Researchers analyzed the security of four popular smartwatches for children and found pre-installed downloaders, weak passwords, and unencrypted data transmissions. The analysis demonstrates that most of these devices arbitrarily collect and periodically transmit sensitive data to remote servers without the user knowing about it.This finding is worrisome as these devices quickly grow in popularity, with […]
UK privacy regulator ICO plans to fine facial recognition company Clearview AI €20 million for violating UK privacy law. Clearview collected photos from Facebook, LinkedIn and other websites for training a facial recognition system. This system contains a database of ten billion collected images, according to the ICO. This allows police services to identify unknown […]
20% of America’s largest 100 defense contractors are highly susceptible to a ransomware attack, according to a research from Black Kite. Several critical vulnerabilities were detected that contractors should address immediately. Nearly 43% of federal defense contractors have out-of-date systems. 42% of contractors have had at least one compromised credential within the past 90 days.
Biometric authentication techniques have gained momentum over the past few years due to the inherent vulnerability of PINs, passwords, and other similar verification methods. With that said, researchers have shared how a simple fingerprint hacking technique can render biometric authentication useless as a verification method for around 5$. Steps:1. Grab a photograph of someone’s fingerprint […]
The government has introduced new legislation to protect smart devices in people’s homes from being hacked.Recent research from consumer watchdog Which? suggested homes filled with smart devices could be exposed to more than 12,000 attacks in a single week.Default passwords for internet-connected devices will be banned, and firms which do not comply will face fines […]
Irish DPC demanded noyb to sign a “non-disclosure agreement” or remove noyb from Facebook procedure. Schrems: “The DPC engaged in procedural blackmail. Only if we shut up, the DPC would ‘grant’ us our legal right to be heard. This is a regulator clearly asking for a ‘quid pro quo’ to do its job, which likely constitutes bribery in Austria.” […]
Around six million Sky Broadband customer routers in the UK were affected by a critical vulnerability, a DNS rebinding flaw, that took over 17 months to roll out a fix to customers. The disclosed vulnerability could easily be exploit if the user had not changed the default admin password, or a threat actor could brute-force the […]
Apps for Wifi-strength measurement and another to scan barcodes were selling location data without proper consent. It was unclear to users that apps they had downloaded for one purpose were sharing information for a completely different one.
Do you want to understand the modern cyber threats and the most commonly used attack surfaces behind any malware/cyber-attack?Don’ts:1.) Don’t give everything easily to the attacker, make it harder for him to get. (Control Measures in the network)2.) Don’t enable legitimate vulnerable application if not in use, attackers always use legit applications in the network. (Abuse […]
Internet of Things devices offered in the European Union will no longer be allowed to use standard passwords from mid-2024. Instead, users must set a strong password before first use, the European Commission has determined. It must also become easier to update IoT devices, they must be tested for vulnerabilities and stored personal and financial […]