Thursday, July 11, 2013

The High Cost Of Cybercrime

Every enterprise has high-value information vital to its success. As cyber-attack techniques become more sophisticated, this “digital gold” is increasingly vulnerable.

A study by the Ponemon Institute found that the average annualized cost of cybercrime in 2012 is $8.9 million per year, with a range of $1.4 million to $46 million.* The cost of cybercrime includes more than the value of the stolen information. It includes the costs of business disruption, lost opportunity, damage to brand, and recovery efforts.
  • Sony estimated their costs from 2011 data breaches were at least $171 million.
  • A competing manufacturer stole source code from a control-system supplier the supplier’s stock dropped 83%.
  • A metallurgical company lost to cyber espionage technology built over 20 years at a cost of $1 billion.
  • The Canadian government stopped a $38.6 billion takeover bid when attacks compromised sensitive information at government agencies and law firms.
  • Civil penalties for ePHI breaches can be up to $250,000, with repeat/uncorrected violations reaching $1.5 million per violation, per year

Wednesday, July 3, 2013

Massive Android flaw allows hackers to ‘take over’ and ‘control’ 99% of Android devices

Mobile security company Bluebox said today that it recently discovered a vulnerability in Android that makes any Android device released in the last four years vulnerable to hackers who can read your data, get your passwords, and control any function of your phone, including sending texts, making phone calls, or turning on the camera.
That’s almost 900 million Android devices globally.

“A Trojan application … has the ability to read arbitrary application data on the device (email, SMS messages, documents, etc.), retrieve all stored account & service passwords,” Bluebox CTO Jeff Forristal posted. “It can essentially take over the normal functioning of the phone and control any function.”

The vulnerability is due to “discrepancies” in how Android apps are approved and verified, Bluebox says, allowing hackers to tamper with application code without changing the app’s cryptographic signatures. That means that an app — any app — which looks perfectly safe and legitimate to an app store, a device, an engineer, or a user actually could actually have malicious code embedded within it.

Reference:

Everyone's Trying to Track What You Do on the Web: Here's How to Stop Them

It's no secret that there's big money to be made in violating your privacy. Companies will pay big bucks to learn more about you, and service providers on the web are eager to get their hands on as much information about you as possible.

So what do you do? How do you keep your information out of everyone else's hands? Here's a guide to surfing the web while keeping your privacy intact.

The adage goes, "If you're not paying for a service, you're the product, not the customer," and it's never been more true. Every day more news breaks about a new company that uploads your address book to their servers, skirts in-browser privacy protection, and tracks your every move on the web to learn as much about your browsing habits and activities as possible. In this post, we'll explain why you should care, and help you lock down your surfing so you can browse in peace

Monday, July 1, 2013

Car Thieves Using New Wireless Technology To Break Into Cars



As cars become more and more like rolling computers, they're facing a new kind of threat formerly reserved for laptops and the like: They're being hacked.

Police in Long Beach, Calif., are looking for two men who used some sort of wireless device to unlock cars. They were caught on video holding something in their hands. As they approach the car, the interior lights came on and the doors simply opened. Police are baffled by how the thieves hacked into the car's wireless system.

It wasn't the first time thieves used technology to rob cars. In Chicago, a similar theft was caught on camera in 2012. Chicago police theorized that code-cracking software sent the same unlock signal to the car that the vehicle's key fob transmitter uses.
But you might not need special software to break into cars -- all you need is a cellphone.

New System Uses Low-Power Wi-Fi Signal To Track Moving Humans — Even Behind Walls

...so much for "I told you so".

The comic-book hero Superman uses his X-ray vision to spot bad guys lurking behind walls and other objects. Now we could all have X-ray vision, thanks to researchers at MIT’s Computer Science and Artificial Intelligence Laboratory.

Researchers have long attempted to build a device capable of seeing people through walls. However, previous efforts to develop such a system have involved the use of expensive and bulky radar technology that uses a part of the electromagnetic spectrum only available to the military.

Now a system being developed by Dina Katabi, a professor in MIT’s Department of Electrical Engineering and Computer Science, and her graduate student Fadel Adib, could give all of us the ability to spot people in different rooms using low-cost Wi-Fi technology. “We wanted to create a device that is low-power, portable and simple enough for anyone to use, to give people the ability to see through walls and closed doors,” Katabi says.



Reference: