Posts

Showing posts from August, 2024

Taylor Swift Concert Terror Plot Was Thwarted by Key CIA Tip

Plus: China-linked hackers infiltrate US internet providers, authorities crack down on a major piracy operation, and a ransomware gang claims attacks during the Paris Olympics. from Security Latest https://ift.tt/7QJPey2

Powerful Spyware Exploits Enable a New String of ‘Watering Hole’ Attacks

Suspected Russian hackers have compromised a series of websites to utilize sophisticated spyware exploits that are eerily similar to those created by NSO Group and Intellexa. from Security Latest https://ift.tt/GsfoRpi

Google, Apple, and Discord Let Harmful AI 'Undress' Websites Use Their Sign-On Systems

Single sign-on systems from several Big Tech companies are being incorporated into deepfake generators, WIRED found. Discord and Apple have started to terminate some developers’ accounts. from Security Latest https://ift.tt/07I9bHv

Notorious Iranian Hackers Have Been Targeting the Space Industry With a New Backdoor

In addition to its longstanding password spraying attacks, Microsoft says Iran-backed hacker group Peach Sandstorm— or APT 33—has developed custom malware dubbed “Tickler.” from Security Latest https://ift.tt/VNbR2gC

Telegram CEO Pavel Durov’s Arrest Linked to Sweeping Criminal Investigation

French authorities detained Durov to question him as part of a probe into a wide range of alleged violations—including money laundering and CSAM—but it remains unclear if he will face charges. from Security Latest https://ift.tt/TlSJeNj

Pavel Durov's Arrest Leaves Telegram Hanging in the Balance

Durov has reportedly been detained in France over Telegram's alleged failure to adequately moderate illegal content on the messaging app. His arrest sparked backlash and left some associates asking, what now? from Security Latest https://ift.tt/ysqRXPb

The US Navy Has Run Out of Pants

Plus: The US intelligence community formally blames Iran for Trump campaign hack, aircraft-tracking platform FlightAware says a “configuration error” exposed sensitive user data, and more. from Security Latest https://ift.tt/C1ap8iX

When War Came to Their Country, They Built a Map

The Telegram channel and website Deep State uses public data and insider intelligence to power its live tracker of Ukraine’s ever-shifting front line. from Security Latest https://ift.tt/QS6iIXB

Stadiums Are Embracing Face Recognition. Privacy Advocates Say They Should Stick to Sports

Protesters took to Citi Field Wednesday to raise awareness of the facial recognition systems that have become common at major league sporting venues. from Security Latest https://ift.tt/bs3Aurh

The US Government Wants You—Yes, You—to Hunt Down Generative AI Flaws

The AI ethics nonprofit Humane Intelligence and the US National Institute of Standards and Technology are launching a series of contests to get more people probing for problems in generative AI systems. from Security Latest https://ift.tt/36MIaJc

An AWS Configuration Issue Could Expose Thousands of Web Apps

Amazon has updated its instructions for how customers should more securely implement AWS's traffic-routing service known as Application Load Balancer, but it's not clear everyone will get the memo. from Security Latest https://ift.tt/V7zqNBD

The Pentagon Is Planning a Drone ‘Hellscape’ to Defend Taiwan

The US Defense Department’s grand strategy for protecting Taiwan from a massive Chinese military offensive involves flooding the zone with thousands of drones. from Security Latest https://ift.tt/OxSlHso

Geofence Warrants Ruled Unconstitutional—but That’s Not the End of It

Plus: US regulators fine T-Mobile $60 million for mishap with sensitive data, New Zealand approves Kim Dotcom’s US extradition, and San Francisco takes on deepfake porn. from Security Latest https://ift.tt/csVCMb6

The Slow-Burn Nightmare of the National Public Data Breach

Social Security numbers, physical addresses, and more—all available online. After months of confusion, leaked information from a background check firm underscores the long-term risks of data breaches. from Security Latest https://ift.tt/nX3T4I6

Nearly All Google Pixel Phones Exposed by Unpatched Flaw in Hidden Android App

A fix is coming, but data analytics giant Palantir says it’s ditching Android devices altogether because Google’s response to the vulnerability has been troubling. from Security Latest https://ift.tt/hZ6Jp9P

A Single Iranian Hacker Group Targeted Both Presidential Campaigns, Google Says

APT42, which is believed to work for Iran’s Revolutionary Guard Corps, targeted about a dozen people associated with both Trump and Biden’s campaigns this spring, according to Google’s Threat Analysis Group. from Security Latest https://ift.tt/zYorcnC

Your Gym Locker May Be Hackable

Security researchers say they’ve extracted digital management keys from select electronic lockers and revealed how they could be cloned. from Security Latest https://ift.tt/t5g1lO9

Want to Win a Bike Race? Hack Your Rival’s Wireless Shifters

Please don’t, actually. But do update your Shimano Di2 shifters’ software to prevent a new radio-based form of cycling sabotage. from Security Latest https://ift.tt/16tMVfP

Thousands of Corporate Secrets Were Left Exposed. This Guy Found Them All

Security researcher Bill Demirkapi found more than 15,000 hardcoded secrets and 66,000 vulnerable websites—all by searching overlooked data sources. from Security Latest https://ift.tt/Uu4VKwE

The Hacker Who Hunts Video Game Speedrunning Cheaters

Allan “dwangoAC” has made it his mission to expose speedrunning phonies. At the Defcon hacker conference, he’ll challenge one record that's stood for 15 years. from Security Latest https://ift.tt/7oP5fHv

Apple Prototypes and Corporate Secrets Are for Sale Online—If You Know Where to Look

On the hunt for corporate devices being sold secondhand, a researcher found a trove of Apple corporate data, a Mac Mini from the Foxconn assembly line, an iPhone 14 prototype, and more. from Security Latest https://ift.tt/JBWnxR3

Google Researchers Found Nearly a Dozen Flaws in Popular Qualcomm Software for Mobile GPUs

The vulnerabilities, which have been patched, may have novel appeal to attackers as an avenue to compromising phones. from Security Latest https://ift.tt/CNH8h9g

Flaws in Ubiquitous ATM Software Could Have Let Attackers Take Over Cash Machines

Six vulnerabilities in ATM-maker Diebold Nixdorf’s popular Vynamic Security Suite could have been exploited to control ATMs using “relatively simplistic attacks.” from Security Latest https://ift.tt/pnKgDfs

‘Sinkclose’ Flaw in Hundreds of Millions of AMD Chips Allows Deep, Virtually Unfixable Infections

Researchers warn that a bug in AMD’s chips would allow attackers to root into some of the most privileged portions of a computer—and that it has persisted in the company’s processors for decades. from Security Latest https://ift.tt/QwNnSxT

How Hackers Extracted the ‘Keys to the Kingdom’ to Clone HID Keycards

A team of researchers have developed a method for extracting authentication keys out of HID encoders, which could allow hackers to clone the types of keycards used to secure offices and other areas worldwide. from Security Latest https://ift.tt/EVlmYSC

Tricky Web Timing Attacks Are Getting Easier to Use—and Abuse

New research shows how known techniques for finding weaknesses in websites are actually practical in uncovering vulnerabilities, for better or worse. from Security Latest https://ift.tt/cizE5QW

Microsoft’s AI Can Be Turned Into an Automated Phishing Machine

Attacks on Microsoft’s Copilot AI allow for answers to be manipulated, data extracted, and security protections bypassed, new research shows. from Security Latest https://ift.tt/uW1mp8s

USPS Text Scammers Duped His Wife, So He Hacked Their Operation

The Smishing Triad network sends up to 100,000 scam texts per day globally. One of those messages went to Grant Smith, who infiltrated their systems and exposed them to US authorities. from Security Latest https://ift.tt/Llh7zQM

Watch How a Hacker’s Infrared Laser Can Spy on Your Laptop’s Keystrokes

Hacker Samy Kamkar is debuting his own open source version of a laser microphone—a spy tool that can invisibly pick up the sounds inside your home through a window, and even the text you’re typing. from Security Latest https://ift.tt/kstTqZe

Inside the Dark World of Doxing for Profit

From tricking companies into handing over victims’ personal data to offering violence as a service, the online doxing ecosystem is not just still a problem—it’s getting more extreme. from Security Latest https://ift.tt/l6Pc2iJ

A Flaw in Windows Update Opens the Door to Zombie Exploits

A researcher found a vulnerability that would let hackers strategically downgrade a target’s Windows version to reexpose patched vulnerabilities. Microsoft is working on fixes for the issue. from Security Latest https://ift.tt/bB8Jv6Q

A New Plan to Break the Cycle of Destructive Critical Infrastructure Hacks

As digital threats against US water, food, health care, and other vital sectors loom large, a new project called UnDisruptable27 aims to help fix cybersecurity weaknesses where other efforts have failed. from Security Latest https://ift.tt/ibwnkrB

How Project 2025 Would Put US Elections at Risk

Experts say the “nonsensical” policy proposal, which largely aligns with Donald Trump’s agenda, would weaken the US agency tasked with protecting election integrity, critical infrastructure, and more. from Security Latest https://ift.tt/M0PzJe9

US Hands Over Russian Cybercriminals in WSJ Reporter Prisoner Swap

Plus: Meta pays $1.4 million in a historic privacy settlement, Microsoft blames a cyberattack for a major Azure outage, and an artist creates a face recognition system to reveal your NYPD “coppelganger.” from Security Latest https://ift.tt/tkAdGHC

Sensitive Illinois Voter Data Exposed by Contractor's Unsecured Databases

Social Security numbers, death certificates, voter applications, and other personal information was accessible on the open internet, highlighting the ongoing challenges in election security. from Security Latest https://ift.tt/ezmGbJE

He Was an FBI Informant—and Inspired a Generation of Violent Extremists

Joshua Caleb Sutter infiltrated far-right extremist organizations as a confidential FBI informant, all while promoting hateful ideologies that influenced some of the internet's most violent groups. from Security Latest https://ift.tt/GurICbj

A $500 Open-Source Tool Lets Anyone Hack Computer Chips With Lasers

The RayV Lite will make it hundreds of times cheaper for anyone to carry out physics-bending feats of hardware hacking. from Security Latest https://ift.tt/1FVrIpG