HackDig : Dig high-quality web security articles

How hackers are targeting your phone through Bluetooth

Bluetooth is an amazingly useful wireless technology built into almost every smartphone, tablet and laptop. We can use it to transfer files, play audio wirelessly, collect health data from wearable trackers and more. But like WiFi, Bluetooth is being targeted by hackers as a way to break into your devices and steal personal data. Because it is so useful, mos
Publish At:2021-03-29 05:24 | Read:264 | Comments:0 | Tags:Mobile News Security bluetooth Mobile Security security hack

Hacking Christmas Gifts: Brushing with Bluetooth

If high-tech gadgets are on your holiday shopping list, it is worth taking a moment to think about the particular risks they may bring. Under the wrong circumstances, even an innocuous gift may introduce unexpected vulnerabilities. In this blog series, VERT will be looking at some of the Internet’s best-selling holiday gifts with an eye toward thei
Publish At:2021-02-18 02:44 | Read:366 | Comments:0 | Tags:Internet of Things bluetooth gift IoT security hack

Google researcher found BleedingTooth flaws in Linux Bluetooth

Google security researcher discovered Bluetooth vulnerabilities (BleedingTooth) in the Linux kernel that could allow zero-click attacks. Andy Nguyen, a Google security researcher, has found Bluetooth vulnerabilities, referred to as BleedingTooth, in the Linux kernel that could be exploited by attackers to run arbitrary code or access sensitive information
Publish At:2020-10-14 20:47 | Read:837 | Comments:0 | Tags:Breaking News Hacking BleedingTooth Bluetooth hacking news i

Beware Drive-By Downloads in Safari – Intego Mac Podcast Episode 154

The popular fitness tracking app Strava can assist stalkers; Facebook is irked about European regulators; a new Bluetooth vulnerability takes a new tack on attacks; and we look at some disturbing drive-by downloads that are coming from rogue Google ads.Strava and stalkersFacebook Says it Will Stop Operating in Europe If Regulators Don’t Back DownShortly afte
Publish At:2020-09-30 12:04 | Read:671 | Comments:0 | Tags:Intego Mac Security Podcast Bluetooth Facebook Google Intego

Lock and Code S1Ep10: Pulling apart the Internet of Things with JP Taggart

This week on Lock and Code, we discuss the top security headlines generated right here on Labs and around the Internet. In addition, we talk to JP Taggart, senior security researcher at Malwarebytes, about the Internet of Things. For years, Internet capabilities have crept into modern consumer products, providing sometimes convenient, sometimes extra
Publish At:2020-07-07 14:23 | Read:1015 | Comments:0 | Tags:Podcast beacons bluetooth Chromebook chromebook antivirus In

Why Zero-Click Cyberthreats Should Be on Your Radar

For years, the statistics have told us that human error is the greatest contributor to cyberattacks. We’ve stressed the importance of training, training and more training to prevent the almost inevitable from happening. We’ve been convinced that the key to defending against cyberthreats is to keep the unsuspecting from clicking on phishing emails
Publish At:2020-07-02 15:59 | Read:839 | Comments:0 | Tags:Application Security Endpoint Mobile Security Advanced Malwa

A week in security (April 27 – May 3)

Last week on Malwarebytes Labs, we looked at how secure the cloud is, understood why unexpected demand can influence an organization to consider their “just in time” (JIT) system, speculated on why the threat actors behind the Troldesh ransomware suddenly released thousands of decryption keys, preached the good news about VPN being mainstream, touched on the
Publish At:2020-05-18 13:43 | Read:1042 | Comments:0 | Tags:Malwarebytes news Apple APT awis bluetooth bluetooth attack

CVE-2020-0022 an Android 8.0-9.0 Bluetooth Zero-Click RCE – BlueFrag

Nowadays, Bluetooth is an integral part of mobile devices. Smartphones interconnect with smartwatches and wireless headphones. By default, most devices are configured to accept Bluetooth connections from any nearby unauthenticated device. Bluetooth packets are processed by the Bluetooth chip (also called a controller), and then passed to the host (Android, L
Publish At:2020-05-03 08:57 | Read:1288 | Comments:0 | Tags:Breaking Android BlueFrag Bluetooth exploit

