Industry comment: Australia moves to legislate forced decryption – where appropriate

Historically, law enforcement has always had an ability to request a warrant for a search when criminality is suspected. This is based on the understanding that providing law enforcement such powers, can be used to catch and prosecute criminals. To prevent abuses, these warrants are overseen by a judge, who ensures enough legal criteria for a justified search are presented in proper order.

http://brn.firetrench.com

Continue reading

FAST CARS FROM THE BIG SCREEN GO UP FOR AUCTION – FROM THE FAST AND FURIOUS TO EVLIS’ LAST CADILLAC – GWS AUCTIONS – AUGUST 25TH, 2018

From the “Fast and Furious” to Elvis’ Last Cadillac- Auction Offers a Selection of Some of Hollywood’s Most Memorable Vehicles

 

GWS AUCTIONS – SATURDAY, AUGUST 25, 2018

 

 

H17905-L149472974

LOS ANGELES, CALIFORNIA – (August 14, 2018) – Bright lights, fast cars and the sound of some of the most iconic vehicles of film and music are about to hit the auction block at GWS Auctions’ upcoming Legends: Iconic Film & Music Memorabilia Auction to take place in Los Angeles on Saturday, August 25, 2018.   GWS Auctions will highlight sixteen cars and other vehicles from the big screen and chart topping musical artists as part of the over 150 items to be offered in the memorabilia auction.

http://brn.firetrench.com

Continue reading

Lastline’s latest Malscape Snapshot examines malware in the telecoms industry

AI-driven network security company Lastline has produced its latest version of the Malscape Snapshot, which takes a deep dive into the relationship between vertical industry sectors and malware infections. This latest report in the series explores the telecom industry’s relationship with malware, and has drawn the following conclusions:

http://brn.firetrench.com

Continue reading

Hackers can falsify patient’s vitals in real time

Reports have surfaced detailing that hackers can falsify patients’ vitals by emulating data sent from medical equipment clients to central monitoring systems. The research, available here, takes advantage of a weak communications protocol used by some patient monitoring equipment to send data to a central monitoring station. The protocol is used in some of the most critical systems in hospitals, according to McAfee researchers. Even more concerning, McAfee was able to modify the vital sign data in real time, providing false information to medical personnel to make it look like a patient was flatlining. They were able to switch the display of a patient’s heartbeat from 80 beats a second to zero within five seconds.

http://brn.firetrench.com

Continue reading

FBI warns of global ATM cybercrime spree

FBI issued an alert warning banks that cybercriminals could withdraw millions in cash from ATMs around the globe in a coordinated campaign. This news comes just days after it emerged that ATM maker NCR issued software security updates after researchers reported flaws in encryption of communications between ATM computer and dispensers that could enable attackers to steal cash.

http://brn.firetrench.com

Continue reading

Criminals extort Internet users with threat of compromising videos

Earlier this month bleeping computer reported on an ongoing extortion email campaign that emailed recipients their password and stated hackers had recorded the them over their webcam while they visited adult sites. Over the past week, scammers are now utilizing a new extortion email campaign that claims the recipient’s phone was hacked, includes a partial phone number of the recipient, and further states that they created videos using the recipient’s webcam. It then demands $1,000 USD in bitcoins or the hacker will release the video and other information. This new campaign was brought to their attention last week by security researcher SecGuru who has seen thousands of these email being distributed.

http://brn.firetrench.com

Continue reading