loader from loading.io

Check If You've Been a Victim of "InfoStealer" Ukrainian Master Hacker Arrested - Police Used His Girlfriend's Instagram to Track Them

Craig Peterson - America's Leading Technology News Commentator

Release Date: 11/19/2022

ChatGPT's Technology Will Be Part of Everything This Year - How AI chatbot ChatGPT changes the phishing game - Microsoft Looking to Invest $10 billion More show art ChatGPT's Technology Will Be Part of Everything This Year - How AI chatbot ChatGPT changes the phishing game - Microsoft Looking to Invest $10 billion More

Craig Peterson - America's Leading Technology News Commentator

ChatGPT's Technology Will Be Part of Everything This Year ChatGPT is a new text-generation tool trained on 40GB of Reddit's data. It can generate long passages of text virtually indistinguishable from human-written prose, which could have enormous implications for everything from customer service chatbots to fake social media accounts. The company behind ChatGPT is also working on ways to detect if the text was generated by ChatGPT or a human—though some experts worry about how bad actors could misuse this technology. The technology has generated random plot descriptions for video games to...

info_outline
Google Ads Were Weaponized - Identifying Criminals Using Cell Phone Location Data - WhatsApp Was Hacked By an Israeli Company – US Supreme Court Allows WhatsApp to Sue NSO Group - Identity Thieves Bypassed Experian Security to View Credit Reports show art Google Ads Were Weaponized - Identifying Criminals Using Cell Phone Location Data - WhatsApp Was Hacked By an Israeli Company – US Supreme Court Allows WhatsApp to Sue NSO Group - Identity Thieves Bypassed Experian Security to View Credit Reports

Craig Peterson - America's Leading Technology News Commentator

Google Ads were weaponized in a way that made them appear like any other ad – Allowed hackers to infect computers with malware via a single click. Hackers have weaponized Google Ads to spread malware to unsuspecting users by disguising them as regular ads. They do this by cloning the official websites of popular software products, such as Grammarly, Audacity, μTorrent, and OBS, and distributing trojanized versions of the software when users click the download button. This tactic allows hackers to infect users' computers with malware through a single click. Google Ads, also known as Google...

info_outline
The Newest Artificial Intelligence Is About to Change Your Life! And It's Code Red for Google. show art The Newest Artificial Intelligence Is About to Change Your Life! And It's Code Red for Google.

Craig Peterson - America's Leading Technology News Commentator

Artificial Intelligence is changing the world. Right Now! In just a few years, it's possible that you might be chatting with a support agent who doesn't have a human body. You'll be able to ask them anything you want and get an answer immediately. Not only that, but they'll be able to help you with things like scheduling appointments, making payments, and booking flights—without any human intervention necessary. This is just one of the many ways that Artificial Intelligence will change our lives this year. We will see more businesses using AI technology to make their processes more efficient...

info_outline
Ring Cameras Hacked - LastPass finally admits crooks stole your info - How to use Password Managers - Which are the best for you? show art Ring Cameras Hacked - LastPass finally admits crooks stole your info - How to use Password Managers - Which are the best for you?

Craig Peterson - America's Leading Technology News Commentator

Privacy… Ring Cameras Hacked in 'Swatting' Scheme Critics and researchers say the Ring cameras are used to surveil gig economy drivers and delivery people and that they give law enforcement too much power to survey everyday life. The pair would hack people's Yahoo email accounts, then their Ring accounts, find their addresses, call law enforcement to the home with a bogus story, and then stream police's response to the call. Often, they would harass the first responders at the same time using Ring device capabilities. ++++++++ LastPass finally admits: Those crooks who got in? They did steal...

info_outline
Slave Labor in China - Apple Moves Out - Spyware posing as VPN apps - Darknet markets generate millions in revenue by selling stolen personal data - Voice-scamming site “iSpoof” seized show art Slave Labor in China - Apple Moves Out - Spyware posing as VPN apps - Darknet markets generate millions in revenue by selling stolen personal data - Voice-scamming site “iSpoof” seized

Craig Peterson - America's Leading Technology News Commentator

Craig Peterson  Insider Show NotesDecember 5 to December 11, 2022 China… Apple Makes Plans to Move Production Out of China In recent weeks, Apple Inc. has accelerated plans to shift some of its production outside China, long the dominant country in the supply chain that built the world’s most valuable company, say people involved in the discussions. It is telling suppliers to plan more actively for assembling Apple products elsewhere in Asia, particularly India and Vietnam, they say and looking to reduce dependence on Taiwanese assemblers led by Foxconn Technology Group. After a year...

info_outline
Can't Trust Amazon.com Any More show art Can't Trust Amazon.com Any More