Mass surveillance alone will not save us from coronavirus

As the pattern-shattering truth of our new lives drains heavy—as coronavirus rends routines, raids our wellbeing, and whiplashes us between anxiety and fear—we should not look to mass digital surveillance to bring us back to normal. Already, governments have cast vast digital nets. South Koreans are tracked through GPS location history, credit card trans
Publish At:2020-04-15 18:12 | Read:2874 | Comments:0 | Tags:Opinion Apple Austria bluetooth Bluetooth contact tracing Bl

Apple and Google join forces to develop Contact Tracing app against Coronavirus

Google and Apple recently announced a joint project for the development of a Coronavirus ‘contact tracing’ tool for mobile devices. A contact tracing app is a tool that could be used to contain new diseases, like Coronavirus, by tracking down and quarantining everyone that gets infected and localize any person that has been in contact with hi
Publish At:2020-04-13 14:34 | Read:1707 | Comments:0 | Tags:Breaking News Digital ID Security Bluetooth contact tracing

Biotech health care innovations meet security challenges

The level and speed of innovations taking place in the biotech industry are baffling. On the one hand, it makes us hopeful we can quickly reduce the number of illnesses and their consequences through technological advancement—saving thousands of lives. On the other, concerns about the application of Internet-connected technology leave us wondering: at what c
Publish At:2020-02-25 14:40 | Read:1555 | Comments:0 | Tags:Vital infrastructure AI biosensors BLE bluetooth dna-test fd

SweynTooth Bluetooth flaws affect devices from major system-on-a-chip (SoC) vendors

Security experts have discovered multiple flaws, dubbed SweynTooth, in the Bluetooth Low Energy (BLE) implementations of major system-on-a-chip (SoC) vendors. A group of researchers has discovered multiple vulnerabilities, tracked as SweynTooth, in the Bluetooth Low Energy (BLE) implementations of major system-on-a-chip (SoC) vendors. The group was co
Publish At:2020-02-15 17:31 | Read:1167 | Comments:0 | Tags:Breaking News Hacking Internet of Things Bluetooth informati

Bluetooth bugs – researchers find 10 “Sweyntooth” security holes

byPaul DucklinA trio of researchers from Singapore just published a paper detailing a number of security holes they discovered in Bluetooth chips from several different vendors.The good news is that they disclosed the holes responsibly back in 2019 and waited 90 days – a sort-of industry standard period popularised by Google’s Project Zero team &
Publish At:2020-02-15 12:43 | Read:1298 | Comments:0 | Tags:Vulnerability bluetooth cybersecurity Sweyntooth vulnerabili

Critical Android Bluetooth flaw CVE-2020-0022 could be exploited without user interaction

Google addressed a critical vulnerability in its Android OS that affects the Bluetooth subsystem and could be exploited without user interaction. Google has addressed a critical flaw in Android OS that affects the Bluetooth subsystem and could be exploited without user interaction. The vulnerability tracked as CVE-2020-0022 is a remote code execution
Publish At:2020-02-09 10:43 | Read:1448 | Comments:0 | Tags:Breaking News Cyber Crime Mobile Android Bluetooth CVE-2020-

Who Knows Your (Sex) Secrets? Internet of Sex Toys

Security researchers with Pen Test Partners have discovered a vulnerability in the Lovense Hush sex toys, an IoT-enabled butt plug. The recent discovery that internet connected sex toys have major security and privacy flaws should come as no shock but this does raise the issue of how to both satisfy the consumer’s needs while providing maximum protection.  T
Publish At:2017-10-01 20:55 | Read:6941 | Comments:0 | Tags:Breaking News Hacking Internet of Things Bluetooth IoT priva