Tag Archive for: Helps

Apple’s Increasingly High Walled Garden Helps Hackers Avoid Capture


A new report highlights how despite Apple’s increasingly high walled garden ecosystem, hackers are finding more ways inside.

According to a new exposé from MIT Technology Review, Apple’s effort to increase security in both hardware and software is experiencing a downside — the Cupertino company’s walled garden approach is making it easier for hackers to hide.

“It’s a double-edged sword,” says Bill Marczak, a senior researcher at the cybersecurity watchdog Citizen Lab. “You’re going to keep out a lot of the riffraff by making it harder to break iPhones. But the 1% of top hackers are going to find a way in and, once they’re inside, the impenetrable fortress of the iPhone protects them.”

Marczak’s primary concern is that as Apple builds increasingly locked-down devices, it’s becoming more difficult for security researchers to discover hacking activity:

He argues that while the iPhone’s security is getting tighter as Apple invests millions to raise the wall, the best hackers have their own millions to buy or develop zero-click exploits that let them take over iPhones invisibly. These allow attackers to burrow into the restricted parts of the phone without ever giving the target any indication of having been compromised. And once they’re that deep inside, the security becomes a barrier that keeps investigators from spotting or understanding nefarious behavior—to the point where Marczak suspects they’re missing all but a small fraction of attacks because they cannot see behind the curtain.

And while Apple regularly updates its devices with software that fixes security flaws, these same updates can also hinder the various tools used by security researchers:

Sometimes the locked-down system can backfire even more directly. When Apple released a new version of iOS last summer in the middle of Marczak’s investigation, the phone’s new security features killed an unauthorized “jailbreak” tool Citizen Lab used to open up the iPhone. The update locked him out of the private areas of the phone, including a folder for new updates—which turned out to be exactly where hackers were hiding.

Faced with these blocks, “we just kind of threw our hands…

Source…

Ring Geofence Helps Conveniently Conform Your Security To Your Needs


Amazon-owned Ring is now rolling out a new Geofence feature to help automate at least some of the features found in its app. As its branding implies, the Ring Geofence is a purely software-side change that sets up location-based boundaries. But those boundaries aren’t necessarily meant to manage the top-rated security products Ring sells. Instead, they’re meant to provide helpful tips, reminders, and automation of the app.

If Ring Geofence doesn’t automate Ring’s cameras and sensors, what does it do?

The best example of how Ring Geofence can be useful comes in the form of how Ring handles alerts and reminders. In effect, it automates them on a per-user basis.

The example provided by the company starts with setting up a Geofence. That’s a user-defined boundary around the home or business protected by Ring devices. The setting itself is found in the side menu of the Ring app — with the update now rolling for all users on all platforms. Once activated, users can customize the boundaries of Geofence to best suit their needs. The automation then occurs on the app side.

Once enabled, Geofence can send alerts based on whether the boundary has been crossed. For instance, it can remind users to switch their security system over to “Away” mode. In effect, reminding users to disarm or arm their system.

The system can also be set up to automatically snooze alarms when it senses that the boundary has been crossed. So users can walk up to their own front door without getting an alert from a Ring Video Doorbell that there’s somebody at the door. Ring snoozes that alert temporarily too, so the motion alerts are reactivated after users get inside.

Is Geofence safe to use, since it uses real-time location data?

While Geofence is based on real-time location data, used by the app, it doesn’t collect that data. The data is retained only for long enough to identify whether the user-defined boundaries have been crossed.

Perhaps as importantly, those settings and alerts are user-specific. So they only appear on the device they’ve been set on. They don’t duplicate on other signed-in devices or for Shared Users. So users’ location data should remain safely on-device, on a device-by-device basis.

Source…

Cutting-edge tech helps combat internet fraud


Visitors at the booth of Tencent Holdings Ltd during an expo in Wuhan, capital of Central China’s Hubei province. [Photo provided to China Daily]

Cutting-edge technologies such as big data and artificial intelligence are being used increasingly to combat internet fraud as new cases of telecommunication and online fraud are imperiling the safety of personal information and social stability, a new report said.

Chinese consumers have actively used online shopping and innovative online payment services during the COVID-19 pandemic this year, but many have also been defrauded while making online transactions, said a report released by Chinese internet giant Tencent Holdings Ltd on Tuesday. Young consumers aged between 20 and 29 topped all other groups in encountering telecom and online fraud.

The report said that new cybercrimes are developing features of industrialization and intelligence, and have formed a dark internet industrial chain. The most common fraudulent messages included those on online trading platforms, fake job positions offering high salaries, internet dating and social networking websites.

To prevent and crackdown on online fraud, Tenpay, the payment affiliate of Tencent, has launched an intelligent risk control system based on the large amounts of transaction models and data, which can realize the perception and management of transaction risks in the whole process. The analysis results will be directly sent to users through WeChat Pay.

Users will also receive a message that reminds them about the potential risks of online trading, so as to further protect their financial resources.

So far, the company has cracked down on more than 2 million illegal accounts and assisted local police to arrest over 7,600 suspects. The amount of money involved has surpassed 34.5 billion yuan ($5.3 billion).

The report also said that cybersecurity is not related to the internet alone, but involves personal safety and even social stability. It warned the public to remain vigilant about internet security risks, including telecom scams, fraud messages and malicious websites.

Hai Wen, a cybersecurity expert from Tencent, called for deeper cooperation…

Source…

Study reveals images of the coronavirus forming tentacles in cells — but monstrous discovery helps identify new treatment – Milwaukee Journal Sentinel

Study reveals images of the coronavirus forming tentacles in cells — but monstrous discovery helps identify new treatment  Milwaukee Journal Sentinel
“HTTPS hijacking” – read more