Tag Archive for: Messages

A Dangerous #Android Banking Malware That Steals Victim’s Credentials and SMS Messages Has … – Latest Tweet by IANS India


(SocialLY brings you all the latest breaking news, viral trends and information from social media world, including Twitter, Instagram and Youtube. The above post is embeded directly from the user’s social media account and LatestLY Staff may not have modified or edited the content body. The views and facts appearing in the social media post do not reflect the opinions of LatestLY, also LatestLY does not assume any responsibility or liability for the same.)

Source…

WhatsApp Feature Allows You to Create Disappearing Messages


Image for article titled WhatsApp Is Working on Offering Disappearing Photo and Video Messages on iOS and Android

Photo: Yasuyoshi Chiba / AFP (Getty Images)

WhatsApp apparently wants to give users a bit more control over the photos and videos they share on the messaging app. The company recently unveiled a new feature to iOS and Android beta testers that allows them to send disappearing messages.

As reported in WABetaInfo, WhatsApp released the “View Once” feature for iOS users on Friday, shortly after it rolled it out for Android users in late June. The feature allows users to send photos and videos that will disappear from WhatsApp chats after they’re viewed once. It appears to be very similar to the feature offered on Instagram and Facebook Messenger, although Instagram allows senders to let recipients view the content once more before it disappears.

And, of course, all of these features build off the formula popularized by the original disappearing media network: Snapchat.

Notably, according to screenshots taken by WABetaInfo, the app will not prevent others from taking screenshots. The content will disappear in the sender’s chat and in the recipient’s chat if View Once is selected. Senders will be able to see whether their content has been viewed in the chat by watching out for an “Opened” message. For Android users, the feature was also available for group chats.

“For more privacy, your photo or video will disappear from the chat after the recipient opens it once,” the message announcing the feature in the app reads. “Remember, people can always take screenshots.”

The outlet reports that WhatsApp will not notify users if recipients have taken screenshots of their disappearing content. It explains that this is because there is no foolproof way of blocking users from taking screenshots and sustains that claiming to do so would offer users a false sense of security. Alas, who knows what people would send. Considering the stuff people send in messages even when they know others could take screenshots, this is probably accurate.

WhatsApp CEO Will Cathcart and Facebook CEO Mark Zuckerberg personally confirmed this feature to WABetaInfo in early June, so it’s safe to say we’ll all be getting it soon. Zuckerberg also mentioned a…

Source…

How an app to decrypt criminal messages was born ‘over a few beers’ with the FBI


Australian and US law enforcement officials on Tuesday announced they’d sprung a trap three years in the making, catching major international crime figures using an encrypted app.

More than 200 underworld figures in Australia have been charged in what Australian Federal Police (AFP) say is their biggest-ever organised crime bust.

The operation, led by the US Federal Bureau of Investigations (FBI), spanned Australia and 17 other countries. In Australia alone, more than 4,000 police officers were involved.

At the heart of the sting, dubbed Operation Ironside, was a type of “trojan horse” malware called AN0M, which was secretly incorporated into a messaging app. After criminals used the encrypted app, police decrypted their messages, which included plots to kill, mass drug trafficking and gun distribution.

graphic of padlock and tech symbols
Police used an encrypted app used by underworld figures to bust the crime network.
Shutterstock

Millions of messages unscrambled

AFP Commissioner Reece Kershaw said the idea for AN0M emerged from informal discussions “over a few beers” between the AFP and FBI in 2018.

Platform developers had worked on the AN0M app, along with modified mobile devices, before law enforcement acquired it legally and adapted it for their use. The AFP say the developers weren’t aware of the intended use.

Once appropriated by law enforcement, AN0M was reportedly programmed with a secret “back door”, enabling them to access and decrypt messages in real time.

A “back door” is a software agent that circumvents normal access authentication. It allows remote access to private information in an application, without the “owner” of the information being aware.

So the users — in this case the crime figures — believed communication conducted via the app and smartphones was secure. Meanwhile, law enforcement could reportedly unscramble up to 25 million encrypted messages simultaneously.

But without this back door, strongly encrypted messages would be almost impossible to decrypt. That’s because decryption generally requires a computer to run through trillions of possibilities before hitting on the right code to unscramble a message. Only…

Source…

Why OOO Messages And New Employees Are Major Business Security Risks


Ed Bishop is CTO and Co-Founder at cybersecurity company Tessian.

Hackers don’t hack companies; they hack the people who work for them — the human layer of an organization. This might be one of the most simple yet important statements about business security. Hacking humans often doesn’t require any advanced technology or special skills. Bad actors can find everything they need to trick an employee using an email account and some simple internet searching. 

These kinds of social engineering attacks can be highly effective — just look at the Twitter hack in 2020. All it took were a few impersonations to trick Twitter employees and bring down one of the world’s most powerful social media sites. These kinds of attacks are on the rise, too. My company’s researchers saw a 15% increase in social engineering attacks over email during the last six months of 2020.

The more bad actors know about an employee, the more personalized and convincing their attacks will be. A recent Tessian report shed light on two human layer security vulnerabilities — out-of-office (OOO) messages and new employees. The data provides new insight into how companies can safeguard against these attacks. 

TMI In Your OOO

Most people don’t think twice before creating an out-of-office email. In fact, Tessian’s survey of 4,000 employees found that 98% automate their OOO messages. But these email responses can be a gold mine for hackers looking to trick a colleague into sharing sensitive information, login credentials or money. 

In the first instance, many hackers will send a seemingly innocuous mass email to a company’s employees, like a fake newsletter. These emails are designed to trigger OOO messages that provide valuable information, such as how long an employee will be gone, where they’re going and the contact information of a colleague.

These details are the raw material for a convincing email scam. Imagine receiving this email from what appears to be your boss’s personal email: “Hey, I’m visiting my in-laws in Florida and forgot to invoice our consulting partner for the work they did last month. Can you process the attached, using the bank account details…

Source…