Asia, Africa, and Australasia

News items from Asia, Africa and Australasia

Fake Apps in Google Play Get over Half a Million Installs

At least a dozen mobile apps with no legitimate functionality made it into Google Play and have been installed over half a million times. Designed as car games they would silently install another app and trick the user into approving its installation.  The end game is to make money from pushing unsolicited advertisements to the user when they unlock the device.  Malware researcher Lukas Stefanko of ESET found 13 fraudulent apps that…

VW lets Apple users unlock their cars with Siri

VW announced on Monday (12th November, 2019) that its smartphone app now supports Siri commands for Apple users. Notably, Apple users can now unlock and lock their Volkswagen with a Siri voice command. After a user logs into the Car-Net app, a handful of new functions will be available with the typical "Hey, Siri" voice command. VW said Apple users can simply say, "Hey, Siri, lock my car" and Car-Net will execute the function. For those…

BlackVue dashcams share cars’ mapped GPS locations, stream video feeds and audio

Just as some people are unknowingly streaming live video from security cams in their homes, some are also unknowingly live-streaming video from their cars. They have made the video feed from their front and rear dashcams, as well as the mapped GPS location of the vehicle – the speed it is going or if it is parked – and even audio from inside the vehicle, available to the public. BlackVue comes with a Cloud Viewer which allows owners…

Mitigating cyberthreats in vehicles

In acts of terrorism, vehicles have been deployed as killing machines. These incidents involved human operators, but another sinister possibility looms: a vehicle cyber hack intended to cause human harm. While this kind of terrorist attack has not yet occurred, in the realm of security research, it’s been demonstrated how hackers could gain control over car systems like the brakes, steering and engine. In acts of terrorism, vehicles…

Hackers Can Steal a Tesla Model S in Seconds by Cloning Its Key Fob

A team of researchers at the KU Leuven University in Belgium on Monday plan to present a paper at the Cryptographic Hardware and Embedded Systems conference in Amsterdam, revealing a technique for defeating the encryption used in the wireless key fobs of Tesla's Model S luxury sedans. With about $600 in radio and computing equipment, they can wirelessly read signals from a nearby Tesla owner's fob. Less than two seconds of computation…

Delhi government may use Microdot technology to curb motor vehicle thefts

The Delhi government's home department is looking at a 'microdot technology' to curb incidents of motor vehicle thefts in the city, an official said. In a meeting last month, Delhi Lt Governor Anil Baijal had instructed authorities to explore the provision of making installation of various safety devices like anti-vehicle theft equipment a "mandatory condition" for registration of vehicles in the national capital. The use of…

Be discreet when you delete your fleet

Systems in newer cars do a great job keeping you and your employees connected while on the road. But like laptops and smartphones, your company cars may be storing more information than you realize – data that could be accessible to the next person in the driver seat. That could include contact lists and other data downloaded when you synced your phone, log-ins for apps, location data, and even garage entry codes for your office or…

Vehicle crime increasingly linked to other criminal activities

Stolen vehicles are frequently trafficked in order to finance and carry out activities, ranging from drug trafficking, arms dealing, people smuggling and international terrorism. With this in mind, some 130 international experts from 30 countries around the world have gathered in Mexico to discuss the latest vehicle crime investigation patterns, new technologies available to law enforcement, cooperation challenges in vehicle supply chain…

Crime on the dark web: law enforcement coordination is the only cure

Europol, through the European Cybercrime Centre (EC3), has been supporting the investigation of criminal marketplaces on the dark web for some years by sharing tools, tactics, and techniques. The dark web hosts many of the more critical marketplaces for several criminal organisations and individual illegal activities in Europe and around the world. Due to its structural specificities – the possibility to buy and sell anonymously and the…