How would someone be able to call (or spoof) from a phone number they do not own

I recently got a call from a lady who claimed I called her and demanded her credit card information and that she owed me money. I did not make the call, but I did verify that on her phone my number did appear to make the call… Continue reading How would someone be able to call (or spoof) from a phone number they do not own

Acoustic Attack Against Accelerometers

Interesting acoustic attack against the MEMS accelerometers in devices like FitBits. Millions of accelerometers reside inside smartphones, automobiles, medical devices, anti-theft devices, drones, IoT devices, and many other industrial and consumer applications. Our work investigates how analog acoustic injection attacks can damage the digital integrity of the capacitive MEMS accelerometer. Spoofing such sensors with intentional acoustic interference enables an out-of-spec… Continue reading Acoustic Attack Against Accelerometers

Dealing with a fraudulent email that went to vendors

Recently a business I’m working with had an email that was sent to some vendors of theirs using emails that were remarkably similar to their own emails. The attackers used letter substitution to mimic the business’s domain (e.g. exarnple@dornain.com — notice the use of “r” and “n” to imitate an “m”).

Luckily, the vendors contacted by these people were diligent enough to catch the mismatched email addresses. However, I’m concerned that similar attacks will hit other vendors of our that might not have the same protocols in place.

Aside from contacting every one of vendors, is there anything the business can do on their end to mitigate these attacks? Or are they reliant on vendors being diligent with double-checking their contacts?

Continue reading Dealing with a fraudulent email that went to vendors