Showing posts with label data breach. Show all posts
Showing posts with label data breach. Show all posts

Tuesday, May 28, 2019

Your iPhone is spying on you while you sleep.

No one saw this coming. No one.

The Jeff Bezos Peoples' Republic via 9to5Mac: Washington Post finds 5,400 app trackers sending data from an iPhone.
Monitoring software used by The Washington Post on an ordinary iPhone found that no fewer than 5,400 app trackers were sending data from the phone – in some cases including sensitive data like location and phone number.

    "It’s 3 a.m. Do you know what your iPhone is doing?

    "Mine has been alarmingly busy. Even though the screen is off and I’m snoring, apps are beaming out lots of information about me to companies I’ve never heard of. Your iPhone probably is doing the same — and Apple could be doing more to stop it."
[.]
     [The] biggest concern is transparency: If we don’t know where our data is going, how can we ever hope to keep it private?
The same story at OregonLive mentions one additional detail not noted in the above article:
[My iPhone] was receiving a message that included my IP address -- once every five minutes.

Wednesday, January 23, 2019

Tech News

Mobile Syrup: Google records Canadian customer phone calls using dummy number.
..the tech giant confirmed when a customer uses Google Local Services to call and connect with a business, the number listed is not the business’ contact but rather a dummy Google number that routes callers to the business.

Before customers are connected with business, they are informed that all calls are recorded.
You consented to this. This was likely all spelled out in your brief, clear, concise User Agreement, which of course, you read. Right?
- - -
Mobile SyrupU.S. makes formal demand for Huawei extradition.
China demanded the U.S. drop the [extradition] request and blamed Washington for damaging its relationship with Canada.
- - -
WIRED: The many woes of Huawei.
The UK, Canada, the Czech Republic, Norway, and Japan are all reportedly reconsidering their relationships with Huawei as well.
[.]
"These Huawei problems have been bubbling under the surface for quite a few years," telecom industry analyst Jeff Kagan says. "Now they are at a rapid boil, and there is no hiding from it. And this rapid boil is only going to get worse."
[.]
In a rare press conference Tuesday, Huawei founder Ren Zhengfei said the company doesn't spy on behalf of the Chinese government. "I support the Communist Party of China, but I will never do anything to harm any other nation," Ren said[.]
He added, "if you like your doctor, you can keep him." Nah, just jokin' there.
- - -
Beta NewsMost-clicked phising lines of 2018.

2019 will probably be a bunch of variations of last years. Take a moment to read the story.
- - -
ZD Net: Online casino dumps massive data.
An online casino group has leaked information on over 108 million bets, including details about customers' personal information, deposits, and withdrawals[.]
[.]
The data leaked from an ElasticSearch server that was left exposed online without a password[.]
Oh-oh-ooooooh...did you hear the "snap" of wedded bliss ("No honey, I told you I quit online gambling long ago."), and the New Hiring announcement for IT at ElasticSearch?
- - -
GeekWatch the Moose chase the snowboarders.

No, not this moose...
- - -
“Marty” is a limited-purpose robot but will still replace a number of entry-level jobs that are so important for teenagers just entering the workforce[.]
Welcome to the Avoided Mandated $15/hour Liberal Technocralypse.
- - -
Tech CrunchPD's license plate readers still exposing data on internet.
Security researchers have been warning for years that ALPR devices are exposed and all too often accessible from the internet. The Electronic Frontier Foundation found in 2015 dozens of exposed devices in its own investigation not long after Boston’s entire ALPR network was found exposed, thanks to a server security lapse.

But in the three years past, little has changed.
The story notes that, no big surprise here, police departments are failing to change the manufacturer's default password that comes with the product. WTF? Change the DEFAULT PASSWORD! What are the paid IT employess who work in law enforcement doing with their time?
- - -
Tech Spot: Oh....this is hot! Watch the making of a graphics card.
Most consumers are oblivious to the herculean efforts that go into hardware production. Robots and humans must work in perfect harmony to get the job done on time while minimizing mistakes. If you've never seen a production line in action, it's quite fascinating.

