HackDig : Dig high-quality web security articles for hackers

Lock and Code S1Ep10: Pulling apart the Internet of Things with JP Taggart

This week on Lock and Code, we discuss the top security headlines generated right here on Labs and around the Internet. In addition, we talk to JP Taggart, senior security researcher at Malwarebytes, about the Internet of Things. For years, Internet capabilities have crept into modern consumer products, providing sometimes convenient, sometimes extra
Publish At:2020-07-07 14:23 | Read:340 | Comments:0 | Tags:Podcast beacons bluetooth Chromebook chromebook antivirus In

Why Zero-Click Cyberthreats Should Be on Your Radar

For years, the statistics have told us that human error is the greatest contributor to cyberattacks. We’ve stressed the importance of training, training and more training to prevent the almost inevitable from happening. We’ve been convinced that the key to defending against cyberthreats is to keep the unsuspecting from clicking on phishing emails
Publish At:2020-07-02 15:59 | Read:265 | Comments:0 | Tags:Application Security Endpoint Mobile Security Advanced Malwa

A week in security (April 27 – May 3)

Last week on Malwarebytes Labs, we looked at how secure the cloud is, understood why unexpected demand can influence an organization to consider their “just in time” (JIT) system, speculated on why the threat actors behind the Troldesh ransomware suddenly released thousands of decryption keys, preached the good news about VPN being mainstream, touched on the
Publish At:2020-05-18 13:43 | Read:452 | Comments:0 | Tags:Malwarebytes news Apple APT awis bluetooth bluetooth attack

CVE-2020-0022 an Android 8.0-9.0 Bluetooth Zero-Click RCE – BlueFrag

Nowadays, Bluetooth is an integral part of mobile devices. Smartphones interconnect with smartwatches and wireless headphones. By default, most devices are configured to accept Bluetooth connections from any nearby unauthenticated device. Bluetooth packets are processed by the Bluetooth chip (also called a controller), and then passed to the host (Android, L
Publish At:2020-05-03 08:57 | Read:648 | Comments:0 | Tags:Breaking Android BlueFrag Bluetooth exploit

Mass surveillance alone will not save us from coronavirus

As the pattern-shattering truth of our new lives drains heavy—as coronavirus rends routines, raids our wellbeing, and whiplashes us between anxiety and fear—we should not look to mass digital surveillance to bring us back to normal. Already, governments have cast vast digital nets. South Koreans are tracked through GPS location history, credit card trans
Publish At:2020-04-15 18:12 | Read:1352 | Comments:0 | Tags:Opinion Apple Austria bluetooth Bluetooth contact tracing Bl

Apple and Google join forces to develop Contact Tracing app against Coronavirus

Google and Apple recently announced a joint project for the development of a Coronavirus ‘contact tracing’ tool for mobile devices. A contact tracing app is a tool that could be used to contain new diseases, like Coronavirus, by tracking down and quarantining everyone that gets infected and localize any person that has been in contact with hi
Publish At:2020-04-13 14:34 | Read:946 | Comments:0 | Tags:Breaking News Digital ID Security Bluetooth contact tracing

Biotech health care innovations meet security challenges

The level and speed of innovations taking place in the biotech industry are baffling. On the one hand, it makes us hopeful we can quickly reduce the number of illnesses and their consequences through technological advancement—saving thousands of lives. On the other, concerns about the application of Internet-connected technology leave us wondering: at what c
Publish At:2020-02-25 14:40 | Read:761 | Comments:0 | Tags:Vital infrastructure AI biosensors BLE bluetooth dna-test fd

SweynTooth Bluetooth flaws affect devices from major system-on-a-chip (SoC) vendors

Security experts have discovered multiple flaws, dubbed SweynTooth, in the Bluetooth Low Energy (BLE) implementations of major system-on-a-chip (SoC) vendors. A group of researchers has discovered multiple vulnerabilities, tracked as SweynTooth, in the Bluetooth Low Energy (BLE) implementations of major system-on-a-chip (SoC) vendors. The group was co
Publish At:2020-02-15 17:31 | Read:611 | Comments:0 | Tags:Breaking News Hacking Internet of Things Bluetooth informati

