Saturday 5 August 2017, Safety Guide

Biometric cameras in Berlin

Lost24

Three cameras were installed at the Sükreuz train station in Berlin, enabling the biometric identification of persons considered as dangerous by the authority. The project is designed to prevent terrorism.

The cameras, connected to a computer system, are intended to detect suspicious persons that are in the database. The system is to be tested for 6 months.
The developers believe that the system will allow to effectively prevent terroristic attacks and other forms of crime.

Three hundred people attended the tests, whose biometric and personal data were entered into the database. When the camera identifies a person in the database, the system will automatically responds and warn of a danger.

The project has been cri

Lost24

Copies of sensitive documents (i.e. identity cards, driving license, notarial deeds or employment contracts) were widely available to every guest and user of the Docer.pl portal. This shocking finding was revealed and described on the Wykop.pl website  by one of the "diggers".

Docer.pl portal allows its users to store different types of data in various formats such as .pdf, .rtf, or .docx. It seems that the users did not realize that, according with the Docer.pl terms and conditions policy, all retained records can be viewed by other users without any restrictions.

When the matter became public, the sensitive data was removed from the website. However, if you are Docer user and your private data is still available to others,

Lost24

Apple has released security update for both iOS and MacOS. The patch is critical to avoid potential infection by the Broadpwn virus.

The U.S. National Institute of Standards and Technology has rated Broadpwn a 9.8 out of 10 on its severity scale.

The virus is classified as very dangerous because it can affect the wi-fi chips found in Apple smartphones and allows the hacker to target these devices so long as they are in the wi-fi range.

According to the security experts at Exodus Intelligence, even a passcode will not protect iPhones from the bug, which can bypass the security feature to exploit the weakness.

How to get the latest update?
In order to download the iOS 10.3.3 patch the iPhone users n

Lost24

The McAfee specialists warn the Android system users about a new type of threat – a ransomware called LeakerLocker.

Ransomware is a  relatively new form of cyberattack that involves hackers taking control of a victim's computer and blocking access to it until the ransom is paid.

LeakerLocker blocks the user's smartphone, threatening to publish private data such as SMS and  browser history, email address, contacts or pictures. In addition, the sensitive information will be available to everyone included in the victim's contact list.

McAfee researchers have identified two apps in the Google Play store that carry LeakerLocker: Wallpapers Blur HD and Booster and Cleaner Pro.

The security ex

Lost24

The police are looking for people who have been deceived by the incomp.pl on-line store. In most cases the assortment offered by the e-store, in the form of household appliances and electronics, did not reach the awaiting customers.

The store offered the equipment at a very attractive prices, reduced by up to several tens of percent. The clients, who were concerned about the delays in delivery of the purchased goods, were appeased by the Incomp consultants. Terms and conditions of the store provided delivery time from 2 up to 21 days.

According to the police, the fraudsters conducting the fake on-line store, have illegally “borrowed” the name of the real Incomp store, located in Rzeszow, which does not sell its products via the Internet.&l

Lost24

If somebody's identity has been stolen, the victim may suffers serious consequences, and the fight to prove the one's innocence is long.
Over a year ago, we wrote about a Silesian resident who has received a call for payment from one of the mobile network companies for overdue invoices. The claim amounted to several thousand zlotys. Later on it was revealed that the unknown fraudster has impersonated the victim and signed a contract with the mobile network company.

The Polish Minister of Internal Affairs and Administration Mariusz Blaszczak has recently announced several changes in the existing legislation, which are intended to prevent this type of abuse.

The new legislation will give the every polish citizen the right to report at t

Thursday 13 July 2017, Safety Guide

A smart speaker has saved lives

Lost24

The abcNEWS portal has recently described an interesting case, about an intelligent speaker which called the police during a home brawl in New Mexico. If not for the swift intervention of the clever device, the household quarrel could have end up badly for the woman and her baby.

A young couple got into an argument, which then became physical. The situation was very serious because the man had wielded a firearm and threatened to kill the woman. During the quarrel the aggressor had repetitively asked his girlfriend: "Did you call the sheriff?". At that moment a smart speaker, which was hooked up to a surround sound system inside the home, recognized the command as “Call the sheriff”and called a police dispatcher.

The police force

Lost24

The Israeli scientists from the College of Management Academic Studies have proven that even the inexperienced hacker can take over the user's internet accounts by exploiting the existing vulnerabilities in password reset procedures.

