HackDig : Dig high-quality web security articles for hacker

Vulnerabilities Expose Lexus, Toyota Cars to Hacker Attacks

Vulnerabilities in Lexus and Toyota cars could be exploited by hackers to launch remote attacks against affected vehicles, researchers at China-based Tencent Keen Security Lab discovered.Research into the AVN (Audio, Visual and Navigation) system in the 2017 Lexus NX300 — the same system is also used in other models, including LS and ES series — has revealed
Publish At:2020-03-30 16:09 | Read:185 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Wireless Security Vulner

Senator Urges Vendors to Secure Networking Devices Amid COVID-19 Outbreak

U.S. Sen. Mark R. Warner (D-VA) this week sent letters to six Internet networking device vendors urging them to ensure that their products remain secure during the COVID-19 social distancing efforts.The coronavirus pandemic has forced many to isolate themselves at home to help stop the virus spread, which resulted in a significant increase in the use of Inte
Publish At:2020-03-27 12:17 | Read:192 | Comments:0 | Tags:Network Security NEWS & INDUSTRY Virus & Threats Wir

ZenKey: How Major Mobile Carriers Are Teaming Up to Eliminate Passwords

ZenKey Links Mobile Phones Directly to Carrier APIs and Avoids Users Having to Use Passwords After Authenticating a PhoneFour major U.S. carriers are developing a new single sign-on variant they believe will do away with the need for passwords. Their solution is new mobile app called ZenKey that securely ties the user's device to the carrier, and t
Publish At:2020-03-24 12:13 | Read:183 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Fraud & Identity The

T-Mobile Notifying Customers of Data Breach

Wireless carrier T-Mobile is sending notifications to its customers to inform them of a data breach that resulted in some of their personal information being compromisedThe incident, the company says, was a sophisticated, malicious attack that targeted its email vendor. As part of the assault, unknown adversaries gained unauthorized access to the email accou
Publish At:2020-03-05 11:18 | Read:299 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Privacy Incident Respons

Telecom Sector Increasingly Targeted by Chinese Hackers: CrowdStrike

Threat actors linked to China increasingly targeted the telecommunications sector in 2019, according to endpoint security firm CrowdStrike.CrowdStrike on Tuesday published its 2020 Global Threat Report, which provides data on both state-sponsored and financially-motivated operations observed by the company last year.The report shows that the telecommunicatio
Publish At:2020-03-03 09:59 | Read:172 | Comments:0 | Tags:Cyberwarfare Mobile Security NEWS & INDUSTRY Virus &

Cisco to Release Updates for Wireless Products Affected by Kr00k Vulnerability

Cisco says it will release patches for wireless devices affected by the recently disclosed Wi-Fi chip vulnerability named Kr00k. The company says the flaw impacts some of its routers, firewalls, access points and phones.Cybersecurity firm ESET revealed on Wednesday that over one billion Wi-Fi-capable devices were at one point affected by a vulnerability that
Publish At:2020-02-27 16:10 | Read:289 | Comments:0 | Tags:NEWS & INDUSTRY Wireless Security Vulnerabilities Mobile

Kr00k Vulnerability Exposed Data From Over a Billion Wi-Fi Devices

A new vulnerability, which may have affected over one billion Wi-Fi-capable devices before patches were released, could have allowed hackers to obtain sensitive information from wireless communications, cybersecurity firm ESET revealed on Wednesday.Dubbed Kr00k and tracked as CVE-2019-15126, the vulnerability caused devices to use an all-zero encryption key
Publish At:2020-02-26 13:37 | Read:224 | Comments:0 | Tags:NEWS & INDUSTRY Wireless Security Vulnerabilities Data P

Mobile Networks Vulnerable to IMP4GT Impersonation Attacks

A group of researchers at Ruhr-Universität Bochum and NYU Abu Dhabi have discovered a new attack on 4G and 5G mobile networks that can be used to impersonate users.Called IMP4GT (IMPersonation attacks in 4G NeTworks), the attack demonstrates that the currently used mutual authentication method, where the smartphone and the network verify their identities, is
Publish At:2020-02-25 11:05 | Read:351 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Virus & Threats Frau

Huawei Loses Legal Challenge Against US Federal Purchase Ban

Washington has the right to block US federal agencies from buying products by Huawei on cybersecurity grounds, a judge has ruled, dismissing the Chinese telecom giant's legal challenge to a purchase ban.Huawei filed the suit nearly a year ago, claiming that Congress had failed to provide evidence to support a law that stopped government agencies from buying
Publish At:2020-02-19 14:46 | Read:239 | Comments:0 | Tags:NEWS & INDUSTRY Virus & Threats Wireless Security Co

SweynTooth: Bluetooth Vulnerabilities Expose Many Devices to Attacks

Security researchers have discovered numerous vulnerabilities in the Bluetooth Low Energy (BLE) implementations of major system-on-a-chip (SoC) vendors.BLE is a wireless communication technology designed to reduce the battery drainage of mobile and Internet of Things (IoT) devices. Consisting of a set of standardized protocols, BLE provides connectivity betw
Publish At:2020-02-15 16:11 | Read:234 | Comments:0 | Tags:NEWS & INDUSTRY Wireless Security Vulnerabilities Mobile

Critical Bluetooth Vulnerability Exposes Android Devices to Attacks

One of the security flaws that Google addressed with the February 2020 set of Android patches is a critical vulnerability in Bluetooth that could lead to code execution.A total of 25 vulnerabilities were fixed with Android’s February 2020 security updates, and the most important of them are two critical severity issues is System.One of these is CVE-2020-0022
Publish At:2020-02-07 10:15 | Read:437 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Wireless Security Vulner

US Says EU Understands 5G Risks But Pushes on Huawei

The United States on Thursday welcomed the European Union's new rules on fifth-generation internet but pressed them to go further after the bloc resisted Washington's pressure to ban China's Huawei directly.The European Union, setting guidelines that mirror those announced a day earlier by Britain, said Wednesday that countries should ban telecoms operators
Publish At:2020-01-31 10:20 | Read:383 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Wireless Security Risk M

UK 'to Decide on Huawei 5G Next Week'

Britain is expected to announce next week whether to allow China's Huawei to develop its 5G network, an official said on Friday, setting out reasons for agreeing despite US opposition.The official said the decision had not yet been taken but it was likely to be next week.There had been speculation that Britain would allow Huawei into "non-core" elements of t
Publish At:2020-01-24 12:00 | Read:405 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Virus & Threats Wire

New Bill Would Prohibit Intelligence Sharing With Countries That Use Huawei

A bill introduced this week by Senator Tom Cotton (R-Arkansas) would ban the sharing of intelligence with countries that use Huawei technologies in their fifth generation (5G) networks.The United States has long expressed concerns that Huawei equipment may contain backdoors that would allow for the Chinese government to conduct espionage operations, and some
Publish At:2020-01-10 22:15 | Read:638 | Comments:0 | Tags:Mobile Security Network Security NEWS & INDUSTRY Wireles

Critical Vulnerabilities Impact Ruckus Wi-Fi Routers

Multiple critical vulnerabilities in Ruckus Wi-Fi routers used throughout the world were disclosed at the 36th Chaos Communication Congress (CCC) in Leipzig, Germany, held from December 27-30, 2019.Ruckus offers high-end wirelesss networking gear that provides mesh Wi-Fi (called 'Unleashed') and regular routers to hundreds of thousands of customers. The mesh
Publish At:2020-01-02 22:15 | Read:441 | Comments:0 | Tags:NEWS & INDUSTRY Wireless Security Vulnerabilities

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud