BlackBox (Security) Archiv – Telegram
BlackBox (Security) Archiv
4.16K subscribers
183 photos
393 videos
167 files
2.67K links
👉🏼 Latest viruses and malware threats
👉🏼 Latest patches, tips and tricks
👉🏼 Threats to security/privacy/democracy on the Internet

👉🏼 Find us on Matrix: https://matrix.to/#/!wNywwUkYshTVAFCAzw:matrix.org
Download Telegram
AI Wins Against Humans In Simulated Air To Air Combat In What Air Force Colonel Calls a “Big Blue vs Gary Kasparov” Moment

Hypothetical question: What if future historians consider the big event of 2020 to be the time that AI was proven to be better than humans at Air to Air combat? It has just done that, and this demonstration via simulators will no doubt accelerate AI research in ways that has an impact on a broad range of both military and civilian applications.

First some background: The idea of artificial intelligence engaging in air to air combat is not new. But for as long as I can remember most serious professionals considered it a pipe dream, especially those that wanted a career. This is especially true in the Air Force. Since the Air Force culture is that you must be a pilot to become a senior officer or lead any significant organization, how can you have a service if there are no pilots?

The very few forward thinking military professionals I knew who supported pursuit of concepts of autonomy were not taken seriously. Many were ridiculed. It has been that way for decades. Even after years of advancements in drones and AI and incredible research into the potential of pilotless AI, that remains the dominate view in the Air Force. Academia and some in industry have built simulated AI in the past that humans could not beat, but research like this was discounted by the Air Force. Don’t believe me? Watch the reaction of the audience at the US Air Force at the Air Force Association Air Warfare Symposium on 28 Feb 2020 when Elon Musk tells them that “the fighter jet era has passed, it is drones.” The entire senior leadership of the US Air Force was there. No one cheered. They hemmed, hawed, murmured, laughed.

👀 👉🏼 https://www.oodaloop.com/archive/2020/08/21/ai-wins-against-humans-in-simulated-air-to-air-combat-in-what-air-force-colonel-calls-a-big-blue-vs-gary-kasparov-moment/

#ai #simulation #combat #airforce #bigblue #kasparov
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@NoGoolag
Data-Centric Environment Rise of Internet-Based Modern Warfare “iWar” – Survivability, Availability and Accessibility without Geographic Borders

Rise of Internet-Based Modern Warfare ‘iWar’,” addresses a collection of modern security concerns that range from social media attacks and internet-connected devices to a hypothetical defense strategy for private sector entities. This Issue’s first article, noscriptd “Evaluation of Comprehensive Taxonomies for Information Technology Threats” evaluates the different taxonomies of cyber-physical threats and their associated impact on mission capabilities. The second offering identifies a number of social media cyber-attacks as well as solution-based platforms to ascertain whether malicious activity has occurred.

This Issue’s third article investigates the performance of several binary classifiers and their ability to distinguish between non-verified and verified tweets based on the age of training data, under the noscript “Times Change and Your Training Data Should Too: The Effect of Training Data Recency on Twitter Classifiers.” The final article in this Issue, noscriptd “Rebooting Letters of Marque for Private Sector Active Cyber Defense,” discusses a modern interpretation of a Constitutional Clause to allow the private sector to defend themselves outside of their network borders.

👀 👉🏼 PDF:
https://www.csiac.org/wp-content/uploads/2020/03/CSIAC_Journal_V7N4_hv5.pdf

👀 👉🏼 https://www.csiac.org/journal-issue/data-centric-environment/

#iWar #security #cyber #threats #malicious #attacks #csiac #pdf
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@NoGoolag
How Four Brothers Allegedly Fleeced $19 Million From Amazon

The scheme involved 7,000 $94 toothbrushes, according to law enforcement.

Over the course of two years, four brothers in New York allegedly swindled Amazon out of at least $19 million using thousands of $94 toothbrushes and other expensive goods, according to a Department of Justice indictment unsealed Wednesday. Federal prosecutors accused Yoel Abraham, Heshl Abraham, Zishe Abraham, and Shmuel Abraham of invoicing Amazon for a large number of products the company never ordered. The defendants allegedly discussed their gimmick openly in a family WhatsApp group. In one message from May 2018, the indictment says, Yoel wrote that he was “so in the mood to fuck Amazon.”

