web analytics

Tech Leaders Warn Against “Pandora’s Box” of Robotic Weapons

By AFP on August 21, 2017   Elon Musk is leading demands for a global ban on killer robots, warning technological advances could revolutionise warfare and create new “weapons of terror” that target innocent people.   The CEO of Tesla and SpaceX joined more than 100 robotics and artificial intelligence entrepreneurs in signing a letter… Continue reading Tech Leaders Warn Against “Pandora’s Box” of Robotic Weapons

The $500 gizmo that cracks iPhone passcodes – and how to stop it

August 21, 2017  by Paul Ducklin     A recent YouTube video shows a phone-sized hacking device recovering the passcode of an iPhone 7 or 7s in just a few minutes.   Posted by an American YouTuber going by the name of EverythingApplePro, the video features a $500 “iPhone unlocker” apparently bought online and imported… Continue reading The $500 gizmo that cracks iPhone passcodes – and how to stop it

ShadowPad Malware Strikes NetSarang Products

Another day, another malware. The latest victim’s name is NetSarang – a Korean software development company. It seems that the malware which has been named ShadowPad was successful in installing ‘what is known as backdoors’ in several of the products released by NetSarang and thereby gained access to confidential client information. Backdoors are essentially a… Continue reading ShadowPad Malware Strikes NetSarang Products

NHS HACK ATTACKAnonymous hacker claims to have stolen private data on up to 1.2million NHS patients

Contractor to the NHS has called in cops from the Met’s specialist Cyber Crime Unit after thief pilfered its medical database   By Shaun Wooler  18th August 2017   A COMPUTER geek with alleged links to global hacking group Anonymous has stolen patient data from an NHS appointment booking system. The crook breached a private… Continue reading NHS HACK ATTACKAnonymous hacker claims to have stolen private data on up to 1.2million NHS patients

Tsunami of DDoS-for-Hire Platforms Coming From the East

August 20, 2017  By Catalin Cimpanu     Over the past six months, a large number of DDoS-for-hire platforms — also known as DDoS booters or DDoS stressors — have appeared in China, all sporting the same interface, and seeming to be based on the same source code.   While the common train of thought… Continue reading Tsunami of DDoS-for-Hire Platforms Coming From the East

Chrome Adds Warning for When Extensions Take Over Your Internet Connection

August 20, 2017  By Catalin Cimpanu   Google engineers have added two neat features to the Chrome browser that will alert users of extensions that hijack proxy settings or the new tab page. The changes — spotted in Google Chrome Canary builds (v62.x) — are in the form of popups that appear to the right… Continue reading Chrome Adds Warning for When Extensions Take Over Your Internet Connection

No, the cops can’t get a search warrant to just seize all devices in sight – US appeals court

Judges frown upon fishing for incriminating data on phones By Thomas Claburn in San Francisco 18 Aug 2017     It’s a ruling sending shockwaves through the worlds of privacy, device security, and law enforcement in America.   The US Circuit Court of Appeals in the District of Columbia on Friday overturned the conviction of… Continue reading No, the cops can’t get a search warrant to just seize all devices in sight – US appeals court

Turla APT group adapts KopiLuwak backdoor for use in G20-themed attack

August 19, 2017  By Pierluigi Paganini   Security experts at Proofpoint have collected evidence that suggests that the Turla APT group is conducting a new espionage campaign. The experts discovered a newly dropper for the KopiLuwak backdoor, KopiLuwak is a JavaScript malware that was spotted early this year while the APT was delivering it to at least one victim leveraging a document… Continue reading Turla APT group adapts KopiLuwak backdoor for use in G20-themed attack

Hackers Can Hijack Phones via Replacement Screens: Researchers

By Eduard Kovacs on August 18, 2017   Touchscreens and other components that are often replaced in smartphones and tablets can hide malicious chips capable of giving attackers complete control over the device, warned researchers at the Ben-Gurion University of the Negev.   Researchers conducted their experiments on two Android devices: a Huawei Nexus 6P… Continue reading Hackers Can Hijack Phones via Replacement Screens: Researchers

Patching Against the Next WannaCry Vulnerability (CVE-2017-8620)

By Kevin Townsend on August 18, 2017   This month’s Microsoft patch updates include one particular vulnerability that is raising concerns: CVE-2017-8620, which affects all versions of Windows from 7 onwards. Microsoft explained, “in an enterprise scenario, a remote unauthenticated attacker could remotely trigger the vulnerability through an SMB connection and then take control of… Continue reading Patching Against the Next WannaCry Vulnerability (CVE-2017-8620)