Tag Archive for: Catch

Can’t catch a (prison) break – POLITICO


Press play to listen to this article

Voiced by artificial intelligence.

Good Sunday afternoon: This is John Johnston, stepping in for Annabelle Dickson who is on the lam from Sunday Crunch. Normal service will resume next week.

THINGS TO KNOW

RESET ON REMAND: Expectations of a post-recess reset for Rishi Sunak have been firmly dashed after his first week back was dominated by crumbling school chaos, the resignation of another scandal-hit Conservative MP, and topped off with a terror suspect ordering Uber yeets from Wandsworth prison …

Sigh of relief: Daniel Khalife was captured after 75 hours on the run after a plain-clothes police officer pulled him off a bicycle on a canal towpath in northwest London on Saturday.

Chalk-ed it up: But the questions over how the former soldier managed to slip away are only beginning, with Justice Secretary Alex Chalk taking to the Sunday shows to face a grilling over how on earth this could have happened.

**A message from Google: Google’s Be Internet Legends programme helps children learn five key skills needed to be safer online through interactive materials that make learning fun. Teachers and students are invited to join a Back to School assembly, in partnership with Parent Zone, on 14th September. Find out more.**

Obviously: The usual crisis protocol has been initiated in Whitehall — namely launching a deluge of investigations to try and find someone to blame that isn’t the government.

Lockdown: Chalk said he has ordered preliminary probes to be on his desk by close of play today, including details about Wandsworth’s security processes and whether Khalife should have been held in a Category A prison given his charges.

Vote of confidence: Speaking to Sky’s Trevor Phillips, Chalk said the correct prison protocols were in place at the time of the escape, adding that he had “full confidence” in the Wandsworth governor to conduct an investigation into whether they were actually being followed.

But but but: He revealed that out of an “abundance of caution” around 40 prisoners on remand at the facility had already been moved…

Source…

Apple Taking Applications Now, But There’s A Catch


If you want a free iPhone 14 Pro, with no carrier contract locking you in for 12 or 24 months, your legal options are pretty limited. If you want that iPhone so as to be able to hack iOS while using it, however, Apple is now offering just that opportunity. But you’ll need to be quick; applications close on October 31. You will also need to meet a bunch of eligibility criteria. Here’s what you need to know.

09/02 update below. This article was originally published on August 31.

Apple’s Hackable iPhone 14 Pro

As part of Apple’s claim that the iPhone is “the world’s most secure consumer mobile device,” it created the Apple Security Research Device Program. This acknowledges that the security protections in place make it hard for security researchers to get started when looking for iOS vulnerabilities that malicious actors could exploit.

The Apple SRD is a custom iPhone 14 Pro that enables researchers to look for ways to hack iOS without having to bypass those built-in security features. What this means is that this particular iPhone 14 Pro is fully hackable by those with the requisite skills to find new iOS vulnerabilities. It provides shell access, for example, and even the ability to mess around with the kernel. Any vulnerabilities found must be reported to Apple and will be eligible for financial reward as part of the Apple Security Bounty program.

MORE FROM FORBESGoogle Warns Gmail Users Ahead Of New Security Alerts-Set Up 2FA Now

Eligibility Criteria For The Apple Security Research Device Program

Such a device is a valuable item, especially if it were to fall into the wrong hands. So, you won’t be surprised to learn there are strict guidelines regarding usage, as well as who is eligible to apply for a 12-month free iPhone 14 Pro loaner.

When it comes to eligibility, applicants must already have had success when it comes to vulnerability research. This success can be on Apple platforms or other operating systems such as Android, for example. You can’t have been employed by Apple within the previous 12 months or be a current employee. Finally, there’s a list of countries which Apple will…

Source…

Catch the spy in your phone


No one has the right, be it your boss or a paranoid partner, to snoop on your phone. If it is your company policy then your boss will be upfront and tell you about it.

Stalkerware are software programs or apps that allow people to monitor and get information about their partner, wife or anyone else via their phone. You do not have to be an IT genius to use it. It is readily available in the market legitimately and can be installed in mobiles as well as on desktops and laptops.

Detect stalkerware

It is virtually impossible to introduce stalkerware on iPhones, but it can be done if the device is jailbroken. It is different for an Android smartphone. Officially, Google removes any app from the Play Store if it displays stalker-like behaviour.

There are some symptoms. The battery will drain faster, your data usage will rise, your phone will get heated up unusually, your screen time usage will report a rise and you may get strange notifications.

Tools to find it

Stalkerware apps may hide well but they do show up in the main apps list, maybe with a different name. Go to Settings on Android and tap Apps. See all apps. Look for items that do not look right.

Third-party tools such as Incognito Anti-Spyware by DV Technolabs, Certo Mobile Security and Kaspersky Mobile Antivirus do a good job of detecting stalkerware. All these are available on Google Play Store. I would recommend that you instal the Traced Mobile Security app, also from the Play Store. It is a free app and powered by deep learning technology. Traced analyses your phone’s apps and alerts you to suspicious activity using artificial intelligence.

It alerts you if a malicious app is detected. It also tells you when you have connected to an unsafe WiFi network or when you open a phishing link. It warns you when your Android software or device configurations are vulnerable or when an app tries to access your camera, microphone, takes a screenshot or records your active phone call.

How to remove it

Remember, digital stalking can be done in different ways, other than introducing stalkerware in your device. Be sure to have a safety plan in place. Sometimes removing…

Source…

Finally! Ring Doorbells get End-to-End Encryption, but There’s a Big Catch


Amazon’s Ring unit is moving ahead with plans to allow end-to-end encryption (E2EE). U.S. customers can turn it on now, with the feature rolling out to other countries any second now.

But there’s always a catch. You need to remember a huge random passphrase. And a lot of features will stop working—including the ability to resell your device on the used market.

Is it a dark pattern? If it walks and swims and quacks like one, then it probably is. In today’s SB Blogwatch, we’ve got a bad feeling about Ring.

Your humble blogwatcher curated these bloggy bits for your entertainment. Not to mention: Turning into random objects.

I’m Sorry, Dave; I’m Afraid I Can’t Do That

What’s the craic? Jay Peters reports—“Ring’s end-to-end encryption … available now”:

More secure
Ring’s end-to-end encryption for video streams is leaving technical preview, is now available to US users, and is currently rolling out globally. … The opt-in feature makes it so that your video streams can only be viewed by you on an enrolled iOS or Android device.

Ring first announced video end-to-end encryption in September 2020 and launched the technical preview in January. … If you use two-step authentication to provide extra security to your account, Ring now supports authenticator apps, which [is] more secure than SMS.

And Steven J. Vaughan-Nichols adds—“Amazon is finally delivering it”:

Use E2EE—I will be
Did you know that that handy video your Ring doorbell takes … isn’t private? … Not only are your videos kept in the Amazon Web Services (AWS) cloud, [but they’re] transmitted in the clear.

A sufficiently motivated hacker, or your local police force, can easily watch who’s walking by your door. Until now. … If you decide to install this optional privacy feature, you’ll need to install a new version of the Ring application on your smartphone. Once installed, it uses a Public Key Infrastructure (PKI) security system based on an RSA 2048-bit asymmetric account signing key pair.

You’ll also need to set a passphrase, which you must remember. … If you lose it, you’re out of luck. [But] if you value your privacy, and you still like the convenience…

Source…