Chris Brook

About

"Distrust and caution are the parents of security" - Benjamin Franklin

Video: Privacy in the Age of Augmented Reality

Threatpost has spoken before with Carnegie Mellon University professor Alessandro Acquisti, one of the country’s leading authorities on the impact of social networks and emerging technologies on privacy. In a talk last week at Stanford University’s Center for Internet and Society titled “Privacy in the Age of Augmented Reality,” the professor who specializes in the economics of privacy, shares his research on how loose privacy protections affect how people conduct themselves on social networks.

MIT Students Use LED Lights, Hack Building to Play Tetris

Students at MIT took to the university’s Cecil and Ida Green Building over the weekend to transform the 21-story research building into an oversized, playable game of Tetris. Emulating the classic ’80s video game with the help of a console and 153 color-changing LED lights, students were able to rotate and move colored blocks across the building. Like the original puzzle game, once someone lost, all of the colored blocks fell to the bottom of the building.


A South Carolina man was arrested yesterday on charges stemming from a data breach that may have leaked personal information on more than 200,000 Medicaid beneficiaries in the state, including their names, phone numbers, addresses, birth dates and Medicare ID numbers according to a report in the newspaper The State.

The number of Macs infected with the Flashback malware continue to decline but it’s not entirely clear to what degree. Initial numbers estimated that there were about 600,000 infected computers in total yet those numbers dropped last week to 237,000 and now, according to research by Symantec published last night, remained around the 140,000 mark this week.

Don’t blab

If you’re worried that your conversations are being monitored, old fashioned “coded talk” also works to disguise the meaning of your conversations. Asking “how are the kids?” rather than “how’s the progress on our new chip design?” may be enough to throw attackers off the scent.

(Images via perspective‘s Flickr photostream)

Lock your doors

Don’t ignore physical security. Morehouse said he knows of many executives and foreign travelers who have returned to their hotel room to find it trashed and mobile devices missing. Once criminals have physical control of your device, protecting its contents is a much bigger challenge. 

(Images via blmurch‘s and chokingsun‘s Flickr photostream)

Mind that signal

The pace of change in mobile spying applications is rapid. However, when it comes to intercepting phone calls in the field, phones that use the older 2G mobile communications standard are easier to crack. Often, organizations that want to carry out an attack will force a mobile device from 3G into 2G only mode. Researchers have already demonstrated, publicly, that the A5/1 algorithm that protects 2G communications can be broken and communications decrypted in real time. Of course, depending on your destination, 3G wireless may not be an option to begin with.