What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
no_ico.webp 2019-08-23 13:08:05 Microsoft Contractors Listened To Xbox Owners In Their Homes (lien direct) Vice reported that contractors working for Microsoft have listened to audio of Xbox users speaking in their homes in order to improve the console's voice command features, Motherboard has learned. The audio was supposed to be captured following a voice command like “Xbox” or “Hey Cortana,” but contractors said that recordings were sometimes triggered and recorded by … The ISBuzz Post: This Post Microsoft Contractors Listened To Xbox Owners In Their Homes
no_ico.webp 2019-08-23 12:59:04 Over 80 Percent Of Organisations Find Securing The Cloud “Difficult” (lien direct) In light of the recent Capital One data breach, where a misconfiguration in a cloud server resulted in a hacker exploiting 100 million customer accounts, a new study from Tripwire has found that 84 percent of organisations find maintaining security configurations across cloud services difficult.   The study conducted by Tripwire surveyed security professionals attending … The ISBuzz Post: This Post Over 80 Percent Of Organisations Find Securing The Cloud “Difficult”
no_ico.webp 2019-08-23 12:34:00 Cyber Threats Against Financial Services Up 56% (lien direct) It has been reported that, according to security firm ZeroFox, there has been a 56% year-over-year increase in digital threats targeting the financial space. Researchers scanned 2.9 billion pieces of content and found more than 8.9 million security events in a 12-month period. Brand abuse and manipulation was the most common threat, with more than 250,000 events. … The ISBuzz Post: This Post Cyber Threats Against Financial Services Up 56%
no_ico.webp 2019-08-23 12:25:00 New Botnet Revealed, Takes Over Malware Web Servers (lien direct) A major botnet operation has been attacking and taking over the web shells (backdoors on web servers) of other malware operations for more than a year, security researchers from Positive Technologies have revealed. Researchers linked the botnet to a former Windows trojan named Neutrino (also known as Kasidet), whose operators appear to have shifted from targeting … The ISBuzz Post: This Post New Botnet Revealed, Takes Over Malware Web Servers Malware
no_ico.webp 2019-08-22 17:30:02 37% Of Organisations Have Suffered A Cyberattack On Cloud Environments Due To The Lack Of Basic Cloud Security Hygiene (lien direct) New study reveals 42 percent of organisations are concerned about cloud security but many fail to carry out any security testing on the environment With the recent exposure of a huge data breach affecting US bank Capital One, cloud security has once again been put under the spotlight. However, a recent survey from Outpost24 has … The ISBuzz Post: This Post 37% Of Organisations Have Suffered A Cyberattack On Cloud Environments Due To The Lack Of Basic Cloud Security Hygiene Data Breach
no_ico.webp 2019-08-22 17:21:01 NSA Exploits Used By Worm-cryptominer Combo To Attack Systems (lien direct) It has been reported that security researchers recently found and analysed a worm-cryptominer combo that pauses the resource-intensive cryptomining process if it finds popular games running on the victim's machine.. The malware combines Python and PowerShell to create a cryptocurrency miner, which also has a worm-like component that helps it move laterally and infect victims by using vulnerabilities such as … The ISBuzz Post: This Post NSA Exploits Used By Worm-cryptominer Combo To Attack Systems Malware
no_ico.webp 2019-08-21 18:20:05 Identity And Security: A Perfect Match (lien direct) It is no secret that there has been a steep rise in the number of cybercriminals looking to target businesses to obtain personal data and intellectual property. Last year, the ICO issued a record breaking total of monetary penalties – 22 fines totalling over £3million to businesses not protecting this data. While new research from … The ISBuzz Post: This Post Identity And Security: A Perfect Match
no_ico.webp 2019-08-21 15:30:03 What To Do When Ransomware Strikes (lien direct) An employee walks over to your office, fingers fidgeting and brow sweating. They tell you that there's something you have to see. Concerned, you quickly rush to their desk. On their computer screen is a single message that reads: “We have gained access to your computer and your files have been encrypted. If you want … The ISBuzz Post: This Post What To Do When Ransomware Strikes Ransomware
