XIAM007

Making Unique Observations in a Very Cluttered World

Sunday 13 June 2010

10 Everyday Items Hackers Are Targeting Right Now - hackers have figured out how to attack everyday items -

10 Everyday Items Hackers Are Targeting Right Now - hackers have figured out how to attack everyday items -




Just when you thought it was safe to use your computer, hackers have figured out how to attack everyday items. Your printer, your cellphone -- even the blender in your kitchen -- can be hacked and used against you.
And in the not-too-distant future, as the medical field makes advances with machine-to-human interfaces, even your own body and brain could be at risk. 
Here are 10 everyday items that are open to fresh attacks from criminals.
1. Your CarVehicles like the Mercedes S550 use a cellular connection that lets you lock and unlock your car remotely. The Chrysler Grand Caravan has an on-board Wi-Fi connection to the Internet. GM vehicles use OnStar to communicate with the outside world; the company even incorporates a kill switch you can use if your car is stolen.
David Perry, a virus expert at Trend Micro, notes that most cars have multiple computers on board and a network of devices that use Wi-Fi, GPS, and Bluetooth. Perry claims "white hat hackers" -- the good guys who hack into systems to prove they have security problems -- have shown that cars are at risk.

"The future of car theft might easily turn digital," said Perry. "It might be possible to freeze traffic on a crowded road, stopping enough cars using a Bluetooth hack or a connected mobile phone. These attack vectors are real; what really matters is what the hacker wants to do." 

Car hacking is so new, the auto industry has not addressed the problem fully. You can request that your dealer disable some of these computer systems and wireless networks. Cellular networks protect signals by switching base stations routinely. 
2. That New GPS Gizmo 
GPS uses orbiting satellites to route you through traffic. According to Robert Siciliano, the CEO at IDTheftSecurity.com, hackers would have a hard time causing trouble with these satellites. But the bad guys can access a GPS device when it downloads updates over the Internet -- and then can install a remote access tool and track your whereabouts.
Perry said criminals who tap into your GPS could send you to a shady location, such as an empty warehouse, and then rob you. Hackers also use GPS jammers, readily available online, that confuse the signal and can cause traffic jams and driver errors.
3. Your CellphoneYour cellphone is an easy target for hacking. Spyware tools that infect your phone are readily available on the Internet, Siciliano says. First you receive a text message with a link offering some free service. When you click the link, the hackers gets full access to your phone.
In one deceptively simple attack, you get a free cellphone in the mail with printed materials that make it look like you can test it for a week and send back. As you test, the phone records video and audio. When you send it back, the hacker uses the personal info against you.
Perry said another dangerous hack occurred in Japan. Hackers tapped into emergency phone services and disabled emergency calling. He said it's an example of one of the more dangerous exploits -- hackers shutting down important city services.
As with any connected device, you can disable Bluetooth, Wi-Fi, and even carrier service when you're not using the phone. Also, never click text message links from unknown senders. 
4. The Front-Door Security SystemYou bolt the door, install videocams, and add a security alarm -- and still the criminals can break in! The reason: a lock bumping technique where a master key -- designed for popular locks -- unlocks the front door. That video signal, if transmitted over an unsecured Wi-Fi signal, is easy to compromise. And, according to security expert Winn Schwartau from The Security Awareness Company, a zap from a powerful (but expensive) electro-mechanical interference device can disable some alarm systems.
Perry said home automation systems designed for convenience (like the popular Schlage Link) make the front door hackable -- criminals can simply intercept the wireless signal to unlock or lock the front door. And if a hacker steals your cellphone, he can access your home with these convenience tools.
But it's easy to prevent: Enable the password feature that blocks access to your phone. Also, make sure you use strong encryption, such as AES, on your home wireless network.
5. Your Blender. Yes, Your BlenderThat's right: your blender is under attack! Most mixers are self-contained and not hackable, but Siciliano says many home automation systems tap into appliances such as blenders and coffee machines. These home networks are then open to attack in surprising ways: A hacker might turn on the blender from outside your home to distract you as he sneaks in a back window, he warns.
Interestingly, home automation systems such as those from Hawking Technology use wireless networks that home owners install on their own. Many folks simply don't bother to configure the security options -- it's easier and faster to just run an open (and easy to hack) network.
6. Your PrinterYour printer is open to attack -- especially if you use a model that uses a Wi-Fi connection, like the HP Deskjet 6980. That over-the-air signal is probably not as protected as computer connections, which often use industrial-grade encryption, such as AES.
Once a hacker can access your printer, Siciliano says he can read (and steal) anything you print -- or the criminals can access the network and your PC to steal data directly. 
7. Your New Digital CameraYes, even a camera can be hacked.
Any hardware gadget that has local storage, which includes video cameras, digital cameras, and even those cheap and wildly popular Flip cams, can be infected with a virus. Once you connect the cam to your computer, that virus can corrupt the device or provide remote access to spies.
Perry said TrendMicro has identified commercial malware that can run on a video camera or the webcam on your laptop. It records all activity and can be used for spying on you. 
8. The Power Sockets in Your WallsThe power in your home is hackable as well, especially as the U.S. moves to a "smart grid" that lets consumers monitor and control their own power consumption.
Perry said the danger is that criminals will figure out how to steal power, use it in their own homes or businesses, and make it look like you're the consumer. Or hackers could turn off your power, or cruelly jack up the meter to increase your bill.
For now, most of us are safe; the smart grid is more of an idea than a reality, although there are several test deployments across the country. Once the smart grid becomes common, Schwartau said filtering, a method of making sure the power is actually reaching the intended recipients, could help ensure the grid is not hackable. We'll see.
9. The Human BodyIt sounds far-fetched because most of us don't have that computer-to-human interface installed quite yet. But researchers at MIT have shown how computers can help the disabled walk or play videogames. And it could be just a matter of time before humans are "augmented" this way.
Besides, Perry said, the idea of hacking into a pacemaker is a proven reality, since some of the devices use Bluetooth connections for control. "In several studies, it was shown that hacking a pacemaker was pitifully easy," he said. "This might be a good example of a cyberkill."
"I've given demonstrations of high power electro-mechanical interference. We had to make sure that folks with pacemakers were at least 100 meters away," Schwartau said. 
10. Even the Human BrainThe last frontier of hacking: stealing information directly from your brain. Once again, research institutions such as Harvard and MIT have shown that it is possible to tap into the brain at some level to control motor functions, such as lifting an arm or blinking.
Criminal control of your brain sounds like science fiction, but Schwartau insists that anything is hackable -- even your mind. Perry said hackers already infect the human brain, using a process call social engineering. This involves tricking you into giving out a password over Facebook or revealing private info during an earnest (but fake) phone survey.
Most security experts agree: the most dangerous hacks are those that trick employees at a company or any consumer who divulges private information.

