Android OS Set Top Boxes Target of Botnet

A new botnet known as “Ares” is targeting misconfigured set top boxes that run the light-weight Android OS.  Two older botnets, Fbot and Trinity, are also targeting this misconfiguration.  A module, the Android Debug Bridge (ADB), is the specific vulnerability, and it should not be available at all.  The debug bridge is used by software developers during code writing to check for flaws, ...

Continue Reading →
0

Hack Turns iPhones and Android phones into Ultimate Surveillance Tool

If you visited certain websites with your iPhone (or Android or Windows device**) over the last two years, it is possible that your iPhone downloaded and installed malware that allowed attackers to intercept and record everything you did and everywhere you went with your iPhone.  This includes real-time location information, all your emails and messaging (including encrypted versions ...

Continue Reading →
0

Many Popular Printers Provide Easy Attack Surfaces

Printers seems to be simple devices that we use to convert information into a physical form, usually text on paper.  But all printers are really small special purpose computers.  They have processors, RAM memory, and storage in the form of solid state chips or entire hard drives.  The operating system is often some form of Linux.  They usually can be accessed and ...

Continue Reading →
0

Guest Post – Have an Android Smartphone? Beware of Agent Smith

Another guest post by Tony Chiappetta of CHIPS

Agent Smith is frightening Google Android users around the world. This malware has replaced legitimate apps with malicious versions on 25 million Android devices. Here is what you need to know.

Around 25 million Google Android devices have been infected with a new variant of mobile malware. ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


U.S. Cyber Command Shares 11 New Malware Samples

Original release date: September 8, 2019

U.S. Cyber Command has released 11 malware samples to the malware aggregation tool and repository, VirusTotal. The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review U.S. Cyber Command’s VirusTotal page to view the samples. CISA ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


September is National Preparedness Month: Be Prepared, Not Scared

Original release date: August 28, 2019

National Preparedness Month (NPM) promotes family and community disaster and emergency planning. This year’s theme is “Prepared, Not Scared.”

Although most people understand that being prepared is essential to getting through an emergency such as a natural disaster, there is less awareness about ...

Continue Reading →
0

Remote Desktop Protocol is Still a Top Attack Vector

Phishing for login credentials may still be the way most network breaches happen, but insecure use of remote desktop protocol is another favorite vulnerability used by attackers to enter a network..  Sophos Naked Security reported their findings on the use of RDP or the Remote Desktop Protocol as a launch vector for accessing and ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


50th Anniversary of Apollo 11 Moon Landing

Apollo 11 was the spaceflight that landed the first two people on the Moon. Commander Neil Armstrong and lunar module pilot Buzz Aldrin, both American, landed the Apollo Lunar Module Eagle on July 20, 1969, at 20:17 UTC. Armstrong became the first person to step onto the lunar surface ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Cop awarded $585K after colleagues snooped on her via license database

A local story made the international press.  Why do Twin Cities and Minnesota cops think the driver’s license database is a dating app?  Krekelberg alleged that 58 fellow officers broke a federal privacy law by searching for her driver’s license data without any reason.


Continue Reading →
0

Guest Post – Can You Trust Your Trusted Sources?

What follows is a sponsored post from cybersecurity firm Sequretek.

Businesses usually tend to trust their partners/ technology partners when related to the security of the data flowing across partners. This approach has changed drastically these days; now businesses themselves need to focus on their cyber security measures. There is a sudden rise in the number of supply chain attacks, by which we can conclude that attackers are easily spotting out vulnerabilities in the supply chain network of the organisations. Today, ...

Continue Reading →
0
Page 4 of 15 «...23456...»