IT Technology Services New Orleans

Category

Apple

Cell Carriers Agree to Disable Stolen Smartphones

By | Apple, ATT, Droid, iPhone, Verizon | No Comments

I’ve personally witnessed a cell phone being ripped from someones ear in mid-conversation and the thieves running off before the victim can grasp what has just happened.   This is moving in the right direction but taking too long and with far too much resistance from the cell phone companies.

Yesterday, New York Senator Charles E. Schumer and New York Police Department Commissioner Ray Kelly announced Tuesday that the major cell phone carriers in the United States and the Federal Communications Commission have agreed to their call to set up an integrated database of unique cell phone identifiers, known as International Mobile Equipment Identity numbers, to allow cell phone companies to permanently disable stolen cell phones.

According to a news release:

The announcement is part of an effort led by Schumer and the NYPD to crackdown on the growth of cell phone theft and its related crime by making stolen cell phones worthless on the black market. IMEI numbers are similar to Vehicle Identification Numbers that are unique to automobiles throughout the country and allow law enforcement to track stolen property. As part of his effort to crackdown on the illegal sale of stolen cell phones, Schumer is also introducing legislation making it a federal crime to alter or tamper with a phones IMEI number.

“Our goal is to make a stolen cell phone as worthless as an empty wallet,” said Schumer. “By permanently disabling stolen cell phones, we can take away the incentive to steal a cell phone in the first place and put a serious dent in the growing rates of iPhone and smart phone theft. I want to commend FCC Chairman Genachowski and the cell carriers for working with us to help crack down on this growing crime trend and putting in place a comprehensive database that will allow carriers to identify stolen cell phones so they cannot be reactivated once sold on the black market.”

“With the press of a button, carriers will be able to disable phones and turn highly prized stolen property into worthless chunks of plastic,” said New York City Police Commissioner Raymond W. Kelly. “Like draining the swamp to fight malaria, we’re trying to dry up the market to fight i-phone thefts.”

Currently, when cell phones are reported stolen, many American cell phone companies only deactivate the phone’s “SIM” card, which is the account data storage component of the device. While deactivation of a SIM card does not allow for the device to be used with existing data and account information, SIM cards are easily removed and replaced, allowing stolen phones to be easily resold on the black market. In August of last year, Schumer urged carriers to shut off phones based on IMEI number and called on the FCC to help the carriers facilitate the adoption of a database. In January, Schumer successfully urged AT&T to include the NYPD at the GSM Association’s North America Committee on Security and Fraud to discuss ways to combat cell phone theft.

Schumer and Kelly announced today that CTIA, the major wireless industry association, had committed to have its members work together with the FCC to establish a nationwide, interconnected database that will allow the carriers to share information on stolen cell phones across networks in order to track stolen phones and deter cell phone theft. As a result, cell carriers in the United States will no longer just deactivate SIM cards, which store a user’s account information, but instead, they will deactivate the actual handheld device, using the phone’s individual IMEI number. IMEI numbers are unique to the actual handheld device similar to a vehicle VIN number and can be found usually in battery compartments of phones.

As part of the overall effort to clamp down on cell phone theft, Schumer also announced he would be introducing legislation that would make it a federal crime to tamper or alter a cell phone IMEI numbers in order to activate a stolen phone. Schumer’s legislation will be modeled on similar federal statutes with respect to VIN numbers on automobiles. Anyone convicted of tampering with or altering the IMEI number on a cell phone could face a maximum of five years in prison.

According to the New York Police Department, 42% of all property crimes of individuals in New York City in 2011 involved a cell phone. Cell phone robberies in New York are being fueled in large part by the fact that stolen phones, like the iPhone and Android phones, are easily resold on the black market because they use SIM card technology. Cell phone theft and its resultant violence is a growing problem in the New York metropolitan area. Just a week ago, four separate teenagers had their cell phones stolen from them in a one hour period in Uniondale, Long Island, and in August of last year a 16-year-old boy was beaten up and robbed of his cell phone inside a train station in Brooklyn.