Friday, January 18, 2019

Tech News

Beta News: Big data breach.
#1 database leak exposes 773 million email addresses and 21 million passwords[.]
Yep. Everyone should update their current password of 'password' to something like 'qwerty123' or 'aDmin_678'.

ZD Net: Oklahoma govt breached big time.
An Oklahoma Department of Securities server allowed anyone to download government files[.]
"The data was exposed via an unsecured rsync service at an IP address registered to the Oklahoma Office of Management and Enterprise Services (OMES), allowing any user from any IP address to download all the files stored on the server," the researchers say. 
GizmodoHow to stop worrying about data breaches.
[A] rundown of the three most important pieces of crafting a healthy security routine and never sweating another password leak[.]
Nextgov: ID card manufacturer and service provider used by federal agencies have vulnerabilities.
...the system used by IDenticard, called PremiSys, which if exploited could allow an unauthorized person to gain access to secure buildings and disable locks, as well as exfiltrate user data or otherwise modify accounts using administrator privileges.
- - -
TechCrunch: Coming soon via the govt shutdown - Expiring HTTPS federal web sites.
Depending on the security level, most websites will kick back browser errors. Some won’t let you in at all until the expired certificate is renewed.
[.]
Eric Mill, a security expert [said] that fears over expired certificates have been overblown.
- - -
FanbyteOverwatch game charcter Soldier 76 gayness causing controversy.
...with the addition of Soldier: 76, the total number of queer characters is two out of a roster of 29. Making Soldier gay, more so than even Tracer[.]
[.]
But both characters suffer from the aforementioned Blizzard ethos of “experiences” over “story.”
- - -
How to make global warming climate change Alarmist's heads explode (like in "Scanners"). Tell them that Apple may scrap plans for their self-driving cars. Ubergizmo:
Apple is working on developing technology for self-driving cars.
[.]
However it seems like those plans could be scrapped[.]
Did you hear the collective heads pop? Messy! Clean-up crews being dispatched. This may take a while, folks. Your patience is appreciated.
- - -
New AtlasThe 2019 Detroit Auto Show. Lots of images to look at. Some nice, others, well - I guess it's all in the eye of the beholder.
- - -
New Atlas: A DIY Tiny-House for around $10 Grand.
- - -
Tech Dirt: Irish Supermacs bitch-slaps "Big-Mac" in EU.
McDonald's Corp has lost its rights to the trademark "Big Mac" in a landmark European Union (EU) case ruling in favour of Ireland-based fast-food chain Supermac's, according to a decision by European regulators.
- - -
The below video at Digg, so yeah, it's Tech. Go "full screen" or watch at the link. Bet ya watch it more than once. Yep, their Best Friends! So darn cute.

Wednesday, January 9, 2019

Dark Over Lord Hackers release more 9/11 documents.

As part of the recent hack relating to Germany, a second drop of info was released regarding September 11. RT:
The Dark Overlord hacker group has released decryption keys for a second batch of 9/11 documents, totalling [sic] over 7,500 files. Additional document leaks containing “more secrets” and “more truth” have been promised, for a price.
[.]
...the documents build up a picture of insurance litigators brainstorming to see who they could sue for damages in the wake of the attacks. In emails, the lawyers discuss targeting the airlines, airplane manufacturers, the Federal Aviation Authority, the terrorists themselves, and foreign entities.
[.]
Along the way, the litigators discuss whether then-President George W. Bush had advance knowledge of the attacks, or whether the Saudi Royal family was responsible, but this discussion is speculative and no damning new information is revealed.

While the encryption key for the first batch of documents has been scrubbed from Reddit, Pastebin and Twitter, it remained available for several days on Steemit. Dark Overlord’s account was banned from the platform on Wednesday, however, but the documents can be accessed on Busy.org, a website that runs on the same blockchain as Steemit.
CyberscoopDark Over Lord was seeking new hires.
“Do YOU want to get Rich? Come work for us!,” The Dark Overlord wrote in a Nov. 14, 2018, thread on KickAss Forum, a cybercriminal marketplace on the dark web that charges for entry.
See. The economy under President Trump is even good for hiring, hacking and extortion!

