#IN FAVOR OF JUSTICE MINISTER MORO: #SAY NO TO ELETRONIC DEVICES HACKING (CELL PHONES, COMPUTERS, TABLETS, AND SO ON (ELETRONIC AND CYBER CRIMES) AND ALSO THE BRAIN/MIND CONTROL HACKING (PSICHOTRONIC CRIMES) CAMPAIGN






FACEBOOK GROUP LINK: 
WZP GROUP:


#IN FAVOR OF 
            JUSTICE MINISTER MORO:                                                                                                             
 #SAY NO TO ELETRONIC DEVICES HACKING  (CELL PHONES, COMPUTERS, TABLETS, AND SO ON (ELETRONIC AND CYBER CRIMES) AND ALSO THE BRAIN/MIND CONTROL HACKING (PSICHOTRONIC CRIMES) CAMPAIGN





















Download 

Join / Sign In 


Security Leer en español 
Your smartphones are getting more valuable for hackers
Security researchers are seeing a shift where attackers would much rather hit your smartphones than your computers.
      By 
    • Alfred Ng 
March 8, 2018 5:00 AM PST 
    • 8 


Attackers are much more interested in the data on your phone than on your laptop. 
TEK IMAGE/SCIENCE PHOTO LIBRARY 
Your smartphone probably knows more about you than you do. 
It knows where you are at all times. It knows every person you talk to, and what you've said to them. It has your family photos, your pet's pictures, your passwords and more. For attackers, it's a digital passport to access everything they would need to know about a person. 
And that's why attacks on smartphones are on the rise, security researchers said. 
At the Kaspersky Security Analyst Summit in Mexico, Andrew Blaich, a researcher from mobile security company Lookout, and Eva Galperin, the cybersecurity director from the Electronic Frontier Foundation, presented their findings about Dark Caracal, a global malware campaign targeting mobile devices that's infected thousands of people in more than 20 countries. 
The attack campaign, tracked to a building in Beirut belonging to the Lebanese General Security Directorate, used nearly identical versions of real apps and tricked thousands of people to install it. Once it was on their phones, the attackers had access to everything.
The attack was massive, but it's just a preview of what's to come, the researchers said. It's a reversal of conventional wisdom that pointed to PCs as the most prone to hacks. Attacks on mobile devices are getting easier, they yield a bigger reward and people are using smartphones much more than they use their computers. It's a no-brainer for a hacker.
"Getting a look into someone's personal device is tremendously personal, it's like getting a look into their mind," Galperin said.
Low entry, high reward
The Dark Caracal attack focused on personal information and it didn't need any new type of vulnerability to carry out its mission. The malware, which allowed attackers to take photos, find your location and record audio, spread by disguising itself as messaging apps like Signal and WhatsApp. 
It wasn't an exploit that allowed Dark Caracal to do all those things -- it was the victim. The Trojan app would ask for permissions like any other app would, and to the unsuspecting eye, they wouldn't see anything wrong with the request. 
After all, apps like Instagram and Facebook also ask for permission to take photos, use your location and record audio. If a person was downloading malware that he or she believed was a real version of an app, these permissions wouldn't set off any alarms. 
Google and Apple's security patches can block the latest vulnerabilities, but they can't stop you from getting tricked. Malware hitting mobile devices isn't exploiting a code's vulnerabilities, it's exploiting a person's vulnerabilities.
"Instead of spending effort and time in researching exploit codes, they just take advantage of an overly permissive app," Blaich said. "The barrier to entry for surveillance ware can be lowered if you're not trying to use vulnerabilities."   
While Google and Apple's app stores are fairly protective against malware popping up in its marketplace, it's a different story for third-party stores. That's how Dark Caracal was able to spread, Blaich said. 
The fake apps advertised themselves on a website called "Secure Android," telling people its version of WhatsApp and Signal were more secure than the original apps. Attackers advertised the page in groups for activists and journalists, because it was trying to spy on them.
While the best advice to prevent mobile malware is to never side-load an app, certain apps may not be available outside of the US. The Google Play store, for example, doesn't work in China, where there were 386 million active Android users in 2014.
Patchy service
Apple and Google have done extensive work to make their mobile operating systems more secure. Apple's Secure Enclave and encryption has protected data so well that the FBI was willing to pay $900,000 to unlock the San Bernardino terrorist's phone. 
Google has improved its app security and patching system with Project Treble and Play Protect. 
But given how infrequently some of these updates actually get to the phone, it isn't enough. 
On Feb.  28, the Federal Trade Commission released a report that mobile devices haven't been getting the security updates they need efficiently enough. The commission received information from Apple, Google, Microsoft, Samsung, Motorola, LG, HTC and BlackBerry on their security patching process, and the results weren't great. 
"Some devices didn't get any updates at all. The support ranges from absolutely nothing to three or more years of support," said Elisa Jillson, staff attorney for FTC's privacy and identity protection.
The problem is that security updates are often bundled with broader software updates, meaning that some devices never get patched, while others may have to wait months for it. The FTC recommended separating them, with more frequent patches for devices. Google's Project Treble already does this. 
Before Treble, security updates for Google only came to devices using recent versions of Android. Up to 42 percent of Android users don't have the latest version, and with 2 billion active Android users around the world, that's 846 million devices exposed to potential malware. 
"The majority of victims do not get compromised by zero-days," Galperin said. "They get compromised by vulnerabilities that have already been disclosed they have not yet patched."
As security experts continue to see the rise in mobile attacks, it'll soon surpass the amount of attacks focused on your computers, Blaich said. 
During the Dark Carcal campaign, Lookout and the EFF noticed there was a separate attack targeting Windows computers. It dwarfed in comparison to how many mobile devices were infected. 
"This is a known problem, that updates aren't getting to devices, so there's an open window to any would-be hacker," Jillson said.  
Blockchain Decoded:  CNET looks at the tech powering bitcoin -- and soon, too, a myriad of services that will change your life.
Special Reports: CNET's in-depth features in one place.

