Google phishing attack was foretold by researchers—and it may have used their code
Enlarge (credit: Sean Gallup / Getty Images) The “Google Docs” phishing attack that wormed its way through thousands of e-mail inboxes earlier this week exploited a threat that had been flagged earlier by at least three security researchers—one raised issues about the threat as early as October of 2011. In fact, the person or persons behind the attack may have copied the technique from a proof of...
More Android phones than ever are covertly listening for inaudible sounds in ads
Enlarge (credit: Arp et al.) Almost a year after app developer SilverPush vowed to kill its privacy-threatening software that used inaudible sound embedded into TV commercials to covertly track phone users, the technology is more popular than ever, with more than 200 Android apps that have been downloaded millions of times from the official Google Play market, according to a recently published research paper. As of January, there...
Not-so-secret DOD “spy drone” footage, live on the Internet [Updated]
On Wednesday, Kenneth Lipp, a contributor to the Daily Beast, was doing what amounts to a random search on the security search engine Shodan when he discovered what appears to be a Web console for full-motion video feeds from two Predator drones. The website Lipp found bears the logos of the National Reconnaissance Office, the National Geospatial-Intelligence Agency’s (NGA’s) Aerospace Data Facility-East, and the...