Shortly after implementing electronics ban from eight Muslim countries, the ban may soon take effect on all international flights to and from the U.S. Homeland Security Secretary John Kelly has recently announced that this decision might take place. The reason is continuous terrorist threats to bring down airplanes. Therefore, the expanded electronics ban could soon take place in order to increase the security of the passengers.
Yesterday afternoon I noticed that my Twitter and Instagram feeds were humming with curiously styled selfies that slimmed faces, lightened skin, and applied a veneer of gloss and sheen that supposedly turned the selfees into animé-like characters. The transformations were courtesy of a Chinese app called Meitu that had suddenly become the height of fashion. I thought Meitu did a fantastic job of producing the archetypal Widow Twankey, so while I wasn’t desperate to have a go myself, I could understand why people were enamoured with it and enjoying a giggle.
There’s an interesting discussion that’s popped up on Facebook recently, started by award winning photographer Rutger Geerling, over what we may be able to do to help better protect our equipment out in the wild. We’re not talking about the bags we leave laying around filled with gear we’re not currently using, but items actually on our person that are all too easy to steal.
Without intervention and design alterations from the manufacturers themselves, it seems there’s very little we can do, but there are some great suggestions offered in the comments on the Facebook post, though.
[editor’s note: we got this letter from our reader Jeffrey George. It resonates true. If you look at the reviews on the apple store or the play store, you’ll find quite a few disappointed customers. I am bringing this letters as is]
I love how GoPro continues to promote their cameras being used in theses beautiful and remote places. GoPro updated their remote app for controlling the camera with a new app called Capture. GoPro requires a login that they claim only needs entered every 30 days, but if the app updates in the background or you logout, you can’t use the App. Forget to login before your trip, you won’t be able to use the App. There is no bypass when there is no internet. I specifically bought my GoPro to use my smart phone as a controller, worked until the new app update.
This requirement to use the internet to use their product is so contrary to why I bought a GoPro. I expected to use their products everywhere. Why would they disable a working feature?
Law enforcement agencies are in an (unofficial) fight with drone operators. And it’s clear why. While some drone pilots are very careful, some have caused quite some trouble. The fire fighting delays in California and gas leak in New York are two such examples. Up until now, the police either tried to jam the radio for the drone, or try to take it down. (Taking drones down includess eagles, nets, and other shenanigans).
Now, a tiny device lets anyone seize control over drones flying over their heads. Meet Icarus the brainchild of Jonathan Andersson, a researcher at Trend Micro’s TippingPoint DVLab. The device works by hijacking the control packet of the DSMx protocol, so the drone “thinks” that the attacker is the rightful remote. Once the drone is hijacked, the operator gains full control, while leaving the original pilot disconnected from the drone.
Chinese electronics component manufacturer Hangzhou Xiongmai Technology (Xiongmai) has said that its products inadvertently played a roll in Friday’s massive cyber attack that disrupted major internet sites including Twitter, Spotify and PayPal throughout the USA and other parts of the world on Friday.
Xiongmai are a vendor of Internet-connected cameras and DVRs. The company admitted that security vulnerabilities involving weak and unchanged passwords were partly to blame for the attacks. According to security researchers, an Internet of Things (IoT) bot called Mirai is responsible. It’s estimated that Mirai infects over 500,000 devices, and around 10% of these were used in Friday’s DDoS attack.
The internet is slowly (and painfully) discovering that security is a hard mistress. I mean fingerprints have been hacked, and passwords have not been delivering for a long time. Next step was having a camera look at your face to see if you are really you.
Of course, the early systems could be hacked with a high quality printed photo. So security added a “check if it’s alive” method. That in turn was hacked using tablets and videos. The next step was to check if the received images makes sense (so videos were out). But then hackers started using 3D printed masks.
But 3D masks are hard to create. Why not just grab a few of your social media photos, and use those to create a model that looks so real that it fools security systems.
And this is what the team at University of North Carolina did.
Apple is now doing to Quicktime what Adobe did to Flash a few years ago. Not for the same reasons, but the impact is similar.
Apple has stopped updating its Quicktime software for Windows and now the United States Computer Emergency Readiness Team issued an Alert (TA16105-A), which recommends Windows users uninstall Apple QuickTime from their computers. While I’d guess Quicktime was not the favorite player for many, there are several dependencies within Premiere that will make this move very unpopular with video editors.
One of the nice features on Android phones is the ability to access the camera without having to go through the annoying process of unlocking the phone. While this feature is very comfortable, it opens a door to all kind of mischief. Especially if you have access to a friend`s phone. You can always take some funny photos that their parents would be surprised to see if they flip through the gallery. This is funny but really quite harmless, researchers from the University of Texas discovered that once the camera is active, it can be used to bypass the home screen lock and access the phone. And that is quite less harmless.
A good photograph has the power to stop us in our tracks, take our breath away, inspire us, make us wish we were there, standing inside of it. It’s true, the power of photography is magnificent. Unfortunately, it’s magical powers are sometimes used in ways that are not quite so inspirational. Like last year, when a 31-year old hacker who works under the name”Starbug”, claimed he could recreate a person’s fingerprints using just a few images from a “standard photo camera”, which proved by duplicating the fingerprints of German defense minister, Ursula von der Leyen.
In the same presentation, Starbug demonstrated how embarrassingly easy it is to trick facial recognition software using printed out photographs. Strabug’s work prompted an international conversation on security and how rapidly evolving camera tech is causing new concerns about the way criminals can use photography to commit crimes.[Read More…]