Researchers inject malware into DNA to hack a computer


Hackers have used all sorts of attack vectors to gain control of someone else’s computer, from USB drives to phishy emails. Now, researchers from the University of Washington predict that we might one day see viruses infect systems through DNA. It’s a far-fetched case, but still worth thinking about. The group of scientists who are looking into this at the Paul G. Allen School of Computer Science & Engineering explain in its paper that it’s possible to bake malware into a genetic molecule and have it infect a system that’s used to analyze it. This method could be…
The Next Web

How you can growth hack your way to traveling the world for cheap


What do cheap airfare and startup founders have in common? Surprisingly, more than you might think. The characteristics that make for successful entrepreneurs – perseverance, confidence, and creativity, for instance – can be useful in multiple aspects of life. Being charismatic is helpful when negotiating with a car salesman, having creativity can help you plan your child’s wedding, and overcoming obstacles can help you ace that final paper for school. The “soft skills” associated with any successful businessperson are applicable in daily – even mund…
The Next Web

Police Use 3D Printing to Unlock Victim’s Phone

Michigan police have merged 3D printing with forensic science. Police in that state found a murder victim’s phone which held much of the evidence surrounding the murder. There was only one problem – the victim’s phone was set up to unlock only upon scanning the owner’s fingerprint, meaning police couldn’t unlock the device. Police approached Michigan State Computer Engineering professor and fingerprint scanning specialist, Dr. Anil Jain to help them find a way to use the victim’s fingerprints to unlock the Samsung Galaxy S6. In addition to fingerprint scanning, Dr. Jain also studies tattoo matching and facial recognition, but had never undertaken such an onerous task. Police provided Dr. Jain and his grad student, Sunpreet Arora with images of the victim’s fingerprints which were on file with the police, since the victim was previously known to the authorities.

How 3D Printing Can Be Used to Hack a Phone

Jain and Arora were able to create digital replicas of the prints and create 3D printed models of the digital versions of the prints. Jain and Arora then coated the 3D prints in Micron Level Coating in order to mimic the electrical conductivity of human skin. When a person dies and blood flow stops, the skin loses its electrical properties. It is your skin’s electrical properties that allow you to unlock your phone by dragging your finger and across the screen, and why police couldn’t simply drag the victim’s finger across the phone to unlock it.

Once armed with Dr. Jain’s 3D micron coated fingerprints, they were able to unlock the victim’s phone and access the evidence hidden within. A skilled hacker with access to a 3D printer, a photo of a phone user’s fingerprints, and Micron Level Coating or something similar would, in theory, be able to use this same method to hack into a phone.

What Technology Users Should Know

Jain told news outlets that instead of hacking phones, he usually spends his time researching ways in which hackers can use biometric and cheap personal 3D printers to break into smartphones. Dr. Jain has been working in the biometrics field for a quarter of a century and uses 3D printing techniques and experimental biometrics to research ways to allow technology users to keep their devices safe and their privacy intact. Jain has even posted a video to YouTube demonstrating to smartphone users how easy it is for hackers to use a 2D version of a fingerprint to break into a phone.

Jain says that once smartphone producers are armed with this knowledge, it is their responsibility to come up with new ways to keep their products secure. Dr. Jain and his team’s breakthrough work in forensic biometrics helped to solve a crime that otherwise might have gone unsolved. This work also serves as a lesson to all of us to keep our devices safe. With hackers always coming up with new ways to use cutting edge science to invade your privacy, it is up to people like Dr. Anil Jain to stay one step ahead.

 

News: Senator reveals FBI paid $900K to hack San Bernardino iPhone

Apple


During last week’s questioning of FBI Director James Comey, California Senator Dianne Feinstein inadvertently revealed the amount the agency paid to hack into a terrorist’s iPhone, The Associated Press reports. The FBI has been resisting press requests to release the amount paid and the name of the vendor who broke into Syed Rizwan Farook’s iPhone 5c, but Feinstein disclosed the $ 900,000 payment in the process of questioning Comey… …
iLounge | All Things iPod, iPhone, iPad and Beyond

Data Backbone Vulnerabilities Used To Hack Bank Accounts

Android

Vulnerabilities in the SS7 signaling protocol, which serves as the backbone of our mobile communications networks, can be used to retrieve sensitive information without the user’s knowledge, which may even result to bank account hacking. For the unfamiliar, the SS7 signaling protocol allows mobile networks around the world to send text messages to subscribers of other carriers. Using just the person’s phone number, hackers can take advantage of the weaknesses of the SS7 signaling protocol to record phone calls, read text messages and identify the user’s location. These records, along with other sensitive information, can then be used for numerous purposes, from spying on…
AndroidHeadlines.com |