5-10 page white-paper on a Security topic +7-10 pages + original - 87577

Solution Posted by
Goodlife
Solution Detail
Price: $25.00
Request Description
Hijack a Webcam Every home computer has a webcam these days - from home PCs, laptops and even televisions. And now, clever hackers have developed ways to use that technology to see into our homes. According to experts, webcam hacking is much more sophisticated than normal hacking, despite not being as common. Andy Walker, tech expert and author from cyberwalker.com says that “because things are so simple to use, we have been lulled into a false sense of security.” “These days, hackers can get in and switch off the webcam's activity light, so that there is no visual trace of them activating the camera.” While the event of this is unlikely, there are a few simple things you can do to protect yourself. Video streams of webcams in tens of thousands of private homes and businesses around the world to show how easy it is to intercept them if the owner doesn’t change the manufacturer’s default user name and password.............................. Pinpoint a person location with cell phone Turns out you don't even need a GPS to track a mobile phone user's whereabouts and glean her movements and interactions: Researchers have discovered a way to use information from the GSM mobile infrastructure to track down someone and even listen in on her voicemail messages and calls. Don Bailey, security consultant with iSec Partners, and independent researcher Nick DePetrillo demonstrated how they were able to use a combination of available GSM data plus their own handmade tools to glean someone's cell phone number, pinpoint where she was located physically, and determine what she was doing, as well as gather intelligence about her relationships -- business or otherwise. ."The researchers gathered information from the GSM network infrastructure itself: "We're using information we can gather from the GSM network to infer your location. And we've taken GSM geolocation a few steps forward, combined with some tools we developed," DePetrillo says. "This is new and novel and really, really scary."......................................................... Read a person email But while Microsoft is certainly having a bad week, the problem is much bigger than any single company. For the vast majority of people, our email system is based on third-party access, whether it's Microsoft, Google, Apple or whoever else you decide to trust. Our data is held on their servers, routed by their protocols, and they hold the keys to any encryption that protects it. The deal works because they're providing important services, paying our server bills, and for the most part, we trust them. But this week's Microsoft news has chipped away at that trust, and for many, it's made us realize just how frightening the system is without it. What’s worse, the current laws won’t do anything to stop them. For standard law enforcement, it takes a warrant to read a person's email — but there's no such restriction on hosting providers. Peeking into your clients' inbox is bad form, but it's perfectly legal. Even if the rights weren't reserved in the terms of service, it's not clear there are even grounds for a lawsuit. Without stronger privacy laws, all companies have to worry about is bad PR................................................................ Following someone’s movements Privacy researchers Kevin S. Bankston and Ashkan Soltani examined how much the various methods of tracking people cost, from old fashioned tailing right down to the difference between monitoring the movements of a Verizon or Sprint cellphone customer. “If technical and financial barriers previously provided some protection from large-scale surveillance by the government, these implicit protections have been essentially eliminated by the low costs of new surveillance technology,” The duo’s findings were startling, but not necessarily surprising: If agents want to track your covertly by car, that’s going to cost about $275 an hour. If they want to track you by foot, that’s $50 an hour. If they want to track you via your cell phone? A little more than $5 an hour................................................ Security and Cognitive Bias Security practices aim to ensure that only good things happen in systems. The result is attempting to prevent bad events from happening. The resulting security systems are often complex and often result in a tradeoff that impairs the ability of the system to function. Sometimes systems become so complex that they no longer meet the user’s needs and can result in being easily broken due to having to write down a complex password on a piece of paper which can easily be found by an unauthorized user. Security practitioners have spent the past years building more complex systems, Security and Cognitive Bias Security practices aim to ensure that only good things happen in systems. The result is attempting to prevent bad events from happening. The resulting security systems are often complex and often result in a trade off that impairs the ability of the system to function. Sometimes systems become so complex that they no longer meet the user’s needs and can result in being easily broken due to having to write down a complex password on a piece of paper which can easily be found by an unauthorized user. Security practitioners have spent the past years building more complex systems, while psychologists have spent those years studying how human minds work. These two fields can work.................................
Solution Description

                                                                    Hijack a Webcam

Every home computer has a webcam these days - from home PCs, laptops and even televisions. And now, clever hackers have developed ways to use that technology to see into our homes.
According to experts, webcam hacking is much more sophisticated than normal hacking, despite not being as common. Andy Walker, tech expert and author from cyberwalker.com says that “because things are so simple to use, we have been lulled into a false sense of security.”
“These days, hackers can get in and switch off the webcam's activity light, so that there is no visual trace of them activating the camera.”
While the event of this is unlikely, there are a few simple things you can do to protect yourself.
Video streams of webcams in tens of thousands of private homes and businesses around the world to show how easy it is to intercept them if the owner doesn’t change the manufacturer’s default user name and password..............................

                           

Attachments
5-10_page_white-paper_on_a_Security_topic_+7-10_pages_+_original.docx
5-10_page_white...