Skip to content

Archive for

28
Jul

Judges ruling on secret telecoms cases found to own Verizon stock


It looks as if the judges who operate the gateway between the NSA and the cable companies may not be as impartial as their job description requires them to. An investigation by Vice has revealed that several judges who sit on the Foreign Intelligence Surveillance Court are also Verizon shareholders. Big Red, of course, has previously tried to fight metadata collection, but isn’t entitled to have a say, or participate in these secret hearings. Naturally, judges are bound by a conflict of interest law that requires them to step away from any case where their judgment could be materially affected, which may not apply in this situation. Still, it doesn’t seem the wisest thing to do if you’re trying to maintain an unimpeachable reputation for fairness, does it?

Filed under: Cellphones, Wireless, Verizon

Comments

Via: Ars Technica

Source: Vice

28
Jul

What you need to know about card skimming


http://krebsonsecurity.com/

“Skimming” is a blanket term used when referencing a crime where you take small amounts of money. It literally means to take cash off the top, as if money were the sweet cream floating atop a cauldron of lesser riches. Fifty years ago, skimming might have meant stealing a handful of dollars from your employer, or even millions in elaborate scams we’ve seen in countless Hollywood films. Today’s skimming, however, employs tricks and hardware that are absurdly complex and yet sneaky enough to elude detection. Unless you know what to look for, of course. Today’s world of skimming is high-tech, and it wants your credit card and banking info.

Though we can’t help you catch every conceivable method that crooks are using to try to rip you off, being armed with a bit of knowledge on the topic could save you major hassle down the road. No matter what you take away form this read, at a minimum you’ll never look at an ATM or POS terminal the same way again.

WHAT IS IT?

Latest ATM skimming device, clever and terrifying at the same time /via Twitter

A skimmer in the ATM world usually features two important pieces of hardware: A micro camera positioned within eyesight of the keypad, and a magnetic card reading device that captures your card’s details. To “clone” — duplicate — your card, this is all the info a would-be thief needs. The scenario is, sadly, very simple: You wander up to your local ATM, pop your card in and a device captures your card details; next you type in your PIN and that’s captured on camera. You carry on with your day, business as usual, but in the following weeks you’ll get a call from the bank or credit card company about “strange” transactions on your account. Perhaps you’ve heard this story before?

Similar things happen with POS terminals in retail shops — payment registers — sometimes with the employee’s knowledge and sometimes without. Bogus terminals exist that will even print out a “transaction complete” record when the device never actually contacted your bank. You buy a pack of gum, run the sale through with your card and the thief buys your treat for you. Then, using the info gleaned easily recovers his or her losses. Nervous yet? You should be, this stuff is rampant.

Recently there’s been a spate of reports that gas stations are being targeted for skimming. The same principle for ATM systems is used, but the concentration of cards passing through gas stations is higher. It’s like an ATM card smorgasbord. The system can be installed in under two minutes and the stored card details are easily captured remotely via Bluetooth by the crook. So unless someone notices the device, or its battery dies, a thief could quickly grab hundreds of accounts from just one skimmer.

WHY SHOULD I CARE?

Nobody wants to lose his or her hard earned money to some criminal, right? In most cases you’ll have an argument to recover your losses, but the cost in time and to the banks is real. Consider the time and effort required to deal with your bank, your card company, any pre-authorized payments you have, potentially time off work. It’d be a pretty bleak feeling to get taken like this. Many of us have gone through the hassle of replacing cards when somebody got the details and used them without asking permission. Most people assume it happened because of an online scam, but the new reality is that more and more opportunities exist for this type of crime.

HOW DOES IT WORK?

ratingen  germany   june 21 ...

ATM skimmers run the gamut from cheapish homemade plastic to the sophisticated custom pinhole cameras, keypad overlays and magnetic readers that can go in or over the existing slot. Plastic parts can be printed with a 3D printer: paint for parts is easily matched to ape the real thing, and then using double-sided tape they’re slapped on in just a few minutes. Skimmers can be purchased on the web by sites boasting how effective their equipment is, card printing stock and equipment to make credit and debit cards is fairly easily sourced as well. All this aligns to make it pretty easy to understand why somebody with some money and no worry of arrest would want to get involved.

So what do they do with this info? Well, the thief heads back to wherever he left his gear and physically retrieves it, or remotely downloads the info. A new card is then printed with your stolen details — the aforementioned clone. Then a “runner” — there are job titles! – is dispatched to either take all the cash they can using bank machines, or sent shopping for easily sold goods. Credit cards, of course, offer even more flexibility since they can be used online at many more places than debit can.

