Cyber Exploitation
618 views | +0 today
Follow
Cyber Exploitation
Low level details of cyber / security vulnerabilities and exploitation methods
Other topics curated by Cyber-Ninjas
http://www.scoop.it/t/cyber-general-news
http://www.scoop.it/t/cyber-attacks
http://www.scoop.it/t/cyber-military-politics
Curated by Cyber Ninjas
Your new post is loading...
Your new post is loading...
Scooped by Cyber Ninjas
Scoop.it!

Treasury Dept report confirms Tor network abuse

A non-public report realized by the US Treasury Department found that a majority of bank account takeovers exploits the anonymizing the Tor network.
more...
No comment yet.
Scooped by Cyber Ninjas
Scoop.it!

Feds want Apple’s help to defeat encrypted phones, new legal case shows

Prosecutors invoke 18th-century All Writs Act to get around thorny problem.

 

OAKLAND, CA—Newly discovered court documents from two federal criminal cases in New York and California that remain otherwise sealed suggest that the Department of Justice (DOJ) is pursuing an unusual legal strategy to compel cellphone makers to assist investigations.

more...
No comment yet.
Scooped by Cyber Ninjas
Scoop.it!

TorrentLocker - New Variant with New Encryption Observed in the Wild - iSIGHT Partners

On August 15, 2014, iSIGHT Partners disclosed our analysis of a new form of ransomware observed in the wild in active campaigns targeting victims in Australia. We dubbed this ransomware TorrentLocker. On September 4, 2014, it was subsequently disclosed and reported by researchers at ESET that the same ransomware was …
more...
No comment yet.
Scooped by Cyber Ninjas
Scoop.it!

Tesla recruits hackers to boost vehicle security

Electric carmaker Tesla Motors wants security researchers to hack its vehicles. The Silicon Valley based high-tech carmaker will hire up to 30 full-time hackers whose job will be to find and close vulnerabilities in the sophisticated firmware that controls its cars.
more...
No comment yet.
Scooped by Cyber Ninjas
Scoop.it!

SCADA systems Riddled with vulnerabilities

SCADA systems are essential to the smooth running of critical infrastructure but can be exploited by software and hardware vulnerabilities.
more...
No comment yet.
Scooped by Cyber Ninjas
Scoop.it!

Who needs hackers? 'Password1' opens a third of all biz doors

GPU-powered pen test yields more bad news about defences and passwords

 

Hundreds of thousands of hashed corporate passwords have been cracked within minutes by penetration testers using graphics processing units.

 
more...
No comment yet.
Scooped by Cyber Ninjas
Scoop.it!

School children to be trained in cyber warfare - Telegraph

A new cyber security training programme hopes to encourage more young people towards careers in STEM subjects
more...
No comment yet.
Scooped by Cyber Ninjas
Scoop.it!

Cracker takes control of 200 rooms in Chinese hotel

Blinds go up, blinds go down, hotel manager has no idea why
more...
No comment yet.
Scooped by Cyber Ninjas
Scoop.it!

Snowden leaks prompt firms to focus cyber security on insider threats

At this week’s Def Con hacker gathering in Las Vegas, Tess Schrodinger sounded almost annoyed.
more...
No comment yet.
Scooped by Cyber Ninjas
Scoop.it!

Mobiles hijacked without user knowledge

Android is extremely susceptible to malware within its advertisement libraries says FireEye.
more...
No comment yet.
Scooped by Cyber Ninjas
Scoop.it!

Black Hat Bruce Schneier talks incident response, trends

Bruce Schneier spoke on the state of incident response at Black Hat 2014, emphasizing that hackers will invariably breach networks.
more...
No comment yet.
Scooped by Cyber Ninjas
Scoop.it!

DefCon Traffic control systems vulnerable to hacking

Cesar Cerrudo spoke at DefCon about how traffic control systems used in the U.S. and other countries can be hacked.
more...
No comment yet.
Scooped by Cyber Ninjas
Scoop.it!

Cyber Pros Say Some Cars More 'Hackable' Than Others

Chrysler and Nissan said they are reviewing a report by well-known cyber security experts that rates their vehicles among the three "most hackable" cars on
more...
No comment yet.
Scooped by Cyber Ninjas
Scoop.it!

