Man in the middle spoof of SMS, phone call, and security question validation? Security gets harder and harder …
If SMS is used to validate your account, then the attacker’s registration site will also use SMS to validate you. When your service provider asks the attacker for the code sent to your mobile phone, the victim is asked on their registration form to input the SMS received. Once the victim provides the SMS on the attacker’s form, absent any additional protocols, the unsuspecting user’s email or other online service account has just been hijacked.
Source: Watch out: don’t lose your passwords when you sign up online – Naked Security
Feeble human! Your spouse is clamoring for cute kid photos and you once again forgot to send them. Well, stand aside: Google’s artificial intelligence (AI) will now share your photos for you.They will be shared automatically, aided by facial recognition and a somewhat kludgy understanding of who you have relationships with.
Source: Google wants to share your photos with your nearst and not-dearest – Naked Security
The mouse attached to your computer and your hand may be telling us more about your identity than you suspected. This could be both a good thing, as researchers in Italy recently noted, or troublesome as those in the Tor community noted a bit over a year ago.
Source: Your mouse knows when you are lying – Naked Security