blog trackingRealtime Web Statistics Finds Archives - Gregory D. Evans | Worlds No. 1 Security Consultant | Gregory D. Evans | Worlds No. 1 Security Consultant

Posts Tagged ‘Finds’

Study finds that Android lock patterns tend to be too simple, just like passwords

A study conduced by a woman named Marte Løge, a graduate of Norwegian University of Science and Technology, found that Android users choose to set similar lock patterns that might be too easy for others to figure out. The study looked at 4000 patterns created and discovered that 77% of the patterns started from one of the four corners. 44% of the patterns created began from the top left corner.

Obviously, the more nodes used in the creation of the pattern, the larger the number of possible combinations and the harder it is for someone to discover your lock screen pattern. The average number …

View full post on PhoneArena

Georgia Tech Finds 11 Deep Security Flaws in Chrome, Firefox

Source: National Cyber Security – Produced By Gregory Evans

The security researchers developed a new cyber-security analysis method that discovered the holes buried deeper in the systems. Researchers from the Georgia Institute of Technology College of Computing earlier this year found 11 previously undiscovered flaws in two of the most widely used Internet browsers—Google Chrome and Mozilla Firefox. Worry not, however: The flaws have long been fixed.The security researchers developed a new cyber-security analysis method that discovered the holes buried deep in the systems. They were rewarded for their work with the Internet Defense Prize, an award presented by Facebook, in partnership with USENIX, at the 24th USENIX Security Symposium that ended Aug. 14.Ph.D. students Byoungyoung Lee and Chengyu Song, along with Professors Taesoo Kim and Wenke Lee(pictured), received $100,000 from Facebook to continue their research to make the Internet safer.Their research paper, “Type Casting Verification: Stopping an Emerging Attack Vector,” explores vulnerabilities in C++ programs—such as in Chrome and Firefox—that result from “bad casting” or “type confusion.” Bad casting enables an attacker to corrupt the memory in a browser so that it follows a malicious logic instead of proper instructions. The researchers developed a new, proprietary detection tool called CAVER to catch them. CAVER is a run-time detection […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Georgia Tech Finds 11 Deep Security Flaws in Chrome, Firefox appeared first on National Cyber Security.

View full post on National Cyber Security

European Commission reportedly finds no evidence of collusion between Apple and record labels

Apple Music has certainly cast a spotlight on Apple over antitrust concerns, but a new report claims that European regulators have looked into the tech giant’s deals with music labels and found no evidence of collusion. From Re/Code:

Investigators examined whether the labels conspired with one another or with Apple on Apple’s new streaming music service in a way that would hurt rivals. The probe failed to turn up any illegal activity, though the EU will continue to monitor the market, sources said.

Apart from the European Commission, Apple Music is also being scrutinized by concerned consumers and regulators in the U.S.. In late July, U.S. Senator Al Franken penned a letter to the Department of Justice and the Federal Trade Commission urging the agencies to look into Apple’s licensing agreements. At the same time, consumer advocacy group, Consumer Watchdog, also called for an investigation by the agencies.

For its part, the FTC is said to already be leading an investigation to determine whether Apple’s 30% cut of subscription fees from apps on its App Store, particularly from music streaming services like Spotify, is anticompetitive.

Source: Re/Code

View full post on MobileNations

Risk Evaluation Report Finds Mobile Banking Leaves Some Banks More Vulnerable to Cyber Attacks

Source: National Cyber Security – Produced By Gregory Evans

While mobile banking is no doubt convenient for customers – and banks – there’s a significant downside to the fact that more and more financial institutions are using the technology: an increased risk that your personal information will fall in the hands of a cyber criminal. A new report [PDF] from the U.S. Office of the Comptroller of the Currency suggests that banks’ strategies to implement mobile technology often leaves their infrastructure open to cyber attacks, the Chicago Tribune reports. According to the OCC’s semiannual risk perspective report released on Tuesday, banks are increasingly embracing the use of technology such as cloud computing and mobile banking to stave off the competition. While the ease of mobile banking and other advances can not only save customers time but save banks money, the OCC found that these systems can “increase exposure to technological and operational risk.” “Banks and their employees, customers and third-party service providers continue to be vulnerable to cyberattacks that can compromise data or systems or allow criminals to illegally obtain personally identifiable information,” the report states. The report also found that many banks lacks sufficient response plans if they find themselves on the wrong side of a cyber attack. “There are […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Risk Evaluation Report Finds Mobile Banking Leaves Some Banks More Vulnerable to Cyber Attacks appeared first on National Cyber Security.

