Monday, January 13, 2020

Hackers linked to Iran have been trying to crack the US grid for ages, a report says - MIT

Publisher: MIT Technology Review
Date: 2020-01-13T08:51:48-05:00
Twitter: @techreview
Reference: (Read more) Visit Source



This may worth something:

Couple whose 8-year-old daughter was taunted by Ring hacker sues

Two couples who say their home security cameras were hacked filed a class-action lawsuit against Ring LLC for invasion of privacy and negligence.

Ashley LeMay and her husband, Dylan Blakeley, said in December that a stranger hacked a camera they set up in their 8-year-old daughter's bedroom and taunted the child . Todd Craig and his girlfriend, Tania Amador, said that same month a hacker threatened them with "termination" if they did not pay a ransom.

Publisher: NBC News
Twitter: @NBCNews
Reference: (Read more) Visit Source



Hackers on the other side of the world can take control of your vehicle

Fact is, computer hackers on the other side of the world potentially could — while you're driving — crash your navigation system, cut your brakes, disrupt your steering or remotely take control of the entire vehicle. Hackers do not need to be in close proximity; all they need is something as simple as internet connectivity. Cars have become heavily connected to the internet.

* * *

That's why automakers in Detroit, Germany, France, China and Japan are aggressively working to monitor technology protections in private cars, trucks and SUVs connected to the global internet to provide navigation assistance and so much more.

Publisher: Dallas News
Date: 2020-01-11T12:00:33.400Z
Twitter: @dallasnews
Reference: (Read more) Visit Source



If you haven't shored up that Citrix hole, you were probably hacked over the weekend: Exploit

Those admins who haven't put mitigations in place by now will want to make sure they address their situation immediately, as infosec researchers have now publicly shared working exploit code for the remote takeover bug. The proof-of-concept code can be used to trivially achieve arbitrary code execution with no account credentials – hijack systems, in other words – via a directory traversal.

People's honey pots are being actively attacked, so if you haven't put in place the mitigations by now, and you have vulnerable systems facing the internet, you were probably hacked over the weekend by miscreants mass-scanning the 'net for machines to compromise. A thread tracking technical aspects of the vulnerability is here .

Twitter: @TheRegister
Reference: (Read more) Visit Source



Check out this next:

Tax season is underway: How to avoid hackers when you file online

ROANOKE, Va. – The IRS is trying to make it easier for you to file your taxes online for free and not get scammed in the process.

Many have already started preparing to file their taxes -- which is good if you want to avoid hackers.

Kathy Pickering, chief tax officer for H&R Block said, "Your W-2′s are coming in, in the mail. Maybe, you're starting to get some bank statements with that year-end tax information."

The IRS has put new protections in place prohibiting Turbo Tax and other companies' free filing software from showing up in Google searches. This way, the next time you search for any online tax filing apps, you should be able to easily find and use the free software.

Publisher: WSLS
Date: 2020-01-13T14:08:28.996Z
Author: Megan Woods
Twitter: @WSLS
Reference: (Read more) Visit Source



Government Website Is Hacked With Pro-Iran Messages - The New York Times

"Hacked by Iran Cyber Security Group Hackers," text on the website read before it was put back online. "This is only small part of Iran's cyber ability!"

It was not immediately clear if the attack had come from Iran or if the country had ordered it. Mr. Somerset said the office "continues to coordinate with the appropriate authorities to investigate the origins of the intrusion."

A spokeswoman for the Cybersecurity and Infrastructure Security Agency, which is under the Department of Homeland Security, said in a statement that there was no confirmation that hackers sponsored by Iran were behind the attack.

Date: 2020-01-06T20:48:15.000Z
Reference: (Read more) Visit Source



Tesla Invites Hackers To Compete | PYMNTS.com

To challenge hackers to find flaws in its vehicles, Tesla , the electric automaker, is returning to the Pwn2Own hacking competition run by Trend Micro 's Zero Day Initiative (ZDI), electrek reported.

* * *

"Driving off with a brand-new Model 3 will be a harder challenge this year, which means the potential rewards will be much higher as well," ZDI said in a press release. "Microsoft also returns as partner and VMware returns as a sponsor with their somewhat more traditional Pwn2Own targets. All told, more than $1,000,000 USD in cash and prizes are available to contestants, including the new Tesla car."

logo
Publisher: PYMNTS.com
Date: 2020-01-11T02:05:01Z
Twitter: @pymnts
Reference: (Read more) Visit Source



TikTok vulnerability could have let hackers access users' videos - The Verge

Check Point Research says it was able to spoof text messages to users that appeared to come from TikTok

Cybersecurity research firm Check Point Research says it found "multiple vulnerabilities" within video sharing app TikTok that demonstrated its insecurity as scrutiny for the Chinese-owned company continues to grow.

Check Point says it notified TikTok's parent company about the security vulnerabilities in November, and the app has since fixed the problem.

Publisher: The Verge
Date: 2020-01-08T05:01:00-05:00
Author: Kim Lyons
Twitter: @verge
Reference: (Read more) Visit Source



Happening on Twitter

No comments:

Post a Comment