The researchers have dubbed the hacking technique as Password Reset Man-in-the-Middle (PRMitM). They have also warned that Google's servers are particularly susceptible to this type of attack. This does not mean, however that other sites or e-mail services (like Facebook, Yahoo, LinkedIn, Yandex) are completely resistant to the PRMitM attacks.

In order to carry out the attack, the hacker first needs to create a website, offering the users a free services, free software, or some other free content that can only be

Lost24

Some time ago, the polish police force has launched an information campaign, warning the seniors and their families about a new fraud scheme designed to fool and robe the elderlies of their live-savings. The new fraud method is comely known as "on the policeman method". Unfortunately, despite the police's warnings the number of victims of this type of crime is still very high and is unlikely to be reduced any time soon.

Most recently, the earliest victim – a 64-year-old woman from Żor (small town in southern Poland), has lost her life-savings.

The elder woman was to receive a reward from the police for the assistance in apprehending the group of hackers, which was supposedly planning to commit a virtual bank robbery. The elderly w

Lost24

The mBank has issued a warning to its clients that the unknown group of fraudsters has been training to gain access to the clients' accounts by sending them an e-mail message containing a malicious attachment and a information about the change of the account's format.

The false message states that:
"The mBank needs to change the account format. To confirm the operation, please define a new account number as a defined recipient. The new account number will be active after 7 days, if the operation is not confirmed the transfer of funds to your account will not be possible."

If the recipient of the false message clicks on the attached link, he or she is redirected to a fraudulent bank page. There the client is asked to enter a

Lost24

The Wikileaks portal has recently published a document from the CIA Vault 7 series, containing the informations about a malicious firmware called Cherry Blossom.

Why is Cherry Blossom so dangerous?
The program was designed to compromise wireless networking devices, such as wifi routers from popular companies like Asus, D-Link, 3Com, Linksys, and Apple. The wireless devices were selected as a target because they do not require physical link and can be easily infected by the Cherry Blossom program during the of their firmware over a wireless access.

Once infected, the wifi device becomes a so-called FlyTrap, capable of handling a variety of malicious tasks. FlyTrap is capable of checking a user’s network traffic, redirecting them to a

Lost24

The security experts from UpGuard company have reveled that a Deep Root Analytics firm, working for the Republican Party, was storing sensitive data on about 200 millions of Americans on an unsecured Amazon S3 server.

The amount of information exposed by the incident was tremendous. The names, dates of birth, home addresses, phone numbers, and voter registration details of nearly all of America’s registered voters were exposed.

It is believed to be the largest ever known exposure of voter information to date.

The Deep Root company has admitted to its mistake and takes "full responsibility for this situation." The data was exposed between 1st and 14th of June, during the updated security settings.

Lost24

The security experts from ESET company have discovered a new malware, called Industroyer, that was designed to target equipment installed in power grids.

The experts claim that Industroyer is very dangerous software because it is capable of attacking so-called critical infrastructure, through controlling electricity substation switches and circuit breakers directly. To do so, it uses industrial communication protocols used worldwide in power supply infrastructure, transportation control systems, and other critical infrastructure systems (such as water and gas).

Malicious software has a primary and secondary backdoor feature  a port scanner to search the local network for attached devices, and a data wiper module that deletes the malwa

Lost24

The portal Zaufana Trzecia Strona has recently informed about a leakage of over 50,000 data records from the Independent Public Medical Facility in Koło (town in central Poland).

The stolen data did not concern patients alone, but also included  confidential informations about the hospital staff.

The culprits responsible for the theft have accessed patient healthcare records, containing the most valuable information available, including personal and social security numbers, home addresses and patient health histories.

In the case of hospital staff, the stolen data included series and numbers of the ID cards, mothers' maiden names and bank accounts' numbers.

Surprisingly, to acquire the access to

Lost24

Last month, the police in eastern China's Zhejiang province have arrested 22 people on suspicion of  illegally obtaining and selling iPhone customers data.

It was confirmed that the suspects worked in direct marketing and outsourcing for Apple in China.

The Chinese officials claim that the arrested searched an internal Apple database for sensitive info and then sold it to the black market vendors for between 10 to 180 yuan ($1.50 to $26.50) per piece of information. It is estimated that the suspects may have earned over 50 million yuan, which is the equivalent of approximately $7.4 million.

Apple users are probably wondering what sort of information was stolen/sold?
The data contained customer's names, phon