Blog Archive
-
▼
2012
(355)
-
▼
October
(59)
- Review: Intel's Series 335 delivers more SSD for l...
- Nokia Lumia 820 up for UK pre-order: free on contr...
- Faulkner Estate Sues Sony Pictures Because Owen Wi...
- Surface RT hands on
- Frankenstorm: New Yorkers hunker down with artisan...
- Social TV and second-screen viewing: the stats in ...
- Hurricane Sandy playlist: 10 songs to get you thro...
- How to Tell if Your Home Has Code Violations
- Random House Says Libraries Own Their Ebooks, Really
- Virgin Media adds 60,000 internet subscribers in t...
- How to Make a Jack O' Lantern from an Empty Toilet...
- Visualized: Space shuttle Endeavour goes on a cros...
- GoPro's new Hero3 is lighter, faster, higher res a...
- How to Use Windows 8
- Review: Dark Souls brings murderously hard gamepla...
- First Look at Miley Cyrus on "Two and a Half Men" ...
- Madonna Attacked for Dedicating Inappropriate Danc...
- Make sense of the presidential debates with #smart...
- Halloween fonts that aren't afraid to say "Boo!"
- Comcast quietly updates DVRs with ability to list ...
- Matthew Woods deserves support as much as airport ...
- Here's The Upcoming Nexus Superphone Made By LG
- Chevron Subpoenas Google, Yahoo & Microsoft To Get...
- My son Gary McKinnon has won justice at last | Jan...
- Call of Duty Elite to be free for Black Ops 2
- Will algae ever power our cars?
- Angry Birds games have 200m monthly active players
- The Canyons trailer: has it lost the plot?
- Trick or Treat: Deck the haunts with Halloween din...
- Virginia Beach McDonald's adds free iPad use to it...
- Twitter fiction: 21 authors try their hand at 140-...
- MooresCloud Light runs Linux, puts LAMP on your la...
- Review: Fifth-generation iPod touch is faster, fin...
- Toshiba Satellite R945-P440 review: Sturdy and so-so
- Exposing Reddit's purveyors of 'creep shots'
- SoundExchange, Once Again, Warns Artists That If T...
- Kimera Systems wants your smartphone to think for you
- Congress: Fear Chinese Networking Companies! But I...
- Human Rights Group Deploys An 'Empathy Test' Captc...
- Sky+ or YouView - which is best?
- LG Nexus 4 Spotted at The Carphone Warehouse in Bl...
- 3D printers shape up to lead the next technology g...
- Rightwingers seek tweet revenge with claims of une...
- AT&T launches VoteHub, brings the presidential ele...
- BBC launches iPlayer Radio: a separate radio-only ...
- White House turns back "spear phishing" attack on ...
- Even Apple Doesn't Use Its Own Maps
- Halo 4: the film of the game
- Touch Bionics releases new prosthetic fingers, fli...
- Women at work: 'Forget the balance. This is the me...
- Dell Inspiron 15R 5520 review: Solidly budget-frie...
- Creepy Smartphone Malware Re-creates Your Home For...
- Online passwords: keep it complicated
- Sony starts delivering Ice Cream Sandwich update t...
- DRAM Patent Holder Rambus Called Out (Again) For S...
- Dell Inspiron 17R-1316MRB Review: A Budget Desktop...
- Lockitron launches iPhone-controlled keyless lock ...
- Amazon launches organic, eco-friendly site Vine.com
- Penguin Taking Underperforming Authors To Court To...
-
▼
October
(59)
About Me
Creepy Smartphone Malware Re-creates Your Home For Stalkers
It has become a cliché to say that anyone with a mobile phone has a tracking device that provides detailed information about your position. But things are moving, researchers (and probably others too) to explore new ways to subvert smartphones increasingly common for other revealing data about their users. It is a rather clever use malware to turn your smartphone into a system for taking clandestine photographs - something we've seen before, of course, in other contexts - but goes further to sew together form a fairly accurate 3D model of their world:
This paper presents a novel visual PlaceRaider called malware, which allows remote attackers to compromise in recognition of what we call distance and virtual, vol. Through the use of the camera on the phone completely opportunistic and other sensors built models PlaceRaider rich, three-dimensional indoor environments.
Using 3D reconstructions overcomes a potential problem with spyware ordinary there is often too much data whose meaning is not clear. This is why it is difficult to find something interesting. The solution here is to combine all the data in a unified reconstruction, virtual, you can then browse snoopers looking for significant items as if we could eradicate through your physical space.
Alice does not know that your Android phone is running a service that PlaceRaider photos surreptitiously records as well as the orientation and acceleration sensor data. After analyzing aboard, your phone searches for images collected and extracted those that appear to contain valuable information about their environment. At the appropriate time, the phone sends a packet discreetly images to remote control server and PlaceRaider.
Upon receiving images of Alice, the command and control server executes an algorithm PlaceRaider computer vision to generate a 3D model of high quality. Mallory This model allows the remote attacker to easily plunge into the environment Alice. The fidelity of the model allows you to view the calendar Alice Mallory, the elements of the surface of the table and the room layout. Knowing that the work surface can provide valuable information, Mallory zoom images that have generated the office and quickly finds Alice performs a check and routing numbers with your identity and address. This gives an immediate value. She also sees wall calendar, noting the dates that the family will be out of town, and thinks to ask a partner who lives close to "visit" the house while the family is away and "borrow" iMac Alice Mallory sees office.
Find best price for : --smartphone----malware----Android----PlaceRaider----virtual--
0 comments:
Post a Comment