Apple expands data encryption under iOS 8, making handover to cops moot

"Apple cannot bypass your passcode and therefore cannot access this data."

 

Apple has updated its privacy policy as part of the rollout of iOS 8, announcing that devices with the latest version of the operating system installed can no longer be accessed by the company itself.

 

Previously, as we reported in May 2014, if law enforcement came to Apple with a seized device and a valid warrant, it was able to access a substantial portion of the data already on an iPad or iPhone. But under the latest version of iOS, even that will be impossible.

Cyber Ninjas's insight:

Older article from September

 

Readers may want from a security viewpoint to use an encrypted container within IOS just in case Apple don't stick to their word - or the user ends up with an untrusted app that reads their data.

 

Typical technologies either used singularly or nested -

 

Good Technology - www.good.com

Samsung Knox - http://www.samsung.com/global/business/mobile/platform/mobile-platform/knox/ ;

more...
No comment yet.
Scooped by Cyber Ninjas
Scoop.it!

Sony Xperia Devices Secretly Sending User Data to Servers in China

Some new Sony Xperia Devices have pre-installed Baidu Spyware which is Secretly Sending User Data to Servers in China.
more...
No comment yet.
Scooped by Cyber Ninjas
Scoop.it!

This could be the iCloud flaw that led to celebrity photos being leaked (Update: Apple is investigating) - The Next Web

An alleged breach in Apple’s iCloud service may be to blame for countless leaks of private celebrity photos this week. On Monday, a Python script emerged on GitHub...

more...
No comment yet.
Scooped by Cyber Ninjas
Scoop.it!

Why Russian hackers are beating us

Russian hackers like the ones who breached the computer systems of JP Morgan Chase and at least four other banks win because they think strategically like the best chess players, an expert says.
more...
No comment yet.
Scooped by Cyber Ninjas
Scoop.it!

Poisoned Apple: Is iOS intentionally insecure?

Apple is being accused as having intentionally built exploitable vulnerabilities into their iOS mobile operating system, to serve as a “back door” that would enable law enforcement agencies to surreptitiously glean certain user data from the devices.
more...
No comment yet.
Scooped by Cyber Ninjas
Scoop.it!

Watch a Hacker Fry a Hair Dryer With Her Radio | Threat Level | WIRED

As Maggie Jauregui was getting ready for a date last November, she was simultaneously blow drying her hair and chatting with her boyfriend over a walkie talkie—the sort of electronic gadget that the hacker couple enjoy messing around with. Suddenly, the hair dryer’s plug began to violently vibrate against the wall socket, then spark and…
more...
No comment yet.
Scooped by Cyber Ninjas
Scoop.it!

Why hackers won't be able to hijack your next flight - the facts

Commercial aircraft are safe, for the time being
more...
No comment yet.
Scooped by Cyber Ninjas
Scoop.it!

FBI Academy: Cyber security

A warning from the FBI on cyber crime vulnerability. It's in our report from the FBI citizens academy...it's a story you will only see on News 2. What do online dating, facebook, cell phones have in common? Your personal information. Vulnerable to hackers. We start with online dating sites. FBI experts say an app called Picfind-contains facial recognition software.. That software will give away your identity… if that picture is already published on the internet. FBI experts say a picture ...
more...
No comment yet.
Scooped by Cyber Ninjas
Scoop.it!

Want a safe car? Check its cyber safety rating - CNET

At the Defcon hackers convention, a security research group proposes an automobile cyber safety rating system that could go far beyond hacking cars.
more...
No comment yet.
Scooped by Cyber Ninjas
Scoop.it!

Active Directory flaw opens enterprise services to unauthorized access

Microsoft blames a well known design limitation in Active Directorys authentication protocol, but researchers who discovered the exploit beg to differ.
more...
No comment yet.
Scooped by Cyber Ninjas
Scoop.it!

Black Hat Researchers hack into Cisco EnergyWise

Vulnerabilities in EnergyWise could let attackers cause huge blackouts if abused.
more...
No comment yet.
Scooped by Cyber Ninjas
Scoop.it!

Are Cyber Stress Tests the Way of the Future?

A leading cyber-security expert says transparency is the key to managing the mounting risks posed by cyber evildoers. 
more...
No comment yet.