Showing posts with label Security. Show all posts
Showing posts with label Security. Show all posts

Saturday, December 6, 2014

Jon Stewart Makes Utter Mockery of All the Ridiculous Apologists for Eric Garner's Murder

"What the fuck are you talking about, Rand Paul?"

By Janet Allon

Thursday night, Jon Stewart did a hilarious round up of all the absurdly off-point commentary about the grand jury decision not to indict the cop who killed Eric Garner. There was Sean Hannity, saying that "as a martial arts student," he had the expertise to say that Garner was not placed in a "chokehold."

"Go on, sensei." Stewart retorted.

The coroner's report saying the Staten Island man died of compression of the windpipe and chest begs to differ with Hannity.

There was Rep. Peter King saying Garner's poor health killed him. Again, the coroner's report.

"He outweighed the cop by 150 pounds," Stewart mocked. "He was the abominable bro man."

There was Rudy Giuliani, apologist for cops everywhere.

"Fucking Giuliani," Stewart said.

Finally, there was Rand Paul's odd interpretation. The Kentucky Senator blamed cigarette taxes for Garner's death, (Garner was suspected of selling loose, illegal cigarettes.) “What the fuck are you talking about?” Stewart asked after playing footage of Paul’s comments. “I guess now we know what it takes for a senator from Kentucky to admit cigarettes can kill. I don’t know what to say. I appreciate the purity of your anti-tax dogma, but the cigarette tax is truly the least salient aspect of this case.” 

It's a fairly definitive smackdown. Watch:


Wednesday, December 3, 2014

Scam of the Day: PS4Jailbreaker dot com. More surveys for you, more money for them


PS4Jailbreaker .com is a scam, they won’t “jailbreak” your PS4, they will just ask you to fill a survey for which they will get paid, and you won’t get anything in exchange. If you want the latest and greatest news about the possibility to hack your PS4, bookmark our “PS4 CFW for Dummies” page, which will have all the information needed, the day a hack is actually made public. Please share this information with your more gullible friends, who don’t know the difference between reputable scene websites, and stupid cash grab schemes.


It’s been a while since I last debunked one of those fake “Vita iso” or “PS4 iso” websites.
Yesterday one of these sites had the audacity of posting a link to their *** directly in the comments of my blog. So I decided I’d thank them, by calling them out publicly for their scammy website.

The website involved here is fake website ps4jailbreaker .com. PS4Jailbreaker .com is a scam website, put in place to make a quick buck on some fake download.

ps4jailbraker

The site is an unoriginal and typical scam (I guess people still fall for these, so next time someone asks you if this is real, kindly point them to this article). PS4Jailbreaker .com pretend to offer a free jailbreak of your PS4, all you have to do is complete a survey to get your download. The surveys will take some of your precious time, and the owners of the site will get paid for each complete survey.

The chances of you actually getting your download at the end of the survey are slim at best. The possibility of you actually being able to “jailbreak” (hack) your PS4 with whatever you end up downloading, is 0.

It is not possible at the time of this writing to fully hack a PS4. When something looks too good to be true, it’s because it’s too good to be true. You can avoid scams such as PS4Jailbreaker .com by simply using this thing that us human beings call a brain: If there existed a method to hack the PS4 like these guys pretend to offer, all major scene websites would be talking about it, *before* you even realize the method exists. We have a community of thousands of people here, looking daily for all possible news related to hacking the PS4. It is statistically impossible that you could find out a “revolutionary” technique that we haven’t heard of.

The day a hack of the PS4 will exist, it will be on the front page of this website and other major scene websites. Heck, it will probably also be in the news of mainstream technology sites. So, don’t feel clever because you only just found out about the fake claims of PS4Jailbreaker .com, you’re actually on the verge of netting these guys $5 of your time, for nothing in return.

When a hack for the PS4 is truly available, it will be explained in details on our “PS4 CFW for dummies” page. That’s the page you need to bookmark for news on that.

