The Internet on devices continues to be a major problem when it comes to security. Unfortunately, a big part of the reason why comes down to end users. Recently, Bitdefender released a new report entitled "The IoT Threat Landscape And Top Smart Home Vulnerabilities in 2018," and it paints a grim picture indeed. The average home now contains twenty smart devices, and most of them contain security vulnerabilities. 95 percent of those vulnerabilities reside in the firmware. While the majority … Read more
Vulnerability Found In Major Manufacturers Of Android Phones
Researchers operating out of the University of Florida, Stony Brook University and Samsung Research America have made a disturbing discovery. Millions of Android smartphones manufactured by eleven different OEMs (Original Equipment Manufacturers) were found to be vulnerable to attack via AT Commands. If you're not sure what an "AT Command" is, you're not alone. Part of the Hayes Command Set, ATtention Commands were developed in the early 1980s and designed to be transmitted via phone lines to … Read more
Security Issues Abound – Texas Voter Registration Records Leaked
The great state of Texas has 15.2 million registered voters. Unfortunately, personal details belonging to nearly all of them (14.8 million) have been compromised, but don't blame the state's election officials. This staggering breach was caused by the carelessness of a conservative-focused data firm, ironically named "The Data Trust." They left their research file completely exposed and unprotected on a server that anyone could access with no password required. It's hard to see how the … Read more
Hackers Now Targeting Point Of Sale Systems
There's a new threat to point of sale (POS) systems coming out of Russia, according to security researchers from Booz Allen Hamilton. The malware, which they're calling "RtPOS" isn't bleeding edge technology, and does not approach the level of sophistication of other recently discovered strains, but that doesn't mean it should be taken lightly. These strains include RawPOS, MajikPOS, UDPOS, and Treasure hunter. In its current incarnation, it has a limited feature set and is basically a RAM … Read more
High Frequency Audio Computer Monitors May Expose Screen Activity
It may sound like something straight out of a science fiction movie, but recently, researchers have made a disturbing discovery. Using nothing more than an off-the-shelf microphone, it's possible for an attacker to determine what content you're viewing on your computer monitor. The researchers tested a variety of LCD screens (with both LED and CCFL backlighting) and observed that the high-pitched noise made by the monitors changed as the content displayed on the screen changed. The … Read more
Millions Of T-Mobile Customers Data May Have Been Leaked
Telecommunications giant T-Mobile is the latest victim of a large-scale data breach, with personal data belonging to more than two million of its customers having been leaked. The exposed information included customer name, phone number, email address, billing zip code, account number and whether the account was pre-paid or post-paid. As bad as that is, it could have been far worse. Fortunately, no financial information, passwords, or social security numbers were compromised. According to … Read more
Gmail Releases New Confidential Mode
Google has introduced a new Gmail feature called "Confidential Mode," which seeks to make sending and receiving important or sensitive emails more secure. Unfortunately, it may have inadvertently created as many problems as it solves. Here's how the new feature works, and why you may be leery of using it: To send a confidential email, compose your message as normal, and then, click the "lock" icon located at the bottom of the email screen. When this button is pressed, you'll be presented … Read more
If You Use Photoshop, Update Immediately
Do you use Photoshop? Does anyone who works for you use it? If so, you'll want to apply the latest security patch immediately. Two new vulnerabilities were discovered after the release of Adobe's regularly scheduled August 2018 security patch update. This prompted the company to take the unusual step of releasing an emergency, out-of-band update to correct the issue. These two newly discovered vulnerabilities (tracked as CVE-2018-12810 and CVE-2018-12811) impact Adobe photoshop CC2017, … Read more
Macs Can Be Hacked With Synthetic Dismissal On Warning Boxes
Depending on the lens you view him through, Patrick Wardle (former hacker for the NSA and macOS security expert) is either your best friend or your worst nightmare. Most people (whether fans of Apple or not) will readily concede that the company works hard to make their products as secure as possible. Unfortunately, at this year's Def Con hacker convention in Las Vegas, Wardle made a presentation that is currently sending shockwaves through the Apple user community. He exposed a major … Read more
Cortana May Have Flaw Allowing Unauthorized System Access
Researchers at McAfee have demonstrated a method that hackers could use to perform an end-run around Cortana and access data, run malicious code, or even change a locked computer's password. In this case, however, the emphasis is on the word "could." The researchers readily admit that this attack is high risk, has never been seen in the wild, and has little possibility of going undetected for a variety of reasons. Even so, the research is disturbing and does point to a valid weakness that … Read more