Face ID iPhone X ‘hack’ demoed live with mask

Posted by & filed under Apple, Cyber Security.

A Vietnamese cyber-security firm has shown the BBC how a mask can be used to unlock Apple’s new iPhone X. The demo took place about a week after Bkav first claimed to have undermined the handset’s security. But other experts have cast doubt on what the “hack” amounts to. Apple has not commented beyond referring… Read more »

Your browser could be mining cryptocurrency for a stranger

Posted by & filed under crypto-currency, Cyber Security.

THERE’S SOMETHING NEW to add to your fun mental list of invisible internet dangers. Joining classic favorites like adware and spyware comes a new, tricky threat called “cryptojacking,” which secretly uses your laptop or mobile device to mine cryptocurrency when you visit an infected site.  Malicious miners aren’t new in themselves, but cryptojacking has exploded in popularity… Read more »

Could Estonia be the first “digital country”?

Posted by & filed under Cyber Security, Emerging Economies, IT and Politics, IT and the law.

Estonia says it’s the first country in the world to offer “e-residency” – granting anyone in the world a digital government ID and access to online services. Source: BBC Future News Date: October 20th, 2017 Link: http://www.bbc.com/future/story/20171019-could-estonia-be-the-first-digital-country Discussion 1) “in 2007, an infamous crisis in which Russia waged what’s considered the first cyberwar on Estonia. Banks had their servers… Read more »

How may I help you? Virtual Shopping Assistants

Posted by & filed under AI/Artificial Intelligence, Augmented Reality, Cyber Security, Emerging Technologies.

Source: BBC Technology News Date: October 10th, 2017 Link: http://www.bbc.co.uk/news/resources/idt-sh/disruptors_how_may_I_help_you Discussion 1) “In the brave new world of retail this won’t necessitate a trek out to the nearest late night supermarket. Instead the shop can come to you.  With the touch of an app button, you hail a low-slung electric vehicle, like a glass-sided motorhome, which quietly glides into… Read more »

How to beat security threats to ‘internet of things’

Posted by & filed under Cyber Security, Internet of Things.

The “internet of things” is all about connecting objects to a network and enabling them to collect and share data. Household objects like thermostats, light switches, doorbells, washing machines, fridges and even toys can all be connected via wi-fi and controlled remotely. But how safe are your home appliances from hacking? Source: BBC Technology News Date: May 25th, 2017… Read more »

Smartphone fingerprint sensors may not be as secure as you think

Posted by & filed under App Economy, Cyber Security, Electronic Surveillance.

New research suggests that smartphones can be easily fooled by fake fingerprints that have been digitally composed. Source: New York Times Date: April 25th, 2017 Link: https://www.thestar.com/business/tech_news/2017/04/11/smartphone-fingerprint-sensors-may-not-be-as-secure-as-you-think.html Discussion 1) Biometrics has been touted as a very secure way to ensure the security of technology.  What could we do better now that we know fingerprints are so easily falsifiable?… Read more »

Mobile phone motion sensors can be used to crack your PIN

Posted by & filed under Civil Liberties, Cyber Security, Emerging Technologies, IT and Politics.

A new study has revealed just how easy it is for hackers to use the sensors in mobile devices to crack four-digit PINs and to access a wide variety of other information about users. Cyber-security experts from Newcastle University in the U.K. found that once a mobile user visits a website, code embedded on the page could then use… Read more »

Investigation found Ohio inmates built and hid computers in prison

Posted by & filed under Cyber Security.

Lax security allowed inmates at an Ohio prison to build two computers and connect them to the state’s Department of Rehabilitation and Correction’s network, investigators found. Source: CNN Date: April 13th, 2017 Link: http://us.cnn.com/2017/04/12/us/ohio-jail-computers-trnd/index.html Discussion 1) What steps could the Ohio Department of Rehabilitation and Correction have taken to find network traffic they weren’t expecting on their network?… Read more »

Smart TV hack embeds attack code into broadcast signal—no access required

Posted by & filed under Cyber Security, Ethical issues.

A new attack that uses terrestrial radio signals to hack a wide range of Smart TVs raises an unsettling prospect—the ability of hackers to take complete control of a large number of sets at once without having physical access to any of them. The proof-of-concept exploit uses a low-cost transmitter to embed malicious commands into… Read more »