source:  cnet.com

 

You can access certain Android apps on your Windows 10 device, thanks to an update to the Your Phone app,
rolling out this week.

 

Certain Android phone users can now access Android mobile apps directly from their Windows 10 ($158 at Amazon) PC, thanks to an update to the Your Phone app that Microsoft is rolling out to the general public this week. 

The update, first announced during the Samsung Unpacked event on Aug. 5, lets you pin your favorite Android mobile apps to the Taskbar or Start menu on your Windows 10 PC for quick and easy access. The apps will open in separate windows from the Your Phone app, letting you use them basically the same way you would on your phone. With many people still working from home due to the coronavirus pandemic, the ability to access phone apps on a larger desktop or laptop screen, with a mouse, pen or touchscreen, could help with multitasking. 

What’s required to run Android apps on your Windows 10 PC?

Other than a Samsung Galaxy phone (at least for now), you’ll need a PC running the Windows 10 October 2019 Update or later. Check what version you’re running on your PC by going to Settings > Updates & Security > Check for update. (If you need to upgrade, you can still download Windows 10 for free.) 

You’ll also need the latest version of the Your Phone app, and Link to Windows. On your phone, you’ll need to be running Android 9.0 or greater, with the Link to Windows integration. 

Finally, your phone and computer must be on the same Wi-Fi network for the feature to work.

How to run Android apps on your Windows 10 PC

Once you have everything you need and your phone and computer are connected, the Your Phone app window should appear on your desktop. To open your Android apps on your desktop: 

  • Click the Apps shortcut from the menu on the left. You’ll see a list of all the apps on your phone. 
  • Click the app you want from the list, and it will open in a separate window on your PC. 

Note that not every app will work with your mouse or keyboard, but many will. 

And here are a few more tips for interacting with your mobile apps on your desktop with your mouse and keyboard, according to Microsoft

  • Single click will behave the same as any single touch/tap interaction.
  • Right click anywhere on your phone screen to navigate to the previous page.
  • Click and hold will behave the same as a tap/hold interaction.
  • Click and hold and drag to select content.
  • Mouse scroll to move between pages vertically or horizontally.

 

source:  proofpoint.com

Twitter is a vital media and marketing platform with a massive audience base. With 330 millionmonthlyactive usersrecorded in 2019, it’s one of the biggest social media platforms and makes a significant contribution to brand visibility and growth. So, what happens when Twitter gets hacked?

On 15 July, attackers compromised several high-profile accounts, including Joe Biden, Barack Obama, Elon Musk, Bill Gates, Jeff Bezos and Apple. The hijacked accounts, which have tens of millions of followers, sent a series of tweets proposing a classic bitcoin scam: “If you transfer cryptocurrency to a specific bitcoin wallet, they will receive double the money in return”. Approximately $180,000 was sent to those bitcoin wallets and, needless to say, no money was paid back. This scam demonstrates that having software security and crisis management plans in place is a “must-have” not a “should have”—now more than ever.  

So how did the attackers gain access? According to Twitter, they used a spear phishing attack to target Twitter employees by phone. After stealing employee credentials and getting into Twitter’s systems, attackers could target other employees who had access to account support tools.  Spear phishing is a more targeted version of phishing, an impersonation scam that uses email or other electronic communications to deceive recipients into handing over sensitive information.

This kind of attack reveals how imperative it is for organizations to implement people-centric cybersecurity framework. Attackers do not view the world in terms of a network diagram—they target human vulnerabilities across channels. The best way to combat attacks like these is to implement a complete social media security solution that scans all social networks and reports fraudulent activity. 

Continue reading “What the Latest Twitter Hack Can Teach Us About Social Media Security and Compliance”

source: bbc.com

A few days after the coronavirus lockdown began, Ciaran Martin’s phone pinged with a text message – the government was warning him he had left home three times and had to pay a fine.
As the official in charge of defending the UK against cyber-threats, he knew enough to spot a scam.
But it was also a sign he was unlikely to have a quiet end to his time as the first head of the National Cyber Security Centre (NCSC).
Speaking in his last few days in office, he says recent events have been an “unexpected vindication” of the decision to spin out part of the intelligence agency GCHQ so classified intelligence could be better shared to protect the UK.
Pandemic protection
Cyber-criminals were quick to exploit Covid-19, using it to persuade people to click on links or buy fake goods.
And that placed new demand on systems built to automate cyber-defences and spot spoof messages.
At the same time, the NCSC had to help government and public-sector organisations deal with the sudden increased dependence on technology, whether in the cabinet meeting over video link or the government sending out genuine text messages to the entire public.
But it was not just cyber-crime groups who were on the move.
Foreign spies also began to go after new targets.
And protecting universities and researchers seeking a coronavirus vaccine became an urgent new priority.
“Many of the people involved never thought they’d be in a case where they’d be talking to part of an intelligence service about resisting major nation state threats against their work,” Mr Martin says.
In July, the UK, along with the US and Canada, accused Russian intelligence of trying to steal research.
The accusation – known as an “attribution” – came because the NCSC could draw on GCHQ’s long history monitoring Russian hackers.
“We have built up significant knowledge of some of the major attack groups from the major nation states, including Russia, over more than two decades,” Mr Martin says.
“For a lot of the things that we were seeing in the high end of vaccine protection, it was detected by us because it was the more sophisticated end, where the attacker is trying harder not to get caught.”

