Plus: Millions Of Apple Airplay-Enabled Devices Can Be Hacked Via Wi-Fi |
As if there wasn’t enough to worry about concerning children and teenagers being targeted online, this week Europol warned that youngsters are being recruited by organized criminal groups to carry out “violence-as-a-service” According to the agency, this involves “ outsourcing of violent acts to criminal service providers” by “vulnerable young people being groomed or coerced into doing so.”
Cybersecurity company Trend Micro also put out research on this front. It found that there are detailed online forums in Russia where criminals were offering to carry out physical attacks for the highest bidder. In one post, a user offered to commit “grievous bodily harm” for $5,000. “Torture with extortion of information” was on offer for $6,000 a day. Arson of a target’s apartment was offered at $10,000.
The problem has become bad enough that on Tuesday, Europol announced a taskforce to deal with the crime and published advice for parents on how to keep an eye out for signs a child is being targeted by a criminal network. Among the signs to look out for? The use of encrypted messaging apps and a surprisingly healthy cash flow. There may be benign explanations for these but if you don’t know how your teen is making money, it’s probably a good idea to talk to them about it.
Got a tip on surveillance or cybercrime? Get me on Signal at +1 929-512-7964. |
|
| | Millions Of Apple Airplay-Enabled Devices Can Be Hacked Via Wi-Fi |
| |
|
|
Researchers at Israeli cybersecurity startup Oligo revealed vulnerabilities in Apple’s AirPlay could be used to install malware on connected devices. Dubbing their attacks AirBorne, the researchers showed how they could target the software development kit (SDK) used by third-party devices to work with AirPlay so they could hijack devices like speakers or smart TVs.
Apple has patched weaknesses that would’ve allowed attacks on its own AirPlay-enabled devices, though the company told Wired those bugs could have only been exploited if users had changed default settings. Hacks of connected devices could still be possible, however, meaning tens of millions of products may remain vulnerable.
Worried about your own phone? You can disable Airplay by going to settings on your iPhone and searching for it, then turn Automatically AirPlay to “Never.” |
|
|
The Stories You Have To Read Today |
|
Researchers at the University of Toronto’s Citizen Lab found malware masquerading as an open source word processing and spell check app for the Uyghur language. Senior members of the World Uyghur Congress living in exile were among the targets.
British retail giant Marks & Spencer has been hit by a cyberattack that's downed its online payments for five days, with a ransomware group known as Scattered Spider reportedly linked to the hack. |
|
Presented by Forbes Explore | A sleek new Forbes built with and for you |  | We are inviting our valued readers to best test Forbes Explore, a blend of our staff journalism and generative AI technology–in a responsible way. This is a unique opportunity to explore the news faster, engage deeper and connect to conversations and your favorite writers.
We want to learn from you – the more you read, contribute and explore, the smarter we get on refining existing features and developing new tools that enhance your experience.
Please fill out our two-minute survey and let us know your thoughts and suggestions. We are eagerly listening and can’t wait to share the latest updates soon! | |
|
Google put out a report on Tuesday showing how zero-day attacks (which hit previously-unknown and unpatched vulnerabilities) targeting mobile devices had gone down. Zero-day exploitation of mobile devices fell by about 50% compared to this time last year, though Google did warn that it expected to see overall zero-day attacks rise steadily over the next 12 months. That’s because “the average trendline indicates that the rate of zero-day exploitation continues to grow at a slow but steady pace,” Google’s researchers wrote. |
|
|