Mac's Malware: Flashback – how to get rid of it

By | Apple | No Comments

Apple’s Mac platform has long been promoted as safer than the competition, but as Mac sales and market share grow, it’s become a bigger target.

Nowhere is that clearer than with the Flashback Trojan, a gnarly piece of malware designed to steal personal information by masquerading as very mainstream browser plug-ins. Yesterday Russian antivirus company Dr. Web said that an estimated 600,000 Macs are now infected as a result of users unknowingly installing the software.

So here’s a quick FAQ on the Flashback Trojan, including information on what it is, how to tell if you have it, and steps you can take to get rid of it.

What exactly is Flashback?
Flashback is a form of malware designed to grab passwords and other information from users through their Web browser and other applications such as Skype. A user typically mistakes it for a legitimate browser plug-in while visiting a malicious Web site. At that point, the software installs code designed to gather personal information and send it back to remote servers. In its most recent incarnations, the software can install itself without user interaction.

An earlier version of the Flashback Trojan's installer. An earlier version of the Flashback Trojan’s installer.

(Credit: Intego)

When did it first appear?
Flashback as we know it now appeared near the end of September last year, pretending to be an installer for Adobe’s Flash, a widely used plug-in for streaming video and interactive applications that Apple no longer ships on its computers. The malware evolved to target the Java runtime on OS X, where users visiting malicious sites would then be prompted to install it on their machine in order to view Web content. More advanced versions would install quietly in the background with no password needed.

How did it infect so many computers?
The simple answer is that the software was designed to do exactly that. In its initial incarnation, the malware looked very similar to Adobe’s Flash installer. It didn’t help that Apple hasn’t shipped Flash on its computers for well over a year, arguably creating a pool of users more likely to run the installer in order to view popular Web sites that run on Flash. In its newer Java-related variants, the software could install itself without the user having to click on anything or provide it with a password.

What also didn’t help is the way that Apple deals with Java. Instead of simply using Java’s current public release, the company creates and maintains its own versions. As it turns out, the malware writers exploited one particular vulnerability that Oracle patched in February. Apple didn’t get around to fixing its own Java version until last week.

What has Apple done about it?
Apple has its own malware scanner built into OS X called XProtect. Since Flashback’s launch, the security tool has been updated to identify, and protect against a handful of its variants. A more recent version got around this by executing its files through Java. Apple closed off the malware’s main entry point as part of an update to Java earlier this week.

How do I tell if I have it?
Right now the easiest way to tell if your computer has been infected is to run some commands in Terminal, a piece of software you’ll find in the Utilities folder in your Mac’s Applications folder. If you want to find it without digging, just do a Spotlight search for “Terminal”

Once there, copy and paste each one of the code strings below into the terminal window. The command will run automatically:

defaults read ~/.MacOSX/environment DYLD_INSERT_LIBRARIES
defaults read /Applications/Safari.app/Contents/Info DYLD_INSERT_LIBRARIES
defaults read /Applications/Firefox.app/Contents/Info DYLD_INSERT_LIBRARIES

If your system is clean, the commands will tell you that those domain/default pairs “does not exist.” If you’re infected, it will spit up the patch for where that malware has installed itself on your system.

Uh oh, I have it. How do I remove it?
Security firm F-Secure has posted a step-by-step walkthrough on its site. It too requires hopping into Terminal and running those commands, then tracking down where the infected files are stored, then manually deleting them. There are also likely be removal tools built into Mac antivirus/malware programs in the near future.

So now that fixes are here am I safe?
The very nature of malware is that its authors make changes to the software to get around increased security fixes. That’s already happened with this particular piece of software initially targeting users by pretending to be Adobe Flash before evolving.

CNET’s advice on this malware, and with any software is to download it from trusted sources. That includes the direct sites of software makers, as well as CNET’s Download.com. This results in software that’s secure and up to date.