WHAT CAN I DO TO PROTECT MYSELF?

ATM Scam

There’s no magic answer yet, Interac Inc claims that Chip and Pin systems have done a lot to reduce debit and credit card fraud in Canada, but these systems are still backward compatible with the swipe system. The best advice is to pay some attention when paying for your transaction or taking out cash. Since the reader device is typically only secured with double sided tape, yank on it. You’re not going to break anything. Give the ATM a bit of scrutiny before using it. Does it look like the others nearby? Are there any strange-looking bits that bulge out? Look above the keypad or to the side for pinhole cameras. If anything seems out of place, don’t use it! Find another.

Cover your hand when entering your PIN number! It’s a really easy thing to do and that one step will absolutely make the collected card details worthless.

Call your bank, talk to them about security policies. Are you covered if anything should ever happen? Are they taking steps to work with card providers to create new or improve existing policies? Banks are slowly beginning to use Two-Factor authorization to protect you and your money. Two-Factor means you use your password and a one-off key to access online accounts or login to your bank. So even if a thief has your card details and password, without the key they can’t get in. Banks consider your card and PIN to be a two-factor system, though considering how simple it seems to be to get access, we’d suggest another layer wouldn’t hurt.

WHAT DOES THE LAW SAY?

Occupy Protests Anniversary

There’s nothing vague about the law here. Theft is theft is theft, though; sometimes catching the people involved is difficult as the money can be spent abroad or on goods delivered to a P.O. box. Also, unfortunately, people often only contact the bank about a skimming-related crime and the bank sorts it out for the consumer. Once your bank has started the process to resolve it, call your local police and report it to them, too. Banks like paying out money about as much as you do, while it costs for them to spend on security, they’ll do it to stop fraud to protect you their bottom line

WANT TO KNOW MORE?

There’s a wealth of great information out there about skimming and what current scams exist, arm yourself against them by taking an interest and protecting yourself by knowing a bit about them. Brian Krebs security site has a great series of articles on this very topic, I encourage you to take some time to read and check out all the pics of the various devices. Go have a peek at TwoFactorAuth.org, they maintain a great list of institutions that support two-factor and handy links to tweet to those that don’t.

[Image credit: bedharak / Flickr, ASSOCIATED PRESS, Shutterstock / Oliver Hoffmann, Brian Krebs / krebsecurity.com]

Filed under: Wireless, Networking, Internet, Software

Comments

28
Jul

Russia offers a $110,000 bounty if you can crack Tor


Countries that have less-than-stellar records when it comes to dissenting voices must really, really hate Tor. Coincidentally, Russia’s Interior Ministry has put out a bounty of around $110,000 to groups who can crack the US Navy-designed privacy network. After the country’s vicious crackdown on dissenting voices back in 2012, protestors who hadn’t escaped or been jailed began using anonymous internet communication as their first line of defense against the Kremlin. If you’re considering taking part in the challenge (and earning yourself a tidy stack of cash to quell your conscious), be warned — the bounty is only open to organizations that already have security clearance to work for the Russian government.

Filed under: Internet

Comments

Via: The Inquirer

Source: Russian Interior Ministry

28
Jul

Enjoy the beauties of space with GyroSpace 3D Live Wallpaper


GyroSpace 3D

Fans of space and beautiful live wallpapers have a reason to rejoice. GyroSpace 3D Live Wallpaper gives your device’s wallpaper a fresh outlook on space. GyroSpace 3D is an interactive space scene live wallpaper that works with the gyroscope on your device. This gives the live wallpaper the ability to move with you as you… Read more »

The post Enjoy the beauties of space with GyroSpace 3D Live Wallpaper appeared first on AndroidGuys.

28
Jul

Easily print labels with the Epson LW-600P Label Printer


lw600_fla-fns_396x264

Printing has been the Achilles’ heel of mobile devices since their existence. In the last 18 months, printing has started to get easier by the means of apps by manufacturers and even Google building in its cloud printing service. Epson follows that trend with their extremely easy to use Epson LabelWorks LW-600P Label Printer. Opening up the package,… Read more »

The post Easily print labels with the Epson LW-600P Label Printer appeared first on AndroidGuys.

28
Jul

Supply Chain Sources Claim December Launch for 5.5-Inch iPhone 6 and iWatch [iOS Blog]


Reports from within Apple’s Asian supply chain (via GforGames) again suggest the company is planning to launch the 4.7-inch iPhone separately from the 5.5-inch model, with the latter model entering mass production in September. This staggered launch would allow Apple to debut the highly-anticipated 4.7-inch iPhone 6 early this fall and then follow with the iWatch and the larger iPhone model later this year.

