, “at least 11 partners accessed group members’ information in the last 60 days.”

In July, Facebook agreed to pay a $5 billion fine as a settlement with the Federal Trade Commission (FTC) over the Cambridge Analytica scam and also accepted a 20-year-long agreement with the FTC that enforces new guidelines for how the social media handles its users’ privacy and their data.

“[T]he new framework under our agreement with the FTC means more accountability and transparency into how we build and maintain products,” Facebook said.

“As we continue to work through this process, we expect to find more examples of where we can improve, either through our products or changing how data is accessed. We are committed to this work and supporting the people on our platform.”

In the recent news surrounding the social media giant, Facebook sued Israeli mobile surveillance firm NSO Group late last month for its involvement in hacking WhatsApp users, including diplomats, government officials, human rights activists, and journalists, using its well-known spyware called Pegasus.

The Original Source Of This Story: Source link

The post Facebook Reveals New Data Leak Incident Involving Groups’ Members appeared first on National Cyber Security.

View full post on National Cyber Security

#hacking | Russian Hacking and Spoofing Threat to NATO Members

Source: National Cyber Security – Produced By Gregory Evans

  • Belgian military will stop using GPS due to the Russia threat.
  • There have been 9,883 suspected incidents of GNSS hacking.
  • Russia can utilize low cost software to send spoofed GPS signals.

The Belgian army will stop using a GPS system due to a heightened risk of Russia’s disruption of the GPS signal. The Global Positioning System, originally NAVSTAR GPS, is a satellite-based radionavigation system owned by the United States government and operated by the US Air Force. The Belgian military will revert to the use of topographic maps and old fashioned compasses.

In modern mapping, a topographic map is a type of map characterized by large-scale detail and quantitative representation of relief, usually using contour lines. The announcement was made via De Morgen, a Flemish newspaper with a circulation of 53,860. The paper is published in Brussels.

Furthermore, Russia has been accused previously by Finland and Norway of interfering with the GPS signal during the NATO Trident Juncture Training exercise. The Trident Juncture 18, abbreviated TRJE18, was a NATO-led military exercise held in Norway in October and November 2018 with an Article 5 collective defence scenario. The exercise was the largest of its kind in Norway since the 1980s.

NATO publicly acknowledged the reckless Russian behavior of GPS signal interference. GPS is also a widely used application in the civilian world, including vehicles, phones, laptops, etc.

The US also believes that GPS is vulnerable to Russian and Chinese hacking. Merchant ships entering the Black Sea have reported the loss of the GPS signal near the Crimea. The same was reported previously in Syria, where the Russian troops were located. Israel accused Russia too of meddling with the GPS signal in their airports.

The Center for Advance Defense (C4ADS) released a report pertaining to the GPS Spoofing in Russia and Syria earlier this year.  C4ADS is a US based nonprofit organization dedicated to data-driven analysis and evidence-based reporting of conflict and security issues worldwide.

C4ADS undertook a year-long study on the numerous attacks that have happened to the Global Navigation Satellite Systems (GNSS), including the U.S.-owned Global Positioning System (GPS). The study shows that there have been 9,883 suspected incidents of GNSS hacking at more than 10 locations, including 1,311 civilian maritime vessel navigation systems since February 2016.

All these instances have a Russian footprint. Navigation systems sound alarms when they recognize jammers. Spoofing systems create false signals that confuse GNSS systems, leading to severe consequences. As per C4ADS, Russia easily can utilize low cost, commercially available ‘software-defined radios’ (SDR) and open-source code capable of transmitting spoofed GPS signals.

Full Report

Russia poses a true danger to the military and civilians in the West using GPS technology. Russia is notorious for hacking and has been utilizing a cyber warfare strategy for some time. The Kremlin conceptualizes cyber operations within the broader framework of information warfare, a holistic concept that includes computer network operations, electronic warfare, psychological operations, and information operations.

Russia is dangerous, due to their assumption of a more assertive cyber posture and based on its willingness to target critical infrastructure systems (GPS) and conduct espionage operations even when detected and even under public scrutiny.

Source link

The post #hacking | Russian Hacking and Spoofing Threat to NATO Members appeared first on National Cyber Security.

View full post on National Cyber Security

Face #ID shown #unlocking for #family #members who aren’t #alike

Source: National Cyber Security – Produced By Gregory Evans

Apple’s Face ID is the safest facial recognition system ever made for smartphones. Unlike its Android alternatives, it can’t be hacked with photos, and it can be used to authenticate mobile payments. It’s a lot more secure than Touch ID, and it’ll likely equip more Apple devices in the future. Even Android device makers are expected to copy Face ID this year.

But Face ID isn’t hackproof. It’s been proven already that young children can hack into their parents’ iPhone X units. Twins and triplets can also unlock the phones belonging to their siblings, especially at young age, and it’s pretty obvious why that happens.

