Tag Archive for: Gaining

Calendar app gaining popularity with students raises security concerns


COLORADO SPRINGS — A popular app used by high schoolers is raising concerns from parents and cybersecurity experts. The Saturn app is promoted as a way for high school students to view their schedule, chat, and create a social calendar for meeting up, and planning for school events.

Just two weeks ago, concerns were raised by parents over the ability to link to a user’s TikTok, Snapchat, and other social media accounts.

Another big concern is anyone who downloads the app can make a profile, claiming to be a student. But after reaching out to Saturn myself, I’m told the app has created major changes in the past week to increase security.

Saturn Technologies released a statement saying it is now using a verification process to make sure that those who download the app are actual students at the school they claim to be a part of. The verification process makes sure users use a school email to view class details and students’ profiles.

But a local cybersecurity expert I spoke with tells me the app still holds several red flags when it comes to security. And he doesn’t believe the app is secure enough to shy away hackers.

“Some of the dangers that you might encounter from having too much information on there is stalking, there might be stalkers out there if your location is known, you open yourself up to burglary or more serious crimes. Identity theft, data breaches, so there’s a slew of things that kids face once they get on this particular app,” said Thomas Russell, a cyber education program manager at the National Cybersecurity Center.

“Right now, I can join and easily mock some type of school email because I know the patterns of the school emails locally, and I can easily go in there and get an account myself. And if I can do it, that means anyone can do it.”

Thomas tells me this is a concern because your child can never know exactly who they are talking to. It’s important that parents use parental controls and look at the app and continue to monitor their child’s chat room behavior on the app.

While the app has grown in popularity in our area, it is not something local high schools are asking their students to download. I spoke with several local school…

Source…

Swiss hacker succeeds in gaining access to US government’s no-fly list: Local media


Mandatory cookies are used on our website www.aa.com.tr in order to provide you with a better service. These cookies cannot be disabled via the “Cookie Control Panel”. You can view the cookies used on our site via the “Cookie Control Panel” and change your preferences.


Necessary Cookies


This cookie is used to distinguish between humans and bots. This is beneficial for the web site, in order to make valid reports on the use of their web site.



Functional Cookies


Remembers the user’s selected language version of a website.



Performance/Analytical Cookies


Registers a unique ID that is used to generate statistical data on how the visitor uses the website.Used by Google Analytics to throttle request rate.



Advertising/Marketing Cookies


This cookie is used to collect information on consumer behavior, which is sent to Alexa Analytics. (Alexa Analytics is an Amazon company.)

Source…

NCC warns of new malware gaining control of smartphones


The Nigerian Communications Commission has said there is a new android malware gaining access to smartphones and taking control of infected phones.

In a statement signed by the commission’s Director, Public Affairs, Ikechukwu Adinde, the NCC said the malware is called AbstractEmu and can gain access to smartphones, take complete control of infected smartphones and silently modify device settings while simultaneously taking steps to evade detection.

According to the NCC, this discovery was made by the Nigerian Computer Emergency Response Team. The commission claimed that the malware is distributed through Google Play Store and other third-party stores.

The commission said, “AbstractEmu is distributed via Google Play Store and third-party stores such as the Amazon Appstore and the Samsung Galaxy Store, as well as other lesser-known marketplaces like Aptoide and APKPure.

“The advisory stated that a total of 19 Android applications that posed as utility apps and system tools like password managers, money managers, app launchers, and data saving apps have been reported to contain the rooting functionality of the malware.

“The apps are said to have been prominently distributed via the third-party stores and the apps include All Passwords, Anti-ads Browser, Data Saver, Lite Launcher, My Phone, Night Light and Phone Plus, among others.”

According to the commission, rooting malware is very dangerous, and uses the rooting process to gain privileged access to an android operating system.

The NCC added that once installed, the attack chain is designed to leverage one of five exploits for older Android security flaws that would allow it to gain root permissions.

The NCC said the malware will take over the device, install additional malware, extract sensitive data, and transmit to a remote attack-controlled server.

The commission said, “Additionally, the malware can modify the phone settings to give app ability to reset the device password, or lock the device, through device admin; draw over other windows; install other packages; access accessibility services; ignore battery optimisation; monitor notifications; capture screenshots; record device…

Source…

This easy-to-use information-stealing trojan malware is quickly gaining popularity among cyber criminals – ZDNet

This easy-to-use information-stealing trojan malware is quickly gaining popularity among cyber criminals  ZDNet
“exploit kit” – read more