Bluetooth bugs – researchers find 10 “Sweyntooth” security holes

byPaul DucklinA trio of researchers from Singapore just published a paper detailing a number of security holes they discovered in Bluetooth chips from several different vendors.The good news is that they disclosed the holes responsibly back in 2019 and waited 90 days – a sort-of industry standard period popularised by Google’s Project Zero team &
Publish At:2020-02-15 12:43 | Read:726 | Comments:0 | Tags:Vulnerability bluetooth cybersecurity Sweyntooth vulnerabili

Critical Android Bluetooth flaw CVE-2020-0022 could be exploited without user interaction

Google addressed a critical vulnerability in its Android OS that affects the Bluetooth subsystem and could be exploited without user interaction. Google has addressed a critical flaw in Android OS that affects the Bluetooth subsystem and could be exploited without user interaction. The vulnerability tracked as CVE-2020-0022 is a remote code execution
Publish At:2020-02-09 10:43 | Read:795 | Comments:0 | Tags:Breaking News Cyber Crime Mobile Android Bluetooth CVE-2020-

Who Knows Your (Sex) Secrets? Internet of Sex Toys

Security researchers with Pen Test Partners have discovered a vulnerability in the Lovense Hush sex toys, an IoT-enabled butt plug. The recent discovery that internet connected sex toys have major security and privacy flaws should come as no shock but this does raise the issue of how to both satisfy the consumer’s needs while providing maximum protection.  T
Publish At:2017-10-01 20:55 | Read:5876 | Comments:0 | Tags:Breaking News Hacking Internet of Things Bluetooth IoT priva

Advisory: BlueBorne Reportedly Affects Billions of Bluetooth-Enabled Devices

by Vít Šembera (Cyber Threat Researcher) BlueBorne is a set of vulnerabilities affecting the implementation of Bluetooth in iOS, Android, Linux, Windows and Mac OS* devices. According to the researchers who uncovered them, BlueBorne affects around 5.3 billion Bluetooth-enabled devices. The immediate mitigation for BlueBorne is to patch the device, if there’s
Publish At:2017-09-15 23:05 | Read:5815 | Comments:0 | Tags:Exploits Internet of Things Vulnerabilities BlueBorne Blueto

More on Bluetooth Ingenico Overlay Skimmers

This blog has featured several stories about “overlay” card and PIN skimmers made to be placed atop Ingenico-brand card readers at store self-checkout lanes. I’m revisiting the topic again because a security technician at a U.S.-based retailer recently shared a few photos of several of these devices pulled from compromised card terminals, a
Publish At:2017-02-27 02:20 | Read:3951 | Comments:0 | Tags:Other Bluetooth Ingenico overlay skimmer ISC-250 self-checko

Is Bluetooth Security Good Enough for Your Most Sensitive Corporate Communications?

Most users take Bluetooth security for granted. When you’re enjoying the convenience of hands-free phone conversations, streaming podcasts in your car or jogging with your awesome new wireless headphones, do you need to worry about whether the communication channel is secure or not? What’s acceptable for consumers may not meet corporate standards
Publish At:2016-12-13 18:40 | Read:4197 | Comments:0 | Tags:Application Security Data Protection Bluetooth Connected Dev

Self-Checkout Skimmers Go Bluetooth

This blog has featured several stories about payment card skimming devices designed to be placed over top of credit card terminals in self-checkout lanes at grocery stores and other retailers. Many readers have asked for more details about the electronics that power these so-called “overlay” skimmers. Here’s a look at one overlay skimmer  e
Publish At:2016-10-15 07:45 | Read:3766 | Comments:0 | Tags:Other Bluetooth Ingenico Ingenico self-checkout skimmer Inge

Tools

Tag Cloud