Apple, the Privacy and Security Outfit, Has a New Spin for Pix

December 16, 2022

In an alarmingly hilarious situation, iCloud users are seeing photos of strangers on their devices. What sounds like a hacker’s gaff, actually proves to be a security risk. XDA Developers investigates what is going on with iCloud in, “iCloud For Windows Users Are Reportedly Seeing Random Family Photos From Strangers.”

People buy Apple products for its better security and privacy settings than PC devices. While Apple has an iCloud app for PC users, the app is not working as well as its fellow Apple products:

“Based on the reports, the corrupted files seemingly revolve around videos shot on iPhone 13 Pro and iPhone 14 Pro models. The footage in some cases is showing a black screen with scan lines. Though, what’s more worrisome is the random content that is showing up for some users. While it’s not confirmed yet, these photos of families, children, and other private moments could potentially belong to other people’s iCloud libraries. If this is the case, then Apple could get in some serious trouble. Unfortunately, deleting the iCloud for Windows app seemingly doesn’t solve this, as the issues are being reflected on the server.”

No one is certain what is causing the bug, but Apple needs to get on the problem. Apple will probably blame the issue on PCs being inept devices and the compatibility between Macs and PCs could be the reason. Apple is not infallible and here is a lesson in humility.

Whitney Grace, December 16, 2022

DarkCyber for April 6, 2021, Now Available

April 6, 2021

DarkCyber is a twice-a-month video news program about the Dark Web, cyber crime, and lesser known Internet services. You can view the program at this link.

This program covers five stories:

  1. Banjo, founded by a controversial figure, has been given an overhaul. There’s new management and a new name. The challenge? Turn the off tune Banjo into a sweet revenue song.
  2. The Dark Web is not a hot bed of innovation. In fact, it’s stagnant, and law enforcement has figured out its technology and is pursuing persons of interest. A “new” Dark Web-like datasphere is now emerging. Robust encrypted messaging apps allow bad actors to make deals, pay for goods and services, and locate fellow travelers more easily and quickly than ever before.
  3. User tracking is a generator of high value information. Some believe that user tracking is benign or nothing about which to worry. That’s not exactly the situation when third-party and primary data are gathered, cross-correlated, and analyzed. Finding an insider who can be compromised has never been easier.
  4. New cyber crime reports are flowing in the aftermath of the Solarwinds’ and Microsoft Exchange Server fiascos. What’s interesting that two of these reports reveal information which provides useful insight into what the bad actors did to compromise thousands of systems.
  5. The final story reports about the world’s first drone which makes it possible for law enforcement and intelligence operatives to conduct a video conference with a bad actor near the drone. The innovative device can also smash through tempered glass to gather information about persons of interest.

DarkCyber is produced by Stephen E Arnold. The program is a production of Beyond Search and Arnold Information Technology. Mr. Arnold is the author of CyberOSINT and The Dark Web Notebook. He will be lecturing at the 2021 National Cyber Crime Conference.

Kenny Toth, April 6, 2021

30 Content Filters Illustrated

January 30, 2017

Short honk. I came across an illustration of how content filtering works. The popular name for this function is “filter bubble.”

image

Source: “The Filter Bubble.”

The idea is that smart online systems note what a user does online and shapes the information presented to that user. The procedures is described by various names; for example, filtering, personalizing, shaping, tailoring, customizing, etc. Here’s the illustration that makes the process clear. I found the image in “The Filter Bubble.” Kudos to whoever crafted the diagram.

Stephen E Arnold, January 30, 2017

Another Day Another Possible Data Breach

August 19, 2016

Has the next Ashley Madison incident happened? International Business Times reports on breached information that has surfaced on the Dark Web. The article, Fling.com breach: Passwords and sexual preferences of 40 million users up for sale on dark web, sheds some light on what happened in the alleged 40 million records posted on the The Real Deal marketplace. One source claims the leaked data was old information. Another source reports a victim who says they never had an account with Fling.com. The article states,

“The leak is the latest in a long line of dating websites being targeted by hackers and follows similar incidents at Ashley Madison, Mate1BeautifulPeople and Adult Friend Finder. In each of these cases, hundreds of thousands – if not millions – of sensitive records were compromised. While in the case of Ashley Madison alone, the release of information had severe consequences – including blackmail attempts, high-profile resignations, and even suicide. Despite claims the data is five years old, any users of Fling.com are now advised to change their passwords in order to stay safe from future account exploitation.”