A brand new video shows the same kind of Face ID hack between two family members who aren’t alike.

Posted on YouTube, a short video clip shows a daughter and mother unlocking the same iPhone using Face ID. The daughter isn’t that young, and she’s not so similar to her mother.

The Face ID hack is successful time and again, which is impressive. Somehow, the device thinks the same person is facing the phone, and it’s unlocking the device accordingly.

It’s unclear at this time whether the iPhone was trained to recognize both family members. The way Face ID works is that it keeps taking images of the user whenever the phone is unlocked, to continuously update the mathematical expression assigned to one’s face. By inputting the password after a failed Face ID unlock, you practically instruct the phone to include the most recent scan in its library, especially if it somewhat matches your face. Is this a real hack? Or is it a sort of error where Face ID was simply trained to recognize both faces, and made up some sort of weird mix between the two? After all, the two women are still mother and daughter, so it’s likely Face ID can find more than a few similarities between them.

Here’s a reminder of how Face ID works:

To improve unlock performance and keep pace with the natural changes of your face and look, Face ID augments its stored mathematical representation over time. Upon successful unlock, Face ID may use the newly calculated mathematical representation—if its quality is sufficient—for a finite number of additional unlocks before that data is discarded. Conversely, if Face ID fails to recognize you, but the match quality is higher than a certain threshold and you immediately follow the failure by entering your passcode, Face ID takes another capture and augments its enrolled Face ID data with the newly calculated mathematical representation. This new Face ID data is discarded after a finite number of unlocks and if you stop matching against it. These augmentation processes allow Face ID to keep up with dramatic changes in your facial hair or makeup use, while minimizing false acceptance.

Whatever is allowing this hack to work, Apple should definitely find a way to fix it.

The post Face #ID shown #unlocking for #family #members who aren’t #alike appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

2 more members of ATM skimmer ring plead guilty

Source: National Cyber Security – Produced By Gregory Evans

NEWARK– Two men who were among 13 people accused of using secret card readers and pinhole cameras attached to ATMs to obtain banking information pleaded guilty Thursday, the U.S. Attorney’s Office said. Florin Mares, 49, and Gabriel Mares, 44, of College Point, N.Y., pleaded guilty to conspiracy to commit bank…

The post 2 more members of ATM skimmer ring plead guilty appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Popular dating site accused of misleading members

There is a saying that you cannot put a price tag on love. But according to the North Central Texas Better Business Bureau, that probably does not apply to many. The B.B.B. has received complaints about match.com and their auto-billing services, stemming from what they think is just a one time fee. “The disclosure that they are going to auto bill and set up a reoccurring charge is buried really deep down, three or four pages deep in the box that you are checking to agree,” Monica Horton, President of the Wichita Falls B. Read More….

The post Popular dating site accused of misleading members appeared first on Dating Scams 101.

View full post on Dating Scams 101

Online Dating Site MeetBrides Invites Members to Join Fitness Contest

MeetBrides, Russian online dating website for single people looking for love, has announced the new video contest to provide members with even more interesting dating experience. The video contest will start on the 7th of April 2017 and each member will be able to participate in it. So women members will make wonderful videos where they do sports and men members will be able to enjoy these videos and even choose ladies that they like most. Read More….

The post Online Dating Site MeetBrides Invites Members to Join Fitness Contest appeared first on Dating Scams 101.

View full post on Dating Scams 101

Black members of Congress put pressure on FBI to investigate the missing black girls in Washington, DC that inspired a celebrity-driven social media campaign

Black members of Congress are demanding the FBI get involved in the search for a series of missing black girls in Washington DC, in a case that inspired a high-profile celebrity campaign.
Congressional Black Caucus chairman Cedric Richmond (D-LA), and Del. Eleanor Holmes Norton, who represents the District in Congress, wrote a letter Tuesday asking Attorney General Jeff Sessions and FBI Director James Comey get involved.
Their letter’s existence emerged after #missingdcgirls was tweeted by LL Cool J, Sean ‘Diddy’ Combs and Selma director Ava DuVernay, among others.

The letter, which was obtained by Associated Press on Thursday, called on Sessions and Comey to put money behind the search for the missing kids.

Read More

The post Black members of Congress put pressure on FBI to investigate the missing black girls in Washington, DC that inspired a celebrity-driven social media campaign appeared first on Parent Security Online.

View full post on Parent Security Online

Bo Shen Hackers Hit Again, Ethereum Forum Members Under Threat

Source: National Cyber Security – Produced By Gregory Evans

Bo Shen Hackers Hit Again, Ethereum Forum Members Under Threat

The price of Bitcoin has just hit $860 and social engineers are at it again. The attacker who recently hacked Bo Shen’s account draining his REP and ETH funds, though some were later recovered, has been named in yet another

The post Bo Shen Hackers Hit Again, Ethereum Forum Members Under Threat appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures