With root privilege, the malware can then receive remote instructions on which app to download and silently install on mobile devices. This can then lead to affected users receiving unwanted apps, which may then lead to unwanted ads. Even worse, these threats can also be used to install backdoors and spy on users.
Étiquette : vulnerability (Page 34 of 40)
Eliminating the possibility that Twitter’s network has been hacked, LeakedSource speculated that tens of millions of people were infected by malware that sent every username and password saved in the victims’ browser to servers under the attackers’ control.
Source : Be wary of claims that 32 million Twitter passwords are circulating online | Ars Technica
If placed strategically in an office or other location where individuals might use wireless devices, a malicious cyber actor could potentially harvest personally identifiable information, intellectual property, trade secrets, passwords, or other sensitive information.
Source : Beware of keystroke loggers disguised as USB phone chargers, FBI warns | Ars Technica
When cameras are talking to the cloud, there’s room for them to make mistakes, and these devices are filming pieces of your private life so that can be a little worrisome.
Source : Smart doorbell owners saw video from other houses thanks to a weird bug | The Verge
Three new changes in federal court rules have vastly expanded law enforcement’s ability to hack into computers around the world.
Source : So … Now the Government Wants to Hack Cybercrime Victims | WIRED
“If the government can circumvent the process merely by buying vulnerabilities, then the process becomes a farce. The FBI is not interested in cybersecurity.’’
Source : FBI Plans to Keep Apple iPhone-Hacking Method Secret – WSJ
Sexual preference. Relationship status. Income. Address. These are just some details applicants for the controversial dating site BeautifulPeople.com are asked to supply before their physical appeal is judged by the existing user base, who vote on who is allowed in to the “elite” club based on looks alone. All of this, of course, is supposed to remain confidential. But much of that supposedly-private information is now public, thanks to the leak of a database containing sensitive data of 1.1 million BeautifulPeople.com users.
The United States has opened a new line of combat against the Islamic State, directing the military’s six-year-old Cyber Command for the first time to mount computer-network attacks that are now being used alongside more traditional weapons.
Source : U.S. Cyberattacks Target ISIS in a New Line of Combat – The New York Times
Hackers can read text messages, listen to phone calls and track mobile phone users’ locations with just the knowledge of their phone number using a vulnerability in the worldwide mobile phone network infrastructure.
Source : SS7 hack explained: what can you do about it? | Technology | The Guardian
When it comes to doing the right thing in difficult situations, BlackBerry’s guiding principle has been to do what is right for the citizenry, within legal and ethical boundaries. We have long been clear in our stance that tech companies as good corporate citizens should comply with reasonable lawful access requests. I have stated before that we are indeed in a dark place when companies put their reputations above the greater good.
Source : Lawful Access, Corporate Citizenship and Doing What’s Right | Inside BlackBerry