source:  sciencedaily.com

image - cell phone tracking

Calls via the LTE mobile network, also known as 4G, are encrypted and should therefore be tap-proof. However, researchers from the Horst Görtz Institute for IT Security (HGI) at Ruhr-Universität Bochum have shown that this is not always the case. They were able to decrypt the contents of telephone calls if they were in the same radio cell as their target, whose mobile phone they then called immediately following the call they wanted to intercept. They exploit a flaw that some manufacturers had made in implementing the base stations.

The results were published by the HGI team David Rupprecht, Dr. Katharina Kohls, and Professor Thorsten Holz from the Chair of Systems Security together with Professor Christina Pöpper from the New York University Abu Dhabi at the 29th Usenix Security Symposium, which takes place as an online conference from 12 to 14 August 2020. The relevant providers and manufacturers were contacted prior to the publication; by now the vulnerability should be fixed.

Continue reading “Security Gap Allows Eavesdropping On Mobile Phone Calls”

source: https://hub.tradeshift.com/

 

I recently had the pleasure of speaking with Mead Treadwell, former Alaska Lt. Governor and current Chairman and CEO of QuilakLNG. And since I’ve been spending my summer in Alaska, it was honor to host him as my first in-person guest for this series (outside and distanced, of course). 

Mead is known as one of the world’s leading Arctic policy experts. He has dedicated his life to building cooperation across the Arctic on economic, science, environmental and security issues since the early-1980’s. We talked about competing claims on the resource rich Arctic, the spirit of the Alaskan people and what it was like to be first on the scene at the Exxon Valdez oil spill.

The Interview (video)

 

source: bbc.com

        Image by David Mark from Pixabay

Beneath the frozen wastes of the Arctic, a three-way geopolitical tug-of-war is taking place over which country owns a ridge of undersea mountains. The winner will change maps forever.

One of the most mysterious mountain ranges in the world is not visible on any ordinary map. You can’t see it on the most popularly used flat map of the world, the Mercator projection, or on the Peters projection that is a popular (and more accurate) alternative. On a spinning globe, the plastic axle at the North Pole often covers it up, as if there’s nothing to see.

But this is where you can find the Lomonosov Ridge, a vast mountain range running from the continental shelf of Siberia towards Greenland and Canada. The mountain range stretches for more than 1,700km (1,060 miles), its highest peak is 3.4km (2.1 miles) above the ocean floor.

This little-known mountain range is at the centre of three nations seeking sovereignty over the seabed around the North Pole. According to Denmark, the mountain range is an extension of its autonomous territory of Greenland. According to Russia, it is an extension of the Siberian archipelago Franz Josef Land. And according to Canada, it is an extension of Ellesmere Island in the Canadian territory of Nunavut.

So who is right?

You might also like:

The ridge was first discovered in 1948 by researchers on one of the Soviet Union’s early expeditions to the central Arctic. From a camp on the sea ice, the Soviet scientists detected unexpectedly shallow waters to the north of the New Siberian Islands. It was the first hint that the ocean was split into two basins by the ridge, rather than being one large, featureless basin, as previously assumed. In 1954, the researchers published a map showing an underwater mountain range, which they named after the 18th-Century poet and naturalist Mikhail Lomonosov, who had predicted 200 years before that such features would be found in the Arctic basin.

Today, more than 70 years after the ridge was detected, it remains an enigmatic feature in one of the most poorly mapped seafloors in the world. Even with modern ships passing powerful 864-beam arrays of sonar down through the Arctic waters, the resolution of the ridge is only in the order of hundreds of metres. That’s like being just about able to distinguish one end of an athletics track from the other side.

source: atlanticcouncil.org

Driven by rising temperatures and melting ice, the vast Arctic region is changing—and so are the military priorities of the United States and its two biggest adversaries: Russia and China.

With that in mind, the US Air Force has unveiled its new, comprehensive strategy for the Arctic.

The launch coincided with a July 21 virtual event hosted by the Atlantic Council’s Transatlantic Security Initiative and ForwardDefense within the Scowcroft Center for Strategy and Security. The panel featured Secretary Barbara Barrett of the Department of the Air Force and two members of the Joint Chiefs of Staff: General David L. Goldfein of the US Air Force and General John W. Raymond of the US Space Force.

“Historically, the Arctic, like space, was characterized as a predominantly peaceful domain. This is changing with expanded maritime access, newly discovered resources, and competing sovereign interests,” said Barrett. “No other country has a permanent military presence above the Arctic Circle comparable to Russia’s.”

