Category Techniques

What is tabnabbing?

Tabnabbing is a phishing attack that takes advantage of an idle tab in your internet browser. When a malicious script detects that the user has moved to another tab or has been inactive for some time, it quietly refreshes the idle background tab, redirecting it to a fake login page of a seemingly legitimate website. When you click on the tab, you’ll probably assume that you opened the site yourself. If you log in, your credentials are sent to the owner of the malicious website.

To prevent tabnabbing, keep as few tabs open as possible. Check the address bar for the correct url. Look out for differences between the page and the genuine site (e.g., spelling mistakes and unusual layouts).

Tabnabbing is a social engineering attack. It depends on the victim’s attentiveness and the ability of the hacker to con the victim into believing in his malicious site.

 

Picture Credit : Google

KeyChain – The world’s smallest 4K vlogging camera

KASO’s Keychain 4K is said to be the world’s smallest 4K vlogging camera. You can record for up to 60 minutes, take time lapses and slow motion captures and stills, courtesy of its 20-megapixel photo mode. The camera features 4K/30 fps recording capabilities, image stabilization, a 1240 field of view, six-axis, anti-shake technology, and hands-free shooting. It has six LED lights arranged around the lens to act as a flash to illuminate its subject. All this is packed into a 36-gram casing with an IP56 waterproof rating. KeyChain measures 63x33x18 mm with a micro SD card slot for storage and a USB-C slot for recharging. It comes with a pivot stand and mount base, a carry-on camera case, a magnet pendant and an easy clip to help you share your adventures by attaching it to your backpack or tee to record all you do. The accompanying app features editing and effects options, you can even reverse the entire video so it plays backwards. The ‘advanced edit suite allows for adding subtitles, stickers, doodles, placing another video/photo in the frame picture-in-picture style, adding music or increasing the speed.

 

Picture Credit : Google

“The world is in trouble,” so Sir David Attenborough has joined Instagram!

94-year-old natural historian and broadcaster, Sir David Attenborough said he’s joined Instagram because “saving our planet is now a communications challenge. We know what to do, we just need the will.” Attenborough reached a million Instagram followers in a record-breaking time: 4 hours 44 minutes. He currently has over 4.8 million followers.

“I’m making this move and exploring this new way of communication to me, because as we all know, the world is in trouble. Continents are on fire. Glaciers are melting. Coral reefs are dying. Fish are disappearing from our oceans. The list goes on and on and on,” added Attenborough. Attenborough will be using Instagram to share messages explaining the problems our planet is facing, and possible solutions for tackling those issues. To follow Sir David on Instagram, go to @David Attenborough.

 

Picture Credit : Google

Is zoom the same as Google meet?

Video calling apps like Zoom call it ‘sharing but Google Meet likes to call it ‘presenting’. That’s why you won’t find the share button in Meet. Instead, click on the ‘Present now button at the bottom of the screen to reveal sharing options. You can present your entire screen, a window or just a Chrome browser tab. Clicking on the window option will allow you to select any open window on your computer. That could be an open folder, file or an app The rest will stay hidden.

Since video conferences are no longer limited to desktops and laptops, both Google Meet and Zoom are available for mobile devices based on Android and iOS. Google Meet is also accessible directly through Chrome and other modern browsers and doesn’t require any additional plugins. You just need to visit meet.google.com to host a meeting. Similarly, you can participate in a scheduled meeting by visiting its link in your eligible browser. This isn’t the case with Zoom as it doesn’t allow you to host a meeting through a browser. Nevertheless, you can join a meeting via your browser. There are also plugins for Google Chrome and Mozilla Firefox that you can use to schedule your meeting.

Zoom is popular for its Gallery view that displays up to 49 participants on a single screen. However, Google Meet recently mimicked that interface by enabling an expanded tiled layout that simultaneously shows up to 16 participants at once. Google also recently added a low-light mode that uses artificial intelligence (AI) to adjust video on the basis of lighting conditions. The feature is initially limited to mobile users, though.

