Annonce

Log ud Log ind
Log ud Log ind
Finans

Q&A: Hvordan kan jeg stoppe mit TV udspionerer mig?

Morten W. Langer

onsdag 08. marts 2017 kl. 9:43

Fra Zerohedge:

Following today’s publication, by WikiLeaks, of documents exposing the CIA’s secret hacking program – describing tools that can turn a world of increasingly networked, camera- and microphone-equipped devices into eavesdroppers, AP’s Frank Bajak answers the public’s biggest questions. Bajak warns consumers, there’s “not much you can do if you don’t want to sacrifice the benefits of the device,” but offers a silver-lining of sorts for the average joe, the “tools that appear to be targeted at specific people’s (devices).. and many intrusion tools are for delivery via ‘removable device’.”

Smart televisions and automobiles now have on-board computers and microphones, joining the ubiquitous smartphones, laptops and tablets that have had microphones and cameras as standard equipment for a decade. That the CIA has created tools to turn them into listening posts surprises no one in the security community.

Q: HOW WORRIED SHOULD CONSUMERS BE?

A: The intrusion tools highlighted by the leak do not appear to be instruments of mass surveillance. So, it’s not as if everyone’s TV or high-tech vehicle is at risk.

“It’s unsurprising, and also somewhat reassuring, that these are tools that appear to be targeted at specific people’s (devices) by compromising the software on them — as opposed to tools that decrypt the encrypted traffic over the internet,” said Matt Blaze, a University of Pennsylvania computer scientist.

The exploits appear to emphasize targeted attacks, such as collecting keystrokes or silently activating a Samsung TV’s microphone while the set is turned off. In fact, many of the intrusion tools described in the documents are for delivery via “removable device.”

Q: WHAT CAN BE DONE TO PREVENT A COMPROMISED INTERNET-CONNECTED DEVICE FROM COMMUNICATING WITH SPIES?

A: Not much if you don’t want to sacrifice the benefits of the device.

“Anything that is voice-activated or that has voice- and internet-connected functionality is susceptible to these types of attacks,” said Robert M. Lee, a former U.S. cyberwar operations officer and CEO of the cybersecurity company Dragos.

That includes smart TVs and voice-controlled information devices like the Amazon Echo, which can read news, play music, close the garage door and turn up the thermostat. An Amazon Echo was enlisted as a potential witness in an Arkansas murder case.

To ensure a connected device can’t spy on you, unplug it from the grid and the internet and remove the batteries, if that’s possible. Or perhaps don’t buy it, especially if you don’t especially require the networked features and the manufacturer hasn’t proven careful on security.

Security experts have found flaws in devices — like WiFi-enabled dolls — with embedded microphones and cameras.

Q: I USE WHATSAPP AND SIGNAL FOR VOICE AND TEXT COMMUNICATION BECAUSE OF THEIR STRONG ENCRYPTION. CAN THE EXPLOITS DESCRIBED IN THE WIKILEAKS DOCUMENTS BREAK THEM?

A: No. But exploits designed to infiltrate the operating system on your Android smartphone, iPhone, iPad or Windows-based computer can read your messages or listen in on conversations on the compromised device itself, though communications are encrypted in transit.

“The bad news is that platform exploits are very powerful,” Blaze tweeted. “The good news is that they have to target you in order to read your messages.”

He and other experts say reliably defending against a state-level adversary is all but impossible. And the CIA was planting microphones long before we became networked.

Q: I’M NOT A HIGH-VALUE TARGET. BUT I STILL WANT TO PROTECT MYSELF. HOW?

A: It may sound boring, but it’s vital: Keep all your operating systems patched and up-to-date, and don’t click links or open email attachments unless you are sure they are safe.

There will always be exploits of which antivirus companies are not aware until it’s too late. These are known as zero-day exploits because no patches are available and victims have zero time to prepare. The CIA, National Security Agency and plenty of other intelligence agencies purchase and develop them.

But they don’t come cheap. And most of us are hardly worth it.

Source: AP

Tilmeld dig vores gratis nyhedsbrev
ØU Top100 Finansvirksomhed

Få de vigtigste om bank, realkredit, forsikring, pension
Udkommer hver mandag.

Jeg giver samtykke til, at I sender mig mails med de seneste historier fra Økonomisk Ugebrev. Lejlighedsvis må I gerne sende mig gode tilbud og information om events. Samtidig accepterer jeg ØU’s Privatlivspolitik.

Du kan til enhver tid afmelde dig med et enkelt klik.

[postviewcount]

Jobannoncer

CEO for Rejsekort & Rejseplan A/S
Region H
Udløber snart
Controller/økonomimedarbejder – få den brede vifte af økonomiopgaver
Region H
Finance/Business Controller til Anzet A/S
Region Sjælland
Liftra ApS i Aalborg søger en Finance Controller med ”speciale” i Transfer Pricing
Region Nordjylland

Mere fra ØU Finans

Log ind

Har du ikke allerede en bruger? Opret dig her.

FÅ VORES STORE NYTÅRSUDGAVE AF FORMUE

Her er de 10 bedste aktier i 2022

Tilbuddet udløber om:
dage
timer
min.
sek.

Analyse af og prognoser for Fixed Income (statsrenter og realkreditrenter)

Direkte adgang til opdaterede analyser fra toneangivende finanshuse:

Goldman Sachs

Fidelity

Danske Bank

Morgan Stanley

ABN Amro

Jyske Bank

UBS

SEB

Natixis

Handelsbanken

Merril Lynch 

Direkte adgang til realkreditinstitutternes renteprognoser:

Nykredit

Realkredit Danmark

Nordea

Analyse og prognoser for kort rente, samt for centralbankernes politikker

Links:

RBC

Capital Economics

Yardeni – Central Bank Balance Sheet 

Investing.com: FED Watch Monitor Tool

Nordea

Scotiabank