Monday, December 30, 2019

A ton of Ruckus wireless routers are vulnerable to hackers – TechCrunch

A security researcher has found several vulnerabilities in a number of Ruckus wireless routers, which the networking giant has since patched.

Gal Zror told TechCrunch that the vulnerabilities he found lie inside in the web user interface software that runs on the company’s Unleashed line of routers.

Routers act as a gateway between a home or office network and the wider internet. Routers are also a major line of defense against unauthorized access to that network. But routers can be a single point of failure. If attackers find and take advantage of vulnerabilities in the router’s software, they can control the device and gain access to the wider internal network, exposing computers and other devices to hacks and data theft.

logo
Publisher: TechCrunch
Date: 2019-12-28 14:30:21
Twitter: @techcrunch
Reference: (Read more) Visit Source



Not to change the topic here:

Microsoft Sues North Korea-Linked Hackers for Targeting Users

A group of hackers with ties to North Korea targets Microsoft Corp. software users by impersonating the company, according to a lawsuit unsealed Dec. 27 in Virginia federal court.

* * *

The lawsuit was originally filed Dec. 18 in the U.S. District Court for the Eastern District of Virginia under seal.

The case is Microsoft Corp. v. John Does 1-2 , E.D. Va., No. 1:19-cv-01582, complaint unsealed 12/27/19.

To contact the reporter on this story: Blake Brittain in Washington at bbrittain@bloomberglaw.com

Twitter: @BloombergLaw
Reference: (Read more) Visit Source



More than 3,000 Ring doorbell accounts may be vulnerable to hackers—here's what you need to know

Ring has denied the data exposure involved the company's own system. A spokesperson told Consumer Reports that there's "no evidence of an unauthorized intrusion or compromise of Ring's systems or network."

Publisher: KNXV
Date: 2019-12-27T16:50:15
Twitter: @abc15
Reference: (Read more) Visit Source



N. Korean hackers mount phishing attack on NKHR groups - Daily NK

On Dec. 18, a North Korean hacking group allegedly conducted a phishing attack on several of the non-governmental organizations that published an open letter to South Korean President Moon Jae-in urging him to acknowledge North Korea's human rights violations.

The Transitional Justice Working Group (TJWG) had announced that hackers had contacted the head of their organization masquerading as Kwon Eun-kyoung, director of the International Coalition to Stop Crimes against Humanity in North Korea (ICNK). Both TJWG and ICNK were signatories of the joint open letter addressed to President Moon on Dec. 16. The phishing attempt was made just two days after the letter was published.

Publisher: Daily NK
Date: 2019-12-30T05:00:04+00:00
Reference: (Read more) Visit Source



Check out this next:

Chinese hackers bypass 2FA | TechRadar

A Chinese hacking group has been able to successfully target Western government entities by bypassing Two-Factor Authentication protections.

According to Dutch cybersecurity company, Fox-IT, the hackers were able to remain undetected in compromised systems precisely because they were able to exploit existing security tools already present.

* * *

The claims were made by Fox-IT after a two year investigation into compromised systems, which they released in a whitepaper in which they identified the hackers’ activities and methods.

logo
Publisher: TechRadar
Date: 2019-12-30T11:05:32+00:00
Author: https www facebook com TechRadar
Twitter: @TechRadar
Reference: (Read more) Visit Source



Hollywood Hacks & Hackers - Security Boulevard

Hollywood's depiction of hacking, on the big screen and in TV dramas or on Netflix, isn't always accurate, to put it mildly. A closer look.

* * *

If you spend your days glued to your terminal, compiling piles of code or debugging software, you know first-hand how wrong they have it. Glamour? Suspension? The thrill of the hunt? Let's get real.

There are exceptions, though. Many readers are probably familiar with this picture. If you’re not, it's taken from the award-winning TV series Mr. Robot (US Network). Mr. Robot deserves mentioning in this context as one of the few shows that get it right (most of the time). It just ended with Season 4, so if you haven't seen it already, I highly recommend it.

Publisher: Security Boulevard
Date: 2019-12-23T21:11:05+00:00
Twitter: @securityblvd
Reference: (Read more) Visit Source



Consumer Tip: Experts explain how to protect your devices from hackers while traveling | WWMT
Publisher: WWMT
Date: 2019-12-29T09:17:29+00:00
Author: Alexis Berdine Newschannel 3
Twitter: @wwmtnews
Reference: (Read more) Visit Source



Hackers Are More Interested In Hacking Apple iPhones and Instagram Accounts Than Other Devices

It looks like you have AdBlock enabled. To view the content you are requested to at least whitelist our blog in your AdBlock setting and then refresh the page to read our blog.

Date: B14888599EF3BCAE601EB9A7C2DB24B3
Author: author
Twitter: @digitaliworld
Reference: (Read more) Visit Source



No comments:

Post a Comment