1B Mobile Users Vulnerable to Ongoing ‘SimJacker’ Surveillance Attack

More than one billion mobile users are at risk from a SIM card flaw being currently exploited by threat actors, researchers warn. | Continue reading


@threatpost.com | 5 years ago

Major Groupon, Ticketmaster Fraud Scheme Exposed by Insecure Database

An exposed database containing 17 million email addresses exposed a massive fraud scheme impacting vendors like Groupon and Ticketmaster. | Continue reading


@threatpost.com | 5 years ago

Hostinger Data Breach: 14M Customer Passwords, Personal Data at Risk

Hostinger said that unauthorized access to an internal API server exposed hashed passwords of 14 million customers. | Continue reading


@threatpost.com | 5 years ago

IRS Impersonation Attacks Spread Malware Nationwide

The emails are well-crafted and extremely convincing. | Continue reading


@threatpost.com | 5 years ago

Backdoor Found in Utility for Linux, Unix Servers

Backdoor was intentionally planted in 2018 and found during the DEF CON 2019 security conference when researchers stumbled upon malicious code. | Continue reading


@threatpost.com | 5 years ago

VLC Media Player Allows Desktop Takeover via Malicious Video Files

VideoLAN has released an updated version of its VLC Player to fix over a dozen bugs. | Continue reading


@threatpost.com | 5 years ago

Errors identified in two dozen Apache Struts advisories

Up to 24 Apache Struts Security Advisories listed the wrong versions that were impacted by vulnerabilities, researchers warn. | Continue reading


@threatpost.com | 5 years ago

Delta ICS Flaw Allows Total Industrial Takeover

The bug exists in a controller that oversees HVAC, lighting, sensor and alarm systems, to name a few. | Continue reading


@threatpost.com | 5 years ago

Hack of High-End Hotel Smart Locks Shows IoT Security Fail

Researchers developed an exploit that allowed them to perform an array of malicious functions against so called "mobile keys". | Continue reading


@threatpost.com | 5 years ago

Thousands of IoT Devices Bricked by Silex Malware

A 14-year-old hacker bricked at least 4,000 Internet of Things devices with a new strain of malware called Silex this week. Threatpost talks to the researcher who discovered the malware. | Continue reading


@threatpost.com | 5 years ago

Apple iMessage Flaw Allows Remote Attackers to Read iPhone Messages

Remote exploitation can be achieved with no user interaction. | Continue reading


@threatpost.com | 5 years ago

Millions of Android Smartphones Vulnerable to Trio of Qualcomm Bugs

Flaws in Qualcomm chipset expose millions of Android devices to a hacking threat. | Continue reading


@threatpost.com | 5 years ago

Ransomware Sees Triple-Digit Spike in Corporate Detections

A pair of reports released at Black Hat mark the huge shift away from targeting consumers. | Continue reading


@threatpost.com | 5 years ago

Researchers Bypass Apple FaceID Using Biometrics ‘Achilles Heel’

Researchers were able to bypass Apple's FaceID using a pair of glasses with tape on the lenses. | Continue reading


@threatpost.com | 5 years ago

Mass Spoofing Campaign Takes Aim at Walmart

The sites are targeting job-seekers, movie aficionados and shoppers in hopes of harvesting their personal information. | Continue reading


@threatpost.com | 5 years ago

Democrats and Doctors Behind Latest Wave of Leaked Data

Patient medical history and over 6 million email addresses tied to Democrats were detailed in a misconfigured storage buckets over the past few weeks. | Continue reading


@threatpost.com | 5 years ago

Black Hat: LeapFrog Tablet Flaws Let Attackers Track, Message Kids

Several serious privacy flaws in a kid's tablet were disclosed this year at Black Hat, which could allow a bad actor to track or send messages to children. | Continue reading


@threatpost.com | 5 years ago

ThreatList: Dmarc Adoption Nonexistent at 80% of Orgs

Standard email authentication to prevent spoofing and phishing remains elusive for most. | Continue reading


@threatpost.com | 5 years ago

Brand-New SystemBC Proxy Malware Spotted Using SOCKS5 for Stealth

The proxy is being distributed by the RIG and Fallout exploit kits. | Continue reading


@threatpost.com | 5 years ago

Apple Suspends Siri Program After Privacy Backlash

Apple's Siri follows Amazon Alexa and Google Home in facing backlash for its data retention policies. | Continue reading


@threatpost.com | 5 years ago

‘Urgent/11’ Critical Infrastructure Bugs Threaten EternalBlue-Style Attacks

Researchers have uncovered easy-to-exploit bugs that can impact physical safety, utilities, healthcare devices and more, setting the stage for widespread worm attacks. | Continue reading


@threatpost.com | 5 years ago

Popular Samsung, LG Android Phones Open to ‘Spearphone’ Eavesdropping

A Spearphone attacker can use the accelerometer in LG and Samsung phones to remotely eavesdrop on any audio that's played on speakerphone, including calls, music and voice assistant responses. | Continue reading


@threatpost.com | 5 years ago

JetBlue Bomb Scare Set Off with Apple AirDrop

Someone AirDropped a picture of a suicide vest to multiple people on a JetBlue flight, prompting an evacuation. | Continue reading


@threatpost.com | 5 years ago

News Wrap: Amazon Privacy and Telegram DDoS Attack

Threatpost editors Tara Seals and Lindsey O'Donnell discuss a recent lawsuit against Amazon for its privacy policies, a Telegram DDoS attack and more. | Continue reading


