Former AOL VP becomes new head of CIA tech and science division

The CIA has appointed Dawn Meyerriecks, former AOL Senior Vice President for Product Technology, as its new Chief of Science and Technology. While it seems like a strange move on the CIA’s part, after reading through Meyerricks’s resume, we now understand why she is one of the best candidates. According to Wired, Meyerrick’s is the first internet executive to ever take a top-tiered position in the CIA.

Formera AOl VP becomes new head of CIA tech and science division

Some of the things Meyerriecks has done in the past include working as a Jet Propulsion Lab engineer for NASA, working as a Assistant Director of National Intelligence for Acquisitions and Technology, working as a Chief Technology Officer and Technical Director for the Joint Interoperabillity and Engineering Organization (JIEO), establishing an in-house app market for both spies and analysts, encouraging the U.S. government to use open source software, and much more.

At AOL, Meyerriecks oversaw the relaunch of AOL.com, and also the revamping of AOL Instant Messenger. Meyerriecks stated that the experience that she gained from AOL helped her become a better government tech executive. She said that because of AOL, she learned that it is possible to be innovative without needing to ask for additional funding.

Aside from Meyerriecks’s resume, another reason why the CIA hired her is because it has been trying to improve its position in Silicon Valley. According to Wired, by hiring Meyerrieck, the CIA will be able to boost its position in Silicon Valley and increases its ties to the technology community there. Meanwhile, while the CIA is gaining a new asset, Meyerriecks’s old company AOL is firing a few dozen people.

[via Wired]


Former AOL VP becomes new head of CIA tech and science division is written by Brian Sin & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Hacker shows how Google Glass could watch its user’s every move

Jay Freeman, an iOS and Android developer known for his popular Cydia app store accessible by jailbroken iPhones, has discovered a scary security flaw in Google Glass. While toying around with the Explorer edition of Google Glass, Freeman discovered that the device’s lack of a PIN code or any other form of authentication could make it easy for hackers to install surveillance malware onto the device.

Hacker shows how Google Glass could watch its user's every move

Unlike a smartphone, which stays in your pocket most of the time, a hacked Google Glass can give hackers access to everything you see and everything you hear. According to Freeman, “The only thing it doesn’t know are your thoughts.” All a hacker needs to do is grab an unattended Google Glass, hook it up to their computer via USB, and enable root access on the device. Freeman says,

“Once the attacker has root on your Glass, they have much more power than if they had access to your phone or even your computer: They have control over a camera and microphone that are attached to your head.”

Not only will hackers be able to see and hear everything around you, they will be able to upload your files and recordings to remote servers. Freeman says that a hacked Google Glass “knows all your passwords” because it sees you typing them in. With a compromised Google Glass, “Nothing is safe.” However, chances are that Google will take note of these security flaws and issue fixes to them before the devices become available to consumers early next year.

On the bright side, the only way hackers can install surveillance malware onto your Google Glass device is if they have physical access to it, meaning it won’t be too common. But nonetheless, Google needs to step up the security on the device. The user’s privacy and security should always be the top priority for any company. Freeman issued a statement to Forbes regarding the entire situation. He says,

“It’s just kind of sloppy and negligent for Google to release a device to a bunch of early adopters that is missing a basic security function and even has a known bug on it that was disclosed eight months ago. Like someone could be inside of [tech pundit and blogger] Robert Scoble’s glass right now.”

[via Forbes]


Hacker shows how Google Glass could watch its user’s every move is written by Brian Sin & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Redact offers £10,000 if you crack its messaging app, bets UK government you can’t

Redact offers 10,000 if you crack its messaging app, bets UK government you can't

Software developers looking to kickstart (or simply brag about) their security have a common trick up their sleeve: give away prizes to successful crackers. Redact is trying just such a strategy with its Secure Messenger app for iOS. It’s offering £10,000 ($15,482) to anyone who can visit London and successfully intercept an encrypted message delivered through the company’s peer-based, PIN-to-PIN communication system. Entrants have until June 1st to prove that they’re worthy of making an attempt. Redact has more reason to hope we lose beyond its pride and a big fat check, however — it wants approval for handling the UK government’s secure data, and it wouldn’t hurt to have proof that the app design is airtight. If you’re convinced that it’s all just bluster, you can challenge the company yourself at the source link.

Filed under: ,

Comments

Via: The Guardian

Source: Redact

Government seeks to strong arm companies into spying on users

Last week, we reported on a rather disturbing revelation that the Department of Defense and NSA have been sending out so-called 2511 letters that absolve companies of legal consequences for violating the Wiretap Act by intercepting their users’ communications. While the letters give ISPs and such incentive, they are no good if the company doesn’t want to obey an order to grab data. To remedy this, a government task force is seeking to have companies that don’t cooperate penalized.

