Wednesday, September 27, 2017

Cyber and Infrared signals in surveillance cameras

Amazon’s Inhuman Customer Service Issues Death Sentence to Local Library Fundraising

Amazon is mean...

End-of-life chatbot can help you with difficult final decisions New Scientist 

We are all dying Influenza and pneumonia now 11th most common cause of death



















Researchers have devised malware that can jump airgaps by using the infrared capabilities of an infected network's surveillance cameras to transmit data to and from attackers. The malware prototype could be a crucial ingredient for attacks that target some of the world's most sensitive networks. Militaries, energy producers, and other critical infrastructure providers frequently disconnect such networks from the Internet as a precaution. In the event malware is installed, there is no way for it to make contact with attacker-controlled servers that receive stolen data or issue new commands.






















An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps. MC 2016, November 14-16, 2016, Santa Monica, CA. DOI: http://dx.doi.org/10.1145/2987443.2987471.


“Millions of users worldwide resort to mobile VPN clients to either circumvent censorship or to access geo-blocked con- tent, and more generally for privacy and security purposes. In practice, however, users have little if any guarantees about the corresponding security and privacy settings, and perhaps no practical knowledge about the entities accessing their mobile traffic. In this paper we provide a first comprehensive analysis of 283 Android apps that use the Android VPN permission, which we extracted from a corpus of more than 1.4 million apps on the Google Play store.

Related – via NPR – “In the first major review of VPN providers, researchers from across the globe tested nearly 300 free VPN apps on Google Play. What they found was alarming. Nearly 40 percent injected malware or malvertising. And nearly 20 percent of the apps didn’t even encrypt user traffic. This month, the Center for Democracy & Technology filed a complaint with the Federal Trade Commission alleging the VPN Hotspot Shield collects data and intercepts traffic. If true, that would be a direct violation of claims by the company’s policy to “never log or store user data.”













Ransomware and cyber-attacks: We need a defence plan, says Europe