Much like phishing and spear-phishing, VISHING is the latest online scam designed to steal your logins. Only VISHING uses voicemail to do it, according to the FBI and the Cyber Security Agency (CISA). They are targeted attacks on employees of corporations using voicemail to get users working at home to call back and then use social engineering to steal VPN credentials. Check out Brian Krebs' article here.
Looking at Internet of Things phenomenon, the Portland FBI issued a blog post talking about how connecting your computer to the same network as your internet-enabled refrigerator could pose a security risk. They advise changing the device password settings from the default, make them as long as possible and unique. Leo says that it's not practical to have a separate connection for your IoT devices. But regularly updating your devices and giving them a good password is a good idea.
In the wake of the Texas church shooting, the FBI and the DOJ have discovered that the shooter's iPhone was encrypted. Deputy Attorney General Rod Rosenstein says that "iPhone encryption costs lives."
Read the full story at arstechnica.com.
The FBI has arrested a Twitter troll who was uploading an animated GIF that would trigger epileptic seizures of those he didn't like. They were able to look into his account and show how he was bragging he would to do it. The charge is cyberstalking.
Leo says that the FBI paid more to uncrack a terrorist's iPhone than director James Comey will make in his career as director. And that's your tax payer dollars. What they ended up doing is buying a "zero day exploit" from a group of hackers in Israel.
The FBI has figured out how to crack into the phone of the San Bernardino terrorist, and is now offering its assistance to law enforcement across the country in unlocking iPhones. The FBI has no plans to disclose the vulnerability to Apple, either.
Read more at Buzzfeed.com
Robert wants to know why the FBI just doesn't talk to the NSA about the data they want on the terrorist's phone. In reality, Apple's position is that the metadata from the carrier itself tells a lot of detail. But there may be a legal wall that would prohibit them from cooperating. The NSA just announced that they are helping, though. So that leads Leo to believe that there's another goal here. Their goal is to get the keys to the kingdom and force Apple to give them a backdoor to their phones.
Apple is putting up a spirited defense of encryption and privacy, going to court against the FBI, who wants them to build a way to crack open an iPhone 5c used by a terrorist in San Bernadino. The irony is, that the government owns the phone but they changed the password. Now it can get wiped out after 10 tries. Leo has always said it's all a side show. We live in a surveillance economy. Apple surveils us by our data, and the FBI surveils us by the same thing. Why are they going to court over this one phone? It's the keys to the kingdom.
Apple has filed its response to the Department of Justice on the FBI's demand to unlock the San Bernardino shooter's iPhone. Nilay Patel, a professional attorney and founder of The Verge, says Apple's response is more of a PR response than a legal one. Normally you'd give the strongest argument first and then give additional arguments, but Apple started with the easiest-to-understand argument first. Among the arguments Apple used is a free speech defense.
Michael says that the longer Apple can appeal and resist the court order, the better it looks for Apple. Leo says yes and no, because we now know that Apple's encryption isn't one way and that they can open any phone if they choose to give in to the FBI's demands. Leo suspects that Apple will eventually give in and when they do, there are encryption programs in 70 different nations that are uncrackable.