Archives: June 2018
You are here: Home \ 2018 \ June \ Page 3
A new botnet from the Dark Web displays a never-before-seen level of complexity in terms of the sheer breadth of its various tools.
This is the first evidence of the China-linked threat actor’s activity since hacked the U.K. government and military in 2017 (which wasn’t made public until 2018).
The onus behind IoT security has become so muddled that no one knows who to point fingers at.
The threat actors appear to be in a reconnaissance phase, which could be a prelude to a larger cyber-sabotage attack meant to destroy and paralyze infrastructure.
Researchers were able to discover a way to hack the device in less than an hour.
The devices don’t require authentication for connections received on a local network; and, HTTP is used to configure or control embedded devices.
Researchers demonstrate how an encrypted macOS hard drive can still leak unprotected data via the operating system’s Finder and QuickLook feature.
Attackers can remotely access the infrastructure to install, remove or encrypt any application that the affected companies are running in the cloud.
The IP cameras have a slew of bugs allowing bad actors to control them, add them to a botnet, or render them useless.
In a David-and-Goliath moment, the 49-year-old librarian has won satisfaction in the wake of its head-spinningly massive 2017 data breach.