@threatpost.com | 5 years ago

Amazon Alexa, Google Home on Collision Course with Regulation

Threatpost talks to Tim Mackey with Synopsys about recent Amazon Echo and Google Home privacy faux pas. Will GDPR and other regulations catch up to the voice assistants? | Continue reading


@threatpost.com | 5 years ago

VLC Media Player Plagued by Unpatched Critical RCE Flaw

A patch does not yet exist for a critical buffer overflow vulnerability in VLC Media Player that could enable remote code execution. | Continue reading


@threatpost.com | 5 years ago

Critical RCE Flaw in Palo Alto Gateways Hits Uber

The bug is previously unknown but yet still fixed in later releases. However, many organizations are likely still vulnerable. | Continue reading


@threatpost.com | 5 years ago

Firmware Bugs Plague Server Supply Chain, 7 Vendors Impacted

Lenovo, Acer and five additional server manufacturers are hit with supply-chain bugs buried in motherboard firmware. | Continue reading


@threatpost.com | 5 years ago

Researcher Bypasses Instagram 2FA to Hack Any Account

An independent researcher earned a $30,000 bug bounty after discovering a weakness in the mobile recovery process. | Continue reading


@threatpost.com | 5 years ago

Security Watch: Elon Musk’s NeuraLink Links Brains to iPhones via Bluetooth

Directly linking thoughts to a phone via Bluetooth — what could go wrong? | Continue reading


@threatpost.com | 5 years ago

Unusual Linux Ransomware Targets NAS Servers

QNAPCrypt continues to spread via brute-force attacks. | Continue reading


@threatpost.com | 5 years ago

Implementing Bug Bounty Programs: The Right and Wrong Approaches

Threatpost catches up with David Baker, the chief security officer at Bugcrowd, about the future of bug bounty programs. | Continue reading


@threatpost.com | 5 years ago

Implementing Bug Bounty Programs: The Right and Wrong Approaches

Threatpost catches up with David Baker, the chief security officer at Bugcrowd, about the future of bug bounty programs. | Continue reading


@threatpost.com | 5 years ago

FinSpy can spy on calls and messages sent by Signal, Telegram, WhatsApp and more

The espionage tool is capable of eavesdropping on calls and messages sent via Signal, Telegram, WhatsApp and more. | Continue reading


@threatpost.com | 5 years ago

Agent Smith Malware Infects 25M Android Phones to Push Rogue Ads

Researchers say malware infects phones in order to sneak ads on devices for profit. | Continue reading


@threatpost.com | 5 years ago

Amazon Admits Alexa Voice Recordings Saved Indefinitely

Amazon's acknowledgment that it saves Alexa voice recordings – even sometimes after consumers manually delete their interaction history – has thrust voice assistant privacy policies into the spotlight once again. | Continue reading


@threatpost.com | 5 years ago

Facebook Removes Accounts Used to Infect Thousands with Malware

A widespread malware campaign, ongoing since 2014, was using Facebook accounts and posts to spread malware through URL links. | Continue reading


@threatpost.com | 5 years ago

Scammers Prey on Instagram Vanity and ‘Verified Account’ Status

Hackers are stealing Instagram credentials through a tricky phishing scam that asks victims to apply for exclusive verified account status. | Continue reading


@threatpost.com | 5 years ago

MongoDB Leak Exposed Millions of Medical Insurance Records

Millions of records containing personal information and medical insurance data were exposed by a database belonging to insurance marketing website MedicareSupplement.com. | Continue reading


@threatpost.com | 5 years ago

Smart Lock Turns Out to Be Not So Smart, or Secure

Pentesters say a keyless smart lock made by U-tec, called Ultraloq, is neither ultra or secure. | Continue reading


@threatpost.com | 5 years ago

FDA Warns of Potentially Fatal Flaws in Medtronic Insulin Pumps

The FDA sent out an urgent advisory warning of serious flaws in Medtronic's insulin pumps, which are used by thousands across the U.S. | Continue reading


@threatpost.com | 5 years ago

Google Announces DNS over HTTPS ‘General Availability’

Google finalizes its DNS-over-HTTPS service inching toward a world where DNS request are sent via HTTPS and not UDP or TCP. | Continue reading


@threatpost.com | 5 years ago

Cisco DNA Center Critical Flaw Opens Access to Internal Services

Cisco has patched a slew of critical and high-severity flaws in its DNA Center and SD-WAN. | Continue reading


@threatpost.com | 5 years ago

Feds: Cyberattack on Nasa’s JPL Threatened Mission-Control Data

Rampant security-operations bungling allowed cyberattackers to infiltrate JPL's network, which carries human mission data. | Continue reading


@threatpost.com | 5 years ago

Mozilla Patches Firefox Critical 0day Flaw Under Active Attack

Mozilla is urging users to update to Firefox 67.0.3 and Firefox ESR 60.7.1 after discovering a critical flaw under active attack. | Continue reading


@threatpost.com | 5 years ago

Consumers Urged to Junk Insecure IoT Devices

A security researcher who disclosed flaws impacting 2 million IoT devices in April – and has yet to see a patch or even hear back from the manufacturers contacted – is sounding off on the dire state of IoT security. | Continue reading


@threatpost.com | 5 years ago

Amazon Alexa Secretly Records Children, Lawsuits Allege

Two lawsuits are seeking class-action status, alleging that Amazon records children and stores their voiceprints indefinitely. | Continue reading


@threatpost.com | 5 years ago

Evernote Critical Flaw Opened Personal Data of Millions to Attack

Evernote's web clipper extension for Chrome is vulnerable to a critical flaw that could have exposed the data of more than 4.6 million users. | Continue reading


@threatpost.com | 5 years ago