Thursday, March 18, 2021

Carmakers Strive to Stay Ahead of Hackers - The New York Times

While consumers may love the features, hackers may love them even more. And that's keeping many in the auto industry awake at night, worried about how they can stay one step (or two or three) ahead of those who could eventually play havoc with the world's private transport systems.

Hackers seemingly can't wait for the opportunity to commandeer vehicles. In 2019, the automotive cybersecurity company Karamba Security posted a fake vehicle electronic control unit online. In under three days, 25,000 breach attempts were made, and one succeeded.

Date: 2021-03-18T10:00:09.355Z
Twitter: @nytimes
Reference: (Read more) Visit Source



Other things to check out:

Subscribe to read | Financial Times
Twitter: @FinancialTimes
Reference: (Read more) Visit Source



Hackers Successfully Exploiting Older, Unpatched Microsoft Vulnerabilities

Just last year , the Department of Homeland Security found the vulnerability was one of the three most commonly exploited by nation-state hackers. Microsoft has already provided a software update to eliminate the risk, but these unpatched systems are leaving the door open to attacks.

The report also showed a 12 percent growth in malware used against another years-old flaw: CVE-2017-0199. The vulnerability was also among the most commonly exploited flaws observed by DHS in 2020. McAfee also found attackers leveraging the flaw for remote code execution in 2017 .

Publisher: HealthITSecurity
Date: 2021-03-17T10:25:00-04:00
Author: HealthITSecurity
Twitter: @SecurityHIT
Reference: (Read more) Visit Source



Mimecast Update: SolarWinds Hackers Stole Source Code

Mimecast reports that the hackers used the backdoor installed in SolarWinds' Orion network monitoring tool to gain partial access to its production environment.

The company says it worked with FireEye's Mandiant division and law enforcement agencies to remove the malware from its affected systems. It says it detected no suspicious activities taking advantage of the exposed data.

"We have now completed our forensic investigation with Mandiant and have eliminated the threat actor's access to our environment," the company says in the Tuesday update.

Reference: (Read more) Visit Source



Not to change the topic here:

Hackers used 'despicable' language and images on Troy School District's website

As a result the district is tightening security measures and all of its websites have been taken down temporarily.

* * *

Kerry Birmingham, Director of Communications and Strategic Initiatives for the Troy School District, released the following statement Monday with details on the incident:

The language and images used were despicable, and we strongly denounce them. We are working in collaboration with the Michigan State Cyber Response Team and an investigation is under way. Preliminary information shows that this hack generated from outside the country using a known malicious IP address and that no student information or sensitive data was comprised by the breach.

Publisher: WDIV
Date: 2021-03-16T00:39:50.558Z
Author: Natasha Dado
Twitter: @WDIV
Reference: (Read more) Visit Source



Hackers targeting ‘anything that looks vulnerable’ in Microsoft Exchange attacks,

While many companies have already patched their systems, some have yet to do so – and for those businesses, it may already be too late.

"Given the worldwide activity, it’s very probable that Canadian organizations have been impacted if they haven’t patched," explained Scott Jones, head of the Canadian Centre for Cyber Security (Cyber Centre), in an interview with Global News.

"The last two weeks have been a flurry of activity. Most organizations have started patching immediately, within minutes of these patches being released."

Publisher: Global News
Twitter: @globalnews
Reference: (Read more) Visit Source



Chinese hackers target telecom companies to steal 5G secrets - The Hindu

A cyber espionage campaign with tactics similar to that of Chinese groups is targeting telecom companies to steal sensitive and secret information related to 5G technology, according to cybersecurity firm McAfee.

The targets were primarily based in Southeast Asia, Europe, and the US. Besides, McAfee identified hackers' interest in German, Vietnamese and Indian telecommunication companies.

"We believe with a moderate level of confidence that the motivation behind this specific campaign has to do with the ban of Chinese technology in the global 5G roll-out," McAfee said in a report.

Publisher: The Hindu
Date: 2021-03-18T17:57:36 05:30
Author: Aditya Saroha
Twitter: @The_Hindu
Reference: (Read more) Visit Source



Outsmart smart home hackers with these tips

ORLANDO, Fla. – Over 14 billion connected devices, also called "smart" devices, were used in 2019, and by 2021, that number has reached 25 billion. But while turning on your oven or unlocking your door from your phone may be convenient for you, it is also convenient for hackers. This year, an estimated one in 15 people will have their identity stolen. Here are some ways to outsmart these smart home hackers.

If you decide to sell, give away, or toss out your smart device, most manufacturers advise that you factory reset your device and remove all personal data. A factory reset ensures the next person to get their hands on your device can't automatically access all your information or communicate with the other devices in your network.

Publisher: KPRC
Date: 2021-03-17T10:03:34.472Z
Author: Ivanhoe
Twitter: @KPRC
Reference: (Read more) Visit Source



No comments:

Post a Comment