A More “Intimate” IoT Issue

As humans get more attached to technology, it appears that we also get more detached from reality and those around us. The meaning of interpersonal relationships gets foggier as our practical need for face-to-face interaction is lost. But the loss of the practicality of it in day-to-day life does not mean that humans do not desire personal relationships. To be more specific, the human desire for a romantic relationship does not dwindle even as our desire to go out and create one does. Some would say that a solution to this issue would be, gently put, robotic escort services.

Whether these robotic prostitutes are for hire or are personally owned is beyond the scope of this discussion. As is whether this is a good direction for humanity to go in. The issue to be discussed is much graver than that.

As the IoT grows more populous with frivolous devices, one cannot help but come across articles stating the dangers of having these devices on the internet. Sure, hacking a toaster can allow you access to someones home network. And yes, a juice press that connects to World Wide Web seems more than a little bit silly. But they are merely pocket change when compared to the possibility of being killed by an IoT device. If during use, one of these sex robots was to be hacked it could be commanded to kill you. If this sounds ridiculous to you, I’m certain that you’re not alone. But Dr. Nick Patterson of Deankin University in Australia will have you know that this is not at ridiculous as it may seem.

“Hackers can hack into a robot or a robotic device and have full control of the connections, arms, legs and other attached tools like in some cases knives or welding devices,” Patterson says. “Often these robots can be upwards of 200 pounds, and very strong. Once a robot is hacked, the hacker has full control and can issue instructions to the robot. The last thing you want is for a hacker to have control over one of these robots. Once hacked they could absolutely be used to perform physical actions for an advantageous scenario or to cause damage.”

While an immediate threat is not thought to be present, it is certainly a consideration one should make before purchasing one of these machines in the future.

-Alan Richman

Sources: Patterson initially gave this information to the Daily Star in the United Kingdom. The given link is to the source with this information containing no graphic, explicit, or sexual imagery.

http://bgr.com/2017/09/11/sex-robot-hack-security-cyborg/

Advertisements

Hacker Group Makes Profit Off Of Selling Hacking Tools

In the past few years, the mysterious hacker group known as the “Shadow Brokers” have been responsible for the stealing and releasing of NSA secrets on the internet. Now, more recently, they have done more than just expose this classified information; They have created a way to make money off of it. The Shadow Brokers have started a service that sells their stolen hacking tools to anyone who is subscribed to them. Little is known about the service, as only a handful of subscribers have been identified. However, it has been estimated that the group has made almost $90,000 in the selling of these hacking tools.

Image result for shadow brokers

Although the group’s intentions have mainly been releasing secret and valuable hacking information, it seems as though that the Shadow Brokers are not interested in the satisfaction of their own customers. Earlier this summer, an anonymous subscriber to this service publicly detested it. Stating that the “Shadow Brokers had ripped [him or her] off,” it was explained that the tool received was old and dated compared to the kinds of hacking tools used today.

It is unclear as to what specific tools can be bought from the Shadow Brokers, but those investigating believe that the best they have to offer are the tools that they initially exposed. This might explain why there could be some complaint among their subscribers. Unless there are more people willing to provide insight about the Shadow Broker’s service, it could be very difficult to uncover more information about this underground hacking market.

https://motherboard.vice.com/en_us/article/neejqw/the-shadow-brokers-have-made-almost-dollar90000-selling-hacking-tools-by-subscription-researcher-says

 

– Jared Albert

Hacking group claims to offer cyberweapons in online auction

nsa-logo

Hackers going by the name Shadow Brokers said they will auction stolen surveillance tools that are linked to the U.S. National Security Agency.   The group said interested parties had to send funds in advance of winning the auction via Bitcoin currency and would not get their money back if they lost.  To arouse interest in the auction, the hackers released samples of programs they said could break into popular firewall software made by companies including Cisco Systems, Juniper Networks and Fortinet.  The companies did not respond to request for a comment and there was no response from the NSA.  The Shadow Brokers promised in postings on a Tumblr blog that the auctioned material would contain “cyberweapons” developed by the Equation Group, a hacking group that cybersecurity experts widely believe to be an arm of the NSA.

The Shadow Brokers said the programs they will auction will be “better than Stuxnet,” which is a  malicious computer worm.  Reuters could not contact the Shadow Brokers or verify their assertions. Some experts who looked at the samples posted on Tumblr said they included programs that had previously been described and therefore were unlikely to cause major damage.  Professionals stated that some of the data released was fairly old and even a couple years old in some cases.  Still, they appeared to be genuine tools that might work if flaws have not been addressed. Other security experts warned the posting could prove to be a scam.

You can find the whole article at

http://www.cnbc.com/2016/08/16/hacking-group-claims-to-offer-cyberweapons-in-online-auction.html

-Andrewvcsec

 

Canadian Point of Sale company data breech

     The point of sale company Lightspeed has suffered a data breech, the email above was posted on twitter by Australian security expert Troy Hunt which was sent by Lightspeed to its customers. The hackers had gained access to systems related to its retail offering. Lightspeed confirmed the attackers accessed a central database containing information on sales, products, and customers. The database included encrypted passwords, electronic signatures, and API keys. Eventhough the database was accessed by hackers Lightspeed said there was no evidence that information was stolen.

      The company said that passwords created after January of 2015 where the safest having been stored with advanced encryption technology. They also said that the system that the hackers had accessed did not hold any private information such as credit card numbers. The company has informed customers that a third party security firm had been hired to investigate and that it’s systems should be only accessible by authorized users.

http://www.securityweek.com/pos-vendor-lightspeed-suffers-data-breach

  • Gavin Millikan

New Rule 41 Allows FBI to Mass Hack

shutterstock_fbi_spy-640x423

An amendment to Rule 41 would allow the FBI to obtain a warrant from any court to hack multiple computers rather than from one with jurisdiction over the target’s location. All the FBI would have to do in order to get the warrant would be to prove the target is obscuring their location.

Therefore, the FBI would theoretically only need one warrant from anywhere in America to hack multiple computers all over the world. This is scary to think about. Tor users should be aware of this.

Some people seem to be not as worried stating that the FBI would still need probable cause. They also point out the logic in that it is hard to get a warrant to hack a computer if you cannot determine the computer’s location.

This will go into effect starting December 1st unless Congress blocks it.

Source: https://news.bitcoin.com/update-bitcoiners-use-tor-warned

– jar311