All four brothers, who were arrested Wednesday, are accused of using wholesale businesses they opened to engage in a scam called “overshipping.” It works by intentionally sending a company more goods than it ordered and billing for it. On Amazon, every product is given a unique identifier, a string of numbers called an Amazon Standard Identification Number. They are part of an item’s listing in Amazon’s catalog. Vendors have the ability to change listings, to make sure things like product denoscriptions are accurate.

According to the indictment, the brothers swapped ASINs for items Amazon ordered to send large quantities of different goods instead. In one instance, Amazon ordered 12 canisters of disinfectant spray costing $94.03. The defendants allegedly shipped 7,000 toothbrushes costing $94.03 each, using the code for the disinfectant spray, and later billed Amazon for over $650,000.

In another instance, Amazon ordered a single bottle of designer perfume for $289.78. In response, according to the indictment, the defendants sent 927 plastic beard trimmers costing $289.79 each, using the ASIN for the perfume. Prosecutors say the brothers frequently shipped and charged Amazon for more than 10,000 units of an item when it had requested fewer than 100. Once Amazon detected the fraud and shut down their accounts, the brothers allegedly tried to open new ones using fake names, different email addresses, and VPNs to obscure their identity. “Open account under dummy names and they can go look for no one,” Yoel allegedly wrote on WhatsApp in the fall of 2018.

“The use of complex technology did not hide the simple fact that the defendants were bilking Amazon for goods they never provided. The more our economic life moves online, the more we must ensure the integrity of our digital markets, which my office is committed to doing,” Audrey Strauss, the acting US attorney for Manhattan, said in a press release. The defendants are each charged with conspiracy to commit wire fraud, wire fraud, and money laundering. Lawyers representing Yoel Abraham and Zishe Abraham did not immediately respond to requests for comment.

👀 👉🏼 https://www.wired.com/story/how-four-brothers-allegedly-fleeced-19-million-amazon/

#DeleteAmazon #amazon #scam
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@NoGoolag
Blackstone to acquire Ancestry.com for $4.7 billion

Blackstone Group Inc BX.N said on Wednesday it agreed to acquire genealogy provider
Ancestry.com Inc from private equity rivals for $4.7 billion, including debt, placing a big bet on family-tree chasing as well as personalized medicine.

Ancestry.com is the world’s largest provider of DNA services, allowing customers to trace their genealogy and identify genetic health risks with tests sent to their home.

Blackstone is hoping that more consumers staying at home amid the COVID-19 pandemic will turn to Ancestry.com for its services.

“We believe Ancestry has significant runway for further growth as people of all ages and backgrounds become increasingly interested in learning more about their family histories and themselves,” David Kestnbaum, a Blackstone senior managing director, said in a statement.

The deal is Blackstone’s first acquisition out of Blackstone Capital Partners VIII, the largest-ever private equity fund that raised $26 billion from investors last year.

Ancestry.com has more than 3 million paying customers in about 30 countries, and earns more than $1 billion in annual revenue. Launched in 1996 as a family history website, it harnessed advances in DNA testing and mobile phone apps in the following two decades to expand its offerings.

Blackstone is buying Ancestry.com from private equity firms Silver Lake, Spectrum Equity and Permira. Singapore’s sovereign wealth fund GIC, another Ancestry.com investor, said it will continue to maintain a significant minority stake in the company.

👀 👉🏼 https://www.reuters.com/article/us-ancestry-m-a-blackstonegroup-idUSKBN25K0R4

#blackstone #ancestry #dna
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@NoGoolag
Why we are suing the Administration

Today we are filing a complaint in federal court challenging the Administration's efforts to ban TikTok in the US. As a company we have always focused on transparency, so we want to explain why we are taking this step.

Over the past few years, people of all backgrounds have embraced the TikTok community. Today, 100 million Americans turn to TikTok for entertainment, inspiration, and connection; countless creators rely on our platform to express their creativity, reach broad audiences, and generate income; our more than 1,500 employees across the US pour their hearts into building this platform every day, with 10,000 more jobs planned in California, Texas, New York, Tennessee, Florida, Michigan, Illinois, and Washington State; and many of the country's leading brands are on TikTok to connect with consumers more authentically and directly than they can elsewhere.

Put simply, we have a thriving community and we are grateful – and responsible – to them.

The Executive Order issued by the Administration on August 6, 2020 has the potential to strip the rights of that community without any evidence to justify such an extreme action, and without any due process. We strongly disagree with the Administration's position that TikTok is a national security threat and we have articulated these objections previously.

Now is the time for us to act. We do not take suing the government lightly, however we feel we have no choice but to take action to protect our rights, and the rights of our community and employees.

👀 👉🏼 🇬🇧 https://newsroom.tiktok.com/en-us/tiktok-files-lawsuit

👀 👉🏼 🇩🇪 https://t3n.de/news/tiktok-verklagt-trump-regierung-1315426

#DeleteTikTok #ToddlerTrump #trump #BanTikTok
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@NoGoolag
Popular torrenting site YTS provides IP address logs to copyright lawyers to extort you with

The second largest torrent site in the world, YTS, is actively working with copyright infringement lawyers to extort cash from torrent downloaders. This isn’t the only historical instance of a torrent site storing IP addresses to be used against torrenters but it is a confirmation of a disturbing new precedent which may stand on shaky legal ground.

In the past, torrent sites like The Pirate Bay (TPB) have stored IP addresses and even given them up as a way to pinpoint original uploaders of certain torrents. There have also been instances where YTS has given up logs in court for ongoing cases against downloaders. 👉🏼 The most recent revelation, though, is that YTS is also giving these logs to the Culpepper law firm in Hawaii so that Culpepper can send “Pay-Up-Or-Else Threats” to those that have used YTS, before a case is even filed. 👈🏼

That’s right… This time around, YTS is giving up the IP addresses and emails of downloaders to a copyright infringement lawyer who then turns around and tries to extort torrenters for cash settlements. TorrentFreak has been covering these revelations from YTS as part of an ongoing copyright infringement case against a US veteran. Now, TorrentFreak has seen a letter which confirms that torrenters using YTS are being caught up by what TorrentFreak calls “the most extraordinary business/legal arrangement ever witnessed in the piracy scene.” YTS provides the logs to Culpepper, who then sends the YTS user a threat of a case which can be settled for around $1,000.

👀 👉🏼 https://www.privateinternetaccess.com/blog/popular-torrenting-site-yts-provides-ip-address-logs-to-copyright-lawyers-to-extort-you-with/

#yts #torrenting #copyright #lawyers
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@NoGoolag
Russian-backed organizations amplifying QAnon conspiracy theories, researchers say

Russian government-supported organizations are playing a small but increasing role amplifying conspiracy theories promoted by QAnon, raising concerns of interference in the November U.S. election.

Academics who study QAnon said there were no signs Russia had a hand in the early days of the movement, which launched in 2017 with anonymous web postings amplified by YouTube videos.

But as QAnon gained adherents and took on new topics - with President Donald Trump as the constant hero waging a misunderstood battle - social media accounts tied to a key Kremlin ally joined in.

In 2019, accounts removed by Twitter and suspected of being controlled by the Internet Research Agency sent a high volume of tweets tagged with #QAnon and the movement slogan #WWG1WGA, short for Where We Go One, We Go All, said Melanie Smith, head of analysis at social media analysis firm Graphika. The IRA was indicted by Robert Mueller in his election interference prosecution.

More recently, Russian government-backed media RT.com and Sputnik have stepped up coverage of QAnon, which began with a false proclamation Hillary Clinton would be arrested for an undetermined reason and now includes theories about child trafficking by Hollywood elites, the novel coronavirus and more.

Alethea Group disinformation expert Cindy Otis, a former CIA analyst, said RT, Sputnik and other Kremlin-backed media have been writing more about QAnon, using it to fit into their broader narrative of: “The U.S. is falling apart, look how much division there is.”

👀 👉🏼 https://www.reuters.com/article/us-usa-election-qanon-russia/small-but-growing-russian-support-for-qanon-conspiracies-seen-online-idUSKBN25K13T

#usa #russia #election #qanon #conspiracies #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@NoGoolag
A clean start for the web

The web is in need of some reinvention right now.

The web’s evolution over the last decade has mirrored the American economy. All of the essential indicators are going “up and to the right,” a steady stream of fundamental advances reassure use that there “is progress,” but the actual experience and effects for individuals stagnates or regresses.

The crisis affects platforms, creators, and consumers alike.

I’m going to try and dissect and diagnose this situation, a bit. You can skip forward if you just want to read my casual, unprofessional pitch for a reboot of the web. The idea is that we could choose a new lightweight markdown format to replace HTML & CSS, split the web into documents and applications, and find performance, accessibility, and fun again.
This post uses the pedantic definition of "the web"
I've discussed attempts to reinvent the "Internet" a few times. Things like dat, IPFS, and arweave are all projects to reinvent an Internet, or a transport and data-sharing layer. The web is what lies on top of that, the HTML, CSS, URLs, JavaScript, browsing experience.
The platform collapse

The platform side is what changed last week, when Mozilla laid off 250 employees and indicated that it would affect Firefox development. Firefox wasn’t the #2 browser - that’s Safari, mainly because of the captive audience of iPhone and iPad users. But it was the most popular browser that people chose to use.

👀 👉🏼 https://macwright.com/2020/08/22/clean-starts-for-the-web.html

#reset #clean #web #internet #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@NoGoolag
Audio
All Your Data Are Belong to Us

You’ve heard the expression, “When something is free, you’re the product.” And, while you may think it’s no big deal to give away your personal data in exchange for free online services, how can you know that what you get for what you give is a fair trade? Show Notes

🎧 👉🏼 https://irlpodcast.org/season1/

#irlpodcast #podcast
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@NoGoolag
Malware Injected Into Xcode Projects Could Infiltrate Mac App Store

Last week, we reported on a severe new kind of Mac malware that has been found to infect via Xcode, discovered by security researchers at Trend Micro.

In an exclusive interview with #MacRumors, the security researchers behind the discovery, Oleksandr Shatkivskyi and Vlad Felenuik, have provided more information about their research.

The malware, which is part of the XCSSET family, is "an unusual infection" that is injected into Xcode projects. When the project is built, the malicious code is run. This can lead to "a rabbit hole of malicious payloads," and poses a significant risk to Mac users.

Specifically, the malware was found to be capable of abusing Safari and other browsers to steal data. It can use a vulnerability to read and dump cookies, create backdoors in JavaScript, and in turn modify displayed websites, steal private banking information and passwords, and block password changes. It was also found to be able to steal information from apps such as Evernote, Notes, Skype, Telegram, QQ, and WeChat, take screenshots, upload files to the attacker's specified server, encrypt files, and display a ransom note.

Shatkivskyi and Felenuik told MacRumors that they believe the XCSSET malware will become extremely common among bad actors who seek to exploit Mac systems. The malware is particularly dangerous because verification methods, such as checking hashes, would not identify infection. It was found to be present in projects shared on GitHub. This means that developers who rely on repositories could face a supply-chain attack and be unaware that their project has become infected.

Xcode projects infected with the malware can create maliciously modified applications, unbeknownst to the developers who make the apps, and may then distribute them as trojans. Shatkivskyi and Felenuik believe that the Mac App Store review team will be largely unable to detect apps that contain the XCSSET malware. "As an #iOS developer I know how easy it is to fool them and release an app with hidden features," Shatkivskyi said.

Shatkivskyi and Felenuik first approached Apple about the issue as early as December 2019, and they hope that Apple will be decisive and swift in its response to resolving the vulnerability. They suggest that Apple could implement privacy notifications, the likes of which came to iOS 14 and iPadOS 14, to alert Mac users when the malware is active on their systems, in an effort to explicitly alert users to a potential breach.