Monday, January 7, 2019

German Data Hack

Hacked info on German politicians and celebrities has been published on the web. Presumably, the German pols and celebs refused to pay the ransom.

The hacking group behind this is The Dark Over Lord. (DOL). DOL has been posting on Steemit.

This is an interesting event, if there is substance in the data that has been allegedly hacked. Germany's Interior Minister, Horst Seehofer, seeks answers on the success of the hack. DW:
The interior minister said he would share everything he finds out with the public by the middle of the next week at the latest.
But it gets more complicated than that. Same link:
German political parties have criticized the country's cyber defense agency, the Federal Office for IT Safety (BSI), for its handling of the data breach.

The BSI clarified that it only became aware  of the full extent of the breach earlier this week on Saturday, a day after BSI chief Arne Schönbohm said the agency had known about isolated breaches in early December.

The Green party's parliamentary leader, Anton Hofreiter, demanded Schönbohm explain himself urgently to an extraordinary parliamentary committee meeting.

The deputy leader of the business-friendly Free Democrats (FDP), Wolfgang Kubicki, suggested that Schönbohm should quit.

"A president who first says he's known about the breach since the beginning of December and then backtracks to say he's only known about it since January 3 must ask himself if he's the right man for the job," he said.
Something is amiss here with BSI. What, I don't know. Or has yet to be discovered and reported.

While the DOL was a Big Hack, the Island Packet states, it doesn't appear to have revealed any major political scandals. (Not even one, lost Hillary email?)


WIRED writes: 
The trove of leaked documents is massive but early assessments indicate that it seems focused less on exposing state secrets than it does on revealing deeply personal information about its targets. The exposed data includes internal political communications, like emails and scans of faxes, along with credit card information, home addresses, phone numbers, personal identification card details, private chat logs, and even voicemails from relatives and children.
Not so fast on the "no scandals/no secrets". At Computer Business Review, the second link of this post, the story states the hack revealed a lot of information that is mirrored (duplicated) at numerous sites and there's a lot of data to comb through.
The leak was made with strenuous effort to ensure that the leaked documents can’t easily be taken down. There there over 70 mirrors of the initial download link alone, while each of the 40 download links has another 3-5 mirrors each.

Each of the tens of thousands of files uploaded appears to have its own or indeed multiple mirrors; something that would have taken a huge amount of manpower.
[.]
“3 percent” of the data had already revealed “cases of corruption and bad political scandals”. 4chan users were already revelling [sic] in some of the scandals today, from sexual proclivities to Wikipedia edits by politicians.
Tru News reports the DOL has begun releasing 9/11 documents.
By themselves, the new documents don’t set off too many alarms, but they do establish that The Dark Overlord certainly had access to sensitive materials.
[.]
[The DOL states], “The United States of America & All Involved Parties,” also added:

“This is a message for the nation-state of the United States of America and the greater deep-state.

“We're going to continue to bend you over a barrel and [expletive] you if our demands are not met. You know the score. Your censorship and fakenews coverups won't silence this organisation or its public support. You were warned. To all the other parties involved (airlines, litigation firms, investigation firms, FBI, TSA, FAA, banks, security companies and more), we're going to burn you down unless you begin to 'play ball'. This entire situation will soon become far more tragick to your survival. Make the right choise.

“We're peeling these layers back like an onion. No one can save you except for us. Pay the [expletive] up.”

The use of English grammar and punctuation, particularly in the ransom demands, strongly suggests the author of both statements is not from the U.S.
Or, grammatically incorrect on purpose? Or, so the Germans would have us believe? I'm not making light of anything here with that last link, who knows what information could have been hacked? We won't know until, or if, it's leaked. The DOL story is not unlike Q, or QAnon, which Phil explained so well.

For me, at times I find it difficult making sense out of the time-lines, and determining what's important and what to disregard, on issues like this at the threads at the Chan sites. This global hack, and issues like it, will reveal themselves over time. I'd imagine any explosive revelation in any forthcoming release from the hack would be headlined everywhere. We'll see. Your thoughts?