What do Windows 10 and Uber or Lyft have in common? One bad driver can really ruin your day. And 40 can totally ruin your month

The Register - Mon, 12/08/2019 - 21:51
Powerful code signed by Microsoft littered with vulns

DEF CON  Too many trusted Windows 10 peripheral drivers, signed off by Microsoft and running with powerful kernel-level privileges, are riddled with exploitable security vulnerabilities, according to infosec biz Eclypsium.…

Categories: News

Printer pwnage, phone poppage, and apparently US Homeland Security needs security help

The Register - Mon, 12/08/2019 - 19:57
Plus: The spambot that actually DOES record screens of pr0n users

Roundup  Here is your friendly summary of recent news from the front lines of information security beyond everything else we've already reported.…

Categories: News

US still 'not prepared' in event of a serious cyber attack and Congress can't help if it happens

The Register - Mon, 12/08/2019 - 19:02
Politicians appeal to hackers to take up the fight

DEF CON  Despite some progress, the US is still massively underprepared for a serious cyber attack and the current administration isn't helping matters, according to politicians visiting the DEF CON hacking conference.…

Categories: News

US military swoops into DEF CON seeking a few good hackers for debut aviation pwning village

The Register - Mon, 12/08/2019 - 17:01
Faulty F-15s, at-risk airbases and much more

DEF CON  For the first time, Vegas's annual DEF CON hacking conference has an "aviation hacking village", and the US military is scouting around there for a few good hackers to find bugs that its own hackers have missed.…

Categories: News

Plot twist: Google's not spying on King's Cross with facial recognition tech, but its landlord is

The Register - Mon, 12/08/2019 - 16:17
More unregulated creepycams blight London

Britons working for Google at its London HQ are being secretly spied on by creepy facial recognition cameras – but these ones aren't operated by the ad-tech company.…

Categories: News

I could throttle you right about now: US Navy to ditch touchscreens after kit blamed for collision

The Register - Mon, 12/08/2019 - 09:59
Thousands of tons of metal and iPads don't mix, it would seem

The US Navy is ditching touchscreens and going back to physical throttles after an investigation into the USS John S McCain collision partly blamed poor design of control systems for the incident.…

Categories: News

SELECT code_execution FROM * USING SQLite: Eggheads lift the lid on DB security hi-jinks

The Register - Sat, 10/08/2019 - 22:00
You've heard of ROP? Now get a load of QOP

DEF CON  At the DEF CON hacking conference in Las Vegas on Saturday, infosec gurus from Check Point are scheduled to describe a technique for exploiting SQLite, a database used in applications across every major desktop and mobile operating system, to gain arbitrary code execution.…

Categories: News

Anatomy of an attack: How Coinbase was targeted with emails booby-trapped with Firefox zero-days

The Register - Sat, 10/08/2019 - 00:56
Elaborate browser break-out betrayed by unusual behavior

Coinbase chief information security officer Philip Martin this week published an incident report covering the recent attack on the cryptocurrency exchange, revealing a phishing campaign of surprising sophistication.…

Categories: News

So you can't find enough cyber-security experts to join the team. Time to dial a managed security service provider?

The Register - Fri, 09/08/2019 - 21:36
The benefits of outsourcing your IT's infosec – and what to look for. Here's our gentle guide for you

Backgrounder  Managed security services are – by revenue – the fastest expanding field of cyber security, according to IDC, which reckons they should grow at a compound annual growth rate of 14.2 per cent to 2022. Gartner says managed and subscription-based security services will account for half of all cyber-security spending by 2020.…

Categories: News

Who will save us from deepfakes? Other AIs? Humans? What about vastly hyperintelligent pandimensional beings?