👀 👉🏼 https://www.macrumors.com/2020/08/24/xcode-malware-infiltrate-app-store/

#XCSSET #xcode #malware #apple #appstore
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@NoGoolag
Numbers, please! 3.5 billion inhabitants - a database of all cities in the world

Researchers have created a database of all cities in the world. This makes it possible to compare what is otherwise not comparable and shows an exciting picture of the world.

In 2015, more than 3.5 billion (or exactly 3,535,326,299) people lived in cities with at least 50,000 inhabitants, which was 48 percent of the entire human population. Of these cities, there were 13,135 five years ago, by far the most in India (3229), ahead of China (1844), Ethiopia (553) and Nigeria (480). Only 40 years earlier, only 1.8 billion people (43 percent) had lived in cities of this size. The largest cities in the world in 2015 were Guangzhou (40.5 million), Jakarta (36.3 million), Tokyo (33 million), Delhi and Shanghai, in that order. Dortmund (better, the Ruhr area) follows in 118th place with 3.4 million inhabitants as Germany's largest city and here at the latest it should become clear that these figures are somewhat different.

👀 👉🏼 https://public.tableau.com/profile/martin.holland#!/vizhome/CitiesOfTheWorld-Population

👀 👉🏼 https://ec.europa.eu/jrc/en/publication/eur-scientific-and-technical-research-reports/atlas-human-planet-2018

👀 👉🏼 🇩🇪 https://www.heise.de/hintergrund/Zahlen-bitte-3-5-Milliarden-Einwohner-eine-Datenbank-aller-Staedte-der-Welt-4861541.html

#numbers #scientific #research #atlas #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@NoGoolag
Firefox Daylight for Android arrives with Enhanced Tracking Protection, new UI, and GeckoView

After more than a year of development, Mozilla today launched Firefox 79 for Android, branded Firefox Daylight. Like Firefox 57 Quantum, Firefox Daylight gets its own name as it marks “a new beginning for our Android browser.” The new version is “an entirely overhauled, faster, and more convenient product.” Firefox Daylight includes Enhanced Tracking Protection on by default, a new user interface, Mozilla’s own mobile browser engine GeckoView, and a slew of new features. Mozilla is rolling out the new Firefox for Android globally, starting in Germany, France, and the U.K. today and in North America from August 27.

Firefox has about 200 million active users, according to Mozilla, making it a major platform for web developers to consider. But that number has been steadily falling over the years. Furthermore, on mobile, where users are less likely to change their default browser, Firefox holds less than 1% market share, according to Net Applications. That’s why the company decided to hit reset on its Android browser.

The launch comes at a difficult time for Mozilla, which earlier this month announced layoffs of about 250 employees. We spoke with Mozilla senior product manager Vesta Zare about the Firefox Daylight launch. “I wouldn’t say it was impacted that much by the layoffs, but of course everyone was impacted,” Zare said. “But I do want to stress that this remains a priority, a high area of focus for us, especially on mobile.”

👀 👉🏼 https://venturebeat.com/2020/08/25/firefox-daylight-android-enhanced-tracking-protection-geckoview/

#mozilla #firefox #GeckoView #browser #android #tracking #protection
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@NoGoolag
Kindle Collects a Surprisingly Large Amount of Data

Turns out, Kindle Collects a Ton of Data

The Kindle sends device information, usage metadata, and details about every interaction with the device (or app) while it's being used. All of this is linked directly to the reader account.

Opening the app, reading a book, flipping through a few pages, then closing the book sends over 100 requests to Amazon servers.

👀 👉🏼 https://nullsweep.com/kindle-collects-a-surprisingly-large-amount-of-data/

#kindle #surveillance #data #collection #amazon #DeleteAmazon #thinkabout #poc
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@NoGoolag
72: Bangladesh Bank Heist
Bangladesh Bank Heist - Darknet Diaries

This story is about a bank robbery with the objective to steal 1 billion dollars. Which makes this the largest bank robbery in history. And it was all done over a computer.

