Not a jammer, device lets hackers fly drones and lock out original pilot.
No phone? No worries
Paypal has patched a boneheaded two factor authentication breach that allowed attackers to switch off the critical account control in minutes by changing a zero to a one.
Provider Schneider would've had hackers inside 'er
A vulnerability in Schneider Electric's industrial controller management software created a possible mechanism for hackers to plant malicious code on industrial networks.
Keen hackers at Mobile Pwn2Own
The Nexus 6P appears to have been hacked with attackers at the Mobile Pwn2Own contest installing malware without user interaction in less than five minutes.
There are several theories and claims as to who might be behind the distributed denial-of-service (DDoS) attacks launched last week against DNS provider Dyn, but researchers believe the attacks were actually launched by script kiddies.
Nokia on Thursday reported falling quarterly sales and profits for its network gear business, but outperformed rival Ericsson in a weak market thanks to cost cuts after its recent acquisition of Alcatel-Lucent. Finland's Nokia said total third-quarter operating profit decreased 18 percent from a year ago to 556 million euros ($606 million), but was buoyed by a one-off patent licensing payment. Group sales dropped 7 percent from a year ago to 5.95 billion euros, including network equipment sales falling 12 percent to 5.32 billion, which compared with a market consensus of 5.39 billion.
Cisco announced on Wednesday that it has released software updates for its Email Security Appliances (ESA) to address a total of nine vulnerabilities, including denial-of-service (DoS) and filter bypass issues.
Eighty-two percent of IT professionals report a shortage of cybersecurity skills at their company. Here are 10 programs spanning all education levels to help you get your start in the field.
A researcher has demonstrated a way for attackers to hijack drones in the air without damaging them.
With emotions running high, you can easily get scammed on World Series tickets. Here's how to protect yourself.
22 hours ago Fixing the IOT ProblemSANS Newsbites View Synopsis+1
Consumers are being blamed for not changing passwords and thereby causing last week's massive DDoS attacks.......
But True Fix Requires a More Resilient Internet, Experts WarnChinese manufacturer Xiongmai will recall up to 10,000 webcams in the wake of the IoT-powered DDoS attacks that pummeled DNS provider Dyn. But information security experts say that only a more resilient internet will blunt future attacks.
1 day ago The Information We SeekSANS Reading Room View Synopsis+1
Whether you are performing a penetration test, conducting an investigation, or are skilled attackers closing in on a target, information gathering is the foundation that is needed to carry out the assessment. Having the right information paves the way for proper enumeration and simplifies attack strategies against a given target. Throughout this paper, we will walk through some strategies used to identify information on both people and networks. Some people claim that all data can be found using Google's search engine; but can third party tools found in Linux security distributions such as Kali Linux outperform the search engine giant? Maltego and The Harvester yield a wealth of information, but will the results be enough to identify a target? The right tool for the right job is essential when working with any project in life. Let's take a journey through the information gathering process to determine if there is a one size fits all tool, or if a multi-tool approach is needed to gather the essential information on a given target. We will compare and contrast many of the industry tools to determine the proper tool or tools needed to perform an adequate information gathering assessment.
A threat group believed to be located in Palestine has been targeting users in Palestine and other Middle Eastern countries in a series of unsophisticated attacks whose main goal appears to be espionage.
These might be the stuff of nightmares.
Chris Inglis, former deputy director of the NSA, warns that connected systems mean malicious insiders can now do damage more quickly and more easily than ever.
TIFF image files can pave the way for attackers to remotely control your PC.
Mobile networks operator Nokia continued to be hit by a downturn in the industry, reporting a loss in the third quarter and a 12-percent drop in sales that saw the company's share price plunge 7 percent. ...
MacOS, iOS task threading was open to hijack
When Apple shipped its security bug-fixes earlier this week, one patch mostly passed under the radar.
Making devices secure by design requires more effort than vendors currently allow
At the end of April my home was broken into by a professional who silently and systematically looted my residence of all my portable wealth while I slept.
7 hours ago Hacker's Icarus machine steals drones midflightThe Register View Synopsis+1
Popular RC protocol pwned
PacSec Security researcher Jonathan Andersson has developed a tidy hardware module capable of fully hijacking a variety of popular drones and remote control gear running over the most popular protocol.