Craig Peterson - America's Leading Technology News Commentator

It's not your imagination: Shopping on Amazon has gotten worse [Amazon founder Jeff Bezos owns The Washington Post] Sure, Google and Facebook are chock full of ads, too. But on Amazon, we're supposed to be the customers, not the eyeballs for sale. We're paying Amazon to buy a product and probably paying for a membership in its Prime two-day shipping product. When you search for a product on Amazon, you may not realize that most of what you see at first is advertising. Amazon is betraying your trust in its results to make an extra buck. I call it the "shill results" business. Even when they...

info_outline
Check If You've Been a Victim of Check If You've Been a Victim of "InfoStealer" Ukrainian Master Hacker Arrested - Police Used His Girlfriend's Instagram to Track Them

Craig Peterson - America's Leading Technology News Commentator

Malware… Authorities Arrest Developer of Malware Service - Was Your Credit Card or Other Personal Information Stolen? And How He Was Captured According to the U.S. Justice Department, FBI agents have identified more than 50 million unique credentials and forms of identification (email addresses, bank accounts, cryptocurrency addresses, credit card numbers, etc.) stolen. Raccoon was essentially a Web-based control Crime-as-a-Service panel, where — for $200 a month — customers could get the latest version of the Raccoon Infostealer malware and interact with infected systems in real-time....

info_outline
The Semiconductor Industry Is Coming for Your Wallet - DuckDuckGo Should Be Your Go-To Search Engine - Which Messaging Apps Are Secure: Signal vs. WhatsApp - The Upside-Down Logic of Electric SUVs - Biden Goes Nuclear POWER! Amazon might own your doctor show art The Semiconductor Industry Is Coming for Your Wallet - DuckDuckGo Should Be Your Go-To Search Engine - Which Messaging Apps Are Secure: Signal vs. WhatsApp - The Upside-Down Logic of Electric SUVs - Biden Goes Nuclear POWER! Amazon might own your doctor

Craig Peterson - America's Leading Technology News Commentator

The Semiconductor Industry Is Coming for Your Wallet - DuckDuckGo Should Be Your Go-To Search Engine - Which Messaging Apps Are Secure: Signal vs. WhatsApp - The Upside-Down Logic of Electric SUVs - Biden Goes Nuclear POWER! Amazon might own your doctor's office after their latest acquisition. The Semiconductor Industry Is Coming for Your Wallet. As Usual, Congress Is Complicit In recent months, the auto and tech sectors have faced unprecedented delays and rising prices. Some used cars are even selling for more than their new counterparts because of the delays, a sure sign that production has...

info_outline
What Happens When a Scammer Has Your Email Address? Prevention - Signs You're Hacked - Recovery show art What Happens When a Scammer Has Your Email Address? Prevention - Signs You're Hacked - Recovery

Craig Peterson - America's Leading Technology News Commentator

What Happens When a Scammer Has Your Email Address? Prevention - Signs You're Hacked - Recovery While your email address might not seem that valuable, scammers can extract a lot of information that they can use against you. Below are some things they can do with your email address information: Scammers Can Impersonate You Send Phishing Emails Scammers Can Access Your Online Accounts How to Protect Your Email Address from Scammers? Using Robust Passwords Set Up Multi-Factor Authentication Update Your Device’s Security Software Enable Dark Web Monitoring Signs Your Email Account Has Been...

info_outline
Can You Secure Security Cameras? The Coming Green Energy Nightmare - Email Scams Hitting Businesses and Lonely Hearts show art Can You Secure Security Cameras? The Coming Green Energy Nightmare - Email Scams Hitting Businesses and Lonely Hearts

Craig Peterson - America's Leading Technology News Commentator

Can You Secure Security Cameras? The Coming Green Energy Nightmare - Email Scams Hitting Businesses and Lonely Hearts Scams… Eight questions to ask yourself before getting a security camera Security cameras were once the preserve of the rich and famous. Now anyone can get their hands on one thanks to technological advances. The advent of the Internet of Things (IoT) has created a significant new market – for manufacturers of devices like connected doorbells and baby monitors and more sophisticated whole-of-property systems. Connected to home Wi-Fi networks, these devices allow owners to...

info_outline
 
More Episodes

Malware…

Authorities Arrest Developer of Malware Service - Was Your Credit Card or Other Personal Information Stolen? And How He Was Captured

https://krebsonsecurity.com/2022/10/accused-raccoon-malware-developer-fled-ukraine-after-russian-invasion/

According to the U.S. Justice Department, FBI agents have identified more than 50 million unique credentials and forms of identification (email addresses, bank accounts, cryptocurrency addresses, credit card numbers, etc.) stolen.

Raccoon was essentially a Web-based control Crime-as-a-Service panel, where — for $200 a month — customers could get the latest version of the Raccoon Infostealer malware and interact with infected systems in real-time. Security experts say the passwords and other data stolen by Raccoon malware were often resold to groups engaged in deploying ransomware.

U.S. authorities zeroed in on a mistake that the Raccoon developer made early on in his posts to the crime forums, connecting a Gmail account for a cybercrime forum identity used by the Raccoon developer ("Photix") to an Apple iCloud account belonging to Sokolovsky.