 

Picture Credit : Google

What is Restflix?

Getting enough sleep is an essential part of our health but sometimes it’s hard to turn your mind off at night. Restflix is designed to help users fall asleep faster and stay asleep through the night. It uses a technology called binaural beats’ to harness the brain’s responsiveness to sound and help create a restful state. The sleep streaming service offers over 20+ channels filled with hundreds of hours of soothing bedtime stories, music, meditations and dark screen videos that aim to ease anxiety OS and stress and fall into a peaceful slumber. Fall asleep to ocean sounds, o rainstorms and the chirp of nature, along with visual aids. Even if you’re not having trouble sleeping, Restflix is a helpful tool for relaxation. The app is compatible with iOS, Amazon Fire, Apple TV, Roku and Android.

Even if you’re not having trouble sleeping, Restflix can be a valuable tool to help you relax and develop a healing meditation practice.

The good news is that the reviews back up what it claims to do, too. Restflix has earned perfect 5-star ratings on both the Google Play Store and App Store because it really works. You don’t have to struggle to sleep each night and drag through each day. Get the best sleep of your life with Restflix. Right now, you can save big. Get 40 percent off a one-year subscription at just $29.99, 50 percent off a two-year subscription at $49.99, or 59 percent off a three-year subscription at $59.99.

 

Picture Credit : Google

A mask that integrates safety with hands-free access to your smartphone

Maskfone is a “hands-free” smart mask that allows wearers to take calls, listen to music, and access their virtual assistant without removing their protective barrier. It has medical-grade, replaceable PM 2.5 and N95 filters, IPX5 water resistance, adjustable neoprene rubber ear hooks, a cable clip and the fabric used is washable too. An internal microphone provides access to clearer voice calls thanks to background noise isolation, while a wireless Bluetooth headset offers 8-12 hours of playtime/listening, whether it be to music, podcasts, audio books or phone calls. It even allows the user to use voice projection while speaking to someone in person powered by Hubble M HASKFON connect app. Masfone is compatible with voice assistants like Alexa, Siri and Google Assistant, so users will be able to use it to control smart home appliances as well.

 

Picture Credit : Google

How dogs and machines sniff out drugs and explosives?

After five women form Bogota, Colombia, aroused suspicion at London’s Heathrow Airport in 1988, sniffer dogs were brought in to examine their luggage. The dogs led customs men to 20 LP records in each of the women’s suitcases. When the vinyl layers of the records were split open, cocaine was discovered sandwiched between the halves. A total of 16 kilos of the drug was found in the records and in the jackets of books. The women were all jailed for 14 years.

Sniffer dogs are used by police and customs throughout the world to detect drugs and explosives.

Dogs that are trained for the job include natural retrievers used in filed sports, such as Labradors, collies and spaniels. Dogs have a far better sense of smell than people because the smell receptors at the top of a dog’s nose are 100 times longer than in humans.

The training course for a sniffer dog normally lasts about 12 weeks. The dog is first taught to recognize a particular drug or explosive.

Its handler conceals a sample of the substance inside something the dog can grip in its mouth – a rolled-up newspaper, a piece of pipe or a rag – which is known as a training aid.

The dog is commanded to bring the aid back to the handler, and then receives a reward. The reward will be whatever that particular dog enjoys doing – usually a friendly fight with the handler or a game of hide-and-seek.

The dog learns to recognize the smell of the training aid, which is in fact the smell of the drug or explosive. The type of training aid is changed regularly, but the smell always remains the same. At fist the aid is placed within sight of the dog, but is then hidden out of sight.

Smells such as perfumes, which some smugglers spread to disguise the scent of drugs, are also used so that the dog becomes familiar with them.

A dog can eventually be trained to respond to up to 12 different types of explosives and four different types of drugs, usually cannabis, cocaine, heroin and amphetamine.

When a dog is sent out to search for drugs, perhaps in a lorry or warehouse, it is put into a special harness – a signal that it should start working. When it locates a smell which it knows will lead to a reward, it will become agitated and excited.