Department of Defense

The information comes from sources who are said to be both former and current officials who are familiar with the push. The FBI is said to be at the helm of the request, motivated by what it calls the “going dark” problem of not being able to access online-based communications and missing vital evidence or information because of it. For this reason, a government task force is pushing to have companies penalized for failing to comply with a wiretap order, which is usually achieved by claiming that a means of intercepting the communications is not possible.

Under the proposal, a company such as Google would need to establish a means of intercepting communications, with the freedom to do it however it wishes. If the company receives an order to intercept communications, under the proposal, it will need to do so or will face stiff fines, which are said to start out in the tens of thousands and only go up from there. Failing to follow the order will then lead to a hearing, with the fines doubling daily after 90 days.

Says the FBI’s General Counsel Andrew Weissmann: “The importance to us is pretty clear. We don’t have the ability to go to court and say, We need a court order to effectuate the intercept.’ Other countries have that. Most people assume that’s what you’re getting when you go to a court.” Says the sources, the Obama administration has not signed off on the proposal, and all government agencies asked about the leak declined commenting on it.

[via Washington Post]


Government seeks to strong arm companies into spying on users is written by Brittany Hillen & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Syrian Electronic Army targets The Guardian’s Twitter accounts

The Syrian Electronic Army has struck again, and this time they decided to hack into several accounts belonging to The Guardian. A couple of the accounts hacked were @GuardianBusiness and @GuardianFilm, and they were used to send out tweets promoting the Syrian Electronic Army. This is the latest attack coming from the SEA, and is most likely not their last. This recent hit should speed up Twitter’s process of implementing a two-factor authentication system.

Syrian Electronic Army targets The Guardian's Twitter accounts

Twitter and the Syrian Electronic Army have launching blows against each other these past few weeks, but it seems like the SEA is in the lead. Twitter shut down the SEA’s official Twitter account, but that did nothing to stop the group from making a new one. It seems as though the group is up to their 12th “official account”. In the time that Twitter began banning the SEA’s accounts, the SEA has managed to hack into both The Guardian’s accounts as well as the Associated Press’s.

Syrian Electronic Army targets The Guardian's Twitter accounts 1

With the Associated Press’s Twitter account, the Syrian Electronic Army tweeted, “Breaking: Two Explosions in the White House and Barack Obama is injured.” Not only did that false tweet cause fear among the Associated Press’s followers, it dropped the DOW by 150 points as well. Luckily the Associated Press was able to handle the situation within only a few minutes.

Before the Associated Press attack, the Syrian Electronic Army also hacked into several of CBS’s accounts, BBC’s accounts, FIFA’s accounts, NPR’s accounts, and the Human Rights Watch’s accounts. The Guardian is currently working on restoring their accounts and changing their security credentials. But many are wondering who will be the next target in the Syrian Electronic Army’s consecutive attacks.

[via AllThingsD]


Syrian Electronic Army targets The Guardian’s Twitter accounts is written by Brian Sin & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Hacked LivingSocial unplugs the phones as call-center support frozen

Hacked online deals site LivingSocial has temporarily frozen its customer phone support, blaming extremes of call volume from security-worried users. The daily promotions site, in which Amazon is an investor, admitted on Friday that its database had been compromised, with names, email address, some dates of birth, and encrypted passwords of in excess of 50 million users taken. LivingSocial is now working with authorities to investigate the breach, the company said in an email to users, but in the meantime has shut down its telephone support line.

LivingSocial-Logo-580x211

That decision to shift solely to web-based support is one of resources, according to LivingSocial CEO Tim O’Shaughnessy, who argues that a contact-form system will actually result in fewer frustrated customers.

“Because we anticipate a high call volume and may not be able to answer or return all calls in a responsible fashion, we are likely to temporarily suspend consumer phone-based servicing,” O’Shaughnessy told Marketwatch. We will be devoting all available resources to our Web-based servicing.”

Password and payment safety is always a cause of concern after a site is hacked, but LivingSocial moved quickly to reassure users that their data is, for the most part, safe. The passwords taken were hashed and salted – in short, encrypted – according to the company’s FAQ on the data theft, and no credit card information was taken.

Meanwhile, those who signed into LivingSocial using Facebook Connect have not been compromised, with no impact on their Facebook accounts. However, if they ever had cause to create a separate password on the deals site, that must now be changed.

The exact nature of the hack is yet to be detailed, though LivingSocial is actively investigating it. For the moment, the advice is to change your passwords for any other site using the same login credentials as you might have registered on LivingSocial, and keep an eye out for potential spam or phishing attempts that land in your inbox.


