Top

Tag: vulnerabilities


Vulnerabilities

2 Million IoT Devices Vulnerable to Complete Takeover

April 30, 2019

Via: Threat Post

Over 2 million IP security cameras, baby monitors and smart doorbells have serious vulnerabilities that could enable an attacker to hijack the devices and spy on their owners — and there’s currently no known patch for the shared flaws. The […]


Wireless security

Verizon Patches Trio of Vulnerabilities in Home Router

April 10, 2019

Via: Dark Reading

Verizon has patched a trio of vulnerabilities in a router commonly used by millions of customers of the company’s Fios bundled Internet access, phone and TV service. The flaws, in Verizon’s Quantum Gateway routers, if exploited, could give attackers complete […]


Application security, Mobile security, Vulnerabilities

Preinstalled Mobile Security App on Xiaomi Handsets Delivered Vulnerabilities, Not Protection

April 5, 2019

Via: Threat Post

Preinstalled apps on mobile phones can be just as annoying as crapware found on new PCs. Now a report from security experts at Check Point Research suggest those preinstalled mobile apps may be more than just annoying – they can […]


Vulnerabilities

Backdoors inevitably create vulnerabilities that can be exploited by malicious actors

April 4, 2019

Via: Help Net Security

73 percent of IT security professionals believe countries with government-mandated encryption backdoors are more susceptible to nation-state attacks. The Venafi survey on government-mandated encryption backdoors evaluated the opinions of 517 IT security professionals attending the RSA Conference 2019. “This is […]


Vulnerabilities

Vulnerability management woes continue, but there is hope

April 1, 2019

Via: CSO Online

I remember giving a presentation when I first started working in cybersecurity in 2003 (note: It was called information security back then). I talked about the importance of good security hygiene, focusing on deploying secure system configurations, managing access controls, […]


Access control, Cloud security

Most IT and security professionals feel vulnerable to insider threats

March 21, 2019

Via: Help Net Security

91 percent of IT and security professionals feel vulnerable to insider threats, and 75 percent believe the biggest risks lie in cloud applications like popular file storage and email solutions such as Google Drive, Gmail, Dropbox and more. “The rise […]


Hacker, Mobile security, Vulnerabilities

Flaws in Smart Alarms Exposed Millions of Cars to Dangerous Hacking

March 11, 2019

Via: Security Week

Serious vulnerabilities found in high-end car alarms could have been exploited to remotely hack millions of vehicles, including to track them, immobilize them and spy on their owners. Researchers at UK-based penetration testing and cybersecurity firm Pen Test Partners have […]


Vulnerabilities

Thunderclap vulnerabilities allows to hack most of moder computers

February 27, 2019

Via: Security Affairs

Security experts from Rice University in the United States, University of Cambridge in the United Kingdom, and SRI International, have discovered a new set of security vulnerabilities that can be exploited by attackers via Thunderbolt, the hardware interface created by […]


Vulnerabilities

Most IoT devices are being compromised by exploiting rudimentary vulnerabilities

February 26, 2019

Via: Help Net Security

Cybercriminals are looking for ways to use trusted devices to gain control of Internet of Things (IoT) devices via password cracking and exploiting other vulnerabilities, such as through the exploitation via voice assistants, according to the latest Mobile Threat Report […]


Vulnerabilities

PDF viewers, online validation services vulnerable to digital signature spoofing attacks

February 26, 2019

Via: Help Net Security

Academics from Ruhr University Bochum have proven that the majority of popular PDF viewer apps and online digital signature validation services can be tricked into validating invalid signatures or validating signatures on documents that have been modified after having been […]