🎧 👉🏼 https://darknetdiaries.com/episode/72/

#darknetdiaries #podcast
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@NoGoolag
Episode 14: Women in Cybersecurity 1 - The Story of Mia Greene
The AnglerPhish Podcast - Women in Cybersecurity 1 - The Story of Mia Greene (Episode 14)

Cybersecurity Ventures research shows that women represented 20% of the global cybersecurity workforce at the end of 2019. That a vast improvement from 2013 when it was only 11%. But it's not good enough. As part of a Two Episode Special, Mia Greene visits Anglerphish to tell her story and trouble of entering the cybersecurity workforce.

🎧 👉🏼 The #AnglerPhish #truecrime #podcast (Episode 14)

📡
@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@NoGoolag
WebBundles Harmful to Content Blocking, Security Tools, and the Open Web (Standards Updates #2)

This is second in a series of blog posts describing new and proposed web standards and how they support or threaten web privacy.

In a Nutshell…

Google is proposing a new standard called WebBundles. This standard allows websites to “bundle” resources together, and will make it impossible for browsers to reason about sub-resources by URL. This threatens to change the Web from a hyperlinked collection of resources (that can be audited, selectively fetched, or even replaced), to opaque all-or-nothing “blobs” (like PDFs or SWFs). Organizations, users, researchers and regulators who believe in an open, user-serving, transparent Web should oppose this standard.

While we appreciate the problems the WebBundles and related proposals aim to solve,[1] we believe there are other, better ways of achieving the same ends without compromising the open, transparent, user-first nature of the Web. One potential alternative is to use signed commitments over independently-fetched subresources. These alternatives would fill a separate post, and some have already been shared with spec authors.

The Web Is Uniquely Open, and URLs Are Why

The Web is valuable because it’s user-centric, user-controllable, user-editable. Users, with only a small amount of expertise, can see what web-resources a page includes, and decide which, if any, their browser should load; and non-expert users can take advantage of this knowledge by installing extensions or privacy protecting tools.

The user-centric nature of the Web is very different from most application and information distribution systems. Most applications are compiled collections of code and resources which are difficult-to-impossible to distinguish and reason about. This difference is important, and is part of the reason there are many privacy-protecting tools for the Web, but very few for “binary” application systems.

At root, what makes the Web different, more open, more user-centric than other application systems, is the URL. Because URLs (generally) point to one thing[2], researchers and activists can measure, analyze and reason about those URLs in advance; other users can then use this information to make decisions about whether, and in what way, they’d like to load the thing the URL points to. More important, experts can load https://tracker.com/code.js, determine that it’s privacy-violating, and share that information with other users so that they know not to load that code in the future.

👀 👉🏼 https://brave.com/webbundles-harmful-to-content-blocking-security-tools-and-the-open-web/

#brave #webbundles #contentblocking #security #tools
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@NoGoolag
koyu.space - We are creating free internet services for you and your friends

👀 👉🏼
https://koyu.space/about

#koyu
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@NoGoolag
Face recognition: Algorithms based on protective masks often fail

Many manufacturers of technology for biometric face recognition have recently claimed that they have adapted their algorithms to nose-mouth masks and can now identify even partially concealed persons fairly accurately. However, the latest results of a study by the U.S. standards authority NIST show that the masks significantly increase the error rates of new systems as well.

In an update to previous research published on Tuesday, the Institute for Standards and Technology examined 41 algorithms for automatic face recognition that developers had submitted after mid-March during the Covid 19 disease epidemic that was spreading rapidly in western countries. Many of them are said to have been specifically designed or revised with face masks in mind. An initial test by NIST of algorithms not adapted for masks had shown that even the 89 best of these had error rates between five and 50 percent.

👀 👉🏼 https://pages.nist.gov/frvt/html/frvt_facemask.html

#biometric #facerecognition #NIST
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@NoGoolag
A Look at Kdenlive – Libre Video Editor for GNU/Linux

I have done my fair share (or more) of video editing in my life, primarily using Adobe Premiere Pro as I was taught in college. However, I try not to use Windows unless I have to, and so I’ve been always on the hunt for better options for my GNU/Linux systems – and I think I’ve found my personal favourite video editor; Kdenlive.