The report claims a December launch for both the 5.5-inch iPhone 6 and iWatch, which would be unusual timing for Apple given the holiday shopping season. The company generally prefers to launch its consumer-focused products before Black Friday kicks off holiday shopping in late November. But if supply constraints are an issue, it is possible Apple might choose to make a limited launch of the devices before the end of the year to get them onto shoppers’ radars.

iphone_6_55_mockup_hand
Apple is rumored to be planning its first press event in September, which will be used to unveil the 4.7-inch iPhone 6 along with the official release date of iOS 8. Apple may hold a second event in October to announce the next generation iPads, OS X Yosemite and possibly the 5.5-inch iPhone 6 and the iWatch. Though announced in October, the latest report claims larger iPhone and iWatch may not hit retail shelves until December of this year.

Besides a larger display, the iPhone 6 is expected to include a faster A8 processor, an updated Touch ID fingerprint scanner and an improved camera module with some form of image stabilization technology.



28
Jul

Amazon now lets you customize and buy 3D-printed products


3D printing has made low-volume manufacturing of highly personalized products both affordable and accessible, but first you need a printer. A number of businesses have sprung up to bridge that gap — investing in printers so you don’t have to — and now Amazon has opened up a dedicated storefront on its US site to connect customers with these sellers. The themed portal is stocked with over 200 products at launch, from jewelry to homeware to toys, that companies will print to order. Many can be also be customized, whether that simply be choosing a different color or tweaking numerous features of a design. You can also preview a 3D mockup of your creation before you buy, and now if you’ll excuse us, we’ve got bobbleheads to order.

Filed under: Misc, Amazon

Comments

Source: Amazon (1), (2)

28
Jul

European Commission Approves Apple’s $3 Billion Acquisition of Beats [Mac Blog]


The European Commission has approved Apple’s acquisition of Beats Electronics and Beats Music (Via Engadget). The Commission concluded that merger posed no threat to competition as “the combined market share of Apple and Beats Electronics is low.”

beatsheadphones
In its decision, the Commission noted that the Apple and Beats merger would not negatively effect either the headphone or the streaming music market in the European Union.

“The Commission concluded that the combination of the two businesses did not raise competition concerns because the combined market share of Apple and Beats Electronics is low. In addition, Apple and Beats Electronics are not close competitors because the headphones they sell differ markedly in functionality and design. Moreover, even after the transaction, a large number of global competitors such as Bose, Sennheiser and Sony would remain. The Commission also examined the transaction’s likely effects on the distribution of digital music to consumers. Both Apple and Beats Music are active in this field. Apple offers a music downloading service through iTunes and Beats Music offers a music streaming service, although it is currently not available in the EEA. The Commission concluded that Apple faces several competitors in the EEA such as Spotify and Deezer, making it implausible that the acquisition of a smaller streaming service that is not active in the EEA would lead to anticompetitive effects.”

Now that the EU has given its approval, the next hurdle for the acquisition is the United States with regulators also examining the deal and determining whether there are any concerns with competition. Barring any unforeseen issues, Apple expects the $3 billion transaction to close sometime next quarter.



28
Jul

Here’s a book about people tweeting about writing their novels


Sorry guys, I can’t tweet this picture of a cat wearing a party hat right now, because I’m #amwriting. I’m in a coffee shop, you see, with my laptop and notebook proudly displayed so that anyone who walks past will know that I’m #amwriting a novel. Obviously, you can only make grammatical errors like saying I’m #amwriting on Twitter, that shit doesn’t fly in the novel that I’m writing right now.

What? Artist Cory Arcangel has written a book that just collates people’s tweets that include the phrase “working on my novel?” He’s, no, that’s not a real thing, is it? It’s being published by PENGUIN? All of these other people are what, just trying to write the next great modern / erotic / literary / young adult novel? Man. I wish I’d come up with that idea. #amwriting

Comments

Via: The Fader

Source: Working on my novel, Cory Arcangel (Twitter)

28
Jul

European HTC One M8 Android 4.4.3 update rolling out


htc one m8______

For those that thought HTC had forgotten about the European HTC One M8 devices after delivering the Android 4.4.3 update to U.S unlocked and developer edition devices, HTC have finally begun rolling out the update across the pond. The new Android 4.4.3 update is beginning to hit unlocked HTC One M8′s as we speak, bringing… Read more »

The post European HTC One M8 Android 4.4.3 update rolling out appeared first on AndroidGuys.