SD-WAN Product Vulnerabilities Allow Hackers to Steer Traffic, Shut Down Networks
Researchers at cybersecurity consulting firm Realmode Labs have identified vulnerabilities in SD-WAN products from Silver Peak, Cisco, Citrix and VMware, including potentially serious flaws that can be exploited to steer traffic or completely shut down an organization’s network. read more more…Steer Clear of the “Pay Yourself Scam” That’s Targeting Online Bank Accounts
An old banking scam has a new look. And it’s making the rounds again. Recently Bank of America alerted its customers of the “Pay Yourself Scam,” where scammers use phony fraud alerts and trick their victims into giving them access to their online banking accounts. It’s a form of phishing attack, and according to Bank […] more…The IRS “Dirty Dozen” – Top Tax Season Scams to Steer Clear of This Year
Who loves tax season besides accountants? Scammers. Emotions can run high during tax time. Even if you’re pretty sure you did everything right, you may still have a few doubts kicking around. Did I file correctly? Did I claim the right deductions? Will I get audited? As it turns out, these are the very same […] more…IoT Devices: The Gift that Keeps on Giving… to Hackers
McAfee Advanced Threat Research on Most Hackable Gifts You’ve probably noticed the recent increase in Internet connected drones, digital assistants, toys, appliances and other devices hitting the market and maybe even showing up in your own home. The sale of these “Internet-of-Things” (IoT) devices is expected to reach 600 million units this year[1] and, unfortunately, […] more…Acoustic attack lets hackers control smartphone sensor
A newfound vulnerability in smartphones could let hackers remotely control the devices. With the acoustic injection attack, “attackers that deliver high intensity acoustic interference in close proximity” can interfere with a device accelerometer and get the sensor to send “attacker – chosen” data to the smartphone’s processor, say researchers from the University of Michigan and University […] more…Critical flaw lets hackers take control of Samsung SmartCam cameras
The popular Samsung SmartCam security cameras contain a critical remote code execution vulnerability that could allow hackers to gain root access and take full control of them. The vulnerability was discovered by researchers from the hacking collective the Exploiteers (formerly GTVHacker), who have found vulnerabilities in the Samsung SmartCam devices in the past. The flaw […] more…The Jeep hackers return to ditch a car going 60 mph
The new attack can spin a steering wheel 90 degrees and get you into a ditch, or worse, at any speed more…Hackers Hijack a Big Rig Truck’s Accelerator and Brakes
When cybersecurity researchers showed in recent years that they could hack a Chevy Impala or a Jeep Cherokee to disable the vehicles’ brakes or hijack their steering, the results were a disturbing wakeup call to the consumer automotive industry. But industrial automakers are still due for a reminder that they, too, are selling vulnerable computer […] more…Fiat Chrysler launches Detroit’s first bug bounty program for car hackers
It’s the first of the big three US auto makers to grab the steering wheel on this whole find-vulnerabilities, steer-a-car-into-a-ditch endeavor. more…At what point do white hat hackers cross the ethical line?
In recent months the news of Chris Roberts alleged hacking of an inflight entertainment system and possibly other parts of the Boeing 737 have sparked a wave of controversy. Public opinion was originally on Roberts’ side, but the recent publication of the FBI affidavit changed that drastically. According to the affidavit, Roberts admitted to doing […] more…Should hackers be tolerated to test public systems?
The purported veering of a jetliner caused by an onboard hacker points to a larger problem, experts say – airlines and other providers of services may be blind to the value such security researchers can offer in the name of public safety. While it’s far from clear that security researcher Chris Brown actually did commandeer […] more…Warning to white-hat hackers: Obama proposal a threat to what you do
President Obama’s proposal to update the computer fraud and abuse act could put white-hat hackers at risk of prosecution as members of organized crime, the SchmooCon hacking conference was told. Under Obama’s proposal, simply sharing passwords with friends – something hackers do routinely – could be enough to indicate that the person doing the sharing […] more…Doing more with less: Steering a quantum path to improved internet security
New research may lead to greatly improved security of information transfer over the internet. Physicists have demonstrated the potential for ‘quantum steering’ to be used to enhance data security over long distances, discourage hackers and eavesdroppers and resolve issues of trust with communication devices. more…Hackers to demo a $20 iPhone-sized gadget that zombifies cars
At Black Hat Asia next month, researchers plan to show a palm-sized device that costs less than $20 to build from off-the-shelf, untraceable parts and that, depending on the car model, can screw with windows, headlights and even the truly scary, make-you-crash bits: i.e., steering and brakes. more…The AI-powered cyberattack era is here
Prognosticators have been prognosticating for 20 years about a future in which hackers use AI to breach networks, steal data, and socially engineer credulous employees. And like so many AI-related futurisms in the age of LLM-based generative AI, this prediction is coming true. Anthropic reported last week that a hacker used its technology for an […] more…Guide: Protecting Your Digital Identity
People in their 20s and 30s are losing it online. And by it, I mean money—thanks to digital identity theft. In its simplest form, your digital identity is made up of a whole host of things that can be traced back to you and who you are. That can range anywhere from photos you post online to online shopping accounts, email accounts to telephone numbers, […] more…More information
- What is a firewall? How they work and all about next-generation firewalls
- 0-Days Found in iPhone X, Samsung Galaxy S9, Xiaomi Mi6 Phones
- MPAA leak: O’Dwyer, TVShack.net case "isn’t about Internet freedom."
- Apple expected to ditch aluminum, release glass-backed iPhone with OLED display in 2017
- Vendor recommended patches and fixes will be applied to ISIS & IBIS during the maintenance window (5-7AM) Friday morning, 8/30/13
- Cyberattacks in West Africa spark debate over online security
- Microsoft Internet Explorer and Edge CVE-2017-8741 Remote Memory Corruption Vulnerability
- Hey Apple, were you hosting hacked copies of Xcode?
- ‘Revenge porn’ to be made illegal in England and Wales
- Microsoft Windows GDI Component CVE-2019-0774 Information Disclosure Vulnerability