Jazari writes: Careful what you say when traveling, since the authorities will soon be able to zoom in on your conversations and record them for an indefinite amount of time. The story is about Canada, but I see no reason to think that this capability will not soon be installed in most places (if it's not already).
chicksdaddy writes: "Threatpost is reporting on research from Microsoft that argues money mules — the accomplices who help move stolen funds — may be the real victims of online banking scams, not the bank customers who are the ostensible targets of fraudsters.
In a paper that turns conventional wisdom on its head, Microsoft researcher Cormac Herley and two co-authors argue that, mules, unlike fraud victims, are not protected by Federal anti fraud laws. And, unlike the criminals they work for, they are not beyond the reach of the banks or law enforcement. Further, as banks and other financial institutions have gotten better at tracing account takeover scams and reversing charges, it is the mules who pay the price: having funds extracted from their account to make the victim whole, assuming such funds are available.
"The thief is really stealing from the mule, not the compromised account, though that fact does not become clear until the dust settles," the researchers write.
Their conclusion: shoring up customer accounts (say, through stronger passwords) will have only limited utility in stemming fraud. A better approach would be to crack down on muling, denying fraudsters the critical link in getting money out of compromised accounts: a legitimate bank account that will take an illegal money transfer from a hacked account and turn it into a legitimate transfer to the fraudsters' account."
Sparrowvsrevolution writes: Micro Systemation, a Stockholm-based company, has released a video showing that its software can easily bypass the iPhone's four-digit passcode in a matter of seconds. It can also crack Android phones, and is designed to dump the devices' data to a PC for easy browsing, including messages, GPS locations, web history, calls, contacts and keystroke logs.
The company's director of marketing says it uses an undisclosed vulnerability in the devices it targets to run a program on the phone that brute-forces its passcode. He says the company's business is "booming" and that it's sold the devices to law enforcement and military customers in 60 countries. He says Micro Systemation's biggest customer is the U.S. military.