Hacker tourism? Travel around the world looking for vulnerable
systems.
Turkish
cybercriminals hack ATMs in Tripura, steal huge cash
After Assam, suspected cybercriminals from Turkey
have stolen huge amounts of cash from ATMs through ATM-cloning
devices installed in Tripura’s capital Agartala, police said on
Monday.
… SBI’s Regional Manager Dibyendu Chowdhury
said that they have so far received complains from 45 customers that
they lost their money due to the ATM hacking.
… According to a cyber-technology expert, the
ATM card cloning system comprises a spy camera, a memory card and a
small data device to gather ATM and account details of bank
customers.
Incidents of stealing money of a large number of
bank customers from ATMs through ATM cloning devices took place in
different parts of the country including Kolkata and Guwahati.
Because suspects are not trustworthy.
The
Newspaper.com reports:
California cops may grab your dashcam video without first obtaining a warrant under a state Court of Appeal ruling published last week. A three-judge panel considered the case of motorist Robert Kien Tran, 39, who was driving his Volkswagen Golf on Palomar Mountain Road on November 6, 2016. This twisty route in San Diego County is a favorite for motorcyclists and car enthusiasts, so Tran had GoPro cameras recording his ascent from both the front and rear of the Golf.
[From
the article:
"Here the data from Tran's dashboard camera was not viewed or downloaded until after a warrant was obtained," Judge Huffman wrote. "Moreover, Tran had possession of the camera, and Palmer expressed concern that he could destroy the camera or the SD card from the camera…
The appellate court found that taking the camera was justified to preserve the potential evidence.
A copy of the ruling is available in a 150k PDF file at the source link below.
Consider the capabilities of the technology. The
police are inside their target’s computer before they
encrypt anything or after they decrypt.
With New
Surveillance Technology, Are Encryption Backdoors Still Needed?
… Much of this new surveillance technology is
now being sold by a handful of surveillance technology companies,
such as Cellebrite and NSO Group, both of them based in Israel. For
its part, Cellebrite sells hacking hardware that enables law
enforcement authorities to hack open locked and encrypted
smartphones. As long as law enforcement officials have the actual
smartphone in their possession and are willing to abide by a
few ground rules (such as only unlocking smartphones in a secure,
designated location), they have the ability to unlock
encrypted phones – something that previously was impossible to do
without the assistance of the phone manufacturer. When law
enforcement authorities tried to get access to the locked iPhone of
the infamous San Bernadino mass shooter, they ran into a brick wall
when Apple refused to unlock the phone for them. With Cellebrite,
though, law enforcement now has access to surveillance technology for
unlocking any Android or
iPhone.
NSO
Group takes a different approach than Cellebrite. Instead of hacking
hardware, NSO Group uses “lawful access” software
that is implanted on the phone of a criminal suspect or terrorist.
Once the software has been implanted, it works like malware, in that
it goes to work infecting smartphone and grabbing the images,
encrypted data, or contact lists it needs. And NSO Group has even
found a way to infiltrate the strong end-to-end encryption of
WhatsApp by exploiting a known security vulnerability. In one
high-profile
case,
NSO Group enabled more than 1,400 people to be tracked and monitored
as soon as they received a WhatsApp video call. Even if they didn’t
answer the video call, the security vulnerability enabled malware to
be loaded onto the phones.
… The
problem here, of course, is that surveillance technology designed
with law enforcement agencies in mind is often used for other
purposes and by less savory individuals.
Wide ranging article.
AI is the
Fourth Industrial Revolution Technology
Moving from the third to the fourth industrial
revolution is going to open a new chapter in human development –
incorporating the extraordinary technological advances. These
advanced technologies are emerging and will continue to merge in the
business world. We see the fourth industrial revolution changing the
digital, physical, and biological worlds. It is creating novel
opportunities and promises of a better future.
… Economists
say the fourth industrial revolution has a significant tendency to
improve
the lifestyle of the people all
across the globe by raising global income levels. For now, consumers
are the ones who are taking the most advantage from the digital world
because of AI-powered products and services.
… The
fourth industrial revolution mainly represents a confluence
of different technologies –
artificial intelligence, machine learning, augmented, and virtual
reality. Internet of things into innovative products, services, and
industries.
The
Identity verification market is an excellent example of this new
AI-powered technology. The impact of these advanced technologies is
all set to bring revolution to the business world.
… The
fourth industrial revolution is expected to profoundly impact
national and international security by
affecting the nature of conflict and increased probability. Warfare
isn’t just a single concept of the traditional battlefield. Now it
relies on technological innovations.
Are you smarter than an AI? A bias article.
How To Get
Your Résumé Past The Artificial Intelligence Gatekeepers
It’s no longer a secret that getting past the
robot résumé readers to a human – let alone land an interview –
can seem like trying to get in to see the Wizard of Oz. As the
résumés of highly qualified applicants are rejected by the initial
automated screening, job seekers suddenly find themselves having to
learn résumé submission
optimization to please the algorithms and beat the bots
for a meeting with the Wizard.
(Related) Getting my students employed.
No comments:
Post a Comment