Tag Archive for: Lists

NCC warns against car hackers, lists ways to stop them


The Nigerian Communications Commission (NCC), in a statement signed by Dr. Ikechukwu Adinde Director, Public Affairs, has said that there is an ongoing cyber-vulnerability system that gives nearby hackers leeway to unlock vehicles, start their engines wirelessly and steal cars.

According to the latest advisory released by the Computer Security Incident Response Team (CSIRT), the cybersecurity centre for the telecom sector established by the NCC, the vulnerability is a Man-in-the-Middle (MitM) attack or, more specifically, a replay attack in which an attacker intercepts the RF signals normally sent from a remote key fob to the car, manipulates these signals, and re-sends them later to unlock the car at will.

The fact that car remotes are categorised as short range devices that make use of radio frequency (RF) to lock and unlock cars informed the need for the Commission to alert the general public on this emergent danger, where hackers take advantage to unlock and start a compromised car.

NCC says in the statement

With this latest type of cyber-attack, it is also possible to manipulate the captured commands and re-transmit them to achieve a different outcome altogether.

NCC warns against car hackers
NCC warns against car hackers (PHOTO: Wardsauto)

“Multiple researchers disclosed a vulnerability, which is said to be used by a nearby attacker to unlock some Honda and Acura car models and start their engines wirelessly. The attack consists of a threat actor capturing the radio frequency (RF) signals sent from your key fob to the car and resending these signals to take control of your car’s remote keyless entry system,” the advisory stated.

How to stop the hackers

NCC warns against car hackers

The NCC-CSIRT, in the advisory, has offered some precautionary measures or solutions that can be adopted by car owners to prevent falling victim to the attack.

When affected, the only mitigation is to reset your key fob at the dealership. Besides, the affected car manufacturer may provide a security mechanism that generate fresh codes for each authentication request, this makes it difficult for an attacker to ‘replay’ the codes thereafter. Additionally, vulnerable car…

Source…

After ‘Sulli Deals’, now ‘Bulli Bai’ app lists Muslim women ‘for sale’. Delhi Police lodges FIR


New Delhi: Months after a now defunct website called ‘Sulli Deals’ put up photographs of Indian Muslim women, listing them for “sale”, a similar website and app by the name of ‘Bulli Bai’ has triggered outrage. 

On the complaint of a woman journalist who had allegedly been targeted by the app, Delhi Police has registered an FIR under section 509 (word, gesture or act intended to insult the modesty of a woman) of the IPC, the ANI reported Sunday.

The app, which surfaced on software development platform GitHub and reportedly carried pictures of a 100 Muslim women, was called out by several women on social media Saturday.

Later in the day, IT Minister Ashwini Vaishnaw tweeted that the app has been blocked by GitHub and the police and Computer Emergency Response Team (CERT) an agency under the IT ministry that deals with cyber security are probing the matter.

The Delhi Police had tweeted Saturday that concerned officials had been directed to take appropriate action, reacting to a tweet by journalist Ismat Ara, who shared a screenshot of her photos featured on the app.

“Very sad that as a Muslim woman you have to start your new year with this sense of fear and disgust,” she wrote.

Another journalist, Hiba Beg, also shared on Twitter that her pictures “were being auctioned off” on the app. 

The website http://bullibai.github.io/ is no longer functional. Four Twitter accounts that were posting screenshots of the app (@wannabesigmaf, @bullibai_, @sage0x11 and @jattkhalsa7) have been deactivated. 

Source…

Mac And iPhone Todo Lists Gone Wild

We’re teachers at a private school in Chicago, IL. I’m also the school’s resident Mac system administrator, PC troubleshooter, and a diehard Mac diva and iPhone hacker. Read more of my articles here.
mac hacker – read more