{"id":22800,"date":"2015-10-07T12:46:46","date_gmt":"2015-10-07T01:46:46","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=22800"},"modified":"2015-10-07T12:46:46","modified_gmt":"2015-10-07T01:46:46","slug":"cyber-wrap-92","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-92\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"

\"T-Mobile\"<\/a><\/p>\n

Researchers in Singapore have demonstrated<\/a> how hackers can use a smartphone mounted on a drone to steal data intended for wireless printers. The technology detects an insecure printer and intercepts documents by establishing a fake access point that mimics the printer, tricking the computer into sending potentially sensitive data straight to the hacker\u2019s device. Thankfully, this research springs from benevolent motivations and the \u2018Cybersecurity Patrol<\/a>\u2019 app that has been produced is a cost-effective way to scan office spaces and alert corporations to any insecure printers. However, it\u2019s a good reminder for companies to address a vulnerability that\u2019s frequently overlooked. Watch a video exhibiting both the malicious and beneficial uses of this technology here<\/a>.<\/p>\n

Speaking of hackers, Russian hacker Dimitry Belorossov has been sentenced<\/a> to four and a half years in prison for distributing and operating part of the infamous \u2018Citadel\u2019 botnet. Also known as \u2018Rainerfox\u2019, Belorossov used the banking Trojan to infect and remotely control<\/a> more than 7,000 computers of unsuspecting individuals and financial institutions. The US Department of Justice estimates<\/a> that Citadel reached over 11 million computers worldwide and resulted in more than US$500 million in losses. The 22 year old was sentenced this week after being arrested in Spain in 2013 and pleading guilty to conspiracy to commit computer fraud last year.<\/p>\n

In Washington DC, Ari Schwartz this week stepped down<\/a> as Senior Director for Cybersecurity on the National Security Council. Schwartz joined the White House in 2013 as Director for Cybersecurity Privacy, Civil Liberties and Policy, has been a vocal advocate of information sharing and became a trusted advisor to the Obama administration. The administration has a successor in mind<\/a> so watch this space for an announcement.<\/p>\n

A ruling from the European Court of Justice is pending on the future of \u2018Safe Harbour\u2019, an agreement that enables the transfer of customer data from the EU to the US. Since 2000, Safe Harbour has allowed US companies to self-certify<\/a> that they fulfil EU data security standards and today is used by some of the world\u2019s biggest technology groups including Facebook and Amazon. Concerns over the US\u2019 laissez-faire approach<\/a> to privacy, exemplified by recent NSA whistle-blower Edward Snowden, have elevated the sustainability of this agreement to the highest court in the EU. The ruling could give national data protection authorities the power to challenge data transfers or even void the agreement altogether. Those outcomes would have massive implications<\/a> for international technology companies, and some fear it may contribute to the widening cyber policy gap across the Atlantic.<\/p>\n

The personal details of roughly 15 million T-Mobile customers have been compromised in a massive data breach<\/a> this week. Names, addresses, birthdates, encrypted social security numbers, drivers\u2019 license and passport numbers have been stolen from Experian, a vendor T-Mobile uses<\/a> to process its customer credit applications. Fortunately the compromised data contained no credit card or banking information, however the details could be used to commit identity theft. CEO John Legere has said<\/a> he will undertake a \u2018thorough review\u2019 of T-Mobile\u2019s relationship with Experian and is offering affected customers two years of free credit monitoring.<\/p>\n

Ironically for T-Mobile, the first week of October marked the beginning of America\u2019s National Cybersecurity Awareness Month<\/a>. President Obama designated the tenth month of every year as a time to \u2018engage and educate public and private sector partners\u2019 of the importance of cybersecurity. Sponsored by the Department of Homeland Security, this month-long awareness campaign promotes cybersecurity as a \u2018shared responsibility\u2019. Stay tuned<\/a> for related events, speeches and weekly themes.<\/p>\n","protected":false},"excerpt":{"rendered":"

Researchers in Singapore have demonstrated how hackers can use a smartphone mounted on a drone to steal data intended for wireless printers. The technology detects an insecure printer and intercepts documents by establishing a fake …<\/p>\n","protected":false},"author":390,"featured_media":22801,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[176,391,95,713,402,728],"class_list":["post-22800","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-barack-obama","tag-cyber","tag-cyber-security","tag-cyberattack","tag-drones","tag-hacking"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-92\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"Researchers in Singapore have demonstrated how hackers can use a smartphone mounted on a drone to steal data intended for wireless printers. The technology detects an insecure printer and intercepts documents by establishing a fake ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-92\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2015-10-07T01:46:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/10\/13907306243_5d115489b1_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"424\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Zoe Hawkins\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Zoe Hawkins\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-92\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/10\/13907306243_5d115489b1_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/10\/13907306243_5d115489b1_z.jpg\",\"width\":640,\"height\":424,\"caption\":\"T-Mobile\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-92\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-92\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-92\/#primaryimage\"},\"datePublished\":\"2015-10-07T01:46:46+00:00\",\"dateModified\":\"2015-10-07T01:46:46+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-92\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-92\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-92\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701\",\"name\":\"Zoe Hawkins\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g\",\"caption\":\"Zoe Hawkins\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/zoe-hawkins\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-92\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"Researchers in Singapore have demonstrated how hackers can use a smartphone mounted on a drone to steal data intended for wireless printers. The technology detects an insecure printer and intercepts documents by establishing a fake ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-92\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2015-10-07T01:46:46+00:00","og_image":[{"width":640,"height":424,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/10\/13907306243_5d115489b1_z.jpg","type":"image\/jpeg"}],"author":"Zoe Hawkins","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Zoe Hawkins","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-92\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/10\/13907306243_5d115489b1_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2015\/10\/13907306243_5d115489b1_z.jpg","width":640,"height":424,"caption":"T-Mobile"},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-92\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-92\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-92\/#primaryimage"},"datePublished":"2015-10-07T01:46:46+00:00","dateModified":"2015-10-07T01:46:46+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-92\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-92\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-92\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701","name":"Zoe Hawkins","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g","caption":"Zoe Hawkins"},"url":"https:\/\/www.aspistrategist.ru\/author\/zoe-hawkins\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/22800"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/390"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=22800"}],"version-history":[{"count":2,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/22800\/revisions"}],"predecessor-version":[{"id":22803,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/22800\/revisions\/22803"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/22801"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=22800"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=22800"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=22800"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}