now browsing by tag
Source: National Cyber Security – Produced By Gregory Evans Hackers have proven just how urgently a gaping flaw in the global telecoms network, affecting what’s known as Signalling System No. 7 (SS7), needs to be fixed. In a video demonstration, shown to Forbes ahead of publication today, benevolent hackers from Positive Technologies were able to […] View full post on AmIHackerProof.com | Can You Be Hacked?
Source: National Cyber Security – Produced By Gregory Evans The best way to protect sensitive systems from hackers is to use a cryptographic key. For this lock to work it needs to use numbers chosen at random without any structure. This is difficult but a new system is at hand. To communicate in secret a […] View full post on AmIHackerProof.com | Can You Be Hacked?
To Purchase This Product/Services, Go To The Store Link Above Or Go To http://www.become007.com/store/ At least 4 different cases of child abuse were revealed in Turkey only in April this year. A 14-year-old middle-school student in the city of Amasya, for instance, was taken to …
The post Turkish government delays to announce number of child abuse cases appeared first on Become007.com.
View full post on Become007.com
It’s 11am, I”m up to my eyeballs in work, and a man I have yet to meet is asking, via text, how I like to be worshipped. With your silence, is what I’m thinking. Why I chose to relax my no-digits-before-dates rule this time is a mystery. Was it because he asked, politely? Because he seemed charming and harmless? Or was it just boredom? Initially, I greeted his textual come-ons with jokes, then politely demurred when he tried to ratchet it up a notch. Read More….
The post We’ve matched on a dating app, but please don’t ask for my phone number appeared first on Dating Scams 101.
View full post on Dating Scams 101
Cell phone numbers are particularly valuable, as they have become the modern-day equivalent of your wallet. Your mobile device contains valuable information like your contacts list (a great way to get a list of your friends—future identity theft targets), affinity
View full post on National Cyber Security Ventures
Even where users have chosen strong passwords and taken extra security measures, their Facebook accounts are not safe from hackers. Researchers have proven just that by taking control of a Facebook account with only a phone number and some hacking skills to exploit the SS7 network, a core piece of telecoms infrastructure shown to be […]
The post Hackers Can Steal Your Facebook Account With Just A Phone Number appeared first on National Cyber Security.
View full post on National Cyber Security
German security experts say hacking into a smartphone is much easier than one would think giving digital thieves the ability to potentially track a person’s calls, texts and whereabouts. To demonstrate their findings, a team of experts spied on a phone used by US Congressman Ted Lieu from California, a member of the House Oversight and Reform Subcommittee on Information Technology, who agreed to use an off-the-shelf iPhone knowing it would be hacked.
In an interview with “60 Minutes” correspondent Sharyn Alfonsi, Berlin-based Karsten Nohl of Security Research Labs and a team of hackers highlighted how digital pickpockets can exploit mobile phones using a flaw in a global mobile network called Signalling System Seven (SS7) – a little-known, but essential network that connects mobile phone carriers across the globe
Using the congressman’s phone number, Nohl, who has a doctorate in computer engineering from the University of Virginia, was able to exploit that flaw to intercept and record calls, view his contacts, read his texts and even track his movements.
“Any choices that a congressman could’ve made, choosing a phone, choosing a pin number, installing or not installing certain apps, have no influence over what we are showing because this is targeting the mobile network,” said Nohl.
They also automatically logged the number of every phone that called Congressman Lieu as well. Lieu said this list, in a typical congressman’s phone, could include other members of Congress and elected officials.
“First, it’s really creepy. And second, it makes me angry,” said Lieu. “They could hear any call of pretty much anyone who has a smartphone. It could be stock trades you want someone to execute. It could be calls with a bank. Last year, the president of the United States called me on my cellphone. And we discussed some issues. So if the hackers were listening in, they would know that phone conversation. And that’s immensely troubling.”
A significant risk to political leaders, business executives and high-ranking officials whose private phone conversations could fetch a high price in the Dark Web, Nohl says the SS7 flaw is actually an open secret among the world’s intelligence agencies. He also notes that the key flaw lies in the mobile network itself.
“Mobile networks are the only place in which the problem can be solved,” said Nohl. “There is no global policing of SS7. Each mobile network has to move — to protect their customers on their networks. And that is hard.” According to Nohl, all phones are the same and no one phone is more secure than the other.
Hacker and co-founder of the mobile security company Lookout, John Hering, also assembled a group of ace hackers in a hotel room with the 60 Minutes team. The group of hackers who were in Las Vegas for Defcon – one of the largest hacker conferences in the world – try to identify security vulnerabilities in order to protect the public.
They created a “ghost” version of the hotel’s Wi-Fi, which Alfonsi connected to, through a process called “spoofing”. Once she was connected, they were able to access her email, pull her phone number, credit card information, recent purchases and track her movements using ride-sharing app records. They could also take control of her phone’s camera.
Hering does note that while the average person isn’t likely to be exposed to these types of attacks, it is important to be aware of the possibility of such security breaches.
“Our goal was to show what’s possible,” said Hering. “So people can really understand if we don’t address security issues, what the state of the world will be. We live in a world where we cannot trust the technology that we use.”
These findings come amid rising concerns about the growing threat of cybercrime that ranges from identity theft and high-profile security breaches to cyberwar and cyberterrorism. According to the 2015 Identity Fraud Study released by Javelin Strategy & Research, as much as $16bn (£11.2bn) was stolen from 12.7 million US consumers in 2014 which means there was a new identity fraud victim every two seconds that year. Business on the Dark Web is also booming, according to a report by Dell, where “customer-friendly” hackers offer a variety of illicit goods and services on the cheap.
The post Using just your phone number hackers can spy your calls texts track your movements appeared first on AmIHackerProof.com.
View full post on AmIHackerProof.com
A year after pro-democracy protests filled the streets of Hong Kong, the city has become a target of multiple, and sophisticated, cyber attacks. Hong Kong cyber security watchdog Hong Kong Computer Emergency Response Team said there has been a 38 percent rise in hacking attacks since last year. Nicholas Thomas, a Professor at the City University of Hong Kong, said it is unclear who is behind these cyber attacks. “With what’s been going on the Hong Kong side, there’s been no direct tie to the Chinese government, or any government agencies. That is possible of course. But this could equally be Chinese hacker groups who are displaying some nationalist tendencies in cyberspace and doing this under their own steam,” said Thomas. Since August of last year there have been more than 1,175 phishing attacks, where users’ data and computers are compromised after clicking on an attachment to an email. But cyber attacks in the city have not been limited to phishing methods. Western security experts say hackers are using more sophisticated techniques, such as Google Drive and Dropbox to hack into democracy activists’ devices. Hackers are also using “white lists,” which compromise the data of certain visitors to some websites. […]
For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com
View full post on National Cyber Security
In 2014, the Clinton County District Attorney’s Child Advocacy Center handled 257 cases of child abuse.
The total in Clinton County was 230, with the remainder in Essex County, said Executive Director Richelle Gregory.
According to the Advocacy Center’s website, 166 cases were sexual abuse allegations, 32 were physical abuse allegations, and 27 were a combination of the two.
Gregory said numbers are going to be pretty high this year because programs have continued to educate the local population.
“When I first started, it was 90 cases of child abuse in Clinton County,” she said.
“We’ve more than tripled that number just through education and having people better report, identify, and (having) a better net for pulling (offenders) in and making sure they go through and get processed.
View full post on Parent Security Online