A security researcher has found several vulnerabilities in a number of Ruckus wireless routers, which the networking giant has since patched.
Gal Zror told TechCrunch that the vulnerabilities he found lie inside in the web user interface software that runs on the company’s Unleashed line of routers.
Routers act as a gateway between a home or office network and the wider internet. Routers are also a major line of defense against unauthorized access to that network. But routers can be a single point of failure. If attackers find and take advantage of vulnerabilities in the router’s software, they can control the device and gain access to the wider internal network, exposing computers and other devices to hacks and data theft.
Not to change the topic here:
Microsoft Sues North Korea-Linked Hackers for Targeting Users
A group of hackers with ties to North Korea targets Microsoft Corp. software users by impersonating the company, according to a lawsuit unsealed Dec. 27 in Virginia federal court.
* * *
The lawsuit was originally filed Dec. 18 in the U.S. District Court for the Eastern District of Virginia under seal.
The case is Microsoft Corp. v. John Does 1-2 , E.D. Va., No. 1:19-cv-01582, complaint unsealed 12/27/19.
To contact the reporter on this story: Blake Brittain in Washington at bbrittain@bloomberglaw.com
More than 3,000 Ring doorbell accounts may be vulnerable to hackers—here's what you need to know
Ring has denied the data exposure involved the company's own system. A spokesperson told Consumer Reports that there's "no evidence of an unauthorized intrusion or compromise of Ring's systems or network."
N. Korean hackers mount phishing attack on NKHR groups - Daily NK
On Dec. 18, a North Korean hacking group allegedly conducted a phishing attack on several of the non-governmental organizations that published an open letter to South Korean President Moon Jae-in urging him to acknowledge North Korea's human rights violations.
The Transitional Justice Working Group (TJWG) had announced that hackers had contacted the head of their organization masquerading as Kwon Eun-kyoung, director of the International Coalition to Stop Crimes against Humanity in North Korea (ICNK). Both TJWG and ICNK were signatories of the joint open letter addressed to President Moon on Dec. 16. The phishing attempt was made just two days after the letter was published.
Check out this next:
Chinese hackers bypass 2FA | TechRadar
A Chinese hacking group has been able to successfully target Western government entities by bypassing Two-Factor Authentication protections.
According to Dutch cybersecurity company, Fox-IT, the hackers were able to remain undetected in compromised systems precisely because they were able to exploit existing security tools already present.
* * *
The claims were made by Fox-IT after a two year investigation into compromised systems, which they released in a whitepaper in which they identified the hackers’ activities and methods.
Hollywood Hacks & Hackers - Security Boulevard
Hollywood's depiction of hacking, on the big screen and in TV dramas or on Netflix, isn't always accurate, to put it mildly. A closer look.
* * *
If you spend your days glued to your terminal, compiling piles of code or debugging software, you know first-hand how wrong they have it. Glamour? Suspension? The thrill of the hunt? Let's get real.
There are exceptions, though. Many readers are probably familiar with this picture. If you’re not, it's taken from the award-winning TV series Mr. Robot (US Network). Mr. Robot deserves mentioning in this context as one of the few shows that get it right (most of the time). It just ended with Season 4, so if you haven't seen it already, I highly recommend it.
Consumer Tip: Experts explain how to protect your devices from hackers while traveling | WWMT
Hackers Are More Interested In Hacking Apple iPhones and Instagram Accounts Than Other Devices
It looks like you have AdBlock enabled. To view the content you are requested to at least whitelist our blog in your AdBlock setting and then refresh the page to read our blog.
No comments:
Post a Comment