no_ico.webp 2019-08-21 14:53:01 MoviePass Exposes 161M Records (lien direct) It was recently reported that movie ticket subscription service MoviePass has exposed tens of thousands of customer card numbers because a critical server was not protected with a password. The database contained 161 million records at the time of writing and growing in real-time. Many of the records were normal computer-generated logging messages used to … The ISBuzz Post: This Post MoviePass Exposes 161M Records
no_ico.webp 2019-08-21 14:44:03 (Déjà vu) PokerTracker.com Hacked To Inject Payment Card Stealing Script (lien direct) A curious case of web-based card skimming activity revealed that the Poker Tracker website had been compromised and loaded a Magecart script – code that steals payment information from customers. Online poker enthusiasts use the Poker Tracker software suite to improve their winning chances by making decisions based on statistics compiled from the opponents’ gameplay, … The ISBuzz Post: This Post PokerTracker.com Hacked To Inject Payment Card Stealing Script
no_ico.webp 2019-08-21 14:34:03 Apple\'s iOS 12.4 Update Leaves iPhones Open To Jailbreaking (lien direct) It has been reported that iPhone hackers have discovered Apple’s most recent iOS update, 12.4, released in July, accidentally reopened a code-execution vulnerability that was previously patched – a vulnerability that can be abused to jail-break iThings. A security researcher going by the name of Pwn20wnd released a public jailbreak that exploits the reintroduced bug, and marks one of the first free … The ISBuzz Post: This Post Apple’s iOS 12.4 Update Leaves iPhones Open To Jailbreaking Vulnerability
no_ico.webp 2019-08-20 13:11:02 New Krebs Findings On Bulletproof Proxy Networks & Automated Cyber Threats (lien direct) In response to findings published today in Krebs on Security on The Rise of “Bulletproof” Residential Networks, an expert with Cequence Security offers perspective on Brian Krebs’ research and Cequence Security’s own recent findings on Bulletproof Proxy Networks. The ISBuzz Post: This Post New Krebs Findings On Bulletproof Proxy Networks & Automated Cyber Threats
no_ico.webp 2019-08-20 12:14:01 Texas Cyber Attack Has Taken 23 Government Agencies Offline (lien direct) It has been reported that the Department of Information Resources (DIR) has confirmed that the state of Texas has been responding to a cyber-attack that has affected at least 23 government agencies. Details are at a minimum at the moment as the Department of Information Resources (DIR) leads the response and investigation into the attacks. Texas released … The ISBuzz Post: This Post Texas Cyber Attack Has Taken 23 Government Agencies Offline Guideline
no_ico.webp 2019-08-19 15:30:03 (Déjà vu) The Most Common Hack Is Also The Most Successful. Here\'s How To Fight It. (lien direct) Despite what movies might show, most hacks don't involve frantic typing or brute-force attacks. In fact, Verizon’s “2017 Data Breach Investigations” report revealed that 90 percent of successful hacks aren't hacks at all: They’re social engineering. Simply put, social engineering is about manipulating people rather than computers. Modern hackers have discovered that it is easier … The ISBuzz Post: This Post The Most Common Hack Is Also The Most Successful. Here’s How To Fight It. Data Breach Hack
no_ico.webp 2019-08-19 15:29:03 How To Overcome 3 Key Challenges Of Shared Responsibility In The Cloud (lien direct) The cloud is changing the nature of business with a powerful approach to streamlining operations and staying current with the latest technology. But as the saying goes, with great power comes great responsibility. In this case, that responsibility breaks down into two sides: cloud vendors and the companies that use them. Cloud service providers are … The ISBuzz Post: This Post How To Overcome 3 Key Challenges Of Shared Responsibility In The Cloud
no_ico.webp 2019-08-19 13:20:04 One In Four People Would Be Willing To Buy Back Their Private Information From The Black Market (lien direct) One in four people would be willing to buy back their private information from the black market, according to new research. A study of 2,000 people explored the value placed on private information available online and keeping their passwords secure - and it found the number willing to buy back their information jumps to nearly 50 … The ISBuzz Post: This Post One In Four People Would Be Willing To Buy Back Their Private Information From The Black Market
no_ico.webp 2019-08-19 13:10:02 Microsoft Warns Of New BlueKeep‑like Flaws (lien direct) Microsoft issued fixes for four critical vulnerabilities in Remote Desktop Services (RDS) this week, likening two of them to 'BlueKeep', another critical flaw in the same Windows component. All four Remote Code Execution (RCE) flaws – tracked as CVE‑2019‑1181, CVE‑2019‑1182, CVE‑2019‑1222 and CVE‑2019‑1226 – can be exploited by attackers sending a specially-crafted remote desktop protocol (RDP) message to RDS, WeLiveSecurity reported. The ISBuzz Post: This Post Microsoft Warns Of New BlueKeep‑like Flaws
