Every year at the beginning August, hackers and security enthusiasts from around the world make their annual pilgrimage to Las Vegas for the Black Hat, DEF CON and BSides security conferences. Throughout the week, suspicious Wi-Fi networks pop up, ATMs mysteriously go down, and people compete in hacking skills tests called Capture the Flag contests or CTFs. CTF challenges … [Read more...]
Researchers Uncover Potentially Fatal Flaw in Tesla Autopilot
Security issues with connected cars are nothing new. Several years ago, researchers demonstrated that they could run a Jeep off the road after compromising the vehicle’s connected system. And last year, researchers uncovered a bug that allowed them to access the back end systems of an internet-connected vehicle management systems that could allow them to locate and unlock cars, … [Read more...]
The 6 Threats Every Wi-Fi System Should Be Able to Prevent
Wi-Fi has become an integral part of everyday business and life in general, yet Wi-Fi security still doesn’t receive as much attention or investment as it should. According to Wi-Fi NOW, nearly 75 percent of US smartphone traffic runs over Wi-Fi, as of Q4 2018. This spells a significant amount of opportunity for bad guys looking to attack unsuspecting users over under-secured … [Read more...]
Vaporworms – The Top Threat of 2019?
Anyone that’s been paying attention knows that fileless malware has been on the rise for the past few years. But, did you know that we’re likely to see this infamous threat transform in new and menacing ways this year? Enter the Vaporworm. Just a few short months ago, the WatchGuard Threat Lab predicted that 2019 would be the year we’d see a new breed of fileless malware with … [Read more...]
202 Million Resumes Leaked
One of the largest data breaches yet is not from a company in the US, and GDPR doesn't apply since they are outside the European Union. On December 28 last year, Bob Diachenko from Hackern.io found 202,730,434 private resumes from Chinese citizens on a database without any authentication protecting it. This database ran on a MongoDB instance hosted on Amazon AWS. The breach … [Read more...]