Google is urging owners of Android phones that use certain Samsung chipsets to take immediate action to protect themselves from critical vulnerabilities. These vulnerabilities can allow skilled hackers to compromise devices by making a specially crafted call to the owner’s number.
Category: Hacking and Security
Cybersecurity technique called “moving target defense” can befuddle hackers seeking control of critical assets like military jets and commercial airliners.
A new research study has shown that “moving target defense”, a cybersecurity technique that shuffles network addresses, can effectively confuse hackers seeking control of military jets, commercial airliners, or spacecraft. This technique resembles a blackjack dealer shuffling playing cards to prevent gamblers from winning.
A new screentime attack via the TA866 group is actively targeting locations in the United States and Germany.
Proofpoint has been keeping an eye on some evolving financially motivated activity since October 2022 that they’re calling “Screentime.” It all starts with a sneaky email with a malicious attachment or link that leads to malware called WasabiSeed and Screenshotter.
Research shows UID smuggling occurs in nearly 10% of all web navigations
Advertisers pioneer a new method for tracking users across the Web, known as user ID (or UID) smuggling, which does not require third-party cookies.
Uh, oh. Here we go again. FBI/CISA issue PSA on expected information manipulation tactics for the upcoming 2022 midterm elections.
Remember the Jan. 6 riot/insurrection? How about the false claims of a stolen election? Remember when Trump got elected in 2016? Yeah, it could be that bad.
Google joins Ring as the latest company to admit they provide video to police without owners’ permission – and without a warrant.
Researchers demonstrate that, yes, Bluetooth signals can be used to track and identify smartphones.
A team of engineers at the University of California San Diego has demonstrated for the first time that the Bluetooth signals emitted constantly by our mobile phones have a unique fingerprint that can be used to track individuals’ movements.
When big companies act dumb – Sorry, but Cisco’s Duo multifactor-authentication exploit was just plain, old stupid programming.
Reports are emerging that Russian state-sponsored cyber actors are taking advantage of an astoundingly stupid default configuration for Cisco’s Duo multifactor authentication (MFA) protocols. The Ruskies have been able to use Cisco’s mistake to register new devices for MFA and yep, access the victim’s network where they do all sorts of nasty things. The cyber…
Want to know what private conversations between members of a sophisticated Russian cybergang look like. Well, here ya’ go.
It began on Sunday, February 27, 2022 when a new Twitter account, @ContiLeaks, began posting links to logs of internal chat messages been Conti members. Conti is a Russian-based ransomware gang.
Ford partners with security-experts, ADT, to fortify Ford vehicle security through new AI-powered security systems.
Canopy was incubated by Ford’s New Business Platform team and plans to begin integrating its security solution with on-board vehicle cameras in Ford vehicles next year.