no_ico.webp 2019-08-19 12:50:04 ECB Confirms Hacker Attack And Shuts Down One Of Its Websites (lien direct) The European Central Bank (ECB) confirmed it suffered a breach that involved attackers injecting malware which led to a potential loss of data, and forced ECB to close down its Banks' Integrated Reporting Dictionary (BIRD) website until further notice. https://twitter.com/LukaMilinkovi1/status/1163341582151671808 The ISBuzz Post: This Post ECB Confirms Hacker Attack And Shuts Down One Of Its Websites Malware
no_ico.webp 2019-08-16 11:50:03 Hackers In The Home: How Safe Is Your Alarm System? (lien direct) Every connected device multiplies the vulnerability of a network. The recent explosion in IoT devices in modern homes has created a treasure trove for hackers. With so many unsecured devices, which are all potential gateways – it is easier than ever for hackers to make their way into home networks. Even your home alarm system, … The ISBuzz Post: This Post Hackers In The Home: How Safe Is Your Alarm System? Vulnerability
no_ico.webp 2019-08-16 11:00:02 The Enterprise Security Risks Of Generic Messaging Platforms (lien direct) Without the ability for employees to communicate in real-time, regardless of location, the modern workplace would not be feasible. In fact, businesses with effective communication practices are 50 percent more likely to have lower-than-average employee turnover rates. This has given rise to a host of messaging platforms, all with the same promise – removing barriers … The ISBuzz Post: This Post The Enterprise Security Risks Of Generic Messaging Platforms
no_ico.webp 2019-08-16 10:39:01 Personal Data Of Hundreds Of Visa Applicants Accidentally Leaked In Email (lien direct) According to this link, https://www.abc.net.au/news/health/2019-08-15/bupa-immigration-medical-data-breach/11413740, the personal health information of 317 people applying for Australian visas was accidentally emailed to a member of the general public, an ABC investigation has revealed. The security bungle occurred when a spreadsheet was sent by mistake to an unknown individual’s email address, because of a typo. Documents obtained under a … The ISBuzz Post: This Post Personal Data Of Hundreds Of Visa Applicants Accidentally Leaked In Email
no_ico.webp 2019-08-16 10:20:00 (Déjà vu) Attackers Use Backdoor And RAT Cocktail To Target The Balkans (lien direct) Several countries have been targeted by a long-term campaign operated by financially motivated threat actors who used a backdoor and a remote access Trojan (RAT) malicious combo to take control of infected computers. The two malicious payloads dubbed BalkanDoor and BalkanRAT by the ESET researchers who spotted them have been previously detected in the wild by the … The ISBuzz Post: This Post Attackers Use Backdoor And RAT Cocktail To Target The Balkans Threat
no_ico.webp 2019-08-15 14:32:05 Industry Comment: Passwords Can Be Reset, Biometrics Can\'t (lien direct) The fingerprints of over 1 million people, as well as facial recognition information, unencrypted usernames and passwords, and personal information of employees, was discovered on a publicly accessible database for a company used by the likes of the UK Metropolitan police, defence contractors and banks. Suprema is the security company responsible for the web-based Biostar 2 biometrics lock system … The ISBuzz Post: This Post Industry Comment: Passwords Can Be Reset, Biometrics Can’t
no_ico.webp 2019-08-15 14:30:01 “Learning The Lessons” – Why GDPR Compliance Matters (lien direct) It is well over a year now since the EU General Data Protection Regulation (GDPR) came into effect. It was a defining moment in the history of data privacy. It shone a spotlight on data protection, helping to turn it into a top priority for organisations worldwide. It engendered stricter laws in California, New Zealand … The ISBuzz Post: This Post “Learning The Lessons” – Why GDPR Compliance Matters
no_ico.webp 2019-08-15 10:06:03 (Déjà vu) Biometric Database Breach: Expert Commentary (lien direct) Suprema has reportedly suffered a biometric database breach including facial recognition records, fingerprints, log data and personal information being found on “a publicly accessible database.” The damage is not yet clear, but the report claims that actual fingerprints and facial recognition records for millions of people have been exposed. The ISBuzz Post: This Post Biometric Database Breach: Expert Commentary
