26
3
submitted 1 year ago by [email protected] to c/[email protected]
27
0
submitted 1 year ago by [email protected] to c/[email protected]

I feel like I'm missing a step. You take down your website, but leave the DNS entry and the attacker does what? Builds a site that has the IP address your CNAME is pointing to? Can anyone make a website in azure and pick the IP address they want? Thanks

28
3
submitted 1 year ago by [email protected] to c/[email protected]
29
4
submitted 1 year ago* (last edited 1 year ago) by [email protected] to c/[email protected]

After being scammed into thinking her daughter was kidnapped, an Arizona woman testified in the US Senate about the dangers side of artificial intelligence technology when in the hands of criminals.

Jennifer DeStefano told the Senate judiciary committee about the fear she felt when she received an ominous phone call on a Friday last April.

Thinking the unknown number was a doctor’s office, she answered the phone just before 5pm on the final ring. On the other end of the line was her 15-year-old daughter – or at least what sounded exactly like her daughter’s voice.

“On the other end was our daughter Briana sobbing and crying saying ‘Mom’.”

Briana was on a ski trip when the incident took place so DeStefano assumed she injured herself and was calling let her know.

DeStefano heard the voice of her daughter and recreated the interaction for her audience: “‘Mom, I messed up’ with more crying and sobbing. Not thinking twice, I asked her again, ‘OK, what happened?’”

She continued: “Suddenly a man’s voice barked at her to ‘lay down and put your head back’.”

Panic immediately set in and DeStefano said she then demanded to know what was happening.

“Nothing could have prepared me for her response,” Defano said.

Defano said she heard her daughter say: “‘Mom these bad men have me. Help me! Help me!’ She begged and pleaded as the phone was taken from her.”

“Listen here, I have your daughter. You tell anyone, you call the cops, I am going to pump her stomach so full of drugs,” a man on the line then said to DeStefano.

The man then told DeStefano he “would have his way” with her daughter and drop her off in Mexico, and that she’d never see her again.

At the time of the phone call, DeStefano was at her other daughter Aubrey’s dance rehearsal. She put the phone on mute and screamed for help, which captured the attention of nearby parents who called 911 for her.

DeStefano negotiated with the fake kidnappers until police arrived. At first, they set the ransom at $1m and then lowered it to $50,000 when DeStefano told them such a high price was impossible.

She asked for a routing number and wiring instructions but the man refused that method because it could be “traced” and demanded cash instead.

DeStefano said she was told that she would be picked up in a white van with bag over her head so that she wouldn’t know where she was going.

She said he told her: “If I didn’t have all the money, then we were both going to be dead.”

But another parent with her informed her police were aware of AI scams like these. DeStefano then made contact with her actual daughter and husband, who confirmed repeatedly that they were fine.

“At that point, I hung up and collapsed to the floor in tears of relief,” DeStefano said.

When DeStefano tried to file a police report after the ordeal, she was dismissed and told this was a “prank call”.

A survey by McAfee, a computer security software company, found that 70% of people said they weren’t confident they could tell the difference between a cloned voice and the real thing. McAfee also said it takes only three seconds of audio to replicate a person’s voice.

DeStefano urged lawmakers to act in order prevent scams like these from hurting other people.

She said: “If left uncontrolled, unregulated, and we are left unprotected without consequence, it will rewrite our understanding and perception what is and what is not truth. It will erode our sense of ‘familiar’ as it corrodes our confidence in what is real and what is not.”

30
2
submitted 1 year ago by [email protected] to c/[email protected]
31
2
submitted 1 year ago by [email protected] to c/[email protected]
32
2
submitted 1 year ago by [email protected] to c/[email protected]

This news is “stunning” say many cybersecurity experts; it’s so bad that a patch can’t resolve it, companies have to completely stop using these (very expensive) machines and get new ones.

33
2
submitted 1 year ago by [email protected] to c/[email protected]

Clop seems to be on a roll, first with GoAnywhere and now with Moveit

34
4
submitted 1 year ago by [email protected] to c/[email protected]
35
1
submitted 1 year ago by [email protected] to c/[email protected]

An overview of the main areas companies need to pay attention to and the tools they can use to get their cybersecurity in better shape.

36
1
submitted 1 year ago by [email protected] to c/[email protected]
37
0
submitted 1 year ago by [email protected] to c/[email protected]

Register for the streamyard URL, no account needed.

38
4
submitted 1 year ago by [email protected] to c/[email protected]
39
3
submitted 1 year ago by [email protected] to c/[email protected]
40
2
submitted 1 year ago by [email protected] to c/[email protected]
41
2
submitted 2 years ago by [email protected] to c/[email protected]
42
1
submitted 2 years ago by [email protected] to c/[email protected]
43
2
submitted 2 years ago by [email protected] to c/[email protected]
44
1
A Cybersecurity Weather Map (dashboard.monarc.lu)
submitted 2 years ago by [email protected] to c/[email protected]

The source code of this software is here: https://github.com/monarc-project/stats-service

Licensed under Affero GPL v3.

It is a decentralized service which can aggregate different kind stats about threats and vulnerabilities. Here is more information: https://www.monarc.lu/documentation/stats-service/master/architecture.html if you want to understand the details.

45
1
submitted 3 years ago* (last edited 3 years ago) by [email protected] to c/[email protected]
46
4
submitted 3 years ago by [email protected] to c/[email protected]

Can write blogs, discuss with each other and a lot more.

47
1
submitted 3 years ago by [email protected] to c/[email protected]
48
2
How do ASLR and DEP work? (security.stackexchange.com)
submitted 3 years ago by [email protected] to c/[email protected]

How do Address Space Layout Randomisation (ASLR) and Data Execution Prevention (DEP) work?
Address Space Layout Randomisation (ASLR) is a technology used to help prevent shellcode from being successful. It does this by randomly offsetting the location of modules and certain in-memory structures. Data Execution Prevention (DEP) prevents certain memory sectors, e.g. the stack, from being executed. When combined it becomes exceedingly difficult to exploit vulnerabilities in applications using shellcode or return-oriented programming (ROP) techniques.

49
1
submitted 3 years ago by [email protected] to c/[email protected]

It started (in recent times) with the USA accusing TikTok and Huawei of being capable of spying (nothing was ever proven), and now with China responding in the same way about Tesla vehicles (laden with cameras, sensors and network connectivity).

All valid concerns, and we do already know for a fact that allies are spying on allies, so they are not groundless concerns, but where does that leave electronic devices that are getting smarter and smarter? It's a concerning future because even if the manufacturer is not overtly assisting with spying, they could be infiltrated and have their information exposed (remember SolarWinds?). In fact, who knows if data from Tesla's in use at US military institutions, have not had their data exposed already in this way to any other foreign power?

Interesting times we live in, and to think our own military was banning all smartphones from their meetings years ago... now it will be smart watches, smart cars, and let's just hope we don't get smart clothing!

See https://mashable.com/article/elon-musk-tesla-china-sharing-data/

#technology #security #spying #Tesla

50
1
submitted 3 years ago by [email protected] to c/[email protected]
view more: ‹ prev next ›

/c/cybersecurity - Cybersecurity News & Discussion

2036 readers
8 users here now

A community for technical news and discussion of cybersecurity and closely related topics.

founded 4 years ago
MODERATORS