Showing posts with label theft. Show all posts
Showing posts with label theft. Show all posts

Thursday, June 30, 2011

Software Can Copy Your Keys From A Photograph Taken 200 Feet Away

A new piece of software cleverly titled Sneakey makes it possible to copy keys using nothing more than a photograph, even if that photograph was taken from far away, according to Peter Murray at Singularity Hub.

In one demonstration, the software helped create working keys using a picture taken with a cell phone camera and a picture taken with a telephoto lens over 200 feet away.

Tuesday, September 14, 2010

Burglars Said to Have Picked Houses Based on Facebook Updates

According to New Hampshire’s WMUR Channel 9 News, three local men, Mario Rojas, Leonardo Barroso and Victor Rodriguez, have burglarized more than 18 homes in the Nashua area of New Hampshire simply by checking status updates on Facebook and then pillaging the houses of victims who announced on the social network that they were not home.

Thursday, August 19, 2010

Are You Working With a REAL Security Expert?

The attrition.org website has been posting exposés of security "veterans" who sound like they've been around the block, and seemingly single-handedly invented the information security industry. However, even some of the so-called famous experts are charlatans at best, ripping off their customers and potentially causing them more harm than good.

One example provided is Dr. Ali Jahangiri, who's entire career is so dubious that not only is his resumé in question, entire books that he has "authored" appear to have been entirely plagiarized. Much of the information is so out-of-date that it would only be of interest in a historical sense if this information wasn't already widely available on the Internet for free. Worse, they demonstrate that his Information Policy Templates, which sell for $150 / CD, are all ripped from various places freely available on the Internet, save for 2.

I don't fully agree that everyone on the list is a charlatan, though. For example, professional social engineer Ira Winkler is on the list merely for having a larger-than-life ego. It fails to recognize that extreme self-confidence is a requirement for any social engineer, which makes this hardly a surprise.

What differentiates consultants like Ali from the bad guys? If their credentials don't add up, and their work seems to be ripped off from someone else and repackaged as something new, you may have hired a thief into a position of trust. They haven't only ripped off their sources, they're also stealing your money.

Wednesday, June 16, 2010

If it can be stolen, someone already has their eye on it

When companies think about theft, they often omit items they feel would not be of interest to outsiders. Because of this, they often leave things in accessible areas, expecting that they will not be stolen or tampered with.

A group of junior highschool students recently planted 12 apple trees. Within a few days, 3 of the $100 trees were uprooted and stolen. We can only hope the perpetrators are caught and dealt with appropriately.

While a typical school does not have the resources to protect their student's outdoor projects, corporations should be automatically building mitigating costs into their projects right from the start.

Moral of the story? There is a thief for everything that is left unattended.

Thursday, June 3, 2010

Do virtual thieves haul their loot in virtual trucks?

A virtual thieving spree could have real life consequences for culprits in Finland, where police are investigating the theft of virtual furniture on a social networking site popular with teenagers.

"Significant amounts of virtual property" were stolen  from around 400 users of the Habbo Hotel virtual hotel, where visitors can create a character for themselves to hang out with friends, take care of virtual pets and furnish their own rooms for a fee, Finnish police said Tuesday.