Other customs or police officers then take over.

The handler drops a training aid where the dog will see it and return it, and the dog then gets its reward.

Air samples

Machines that are used to detect drugs and explosives suck in air through a tube that can be inserted into concealed spaces such as petrol tanks, paneling in vehicles or gaps between walls.

They also take air samples from containers and lorries where drugs and explosives might be hidden.

The samples are analyzed by a machine called a mass spectrometer which breaks them down into their chemical parts and identifies minute traces of individual substances used in explosives or drugs.

It is claimed that traces as small as one-trillionth of a gram can be detected.

Electron movement

‘Sniffer’ machines large enough for people to walk through have been installed at the Houses of Parliament in London and at some international airports, including Seoul before the 1988 Olympic Games. They can detect dynamite or nitroglycerine, which gives off a vapour that attracts electrons. A current running through the sniffer machine detects the movement of the electrons.

 

Picture Credit : Google

When a new job depends upon your handwriting

Applicants for the job of deputy personnel of a computer company had been whittled down to two young men of equal experience, skill and qualifications. Outwardly, there seemed little to choose between them – so the interviewing board called in a graphologist, or handwriting analyst, to assess character and potential.

The handwriting of the first applicant was large, fluid and rounded, that of the second was small, sharp and angular. According to the graphologist, the first handwriting showed someone who was self-confident, flexible and who got on well with people. The second handwriting, however, portrayed someone who – despite his social and professional ‘front’ – was self-doubting and rigid. So the job went to the first applicant.

Graphologists maintain that handwriting – from public relations companies to banks – use expert handwriting analysts for sifting through job applicants, requests for promotion, and business ideas that come through the post. In West Germany 80 per cent of major companies employ graphologists for personnel selection. It is not widely used in Australia although the practice is growing around the world.

Its adherents claim that it is an effective way of deciding whether a person can be trusted. In the USA –where firms lose up to $40,000 million each year to dishonest employees – graphology has taken the place of polygraph, or lie detector tests, which are no longer legal.

Critics of graphology say that it has no firm validity. Not only are many handwriting experts self-trained but their evaluation are often found to contradict each other.

However, most graphologists agree on certain basic concepts – such as the importance of assessing character on a combination of several main factors, and not any one ‘peculiar’ characteristic.

They divide handwriting into three ‘zones’: the upper and lower zones, formed by the tops and bottoms of capital letters and other letters such as b, d and g; and the middle zone, containing the remaining small letters. The relative forms and sizes of the zones are said to reveal people’s true selves.

For example, a large upper zone indicates someone who is outgoing and cheerful; a small lower zone suggests someone shallow and emotionally stunted; and an average-sized middle zone may point to someone who is well-organized and practical.

 

Picture Credit : Google

How handwriting experts catch criminals?

On the afternoon of July 4, 1956, Mrs. Beatrice Weinberger brought her month-old baby, Peter, back from an outing near their home in Westbury, Long Island, USA. She left the pram on the patio of her house and hurried inside to get the baby a clean nappy. When she returned a few moments later, the pram was empty – and a scrawled note was lying where Peter had been.

The note said: ‘Attention. I’m sorry this had to happen, but I’m in bad need of money, and couldn’t get it any other way. Don’t tell anyone or go to the police about this because I am watching you closely. I’m scared stiff, and will kill the baby at your first wrong move.

‘Just put $2000 (two thousand) in small bills in brown envelope, and place it next to the signpost at the corner of Albemarle Rd. and Park Ave. at exactly 10 o’clock tomorrow (Thursday) morning.

‘If everything goes smooth, I will bring the baby back and leave him on the same corner “Safe and Happy” at exactly 12 noon. No excuse, I can’t wait! Your baby-sitter.’

Despite the kidnapper’s warning. Mr. and Mrs. Weinberger, frantic with worry, contacted the police.

