Evidence Shows the Capability to Hack Via Sound Waves

Standard

Computer security researchers from the University of Michigan and the University of South Carolina proved, yesterday, they have discovered a way to hack into a device using sound ways. This newly found weakness allows them to control or influence devices through tiny accelerometers. Accelerometers are instruments that measure acceleration and are manufactured as dynamic silicon chip-based devices used to sense movement or vibrations known as microelectromechanical systems, or MEMS. They are used for navigating, determining the orientation of a tablet and calculating distance in fitness monitors. Accelerometers are standard in consumer products such as smartphones, Fitbits and automobiles.

In the paper highlighting the research, they demonstrate how they were able to add additional steps to a Fitbit monitor, as well as, play a “malicious” music file from a smartphone, demonstrating they can control the phone’s accelerometer. Kevin Fu, one author of the paper, stated, “It’s like the opera singer who hits the note to break a wine glass, only in our case, we can spell out words.” He went on to say, “You can think of it as a musical virus.”

In addition, research from the paper shows that with the toy car, they did not infiltrate the car’s microprocessor, but rather controlled the car by forcing the accelerometer to generate fake readings.

Vinny Troia, CEO of NightLion Security commented, “as we see a heightened push to develop self-driving vehicles from numerous companies, undetected vulnerabilities, such as this one, that could allow an attacker to remotely control a self-driving vehicle is disturbing, but a reality that should be seriously considered.”

Computer security researchers remarked that this is new insight into cybersecurity challenges in complex systems, which show how analog and digital components can interact in unpredictable ways.

The computer security researchers will be presenting their findings at the IEEE European Symposium on Security and Privacy in Paris next month.

Biggest Cyber Security Risks of 2016

Standard

102283681-185207227.530x298.jpg

Hackers are getting worse and worse as years go by. In 2015, 34.2 percent of computer users experienced at least one Web attack. That is a large number of people and it’s only going to increase. The biggest cyber security threats of 2016 are data breaches, ransomware and browser plug-ins, as indicated in an article on Fox News.

Vinny Troia, Hacking Forensic Investigator and CEO of Night Lion Security, a St. Louis cyber security and digital forensics firm, states that companies are beginning to use data breaching as an annual expense. Troia states that it is better to acquire the proper digital security than to allow these data breaches to happen. This year, it is expected that data breaches will occur in the hotel industry, medical insurance agency and unexpected industries, like the high-tech toy industry. Hackers are going for more unexpected industries because people are becoming more cautious.

Make sure you are always watching out for what you click on when on the Internet. Also it is important to check everything you purchase, including health insurance. This may seem overwhelming to check every little thing but it is better to be safe than sorry. Read the whole article here to learn more about the 3 biggest security threats of 2016.

Certified Hacking Forensic Investigator comments on recent hacking crime

Standard

There is a recent article on Fox News about a Bahamian man hacking into celebrities’ email accounts to steal unreleased movies and TV scripts and he had explained to an under cover agent that he had hundreds of them. The man being investigated, Alonzo Knowles, is being held without bail after a court appearance on criminal copyright infringement and identity theft charges. The prosecutor also explained about a scheme he did involving offering an actor’s passport, social security numbers for three athletes, and unreleased tracks from singer-songwriters upcoming albums. Knowles said he had gotten into the celebrities’ accounts by sending either a computer virus or a false warning that that had been hacked.

Vinny Troia, Certified Hacking Forensic Investigator and CEO of Night Lion Security, a digital forensics and penetration testing firm, does NOT believe that the Bahamian man was able to hack into the celebrity email accounts. Troia believes this is a scam and that the 23-year-old never hacked into anything. Troia thinks he did not have access to any of these things. He thinks this was a game to lure customers into buying “celebrity social security numbers”. Once the customers would buy the numbers, Troia expects Knowles would run away and leave them with nothing. Troia believes this scam worked for Knowles because people believe that social security numbers are hard to obtain but in reality, it is quite simple.

Cyber Security Expert discusses JP Morgan Breach

Standard

The JP Morgan data breach is known as one of the worst data breaches ever. A hacker had gotten in through one of the personal computers at JP Morgan. An Illinois attorney general expressed that this breach is the most troubling because of not only its magnitude, but also it proves hackers can get into anything and people cannot assume their information is safe anymore.

Vinny Troia, Certified Hacking Forensic Investigator and CEO of Night Lion Security, discusses this issue with Kevin O’Leary, Michelle Caruso-Cabrera and the staff of CNBC’s Closing Bell. Troia explains how the hackers did not take the passwords to people’s usernames because JP Morgan would notify everyone to change their passwords immediately. The hackers calculated their exact move and are experts in data breaching. Companies are now expecting breaches to happen and should be better prepared in the future.

Security Experts Hack Medical Devices

Standard

Shodan, a hacker search engine that scans the Internet for connected devices, has helped hack into devices such as pacemakers, MRI scanners, cardiology devices, and other smart devices. Most people wouldn’t expect something so personal to be able to be hacked. Most of the objects listed on the Fox News report don’t even have screens, yet they can be controlled by an outside source.

This is an extremely serious issue that should be researched in order to find solutions. When people experience these personal hacks, it needs to be investigated thoroughly. There are so many unknown scenarios that could happen to any device. Hacking to this extent, and with this regularity, is a relatively new problem in the tech industry. With cyber attacks on the rise it is becoming increasingly important for technology companies to research or invest in digital security options.