Skip to main content

Security

New study details a security flaw with Philips Hue smart bulbs

posted onNovember 4, 2016
by l33tdawg

Less than two weeks after a massive botnet attack powered largely by insecure web-connected home devices brought much of the internet to a temporary standstill, researchers are detailing an apparent security flaw with Philips Hue smart bulbs, and potentially other devices that communicate using ZigBee transmissions, too.

Someone Just Used The Mirai Botnet To Knock An Entire Country Offline

posted onNovember 4, 2016
by l33tdawg

Last month, the Mirai botnet emerged from the shadows and directed its fury at security expert Brian Krebs. A few weeks later, the DNS servers at Dyn fell victim and many of the biggest sites on the Internet went dead for millions of Americans. Now it appears that Mirai knocked an entire country offline.

WikiLeaks founder denies Russia behind Podesta email hacking

posted onNovember 4, 2016
by l33tdawg

WikiLeaks founder Julian Assange denied Thursday that the Russian government or any other "state parties" were his group's source for more than 50,000 hacked emails from the files of Hillary Clinton's campaign chairman, John Podesta.

In separate statements from WikiLeaks and in an interview with a television network supported by the Russian government, Assange dismissed warnings that Russia was the main actor behind cyberintrusions on Podesta and other politically connected individuals and organizations.

Flaw in Wix website builder risked computer worm

posted onNovember 4, 2016
by l33tdawg

Wix, the provider of a widely used cloud-based web development platform, appears to have had a significant bug on its hands that could have paved the way for a computer worm to do serious damage to websites around world.

The problem was related to an XSS (cross-site scripting) vulnerability that was found in websites built with Wix, according to Matt Austin, a researcher with Contrast Security.

Hitting back at hackers: Debate swirls on how far to go

posted onNovember 3, 2016
by l33tdawg

After a seemingly endless barrage of cyberattacks, debate is heating up on hitting back at hackers where it hurts.

Amid calls for ways to punish and deter hackers without sparking a so-called “cyber war,” a panel of experts assembled by the George Washington University Center for Cyber and Homeland Security said in a report Monday that U.S. policies should be eased to allow “active defense” measures by both the government and private sector.

This Evil Office Printer Hijacks Your Cellphone Connection

posted onNovember 3, 2016
by l33tdawg

Julian Oliver has for years harbored a strange obsession with spotting poorly disguised cellphone towers, those massive roadside antennae draped in fake palm fronds to impersonate a tree, or even hidden as spoofed lamp posts and flag poles. The incognito base stations gave him another, more mischievous idea. What about a far better-disguised cell tower that could sit anonymously in office, invisibly hijacking cellphone conversations and texts?

Bradley Foundation Breached, 56245 Files Leaked

posted onNovember 2, 2016
by l33tdawg

Today Anonymous Poland announced a leak of data from The Bradly Foundation and as a result of this over 56,000 Files have now been dumped online.

    The Lynde and Harry Bradley Foundation, based in Milwaukee, Wisconsin, is a charitable foundation with more than $800 million U.S. dollars in asset more

Ex-CIA CTO: don’t believe everything you hear about hacking

posted onNovember 1, 2016
by l33tdawg

The former CTO of America's Central Intelligence Agency, Bob Flores, has said the gravest cyber security threat facing the world is the lack of protection for critical infrastructure and the internet of things – and that it's worth challenging narratives about attacks from nation states that get repeated without criticism.

Researchers build undetectable rootkit for programmable logic controllers

posted onNovember 1, 2016
by l33tdawg

Researchers have devised a new malware attack against industrial programmable logic controllers (PLCs) that takes advantage of architectural shortcomings in microprocessors and bypasses current detection mechanisms.

The attack changes the configuration of the input/output pins that make up the interface used by PLCs to communicate with other devices such as sensors, valves, and motors. PLCs are specialized embedded computers used to control and monitor physical processes in factories, power stations, gas refineries, public utilities, and other industrial installations.

Shadow Brokers Releases Second Trove of Spying Tools

posted onNovember 1, 2016
by l33tdawg

Shadow Brokers, a secretive online group that in August published details of hacking tools allegedly belonging to the NSA, released new leaks this week that appear to expose more of the agency's cyber strategies, as well as those from multiple foreign countries.

The leak discloses NSA-style code names, including "Jackladder" and "Dewdrop," the Associated Press reports. It also appears to offer a list of servers compromised by the Equation Group, a separate hacking organization with ties to the NSA.