SD-WAN Product Vulnerabilities Allow Hackers to Steer Traffic, Shut Down Networks
Researchers at cybersecurity consulting firm Realmode Labs have identified vulnerabilities in SD-WAN products from Silver Peak, Cisco, Citrix and VMware, including potentially serious flaws that can be exploited to steer traffic or completely shut down an organization’s network. read more more…Code.org Hacked, Emails and Locations Data of Volunteers Compromised 33
An anonymous reader allegedly quoting an email from Code.org, claims that the database of the non-profit organization has been breached: Tags: Security more…Steer Clear of the “Pay Yourself Scam” That’s Targeting Online Bank Accounts
An old banking scam has a new look. And it’s making the rounds again. Recently Bank of America alerted its customers of the “Pay Yourself Scam,” where scammers use phony fraud alerts and trick their victims into giving them access to their online banking accounts. It’s a form of phishing attack, and according to Bank […] more…The IRS “Dirty Dozen” – Top Tax Season Scams to Steer Clear of This Year
Who loves tax season besides accountants? Scammers. Emotions can run high during tax time. Even if you’re pretty sure you did everything right, you may still have a few doubts kicking around. Did I file correctly? Did I claim the right deductions? Will I get audited? As it turns out, these are the very same […] more…How to Steer Clear of Tax Season Scams
It’s that time of year again – tax season! Whether you’ve already filed in the hopes of an early refund or have yet to start the process, one thing is for sure: cybercriminals will certainly use tax season as a means to get victims to give up their personal and financial information. This time of […] more…8 Easy Ways to Hack-Proof Your Family’s Smartphones
Smartphones have changed the face of parenting in profound ways. But for all the efficiency they’ve introduced into family life, those same devices simultaneously bring risk. With smartphone and tablet use growing at ten times the rate of PCs, hackers know precisely where to shift their focus these days. Cyber thieves love smartphones because once […] more…IoT Devices: The Gift that Keeps on Giving… to Hackers
McAfee Advanced Threat Research on Most Hackable Gifts You’ve probably noticed the recent increase in Internet connected drones, digital assistants, toys, appliances and other devices hitting the market and maybe even showing up in your own home. The sale of these “Internet-of-Things” (IoT) devices is expected to reach 600 million units this year[1] and, unfortunately, […] more…Acoustic attack lets hackers control smartphone sensor
A newfound vulnerability in smartphones could let hackers remotely control the devices. With the acoustic injection attack, “attackers that deliver high intensity acoustic interference in close proximity” can interfere with a device accelerometer and get the sensor to send “attacker – chosen” data to the smartphone’s processor, say researchers from the University of Michigan and University […] more…Critical flaw lets hackers take control of Samsung SmartCam cameras
The popular Samsung SmartCam security cameras contain a critical remote code execution vulnerability that could allow hackers to gain root access and take full control of them. The vulnerability was discovered by researchers from the hacking collective the Exploiteers (formerly GTVHacker), who have found vulnerabilities in the Samsung SmartCam devices in the past. The flaw […] more…The Jeep hackers return to ditch a car going 60 mph
The new attack can spin a steering wheel 90 degrees and get you into a ditch, or worse, at any speed more…Hackers Hijack a Big Rig Truck’s Accelerator and Brakes
When cybersecurity researchers showed in recent years that they could hack a Chevy Impala or a Jeep Cherokee to disable the vehicles’ brakes or hijack their steering, the results were a disturbing wakeup call to the consumer automotive industry. But industrial automakers are still due for a reminder that they, too, are selling vulnerable computer […] more…Fiat Chrysler launches Detroit’s first bug bounty program for car hackers
It’s the first of the big three US auto makers to grab the steering wheel on this whole find-vulnerabilities, steer-a-car-into-a-ditch endeavor. more…At what point do white hat hackers cross the ethical line?
In recent months the news of Chris Roberts alleged hacking of an inflight entertainment system and possibly other parts of the Boeing 737 have sparked a wave of controversy. Public opinion was originally on Roberts’ side, but the recent publication of the FBI affidavit changed that drastically. According to the affidavit, Roberts admitted to doing […] more…BlackBerry denies its OS was to blame in Jeep Cherokee hack
Responding to an accusatory blog post, BlackBerry has again denied that its embedded operating system caused the potentially dangerous vulnerability recently demonstrated in Chrysler Jeep Cherokees. Last month, security researchers demonstrated how to circumnavigate the in-vehicle entertainment system of the Jeep Cherokee to take over the car itself, including control of the dashboard, steering mechanism, […] more…Maker of hacked radio says system is unique to Fiat Chrysler
The company that makes car radios that friendly hackers exploited to take control of a Jeep Cherokee says its other infotainment systems don’t have the same security flaw. Harman International CEO Dinesh Paliwal said Tuesday that the hackers used a cellular connection to get to the radio, which they used to control critical functions such […] more…Chrysler Recalls 1.4 Million Vehicles After Jeep Hacking Demo
Today, Fiat Chrysler recalled 1.4 million vehicles possibly affected by a vulnerability in the UConnect infotainment system that could allow attackers to hijack the vehicle’s steering and braking. Car hacking researchers Chris Valasek and Charlie Miller demonstrated proof of concept in striking fashion, when they wirelessly took control of a 2014 Jeep Cherokee driven by […] more…More information
- ITS Alerts Websites Upgrade
- Microsoft’s new browser, Spartan, gets detailed in a plethora of new images
- Morgan Stanley to Pay $35M Fine for Exposing Information of Millions of Customers
- Chinese Cyberspies Target Telecom Companies in America, Asia, Europe
- Iranian APT33 Hackers Use Special Botnets for High-Value Targets in U.S.
- Cisco to Acquire Duo Security for $2.35 Billion in Cash
- 15-Year-Old Python Vulnerability Present in 350,000 Projects Resurrected
- Large-scale Google malvertising campaign hits users with exploits
- Attacks Targeting Recent Microsoft Exchange Flaw Ramping Up
- Network Spreading Capabilities Added to Emotet Trojan