Skip to main content

Security

Dell unveils new tool to protect PCs from BIOS attacks as people work remotely

posted onApril 13, 2020
by l33tdawg
Credit: Neowin

Dell introduced today a new security offering designed to help protect PCs from cyber attacks at the BIOS level. The company notes that cybercriminals are "altering their attack methods to compromise endpoints and access critical data" as more people are increasingly resorting to the work-from-home program due to coronavirus-related concerns.

Serious cyber-security flaws uncovered in Ford and Volkswagen cars

posted onApril 10, 2020
by l33tdawg
Credit: E&T

Connected vehicles produced by both Ford and Volkswagen have serious security flaws which could allow them to be hacked, according to a Which? investigation.

The consumer group said that connected tech features of the Ford Focus Titanium Automatic 1.0L petrol and a Volkswagen Polo SEL TSI Manual 1.0L petrol – the latest models of two of the most popular cars in Europe - were vulnerable.

Meet dark_nexus, quite possibly the most potent IoT botnet ever

posted onApril 10, 2020
by l33tdawg
Credit: Arstechnica

A newly discovered botnet that preys on home routers, video recorders, and other network-connected devices is one of the most advanced Internet-of-things platforms ever seen, researchers said on Wednesday. Its list of advanced features includes the ability to disguise malicious traffic as benign, maintain persistence, and infect devices that run on at least 12 different CPUs.

Flaw hunter bags $75,000 off Apple after duping Safari into spying through iPhone, Mac cameras without permission

posted onApril 7, 2020
by l33tdawg
Credit: The Register

Independent security researcher Ryan Pickren has revealed how a malicious website could hack Apple's Safari browser on iOS and macOS to spy on the user through the computer's camera without prompting for permission.

Pickren said Apple classified the bug as "one-click remote partial access to sensitive data," and awarded him $75,000 under the terms of its Security Bounty scheme.

Yet another study finds that Android security is total crap

posted onApril 7, 2020
by l33tdawg
Credit: BGR

Thousands of Android apps have been found as part of a new study to contain hidden backdoors that facilitate secret behavior, including everything from changing user passwords to preventing users from accessing specific content that’s sometimes political in nature.

Want to stay under the radar for a decade or more? This Chinese hacking crew did it... by aiming for Linux servers

posted onApril 7, 2020
by l33tdawg
Credit: The Register

A group of hackers operating as an offshoot of China's Winnti group managed to stay undetected for more than a decade by going open source.

A report from BlackBerry outlines how the group, actually a collection of five smaller crews of hackers thought to be state-sponsored, assembled in the wake of Winnti and exploited Linux servers, plus the occasional Windows Server box and mobile device, for years.

Patrick Wardle drops new zero-day doom for Zoom

posted onApril 1, 2020
by l33tdawg
Credit: Tech Crunch

Zoom’s troubled year just got worse.

Now that a large portion of the world is working from home to ride out the coronavirus pandemic, Zoom’s popularity has rocketed, but also has led to an increased focus on the company’s security practices and privacy promises. Hot on the heels of two security researchers finding a Zoom bug that can be abused to steal Windows passwords, another security researcher found two new bugs that can be used to take over a Zoom user’s Mac, including tapping into the webcam and microphone.

North Korea-linked Geumseong121 APT group is sending spear-phishing emails to target people interested in North Korean refugees

posted onApril 1, 2020
by l33tdawg
Credit: computing.co.uk

The researchers from South Korea-based cyber security firm ESTsecurity claim to have uncovered a new cyber espionage campaign, which they believe is being carried out by North Korea-backed APT group Geumeong121.

The researchers said they discovered the new spear-phishing operation based on the indicators of compromised data and the evidence collected by threat intelligence multi-channel sensors.

Microsoft warns hospitals about VPN cyberattacks during coronavirus

posted onApril 1, 2020
by l33tdawg
Credit: CNet

Up to 80% of Americans are on government-mandated lockdowns, forcing many of them to work from home while they keep away from the office to avoid spreading the novel coronavirus. Many of these people use technology to access their work called virtual private networks, or VPNs. And now Microsoft says that those companies -- and specifically health care workers -- need to be on the lookout for a different breed of threats that come from them.

You might want uninstall Houseparty, expert calls it a privacy ‘trojan horse’

posted onApril 1, 2020
by l33tdawg
Credit: Android Authority

The group video chat app Houseparty has spiked in popularity after millions of people around the world began practicing social isolation amid the COVID-19 pandemic. Houseparty touts a slew of unique, easy-to-use features that make group video calls more fun, but it also comes with a plethora of privacy concerns.