Police have turned to using stored data from devices to help solve crimes, such as when the cops used pacemaker data to catch a perp. This time, though, the cops relied on data from a device that a hitman could have removed: a smart watch.

Mark Fellows, who was also an avid runner and cyclist, was given an indefinite life sentence after police used data from a Garmin GPS watch (a Garmin Forerunner 10) to map out Fellows’ reconnaissance of his target, the route taken to gun down his target (a “crime boss known as Mr. Big”), as well as his escape route. The cops also relied on data from a TomTom Start satellite navigation system, cell site evidence and CCTV surveillance footage, but it was the smartwatch that provided “key evidence” in the case.

Other cybersecurity and privacy news

Researchers find browser extensions bypassing Same Origin Policy to maliciously access user data

If you use browser extensions, then you might want to check out the list of extensions that are capable of accessing sensitive user data, including credentials, and downloading and saving files on a user’s device. For their report, researchers at Universite ́ Coˆte d’Azur analyzed over 78,000 Chrome, Firefox and Opera add-ons; 197 of them were malicious, with 171 of those being Chrome extensions.

3 micropatches for 3 Windows zero-days

The 0patch team released three micropatches to protect against three different Windows zero-days: the “angrypolarbearbug,” the readfile, and arbitrary code execution related to VCF and Windows Contact files.

Source link