Authorities soon tracked Sokolovsky's phone through Germany and eventually to The Netherlands, with his female companion helpfully documenting every step of the trip on her Instagram account.

Check If You Were Compromised:

https://raccoon.ic3.gov/home

++++++++

Former Uber Chief Found Guilty of Hiding Hack From Authorities.

https://www.nytimes.com/2022/10/05/technology/uber-security-chief-joe-sullivan-verdict.html

Joe Sullivan, the former Uber security chief, was found guilty by a jury in federal court on charges that he did not disclose a breach of customer and driver records to government regulators.

The case — believed to be the first time a company executive faced criminal prosecution over a hack — could change how security professionals handle data breaches.

Airbnb…

Throwing the spotlight on hidden cameras in Airbnb

https://www.welivesecurity.com/2022/11/01/spy-who-rented-to-me-hidden-cameras-airbnbs/

In recent years, some travelers have had their dream vacations ruined by one particularly creepy privacy risk – covert cameras in rental properties, which are often booked via platforms such as Airbnb. Ours is also a time when all sorts of surveillance gadgets are increasingly affordable; what's more, these gadgets are often tiny and/or designed to look like everyday objects – they are intended to be challenging to spot.

Airbnb's policy on the matter is pretty unequivocal. Security cameras and noise-monitoring devices are allowed "as long as they are clearly disclosed in the listing description and don't infringe on another person's privacy."

How to Find a Hidden Security Camera:

  • Physically check the room: Look for cameras hiding in plain sight, perhaps in clocks, smoke detectors, speakers, or even light bulbs
  • Use a flashlight: Camera lenses are made of glass, meaning they're reflective. So turn the lights down and shine a flashlight around the property.
  • Check for night vision lights: Turning the lights down or off will also help you spot the tell-tale red or green LEDs, which may illuminate night vision cameras.
  • Use an app: Researchers have been working on a mobile application that uses phones' Time-of-Flight (ToF) sensor to find spy cams hidden in everyday objects. 
  • Detect RF signals: A final tell-tale sign of a hidden camera is to monitor for radio frequencies (RF) that the camera may use to connect to a secret network. In addition, a hidden camera may interfere with your phone signal, so stop and investigate.

Baby Monitors…

Hacking baby monitors can be child's play: Here's how to stay safe

https://www.welivesecurity.com/2022/11/07/hacking-baby-monitors-childs-play-how-stay-safe/

We've probably all read horror stories online: a parent is woken in the middle of the night by strange noises coming from their child's bedroom. They open the door, only to find a stranger "talking" to their baby through the monitor. While rare, such cases do happen from time to time.

How to Stay Safer:

  • Research your options well, and aim to go with a well-regarded manufacturer with a strong emphasis on security and good reviews.
  • Install any updates to the device's software (or firmware)
  • If possible, choose a model that does not allow remote communication via an app. If it does, turn off remote access, especially when not in use.
  • I am setting up a solid and unique password and enabling two-factor authentication if possible.
  • Review monitor logs regularly to check for any suspicious activity, such as individuals accessing it from a unique IP or at strange times.
  • Secure your wireless router with a strong, unique password. Also, disable remote access to it and port forwarding or UPnP. Finally, make sure the router is kept updated with any firmware patches.

Apple…

Apple Tracks You Even With Its Own Privacy Protections on, Study Says

https://gizmodo.com/apple-iphone-analytics-tracking-even-when-off-app-store-1849757558

For all of Apple's talk about how private your iPhone is, the company vacuums up a lot of data about you. But, of course, iPhones have a privacy setting that is supposed to turn off that tracking. According to a new report by independent researchers, though, Apple collects highly detailed information on you with its apps even when you turn off tracking, an apparent direct contradiction of Apple's own description of how their privacy protection works.

Security researchers at the software company Mysk looked at the data collected by several Apple iPhone apps—the App Store, Apple Music, Apple TV, Books, and Stocks. They found the analytics control and other privacy settings had no noticeable effect on Apple's data collection—the tracking remained the same whether iPhone Analytics was switched on or off.

"The level of detail is shocking for a company like Apple," Mysk told Gizmodo.

++++++++

Apple clarifies security update policy: Only the latest OSes are fully patched.

Despite providing security updates for multiple versions of macOS and iOS at any given time, Apple says that only devices running the most recent major operating system versions should expect to be fully protected.

In other words, while Apple will provide security-related updates for older versions of its operating systems, only the most recent upgrades will receive updates for every security problem Apple knows about. For example, apple currently provides security updates to macOS 11 Big Sur and macOS 12 Monterey alongside the newly released macOS Ventura. In addition, in the past, it has released security updates for older iOS versions for devices that can't install the latest upgrades.

Most Macs still receive six or seven years of upgrades, plus another two years of security updates.