Interesting

Tag: Hacker

Researchers uncover Chinese spyware EagleMsgSpy used to target Android devices

Ravie Lakshmanan, writing for The Hacker News »

“EagleMsgSpy collects extensive data from the user: third-party chat messages, screen recording and screenshot capture, audio recordings, call logs, device contacts, SMS messages, location data, [and] network activity.”

EagleMsgSpy has been described by its developers as a “comprehensive mobile phone judicial monitoring product” that can obtain “real-time mobile phone information of suspects through network control without the suspect’s knowledge, monitor all mobile phone activities of criminals, and summarize them.”

Elsewhere » TechCrunch | Recorded Future | BleepingComputer

What is the Dark Web? A Guide to the Dark Side of the Internet

For most, the dark web is a mysterious and misunderstood part of the internet, shrouded in secrecy and intrigue. It’s that seedy part of the town that has a bad reputation for crime.

IBM security guy, Jeff Crume, explains what the dark web is, how it works, what kinds of things go on there, and some of the risks about going there. Be warned, the dark web is not for the faint of heart and could increase your exposure to cyber attacks. This neighbourhood is popular with whistleblowers, journalists looking for hot tips, criminal marketplaces, and hackers.


Note: Clicking the above image will load and play the video from YouTube.

Fraudster used deepfake AI voice cloning to convince a bank manager to transfer US$35 million

Thomas Brewster, writing for Forbes »

In early 2020, a branch manager of a Japanese company in Hong Kong received a call from a man whose voice he recognized—the director of his parent business. The director had good news: the company was about to make an acquisition, so he needed to authorize some transfers to the tune of $35 million. A lawyer named Martin Zelner had been hired to coordinate the procedures and the branch manager could see in his inbox emails from the director and Zelner, confirming what money needed to move where. The manager, believing everything appeared legitimate, began making the transfers.

What he didnt know was that he’d been duped as part of an elaborate swindle, one in which fraudsters had used “deep voice” technology to clone the director’s speech.

“Audio and visual deep fakes represent the fascinating development of 21st century technology yet they are also potentially incredibly dangerous posing a huge threat to data, money and businesses,” says Jake Moore, a former police officer with the Dorset Police Department in the U.K. and now a cybersecurity expert at security company ESET. “We are currently on the cusp of malicious actors shifting expertise and resources into using the latest technology to manipulate people who are innocently unaware of the realms of deep fake technology and even their existence.

“Manipulating audio, which is easier to orchestrate than making deep fake videos, is only going to increase in volume and without the education and awareness of this new type of attack vector, along with better authentication methods, more businesses are likely to fall victim to very convincing conversations.”

Elsewhere » Gizmodo

© 2024 Downshift

Theme by Anders NorenUp ↑