Infosecurity News

Visual Hacking is Successful 91% of the Time
A white hat walking through the office scouting for information on desks and monitor screens was highly successful.

Google’s YOLO API Set to Speed Secure App Log-Ins
Latest project will make things easier for password manager users

Connected Cars Exposed: Half Have Potentially Serious Flaws
IOAtive study finds bugs in virtually every component

Jeep Hackers Demonstrate New, Terrifying Compromises
Hacks include acceleration, slamming the breaks on remotely and turning the vehicle’s steering wheel at any speed.

Hackable Thermostats Heat Up IoT Security
The most obvious danger is from home invaders who can gain easy access to the wake up and work schedule for an entire household.

Michael Phelps Targeted by Hackers After Winning 19th Gold Medal
New World Hackers has claimed responsibility for taking down the U.S. swimmer’s website.

Symantec Spots State-Sponsored ‘Strider’ Attacks
Group has only hit seven organizations in five years

#DefCon: Thermostat Control Hacked to Host Ransomware
Thermostat security has been proved to be particularly vulnerable, with ransomware able to infect and run on it.

#DefCon US Government Only Holds Dozens of Zero-Days
The US Government only holds “dozens” of vulnerabilities at any one time.

Researchers Hack Tesla S's Autopilot System
The white hats showed the potential to make surrounding objects “disappear” from the autopilot’s view.

Mayhem the Hacker-Bot Wins $2M DARPA Challenge
Mayhem was created by a Pittsburgh-based team known as ForAllSecure—one of seven teams that competed for nearly $4 million.

#BHUSA: Apple To Pay Bug Bounties
In the wake of its legal battle with the FBI over security vulnerabilities and access, Apple is launching its first-ever bug bounty program with potential payouts as large as USD$200,000.

#BHUSA Researchers Present Deep Sea Phishing Exercise
Using data science, cybersecurity researchers have released a new approach that makes automated phishing exploits almost as fruitful as typically more time-consuming spear-phishing methods.

HTTP/2 Bugs Could Deny Service for Millions
Imperva urges firms to implement safeguards

Italian Android RAT Targets China and Japan
New info-stealing malware could be part of wider APT campaign

#BUHSA Attacks on Activists are Prevalent, but Unsophisticated
State-sponsored attacks and tool used have been observed to not be sophisticated, but activists remain in danger.

#BHUSA: 15 Years of Under-investment in Cybersecurity Makes Us Think the Sky is Falling
We can’t stop spending on cybersecurity in favour of cyber-insurance, say Deloitte researchers at Black Hat, Las Vegas

#BHUSA Build Backdoors and Government Will Use Them
Law enforcement has become more aggressive because of encryption, as law enforcement become more eager to access details in investigations.

#BHUSA: How to Use Linguistic Forensics to Detect Phone Scammers
There is a non-technological solution to defending against phone scammers, said Dr Judith Tabron at Black Hat USA 2016, and it’s at the human level…

Just in Time for the Olympics, Panda Zeus Chomps Into Brazil
One hungry bear, this Zeus variant is targeting banks, Bitcoin users and local services, just as the country prepares to host the Olympic Games.



