Cybersecurity | SC Media

Cybersecurity

iPhone's are also susceptible to hacking.

Iphone malvertising app downloaded millions of times calls 22 known malicious servers

By

A compromised iPhone App was found to be using malware to infect users by calling 22 known malicious domains. Researchers at The Media Trust discovered that a compromised iPhone app which had been downloaded by millions across the globe was infecting user devices with persistent malware hidden within the ad’s style sheet which called the…

Facebook stored hundreds of millions of user passwords in plain text

By

Facebook is once again making headlines after the company discovered it had been storing hundreds of millions of users passwords in plain text for years. The company says its currently investigating the situation, but said in January it discovered some users passwords had been stored in a readable format  within its internal data storage systems,…

Tesla suing self-driving startup Zoox and former employees for data theft

By

Tesla is accusing self-driving car startup Zoox and former employees of stealing trade secrets. The automaker is suing the start-up and the bunch claiming the employees gave Zoox Tesla’s logistics info to Zoox, while another gave Tesla’s autopilot code to Xiaopeng Motors. Two lawsuits were filed this week with one claiming employees stole “proprietary information…

Researcher finds malware in USG Sony Chip HD 6 Camera surveillance kit.

Peeping Toms secretly livestream hundred of South Korean hotel guests

By

Two men were arrested in South Korea in a scandal involving hidden cameras that secretly filmed 1,6000 people in their hotel rooms. The men allegedly recorded women and live streamed them to paying customers to watch in the scandal which involved 42 rooms in 30 accommodations in 10 cities around the country. Cameras were hidden…

firewall_1208675

11 security patches released in CUJO Smart Firewall platform

By

Cisco Talos researchers discovered 11 vulnerabilities in the CUJO Smart Firewall platform which could allow an attacker to ultimately take control of a device by either executing arbitrary code or by uploading and executing unsigned kernels on affected systems. Researchers found the Firewall was vulnerable to remote code execution, local code execution, smartphone app code…

Google Photos bug leaked location history

By

Imperva Researchers recently patched a vulnerability in Google Photos that could allow threat actors to track a user’s location history. By exploiting the flaw and using a little social engineering, malicious websites could have exposed when Google Photos were taken, according to the report. Imperva researcher Ron Masas used an HTML link tag to create…

Top 12 phishing email subject lines

By

Cybercriminals often try to create a sense of urgency in their phony attempts to swindle unsuspecting users out of crucial information with subject lines that would compel the unsuspecting user into opening the phony email and potentially downloading malicious attachments. Unfortunately, they rarely announce themselves in phishing attacks and some even have the ability to…

Malspam campaign leverages Boeing 737 Max tragedy

By

Threat actors are once again leveraging tragedy, this time sending spam messages concerning the recent Boeing 737 MAX crash which took place last week. The campaign was discovered by 360 Threat Intelligence Center researchers who posted about the malicious campaign on Twitter. Attackers are using topics regarding #Boeing 737 MAX 8 crash and seems an…

Next post in Security News