Ford Eyes Using Personal Data to Boost Profits

Ford's CEO sees the tech company model as key to the company's next chapter. | Continue reading


@threatpost.com | 6 years ago

Gmail Glitch Offers Stealthy Trick for Phishing Attacks

The issue comes from how Gmail automatically files messages into the "Sent" folder. | Continue reading


@threatpost.com | 6 years ago

Connected Wristwatch Allows Hackers to Stalk, Spy on Children

"Our advice is to stop using this watch" as mitigations are not available, researchers told Threatpost. | Continue reading


@threatpost.com | 6 years ago

Recently-Patched Adobe ColdFusion Flaw Exploited by APT

The critical vulnerability, which was patched earlier in September, has put ColdFusion servers at risk. | Continue reading


@threatpost.com | 6 years ago

Lawsuits Aim Billions in Fines at Equifax and Ad-Targeting Companies

The results could start a wave of major damages for companies that collect and sell consumer information. | Continue reading


@threatpost.com | 6 years ago

Pentagon Draws Back the Veil on APT Malware with Sudden Embrace of VirusTotal

Two samples have already been added to the malware zoo, indicating a new openness from the federal government when it comes to cyber. | Continue reading


@threatpost.com | 6 years ago

Apache Struts Warns Users of Two-Year-Old Vulnerability

Users must update their vulnerable libraries manually. | Continue reading


@threatpost.com | 6 years ago

As End of Life Nears, More Than Half of Websites Still Use PHP V5

Support for PHP 5.6 drops on December 31 - but a recent report found that almost 62 percent of websites are still using version 5. | Continue reading


@threatpost.com | 6 years ago

AWS FreeRTOS Bugs Allow Compromise of IoT Devices

The bugs let hackers crash IoT devices, leak their information, and completely take them over. | Continue reading


@threatpost.com | 6 years ago

Shining a Light on a New Technique for Stealth Persistence

Researchers devise post-intrusion attack that use existing system binaries to achieve arbitrary code execution to maintain stealth and persistence. | Continue reading


@threatpost.com | 6 years ago

Mac Mojave Zero-Day Allows Malicious Apps to Access Sensitive Info

Malicious apps can trivially thwart Mojave 10.14's new privacy protections. | Continue reading


@threatpost.com | 6 years ago

Sony Smart TV Bug Allows Remote Access, Root Privileges

Software patching becomes a new reality for smart TV owners. | Continue reading


@threatpost.com | 6 years ago

PoC Attack Escalates MikroTik Router Bug to ‘As Bad as It Gets’

Researchers say a medium severity bug should now be rated critical because of a new hack technique that allows for remote code execution on MikroTik edge and consumer routers. | Continue reading


@threatpost.com | 6 years ago

MacOS Flaw Allows Attackers to Hijack Installed Apps

This code-signing issue represents a new attack vector, according to the researcher. | Continue reading


@threatpost.com | 6 years ago

Nine NAS Bugs Open LenovoEMC, Iomega Devices to Attack

Rated as high-risk vulnerabilities, these privilege-escalation flaws could allow an unauthenticated attacker to access protected content. | Continue reading


@threatpost.com | 6 years ago

Another Linux Kernel Bug Surfaces, Allowing Root Access

Android, Debian and Ubuntu users are still at risk. | Continue reading


@threatpost.com | 6 years ago

Weakness in Apple MDM Tool Allows Access to Sensitive Corporate Info

A lack of authentication in Apple's Device Enrollment Program could allow attackers to scoop up Wi-Fi passwords and VPN configurations. | Continue reading


@threatpost.com | 6 years ago

2018 Has Been Open Season on Open Source Supply Chains

Hackers see green field opportunities in vulnerable software supply chains. | Continue reading


@threatpost.com | 6 years ago

Google Services Track User Movements in Privacy Faux Pas (August)

A recent report found that Google services - with functions like checking maps, the weather, and search - are tracking users even when they deny permission. | Continue reading


@threatpost.com | 6 years ago

Once Popular Online Ad Format Opens Top Tier Sites to XSS Attacks

Online ad industry moves away from once prolific ads that are now deemed insecure because of DOM-based XSS vulnerabilities. | Continue reading


@threatpost.com | 6 years ago

Zero-Day Bug Allows Hackers to Access CCTV Surveillance Cameras

Firmware used in up to 800,000 CCTV cameras open to attack thanks to buffer overflow zero-day bug. | Continue reading


@threatpost.com | 6 years ago

Dangerous Pegasus Spyware Has Spread to 45 Countries

The malicious spyware has also been found in use in countries known for targeting human rights. | Continue reading


