Skip to main content

Security

More than a Billion Snapdragon-based Android Phones Vulnerable to Hacking

posted onMarch 16, 2016
by l33tdawg

L33tdawg: See the vuln in action at #HITB2016AMS with a live demonstration on rooting a Nexus 6 equipped with the latest Android release by using a  zero permission required application.

More than a Billion of Android devices are at risk of a severe vulnerability in Qualcomm Snapdragon chip that could be exploited by any malicious application to gain root access on the device.

It is time to prioritize security for Internet of Things and wearables

posted onMarch 16, 2016
by l33tdawg

We are on the cusp of a totally connected world. The Internet of Things is no longer an emerging trend, it has arrived. If you want evidence -- real evidence rather than the speculation of industry analysts -- then take a look at the $1.4 billion Cisco reputedly put on the table at the start of February to acquire IoT platform provider Jasper Technologies.

Hacker who stole celebrities' nude photos will plead guilty

posted onMarch 16, 2016
by l33tdawg

Remember "Celebgate," when a hacker got into actresses' iCloud accounts and grabbed their nude photos?

The feds never forgot. And on Tuesday, the US Department of Justice said Ryan Collins, 36, has agreed to plead guilty to the 2014 hack that stole more than photos from celebrities' iCloud and Google accounts.

Professional Chinese hackers are responsible for U.S. ransomware attacks

posted onMarch 16, 2016
by l33tdawg

Ransomware is a kind of cyber attack that’s growing in popularity. Here’s how it works: hackers infiltrate computers, encrypt files you want to have access to, and demand money from you to get them back via anonymous Bitcoin transactions.

Ransomware attacks are conducted by ordinary individuals with extraordinary computer skills, but recent developments suggest that hackers who may have otherwise worked for the Chinese government are turning to ransomware operations to supplement their fading income.

Even Sex Toys Aren’t Safe From Hackers, Tech Companies Warn

posted onMarch 16, 2016
by l33tdawg

It’s not just computers and mobile phones that are vulnerable to cyber attack, according to software firm Trend Micro. As more devices are hooked up to the Internet, it could be anything from medical equipment to industrial machinery—and even sex toys.

To illustrate the point, Trend Micro spokesman Udo Schneider surprised journalists at a news conference this week by placing a large, neon-pink vibrator on the desk in front of him and then bringing it to life by typing out a few lines of code on his laptop.

5 Major Hospital Hacks: Horror Stories from the Cybersecurity Frontlines

posted onMarch 16, 2016
by l33tdawg

In real-world war, combatants typically don’t attack hospitals. In the cyber realm, hackers have no such scruples. “We’re attacked about every 7 seconds, 24 hours a day,” says John Halamka, CIO of the Boston hospital Beth Israel Deaconess. And the strikes come from everywhere: “It’s hacktivists, organized crime, cyberterrorists, MIT students,” he says.

Obama Warns About Dangers of Unbreakable Encryption at SXSW

posted onMarch 16, 2016
by l33tdawg

During a session at the South by SouthWest conference on March 11, President Obama was asked about his views on the Apple-FBI case—in which the FBI wants Apple to unlock the iPhone 5c cell phone used by San Bernardino County, Calif., shooter Syed Farook—in light of the fact that the president and his administration are at SXSW asking the tech community to help improve government overall.

UK Boards Fail to Handle Cyber-risk, Especially at Telecoms

posted onMarch 16, 2016
by l33tdawg

UK boardrooms are struggling to cope with cybersecurity risk, especially in the telecoms and utilities sectors, where exposure is dramatic. Overall, a lack of expertise and awareness continues to plague businesses in key sectors.

A new study from CGI reveals that a full 38% of C-suite executives in UK telecoms, utilities, financial services and retail sectors believe a cybersecurity breach at their organization is likely over the next 12 months—at an average total cost over a one-year period of £1.2 million. But too few of them have real cybersecurity expertise.

Docs With Malicious Macros Deliver Fileless Malware

posted onMarch 15, 2016
by l33tdawg

Spammed Word documents with malicious macros have become a popular method of infecting computers over the past few months. Attackers are now taking it one step further by using such documents to deliver fileless malware that gets loaded directly in the computer's memory.

Security researchers from Palo Alto Networks analyzed a recent attack campaign that pushed spam emails with malicious Word documents to business email addresses from the U.S., Canada and Europe.