Eskenzi PR ad banner Eskenzi PR ad banner

Top 10 Stories

The incredible advancements that have turned what were once standalone pieces of medical equipment into IoT devices do enable better care for patients, but at the same time open these devices up to cyberattacks, warned the National Institute of Standards and Technology (NIST), working with the National Cybersecurity Center of Excellence (NCCoE), in a new report. View full story ORIGINAL SOURCE: SC Magazine

Read more

Researchers used AT commands to rewrite device firmware, bypass Android security mechanisms, exfiltrate sensitive device information, and unlock screens. Attackers can use AT commands to launch several malicious functions on an array of Android devices, including extracting data, rewriting the smartphone firmware and bypassing Android security measures. All they need, according to researchers who developed a proof-of-concept (PoC) attack, is the device and a USB connection. View full story ORIGINAL SOURCE: Threatpost

Read more

Facebook-owned instant messenger WhatsApp has admitted that it's storing unencrypted backup data on Google Drive. The reveal comes after a deal signed on 16 August that allowed users to store backed up data to the Google Drive service without eating into their storage allowance. Previously, the backup had come out of an allowance of 15GB across data, Gmail and Photos. However, the company has now confirmed that the act of encrypting the data between WhatsApp and Google is not part...

Read more

You don’t always need to build fancy algorithms to tamper with image recognition systems – adding objects in random places will do the trick. In most cases, adversarial models are used to change a few pixels here and there to distort images so objects are incorrectly recognized. A few examples have included stickers that turn images of bananas into toasters, or wearing silly glasses to be fool facial recognition systems into believing you’re someone else. Let's not forget...

Read more

Security researchers from Booz Allen Hamilton have spotted a previously unseen and undocumented malware strain that targets point-of-sale (POS) systems. The malware, which they named RtPOS, appears to be Russian in origin, according to an initial technical analysis published last week. Overall, this new malware strain is nowhere near as sophisticated as other fellow POS malware strains, such as TreasureHunter, UDPoS, RawPOS, or MajikPOS. View full story ORIGINAL SOURCE: Bleeping Computer

Read more

A security researcher has published on Twitter details about a vulnerability in the Windows OS. The vulnerability is a "local privilege escalation" issue that allows an attacker to elevate the access of malicious code from a limited USER role to an all-access SYSTEM account. Will Dormann, an engineer of CERT/CC, has confirmed the vulnerability and has issued an official CERT/CC alert last night. View full story ORIGINAL SOURCE: Bleeping Computer

Read more
Page 10 of 630 1 9 10 11 630