3D printer blueprints for TSA luggage-unlocking master keys leak online
That padlock on your bag? Easy to open by anyone now. The integrity of more than 300 million travel locks has been compromised after 3D printing files for a rangeRead More →
Data Security News | Infosec Blog | Cyber Security Tutorials
That padlock on your bag? Easy to open by anyone now. The integrity of more than 300 million travel locks has been compromised after 3D printing files for a rangeRead More →
Researchers have peeled back the layers on a new campaign that spans multiple years and involves a new variant of the ubiquitous Gh0st remote access tool (RAT). The campaign, now believed toRead More →
Programming errors make 15.26 million accounts orders of magnitude faster to crack. When the Ashley Madison hackers leaked close to 100 gigabytes worth of sensitive documents belonging to the onlineRead More →
Poorly secured satellite-based Internet links are being abused by nation-state hackers, most notably by the Turla APT group, to hide command-and-control operations, researchers at Kaspersky Lab said today. Active forRead More →
The L8NT could help law enforcement track and find Wi-Fi enabled gadgets. On Tuesday, local media reported that David Schwindt, a 14-year veteran from Iowa City, has designed software whichRead More →
“Microsoft is recording what you type and say,” says one random website vaguely reporting on Windows 10, written by an author who has likely never participated in the Windows Insider programRead More →
Heimdal Security published an interesting post on the increase in malicious scripts that are being injected into legit websites in order to serve ransomware. Heimdal Security recently published an interestingRead More →
If you’ve ever needed to know how another piece of code works, or have been at the mercy of someone else’s bugs, you can always look at the source code…Read More →
The recent hack of fembot dating extramarital affairs website Ashley Madison, which resulted in data from millions of accounts being dumped online, has one more salutary yet familiar lesson to deliver: even very well encryptedRead More →
Jonathan Petit, security researcher at Security Innovation, Inc., has revealed he can easily fool the LiDAR sensors on any self-driving car to slow down or abruptly stop by sending itRead More →
A man credited with helping to create the infamous Gozi banking malware has pled guilty in a US court. Deniss Calovskis, 30, of Latvia was arrested November 2012 and spentRead More →
UNSW staff had to scramble to contain an embarrassing outbreak of undergraduate humour, after the university’s Facebook page was hacked on its annual open day. As the university prepared to showcaseRead More →
While working on some forthcoming research on cryptographic backdoors i came across an interesting asymmetric backdoor designed to subvert RSA key generation algorithms by Ryan Castellucci. The backdoor is particularlyRead More →
G DATA security experts published their latest research in which they’ve analyzed top Chinese Android smartphone models and found that a large number of them ship with pre-installed malware andRead More →
Six weeks after hackers revealed vulnerabilities in a 2014 Jeep Cherokee that they could use to take over its transmission and brakes, Chrysler has pushed out its patch for thatRead More →
A new strain of Android ransomware disguised as a video player app uses a means of communication unseen in other similar malware. Most of the victims are in the UnitedRead More →
The hack revealed the inner workings of the studio, as well as the personal information of more than 47,000 celebrities, freelancers, and current and former Sony employees. Sony Pictures hasRead More →
Worried about Windows 10’s deep-reaching user tracking? Some of it’s coming to Windows 7 and 8, too. Windows 10 is a deliciously good operating system, all things considered, but itsRead More →
Cyber-attackers launch Distributed Denial of Service (DDoS) violation on law enforcement agency in apparent revenge for previous arrests. Cyber-attackers have taken down the website of the National Crime Agency (NCA)Read More →
A brand-new advanced banking Trojan discovered in the wild has been named “Shifu” by IBM Security X-Force, after the Japanese word for thief. The malware appears to have been activeRead More →