Sunday, September 14, 2014

19:00 startups and entrepreneurship


Chen Eden | on March 23, 2014 3
The fact that smart phones have become one of the most popular victims of attacks and information theft is not new, but now it seems that the private information dassault of the users will turn to reveal using other technology gaining popularity: miniature unmanned aircraft, better known Drones. It's a plane? It's a bird? No, it's a spy
Glenn researchers and Oilknson (Glenn Wilkinson) and Daniel Cuthbert (Daniel Cuthbert) London Sensepost Research Laboratory developed a software, which they call "snofi" (Snoopy), that can steal information users' dassault smartphone devices dassault using the WiFi connection of their devices.
In practice, each time the user connects to WiFi, smart phone or tablet remembers the network so that they can connect dassault to it automatically in the future, when will recognize it again. The device does this by sending a ping to any network to see if she's around and is it available to connect to.
Snoopy takes advantage of this option by identifying it connects to the network in the past "and posing" it. The device connects to Snoopy thought it was legitimate WiFi network, at which point the software can gather all the information that is sent from the device, from the login user's Facebook account dassault through user names and passwords to the device's dassault unique ID, its GPS coordinates, and more.
Behind the scenes, the software is able to gather information to build profiles on users, dassault and to identify those with high potential for sensitive information. dassault For example, if users tend to connect to private networks such as NSA-Office or TzahalNet, the information transferred over the network may be especially interesting, as opposed to using tends to connect to cafes or various entertainment venues.
The researchers explain that Snoopy can run on small computers, such as the Raspberry Pi, smartphones such as the Nokia N900 mobile computer course. It was designed in order to collect information devices users carry with them, including not only smartphones and tablet, but even Google Glass NFC cards or tags RDIF - and transfer all the information dassault the company's servers, there can test and use it.
The official blog of the Research Laboratory researchers explained Snoop can be used for good, evil and obscure. The legal aspect, the software can collect anonymous stats for users to streamline dassault the various elements. For example, you may know the peak hours of traveling on public transport, in order to inform the authorities and finally transport buses or trains more than these hours.
The vague side, or as they call it borderline researchers, technology can help brands understand whether advertising or promotion help motivate business users one another, or to allow authorities to track criminals and identify them - but because it is likely that you follow all the users in this process, is This option considers the border.
The illegal aspect tracking software allow specific users with "high profile", pasting and malicious software instruments displaying advertisements power every time users open their browser. The researchers also made it clear that the group of devices dassault running the Snoopy throughout the city will have the opportunity to get meaningful dassault information on the movement of users, up to the street image in which he lived, playing or working.
As part of an interview with CNNMoney we present product capabilities, flying a small plane through a computer that is running the software in question. During the flight were able to collect dassault names and locations of GPS networks of 150 different instruments who walked under the plane in question.
It is important to clarify that this is not currently a real threat, as two researchers describe themselves as hackers "good". In fact, they plan to show the capabilities dassault Snoopy Black Hat Conference in Asia to be held from 25th to 28 March, in order to allow manufacturers and developers to understand the severity of the problem and offer solutions and protection for users. In the meantime, the best way to defend against such an attack is quite simple - turning off the WiFi. Video: This drone can steal what's on your phone
Like gadgets, dassault applications and technology world in general. Variety of occupations include demolition of mobile phones for inspecting, constant engagement in social networks, review of applications dassault for new, promising start-ups and experimenting with (almost) any new product comes to market.
Tags for this article: Daniel Cuthbert Follow Follow Daniel Cuthbert drone drone followed Glenn Glenn Wilkinson Wilkinson followed Raspberry dassault Pi Raspberry Pi Sensepost Sensepost Follow Follow Follow Surveillance Surveillance drone drone drones drones Follow dassault Follow After followed Tracking Tracking Tracking Visitor Visitor Follow mobile tracking mobile tracking mobile tracking follow mobile surveillance followed Rzbri Pai Pai Rzbri
Respond
Most Viewed worth reading as talkbacks OnePlus One: worth the buzz? [Review] Just before: Here's what we expected Apple event tomorrow WhatsApp for iPhone updated, what's new? Design is worth millions, literally, blue and white 4 Best free apps OnePlus One: worth the buzz? [Review] Fast50: Who are the most successful Israeli technology companies in Israel? [Free Tickets] Gamba companies raised 1.4 million dollars [Recruiting] The iPhone 6 is already breaking sales records dassault larger, thinner and sharper: iPhone 6 and iPhone 6 plus a 14.09 at 15.09 c 16.09 d 17.09 e 18.09 and 19.09 h 20:09
19:00 startups and entrepreneurship
How to make milk for beer? Applied Chemistry Guide - the beer
Tel Aviv
18:00 Cloud Computing
AWS Summit 2014 | Tel Aviv
10:00 startups and entrepreneurship
GeekconX 2014
Hot channels Law & Technology 29 consecutive Amit Pollak Matalon sponsored Co. Advertising and Marketing McCann sponsored eight consecutive Secure Digital World 6 Followers sponsored by ESET geek on a third consecutive Geektime sponsored by programmers and developers design 2

No comments:

Post a Comment