News
-
"New Mirai Variant Targets Business Presentation and Display Devices"Researchers at Palo Alto Networks have discovered a new variant of the Mirai botnet, which targets WePresent WiPG-1000 Wireless Presentation systems and LG Supersign TVs. These technologies are mostly used by enterprises, indicating the increased…
-
"Hackers Exploit Urgency, Personalization in Phishing Attacks"A report released by Barracuda Networks, a security firm, highlights the exploitation of personalization and urgency in the launch of spear-phishing attacks in order to increase the success of phishing scams. According to the report, hackers customize…
-
"Google Photos Vulnerability Could Have Let Hackers Retrieve Image Metadata"A flaw in the web version of Google Photos could have enabled hackers to track a user's location history. Through the exploitation of this flaw, attackers could have retrieved metadata from images stored in a user's Google Photos account to find out…
-
"Experts uncovered a malspam campaign using Boeing 737 Max crash"Hackers always try their best to exploit the attention of the people on the events that made the headlines. Especially tragic events like Boeing 737 Max crash or the mosque shooting in New Zealand. Threat actors are sending emails posing as a…
-
"Donated Devices Are Doxing Your Data, Says New Research"A security researcher from Rapid7 found more than 300,000 files that reveal sensitive information such as credit card numbers, Social Security numbers, driver's license data, and more. These files were discovered as a result of the analysis of 85…
-
"Security Researchers Reveal Defects That Allow Wireless Hijacking of Giant Construction Cranes, Scrapers and Excavators"Security researchers at Trend Micro have brought further attention to the possibility of hijacking massive industrial machines such as cranes, excavators, and scrapers, through the abuse of poorly secured radio frequency (RF) remote controllers.…
-
"What recent industry data leaks tell us about CYBER-SECURITY"The number of reported data breaches has not risen much over the last decade. The concern now, is not just how many breaches occur, but more the amount of data that is stolen. Hackers are becoming much more proficient in stealing…
-
"Proof-of-Concept Tracking System Finds RATs Worldwide"Recorded Future, an information analysis firm, recently released a report that discusses a proof-of-concept system designed for the detection of remote-access Trojans (RATs). The system uses network scans and metadata to find RATs. This article continues…
-
"Shared Code Creates Opportunity for Hackers, Expert Warns"The use of open source code libraries by app developers increases the vulnerability of federal employees' mobile phones to being infiltrated by hackers as such libraries can include malicious code. The hacking of federal employees' smartphones could lead…
-
"Anti-Virus on Android: Beware of Low-Quality Apps"Most of the anti-virus applications on Google Play Store for androids are very low quality. More than half of the apps - 138 out of 250 detected 30 percent or less of the malicious samples or had high false-positive rates. This means…
-
"An Email Marketing Company Left 809 Million Records Exposed Online"Security researchers found an unprotected MongoDB database owned by Verifications.io, an enterprise email validation service provider. The database contains 150 gigabytes of data that exposes over 800 million records. These records include sensitive…