Xbox boss confirms Project Scarlett will have a disc drive: Here's what else we know about the upcoming console, including 8K graphics, 120 fps and SSD.
Watch every E3 video game trailer from Square Enix, Ubisoft, Bethesda and Microsoft's E3 conferences: All the trailers you need to see are right here!

Share your voice
8 Comments 
Tags
Security Mobile iOS 11 Hacking Privacy Google 




Close 
Discuss: Your smartphones are getting more valuable for hackers 
Be respectful, keep it civil and stay on topic. We delete comments that violate our policy, which we encourage you to read. Discussion threads can be closed at any time at our discretion.
Next Article: 11 great gifts under $100 you can still get in time for Father's Day 


Best smart devices for your home  
Best smart devices for your home
by David Priest 
Our picks for your next perfect car  
Our picks for your next perfect car
by Antuan Goodwin 
Father's Day gifts under $50
If you're looking for an affordable gift for dad, you've come to the right spot. Here's a quick round up of some relatively inexpensive items we think dads will appreciate.
==//==

SEE ALSO:
REPÓRTER ESSE OH!: #Operation Car Wash   -  The Farce Interce(PT-Braz... https://reporteresseoh.blogspot.com/2019/06/lava-jato-farsa-intercept.html?spref=tw
SOURCE / LINK: https://youtu.be/YYoIy_0Wulc


#GOD, BRAZIL, AMERICA AND ISRAEL ABOVE EVERYTHING, BRAZIL ABOVE ALL IN THE NATIONAL TERRITORY
 by Jair Bolsonaro


#Operation Car Wash   -  The Farce Interce(PT-BrazilianWorks Party) by Bernardo P Küster


329.137 views



77 THOUSANDS AND 1.6 

TO SHARE

Bernardo P Küster
Posted on June 12, 2019


REGISTER 726 THOUSAND

What is the purpose of The Intercept when leaking stealthy Operation Car Wash conversations? Who is behind all this? And who is Glenn Greenwald? We're back and this will not be the only video on the subject. *** REGISTER on the CHANNEL: https://bit.ly/2Vnfrap ** Access my LIBRARY: https://bit.ly/2qH0kXP * Visit the STORE View Right: http://bit.ly/VistaDireitaBernardo Thanks to Thyago Freitas by Thumb: https://bit.ly/31veDR4 ________________________________________________ MAKE PART OF THE CHANNEL: https://bit.ly/2vBrLph Facebook: https://bit.ly/2KJv7ep Twitter: https://bit.ly / 2vAaFs1 Instagram: https://bit.ly/2vBqtKN GAB: https://gab.com/bernardokusterV

Category
News & Politics
SHOW LESS
Enviar feedback

Histórico

Salvas

Comunidade


==//==

SEE ALSO:

