If you have installed a network-attached storage device manufactured by LG Electronics, you should take it down immediately, read this article carefully and then take appropriate action to protect your sensitive data.
A security researcher has revealed complete technical details of an unpatched critical remote command execution vulnerability in various LG NAS device models that could let attackers compromise vulnerable devices and steal data stored on them. LG's Network Attached Storage (NAS) device is a dedicated file storage unit connected to a network that allows users to store and share data with multiple computers.Read more
Critical security flaws impacting LG devices could be exploited to compromise user devices, leading to device hijacking and data theft, researchers have discovered. Researchers from Check Point disclosed two vulnerabilities which "can be used to elevate privileges on LG mobile devices to attack them remotely."
The vulnerabilities are unique to LG devices. In 2016, according to comScore, LG accounted for a 28.5 percent share in the smartphone market in the United States, settling behind Apple and Samsung. Check Point mobile security researcher said the first security weakness was discovered in LG's privileged service.Read more
This might be easily exploited to allow private data leakage, phishing attacks and crash a vulnerable device. The security flaw is rooted in a bug in one of the pre-installed LG applications, Smart Notice, which exists on every new LG G3 device. That’s why this device – but not other Android smartphone and tablets from other manufacturers – is vulnerable.Read more
Facebook is spying on people in “the very same way” that the NSA does, said the Belgian data protection watchdog at a court hearing where the social network stands accused of violating the privacy of internet users.
Android LG phones have a security vulnerability in the Update Center application which comes pre-installed on most LG phones. Researchers have discovered a vulnerability that exists on most LG phones which can potentially allow an attacker to replace an application with a malicious file that could lead to potentially disastrous consequences.
LG pre-installs custom applications on its phones which are otherwise not available for download on Google’s Play Store. Since they’re pre-loaded onto the phones, the devices contain a separate update method that fundamentally relies on a connection to a LG server.Read more
Hacking of computers at Belgian telecoms firm Belgacom, alleged to have been carried out by a British spy agency, was more far-reaching than previously thought and went undetected for more than two years.
News of the intrusion into Belgacom's networks first broke late last year when Belgium asked Britain, its NATO and European Union partner, to respond to allegations that its intelligence service was responsible. It said the malicious software found on Belgacom's systems was one of the most advanced spy tools ever identified by security researchers. Belgacom, Belgium's dominant telecoms provider, was seen as a top target by the British spy agency.Read more