Have you used a friend's laptop to charge your iPhone and gotten a prompt that says, "Trust This Computer?" Say yes, and the computer will be able to access your phone settings and data while they're connected.
And while it doesn't feel like your answer really matters—your phone will charge either way—researchers from Symantec warn that this seemingly minor decision has much higher stakes than you'd think. In fact, the Symantec team has found that hacks exploiting that misplaced "Trust" comprise a whole class of iOS attacks they call "trustjacking." Once a user authorizes a device, they open themselves to serious and persistent attacks.Read more
A researcher with AdGuard discovered five fake ad-blocking extensions in the Chrome Web Store that used hidden scripts to manipulate users’ browsers. The good news is, after AdGuard published the report, the Chrome team removed all five of the extensions from its store.
Unfortunately, AdGuard’s Andrey Meshkov reports that the extensions he discovered had more than 20 million users. Posing as ad blockers, the malicious extensions simply copied code from real ad blockers and then added to them. “All the extensions I’ve highlighted are simple rip-offs with a few lines of code and some analytics code added by the ‘authors,’” Meshkov wrote.Read more
A little-known data firm was able to build 48 million personal profiles, combining data from sites and social networks like Facebook, LinkedIn, Twitter, and Zillow, among others -- without the users' knowledge or consent.
Localblox, a Bellevue, Wash.-based firm, says it "automatically crawls, discovers, extracts, indexes, maps and augments data in a variety of formats from the web and from exchange networks." Since its founding in 2010, the company has focused its collection on publicly accessible data sources, like social networks Facebook, Twitter, and LinkedIn, and real estate site Zillow to name a few, to produce profiles.Read more
If you have installed a network-attached storage device manufactured by LG Electronics, you should take it down immediately, read this article carefully and then take appropriate action to protect your sensitive data.
A security researcher has revealed complete technical details of an unpatched critical remote command execution vulnerability in various LG NAS device models that could let attackers compromise vulnerable devices and steal data stored on them. LG's Network Attached Storage (NAS) device is a dedicated file storage unit connected to a network that allows users to store and share data with multiple computers.Read more
Google has long struggled with how best to get dozens of Android smartphone manufacturers—and hundreds of carriers—to regularly push out security-focused software updates.
But when one German security firm looked under the hood of hundreds of Android phones, it found a troubling new wrinkle: Not only do many Android phone vendors fail to make patches available to their users, or delay their release for months; they sometimes also tell users their phone's firmware is fully up to date, even while they've secretly skipped patches.Read more
Apple Inc. warned employees to stop leaking internal information on future plans and raised the specter of potential legal action and criminal charges, one of the most-aggressive moves by the world’s largest technology company to control information about its activities.
The Cupertino, California-based company said in a lengthy memo posted to its internal blog that it "caught 29 leakers," last year and noted that 12 of those were arrested. "These people not only lose their jobs, they can face extreme difficulty finding employment elsewhere," Apple added. The company declined to comment on Friday.Read more
Kryptos Logic, the cyber-security firm running the main WannaCry sinkhole, announced today plans to allow organizations access to some of the WannaCry sinkhole data.
The security firm cites recurring WannaCry ransomware infections that are still taking place at various companies, even eleven months after the first WannaCry outbreak in May 2017. For example, Boeing, Connecticut state agencies, Honda, and Victoria state police suffered WannaCry infections long after Kryptos Logic researcher Marcus "MalwareTech" Hutchins registered the WannaCry killswitch domain, effectively stopping the global outbreak on May 12, last year.Read more
Vevo’s YouTube account appears to have fallen victim to hackers today, as a number of high-profile music videos have been defaced. The most-viewed YouTube video of all time, Luis Fonsi and Daddy Yankee’s “Despacito,” disappeared from YouTube briefly after being defaced by hackers.
The video’s image was altered and replaced with a masked gang holding guns (from Netflix show Casa de Papel), and the description was changed by hackers calling themselves Prosox and Kuroi’sh. Lots of other popular music videos have also defaced.Read more
Facebook CEO Mark Zuckerberg rejected Apple CEO Tim Cook’s critique of his company’s business model, which Cook characterized as a scheme to monetize customers, calling it “glib” and “not at all aligned with the truth.”
“I think it’s important that we don’t all get Stockholm syndrome and let the companies that work hard to charge you more convince you that they actually care more about you,” Zuckerberg told Vox co-founder Ezra Klein on his podcast. “Because that sounds ridiculous to me.” In an interview with Klein, Zuckerberg described Cook’s assessment that Apple has a sounder business model.Read more
Like most electronic stuff, robots are not immune to cybercriminals. Last year, researchers at IOActive detected as many as 50 vulnerabilities in robots developed by the Japanese firm SoftBank. They informed the manufacturer but never heard back. So this year at the Security Analyst Summit 2018, they decided to demonstrate what can happen.
Robots are all around us, toiling away in factories and warehouses, busting a gut in landfills, and even working in hospitals. For its part, SoftBank Robotics supplies electronic helpers to work with people. The NAO model introduces school kids and students to programming and robotics, and it also teaches children with autism.Read more