SOURCE / LINK: https://politica.estadao.com.br/blogs/fausto-macedo/o-imperio-do-mal-contra-ataca/
Politics BLOGS Fausto Macedo
#Interce(PT-BrazilianWorks Party) in Brazil: The empire (of evil) Strikes back. (From “Estado de São Paulo” Newspaper
The farce of the "scandal" caused by the leak of the talks between then Judge Sérgio Moro and Prosecutor Deltan Dallagnol brings us some important lessons.
                       Jorge Pontes * June 13, 2019 | 12h29
Jorge Barbosa Pontes. Photo: Personal Collection
The first is that there is actually a Brazil of backwardness, acting like an old, decrepit villain, who reacts desperately with all his energies, against the forces of change so desired by the vast majority of our population.
The second is that after five years of the first phase of Operation Car Wash, and after two elections to the National Congress, our Parliament apparently did not undergo the political renewal that Brazilian society so longed for and needed.
The third is that the game played by the old oligarchies - and the political parties that support them - have no ethical limits or restraints to face the (perhaps) last battle against the wave of morality that has been sweeping their bases. The actors in this institutionalized delinquency are able to associate themselves with the underground of international espionage, to seek support in foreign powers, and in all kinds of peripheral gangsterism and mercenarism. There is no bottom in this well called old Brazilian politics.
The fourth and saddest of all is that some Federal Supreme Court justices seem willing to run for these forces of backwardness to prevail. Apparently they can not shake off the influence of those political leaders who have indicated them to their respective seats. They seem not to mind acting as guardians of backsliding.
The truth is that we have never been so close to starting an effective process for the deconstruction of the institutionalized crime building, which is captained by a large part of this anachronistic political elite. And it is known that the presence of Sérgio Moro in the Ministry of Justice and Public Security will be instrumental for this process to advance.
All that is desired with the excitement caused by the criminal leakage of these dialogues (absolutely common and that do not contain any irregularity) is to stop the advance of the wave brought by the Curitiba operation. The objectives are clear: to remove Minister Moro from his chair, to bury his anti-war package, to torpedo his appointment to the STF and, thus, to make the robbery return to the pre-Lava Jato stage, obviously with the absolution and release of all politicians incriminated in criminal cases judged by Sérgio Moro.
With all this, we realized that the reform to be operated with the anticrime package is even more relevant than the pension reform, since the former would enable the beginning of a process that would take us, later, to a free political and business environment of the unbridled corruption of the last two decades.
The reform proposed by the anticrime package of the minister Sergio Moro must precede or, at least, be operated in concomitance with the reform proposed by the minister Paulo Guedes. They are two pillars necessary for Brazil to move forward and develop. We can not imagine the country's economy healthy, generating huge surpluses, with hundreds of billions of Reais injected into infrastructure investments, and the old policy piloting the same schemes of institutionalized delinquency that have led us to the current crisis. We would thus be promoting reform to further enrich the same criminal political elite that has kidnapped us.
The achievements of the Lava Jet were never at such great risk. This may be the last of the institutionalized crime operators' reactions to society's wishes, but it may be the strongest of all, for it will bring a real concert of countermeasures and attacks. They will take advantage to review the arrest after sentence of second instance and to stop the anticrime package, among other shady expedients. The time is for society to be more attentive than ever.
* Jorge Pontes is a Federal Police delegate and was an Interpol director.

More content about:

Article
FOLLOW THE STAGE

    •


Coupons Statistics
PUBLICITY
    •


Copyright © 1995 - 2008 All Rights Reserved.



==//==



SOURCE/LINK: https://youtu.be/YYoIy_0Wulc



Lava Jato - A farsa IntercePT


329.137 visualizações



77 MIL1,6 MILCOMPARTILHARSALVAR










Bernardo P Küster
Publicado em 12 de jun de 2019


INSCREVER-SE 726 MIL
https://bit.ly/2vBrLph
Qual o objetivo do The Intercept ao vazar conversas sigilosas da Lava Jato? Quem está por trás disso tudo? E quem é Glenn Greenwald? Estamos de volta e este não será o único vídeo sobre o assunto. ***INSCREVA-SE no CANAL: https://bit.ly/2Vnfrap **Acesse minha LIVRARIA: https://bit.ly/2qH0kXP *Visite a LOJA Vista Direita: http://bit.ly/VistaDireitaBernardo Agradeço ao Thyago Freitas pela Thumb: https://bit.ly/31veDR4 ________________________________________________ FAÇA PARTE DO CANAL:  Facebook: https://bit.ly/2KJv7ep Twitter: https://bit.ly/2vAaFs1 Instagram: https://bit.ly/2vBqtKN GAB: https://gab.com/bernardokusterV

Categoria
Notícias e política
MOSTRAR MENOS









THE END
Start saving  Father's Day gifts under $50 
Download the CNET app About CNET Sitemap Privacy Policy Ad Choice Terms of Use Mobile User Agreement Help Center Licensing 
© CBS Interactive Inc.
All Rights Reserved.
Affiliate Disclosure
CNET may get a commission from retail offers.
Top Brands






THE END

Comentários

Postagens mais visitadas deste blog

#STALKING - ARE ELECTORAL CIBER CRIMES THE VISIBLE TIP OF THE ICEBERG ?

#The World's 50 Greatest Leaders - Sergio Moro / Brazilian Senator Oriovisto Guimarães talked about Renovation of Brazilian Republica three Branches of Powers, Except the Judiciary Power