no_ico.webp 2019-08-15 08:20:00 700k Customer Records Leaked Choice Hotels Data Breach (lien direct) Hackers claim to have stolen 700,000 guest records belonging to Choice Hotels, one of the largest hotel chains in the world. Security researcher Bob Diachenko discovered the unsecured database, which was left exposed and accessible to anyone with an internet connection. Diachenko immediately notified the company of the exposed MongoDB instance, but it appears malicious actors got to it … The ISBuzz Post: This Post 700k Customer Records Leaked Choice Hotels Data Breach Data Breach
no_ico.webp 2019-08-13 21:45:02 The Challenges Of Defending Against Credential Stuffing - State Farm And More (lien direct) The recent credential stuffing attack at State Farm highlights the necessity to protect your company’s business applications, whether they’re web, mobile or API-based. The ISBuzz Post: This Post The Challenges Of Defending Against Credential Stuffing — State Farm And More
no_ico.webp 2019-08-13 21:39:01 (Déjà vu) HVACking: Remotely Exploiting Bugs In Building Control Systems (lien direct) According to this article, https://www.bleepingcomputer.com/news/security/hvacking-remotely-exploiting-bugs-in-building-control-systems/, Security researchers have found a zero-day vulnerability in a popular building controller used for managing various systems, including HVAC (heating, ventilation, and air conditioning), alarms, or pressure level in controlled environments. Discovered using the automated software testing technique called “fuzzing,” the point of failure gives an attacker on the network full … The ISBuzz Post: This Post HVACking: Remotely Exploiting Bugs In Building Control Systems Vulnerability
no_ico.webp 2019-08-13 21:31:00 More Problems For British Airways – Now An e-ticketing Vulnerability Has Been Discovered (lien direct) More bad news for British Airways, after its ticket system left hundreds of people stranded in airports due to IT failures last week, now a security bug has been discovered in its e-ticketing system, which has the potential to expose passengers' data, including flight booking details and personal information. The researchers have estimated 2.5 million connections were … The ISBuzz Post: This Post More Problems For British Airways – Now An e-ticketing Vulnerability Has Been Discovered Vulnerability
no_ico.webp 2019-08-13 21:28:01 Defence Against The Dark Arts (lien direct) Any CIO (and there are a lot of them) can tell you that defence against cyberattacks is a core issue facing their corporation. All companies need defensive techniques that defend them against any form of cyberattack that is used to cause harm, exert control over, or even kill a company's ability to operate. And, today … The ISBuzz Post: This Post Defence Against The Dark Arts
no_ico.webp 2019-08-12 21:34:00 Researchers Finding Election Systems Open To The Internet (lien direct) Researchers including Kevin Skoglund, an independent security consultant, found 35 election systems connected to the internet for months or longer including some in swing states as reported by Motherboard. Two backend systems which include the reporting system that tabulates votes and the election-management system are on a local area network, which is connected to the … The ISBuzz Post: This Post Researchers Finding Election Systems Open To The Internet
no_ico.webp 2019-08-12 21:22:01 Beware Of Fake Microsoft Account Unusual Sign-in Activity Emails (lien direct) According to Bleeping Computer, attackers are capitalizing on this by sending emails that pretend to be “Microsoft account unusual sign-in activity” alerts from Microsoft. When compared to the legitimate email notifications sent by Microsoft, they look almost identical with the same information fields and even the same sender address of “account-security-noreply@accountprotection.microsoft.com“. The ISBuzz Post: This Post Beware Of Fake Microsoft Account Unusual Sign-in Activity Emails
no_ico.webp 2019-08-12 21:06:02 Critical Flaw Within Canon DSLR Camera Can Lead To Ransomware Attack (lien direct) Security researchers have discovered a fundamental flaw within a Canon DSLR camera which could give hackers the ability to install malware via the camera's Picture Transfer Protocol software. The researchers began by searching for and “dumping” the firmware of a free open-source software called Magic Lantern, used by a modding community of Canon owners to add new features to the … The ISBuzz Post: This Post Critical Flaw Within Canon DSLR Camera Can Lead To Ransomware Attack Ransomware Guideline