Besides this very easy way to detect scam websites such as PS4Jailbreaker .com, you can also see that the techniques used on their website are fairly obvious: newly created website for the purpose of the product (the only people doing this are people selling a new hardware mod such as Sky3DS or trueblue.

When it comes to software hacks, you will usually hear about those on a hacker’s blog, twitter account, and here, before anyone thinks of even creating a dedicated websites. Hackers are too busy actually hacking, they usually won’t create a brand new website for one of their releases!)

Very typical of these websites too is the suspicious “did this hack work for you” vote system. Again, real hackers wouldn’t care about putting such a dumb thing in place.

Again, whenever a hack comes for the PS4, you’ll hear about it almost instantly on this site and other reputable sources. Don’t try and think you’re more clever than everybody else because you found an unvisited dark corner of the intertubes: most likely you’ll get mugged. This is the case with the scam on PS4Jailbreaker .com, a site that will basically steal your time to fulfill a survey, make money out of it, and leave you with nothing. Not dangerous per se, but definitely not worth your time.
scam_email

(For the conspiracy theorists out there, feel free to actually try. You’ll give these guys the money from your survey, and will end up with nothing in exchange. That will be a great life lesson for you)

Saturday, November 29, 2014

Skimmer Innovation: Wiretapping ATM's

By Brian Krebs

Banks in Europe are warning about the emergence of a rare, virtually invisible form of ATM skimmer involving a so-called “wiretapping” device that is inserted through a tiny hole cut in the cash machine’s front. The hole is covered up by a fake decal, and the thieves then use custom-made equipment to attach the device to ATM’s internal card reader.

According to the European ATM Security Team (EAST), a nonprofit that represents banks in 29 countries, financial institutions in two countries recently reported ATM attacks in which the card data was compromised internally by “wire-tapping” or “eavesdropping” on the customer transaction. The image below shows some criminal equipment used to perpetrate these eavesdropping attacks.

Equipment used by crooks to conduct "eavesdropping" or "wiretapping" attacks on ATMs.
Equipment used by crooks to conduct “eavesdropping” or “wiretapping” attacks on ATMs. Source: EAST.

“The criminals cut a hole in the fascia around the card reader where the decal is situated,” EAST described in a recent, non-public report. “A device is then inserted and connected internally onto the card reader, and the hole covered with a fake decal”
[pictured, bottom right].

Pictured above are what appear to be wires that are fed into the machine with some custom-made rods. It looks like the data is collected by removing the decal, fishing out the wire attached to the ATM’s card reader, and connecting it to a handheld data storage device.

I sought clarification from EAST about how the device works. Most skimmers are card slot overlay devices work by using a built-in component that reads the account data off of the magnetic stripe when the customer inserts the card. But Lachlan Gunn, EAST’s executive director, suggested that this device intercepts the card data from the legitimate card reader on the inside of the ATM. He described the wiretapping device this way:

“It’s where a tap is attached to the pre-read head or read head of the card reader,” Lachlan said. “The card data is then read through the tap. We still classify it as skimming, but technically the magnetic stripe [on the customer/victim’s card] is not directly skimmed as the data is intercepted.”

The last report in my ATM skimming series showcased some major innovations in so-called “insert skimmers,” card-skimming devices made to fix snugly and invisibly inside the throat of the card acceptance slot. EAST’s new report includes another, slightly more advanced, insert skimmer that’s being called an “insert transmitter skimmer.”

Like the one pictured below, an insert transmitter skimmer is made up of two steel plates and an internal battery that lasts approximately one to two weeks. “They do not store data, but transmit it directly to a receiving device — probably placed less than 1 meter from the ATM.
An insert transmitter skimmer. Source: EAST.
An insert transmitter skimmer. Source: EAST.