A dummy parcel containing cut-up pieces of newspaper was placed on the corner the following morning. But the kidnapper did not show up. He failed to keep two other ‘appointments’ with the Weinberger, and left a second note signed ‘Your baby-sitter’. By then, police felt that the baby was no longer alive.

The FBI was called in and the Bureau’s handwriting experts set to work to try to track down the kidnapper. In both the ransom notes an unusual z-shaped stroke was placed at the front of the y in words such as ‘money’ and ‘baby’.

Starting with New York State Motor Vehicle Bureau, the analysts spent the next six weeks combing through local records and at probation offices, work places, factories, aircraft plants, clubs and schools.

Altogether, more than 2 million signatures and handwriting samples were examined by eye and compared to the writing on the ransom notes.

Then, in the middle of August, the experts’ painstaking efforts paid off. The handwriting of Angelo John La Marca, of Plainview, Long Island, matched that of the kidnapper’s – especially in the peculiar formation of the y’s.

Some time previously La Marca had been put on probation for making illegal alcohol. On being shown the handwriting samples, he broke down and confessed to the kidnapping of baby Peter.

It had been a super-of-the-moment crime, he stated, committed to ease his financial problems. He told the police he had left Peter alive and well in a nearby park on the day after the kidnapping. But when officers hurried to the spot, all they found was the infant’s dead body. La Marca was later executed in New York’s Sing Sing Prison.

Even if La Marca had tried to disguise his handwriting he probably would still have been caught.

No matter how hard someone may try to disguise handwriting quirks and characteristics – or adopt those of somebody else – the ‘individuality’ of the writer shows through. The very angle at which he or she holds a pen; the way a t is crossed and an I is dotted; the height and size of capital and small letters; the amount of space between words; the use (or misuse) of punctuation marks. All these can identify a person as surely as fingerprints.

In 1983 Gary Herbertson, the head of the FBI laboratory’s document department, stated: ‘Any time you try to change your handwriting; you do things that look unnatural. A forger’s writing doesn’t have the speed, fluidity, the smoothness of natural writing.

‘You can see blunt beginnings and ends of strokes, rough curves, inappropriate breaks, little tremors. Two letters may be the same shape, but you can tell if one’s written quickly and the other is carefully drawn.’

In addition to their knowledge, handwriting experts use sophisticated instruments and machines in their work. These include infrared and ultraviolet scanning devices with which they look beneath erasures and changes; spilt-screen equipment for comparing dubious documents with genuine ones; and tools for greatly magnifying handwriting and comparing different ways of joining up letters.

The most notorious handwriting case in recent times involved the forgiving in the early 1980s of the ‘diaries’ of Adolf Hitler – committed his innermost thoughts in an antiquated German script. They included an entry on the Russian attack on Berlin in April 1945, when – in his bunker hide-out – Hitler allegedly wrote: ‘The long-awaited offensive has begun. May the Lord God stand by us.’

The 60 diaries were bought by the German weekly news magazine Stern for a reputed 6 million marks. Stern then sold subsidiary rights in France, Spain, Belgium, Holland, Italy, Norway and England – where extracts were published in the Sunday Times.

Publication in Germany began in the spring of 1983. And two of the diaries – from 1932, the year before Hitler became dictator, and 1945, the year of his suicide – were sent to the American magazine Newsweek, which was also interested in publishing them.

The magazine called in a leading handwriting expert, Kenneth Rendell, of Boston, Mass – who was immediately suspicious. ‘Even at first glance,’ he stated, ‘everything looked wrong.’

Using a powerful microscope and samples of Hitler’s genuine handwriting, he compared the two sets of writing – particularly the capital letters E, H and K – and found major discrepancies and dissimilarities between the two. These convinced Rendell that the diaries were fakes. In addition, the ink proved to be modern; and Hitler, when he had made notes and records in the early 1930s, had used only the finest quality, gold-embossed paper. He would not have resorted to the sort of cheap, lined notepaper on which the fake diaries were written.

