You Are Here: Home » Posts tagged "vulnerability"

Backdoor Still Hidden in Patch for Wi-Fi Routers

The backdoor affecting Sercomm wireless DSL routers has not been fixed, and lays hidden in the latest version of the devices’ firmware to intercept users’ home traffic, according to Ars Technica. In December 2013, Eloi Vanderbecken discovered hackers could exploit his parents’ Linksys Wi-Fi router to gain administrative rights and manipulate local network resources without admin credentials. The device was ...

Yahoo shows cavalier attitude to info-leaking Flickr vulnerability, but finally plugs privacy hole

I have long believed that for security to succeed inside a company, it really needs to be part of their DNA. You need to live-and-breathe security every day to have a proper chance of protecting your computers and sensitive data (and that of your customers and partners) from hackers and privacy breaches. Image credit: Yahoo And some companies just haven't got it yet. Yahoo, for instance, hasn't had the most...

GnuTLS Bug Leaves Linux-Speaking Internet Open to Eavesdropping

A newly discovered vulnerability in the Gnu implementation of TLS is threatening the privacy of users running major distributions of Linux. The bug resides in the GnuTLS implementation and can be used to facilitate a man-in-the-middle attack and decrypt web traffic, according to GnuTLS’s security advisory. “It was discovered that GnuTLS X.509 certificate verification code failed to properly handle certain e...

Criminals Clear Bank Account through DNS Redirections on Home Routers

Fraudsters redirect users’ bank-related queries to phishing webpages and steal their banking login data by exploiting vulnerabilities in home routers, according to security researchers of Poland’s Computer Emergency Response Team (CERT Polska). Hackers use the software bugs to remotely modify the router DNS setting. Every time users from inside the network attempt to connect to an online banking service, th...

Buggy Webcams, IP Cameras and Baby Monitors Reveal Too Much to Anyone

Some models of webcams, IP surveillance cameras and baby monitors from Chinese manufacturer Foscam have vulnerable firmware that permits anyone with access to the device’s Internet address to catch live streaming and even record videos. Camera experts reported on the company’s support portal that many Foscam cameras can too easily be accessed by unauthorized persons with only the device’s Internet address a...

Banco do Brasil Error Lets Clients See Balances of Others

Up to 5 million clients of Banco do Brasil could spy on fellow customers for an hour after a breach that allowed them to see strangers’ personal details, according to ZDNet. The vulnerabilities discovered on Monday only affected clients of the bank’s mobile app designed for both iOS and Android devices. For about an hour, clients of Brazil’s biggest bank could peek at other customers’ private information su...

Booze and Cash for iPhone Fingerprint Hackers

Hackers worldwide are competing for booze, cash and other tempting awards to crack the new iPhone’s fingerprint scanner, according to Reuters. Besides $13,000, hackers who find vulnerabilities will receive Bitcoins, books, wine and whiskey. Security expert David Kennedy is one of those participating in the hacking contest. “I am just waiting to get my hands on it to figure out how to get around it first,” K...

Authentication Flaw in Tesla Model S Opens Door to Hackers, Researcher Says

George Reese, a Senior Distinguished Engineer and Executive Director of Cloud Computing at Dell, says the authentication system in the Tesla Model S car’s API has a vulnerability that hackers could use to remotely control some functions of the car. Drivers of Tesla electronic car can remotely trigger some actions in their car if they log into https://portal.vn.teslamotors.com/vehicles and register on the po...

Security Flaw in Philips Lighting System Lets Hackers Keep You in the Dark

A misfortunate implementation of the security token in the Hue intelligent lighting system from Phillips could allow an attacker to control the lights in your home and turn them on or off as they wish. According to a paper by security researcher Nitesh Dhanjani, the problem arises from the fact that mobile devices or PCs used to control the lighting system are authorized with a token (a unique identifier) d...

Fox News Scam about Syria and World War 3 Infects Users with Malware

Cyber-criminals are taking advantage of the civil war in Syria and use the Fox News reputation to infect users with malware. The e-mails pose as newsletters of the media company and incorporate malicious links on several buttons, including 'unsubscribe.' To lure readers into clicking on the malicious URL, scammers promise exclusive videos and articles about the Syrian conflict. They also create a sense of u...

© 2012 Powered By Bitdefender

x
Loading...
Scroll to top