Threatpost

Syndikovat obsah
The First Stop For Security News
Aktualizace: 8 hodin 19 min zpět

DEF CON 2018: Hacking Medical Protocols to Change Vital Signs

12 Srpen, 2018 - 02:00
LAS VEGAS – In recent years there has been more attention paid to the security of medical devices; however, there has been little security research done on the unique protocols used by these devices. Many of the insulin pumps, heart monitors and other gadgets found in hospital rooms use aging protocol to communicate with nurses’ […]
Kategorie: Hacking & Security

DEF CON 2018: Telltale URLs Leak PII to Dozens of Third Parties

11 Srpen, 2018 - 20:50
Analytics, advertising and other web scripts can capture information housed in user confirmations for flight bookings, food delivery, medical testing and more.
Kategorie: Hacking & Security

Chris Valasek and Charlie Miller: How to Secure Autonomous Vehicles

10 Srpen, 2018 - 23:03
Famous car hackers Chris Valasek and Charlie Miller returned to Black Hat to discuss how manufacturers can secure autonomous vehicles.
Kategorie: Hacking & Security

Black Hat 2018: Voice Authentication is Broken, Researchers Say

10 Srpen, 2018 - 16:58
Researchers crack voice authentication systems by recreating any voice using under ten minutes of sample audio.
Kategorie: Hacking & Security

Black Hat 2018: With Healthcare Security Flaws, Safety’s Increasingly at Stake

10 Srpen, 2018 - 13:00
Vulnerabilities in healthcare devices and hospital systems are leading to growing concerns in the infosec community about patient safety.
Kategorie: Hacking & Security

Understanding TRITON and the Missing Final Stage of the Attack

9 Srpen, 2018 - 23:36
Straight from Black Hat 2018: How TRITON disrupted safety systems and changed the threat landscape of industrial control systems, forever.
Kategorie: Hacking & Security

Black Hat 2018: Widespread Critical Flaws Found in Smart-City Gear

9 Srpen, 2018 - 19:38
More than a dozen flaws in smart-city gear could open the door to attackers bent on sowing public panic, according to IBM X-Force.
Kategorie: Hacking & Security

Black Hat 2018: Stealthy Kernel Attack Flies Under Windows Mitigation Radar

9 Srpen, 2018 - 19:35
Researchers create PoC of a post-exploitation kernel-mode fileless attack technique.
Kategorie: Hacking & Security

Hacking For Sport: A Journey in Reverse Engineering a Toshiba Wireless SD Card

9 Srpen, 2018 - 19:26
Reverse engineering the Toshiba FlashAir SD storage card allowed a researcher to execute remote code - and could've allowed him to add other malicious or practical features.
Kategorie: Hacking & Security

New Actor DarkHydrus Targets Middle East with Open-Source Phishing

9 Srpen, 2018 - 17:28
DarkHydrus uses the open-source Phishery tool to create two of the known Word documents used in the attacks.
Kategorie: Hacking & Security

Black Hat 2018: Cortana Flaw Allowed Takeover of Locked Windows 10 Device

9 Srpen, 2018 - 16:24
A flaw in Cortana allowed researchers to take over a locked Windows machine and execute arbitrary code.
Kategorie: Hacking & Security

Black Hat 2018: Google Bug Hunter Urges Apple to Change its iOS Security Culture

9 Srpen, 2018 - 14:40
Project Zero researcher highlights stubborn iOS bugs as an example of why Apple and the rest of the industry needs to take a fresh approach to securing systems.
Kategorie: Hacking & Security

Black Hat 2018: Mixed Signal Microcontrollers Open to Side-Channel Attacks

8 Srpen, 2018 - 22:30
In mixed-design radio chips the processor’s activity leaks into the analog portion of the chip - and is broadcast as output.
Kategorie: Hacking & Security

Black Hat 2018: Google’s Tabriz Talks Complex Security Landscapes

8 Srpen, 2018 - 22:24
At Black Hat, Google's Parisa Tabriz discussed how to navigate the complex security environment with long-term thinking and a policy of open collaboration.
Kategorie: Hacking & Security

‘Chaff Bug’ Defense Rolls Out Shiny Objects for Attackers to Find

8 Srpen, 2018 - 20:12
Rather than eliminating bugs, the idea is to add large numbers of non-exploitable bugs to software as decoys to waste cyber-criminals' time.
Kategorie: Hacking & Security

Threatlist: Manufacturing, a Top Target for Espionage

8 Srpen, 2018 - 19:24
Vectra’s 2018 Spotlight Report found that attackers can easily spy, spread and steal information, largely unhindered by the insufficient internal access controls that are in place.
Kategorie: Hacking & Security

Black Hat 2018: Patrick Wardle on Breaking and Bypassing MacOS Firewalls

8 Srpen, 2018 - 15:25
A Black Hat talk demonstrates the ease of poking holes in firewalls: How to break, bypass and dismantle macOS firewall products.
Kategorie: Hacking & Security

Black Hat 2018: Update Mechanisms Allow Remote Attacks on UEFI Firmware

8 Srpen, 2018 - 13:20
The glitch stems from a functionality intended to allow updates to the UEFI firmware.
Kategorie: Hacking & Security

Podcast: enSilo CEO on Black Hat USA 2018 Top Trends

8 Srpen, 2018 - 13:00
As Black Hat's keynote kicks off today, Threatpost pinpoints the most popular trends of the conference with enSilo's CEO.
Kategorie: Hacking & Security

Fresh Approach to WiFi Cracking Uses Packet-Sniffing

7 Srpen, 2018 - 23:29
The new strategy allows an attacker to instead lift ID information directly from the router, within minutes.
Kategorie: Hacking & Security