Sober curious? There’s an app—in fact, a whole community—for that

When serial entrepreneur MJ Gottlieb, 48, was trying to get sober years ago, he completely avoided drinking establishments. That proved no easy feat when there were at least 14 bars in a two-block radius around his home in New York City and so many friends and colleagues relied on the usual social outings. “There was like nothing else people would come [up with] than ‘let’s grab a drink’ or ‘let’s tailgate,’” says Gottlieb. “Everything seemed to be centered around alcohol.” [Image: Loosid] At the time, Gottlieb ran a strategic consulting firm which specialized in small brands. To unwind, he inevitably wound up in one of two places: coffee shops and diners. Those became his entire social scene. But it got old, quick. Read More …

We keep falling for phishing emails, and Google just revealed why

You should feel cranky about all the phishing emails you get. Because getting your brain in a grumpy gear will elevate the odds of your not getting fooled by the next phony invitation to log into your account. At a briefing Wednesday evening at the Black Hat security conference in Las Vegas, Google security researcher  Elie Bursztein and University of Florida security professor Daniela Oliveira shared that and other insights about the business of coaxing people into giving up their usernames and passwords. The first thing to know about phishing: It’s not as random and sloppy as it might seem. Said Bursztein: “Phishers have constantly refined.” The roughly 100 million phishing emails Google blocks every day fall into three main categories: highly targeted but low-volume spear phishing aimed at distinct individuals, “boutique phishing” that targets only a few dozen people, and automated bulk phishing directed at thousands or hundreds of thousands of people. Those categories differ in duration. Google typically sees boutique campaigns wrap up in seven minutes, while bulk phishing operations average 13 hours. Google also sees most phishing campaigns target its commercial mail service . Bursztein said Google-hosted corporate email accounts were 4.8 times more likely to receive phishing emails than plain old Gmail accounts. Email services were the most commonly impersonated login page in those attempts, at 42%, followed by cloud services (25%), financial institutions (13%), online retail (5%), and delivery services (4%). Bursztein noted that Google still can’t definitely identify many phishing emails—as improbable as that might seem, considering all the data it collects. That explains why Gmail shows an orange box above messages that look somewhat suspicious but aren’t necessarily attacks. This is your brain on phishing attacks The presentation also covered the human factors that make phishing easier. As Oliveira explained, “When we are in a good mood, our deception-detection accuracy tends to decline.” She cited research showing that increased levels of such feeling-good hormones as testosterone and estrogen, oxytocin, serotonin, and dopamine increase people’s risk-taking appetite. But a jump in cortisol levels associated with stress makes us warier. Presumably, the soundtrack for your mail screening should not be Marvin Gaye’s “Let’s Get It On” but the J. Read More …

How this program turns ordinary teens into tech superheroes

In 2016, Ananya Chadha was just a regular 14-year-old girl struggling to fit in at her high school in Toronto. She often had sci-fi-inspired fantasies about building futuristic technologies like jet-pack shoes, going so far as to look into where she could buy parts. Then one day two brothers, Navid and Nadeem Nathoo, came to her school and described a new type of educational program they started called The Knowledge Society , or TKS. “They talked about essentially creating the next Elon Musk,” recalls Chadha, now 18 years old. “When they talked about taking crazy ideas and unconventional paths and making it real, I was like ‘Wow, I need this.’” It would sound like a rip-off of a classic superhero story if it weren’t completely true: ordinary teenagers being recruited into an elite program designed to give them the power to do extraordinary things, and maybe even save the world. While many programs like Code for America and the Flatiron School focus on teaching entrepreneurship or tech skills to high school students, TKS, which was founded in 2016, is unique for giving students both the hard skills they need to build next-generation solutions to some of the world’s biggest problems as well as the soft skills they need to communicate and create them. Ananya Chadha at TKShowcase [Photo: courtesy of TKS] Soon after enrolling in the program, Chadha was working in a gene-editing lab, where she discovered a problem with the homogeny of samples used in data sets. That inspired her to develop a blockchain-based application that compensates users for uploading anonymous genetic information to help diversify the data pool. After the app, G-gnome, was acquired by a blockchain startup, she switched her focus to computer-human interfaces. In 2018 Chadha secured a sponsorship from Microsoft to build a remote control car that she can control by meditating . Today she interns for IBM. “What I found unique was their ability to connect advances in bleeding-edge technologies to tackle hard problems our society faces on daily basis,” says Piotr Mierzejewski, the director of Db2  deployment for IBM Data and AI. “These young minds don’t seem to be discouraged by how hard and complex problems they are trying to solve are; they simply face the challenge to find solutions.” In recent months Chadha has presented her work at some of the biggest technology conferences in the world, she was named to the 2019 class of Canada’s Developer 30-Under-30 , and she won First Prize in engineering.com’s Impossible Science Challenge. Chadha, however, is just one of almost 400 students who have achieved incredible feats after enrolling in TKS. Building the next Elon Musk After the Nathoos spent three years developing the program in Toronto and Waterloo, TKS is expanding to New York, Boston, Las Vegas, and Ottawa in the fall— enrolling 80 students in each new chapter—and offering a new program in Toronto for students as young as nine. Navid and Nadeem-Natho [Photo: courtesy of TKS] “The whole reason why we’re scaling is because I strongly believe that we are not short on human potential,” says Navid Nathoo. Read More …