The Register - Fri, 09/08/2019 - 12:04
Maybe Douglas Adams was right about mice

Black Hat  Deepfakes, the AI-generated talking heads that can say whatever their creator wants them to, are getting harder to detect. But boffins have enlisted an unlikely ally in the quest for truth – mice.…

Categories: News

Talk about unintended consequences: GDPR is an identity thief's dream ticket to Europeans' data

The Register - Fri, 09/08/2019 - 09:15
Revenge plan morphs into data leak discovery

Black Hat  When Europe introduced the General Data Protection Regulation (GDPR) it was supposed to be a major step forward in data safety, but sloppy implementation and a little social engineering can make it heaven for identity thieves.…

Categories: News

You can easily secure America's e-voting systems tomorrow. Use paper – Bruce Schneier

The Register - Fri, 09/08/2019 - 02:24
As it emerges non-internet-connected election systems are actually connected to the internet

Black Hat  While various high-tech solutions to secure electronic voting systems are being touted this week to election officials across the United States, according to infosec guru Bruce Schneier there is only one tried-and-tested approach that should be considered: pen and paper.…

Categories: News

Pwn an iPhone to bank $1m, Check Point gripes about WhatsApp privacy again, Broadcom eats Symantec enterprise biz

The Register - Fri, 09/08/2019 - 01:30
Apple expands bug bounties, and more from Vegas this week

Black Hat  Here's a quick summary of some important infosec happenings from inside and outside the Black Hat USA conference in Las Vegas on Thursday.…

Categories: News

How powerful are Russian hackers? One new law could transform global crime operations

The Register - Thu, 08/08/2019 - 14:00
Moscow's 'sovereign internet' effort means new rules for the bad guys too

Black Hat  The introduction of Russia's Sovereign Internet rules is having an impact on the way criminal hackers around the world do business.…

Categories: News

Transport for London Oyster system pulled offline after miscreants enter customers' accounts

The Register - Thu, 08/08/2019 - 12:38
Public sector bods blame users recycling logins

Exclusive  Transport for London's online Oyster travel smartcard system has been accessed by miscreants using customer credentials, The Reg can reveal, as the transport authority keeps the website offline for a second day.…

Categories: News

WTF is Boeing on? Not just customer databases lying around on the web. 787 jetliner code, too, security bugs and all

The Register - Thu, 08/08/2019 - 07:56
Fears of cyber-hijackings? That's plane crazy, says Dreamliner maker

Black Hat  A Black Hat presentation on how to potentially hijack a 787 – by exploiting bugs found in internal code left lying around on a public-facing server – was last night slammed as "irresponsible and misleading" by Boeing.…

Categories: News

FBI, NSA to hackers: Let us be blunt. Weed need your help. We'll hire you even if you've smoked a little pot in the past

The Register - Thu, 08/08/2019 - 05:21
Now that's what we call a joint task force: Uncle Sam chills out, relaxes recruitment rules on drugs

Black Hat  America's crime-fighters, desperate to recruit white-hat hackers to collar spies and cyber-crooks, have been quietly and slightly relaxing the ban on hiring anyone who has used illegal drugs.…

Categories: News

Hack computers to steal someone's identity in China? Why? You can just buy one from a bumpkin for, like, $3k

The Register - Wed, 07/08/2019 - 21:09
Exploit an 3l33t zero-day and reverse-shell that backend DB proxy server... or simply pay this farmer off

Black Hat  Black Hat founder Jeff Moss opened this year's shindig in Las Vegas with tales of quite how odd the hacking culture in China is.…

Categories: News

Hack-age delivery! Wardialing, wardriving... Now warshipping: Wi-Fi-spying gizmos may lurk in future parcels

The Register - Wed, 07/08/2019 - 19:36
Maybe, maybe not. These hack-in-a-box widgets are something to think about at least, says Big Blue

Black Hat  IBM's X-Force hacking team have come up with an interesting variation on wardriving – you know, when you cruise a neighborhood scouting for Wi-Fi networks. Well, why not try using the postal service instead, and called it "warshipping," Big Blue's eggheads suggested earlier today.…

Categories: News

Your mid-week infosec news bonanza: Cisco bugs, VMware-Nvidia guest escapes, KDE hijacking, and more

The Register - Wed, 07/08/2019 - 01:40
Including: Microsoft spins up Azure security lab, offers more bug bounty cash

Roundup  Before letting the IT staff clock out early this week, make sure they read up on the following security notices out this week.…

Categories: News


Subscribe to Sec Tec Limited aggregator - News