As a result of the expose, a German criminal with a string of convictions – Konrad Paul Kujau – was later arrested along with two accomplices and tried for forging the diaries. In July 1985 he was found guilty by a Hamburg court and sentenced to four and a half years imprisonment. Once again, the handwriting expert had exposed the handwriting cheat.

 

Picture Credit : Google

How do police create an Identikit of a wanted man?

In February 1959 an armed robber held up a liquor store in southern California and made off which the takings, it was a typical small-time crime, but for one thing: the store owner gave Sheriff Peter Pitches of Los Angeles County Police a detailed description of the robber. This enabled the police to create a lifelike portrait of the wanted man.

Pictures of the robber were circulated in the area and, as a result of them, he was identified and arrested. He confessed to the crime and was duly punished – so becoming the first criminal in the world to be caught by means of Identikit.

The system had been conceived in the mid-1940s principally by Hugh C. McDonald, a detective with the Los Angeles Identification Bureau. Taking some 50,000 photographs of people’s faces, he cut them into some 12 main sections – and used them as the basis of what he called Identikit.

This consisted of almost 400 different and contrasting pairs of eyes, lips, noses, chins, hairlines, eyebrows, beards, moustaches  and so on. To build up a likeness, the various features were drawn on transparent plastic sheets, which were changed and overlaid until a composite portrait was created that matched eyewitness descriptions of the wanted person.

The use of photographs or artists’ impressions to identify and apprehend criminals dates back to the 1880s in France. Then a French criminologist named Alphonse Bertillon introduced a system which he called portrait parle, or ‘speaking portrait’. It involved the use of front and side photographs of captured criminals, cut into sections and mounted so that particular features – a hooked nose, a pointed chin, protruding ears and so forth – could be studied.

In the mid-1970s a second and now more commonly used Identikit system was introduced in North America. It was developed by Pat Dunleavy, an officer in the Royal Canadian Mounted Police, and it uses plastic sheets which contain actual photographs of facial features.

In the United Kingdom a system called Photo-FIT (Facial Identification Technique) has been used by the police since 1970. It is also used in Australia where it is commonly known as the Penry system. Photo-FIT also uses real photographs of ‘ordinary’ people mounted on thin plastic sheets. The basic five-section kit consists of 195 hairlines, 99 eyes and eyebrows, 89 noses, 105 mouths, and 74 chins and cheeks, which enable billions of possible combinations to be assembled. Features such as facial hair and spectacles are available as overlays. The pieces are cut so that the length and width the composite face can be fitted into a frame which holds them in place.

The basic kit relates to Caucasian (white) faces and there are supplementary kits to give North American Indian, Indian subcontinent and Afro-Caribbean features. A kit has not yet been developed for Oriental faces, which are usually drawn by artists.

Witnesses of crimes are interviewed by the police as soon after the events as possible – most people’s ability to recall starts to diminish after about a week.

For both Photo-FIT and Identikit, detectives begin by asking witnesses to recall details of the crime itself. They then move on to general descriptions of the suspect or suspects. For instance, were they short and burly, or lean and tall? What sort of clothes were they wearing? And what did the suspects actually do at the scene of the crime? Only then are the witnesses asked about facial details.

They leaf through books, or ‘feature atlases’ containing the various Photo-FIT or Identikit sheets, from which they make their selections. Faces are put together sheet by sheet, or strip by strip.

Often, a police artist is then called in to heighten the picture. A clear plastic sheet is laid over it and fine details such as hair shade, skin blemishes, scars or shaped eyebrows are added. The picture is then covered with an artist’s fixative spray and is signed by the witness.

Recently, computer technology has been introduced to enhance the pictures. This enables extremely lifelike faces to be drawn n computer screens according to eyewitness, descriptions, and fine alterations can be made to the image. From this, a photograph-like print can be obtained.

In addition, police mugshots (photographs of arrested criminals) can be stored on computer. They are coded according to physical characteristics and the computer can choose a selection which most closely matches witness descriptions.

 

Picture Credit : Google