no_ico.webp 2019-08-09 15:37:03 Security Flaw In WhatsApp That Would Allow Hackers To Alter Messages (lien direct) It has been reported that a security firm has found a series of flaws in WhatsApp that could allow hackers to intercept and manipulate messages by changing the identity of a sender or altering their text. This gives the attackers the power to “create and spread misinformation from what appear to be trusted sources,” the researchers said. The ISBuzz Post: This Post Security Flaw In WhatsApp That Would Allow Hackers To Alter Messages
no_ico.webp 2019-08-09 15:30:03 Group Dating App 3fun Exposed Sensitive Data On 1.5 Million Users (lien direct) Attackers could have used 3fun to create profiles of the users with both typical profile information and physical location data of its users who are billed as kinky, open-minded people. This can be sensitive information that used for harassment and persecution of LGBTQ+ individuals. Due to the multiple security vulnerabilities in the application, researchers were … The ISBuzz Post: This Post Group Dating App 3fun Exposed Sensitive Data On 1.5 Million Users
no_ico.webp 2019-08-09 15:21:04 (Déjà vu) Bugcrowd On Apple\'s New Bug Bounty (lien direct) Apple opening its bug bounty program up to all researchers is an interesting move–but an anticipated one. Public programs open companies up to more diversity and creativity from a broader crowd of security researchers.    Among other updates to the program, Apple is demonstrating that it understands the importance of finding bugs not just when … The ISBuzz Post: This Post Bugcrowd On Apple's New Bug Bounty
no_ico.webp 2019-08-09 15:10:04 State Farm Says Hackers Confirmed Valid Usernames And Passwords In Credentials Stuffing Attack (lien direct) Banking and insurance giant State Farm said it suffered a credential stuffing attack during which “a bad actor” was able to confirm valid usernames and passwords for State Farm online accounts. State Farm said it reset account passwords to all impacted accounts to prevent future abuse from the bad actor. The ISBuzz Post: This Post State Farm Says Hackers Confirmed Valid Usernames And Passwords In Credentials Stuffing Attack
no_ico.webp 2019-08-09 15:07:01 July 2019\'s Most Wanted Malware: Vulnerability In OpenDreamBox 2.0.0 WebAdmin Plugin Enables Attackers To Execute Commands Remotely (lien direct) Check Point's researchers confirm that the vulnerability has impacted 32% of organizations globally in the last month  Check Point Research has published its latest Global Threat Index for July 2019. The Research team is warning organizations of a new vulnerability discovered in the OpenDreamBox 2.0.0 WebAdmin Plugin that has impacted 32% of organizations globally in … The ISBuzz Post: This Post July 2019's Most Wanted Malware: Vulnerability In OpenDreamBox 2.0.0 WebAdmin Plugin Enables Attackers To Execute Commands Remotely Vulnerability Threat
no_ico.webp 2019-08-09 13:09:00 Instagram\'s Lax Privacy Practices Let A Trusted Partner Track Millions Of Users\' Physical Locations (lien direct) It has been revealed that Instagram’s lax privacy practices let trusted partner Hyp3r track millions of users’ physical locations, secretly save their stories, and flout its rules. Hyp3r used four key tools to scrape data from Instagram users. First, it utilized an Instagram security hole that allowed it to “zero in on specific locations” and collect all the … The ISBuzz Post: This Post Instagram’s Lax Privacy Practices Let A Trusted Partner Track Millions Of Users’ Physical Locations
no_ico.webp 2019-08-08 12:09:04 How Long Until The New Intel Vulnerability Becomes Weaponised? (lien direct) Bitdefender has uncovered a vulnerability that affects all Intel CPUs, on all operating systems. This new strain of side-channel attack lets the attacker access all information in the OS kernel memory. Spectre and Meltdown were some of the most dangerous attacks of this type, with effects so dire that mitigating measures were developed to prevent future similar … The ISBuzz Post: This Post How Long Until The New Intel Vulnerability Becomes Weaponised? Vulnerability
no_ico.webp 2019-08-08 11:45:04 FISMA Requirements: How They Relate To Firmware Security (lien direct) FISMA provides federal agencies significant leeway when determining the security controls required for compliance. Each agency is responsible for determining the appropriate controls based on their particular risk profile. And while some agencies may dismiss firmware security, that would be a big mistake. Adversaries have noticed that firmware and hardware constitute a serious blind spot … The ISBuzz Post: This Post FISMA Requirements: How They Relate To Firmware Security
no_ico.webp 2019-08-07 21:34:05 DHS Warns Of Potential Cyber Scams Tied To El Paso, Dayton Shootings (lien direct) The Department of Homeland Security (DHS) on Tuesday warned internet users to watch out for potential “malicious cyber activity” that seeks to take advantage of the shootings over the weekend in El Paso, Texas, and Dayton, Ohio. The ISBuzz Post: This Post DHS Warns Of Potential Cyber Scams Tied To El Paso, Dayton Shootings