Many are asking about the facts related to this data breach on the Dark Web — when it happened and if the records are accurate. We’re not sure if it’s true, but it is sensational. The interesting aspect of this story is in the terms of service for Fling.com. The article reveals Fling.com is released from any liability related to users’ information.

 

Megan Feil, August 19, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

There is a Louisville, Kentucky Hidden /Dark Web meet up on August 23, 2016.
Information is at this link: https://www.meetup.com/Louisville-Hidden-Dark-Web-Meetup/events/233019199/

 

Need a Mentor? See Here

August 3, 2016

Does your business need a mentor? How about any students or budding entrepreneurs you know? Such a guide can be invaluable, especially to a small business, but Google and Bing may not be the best places to pose that query. Business magazine Inc. has rounded up “Ten Top Platforms for Finding a Mentor in 22016.” Writer John Boitnott introduces the list:

“Many startup founders have learned that by working with a mentor, they enjoy a collaboration through which they can learn and grow. They usually also gain access to a much more experienced entrepreneur’s extensive network, which can help as they seek funding or gather resources. For students, mentors can provide the insight they need as they make decisions about their future. One of the biggest problems entrepreneurs and students have, however, is finding a good mentor when their professional networks are limited. Fortunately, technology has come up with an answer. Here are nine great platforms helping to connect mentors and mentees in 2016.”

Boitnott  lists the following mentor-discovery resources: Music platform Envelop offers workshops for performers and listeners. Mogul focuses on helping female entrepreneurs via a 27/7 advice hotline. From within classrooms, iCouldBe connects high-school students to potential mentors. Also for high-school students, iMentor is specifically active in low-income communities. MentorNet works to support STEM students through a community of dedicated mentors, while the free, U.K.-based Horse’s Mouth supports a loosely-organized platform where participants share ideas. Also free, Find a Mentor matches potential protégés with adult mentors. SCORE supplies tools like workshops and document templates for small businesses. Cloud-based MentorCity serves entrepreneurs, students, and nonprofits, and it maintains a free online registry where mentors can match their skill sets to the needs of inquiring minds.

Who knew so much professional guidance was out there, made possible by today’s technology, and much of it for free?  For more information on each entry, see the full article.

 

 

Cynthia Murrell, August 3, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

 

Individualized Facebook Search

November 27, 2015

Facebook search is a puzzle.  If you want to find a specific post that you remember seeing on a person’s profile, you cannot find it unless it is posted to their timeline.  It is a consistent headache, especially if you become obsessed with finding that post.  Mashable alerts us to a new Facebook pilot program, “Facebook May Soon Let You Search Individual Profile Pages.”  Facebook’s new pilot program allows users to search for posts within a profile.

The new search feature is only available to pilot program participants.  Based on how the feedback, Facebook will evaluate the search function and announce a potential release date.

“Facebook says it’s a small pilot program going around the U.S. for iPhone and desktop and that users have requested an easier way to search for posts within a person’s profile. The feature is limited in nature and only showing up for a select group of people who are part of the pilot program. The social network will be evaluating feedback based on the pilot. No plans for an official rollout have been announced at this time.?”

The search feature shows up on user profiles as a basic search box with the description “search this profile” with the standard magnifying glass graphic.  It is a simple addition to a profile’s dashboard and it does not take up much space, but it does present a powerful tool.

Facebook is a social media platform that has ingrained itself into the function of business intelligence to regular socialization. As we rely more on it for daily functions, information needs to be easy to recall and access.  The profile search feature will probably be a standard Facebook dashboard function by 2016.

Whitney Grace, November 27, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Search Experts Looking for Work? Rejoice

November 23, 2015

The article titled 17 Tools to Make LinkedIn Work for You on TNW provides some thoughtful commentary on how to make the best use of the social media platform LinkedIn. The article begins by emphasizing how important and relevant LinkedIn still is, particularly for people in Sales, who use the service to gather information and research prospects. It goes on to highlight the difficulty facing salespeople when it comes to searching LinkedIn, and the myriad of tools and Chrome extensions available to simplify search. The first on the list is Crystal,

“Language matters. How you communicate with someone, the words you use, how you structure your requests etc. affects their initial perception of you. And that’s what Crystal helps with. The standalone app as well as its Chrome extension allows you to profile Linkedin users profiles to detect their personality. And suggest the best ways to communicate with them. Crystal can tell you what to write in an email or how to create a message that engages them in a way they’d expect from you.”

Other resources include SalesLoft Prospector, which aids in building lists of targeted leads with contact information in tow, Elink.Club for LinkedIn, which visits 800 targeted profiles a day with the expectation that just under 10% of those users will, in turn, return the visit and become acquainted, and Discover.ly, which helps users establish mutual friends and social media commonalities with the profiles they view.