View full post on National Cyber Security

Hacker finds vulnerability in Facebook, can delete your photo albums

facebook_research-600x399

Source: National Cyber Security – Produced By Gregory Evans

Like it or not, Facebook has become almost ubiquitous in today’s world. Most people you know, both young and old, are on there. Worse, some folks keep memories of their lives stored on the service, including precious photos that, in some cases, may not be backed up in any way. It feels safe, after all, Facebook wouldn’t lose them, right? Not so fast. This is less about Facebook losing them, I’m sure it has backups, but more about a third-party taking them away. That sounds scary, but a security researcher has proven it’s possible. Laxman Muthiyah posted his findings along with details of how the exploit works. Essentially he utilized the Graph API to accomplish both deletion of his own album and then that of a “victim”. Though Facebook claims this isn’t possible, it is quite the opposite case and proof is posted for everyone to see. The token generated should only grant limited access, however generating a token for the mobile version of the social network changed things. “The album got deleted! So i got the key to delete all of your Facebook photos”, Muthiya calmly states. Of course he won’t do this, he’s only proving a point. But that point should be acted upon quickly by […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Hacker finds vulnerability in Facebook, can delete your photo albums appeared first on National Cyber Security.

View full post on National Cyber Security

Apple Hacker Finds Undocumented iOS Backdoors

A well-known iPhone hacker and app developer has found a range of undocumented functions in Apple’s iOS mobile operating system that make it possible to grab data off devices wirelessly or via USB connections, without entering passwords or personal identification […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

View full post on National Cyber Security

Illegal immigration costs California taxpayers more than $25 billion a year, finds FAIR

Top Priority Sector:  border_security A new study released by the Federation for American Immigration Reform (FAIR) finds that providing education, health care, law enforcement, and social and government services to illegal aliens and their dependents costs Californians $25. Read More….

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Illegal immigration costs California taxpayers more than $25 billion a year, finds FAIR appeared first on National Cyber Security.

View full post on National Cyber Security

Research Finds MAC Address Hashing Not a Fix for Privacy Problems

research project done by a graduate student at Stanford on the security of hashed MAC addresses in retail analytics software has shown that to be true once again.
One of the things that has raised the hackles of privacy advocates in recent years is the rise of passive tracking of consumers’ mobile devices as they move through stores, coffee shops, malls and other locations. Retailers can use software that detects the network announcements that cell phones with WiFi and Bluetooth enabled make periodically in order to track a given person’s device. This allows retail analytics firms to build databases that include the various locations that a device has been tracked in over a period of time.
This presents some rather obvious privacy issues, because most consumers have no idea that their devices are sending out these signals, let alone that retailers are gathering the information and building massive databases with the results. In October, a code of conduct surrounding retail analytics was released, and one of the provisions is for firms to hash the MAC addresses of users’ devices after they’re collected as a way to preserve users’ privacy. Jonathan Mayer, a PhD student at Stanford University, decided to take a look at how difficult it would be to reverse the hash of a given device’s MAC address, something that is meant to be quite difficult.
Hash functions take an input, in this case a device’s MAC address, and produce a random series of letters and numbers as the output, the hash value.

View full post on Who Got Hacked – Latest Hacking News and Security Updates

Couple finds racial slur on key chain tag

RestaurantComplaint2

A Georgia couple says they’re still in shock after they were the target of racism at a popular local restaurant. Photo: WSB-TV

EAST POINT, Ga. — A Georgia couple says they’re still in shock after they were the target of racism at a popular local restaurant.

A U.S. Army sergeant major just back from Kuwait and his wife went to Spondivits in East Point on New Year’s Day, but what they found on their key ring when they got home left them deeply hurt.”I shouldn’t have to feel this way,” said Candea Aarons.When Candea and her husband Sam got home they noticed the tag left by the man who they say valet parked their car, with the words “jungle fever,” a derogatory slur used to describe interracial couples.”We have never been so blatantly described in such a blatantly appalling manner ever,” Candea Aarons said.Aarons said the ugly message left her and her husband deeply hurt.”We had no idea that the valet was looking at us or thinking of us in such a manner,” she said.

Channel 2 investigative reporter Aaron Diamant asked for an explanation, but Spondivits leaders refused our requests for an on camera interview.

The restaurant’s chef, Glenn Gane, told Diamant the valet worked for a contractor called APS Valet.

In a statement, Gane said, “Spondivits does not tolerate racial speech of any kind.”

Later, APS Valet’s owner told Diamant by phone that “the valet in question is no long working with APS. APS does not tolerate racism of any kind whatsoever.”

But Candea Aarons said the fact the valet got fired is little consolation.

“I was unaware, I was unprepared and I was unaware racism is alive and well,” she said.

Neither Spondivits or APS Valet would identify the name of the fired valet, but the Aarons said the individual was African-American.

By Aaron Diamant, WSB-TV

The post Couple finds racial slur on key chain tag appeared first on Atlanta Free Speech.

View full post on Atlanta Free Speech

Government shutdown had remarkably broad impact across U.S., survey finds

Top Priority Sector:  federal_agencies_legislative The 16-day shutdown of the U.S. Government in October 2013 had widespread business and personal impacts that reached far beyond the federal sector and well outside the Washington, D. Read More….

View full post on The Cyber Wars

Page 1 of 612345»...Last »

My Twitter

Gregory D. Evans On Facebook