@threatpost.com | 6 years ago

ProtonVPN, NordVPN Flaws Open Door to Privilege Escalation

The flaws disclosed this month are related to a critical bug previously discovered by VerSprite in April 2018. | Continue reading


@threatpost.com | 6 years ago

New Threat Actor ‘Rocke’: A Rising Monero Cryptomining Menace

A threat actor been spotted on a number of honeypots looking to download and execute malicious cryptomining malware. | Continue reading


@threatpost.com | 6 years ago

Travel Breaches Hit Air Canada and Asia-Pac Hotelier

Air Canada said 20,000 mobile app users have had passport information exposed; and millions have been affected by a breach at Asian hotel giant Huazhu. | Continue reading


@threatpost.com | 6 years ago

IoT Robot Vacuum Vulnerabilities Let Hackers Spy on Victims

Two vulnerabilities were discovered on Dongguan Diqee-branded vacuum cleaners, Thursday. | Continue reading


@threatpost.com | 6 years ago

Researchers Break IPsec VPN Connections with 20-Year-Old Protocol Flaw

The attack targets IKE’s handshake implementation used for IPsec-based VPN connections, opening the door for MiTM attacks or for bad actors to access data carried in VPN sessions. | Continue reading


@threatpost.com | 6 years ago

GoDaddy Leaks ‘Map of the Internet’ via Amazon S3 Cloud Bucket Misconfig

Configuration data for GoDaddy servers could be used as a reconnaissance tool for malicious actors to uncover ripe targets. | Continue reading


@threatpost.com | 6 years ago

DEF CON 2018: Telltale URLs Leak PII to Dozens of Third Parties

Analytics, advertising and other web scripts can capture information housed in user confirmations for flight bookings, food delivery, medical testing and more. | Continue reading


@threatpost.com | 6 years ago

Google Bug Hunter Urges Apple to Change Its iOS Security Culture

Project Zero researcher highlights stubborn iOS bugs as an example of why Apple and the rest of the industry needs to take a fresh approach to securing systems. | Continue reading


@threatpost.com | 6 years ago

Bugs in Samsung IoT Hub Leave Smart Home Open to Attack

Researchers found 20 flaws in Samsung’s SmartThings Hub controller - opening up supported third-party smart home devices to attack. | Continue reading


@threatpost.com | 6 years ago

ThreatList: A Ranking of Airports by Riskiest WiFi Networks

Airport TSA agents don’t check terminals for insecure WiFi networks, so stay on your toes when using hotspots at these airports. | Continue reading


@threatpost.com | 6 years ago

Rewards Points Targeted by Teens in Hack of 500K Accounts

The two teens used the rewards points built up in the accounts to make purchases, before selling the account credentials on the Dark Web. | Continue reading


@threatpost.com | 6 years ago

MALICIOUS DOCKER CONTAINERS EARN CRYPTOMINING CRIMINALS $90K

Researchers said over a dozen malicious docker images available on Docker Hub allowed hackers to earn $90,000 in cryptojacking profits. | Continue reading


@threatpost.com | 6 years ago

Auth0 Glitch Allows Attackers to Launch Phishing Attacks

A glitch in Auth0 could allow attackers to spoof a legitimate website and collect sensitive information from visitors. | Continue reading


@threatpost.com | 6 years ago

Singapore ISP leaves 1,000 routers open to attack

Telcom firm leaves port open on customer routers after maintenance update exposing hundreds of customers to possible attack. | Continue reading


@threatpost.com | 6 years ago

One Year After WannaCry: A Fundamentally Changed Threat Landscape

Threatpost talked to several security researchers about what's changed in the past year. | Continue reading


@threatpost.com | 6 years ago

Intel Facing Eight New Spectre-Like Security Flaws

Intel may be facing as many as eight new Spectre-level vulnerabilities in its chips, a German magazine alleges. | Continue reading


@threatpost.com | 6 years ago

25k of malicious apps use Facebook APIs

The apps are deemed malicious by doing things such as capturing pictures and audio when the app is closed, or making an unusually large amount of network calls. | Continue reading


@threatpost.com | 6 years ago

Abbott Addresses Life-Threatening Flaw in a Half-Million Pacemakers

A backdoor could be exploited to allow an attacker to manipulate the implants and cause heart problems and even death, | Continue reading


@threatpost.com | 6 years ago

Hacktivists and tech giants protest Georgia's hack-back bill

Google, Microsoft, security researchers and hacking groups have lined up to protest the bill, which would criminalize unauthorized computer access. | Continue reading


@threatpost.com | 6 years ago