Sat.Aug 10, 2019

Hackers Could Decrypt Your GSM Phone Calls

WIRED Threat Level

Researchers have discovered a flaw in the GSM standard used by AT&T and T-Mobile that would allow hackers to listen in. Security Security / Cyberattacks and Hacks

City of Naples, Florida, lost $700K after a cyberattack

Security Affairs

Another city in the United States was hit by a cyber attack, according to officials in the city of Naples (Florida) they lost $700,000 in a recent attack. According to officials in the city of Naples, Florida, a cyberattack caused an economic loss of $700,000.

A Remote-Start App Exposed Thousands of Cars to Hackers

WIRED Threat Level

The bugs could have let an industrious hacker locate cars, unlock them, and start them up from anywhere with an internet connection. Security Security / Cyberattacks and Hacks

Android Apps containing Clicker Trojan installed on over 100M devices

Security Affairs

Experts at Dr Web discovered that a set of Android Apps with over 100 million installations that contains a clicker Trojan tracked as Android. Click. origin.

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Big Tech Needs to Use Hazardous Materials Warnings

WIRED Threat Level

Opinion: Tech users don’t have time to read novel-length terms of service. Give them a danger icon that tells them their personal risk. Security / Privacy Opinion

Risk 114

More Trending

Weekly Update 151

Troy Hunt

Well that's Vegas done. 8 days of absolutely non-stop events that's now pretty much robbed me of my voice but hey, I got a flying cow! Scott and I both spent BSides, Black Hat and DEF CON doing "hallway con" or in other words, wandering around just meeting people.

Varenyky Spambot Trojan targets French users in alleged sextortion campaign

Security Affairs

A new Spambot Trojan, tracked as Varenyky was spotted white targeting users as part of a new alleged sextortion campaign. The malware records the victim’s screen when they are visiting adult-related sites. Varenyky was discovered by researchers at ESET in May and reported by Any. run in June.

Election Systems Are Even More Vulnerable Than We Thought

WIRED Threat Level

Black Hat and Defcon are underway in Vegas, WhatsApp flaws allow hackers to alter messages, and more of this week’s top security news. Security Security / Security News

DEF CON 2019: New Class of SQLite Exploits Open Door to iPhone Hack


Researchers exploit a SQLite memory corruption issue outside of a browser. Black Hat Hacks Mobile Security Check Point contact database def con 2019 ios iphone iPhone hack Memory corruption new attack vectors privilege escalation SQLite

Privacy without borders: Reality or Fantasy?

Imagine a world in which every country shared a vision and a common set of principles to protect and regulate the use of personal data. It would make international business far simpler, provide citizens in every country with the same privacy rights.

Guardian technology podcast: 'World leaders should listen!'

The Guardian Data Protection

IT 58

DEF CON 2019: MacOS Gets a Malware Beatdown in Attack Demo


Patrick Wardle proves that signature-based anti-malware protection on Macs is woefully inadequate when fending off modern attacks.

Driver Disaster: Over 40 Signed Drivers Can’t Pass Security Muster


Dozens of insecure drivers from 20 vendors illustrate widespread weaknesses when it comes to kernel protection. Hacks Malware Vulnerabilities ASUS BIOS CPU DEF CON Driver Security Gigabyte LoJax Microsoft MSI rootkit Slingshot Windows

IT 87