Kdenlive is a free video editor that up until this point, has yet to let me down for my personal needs, and has also been easily the simplest and fastest for encoding and exporting videos.

💡 Kdenlive features

The Kdenlive website lists the features as:

Multi-track video editing
Use any audio / video format
Configurable interface and shortcuts
Titler
Many effects and transitions
Audio and video scopes
Proxy editing
Online resources
Timeline preview
Keyframeable effects
Themable interface

👀 👉🏼 https://www.ghacks.net/2020/08/26/a-look-at-kdenlive-libre-video-editor-for-gnu-linux/

👀 👉🏼 https://kdenlive.org/en/

#kdenlive #video #editor #linux #gnu
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@NoGoolag
The head of Denmark’s spy program has been fired for snooping on citizens and lying about it

The government in Denmark has fired 3 top officials from the country’s foreign intelligence agency, the Forsvarets Efterretningstjeneste (FE), following revelations from a whistleblower. The officials, including the head of the agency, Lars Finden, have been “relieved of duty for the time being” following the release of a trove of documents. The documents detailed that the FE has been illegally spying on Danish citizens in the last six years and were released by an unnamed whistleblower to the independent regulator of Danish security services which is known as Tilsynet med Efterretningstjenesterne (TET).

Whistleblower reveals Danish spying, gets Danish spy chief fired

According to a press release by the TET, Danish intelligence had maintained “operational activities in violation of Danish law, including obtaining and passing on a significant amount of information about Danish citizens.” Additionally, the TET noted that the FE had not only withheld information but actually reported back to overseers “incorrect information on matters relating to the collection of the service and disclosure of information.”

Prior to the whistleblower’s documents making their way to the TET, the FE had been stonewalling investigations on whether foreign intelligence spying capabilities had been used on domestic targets. The press release went on to note that Danish intelligence actually passed on the information to other countries. Unfortunately, due to the “extremely sensitive” nature of the information, it’s possible that we’ll ever know specifically who was spied on, for whom, or why.

👀 👉🏼 🇬🇧 https://www.privateinternetaccess.com/blog/the-head-of-denmarks-spy-program-has-been-fired-for-snooping-on-citizens-and-lying-about-it/

#denmark #spy #spionage #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@NoGoolag
Confessions of an ID Theft Kingpin, Part I

At the height of his cybercriminal career, the hacker known as “Hieupc” was earning $125,000 a month running a bustling identity theft service that siphoned consumer dossiers from some of the world’s top data brokers. That is, until his greed and ambition played straight into an elaborate snare set by the U.S. Secret Service. Now, after more than seven years in prison Hieupc is back in his home country and hoping to convince other would-be cybercrooks to use their computer skills for good.

For several years beginning around 2010, a lone teenager in Vietnam named Hieu Minh Ngo ran one of the Internet’s most profitable and popular services for selling “fullz,” stolen identity records that included a consumer’s name, date of birth, Social Security number and email and physical address.

Ngo got his treasure trove of consumer data by hacking and social engineering his way into a string of major data brokers. By the time the Secret Service caught up with him in 2013, he’d made over $3 million selling fullz data to identity thieves and organized crime rings operating throughout the United States.

Matt O’Neill is the Secret Service agent who in February 2013 successfully executed a scheme to lure Ngo out of Vietnam and into Guam, where the young hacker was arrested and sent to the mainland U.S. to face prosecution. O’Neill now heads the agency’s Global Investigative Operations Center, which supports investigations into transnational organized criminal groups.

👀 👉🏼 https://krebsonsecurity.com/2020/08/confessions-of-an-id-theft-kingpin-part-i/

#confessions #idtheft #kingpin
📡@cRyPtHoN_INFOSEC_DE
📡
@cRyPtHoN_INFOSEC_EN
📡
@BlackBox_Archiv
📡
@NoGoolag