Great Gulf Oil spill solution proposal from Van Den Noort Innovations BV - can get the oil under control within days -

Great Gulf Oil spill solution proposal from Van Den Noort Innovations BV - can get the oil under control within days -



  How to stop the BP Oil Spill in the Gulf of Mexico within days
                     
(Alternative Response Technology)
 A. Find a suitable ship or pontoon of considerable size with (an) open compartment(s), flatten its top and turn it upside down before sinking it.B. Make a hole in the bottom and weld a vertical pipe on it.
C. Make a shut-off at the pipe that can be controlled from the surface.
 D. Connect a flexible hose to the shut-off with a total length of about 1700 m, which is sufficient to reach the tanker on the surface.E. Connect the end of the pipe to the oil-tanker.
 F. Before sinking the ships compartment must be filled with warm water in order to preventmethane hydrate crystallization.G.  Dump the upside down ship or pontoon over the leaking oil wells.
 H. Now the ship compartments are filled with oil and the oil is drained through the pipe to the oil tanker on the surface.NB. From now on the oil spill is under control and the leak should have stopped.
 I. In order to stabilize the ship on the sea bottom and to neutralize the high oil pressure, heavy basalt blocksshould be dumped through a shaft to the ship.
 J. Dump sufficient  Basalt blocks on and around the ship in a circle of about 250 - 350 m.
 
 k. Thereafter,  pour concrete over the basalt blocks in a circle of about 300- 400 m with an average thickness of about 8 - 10 meter.L. Let the concrete dry for about 7 days.
 M. Dump stabilized sand in a circle of about 800 - 1000 m, with a total thickness of 50 - 60 m.
 N. Close the shut-off in the drainpipe.O. Wait a couple of days and inspect the spot to make sure the leaking has stopped.
 P. Cut of the hose and seal it off.Q. "Now it is time to open a bottle of the best champagne".
PS. Also see our Oil Recovery Vessel