Search Results for “Rob Price”


May 27, 2020
Stephen Warwick / iMore

Stephen Warwick / iMore  
Pablo Escobar’s Brother Sues Apple for $2.6 Billion, Says He Was Hacked Due to Lax Security on His iPhone

Pablo Escobar’s brother, Roberto, is suing Apple for $2.6 billion over claims his address was compromised because of poor iPhone security. Roberto says his life was threatened because of lax security protocols on his phone and claims he got a “life-threatening letter” from someone called Diego. Diego said he hacked Roberto’s phone via FaceTime. Roberto said that his investigation found his iPhone had been compromised due to a FaceTime vulnerability. To spite Apple, Roberto has also published a website called ripapple.com, where he is selling 24K Gold iPhone 11 Pro models for the astonishing cut price of $499.

March 14, 2017
Gregg Keizer / Computerworld

Gregg Keizer / Computerworld  
DoJ Fights to Keep San Bernardino iPhone Cracking Method, Vendor, Price Secret

In a legal filing that responds to a Freedom of Information Act request filed by Associated Press, USA Today and Vice Media, the U.S. Department of Justice (DoJ) asked the court to uphold its ability to keep secret the nature of the iPhone cracking method used by the FBI to unlock the San Bernardino shooter’s iPhone last year. The Department also asked to keep secret the price of the iPhone cracking method, rumored to be over one million dollars, and the vendor who devised the cracking process. The government says that revealing the method would put a bad tool in the hands of criminals and adversaries and jeopardize Apple’s technology, among other arguments.

May 8, 2019
Ian Duncan and Colin Campbell / Baltimore Sun

Ian Duncan and Colin Campbell / Baltimore Sun  
Baltimore City Government Hit With RobbinHood Ransomware, Attackers Demand Bitcoin Worth $76,280, Majority of City’s Servers Shut Down

For the second time in just over a year, Baltimore city government computers were infected with ransomware, shutting down a majority of the city’s servers this time due to a strain of the malware called RobbinHood, which also affected the city of Greenville North Carolina last month. Unlike most ransomware, RobbinHood is not spread through phishing or spam emails but through hacked remote desktops or other kinds of trojans. The ransom note received in the infection demanded payment of 3 Bitcoins (equivalent to about $17,600 at current prices) per system, or 13 Bitcoins (worth about $76,280) in exchange for freeing all the city’s systems.

May 18, 2019
Ian Duncan, Christine Zhang / Baltimore Sun

Ian Duncan, Christine Zhang / Baltimore Sun  
Baltimore Mayor Says City Could Be Facing Months Until Services Are Restored Following Robbinhood Ransomware Attack

The City of Baltimore, the second apparent victim of the Robbinhood ransomware behind Greenville, North Carolina, could be facing months until all services are restored, according to Mayor Jack Young, with the attackers demanding three bitcoins (worth around $22,000) to unlock affected systems and 13 bitcoins (around $95,000) to unlock all city systems, with the attackers threatening to raise the price of the ransom by $10,000 per day. Mayor Young has yet to make a decision about paying the ransomware. Baltimore is working on temporary fixes for the most crucial problems, including a collapse in city real estate sales.

Related: WJZBaltimore SunInfosecurity Magazine, SC Magazine, Daily Mail, Crowdfund Insider, DataBreaches.net


May 31, 2017
Alex Hern / The Guardian

Alex Hern / The Guardian  
Cosmetic Surgery Clinic Hacked, 25K Private Photos Published After Clients Blackmailed

Hackers who call themselves Tsar Team, Russian hackers also known as APT28 or Fancy Bear, hacked a Lithuanian cosmetic surgery clinic, Grozio Chirurgija, and published 25,000 private photos of the clinic’s clients, including nude photos. The hackers broke into the clinic’s servers earlier this year and demanded a ransom from the clients ranging between €50 and €2,000 (around $64 to $2,600) depending on the sensitivity of the photo. A portion of the database was released in March with the remaining files released yesterday. Prior to seeking ransom from the individual clients, the hackers held the database for ransom and asked the clinic for 300 bitcoin but then reduced the price to 50 bitcoin.

