HackDig : Dig high-quality web security articles for hackers

Report: TikTok Harvested MAC Addresses By Exploiting Android Loophole

The ongoing controversies surrounding TikTok hit a new gear on Thursday with a bombshell report accusing the Chinese company of spying on millions of Android users using a technique banned by Google.According to a Wall Street Journal report, TikTok used a banned tactic to bypass the privacy safeguard in Android to collect unique identifiers from millions of
Publish At:2021-01-14 14:59 | Read:151 | Comments:0 | Tags:Endpoint Security Mobile Security NEWS & INDUSTRY Applic

DHS Details Risks of Using Chinese Data Services, Equipment

In an advisory this week, the Department of Homeland Security (DHS) warned American organizations of the risks posed by using data services and equipment from firms that have ties to the People’s Republic of China (PRC).Both businesses and customers in the United States are at risk due to the PRC’s data collection activities, the DHS warns. Some of these ris
Publish At:2020-12-23 12:35 | Read:226 | Comments:0 | Tags:NEWS & INDUSTRY Wireless Security Risk Management Mobile

Vulnerabilities in Standalone 5G Networks Expose Users to Attacks

Vulnerabilities in the protocols used by standalone 5G network implementations could expose users to information theft, impersonation, and other types of attacks, Positive Technologies warned on Wednesday.Current 5G networks are non-standalone implementations that are based on the existing 4G LTE infrastructure, but wireless carriers are expected to invest h
Publish At:2020-12-17 00:35 | Read:338 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Wireless Security Risk M

German Government Backs Bill Requiring 5G Security Pledge

German Chancellor Angela Merkel’s Cabinet approved a bill Wednesday that would require companies involved in setting up critical infrastructure such as high-speed 5G networks to guarantee that their equipment can’t be used for sabotage, espionage or terrorism.The bill, which now goes to parliament, seeks to address concerns that vendors such as Chinese tech
Publish At:2020-12-16 16:47 | Read:208 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY SCADA / ICS Wireless Sec

Apple Patches Code Execution Flaws iOS and iPadOS

Apple on Monday released a major point-upgrade to its flagship iOS and iPadOS mobile operating systems to patch a handful of serious security vulnerabilities.The iOS 14.3 and iPadOS 14.3 release will provide cover for 11 documented security flaws, some serious enough to expose iPhones and iPads to code execution attacks.The most serious of the bugs could all
Publish At:2020-12-14 17:59 | Read:200 | Comments:0 | Tags:Endpoint Security Mobile Security NEWS & INDUSTRY Email

Google Details iPhone Zero-Click Exploit Allowing Theft of User Data

Google Project Zero has disclosed the details of an iOS exploit that allows an attacker to hack iPhones remotely over Wi-Fi and steal sensitive data, without any user interaction.The exploit was uncovered by Google Project Zero researcher Ian Beer — who over the past year has found numerous critical vulnerabilities in Apple products — as a result of a six-mo
Publish At:2020-12-02 09:35 | Read:209 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Wireless Security Vulner

UK Telecom Companies Face Big Fines Under New Security Law

Telecom companies in Britain face hefty fines if they don’t comply with strict new security rules under a new law proposed in Parliament on Tuesday that is aimed at blocking high-risk equipment suppliers like China’s Huawei.The Telecommunications (Security) Bill tightens security requirements for new high speed 5G wireless and fiber optic networks, with the
Publish At:2020-11-24 10:29 | Read:202 | Comments:0 | Tags:NEWS & INDUSTRY Wireless Security Risk Management Mobile

Researchers Show Tesla Model X Can Be Stolen in Minutes

Researchers from the Computer Security and Industrial Cryptography (COSIC) group at the KU Leuven university in Belgium have demonstrated that a Tesla Model X can be stolen in minutes by exploiting vulnerabilities in the car’s keyless entry system.The vulnerabilities exploited in the attack were reported to Tesla in mid-August and they were patched recently
Publish At:2020-11-23 11:05 | Read:264 | Comments:0 | Tags:NEWS & INDUSTRY Wireless Security Vulnerabilities Mobile

Boom in Demand for Friendly Hackers as 5G Approaches

As the number of online devices surges and superfast 5G connections roll out, record numbers of companies are offering handsome rewards to ethical hackers who successfully attack their cybersecurity systems.The fast-expanding field of internet-connected devices, known as the "internet of things" (IoT) which includes smart televisions and home appliances, are
Publish At:2020-11-18 17:59 | Read:234 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Wireless Security Mobile

Huawei Wins Stay Against Exclusion From Sweden 5G

A Swedish court has suspended a decision banning Huawei equipment from the country's 5G network while it considers the merits of the case against the Chinese telecoms giant.The ruling by the Stockholm administrative court forced the Swedish Post and Telecom Authority (PTS) to announce late Monday that it would postpone an auction of 5G network frequencies th
Publish At:2020-11-12 09:52 | Read:198 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Wireless Security Compli

Bug Bounty Hunters Earn $1.2 Million at Chinese Hacking Competition

Bug bounty hunters have earned a total of more than $1.2 million over the weekend at the 2020 Tianfu Cup International PWN Contest, a major hacking competition that takes place every year in China.Organizers of the event describe it as “China’s Pwn2Own” and this year the prize pool exceeded $1 million.A total of 15 teams signed up for the 2020 Tianfu Cup and
Publish At:2020-11-09 11:40 | Read:391 | Comments:0 | Tags:Mobile Security Network Security NEWS & INDUSTRY Wireles

Huawei Appeals Swedish 5G Ban

Chinese telecoms group Huawei has appealed Sweden's decision to ban it from the country's 5G network for security reasons, a legal filing obtained by AFP on Friday showed.The ban, announced by the Swedish Post and Telecom Authority (PTS) on October 20, "lacks legal basis, violates fundamental human rights, violates fundamental EU legal principles ... and is
Publish At:2020-11-06 13:28 | Read:287 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Wireless Security Risk M

Akamai Acquires Asavie for Its Mobility, IoT Services

Akamai on Tuesday announced that it has acquired Asavie, an Ireland-based company that provides mobility, IoT and cybersecurity solutions.Asavie has developed a platform that helps enterprises secure their mobile and IoT devices by placing assets inside private network slices. The company says it uses machine learning and anomaly detection to secure networks
Publish At:2020-10-27 15:34 | Read:482 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Wireless Security Mobile

Sweden Bans Huawei, ZTE From 5G, Calls China Biggest Threat

Sweden is banning Chinese tech companies Huawei and ZTE from building new high-speed wireless networks after a top security official called China one of the country’s biggest threats.The Swedish telecom regulator said Tuesday that four wireless carriers bidding for frequencies in an upcoming spectrum auction for the new 5G networks must not use equipment fro
Publish At:2020-10-21 07:28 | Read:374 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Wireless Security Risk M

BleedingTooth: Vulnerabilities in Linux Bluetooth Allow Zero-Click Attacks

Bluetooth vulnerabilities that a Google security researcher has identified in the Linux kernel could be exploited to run arbitrary code or access sensitive information.Referred to as BleedingTooth, the issues were identified by Andy Nguyen, a security engineer from Google, and are tracked as CVE-2020-12351, CVE-2020-12352, and CVE-2020-24490. They were intro
Publish At:2020-10-14 15:34 | Read:542 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Wireless Security Vulner

Tools

Tag Cloud