Both of these card skimming technologies rely on hidden cameras to steal customer PIN codes. In a typical skimming attack involving devices that lay directly on top of the card acceptance slot, the hidden camera is a pinhole spy cam that is embedded inside the card slot overlay and angled toward the PIN pad. Just as often, the camera is hidden in a false panel affixed directly above the PIN pan with the pinhole pointed downward.

According to east, the use of false sidebar panels is becoming more prevalent (see image below for an example). It is not unusual for hidden cameras to be obscured inside of phony brochure racks as well.

sidepanels
As this and other insert skimmer attacks show, it’s getting tougher to spot ATM skimming devices. It’s best to focus instead on protecting your own physical security while at the cash machine. If you visit an ATM that looks strange, tampered with, or out of place, try to find another ATM. Use only machines in public, well-lit areas, and avoid ATM's in secluded spots.

Last, but certainly not least, cover the PIN pad with your hand when entering your PIN: That way, if even if the thieves somehow skim your card, there is less chance that they will be able to snag your PIN as well. You’d be amazed at how many people fail to take this basic precaution. Yes, there is still a chance that thieves could use a PIN-pad overlay device to capture your PIN, but in my experience these are far less common than hidden cameras (and quite a bit more costly for thieves who aren’t making their own skimmers).

Are you as fascinated by ATM skimmers as I am? Check out my series on this topic, All About Skimmers.

Saturday, November 22, 2014

It's Time to Scan Your PC for Government Funded Malware

By

Detekt 310x
Amnesty International's free new Detekt tool scans for government-level malware on your PC


It's Cybersecurity Friday here at The Escapist (not really), so when you're not busy freaking out about the possibility that some hacker trolls stole your PlayStation Network login info, you can scan your PC for government-funded malware.

Amnesty International is behind Detekt, a new (and free) malware scanner that specifically looks for bugs attached to government-backed cyberwarfare programs. The scanner comes from AI, along with the Electronic Frontier Foundation.

Once you download the Detekt executable, [Note from the Writer: You are downloading and running a program, so the usual "try at your own risk," warning applies here.] the GUI guides you through a typical-looking malware scan, which can take up to 30 minutes (depending on PC speed and drive size). You'll need to run the program as an Administrator in order for it to work. Currently, Windows 8.1 is not supported.

You, me, and virtually everyone else on here likely has nothing to worry about, and the scan will finish empty-handed. For the unlucky few that do find something? This tool is a scanner, and not a removal program, so you're up Hacker Creek without a paddle, I'm afraid. (Translation: it's hard drive reformatting time!)

Government-sponsored cyberattacks are nothing new; China does it, the United States does it, and so do a number of other nations across the globe. At least now you can find out if you're an innocent casualty in this "war" happening in those Internet tubes.

Source: Amnesty International | The Verge

Saturday, November 8, 2014

Website Peeps Into 73,000 Unsecured Security Cameras Via Default Passwords

Posted by Soulskill

colinneagle writes:  
 
After coming across a Russian website that streams video from unsecured video cameras that employ default usernames and passwords (the site claims it's doing it to raise awareness of privacy risks), a blogger used the information available to try to contact the people who were unwittingly streamed on the site. It didn't go well. The owner of a pizza restaurant, for example, cursed her out over the phone and accused her of "hacking" the cameras herself. And whoever (finally) answered the phone at a military building whose cameras were streaming on the site told her to "call the Pentagon."

The most common location of the cameras was the U.S., but many others were accessed from South Korea, China, Mexico, the UK, Italy, and France, among others. Some are from businesses, and some are from personal residences. Particularly alarming was the number of camera feeds of sleeping babies, which people often set up to protect them, but, being unaware of the risks, don't change the username or password from the default options that came with the cameras.

It's not the first time this kind of issue has come to light. In September 2013, the FTC cracked down on TRENDnet after its unsecured cameras were found to be accessible online. But the Russian site accesses cameras from several manufacturers, raising some new questions — why are strong passwords not required for these cameras? And, once this becomes mandatory, what can be done about the millions of unsecured cameras that remain live in peoples' homes?