Wednesday , 15 August 2018
Home » Tag Archives: Technology

Tag Archives: Technology

Hackers Can Turn Body Cameras Into Malware Spewing Machines, Security Expert Says

Once lauded as tools to enhance police accountability, body cameras have been facing increasing scrutiny from privacy advocates, and now one researcher has identified them as cybersecurity time bombs. Speaking to Wired ahead of a Def Con presentation, Josh Mitchell, a consultant at the security firm Nuix, demonstrated that many body cameras are vulnerable to hacking, making several different nightmare scenarios possible: officers ... Read More »

PCs still infected with Andromeda botnet malware, despite takedown

Despite being the subject of an international takedown operation last year, traces of the Andromeda botnet can still be found on many PCs. The Andromeda botnet was associated with 80 different malware families and grew so large that it was at one point infecting a million new machines a month, distributing itself via social media, instant messaging, spam emails, exploit kits, ... Read More »

US voting systems: Full of holes, loaded with pop music, and ‘hacked’ by an 11-year-old

Hackers of all ages have been investigating America’s voting machine tech, and the results weren’t great. For instance, one 11-year-old apparently managed to hack and alter a simulated Secretary of State election results webpage in 10 minutes. The Vote Hacking Village, one of the most packed-out locations at this year’s DEF CON hacking conference in Las Vegas, saw many of ... Read More »

Cisco patches IOS in response to boffins’ IKE-busting breakthrough

Cisco has pushed out an update for its internetwork operating system (IOS) and IOS XE firmware in advance of a Usenix presentation on circumventing cryptographic key protocol. The networking behemoth is advising all customers running hardware that uses IOS and IOS XE to get the updates that address CVE-2018-0131, a security bypass vulnerability stemming from a weakness in the Internet ... Read More »

25 Android smartphone models contain severe vulnerabilities off the shelf

Mobile device malware may still be far behind when it comes to the prevalence of threats crafted for traditional PC systems, but threat actors are seeking ways to compromise these important devices we use on a daily basis. View Full Story ORIGINAL SOURCE: ZDNet Read More »

Iran ‘gearing up to launch cyber strikes’ over US sanctions – and Britain is not safe

Iran is ready to hit back at Donald Trump’s reimposition of US sanctions with cyber strikes, according to security experts who pointed to an increase in chatter related to the threat. The risk of a cyber offensive has been growing ever since the US president withdrew in May from the 2015 deal, under which world powers relaxed economic sanctions in exchange for restrictions on ... Read More »

UK cyber cops: Infosec pros could help us divert teens from ‘dark side’

UK police are looking to cybersecurity firms to help implement a strategy of steering youngsters away from a life in online crime. The National Crime Agency’s Prevent campaign sits within the wider five-year UK National Cyber Security Strategy of 2016-2021. The NCA’s scheme aims to point teenagers towards careers in cyber security rather than following a path that may lead them towards ... Read More »

Over 146 billion records to be stolen over next five years

More than 33 billion records will be stolen by cyber criminals in 2023 alone, despite data protection laws mandating strong measures to protect personal and financial data, a study has found. View Full Story ORIGINAL SOURCE: Computer Weekly Read More »

Malicious faxes leave firms ‘open’ to cyber-attack

Booby-trapped image data sent by fax can let malicious hackers sneak into corporate networks, security researchers have found. Since many companies use fax machines that are also printers and photocopiers, they often have a connection to the internal network. The malicious images exploit protocols established in the 1980s that define the format of fax messages. The research was presented at ... Read More »

Former NSA top hacker names the filthy four of nation-state hacking

Rob Joyce, the former head of the NSA’s Tailored Access Operations hacking team, has spilled the beans on which nations are getting up to mischief online. Joyce gave one of the first talks at the DEF CON hacking conference in Las Vegas and interest was intense – the lines to get in stretched around the hall. Joyce congratulated the crowd on ... Read More »