These are the sneaky new ways that Android apps are tracking you

You could admire the tenacity if it didn’t come with such trickery: After years of effort by Google to stop Android apps from scanning users’ data without permission, app developers keep trying to find new work-arounds to track people. A talk at PrivacyCon , a one-day conference hosted by the Federal Trade Commission last Thursday, outlined a few ways apps are prying loose network, device, and location identifiers. Officially, apps generally interact with Android through software hooks known as APIs, giving the operating system the ability to manage their access. “While the Android APIs are protected by the permission system, the file system often is not,” said Serge Egelman , research director of the Usable Security and Privacy Group at the University of California at Berkeley’s International Computer Science Institute. “There are apps that can be denied access to the data, but then they find it in various parts of the file system.” In a paper titled ‘ 50 Ways to Leak Your Data: An Exploration of Apps’ Circumvention of the Android Permissions System ,’ Egelman and fellow researchers Joel Reardon, Álvaro Feal, Primal Wijesekera, Amit Elazari Bar On, and Narseo Vallina-Rodriguez outlined three categories of exploits discovered through an array of tests. One common target, Egelman explained Thursday, is the hard-coded MAC address of a WiFi network—”a pretty good surrogate for location data.” The researchers ran apps on an instrumented version of Android Marshmallow (and, later, on Android Pie). Deep-packet inspection of network traffic found that apps built on such third-party libraries as the OpenX software development kit had been reading MAC addresses from a system cache directory. Other apps exploited system calls or network-discovery protocols to get these addresses more directly. Egelman added that the workings of these apps often made the deception obvious to researchers: “There are many apps that we observed which try to access the data the right way through the Android API, and then, failing that, try and pull it off the file system.” Obtaining a phone’s IMEI (International Mobile Equipment Identity), an identifier unique to each device, can be even more effective for persistent tracking. The researchers discovered that advertising libraries from Salmonads and Baidu would wait for an app containing their code to get permission from the user to read the phone’s IMEI, then copy that identifier to a file on a phone’s SD Card that other apps built on these libraries could read covertly. “This corresponds to about a billion installs of the various apps that are exploiting this technique,” Egelman warned. Finally this team observed the Shutterfly photo-sharing app working around the lack of permission for location data by reading geotags off photos saved on the phone—and then transmitting those coordinates to Shutterfly’s server. Shutterfly communications director Sondra Harding responded in an email on Tuesday, saying the app only reads photos after a user allows access: “There are multiple opportunities in the user experience for granting this permission, including opting in to auto-upload, pulling a local photo into a product creation path, the app settings, etc.” This study and another presented Thursday—’ Panoptispy: Characterizing Audio and Video Exfltration from Android Applications ,’ by Elleen Pan of Northeastern University with Jingjing Ren, Martina Lindorfer, Christo Wilson, and David Choffnes—did not, however, report evidence that Facebook’s apps were exploiting any loopholes to surreptitiously listen to ambient real-world audio. The theory that Facebook or others are doing that keeps coming up despite strenuous, on-the-record denials —and in any case, the current Android Pie release blocks apps from recording audio or video in the background Read More …

These 5 apps can help you find your next big idea, faster

They say a mind is a terrible thing to waste. Know what else is terrible to waste? Time! So instead of spinning endlessly in your Herman Miller waiting for inspiration to strike, check out these useful tools that can help you generate new ideas in the most expeditious fashion. 1. Set the mood First, we need to get that beautiful mind of yours warmed up Read More …