Related: Associated PressDaily Mail, THE INQUIRER, Tech Times, HOTforSecurity, Help Net Security, The Sun, Vocativ, Tech2, Deccan Chronicle, Digital Trends, Washington Post World, Heat Street, Graham Cluley, The Register


April 12, 2017
James Titcomb / The Telegraph

James Titcomb / The Telegraph  
Breaches and Attacks Slashed Corporate Victims’ Market Value by 2.7% in 2016

FTSE companies that experience high-profile cyber hacks lose about 2.7% of their market value, according to a study conducted by Oxford Economics. commissioned by IT giant CGI. The researchers examined publicly traded companies such as TalkTalk, Yahoo and Tesco Bank and found that share price declines for hack attacks on these companies grew from only .2% in 2013 to 2.7% in 2016, with an average decline of 1.8%.

Related: CNBC Technology, The Independent, Global Security MagazineCity A.M. – Technology, SC Magazine, TripwireComputerWeekly: IT security, Professional Security Magazine Online, Reuters, Infosecurity Magazine


May 30, 2017
Dave Neal / The Inquirer

Dave Neal / The Inquirer  
Shadow Brokers Start Zero-Day Dump Service at $22K Per Month in Zcash

After emptying the roughly $24,000 from its bitcoin wallet, the hacking group known as The Shadow Brokers has now launched its promised monthly NSA zero-day dump subscription service, asking for 100 ZEC (Zcash) per month, or roughly $22,000, for releases of what are purportedly stolen NSA hacking tools. The group, widely believed to be Russian intelligence, characterized the switch to the more private Zcash cryptocurrency in derogatory terms, characterizing it as a gamble for “high rollers, hackers, security companies, OEMs, and governments.”

Related: Security Affairs, Softpedia News, MotherboardThe Hacker News, The Shadow BrokersBleepingComputer.comBBC NewsThe Register – Security, Schneier on SecurityThe Hill: Cybersecurity, V3.co.uk, SecurityWeekSecurity – Computing, Network World Security, Threatpost, The Merkle, SiliconANGLE, htxt.africa, Law & Disorder – Ars TechnicaUSA Today, ZDNet Security, Fossbytes, BBC News

Security Affairs: You can take Shadow Brokers Zero Day Exploit Subscriptions for $21,000 per month
Softpedia News: Group Behind NSA Dump that Led to WannaCry Opens 0-Day Exploit Subscription
Motherboard: Follow the Bitcoin From the Shadow Brokers NSA Hacking Tool Auction
The Hacker News: Shadow Brokers Launches 0-Day Exploit Subscriptions for $21,000 Per Month
The Shadow Brokers: TheShadowBrokers Monthly Dump Service – June 2017
BleepingComputer.com: The Shadow Brokers Announce Details About Upcoming Monthly Dump Service
BBC News: Shadow Brokers move bitcoins after hacking tool auction
The Register – Security: Shadow Brokers lay out pitch – and name price – for monthly zero-day subscription service
Schneier on Security: Who Are the Shadow Brokers?
The Hill: Cybersecurity: NSA leakers begin sign-ups for monthly leak subscription service
V3.co.uk: Shadow Brokers starts subscription-based service to hawk purloined NSA exploits and hacking tools
SecurityWeek: Shadow Brokers Want $20,000 for Monthly Leaks
Softpedia News: Group Behind NSA Dump that Led to WannaCry Opens 0-Day Exploit Subscription
Security – Computing: NSA tools hacking group Shadow Brokers starts up monthly security subscription service
Network World Security: Shadow Brokers reveal details about June monthly dump service: 100 Zcash (about $23k)
Threatpost: ShadowBrokers Put Price on Monthly Zero Day Leaks
The Merkle: The Shadow Brokers Only Accept ZCash Payments for Their Monthly Dump Service
SiliconANGLE: 100 Zcash: Shadow Brokers announces the price of its exploit subscription service
htxt.africa: Shadow Brokers launch exploit subscription service
Law & Disorder – Ars Technica: New Shadow Brokers 0-day subscription forces high-risk gamble on whitehats
USA Today: More NSA data will be sold, says Shadow Brokers group
ZDNet Security: Shadow Brokers launch subscription service for fresh exploits, zero-day leaks
Fossbytes: Hackers Behind NSA Data Leak Launch “$21000 Zero-Day Dump” Subscription For Whitehats, Govts. – Fossbytes
BBC News: Shadow Brokers move bitcoins after hacking tool auction


