WannaCry is a name that made many cry in frustration this weekend, and the danger is still not over.
According to Europol director Rob Wainwright, over 200,000 victims in at least 150 countries have had their files encrypted by the WannaCry (aka Wanna Decryptor) ransomware/worm.
As a vicious new strain of ransomware swept the UK’s National Health Service yesterday, shutting off services at hospitals and clinics throughout the region, experts cautioned that the best protection was to download a patch Microsoft had issued in March. The only problem? A reported 90 percent of NHS systems run Windows XP, an operating system Microsoft first introduced in 2001, and hasn’t supported since 2014.
L33tdawg: On a related note, the video from the keyless car hacking talk at #HITB2017AMS has also been released.
[Charlie Miller] and [Chris Valasek] Have just released all their research including (but not limited to) how they hacked a Jeep Cherokee after the newest firmware updates which were rolled out in response to their Hacking of a Cherokee in 2015.
Researchers at Trend Micro have discovered a new Internet of Things (IoT) botnet that leaves than 120,000 Internet Protocol (IP) cameras vulnerable to attack.
The botnet, dubbed Persirai, was discovered targeting more than 1,000 different models of IP cameras. Persirai hits IoT devices a few months after the Mirai botnet, which wreaked havoc by compromising DVRs and CCTV cameras to fuel a massive DDoS attack in October 2016.
Keyless entry systems are not uncommon in cars these days but they are also the target of unscrupulous hackers who are able to spoof the signal from a car key fob to open a vehicle’s doors. Now, a group of researchers at the Beijing-based security firm Qihoo 360 has demonstrated that the attack is not only easy to execute, but can be done relatively cheaply as well.