That’s no surprise, given that 53 percent of the Arctic Ocean’s 45,390 kilometers of coastline falls within Russia’s jurisdiction. The remaining 47 percent is split among seven countries: the United States (Alaska), Canada, Denmark (Greenland), Iceland, Norway, Sweden, and Finland.

Continue reading “As Arctic Warms Up, US Air Force Launches Strategy for Confronting Threats”

source:  militaryaerospace.com

A recent White House memo directs the Pentagon and other executive departments to provide a roadmap by early August for creating a security fleet of icebreaker ships. The Washington Free Beacon reports. Continue reading original article

The Military & Aerospace Electronics take:

11 Aug. 2020 — The move to acquire icebreaker ships signals Washington’s recognition of the Arctic and Antarctic regions’ increasing geopolitical significance, as well as a willingness to stand up to China and Russia.

The memo comes at a time when the U.S. has minimal strategic capabilities in the polar regions; there is not a single U.S. port in the Arctic capable of housing icebreaking ships. This shortcoming is addressed by the memo, which orders a search for at least two “optimal” U.S.-based port locations and two international port locations.

Military authorities say the need to bolster U.S. operations in the polar regions is immediate. The gap between America and its competitors in Arctic operations and power projection is substantial. Russia has a fleet of six heavy-class icebreakers and pledges to double that number in the next decade. Meanwhile, Beijing announced plans to build its own icebreaker ship late last year. The two nations increasingly have cooperated in the region as well.

Related: Arctic surveillance is the result of East-West political tensions in the polar regions

source: nytimes.com

 

 
Several people involved in the events that took down Twitter this week spoke with The Times, giving the first account of what happened as a pursuit of Bitcoin spun out of control.

OAKLAND, Calif. — A Twitter hacking scheme that targeted political, corporate and cultural elites this week began with a teasing message between two hackers late Tuesday on the online messaging platform Discord.

“yoo bro,” wrote a user named “Kirk,” according to a screenshot of the conversation shared with The New York Times. “i work at twitter / don’t show this to anyone / seriously.”

He then demonstrated that he could take control of valuable Twitter accounts — the sort of thing that would require insider access to the company’s computer network.

The hacker who received the message, using the screen name “lol,” decided over the next 24 hours that Kirk did not actually work for Twitter because he was too willing to damage the company. But Kirk did have access to Twitter’s most sensitive tools, which allowed him to take control of almost any Twitter account, including those of former President Barack Obama, Joseph R. Biden Jr., Elon Musk and many other celebrities.

Despite global attention on the intrusion, which has shaken confidence in Twitter and the security provided by other technology companies, the basic details of who were responsible, and how they did it, have been a mystery. Officials are still in the early stages of their investigation.

Continue reading “HACKERS TELL THE STORY OF THE TWITTER ATTACK FROM THE INSIDE”

source: cnet.com

 

 

Privacy is now a priority among browser makers, but they may not go as far as you want in fighting pervasive ad industry trackers on the web. Here’s a look at how you can crank up your privacy settings to outsmart that online tracking.

Problems like Facebook’s Cambridge Analytica scandal have elevated privacy protection on Silicon Valley’s priority list by showing how companies compile reams of data on you as you traverse the internet. Their goal? To build a richly detailed user profile on you so that you can become the target of more accurate, clickable and thus profitable advertisements.

Apple and Google are in a war for the web, with Google pushing aggressively for an interactive web to rival native apps and Apple moving more slowly in part out of concern those new features will worsen security and be annoying for users. Privacy adds another dimension to the competition and to your browser decision.

James Martin/CNET

Apple has made privacy a top priority in all its products, including Safari. For startup Brave, privacy is a core goal, and Mozilla and Microsoft have begun touting privacy as a way to differentiate their browsers from Google’s Chrome. It’s later to the game, but Chrome engineers have begun building a “privacy sandbox” despite Google’s reliance on ad revenue.

For all of the browsers listed here, you can give yourself a privacy boost by changing the default search engine. For instance, try DuckDuckGo. Although its search results may not be as useful or deep as Google’s, DuckDuckGo is a longtime favorite among the privacy minded for its refusal to track user searches.

Other universal options that boost privacy include disabling your browser’s location tracking and search engine autocomplete features, turning off password autofills, and regularly deleting your browsing history. If you want to take your privacy to the next level, consider trying one of the virtual private networks CNET has reviewed which work with all browsers. 

Chrome

Unfortunately, the world’s most popular browser is also generally thought to be one of the least private when used straight out of the box. On the plus side, however, Chrome’s flexible and open-source underpinnings have allowed independent developers to release a slew of privacy focused extensions to shake off trackers. 

Continue reading “HOW TO IMPROVE YOUR PRIVACY IN CHROME, SAFARI, FIREFOX, EDGE & BRAVE”