UCLA Student
Infosec Blog

Boston Terrier with rose and mobile phone

By Lisa Weintraub Schifferle | consumer.ftc.gov 

It’s Valentine’s Day and love is in the air. You may think you spend a lot on flowers or chocolate, but losing money in a romance scam would cost you even more.

Last year, people reported losing $143 million to romance scams — a higher total than for any other type of scam reported to the FTC. And, according to a new FTC Data Spotlight, reports of romance scams are on the rise. 

Read More…

 

Laptop with video chat open

By John P. Mello Jr. | technewsworld.com
 
Apple has suspended its Group FaceTime application following reports that a bug in the software allowed callers to eavesdrop on the people they were calling. 

The flaw let a person making a FaceTime call listen through the phone of the person called before the call was accepted or rejected. It reportedly also allowed access to the front-facing camera in an iPhone.  Read More…

 

Social media illustration

Have you ever wondered why you see ads on Google about the same topic you just sent a Facebook message to your friend about?

Have you ever wondered why some advertisers know more about you than you think they should? As technology becomes ever encompassing, you should understand how your actions affect what people and companies know about you, as well as know how to protect your privacy.

Remember, any information that you post online, stays online forever. Also, be careful where you enter your information and who you provide it to, as advertisers like to share information, and the thing that you are getting for free, isn’t actually free, it’s costing you your privacy.

Read More…

Cell Phone

By Telstra IN:SIGHT.com 

The security of personal information submitted online is a hot-button issue. We investigate how generation Y approaches privacy.

Millennials are a driving force in today’s digital marketplace. They’re shopping online while scrolling through their emails for deals and discounts. They like and share products across all social media channels. And they’re filling out forms and submitting orders at the tap of a fingertip or click of a mouse, entrusting their contact and payment information to just about any company.

Read more...

Woman looking at departure board at airport

By Catharine Hamm | latimes.com 
 
You may find an evil twin out there — not your own but one that still can do great harm. That nasty double often awaits you at your airport, ready to attack when you least expect it. That’s just one of the findings in a report that assesses the vulnerability of airport Wi-Fi, done not to bust the airports’ chops, but to make airports and travelers aware of the problems they could encounter.

Of the 45 airports reviewed, the report by Coronet said, two we might use could pose a special risk: San Diego and Orange County’s John Wayne, which rated No. 1 and No. 2, respectively, on the “Top 10 Most Vulnerable Airports.” 

Read More...

 

Shopping bags

By Proofpoint Staff | proofpoint.com

As with most major events and trends, threat actors capitalize on Western holidays to craft lures and scams to trick users into clicking, installing malware, transferring funds, and otherwise acting on behalf of cybercriminals. Whether receiving email fraud messages asking users to purchase fake gift cards or using credit cards at terminals compromised with malware, the holidays present a variety of threats for businesses and consumers alike.

In particular, Proofpoint researchers have observed upticks in business email compromise (BEC) scams related to gift cards, holiday-themed lures in malicious emails, “Black Friday” shopping lures, and fluctuations in point-of-sale malware traffic.

Read more...

Keylogger

By Violet Blue | PCWorld.com

Common as dirt, recording every move you make.

The American television series Mr. Robot introduces its viewers to a lot of hacking attacks, techniques, and tools. Most of it is based on actual methods and hardware, even if it is presented as far easier to do on the show than in real life. One thing the show portrays as a common, almost pedestrian attack technique is keylogging.

You need to know about keylogging, because it really is as common, easy to do, and critical to the success of criminals as it is on the TV show. That’s because the targets of attacks that involve keylogging are, well, just about anyone and everyone. And you wouldn’t even know that it’s happening.

Read more...

Facial Recognition

By Byron V. Acohido | threatpost.com

Tech advances are accelerating the use of facial recognition as a reliable and ubiquitous mass surveillance tool, privacy advocates warn. Somewhat quietly over the past couple of years there has been a flurry of breakthroughs in biometric technology, led by some leapfrog advances in facial recognition systems. Now facial recognition appears to be on the verge of blossoming commercially, with security use-cases paving the way. Last week, SureID, a fingerprint services vendor based in Portland, Ore., announced a partnership with Robbie. AI, a Boston-based developer of a facial recognition system designed to be widely deployed on low-end cameras.

Read more...

Ninjio Season 3: Episode 11 - Data Loss by the Logger

While trying to give his all to a high-profile defense case, Dan chooses to cut a few corners regarding the firm’s IT Security procedures. The result places his entire career at stake when hackers find a way to gain his exact login credentials. This episode focuses on increasing awareness around keystroke loggers and what hackers can do with them.

Nine people looking at their phones

By Gillian Cleary | Senior Software Engineer | Symantec
 
Just how much personal information are your apps gathering? And do they really need so much?

The average smartphone user these days has between 60 and 90 apps on their device. Most of these apps request some sort of information about you and the device you are using. They may want to know your name, your email address, or your real-world address. But because smartphones are so powerful, they can also get quite a bit more than that, such as your exact location. Some apps will even request access to the device’s camera or microphone.

Read more...