From Security Weekly WikiJump to navigationJump to search
- How Panasonic is using internet honeypots to improve IoT device security - This is really cool: in order to ensure development teams have as much information about potential security vulnerabilities in products as possible, both unreleased and on-the-market products are placed in the honeypots, which are monitored to gain insight into how devices are attacked by real-world hackers. "We deploy our real appliances as a honeypot and we collect attacks and malware targeting our devices. We can deploy products under development as well," Osawa explained. The Panasonic IoT threat-intelligence platform has been active for two years and in that time the company has collected information on about 30 million cyberattacks and 4,000 kinds of IoT malware – all attacks that are targeting real devices put through the security tests.
- A new Windows 10 ransomware threat? Examining claims of a potentially unstoppable vulnerability - The idea behind CFA is simple: if you haven’t prevented malware from executing on the system...CFA can at least provide protection by thwarting the main thing that ransomware does: encrypt key files.
- Birth Certificate Data Laid Bare on the Web in Multiple States
- 'Hackable' karaoke and walkie talkie toys found by Which?
- Linux Bug Opens Most VPNs to Hijacking - According to researchers at University of New Mexico and Breakpointing Bad, the bug (CVE-2019-14899), “allows…an attacker to determine if…a user is connected to a VPN, the virtual IP address they have been assigned by the VPN server, and whether or not there is an active connection to a given website.” In an advisory released this week, they noted that once a proof-of-concept exploit allowed them to determine a VPN client’s virtual IP address and make inferences about active connections, they were then able to use encrypted replies to unsolicited packets to determine the sequence and acknowledgment numbers of connections. These allowed them to hijack TCP sessions and inject data into the TCP stream.
- Hardware-based Password Managers Store Credentials in Plaintext
- Microsoft to end updates to Windows 7's free AV software, Security Essentials
- New Office 365 Feature Provides Detailed Information on Email Attack Campaigns
- Snatch ransomware pwns security using sneaky safe mode reboot
- Google Confirms Critical Android 8, 9 And 10 Permanent Denial Of Service Threat