Hacked LivingSocial unplugs the phones as call-center support frozen is written by Chris Davies & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Google Glass Rooted

Rooted GlassGoogle Glass has already been hacked by a well known iOS jailbreaker. By using an Android hack, ‘Saurik’ managed to get root access and modify the code.

LivingSocial breach leaves 50 million customers vulnerable

LivingSocial, a website that provides users with deals on a daily basis, has been hacked, it revealed in a memo to employees and later on with a public statement to users. According to a spokesperson, hackers breached the system and pulled quite a bit of user data, including usernames, encrypted passwords, birth dates, and email addresses of potentially 50 million users. Fortunately, financial information was not accessed.

LivingSocial Logo

As a result of the breach, LivingSocial has begun resetting users’ passwords, and is also sending off emails to customers advising them of the situation, with the exception of users located in South Korea, Thailand, the Philippines, and Indonesia because those systems weren’t harmed. Fortunately, while the hackers got some information, the passwords were encrypted.

Users will need to create a new password now that their current one has been reset. Said LivingSocial in a memo to its employees: “We recently experienced a cyberattack on our computer systems that resulted in unauthorized access to some customer data from our servers. We are actively working with law enforcement to investigate this issue.”

Although the passwords were encrypted, the possibility exists that they could be cracked, and because of this LivingSocial is encouraging its users to create new passwords on their other online accounts, such as banking, social networking, and email accounts, that use the same password or one close to it. In addition, LivingSocial is also advising users that any emails they may receive requesting password information is a phishing attempt and should be deleted.

[via New York]


LivingSocial breach leaves 50 million customers vulnerable is written by Brittany Hillen & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

NYC police chief: more surveillance cameras coming, privacy is “off the table”

Now more than ever, people are becoming more worried about their privacy, specifically being monitored while out in the public. Whether it’d be commuting to work or going out with friends, people aren’t too comfortable with the idea that there are people watching them. However, it’s not going away anytime soon, according to NYC police chief Ray Kelly.

bigbrother

Kelly thinks there’s no better time than right now to install more surveillance cameras around New York City, especially considering the recent events in Boston earlier this month — the two suspects responsible for the Boston Marathon bombings were identified with security cameras that were placed on Boston streets.

Kelly says that “the privacy issue has really been taken off the table,” meaning that while people may be concerned about being monitored while out in public, it doesn’t seem to be too much of a concern for Kelly. He says that the “genie is out of the bottle,” and most people accept the fact that they’re being watched in public, whether they like it or not.

The NYPD currently take advantage of “smart cameras” that are laid out in Lower Manhattan. The police department has been using these for almost a decade, and they’re there to identify potential threats such as unattended bags left on sidewalks for an extended amount of time. When the cameras detect something suspicious, it sends out an alarm.

An unattended bag was the exact situation in the Boston Marathon bombings, and had these smart cameras been installed on Boston streets, the fiasco could have been avoided. That’s Kelly’s frame of mind, at least. In any case, we now live in a day and age where there’s really no such thing as privacy out in the public, and once you leave your house, you’re subject to surveillance cameras everywhere.

[via Reason]


NYC police chief: more surveillance cameras coming, privacy is “off the table” is written by Craig Lloyd & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

AT&T rolls out Digital Life home management system, offers it in 15 markets

It could be said that one day every home will have automation features – it only makes sense given the increasingly wireless and mobile nature of technology and our lives in general. AT&T has gotten into the market, rolling out its Digital Life home management and automation system for the first time. For now, the service is available in 15 markets, with plans to roll it out in 50 markets by the end of the year.

Screenshot from 2013-04-26 01:14:08

Digital Life offers always-there home monitoring via AT&T centers, which customers have the ability to receive alerts from through a variety of means, including via mobile while away from home. Users can likewise manager their house from their tablet, smartphone, or laptop, locking doors, adjusting lights and thermostats, and more. For now, only customers in Atlanta, Austin, Boulder, Chicago, Dallas, Denver, Houston, Los Angeles, Miami, Philadelphia, Riverside, San Francisco, Seattle, St. Louis, and select parts of New York/New Jersey can subscribe.

The home management service comes in two varities: a $29.99 monthly + $149.99 installation package, and a $39.99 monthly + $249.99 installation pagkage with a few more options over the cheaper rate, such as a glass break detector and carbon monoxide detector. From there, users can add more feature, including a door, energy, camera, water detection, and water control package for smaller additional rates per month.

AT&T Digital Life’s Senior Vice President Kevin Petersen said, “We know how important security is to our customers, and this was our top priority when we set out to build Digital Life. People rely on their mobile devices more than ever, so Digital Life offers an easy and convenient way to secure their homes, protect their families and simplify their lives from virtually anywhere.”

[via AT&T]


AT&T rolls out Digital Life home management system, offers it in 15 markets is written by Brittany Hillen & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.