Skip to main content

Security

Video jacking - hopefully not coming to a phone charging point near you

posted onAugust 15, 2016
by l33tdawg

We know about the risks of having your devices hacked by malicious chargers, and of juice jacking where you plug your phone in for a quick power boost at a kiosk at a shopping centre, hotel lobby or airport, only to have your data snarfled.

But video jacking seems like yet another novel way to grab information from HDMI-ready smartphones.

Hackers could weaponize up to a billion monitors to spy on everyone

posted onAugust 10, 2016
by l33tdawg

Most of the time when we talk about PC security, we talk about either the operating system or the hardware that it runs on. Security researchers tend to focus on these characteristics for obvious reasons, but it’s always interesting to see what other research teams can do by targeting the hardware most of us don’t consider part of the normal security chain. New research presented at DEFCON last week by Ang Cui and Jatin Kataria discussed how one team discovered monitors are themselves vulnerable to hacking — and in ways that can be difficult for ordinary users to spot.

"Foreign Hackers" Launch DDoS Attacks on Australia's Census Website

posted onAugust 10, 2016
by l33tdawg

The Australian Bureau of Statistics (ABS) said that foreign hackers had launched cyber-attacks on the ABS Census website yesterday in an attempt to sabotage its "Census Night." Apparently, their attacks were successful because the ABS willingly shut down its website to prevent further damage.

The ABS Census Night, or the Census of Population and Housing, is a mandatory event that takes place every five years in Australia. Every Australian must fill in and submit a form detailing who lives in their house and a description of their home and properties.

Security Firm Uncovers 'Strange' Malware in Russian, Iranian Govt Computers

posted onAugust 10, 2016
by l33tdawg

"In September 2015, Kaspersky Lab’s Anti-Targeted Attack Platform discovered anomalous network traffic in a government organization network," reads a report published by the software company on Monday.

"Analysis of this incident led to the discovery of a strange executable program library loaded into the memory of the domain controller server…Additional research revealed signs of a previously unknown threat actor, responsible for large-scale attacks against key governmental entities."

Samsung: Hackers can't pwn our NFC payment kit.

posted onAugust 10, 2016
by l33tdawg

A war of words has broken out after a security researcher claimed last week that Samsung's contactless mobile payment system is vulnerable to skimming and spoofing attacks.

In talks at both the Black Hat and DEF CON security conferences, held last week in Las Vegas, Salvador Mendoza claimed that he was able to intercept a Samsung Pay token transmitted over the air using a gizmo hidden under his shirt cuff.

Wait, what's a Samsung Pay token? Well, the token comes in three parts.

Dota 2 forum breach leaks 2 million user accounts

posted onAugust 10, 2016
by l33tdawg

A hacker has taken off with almost two million accounts associated with the forum for popular online multiplayer game, Dota 2.

The hack was carried out last month on July 10. The copy of the leaked database was provided to breach notification site LeakedSource.com, which allows users to search their usernames and email addresses in a wealth of stolen and hacked data.

Microsoft Disables RC4 In Internet Explorer 11 and Edge

posted onAugust 10, 2016
by l33tdawg

Security remains one of Microsoft’s most important goals in Windows 10. The company has been working on improving security in Windows for quite some time now, and their efforts have resulted in a Windows 10 that is perceived by many (including the company’s corporate clients) as more secure. Today, Microsoft announced another effort at improving Windows 10 security, specifically the removal of support for the RC4 cipher from Internet 11 and Edge.

How To Detect And Find Rogue Cell Towers

posted onAugust 10, 2016
by l33tdawg

Software defined radios are getting better and better all the time. The balaclava-wearing hackers know it, too. From what we saw at HOPE in New York a few weeks ago, we’re just months away from being able to put a femtocell in a desktop computer for under $3,000. In less than a year, evil, bad hackers could be tapping into your cell phone or reading your text message from the comfort of a van parked across the street. You should be scared, even though police departments everywhere and every government agency already has this capability.

Vulnerability in Samsung Pay Discovered, Allows Hackers to Steal your Credit Card Wirelessly

posted onAugust 8, 2016
by l33tdawg

If you’re a Samsung Pay user, read this article carefully if you want to avoid your credit card data to be compromised. According to Salvador Mendoza, a security researcher, the Samsung Pay system which is used by millions of smartphone users to make mobile payments all around the world can be exploited by hackers to steal your credit card information.

‘Smart’ locks yield to simple hacker tricks

posted onAugust 8, 2016
by l33tdawg

It’s an open secret that the Internet of Things (if we must call it so) is pretty terrible, whether in standards, ineroperability, or security. Good security, though, you don’t really expect in a smart light bulb or coffee maker. A smart front door lock, however, really shouldn’t be quite this easy to hack.