A new piece of software cleverly titled Sneakey makes it possible to copy keys using nothing more than a photograph, even if that photograph was taken from far away, according to Peter Murray at Singularity Hub.
In one demonstration, the software helped create working keys using a picture taken with a cell phone camera and a picture taken with a telephoto lens over 200 feet away.
Some news, views and musing about things going on in the Information Security World.
Showing posts with label theft. Show all posts
Showing posts with label theft. Show all posts
Thursday, June 30, 2011
Tuesday, September 14, 2010
Burglars Said to Have Picked Houses Based on Facebook Updates
According to New Hampshire’s WMUR Channel 9 News, three local men, Mario Rojas, Leonardo Barroso and Victor Rodriguez, have burglarized more than 18 homes in the Nashua area of New Hampshire simply by checking status updates on Facebook and then pillaging the houses of victims who announced on the social network that they were not home.
Key Words:
physical security,
social engineering,
spying,
theft
Thursday, August 19, 2010
Are You Working With a REAL Security Expert?
The attrition.org website has been posting exposés of security "veterans" who sound like they've been around the block, and seemingly single-handedly invented the information security industry. However, even some of the so-called famous experts are charlatans at best, ripping off their customers and potentially causing them more harm than good.
One example provided is Dr. Ali Jahangiri, who's entire career is so dubious that not only is his resumé in question, entire books that he has "authored" appear to have been entirely plagiarized. Much of the information is so out-of-date that it would only be of interest in a historical sense if this information wasn't already widely available on the Internet for free. Worse, they demonstrate that his Information Policy Templates, which sell for $150 / CD, are all ripped from various places freely available on the Internet, save for 2.
I don't fully agree that everyone on the list is a charlatan, though. For example, professional social engineer Ira Winkler is on the list merely for having a larger-than-life ego. It fails to recognize that extreme self-confidence is a requirement for any social engineer, which makes this hardly a surprise.
What differentiates consultants like Ali from the bad guys? If their credentials don't add up, and their work seems to be ripped off from someone else and repackaged as something new, you may have hired a thief into a position of trust. They haven't only ripped off their sources, they're also stealing your money.
One example provided is Dr. Ali Jahangiri, who's entire career is so dubious that not only is his resumé in question, entire books that he has "authored" appear to have been entirely plagiarized. Much of the information is so out-of-date that it would only be of interest in a historical sense if this information wasn't already widely available on the Internet for free. Worse, they demonstrate that his Information Policy Templates, which sell for $150 / CD, are all ripped from various places freely available on the Internet, save for 2.
I don't fully agree that everyone on the list is a charlatan, though. For example, professional social engineer Ira Winkler is on the list merely for having a larger-than-life ego. It fails to recognize that extreme self-confidence is a requirement for any social engineer, which makes this hardly a surprise.
What differentiates consultants like Ali from the bad guys? If their credentials don't add up, and their work seems to be ripped off from someone else and repackaged as something new, you may have hired a thief into a position of trust. They haven't only ripped off their sources, they're also stealing your money.
Key Words:
physical security,
policy,
security controls,
social engineering,
spying,
theft
Wednesday, June 16, 2010
If it can be stolen, someone already has their eye on it
When companies think about theft, they often omit items they feel would not be of interest to outsiders. Because of this, they often leave things in accessible areas, expecting that they will not be stolen or tampered with.
A group of junior highschool students recently planted 12 apple trees. Within a few days, 3 of the $100 trees were uprooted and stolen. We can only hope the perpetrators are caught and dealt with appropriately.
While a typical school does not have the resources to protect their student's outdoor projects, corporations should be automatically building mitigating costs into their projects right from the start.
Moral of the story? There is a thief for everything that is left unattended.
A group of junior highschool students recently planted 12 apple trees. Within a few days, 3 of the $100 trees were uprooted and stolen. We can only hope the perpetrators are caught and dealt with appropriately.
While a typical school does not have the resources to protect their student's outdoor projects, corporations should be automatically building mitigating costs into their projects right from the start.
Moral of the story? There is a thief for everything that is left unattended.
Thursday, June 3, 2010
Do virtual thieves haul their loot in virtual trucks?
A virtual thieving spree could have real life consequences for culprits in Finland, where police are investigating the theft of virtual furniture on a social networking site popular with teenagers.
"Significant amounts of virtual property" were stolen from around 400 users of the Habbo Hotel virtual hotel, where visitors can create a character for themselves to hang out with friends, take care of virtual pets and furnish their own rooms for a fee, Finnish police said Tuesday.
"Significant amounts of virtual property" were stolen from around 400 users of the Habbo Hotel virtual hotel, where visitors can create a character for themselves to hang out with friends, take care of virtual pets and furnish their own rooms for a fee, Finnish police said Tuesday.
Subscribe to:
Posts (Atom)