Cisco ‘Knowingly’ Sold Hackable Video Surveillance System to U.S. Government

The Hacker News

Cisco ‘Knowingly’ Sold Hackable Video Surveillance System to U.S. Government | #TpromoCom #Hacker #VideoSurveillance #Legal | Cisco Systems has agreed to pay $8.6 million to settle a lawsuit that accused the company of knowingly selling video surveillance system containing severe security vulnerabilities to the U.S. federal and state government agencies.

image of nypd CI officer at row of monitors

The lawsuit began eight years ago, in the year 2011, when Cisco subcontractor turned whistleblower, James Glenn, accused Cisco of continue selling a video surveillance technology to federal agencies even after knowing that the software was vulnerable to multiple security flaws.

According to the court documents seen by The Hacker News, Glenn and one of his colleagues discovered multiple vulnerabilities in Cisco Video Surveillance Manager (VSM) suite in September 2008 and tried to report them to the company in October 2008. (click here)

Allan B. Colombo, Tech Writer
Allan B. Colombo, Tech Writer
Editor’s Note: For many years, I sought to warn security dealers of the risks of using specific brands recently named by the U.S. Government as being off limits to all federal applications. At the time, as the administrator with the CCTV Security Technicians Forum on Facebook, many members suggested that this only pertains to government use, which is correct, so they were going to continue selling those specific brands. My message to all dealers now as it was then, is that in the end analysis, if a CCTV system you sold and installed is hacked, and you knowingly sold it to the client, you could possibly be susceptible to legal action on the part of the client. –Al Colombo

Human Investigation Management – ISIO
Human Investigation Management – ISIO. Find out more by clicking!
Please follow and like us:
error

Tips to avoid card skimmers at gas stations

Tips to avoid card skimmers at gas stations | #TpromoCom #Skimmer #Fraud #Money | Skimmers on card readers at gas station pumps seem to be becoming more commonplace.

According to the Federal Trade Commission, “skimmers are illegal card readers attached to payment terminals. These card readers grab data off a credit or debit card’s magnetic stripe without your knowledge. Criminals sell the stolen data or use it to buy things online. You won’t know your information has been stolen until you get your statement or an overdraft notice.”

To read the remainder of this article, click here.

Editor’s Note: We’ve featured gas skimming news articles on Security eNews in the past. Here are a list of those articles with links to the pages where they appear on this Website. –Al Colombo

  • Two Nabbed Using Credit Card Skimmer To Steal Bank Info, Shelton Police Say | #TpromoCom #CreditCard #ATM #Bank | Jordy Diggins, 28, of Mount Vernon, and Jahquane Rennix, 19, of Queens, and were arrested by Shelton Police on Wednesday, April 10, following an investigation into complaints from residents that their bank accounts had been comprised, said Shelton Police Det. Richard Bango. (click here)
  • Skimmer found on Broadview Heights ATM; PHOTOS | #TpromoCom #Skimmer #ATM #Bank #Security | Have you ever seen a “skimmer” in place at an ATM? If you said no, don’t feel alone, I haven’t either. In this news article, however, you will find out some ways in which to spot this ploy at stealing your money. In fact, we’re featuring a number of videos below to help assure that you do not become a victim of this kind of crime. (click here)
  • FBI warns drivers about card skimmers at the gas pump | #TpromoCom #FBI#Scam #Fraud #Keypad | The FBI and Secret Service want drivers to pay attention when swiping their cards. A warning has been issued about those card skimmers that can be placed on card readers at the gas pumps. The scam is costing people thousands of dollars. Right now, agents are out working to locate and recover the devices in 21 states and the effort comes at a particularly busy time. (click here)
  • How To Spot And Avoid Card Skimmers At The Gas Pump | #TpromoCom #creditcard #credit #scam | See how to spot credit card skimmers and learn simple steps you can take to avoid becoming a victim. (click here)
Human Investigation Management – ISIO
Human Investigation Management – ISIO. Find out more by clicking!
Please follow and like us:
error

Firefox Releases Critical Patch Update to Stop Ongoing Zero-Day Attacks

Firefox Releases Critical Patch Update to Stop Ongoing Zero-Day Attacks | #TpromoCom #Browser #Patch #Hackers | If you use the Firefox web browser, you need to update it right now.
Mozilla earlier today released Firefox 67.0.3 and Firefox ESR 60.7.1 versions to patch a critical zero-day vulnerability in the browsing software that hackers have been found exploiting in the wild.

Discovered and reported by Samuel Groß, a cybersecurity researcher at Google Project Zero, the vulnerability could allow attackers to remotely execute arbitrary code on machines running vulnerable Firefox versions and take full control of them.

Want to know more?

To read the remainder of this news article, click here.

Human Investigation Management – ISIO
Human Investigation Management – ISIO.
Find out more by clicking!
Please follow and like us:
error

FBI Warns of Dangers in ‘Safe’ Websites

Dark Reading cybersecurity news website

FBI Warns of Dangers in ‘Safe’ Websites | #TpromoCom #FBI #CyberSecurity #Cyber | Criminals are using TLS certificates to convince users that fraudulent sites are worthy of their trust.

One of the most common mechanisms used to secure web browser sessions — and to assure consumers that their transactions are secure — is also being used by criminals looking to gain victims’ trust in phishing campaigns. The FBI has issued a public service announcement defining the problem and urging individuals to go beyond simply trusting any “https” URL.

