Toggle light / dark theme

How Deepfakes Are Powering a New Type of Cyber Crime

Making deepfakes is getting easier, and they’re more convincing than ever. Cybercriminals are using video and audio deepfakes to extort money from victims by adding a credible “fake authenticity” to their scams.

Ever since the first person said “the camera never lies,” there have been people out to prove otherwise. Creative photographers in the late 19th century used simple tricks to create faked images.

The “person in a bottle” gag enjoyed its moment of popularity. Take a photograph of yourself in a suitable pose. Develop and print the photograph at the appropriate size. Cut out your image, pop it into a glass bottle, and take another photograph of yourself holding the bottle. Hey presto, you have an image of yourself holding a bottle containing a miniature version of yourself.

Home and office routers come under attack

Stealth recon and intrusion

On Wednesday, France’s National Agency for Information Systems Security—abbreviated as ANSSI—warned national businesses and organizations that the group was behind a massive attack campaign that was using hacked routers prior to carrying out reconnaissance and attacks as a means to cover up the intrusions.

“ANSSI is currently handling a large intrusion campaign impacting numerous French entities,” an ANSSI advisory warned. “Attacks are still ongoing and are led by an intrusion set publicly referred to as APT31. It appears from our investigations that the threat actor uses a network of compromised home routers as operational relay boxes in order to perform stealth reconnaissance as well as attacks.”

China accused of cyber-attack on Microsoft — BBC News

The UK, US and EU have accused China of carrying out a major cyber-attack earlier this year on Microsoft Exchange email servers.

The attack affected at least 30000 organisations globally.

The UK said Chinese state-backed actors were responsible, while the EU said the attack came from “the territory of China”.

China has previously denied allegations of hacking and says it opposes all forms of cyber-crime.

Please subscribe HERE http://bit.ly/1rbfUog.

#BBCNews

Private Israeli spyware used to hack cellphones of journalists, activists worldwide

Military-grade spyware licensed by an Israeli firm to governments for tracking terrorists and criminals was used in attempted and successful hacks of 37 smartphones belonging to journalists, human rights activists, business executives and two women close to murdered Saudi journalist Jamal Khashoggi, according to an investigation by The Washington Post and 16 media partners.

The phones appeared on a list of more than 50000 numbers that are concentrated in countries known to engage in surveillance of their citizens and also known to have been clients of the Israeli firm, NSO Group, a worldwide leader in the growing and largely unregulated private spyware industry, the investigation found.

The list does not identify who put the numbers on it, or why, and it is unknown how many of the phones were targeted or surveilled. But forensic analysis of the 37 smartphones shows that many display a tight correlation between time stamps associated with a number on the list and the initiation of surveillance, in some cases as brief as a few seconds.

Disable Windows print spooler or you could be hacked, says Microsoft

Facepalm: Microsoft is once again advising its customers to disable Windows print spooler, after a new vulnerability that allows hackers to execute malicious code on machines has emerged. While a patch fixing the flaw will be released in due course, the most effective workaround currently on the table is to stop and disable the print spooler service entirely.

This is the third print spooler vulnerability to emerge in just five weeks. While a critical flaw was originally identified and patched in June, a similar flaw – dubbed PrintNightmare – came to light shortly after and was subsequently patched (with mixed success).

The emergence of this new vulnerability is frustrating news for Microsoft and its users.

VU raises $12M to remove cybersecurity friction from digital experiences

Pretty soon, people won’t have to provide a fingerprint or a driver license to prove their identity — if VU has its way.

The Argentina-based fraud and identity protection company announced $12 million in Series B funding Monday from backers including software developer Globant, as well as Agrega Partners, NXTP Ventures, Bridge One, the IDB Lab and Telefónica. The new funding gives the company total venture-backed investments of $20 million, CEO Sebastián Stranieri told TechCrunch.

Stranieri, who has worked in the cybersecurity industry for the past 20 years, got the idea for VU in 2007 after spending hours helping his grandmother verify her identity with the Argentinian government in what turned out to be a two-minute process.

Hackers accessed Mint Mobile subscribers’ data and ported some numbers

Mint Mobile is an American telecommunications company which sells mobile phone services and operates as an MVNO on T-Mobile’s cellular network in the United States.

BleepingComputer reported that Mint Mobile has disclosed a data breach that exposed subscribers’ account information and ported phone numbers to another carrier.

The data breach notification sent to the impacted subscribers reveals that an unauthorized person gained access to their data between June 8th and June 10th. The company did not reveal how hackers had access to the subscribers’ data.