November 24, 2019
Rob Price / Business Insider

Rob Price / Business Insider  
Facebook Built App That Allowed Employees to Identify People Using Facial Recognition

Between 2015 and 2016, Facebook built a now-discontinued internal app that let employees identify people using facial recognition and their phone cameras. One version of the app could identify anyone on the social network if there were enough data to do so. The app allowed employees to point a camera at anyone to display their name and Facebook profile in a few seconds. Facebook said the app was only available to employees and could only be used to identify employees and their friends who had facial recognition enabled.

Related: fossBytes, NewsBytes App, Gadgets Now, CNET, MSPowerUser, Venture Beat. Mashable, Slashdot

Tweets:@robaeprice @kantrowitz @pilhofer @privacyproject @joshsternberg

fossBytes: Facebook Secretly Built A Facial Recognition App For Its Employees
NewsBytes App: Facebook built a creepy facial recognition system to identify people
Gadgets Now: Facebook built face recognition app that let employees identify people
CNET: Facebook built a facial recognition app for employees
MSPowerUser: Facebook tested a real life facial recognition app for employees
VentureBeat: Facebook confirms facial recognition app, says it was only for internal use
Mashable: Somehow Facebook’s facial recognition was even creepier than we thought
Slashdot: Facebook Built a Facial Recognition App That Let Employees Identify People By Pointing a Phone at Them 

@robaeprice: A Facebook spokesperson said its internal facial recognition app only worked on Facebook employees and non-Facebook employees that users were Facebook friends with. But one source said in one early iteration, it worked on anyone.
@kantrowitz: Facebook made an app where you'd point a camera at someone and it would identify them. Yuck. https://businessinsider.com/facebook-built-internal-facial-recognition-camera-app-2019-11 via @robaeprice
@pilhofer: Man I’m getting sick of stuff like this. There is one reason this is a story, and it’s not a very good reason at that. Meanwhile, I was forced to use a super creepy biometric device to board a Delta flight yesterday. But you know... Facebook!
@privacyproject: "The existence of the app illustrates how Facebook has been quick to experiment with technology that could have significant societal implications," writes @robaeprice in @businessinsider
@joshsternberg: Facebook: No, we don't listen to you Also Facebook:


April 26, 2017
Patrick Howell O'Neill / Cyberscoop

Patrick Howell O'Neill / Cyberscoop  
Average Ransomware Attack Payment Nearly Tripled in 2016 to $1,077

The average ransomware attack in 2016 generated $1,077 for the hacker, up 266% compared to the average ransomware attack haul of $294 in 2015, according to new research published in Symantec’s latest Internet Security Threat Report. Over two-thirds, or 69%, of the attacks hit consumers, with 34% of consumers globally and 64% of consumers in the U.S. paying the ransom demand. Despite the victims’ expected hopes to re-gain access to their files upon payment, only 47% of victims who pay the ransom actually recover their files. Part of the spike in ransomware attacks is due to the more efficient sales of ransomware capabilities as ransomware “kits,” which are priced as low as $10, proliferate on the dark web.

Related: eWeek, Reuters: Technology News, SymantecCSO Online, The Hill, Tech2, Sensors Tech Forum, City A.M. – Technology, Softpedia News, SC Magazine, Compliancex, Silicon Republic


March 21, 2017
Jeremy Kirk / Data Breach Today

Jeremy Kirk / Data Breach Today  
Necurs Botnet Has Found a New Purpose in Pump-and-Dump Stock Scheme

One of the world’s biggest botnets, Necurs, which rose to fame pushing Dridex banking Trojan and Locky ransomware, has seemingly found a new outlet in running a pump-and-dump stock scheme via spam emails, researchers at Cisco’s Talos group have discovered. On March 20, Necurs sent a barrage of spam relating to InCapta, a California-based media company. The emails wrongly suggested that InCapta was about to be purchased by drone market giant DJI in a likely effort to pump up the stock with new buyers so that existing shareholders could dump InCapta’s stock at higher levels. The move may be an effort to generate quick cash given that Necurs was essentially crippled following the arrest of 50 financial criminals by Russian authorities last year.