Browser publishers and website owners have waged successful campaigns to convince consumers to look for lock icons and the “https:” prefix as indicators that a website is encrypted and, therefore, secure. The problem, according to the FBI and security experts, is that many individuals incorrectly assume that an encrypted site is secure from every sort of security issue.

To read the remainder of this news article, click here.

Please follow and like us:
error

An Outdoor Video Surveillance System that Thinks and Acts Like a Human

An Outdoor Video Surveillance System that Thinks and Acts Like a Human | #Memoreyes #TpromoCom #VideoSurveillance #AI | I’d like to tell you about a new, revolutionary outdoor CCTV product that is like none other. I use the word “revolutionary” because it is just that. It leverages the use of quality Megapixel/HD quality, pan-tilt-zoom cameras with machine learning and an entirely newly developed series of audio, thermal, and radar-oriented sensors. Add to that an AI (Artificial Intelligence)-based learning control platform and you have an almost human-like control system with Big Data analysis. http://bit.ly/2KKKhEc

The focus of this new tech is outdoor protection. It uses thermal, sound, and radar to focus in on moving targets, along with a Smartphone app that stakeholders can use to alert the system when there’s a potential problem of an immediate nature. Cameras automatically  follow targets, which is not entirely new, but that’s just the beginning of the story.

The uniquely developed sensors allow the system to hear, see, and detect what the camera cannot see using a variety of unique sensors that truly makes this system revolutionary. Interaction between this interactive, integrated video surveillance system and stakeholders is audio/visual in nature, further deterring would-be assailants. 

Currently the system operates using a unique machine learning system, but an AI (Artificial Intelligence) processing system is now in the works and will soon be incorporated, giving the system the ability to react with even more speed and intelligence. Through Big Data analysis, over time the system will learn the habits and trends associated with each camera within each specific setting, thus enabling the system to  quickly identify departures from the norm. There’s more. 

I’d like to propose a complementary story on the tech with a short interview with the developer, who happens to be John Collings, the former inventor and developer of Uplink. A sidebar will delve into the advancements in AI and how they will be leveraged to make this new technology a must-have for office complexes, shopping malls, multiple-tenant housing, industrial complexes, chain stores, etc. 

Email us for more information: click here!

TpromoCom [image]
Need help with a new website, blog, or social media outreach program? Call TpromoCom at 330-956-9003 for help.

Please follow and like us:
error

The Hotel Hijackers White Paper

The Hotel Hijackers White Paper | #TpromoCom #Hotel #Hacker #CyberSecurity | From booking a room to the payments made at shops and restaurants, hotel chains have complex networks that save enormous amounts of sensitive and private data, just waiting to be compromised.

This makes the hospitality industry one of the main targets for cybercriminal activity.

Download our whitepaper, The Hotel Hijackers, to understand:

  • Why hotel networks became a target of cybercriminals,
  • A history of attacks on the industry
  • How these types of attacks can be avoided

Download Now

TpromoCom [image]
Need help with a new website, blog, or social media outreach program? Call TpromoCom at 330-956-9003 for help.
Please follow and like us:
error

Nine Charged in SIM Hijacking Scheme

SecurityWeek news and information

Nine Charged in SIM #Hijacking Scheme | #TpromoCom #DOJ #Hacker #Hackers | The United States has indicted nine individuals with online identity theft and related charges, the U.S. Department of Justice announced.

Six of the individuals were charged with wire fraud in connection to the hacking group “The Community,” while three former employees of mobile phone providers were charged with wire fraud in relation to the conspiracy.

Charges were brought against Conor Freeman, 20, of Dublin, Ireland; Ricky Handschumacher, 25 of Pasco County, Florida; Colton Jurisic, 20 of, Dubuque, Iowa; Reyad Gafar Abbas, 19, of Rochester, New York; Garrett Endicott, 21, of Warrensburg, Missouri; Ryan Stevenson, 26, of West Haven, Connecticut; Jarratt White, 22 of Tucson, Arizona; Robert Jack, 22 of Tucson, Arizona; and Fendley Joseph, 28, of Murrietta, California.

The defendants are alleged members of “The Community,” a hacking group focused on stealing victims’ identities to perform cryptocurrency theft via “SIM Hijacking.”

To read the remainder of this news article, click here.

Human Investigation Management – ISIO
Human Investigation Management – ISIO
Please follow and like us:
error

New Class of Vulnerabilities Leak Data From Intel Chips

SecurityWeek news and information

New Class of Vulnerabilities Leak #Data From Intel Chips | #TpromoCom #CyberSecurity #Information | Millions of computers powered by Intel processors are affected by vulnerabilities that can be exploited by malicious actors to obtain potentially sensitive information. Intel and other tech giants have already released patches and mitigations.

image

The side-channel attack methods, named ZombieLoad, RIDL (Rogue In-Flight Data Load), and Fallout, are similar to the notorious Meltdown and Spectre, which researchers first disclosed in January 2018. At the time, experts accurately predicted that other similar speculative execution attacks would be discovered.

The attack methods work against both PCs and cloud environments, and they can be launched against most Intel CPUs made in the past decade. The techniques can be used to get applications, the operating system, virtual machines and trusted execution environments to leak information, including passwords, website content, disk encryption keys and browser history.

To read the remainder of this news article, click here.

Human Investigation Management – ISIO
Human Investigation Management – ISIO
Please follow and like us:
error