no_ico.webp 2019-08-07 21:27:00 Facebook Suing 2 Android App Developers Over Malware Infused Apps (lien direct) Facebook has filed a lawsuit today against two Android app developers for infecting their users with malware that faked clicks on ads. Both the Hong Kong-based JediMobi and the Singapore-based LionMobi were a part of the social media giant’s Audience Network. The program lets Facebook’s advertisers host their ads on participating mobile apps, whose developers … The ISBuzz Post: This Post Facebook Suing 2 Android App Developers Over Malware Infused Apps Malware
no_ico.webp 2019-08-07 20:57:02 British Airways IT Outage – Expert Commentary (lien direct) You probably saw in the news that British Airways is experiencing yet another IT system failure this morning, following a similar outage it suffered last month. The failure seems to be causing delays, confusion and frustration among the many travelers eager to get to anticipated destinations. More information can be found here: https://www.bbc.co.uk/news/uk-49261497 The ISBuzz Post: This Post British Airways IT Outage – Expert Commentary
no_ico.webp 2019-08-07 10:39:03 Weak Online Banking Passwords Opening The Door To Online Accounts (lien direct) Cybercriminals are increasingly targeting third-party financial aggregation services to steal money from consumers' online bank accounts and one of the weakest links are passwords. Many people use the same passwords across online accounts and cybercriminals just cycle through names and passwords until they hit the jackpot. The ISBuzz Post: This Post Weak Online Banking Passwords Opening The Door To Online Accounts
no_ico.webp 2019-08-07 10:21:04 (Déjà vu) CafePress Suffers Data Breach Impacting Over 22 Million Customers (lien direct) CafePress, a well-known custom T-Shirt and merchandise site, suffered a data breach that exposed the personal information of 23 million of their customers. Users became aware of the breach today, not through CafePress, but through notifications from Troy Hunt’s Have I Been Pwned service. The database contained a total 23,205,290 CafePress customer records, including email addresses, names, phone numbers, … The ISBuzz Post: This Post CafePress Suffers Data Breach Impacting Over 22 Million Customers Data Breach
no_ico.webp 2019-08-07 10:06:04 Apple Hands Hackers Secret iPhones In A Bid To Boost Security (lien direct) Later this week, at the Black Hat security conference in Las Vegas, Apple is to announce plans to give security researchers special iPhones that will make it easier for them to find weaknesses in the smartphone. The iPhones, which will essentially be “dev devices” will be given to the rock star hackers that participate in the Cupertino … The ISBuzz Post: This Post Apple Hands Hackers Secret iPhones In A Bid To Boost Security
no_ico.webp 2019-08-06 08:47:01 AI Lie Detector Developed For Airport Security (lien direct) It has been reported a group of researchers are quietly commercialising an artificial intelligence-driven lie detector, which they hope will be the future of airport security. Discern Science International is the start-up behind a deception detection tool named the Avatar, which features a virtual border guard that asks travellers questions. The machine, which has been tested by border services … The ISBuzz Post: This Post AI Lie Detector Developed For Airport Security Tool
no_ico.webp 2019-08-06 08:40:05 E-Commerce Site StockX Confirms It Was Hacked, Exposing Data From 6.8 Million Customers (lien direct) It has been reported that fashion and sneaker trading platform, StockX, pushed out a password reset email to its users on Thursday citing “system updates,” but left users confused and scrambling for answers. StockX told users that the email was legitimate and not a phishing email as some had suspected, but did not say what caused the alleged system … The ISBuzz Post: This Post E-Commerce Site StockX Confirms It Was Hacked, Exposing Data From 6.8 Million Customers
no_ico.webp 2019-08-02 15:06:03 IoT Camera Exploit Allows Attackers To Listen In Over HTTP (lien direct) Researchers from cybersecurity firm Tenable said the Amcrest IP2M-841B IP camera, available on Amazon and subject to 12,000 customer reviews — many of which are positive — contained a serious bug which is “trivial” to exploit and could allow attackers to listen in over HTTP, ZDNet reported. The ISBuzz Post: This Post IoT Camera Exploit Allows Attackers To Listen In Over HTTP
Last update at: 2024-07-20 13:07:53
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter