Skip to main content

Security

Russia's FireEye Hack Is a Statement—but Not a Catastrophe

posted onDecember 9, 2020
by l33tdawg
Credit: Wired

FireEye has built its reputation on defending high-stakes clients from hackers. Today, the cybersecurity firm acknowledged that it had itself been the victim of a breach—and that the attackers made off with some of its offensive tools. It's a startling admission but almost certainly not as devastating as it may first sound.

VMware rolls out security updates to address zero-day bug

posted onDecember 8, 2020
by l33tdawg
Credit: computing.co.uk

VMware has rolled out security updates to address a zero-day vulnerability that impacts VMware Workspace One Access and other platforms for both Windows and Linux systems.

The bug, indexed as CVE-2020-4006, was publically disclosed last month and VMware warned that it could allow an attacker to take control of a vulnerable system. The company also published workaround instructions to help admins mitigate the flaw on affected systems.

Spotify resets up to 350,000 passwords linked to third-party data leak

posted onNovember 25, 2020
by l33tdawg
Credit: Engadget

Spotify has reportedly begun resetting the passwords of up to 350,000 accounts that were breached as the result of a credential-stuffing attack. A company called vpnMentor, as found by ZDNet, says that it discovered a treasure trove of hacked account data available online. This information was used by some nefarious types to gain access to the streaming music platform and generally cause havoc. ZDNet says that the company has now begun

How one security researcher is working to secure vulnerable IoT devices

posted onNovember 25, 2020
by l33tdawg
Credit: Flickr

Device manufacturers were quick to capitalize on the rise of the Internet of Things (IoT) and the possibilities of what could be accomplished if so-called smart devices were able to communicate with one another. However, as they worked to bring these devices to market quickly, many hardware makers failed to secure them properly by doing things such as not actively encouraging users to change the default credentials of their devices.

This Bluetooth Attack Can Steal a Tesla Model X in Minutes

posted onNovember 25, 2020
by l33tdawg
Credit: Wired

Tesla has always prided itself on its so-called over-the-air updates, pushing out new code automatically to fix bugs and add features. But one security researcher has shown how vulnerabilities in the Tesla Model X's keyless entry system allow a different sort of update: A hacker could rewrite the firmware of a key fob via Bluetooth connection, lift an unlock code from the fob, and use it to steal a Model X in just a matter of minutes.

Police used facial recognition tech on a Twitter video to find and charge a Lafayette Square protester with assault

posted onNovember 3, 2020
by l33tdawg
Credit: Wired

New court documents show how police can use facial recognition tech on videos posted on social media platforms such as Twitter to track down suspects.

The Washington Post reported on a case Monday concerning a man present at Lafayette Square, Washington DC on June 1. On that day, police forcibly removed peaceful Black Lives Matter protesters using tear gas and rubber bullets ahead of President Trump arriving for a photo-op outside St. John's Church.