Chelsea Kerwin, November 23, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Beyond LinkedIn

October 26, 2015

Though LinkedIn remains the largest professional networking site, it may be time to augment its hobnobbing potential with one or more others. Search Engine Journal gives us many to choose from in “12 Professional Networking Alternatives to LinkedIn.” Like LinkedIn, some are free, but others offer special features for a fee. Some even focus on local connections. Reporter Albert Costill writes:

“While LinkedIn has proven to be an incredible assist for anyone looking to make professional connections or find employment, there have been some concerns. For starters, the company has been forced to reduce the number of emails it sends out because of complaints. There have also been allegations of the company hacking into member’s emails and a concern that activity on LinkedIn groups are declining.

“That doesn’t mean that you should give up on LinkedIn. Despite any concerns with the network, it still remains one of the best locations to network professionally. It just means that in addition to LinkedIn you should also start networking on other professional sites to cast that wide net that was previously mentioned. I previously shared eight alternatives to LinkedIn like Twylah, Opprtunity, PartnerUp, VisualCV, Meetup, Zerply, AngelList, and BranchOut, but here are twelve more networking sites that you should also consider using in no particular order.”

So between Costill’s lists, there are 20 sites to check out. A few notable entries from this second list: Makerbase is specifically for software creators, and is free to any Twitter users; LunchMeet connects LinkedIn users who would like to network over lunch; Plaxo automatically keeps your cloud-based contact list up-to-date; and the European Xing is the place to go for a job overseas. See the article for many more network-boosting options.

 

Cynthia Murrell, October 26,  2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Search Your Yahoo Mail? Yeah, Right

August 19, 2015

While Web site search used to be considered the worst before Google released a high-performing search widget, the title now officially goes to email search.  Nobody wants to search through their email to find a missing email and you are doomed if you even think about using a mail application such as Outlook or Apple Mail.   In part of its rebranding effort, Yahoo is taking measures to fix email search, says the New York Times in “Yahoo Tweaks Email To Make Search More Personal.”

Yahoo has been working for a year to improve email search and now Yahoo mail has implemented the changes.  It now offers auto complete and suggestions when a search term is typed into the query box.  It will also index attachments and links included in emails, so users do not have to find the actual email they were in.  The sorting options have also been updated and social media accounts can now be synced.

The changes are small and the auto complete/suggestions usually revert to basic keyword suggestions, but it is a step in the right direction.  Yahoo does not want to overhaul the mail system too quickly, because, as anyone knows, too many changes at once are upsetting to users.

“Instead, Yahoo is subtly making changes. Last month, for example, it added a small plus button to the bottom right of the window used to compose emails. If you click on that button, you can drag and drop photos and documents from your email archive, pull in an animated GIF from Yahoo’s Tumblr social network, or add the results of a web search.”

Yahoo made a good business choice and is working to improve its email and other applications.  It will be interesting to watch the changes unfold.

Whitney Grace, August 19, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

Facebook Number One Security Compromiser         

August 18, 2015

While Facebook is a good way for a company to engage with clients and even “humanize” the business, according to Zerofox’s article, “Cisco: Facebook Scams Are Attackers’ #1 Choice For Breaches” Facebook is the number way for a criminal to learn about organization and hack into its system.  Cisco conducted a 2015 Midyear Security Report that researches how cyber criminals are exploiting social media to their own advantage.

The article describes potential targets as easy and click-happy:

Facebook’s 1.49 billion monthly active users make it the world’s largest nation-state, used by 70% of American each day. It is, for better or worse, a nation without borders. Adversaries exploit the social media giant for its sheer size and trusted nature, making it the medium of choice for both inexperienced and sophisticated network hackers alike. For the adversary, the barriers to entry have never been lower, and the targets have never been more trusting and click-happy.”

Other security organizations confirm the findings and some of it comes from people simply being too trusting such as accepting friend requests from unfamiliar people.  McAfee discovered that employees became cybercrime victims on social media over other business applications.

While Facebook might be the number one platform to attract criminals.  Twitter is used to attack government organizations and other popular platforms are also dealing with loads of fake profiles.  It does not come as a surprise, considering Facebook is now the “Walt-Mart” of social media information.  What types of scams are people falling victim too?  Is it just stolen passwords and information or are they giving their personal information away?

Whitney Grace, August 18, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Next Page »

  • Archives

  • Recent Posts

  • Meta