Skip to main content

Security

Rogue apps could exploit Android vulnerability to brick devices, researchers warn

posted onFebruary 15, 2016
by l33tdawg

A vulnerability in Android that was publicly disclosed in mid-March could be exploited by malicious applications to force devices into an endless reboot loop, according to security researchers from Trend Micro.

A vulnerability in Android that was publicly disclosed in mid-March could be exploited by malicious applications to force devices into an endless reboot loop, according to security researchers from Trend Micro.

VTech waves off security responsiblity after major 2015 breach

posted onFebruary 12, 2016
by l33tdawg

In late 2015, children’s toy manufacturer VTech hit the headlines after a major security breach caused personal data from some five million users to become compromised. Now, the company has taken steps to wash its hands of responsibility for any similar event that might take place in the future.

Hackers of two Ukrainian utilities probably hit mining and railroad targets, too

posted onFebruary 12, 2016
by l33tdawg

The attackers who crippled Ukrainian power operators in December probably committed attacks shortly before against a mining company and a railway operator, Trend Micro said Thursday.

The security company said its latest technical research shows that the same malware -- dubbed BlackEnergy and KillDisk -- were probably used in the earlier actions. It didn't name the targets of those attacks, which took place in November and December.

Hackers Breach Bolivian Army Email Servers

posted onFebruary 11, 2016
by l33tdawg

A group of four hackers have breached the official email servers belonging to the Bolivian Army, downloaded emails and dumped some of the data online.

Guilty of this attack are Hanom1960, the Chilean Hackers crew, and Hazzard, all of which, based on their tweets, look to be from Latin America.

According to two screenshots shared with Softpedia by Hanom, the Bolivian Army was running their internal email server on VMWare's Zimbra service. Hanom told Softpedia they used an older, known Zimbra exploit, but that their work was also simplified by "[expletive] configurations."

Hacktivists Leak Details for 300,000 Chilean Citizens Looking for State Benefits

posted onFebruary 11, 2016
by l33tdawg

A group of Chilean hacktivists that go by the name of Chilean Hackers have broken into the database of CONADI and stolen the personal details of 304,189 Chilean citizens looking for state benefits from the country's government.

CONADI stands for Corporación Nacional de Desarrollo Indígena (Spanish for National Indigenous Development Corporation) and is an official institution, part of the Chilean government, under the Ministry of Social Development.

Hacker Calls FBI's I.T. Department, Gains Access To Network

posted onFebruary 11, 2016
by l33tdawg

A hacker, who wishes to remain anonymous, plans to dump the apparent names, job titles, email addresses and phone numbers of over 20,000 supposed Federal Bureau of Investigation (FBI) employees, as well as over 9,000 alleged Department of Homeland Security (DHS) employees, Motherboard has learned.

The hacker also claims to have downloaded hundreds of gigabytes of data from a Department of Justice (DOJ) computer, although that data has not been published.

TappLock is a padlock with a fingerprint sensor to open

posted onFebruary 2, 2016
by l33tdawg

Now that we're living in the age of sufficient fingerprint sensors, devices like the TappLock are on the rise. The creators of the TappLock have embedded a fingerprint sensor (aka a fingerprint reader) into a padlock, allowing the user to do away with keys altogether. This system, they suggest, will allow you to "never worry about losing your keys, forgetting your combination code, or getting your locks picked again." That is, until the device's sensor malfunctions. But that'll never happen, right?