by Micheal Delamere | Jul 10, 2014 | Surveillance & Security
Many mobile device users rely on simply deleting the private information on the storage card of the phone before selling it, in order to ensure that sensitive details are not passed to the new owner. However, items are stored persistently, and unless they are corrupted through overwrite action, they can be recovered.
Avast carried out an experiment with 20 Android phones purchased through eBay, and then tried to find out how much of the deleted information could be retrieved.
The results showed that a numerous amount of items belonging to the previous owners could be recovered by using a mainstream utility.
According to their report, they managed to bring back more than 40,000 photos, and learned about over 1,000 Google searches, more than 750 email and text messages and over 250 contact names and email addresses.
By putting together these bits and pieces, cybercriminals can learn important details about the potential victim and start targeted phishing campaigns with a high rate of success, which could bring them a pretty income.
Blackmailing activities can also be deployed by the criminals, as Avast says that more than 750 of the images retrieved were with women in various stages of nakedness.
Among their findings were the identities of four previous owners, which can also be leveraged to conduct nefarious activities against them.
by Micheal Delamere | Jul 10, 2014 | Surveillance & Security
Rising kidnappings, the discovery of mass graves, and security force shootouts with alleged Zetas members have created a security storm in the state of Veracruz in southeast Mexico, but what lies behind this streak of violence?
On July 2, authorities discovered a clandestine grave containing at least eight bodies in a southern municipality of Veracruz, reported Animal Politico. This followed the June discovery of 12 mass graves in which at least 31 bodies were unearthed.
Accompanying these chilling finds has been a series of shootouts in urban areas of the state, reported Proceso. On July 5, security forces killed six alleged criminals in the city of Veracruz, while three alleged members of the Zetas criminal organization were killed in nearby Orizaba. A day earlier, police killed four suspected Zetas near the coast, including the group’s alleged Veracruz plaza chief — the local leader in charge of that territory.
by Micheal Delamere | Jun 20, 2014 | Surveillance & Security
Roughly 37 percent of companies have fallen victim to crime of some form, including corruption, robbery of merchandise, shoplifting, kidnapping and extortion, the head of the Coparmex employers’ association said
MEXICO CITY – Crime and a climate of insecurity in Mexico cost companies some 75 billion pesos ($5.8 billion) annually, the head of the Coparmex employers’ association said.
Roughly 37 percent of companies have fallen victim to the crime of some form, including corruption, robbery of merchandise, shoplifting, kidnapping, and extortion, Juan Pablo Castañon told a group of foreign correspondents.
by Micheal Delamere | Jun 15, 2014 | Cyber Threats, Data Breaches
The basement-dwelling teenager poring over lines of scrolling code as he rips through the security of a government or corporate server is a popular trope in Hollywood movies. Although this widespread image of the hacker isn’t accurate, the threat of cyberattacks against government networks is very much a real-world concern.
In order to be more prepared for cybersecurity breaches, agencies should consider a comprehensive penetration test – ethical hacking with the goal of attacking or bypassing the established security mechanisms of an agency’s systems, and using the same tactics as a malicious intruder.
Penetration testing can be conducted by way of a cyberattack or by exploiting a physical vulnerability of an organization.
After gaining access to a system, the penetration testers will report back with detailed information about what vulnerabilities were exploited, how they were able to breach the system, what level of data was accessed and how to prevent future exploitation. The following is a compilation of the six most common vulnerabilities found during penetration tests:
Read More
by Micheal Delamere | Jun 14, 2014 | Crime, Cyber Threats
Washington made clear this week that China is America’s biggest cyber nemesis, at least in terms of the theft of U.S. intellectual property. So who’s next? Not Russia, nor North Korea, according to former Defense Secretary Robert Gates. It’s France — one of America’s closest allies
“There are probably a dozen or 15 countries that steal our technology in this way,” Gates said in an interview the Council on Foreign Relations posted online Thursday. “In terms of the most capable, next to the Chinese, are the French — and they’ve been doing it a long time.”
Gates, who was also director of the Central Intelligence Agency in the first Bush administration, said that when he talks to business audiences, he asks, “How many of you go to Paris on business?’ Hands go up. ‘How many of you take your laptops?’ Hands go up. ‘How many of you take your laptops to dinner?’ Not very many hands.”
“For years,” Gates said, “French intelligence services have been breaking into the hotel rooms of American businessmen and surreptitiously downloading their laptops if they felt those laptops had technological information or competitive information that would be useful for French companies.
by Micheal Delamere | Jun 8, 2014 | Crime, Cyber Threats, Data Breaches
By taking a swing at a social network account and successfully hijacking it, a cybercriminal opens the door to plenty more potential victims.
Facebook is the main target in such cases because it is so good a platform for sharing information, which allows bad actors to lure a lot of users.
Malware, spam and phishing links directing users to pages serving carefully planted threats are easily distributed from a stolen Facebook account.
As noted by Nadezhda Demidova, Web Content Analyst at Kaspersky Lab, criminals can use the account for financial gains, “such as extorting money from the hijacked account’s friends. The fraudster can send messages asking people to send money for help.”
Other reasons are the collection of information for launching targeted phishing attacks and even selling the account to other criminals.
Getting their hands on a social network account is done through various methods, ranging from fake notifications, emails sent from a compromised address of a friend and forum messages to banners on third-party resources.
In all these cases, the victim can be attracted to phishing pages where they are asked to log into a fake social network; the details are then sent to the attacker. A compromised Facebook account can also be used to direct the friends of the owner to malicious pages.
by Micheal Delamere | May 22, 2014 | Crime
Forget everything you think you know about crime. In the next 20 years, “traditional” crime as we know it today will be largely replaced by cyber-crime. In fact, this is already happening. Take bank robberies: According to the American Bankers Association, bank robberies are being steadily replaced by ATM-skimming and other ‘cyber-heists.’ FBI statistics show bank robberies are down 60% since their peak in 1991, and they plummeted another 23% just between 2011 and 2012. Other crimes are also following suit. Car thieves around the country are now using ‘mysterious gadgets’ to remotely unlock car doors without having to jimmy the lock or smash the window. Burglars have been robbing hotel rooms using a keyless door hacking tool that was first revealed at the Black Hat hacking conference. It’s time for people to stop thinking of cyber-crime as something that only happens on a computer. With the rise of ‘smart’ devices and the Internet of Things (IoT), the maturation of the online black market as a multi-billion dollar industry and the widespread commercial and recreational markets for do-it-yourself hacking tools, cyber attacks will become far more invasive, dangerous and even physical.