Skip to main content

Security

Israeli soldiers tricked into installing malware by Hamas

posted onFebruary 18, 2020
by l33tdawg
Credit: Tech Radar

Dozens of Israeli soldiers have fallen victim to a hacking scheme orchestrated by the Hamas militant group which infected their smartphones with malware.

A spokesperson for Israel's military revealed that the soldiers were sent fake photos of young women in an effort to lure them to download an app that could access their devices without their knowledge.

Estonian foreign intelligence warns of growing cyber threats from Russia

posted onFebruary 18, 2020
by l33tdawg
Credit: computing.co.uk

Russia will continue to engage in cyber operations to threaten Western nations, with sanctions so far proving ineffective.

The warning comes from the Estonian Foreign Intelligence Service (EFIS), which in its 2020 annual threat assessment report states that Russian cyber operations have been successful so far and will continue to look for new security vulnerabilities to exploit in coming months.

Mobile security: Worse than you thought

posted onFebruary 18, 2020
by l33tdawg
Credit: Computer World

Many security professionals have long held that the words "mobile security" are an oxymoron. True or not, with today's mobile usage soaring in enterprises, that viewpoint may become irrelevant. It's a reasonable estimate that 2020 knowledge workers use mobile devices to either supplement or handle much of their work 98% of the time. Laptops still have a role (OK, if you want to get literal, I suppose a laptop can be considered mobile), but that's only because of their larger screens and keyboards. I'd give mobile players maybe three more years before that becomes moot.

Five years after the Equation Group HDD hacks, firmware security still sucks

posted onFebruary 18, 2020
by l33tdawg
Credit: ZDNet

In a report published today, Eclypsium, a cyber-security firm specialized in firmware security, says that the issue of unsigned firmware is still a widespread problem among device and peripheral manufactures.

According to researchers, many device makers still don't sign the firmware they ship for their components. Furthermore, even if they sign a device's firmware, they don't enforce checks for the firmware signature every time the driver/firmware is loaded, but only during installation.

Hundreds of Millions of PC Components Still Have Hackable Firmware

posted onFebruary 18, 2020
by l33tdawg
Credit: Wired

That laptop on your desk or server on a data center rack isn't so much a computer as a network of them. Its interconnected devices—from hard drives to webcams to trackpads, largely sourced from third parties—have their own dedicated chips and code as well. That represents a serious security problem: Despite years of warnings, those computers inside your computer remain disturbingly unprotected, offering an insidious and nearly undetectable way for sophisticated hackers to maintain a foothold inside your machine.

Signal is finally bringing its secure messaging to the masses

posted onFebruary 18, 2020
by l33tdawg
Credit: Arstechnica

Last month, the cryptographer and coder known as Moxie Marlinspike was getting settled on an airplane when his seatmate, a midwestern-looking man in his 60s, asked for help. He couldn't figure out how to enable airplane mode on his aging Android phone. But when Marlinspike saw the screen, he wondered for a moment if he was being trolled: Among just a handful of apps installed on the phone was Signal.

Foreign hackers are targeting more US government agencies, report says

posted onFebruary 11, 2020
by l33tdawg
Credit: CNet

More foreign countries, militias and other groups are targeting US intelligence agencies with hacking, according to a report Monday from the National Counterintelligence and Security Center. Not only that, but they're increasingly targeting the private sector and government agencies that aren't directly involved in national security, says the report, which outlines a strategy for addressing the hacking threat.

Google Chrome will block insecure downloads in coming months

posted onFebruary 11, 2020
by l33tdawg
Credit: Wikipedia

Google has revealed plans to initially warn Chrome users about “insecure” downloads and eventually block them outright. “Today we’re announcing that Chrome will gradually ensure that secure (HTTPS) pages only download secure files,” Joe DeBlasio of the Chrome security team wrote in a blog post. “Insecurely-downloaded files are a risk to users’ security and privacy. For instance, insecurely-downloaded programs can be swapped out for malware by attackers, and eavesdroppers can read users’ insecurely-downloaded bank statements.”

The top ten password-cracking techniques used by hackers

posted onFebruary 11, 2020
by l33tdawg
Credit: IT Pro

Understanding the password-cracking techniques hackers use to blow your online accounts wide open is a great way to ensure it never happens to you.

You will certainly always need to change your password, and sometimes more urgently than you think, but mitigating against theft is a great way to stay on top of your account security. You can always head to www.haveibeenpwned.com to check if you're at risk, but simply thinking your password is secure enough to not be hacked is a risky position to take.